The Tower. Simon Toyne

Читать онлайн.
Название The Tower
Автор произведения Simon Toyne
Жанр Приключения: прочее
Серия
Издательство Приключения: прочее
Год выпуска 0
isbn 9780007507481



Скачать книгу

as your goddess.’ He turned his horse and started walking away.

       ‘We could fall back to the transport shed,’ Tariq whispered. ‘There are guns there. We could make a stand. Or if we make a diversion when we head through the gates I think I might be able to make it to the top of one of the towers and turn the big guns on them.’

       ‘Then what? Bury the bodies, wait for the next lot of people to show up and kill them too?’

       ‘What else can we do? We won’t last two days out in the desert without water. Better to fight and maybe die here quickly than slowly out there in the furnace.’

       ‘Better not to die at all,’ she said.

       ‘You have something else in mind?’

       She swept her hand through the water, her fingers dragging through the cool, wet earth at the bottom, remembering the symbols on the Starmap. ‘No,’ she said, watching the swirls of earth eddying in the clear water, turning it a dusty red. There was something familiar about all this, she had seen something like it in the stone. She tried to concentrate on it and bring it to the front of her mind but it continued to elude her, like something glimpsed at the edge of her vision. ‘If you want to go, then go,’ she said, turning to Tariq. ‘I’m sure you could make it to Al-Hillah on foot before the thirst takes hold.’

       ‘What about you?’

       She glanced up at the gravesite, visible through the line of riders and the chain-link fence. ‘I’m staying here,’ she said, ‘or as close as I can manage without getting shot.’

       Her hand passed through the water again, sending larger clouds of red mud spreading in the water as she stood and walked towards the riders.

       ‘Goodbye, Malik,’ she said, as she passed through the line.

       His smile faltered and he made as if to reply but she was already gone, striding towards the open gate and out into the desert without once looking back to see if anyone was following her.

       19

      The National Cyber Crime Task Force was buried deep in the Maryland bedrock and housed a huge bank of central databases that fed the entire law enforcement network as well as hard drives and backup files relating to hundreds of thousands of cases – everything from simple internet scams and corporate fraud to online paedophile rings and major terrorist networks.

      The main machine room was practically deserted by the time Shepherd stepped into its air-conditioned gloom. He had stopped to splash water on his face and grab something to eat after Franklin had failed to make good on his offer to buy him a burger, wolfing down a doughnut and a cup of coffee on his way over. No food or drink was allowed in the cyber crimes labs. A seated figure was silhouetted against three large flatscreen monitors on the far side of the room, his fingers punching code into a keyboard so fast it sounded like tap dancing. He turned at the sound of Shepherd’s approach and smiled a greeting. ‘Agent Franklin said you’d be along.’

      Agent Smith was one of the senior instructors in the cyber crimes division. There was a rumour that did the rounds each year that the Agent Smith of the Matrix movies had been based on him and there was certainly more than a passing physical resemblance – same dark hair receding from a widow’s peak, same sharp features on top of a whip-thin frame – but that was as far as the comparison went. The real Agent Smith was just about the friendliest instructor in the building, generous with his time and endlessly patient with those who were never going to pound the cyber beat but needed to understand enough to pass the module anyway.

      ‘I’ve set you up with a ghost file,’ he said, nodding at the terminal to the right of his.

      Shepherd sat at the desk and assessed the data. In cyber crime there are two types of evidence: physical and digital. Physical evidence is the actual hardware itself. Often in the chain of evidence it has to be shown that a suspect has used a certain computer, so fingerprints or even microscopic flakes of skin beneath the keys of keyboards are sought to prove it. Digital evidence is different. Files and directories can be cloned or copied and worked on by several teams of people at once to crunch the data faster. These clones are called ghost files and Shepherd was looking at one now, an exact copy of everything on Dr Kinderman’s hard drive. ‘Find anything yet?’ he asked.

      Smith continued to machine gun code into his terminal. ‘The most interesting thing I’ve found so far is nothing.’ He hit a key and folders started opening, rippling down his main screen like a deck of cards, every single one of them empty. ‘Everything you would expect is there up until eight months ago, then there’s nothing at all. No directories, no sub-directories, no caches. Whoever cleaned this out really knew what they were doing.’

      Shepherd had been hanging on to the hope that Smith would find something in Dr Kinderman’s personal files, an email, or a virus that had originated elsewhere with a pathway that might give them a new lead. But the efficiency and skill with which the drive had been forensically wiped just threw more suspicion on Kinderman. ‘You want me to start checking through the older data, see what I can find?’

      ‘You can if you want but I think it will be a waste of time. Anyone this thorough is unlikely to have left anything behind – I’m pretty sure anything incriminating on the drives would have been in the chunk of data that’s now missing. I was just about to run it through CARBON, see what that throws up.’ He hit Return and a progress bar popped up on the screen, then he sat back with a small grin on his face that had ‘ask me’ written all over it.

      ‘What’s CARBON?’ Shepherd obliged.

      ‘That is something very confidential that I can only divulge to you now you are a serving Special Agent. But what I am about to tell you does not get mentioned in the classroom, understood?’ Shepherd nodded.

      ‘Back in the typewriter days, before photocopiers even, the only way you could get an exact copy of a typed document was to sandwich carbon paper between two blank sheets. The force of the typewriter letters striking the top sheet would leave a carbon trace on the bottom one, producing a copy. This application does a similar thing. It records keystrokes, only the user doesn’t know anything about it. In fact very few people do.

      ‘After 9/11, when homeland security became the number one priority and the usual concerns for civil rights and privacy went out of the window, the US Government cut a very high-level deal with all the major computer chip manufacturers. Not sure if you know this but 99% of all the world’s microchips are made in South Korea. So you can imagine, having the American government in your corner when you’ve got North Korea as a neighbour must have been a powerful persuader in the discussions. Anyway the deal was simple. All they had to do in exchange for Uncle Sam’s undying gratitude and future unspecified favours was to modify their product a little. Ever since then, each new chip produced has an extra partition of memory built into it that doesn’t show up on any directory and can only be accessed by certain approved law enforcement agencies with the right software.’ He pointed at the progress bar on the screen as it closed in on 100%. ‘CARBON. Basically, they created the ultimate in Spyware. Normal virus protection doesn’t even see it because it’s not code, it’s built right into the hardware.’

      The progress bar disappeared and a document opened, crammed solid with words and numbers. ‘The data is pretty raw,’ he said, his fingers resuming their tap routine, ‘and because of the covert nature of the technology the memory cache is relatively small to keep it hidden so it has to constantly dump old data to keep recording new stuff, just like media disks on security cameras. Usually it holds about a week’s worth of activity. I’m just going to run a filter to split the data out a little and pick out any hot or unusual high-frequency words.’ He executed a new command and another window popped open. ‘This is where you can make yourself useful.’

      Shepherd