Spyder Web. Tom Grace

Читать онлайн.
Название Spyder Web
Автор произведения Tom Grace
Жанр Приключения: прочее
Серия
Издательство Приключения: прочее
Год выпуска 0
isbn 9780007342938



Скачать книгу

and share your concerns, Jackson. The Gatekeepers will provide our government’s computers with the security they need.’

      Moy was a firm believer in the Gatekeeper vision, a strategy for protecting the government’s vast computer networks by providing those machines with the tools necessary to thwart a computer-based attack and pursue the attacker.The Gatekeeper vision was born from a fortunate accident in the Moy Electronics research labs. Almost a year earlier, a group of engineers working on a method to increase the flow of information inside a new type of parallel-processing computer hit an impasse. Unlike traditional computer designs, which relied upon a single chip to perform each instruction one after another, the new design linked hundreds of individual chips together like the oarsmen of a Roman galley. Each chip in the new design would tackle just a piece of a larger problem, allowing the team of small processors to outperform the massive single processor of a supercomputer.

      The problem the engineers encountered was a simple matter of communication. The faster they tried to run the team of parallel processors, the more tangled the flow of information among individual chips became. They were ready to start over, when the project leader of the parallel-processing team had a discussion about their problems with the young woman who led Moy Electronics’ most esoteric group of researchers—the neural and cognitive sciences team.

      Over a two-hour lunch, the two project leaders brainstormed an idea that later evolved into the Gatekeeper, an artificially intelligent device capable of learning and adapting itself to its host computer’s environment.

      It was a giant step in programming, giving the Gatekeeper the ability to determine from where a user was calling and if the user was legitimate. In its current form, the device could discover a hacker trying to break into its host computer and trace the connection back to its source. Like taking a picture of a burglar in your house, Moy’s Gatekeeper could follow the electronic trail to the hacker’s computer and even strip evidence from the intruder’s machine. The hacker wouldn’t know he had been traced until the police showed up at the front door.

      ‘Phillip, I’ve been thinking about something since you first explained these neural-network systems to me. Given that a Gatekeeper is capable of learning everything about the computer environment that it’s attached to—and I believe you said that includes every machine that it comes into contact with—can it be taught to look for other things while it’s out there?’

      Moy arched an eyebrow at his friend as he thought about the question. ‘You want to turn my Gatekeeper into a hacker?’

      Barnett nodded and took another sip of his drink as Moy settled back a little farther into the soft leather chair to consider the idea. He didn’t disturb his colleague, knowing that Moy’s outward calm belied the furious pace of thought within. True geniuses, he mused, seemed to possess a remarkable ability to block out distractions and focus their minds completely. While different thoughts floated in and out of his consciousness, Barnett knew that Moy’s mind was racing through the possibilities posed by his question. After a few quiet moments, Moy looked up from his swirling glass with a mischievous smile.

      Barnett broke the silence. ‘Judging from that look on your face, I assume you’ve found an answer. Can you program your Gatekeeper to break into another computer?’

      ‘Of course, the tools are already there.’ To Moy, the technical issues seemed trivial. ‘The Gatekeeper is driven to learn about its computer environment in order to protect that environment. This includes the host computer and every system within its network. Each time another computer comes into contact with the Gatekeeper, it becomes a learned part of the Gatekeeper’s experience. This mutant Gatekeeper would share a similar thirst to learn, but the intentions behind its actions would be markedly different.’

      ‘Give me an example, Phillip.’

      ‘Okay,’ Moy replied, relishing his role as computer villain. ‘Say I wanted to break into the network here at Langley.Your high-security computers aren’t on the Net, so I can’t hack my way in.And breaking into this building is obviously a little more difficult than getting into the English Department at Podunk State University.’

      ‘Obviously,’ Barnett agreed, playing along.

      ‘If I wanted to get into your information, and I had one of these devices, I would find out where the CIA buys their personal computers and laptops. Then I would get a job at that company, say testing the computers before they get delivered. As soon as an order for the CIA came through, I’d plant my device in one of your computers and ship it. With any luck, that computer would be connected to the information that I’m interested in. The odds are also very high that the CIA’s well-protected intranet has at least one dedicated phone line to the outside world. My device would find that line and stealthily contact me for further instructions.’

      Barnett was intrigued by the hacker-Gatekeeper scenario Moy proposed. ‘Could such a device be easily detected?’

      Moy shook his head. ‘I envision this device as something very similar physically to our Gatekeeper, just one of a hundred anonymous black chips on a circuit board. Operationally, it would be completely invisible, and it would have total control over its host. In all likelihood, no one would ever know the device was there. Even if its activities could be detected, they would be dismissed as the work of a person. After all, who in their right mind would suspect a computer of espionage?’

      Barnett sipped his drink, then smiled. ‘I think you’ve reached the conclusion that I was hoping for. Recent international events are forcing the White House to reevaluate our diplomatic and trade relations with several countries, including Iraq, Iran, North Korea, and the People’s Republic of China.’

      ‘The Red Chinese will rot in hell before I sell them any ofmy computers, regardless of what the White House thinks of them.’

      Barnett showed no surprise at Moy’s reaction. The defection of Moy’s father, a Chinese Oppenheimer, had resulted in the imprisonment of several relatives. Little word ever came out of China about the people they left behind.

      ‘I would never ask you to deal with the PRC. I know your family history well enough not to make such a request.’With that assurance made, Barnett returned to his original point. ‘What I wanted you to consider is what might happen if a computer equipped with one of these devices was to disappear in shipment and find itself someplace that we don’t officially want it. Further suppose that once our electronic spy had learned its way around this hostile nation’s computer network, it found a way to call home.’

      ‘Interesting.’Moy’s eyes narrowed as he studied the DCI’s face. ‘Is China to be a target for this type of operation?’

      Barnett just shrugged his shoulders. ‘This is purely speculation on my part, nothing more than an exercise in wishful thinking. I will admit that our current shortage of intelligence assets in the PRC, coupled with their desire for high-end computers, make them an ideal target.’

      Moy took the hint. ‘The modifications you propose would require significant funding and man-hours—at least a year of software development and testing. I expect that you’ll want the accounting for this little venture kept separate from the Gatekeeper Project.’

      ‘That’s correct. We’ll assign some of our technical people to work with yours on developing the…’Barnett paused as he found himself at a momentary loss for words. ‘What shall we call this new device?’

      ‘I’m not sure. What’s the word you used to describe someone like Aldrich Ames, a hidden spy working for your enemies?’

      ‘Ames was a mole. Like its namesake, intelligence moles burrow deep and are difficult to root out.’

      ‘Mole,’ Moy mused. ‘I’m sure my marketing people could dream up something from that, but it just doesn’t sound right. It’s too cute. The device we’re talking about is coldly logical, calculating and precise. It’s a finely tuned machine.’

      ‘Sounds like one of your sports cars.’

      ‘Exactly.’ A glint