Читать книгу The Tower - Simon Toyne, Simon Toyne - Страница 28

19

Оглавление

The National Cyber Crime Task Force was buried deep in the Maryland bedrock and housed a huge bank of central databases that fed the entire law enforcement network as well as hard drives and backup files relating to hundreds of thousands of cases – everything from simple internet scams and corporate fraud to online paedophile rings and major terrorist networks.

The main machine room was practically deserted by the time Shepherd stepped into its air-conditioned gloom. He had stopped to splash water on his face and grab something to eat after Franklin had failed to make good on his offer to buy him a burger, wolfing down a doughnut and a cup of coffee on his way over. No food or drink was allowed in the cyber crimes labs. A seated figure was silhouetted against three large flatscreen monitors on the far side of the room, his fingers punching code into a keyboard so fast it sounded like tap dancing. He turned at the sound of Shepherd’s approach and smiled a greeting. ‘Agent Franklin said you’d be along.’

Agent Smith was one of the senior instructors in the cyber crimes division. There was a rumour that did the rounds each year that the Agent Smith of the Matrix movies had been based on him and there was certainly more than a passing physical resemblance – same dark hair receding from a widow’s peak, same sharp features on top of a whip-thin frame – but that was as far as the comparison went. The real Agent Smith was just about the friendliest instructor in the building, generous with his time and endlessly patient with those who were never going to pound the cyber beat but needed to understand enough to pass the module anyway.

‘I’ve set you up with a ghost file,’ he said, nodding at the terminal to the right of his.

Shepherd sat at the desk and assessed the data. In cyber crime there are two types of evidence: physical and digital. Physical evidence is the actual hardware itself. Often in the chain of evidence it has to be shown that a suspect has used a certain computer, so fingerprints or even microscopic flakes of skin beneath the keys of keyboards are sought to prove it. Digital evidence is different. Files and directories can be cloned or copied and worked on by several teams of people at once to crunch the data faster. These clones are called ghost files and Shepherd was looking at one now, an exact copy of everything on Dr Kinderman’s hard drive. ‘Find anything yet?’ he asked.

Smith continued to machine gun code into his terminal. ‘The most interesting thing I’ve found so far is nothing.’ He hit a key and folders started opening, rippling down his main screen like a deck of cards, every single one of them empty. ‘Everything you would expect is there up until eight months ago, then there’s nothing at all. No directories, no sub-directories, no caches. Whoever cleaned this out really knew what they were doing.’

Shepherd had been hanging on to the hope that Smith would find something in Dr Kinderman’s personal files, an email, or a virus that had originated elsewhere with a pathway that might give them a new lead. But the efficiency and skill with which the drive had been forensically wiped just threw more suspicion on Kinderman. ‘You want me to start checking through the older data, see what I can find?’

‘You can if you want but I think it will be a waste of time. Anyone this thorough is unlikely to have left anything behind – I’m pretty sure anything incriminating on the drives would have been in the chunk of data that’s now missing. I was just about to run it through CARBON, see what that throws up.’ He hit Return and a progress bar popped up on the screen, then he sat back with a small grin on his face that had ‘ask me’ written all over it.

‘What’s CARBON?’ Shepherd obliged.

That is something very confidential that I can only divulge to you now you are a serving Special Agent. But what I am about to tell you does not get mentioned in the classroom, understood?’ Shepherd nodded.

‘Back in the typewriter days, before photocopiers even, the only way you could get an exact copy of a typed document was to sandwich carbon paper between two blank sheets. The force of the typewriter letters striking the top sheet would leave a carbon trace on the bottom one, producing a copy. This application does a similar thing. It records keystrokes, only the user doesn’t know anything about it. In fact very few people do.

‘After 9/11, when homeland security became the number one priority and the usual concerns for civil rights and privacy went out of the window, the US Government cut a very high-level deal with all the major computer chip manufacturers. Not sure if you know this but 99% of all the world’s microchips are made in South Korea. So you can imagine, having the American government in your corner when you’ve got North Korea as a neighbour must have been a powerful persuader in the discussions. Anyway the deal was simple. All they had to do in exchange for Uncle Sam’s undying gratitude and future unspecified favours was to modify their product a little. Ever since then, each new chip produced has an extra partition of memory built into it that doesn’t show up on any directory and can only be accessed by certain approved law enforcement agencies with the right software.’ He pointed at the progress bar on the screen as it closed in on 100%. ‘CARBON. Basically, they created the ultimate in Spyware. Normal virus protection doesn’t even see it because it’s not code, it’s built right into the hardware.’

The progress bar disappeared and a document opened, crammed solid with words and numbers. ‘The data is pretty raw,’ he said, his fingers resuming their tap routine, ‘and because of the covert nature of the technology the memory cache is relatively small to keep it hidden so it has to constantly dump old data to keep recording new stuff, just like media disks on security cameras. Usually it holds about a week’s worth of activity. I’m just going to run a filter to split the data out a little and pick out any hot or unusual high-frequency words.’ He executed a new command and another window popped open. ‘This is where you can make yourself useful.’

Shepherd leaned in as words started to appear in the window, gleaned from the raw data. He recognized almost all of them. ‘Ophiuchus is a constellation,’ he said, working his way down the growing list. ‘Andromeda is a galaxy and all those long numbers beginning with PGC are from the Principal Galaxy Catalogue. Red-Shift is an astronomical term for what happens to distant light …’

They continued in this way for several minutes, Smith highlighted everything Shepherd recognized until they reached the bottom of the list and Smith hit Delete to get rid of all the isolated words. There were now just two remaining:

MALA

T

Shepherd fished a notebook from his pocket and flipped back through the entries he had made at Goddard. There was the T again in the last entry Dr Kinderman had made in his diary:

T

end of days.

A thought struck him, something about the T and what it might mean in relation to Hubble. He found the contact numbers he had taken down and dialled one, checking the time as he waited for it to connect. The line clicked a few times before a ring tone cut in. Shepherd held his breath as he waited for someone to answer.

The Tower

Подняться наверх