Chimera (22 page)

Read Chimera Online

Authors: Ken Goddard

BOOK: Chimera
7.43Mb size Format: txt, pdf, ePub

“So we can continue to push our envelopes, and make things more complicated for everyone; good guys and bad guys alike,” Hager added.

“Which nobody told us included a bunch of spooks; but I don’t know that we really care, because that’s what we do for a living anyway,” Renwick finished with a cheerful smile.
 
“No real problem to pick on them, too, while we’re at it.”

“Using a couple of fourteen-year-old juvenile delinquents?”
 
Schweer was starting to look apoplectic.

“Well, no, not normally,” Renwick conceded.
 
“But they’re better at it than we are, in their own area of expertise.”

“Truly evil little bastards,” Hager agreed.

“Fact is, after that first little incident, back when they were twelve, the boss never lets them anywhere near the lab any more — much less near any of our computers — because he doesn’t trust them,” Ferreira added.

“Not that anyone else around here trusts them, either; specifically including their mother,” Hager pointed out.

“You think your boss trusts them now?” Schweer sputtered.

“No, probably not,” Renwick acknowledged, “I think he’s just pissed because the CIA and NSA crime lab directors back in DC slammed the doors in his face this morning when he tried asking for the latent print information nice and friendly-like; and then started ripping into our firewalls right after he left; so he decided to go nuclear.”

“Nuclear?”
 
Shweer’s eyes widened in alarm.

“So to speak,” Ferreira shrugged.

“Yeah, I just hope the kids don’t fry anything expensive, like one of those Cray’s,” Hager added.
 
“Washington Office would probably try to take it out of our budget.”

“What’s a Cray?” Schweer asked.

“Supercomputer,” Renwick explained.
 
“NSA buys them by the dozen.”

“How much do they cost?”

Renwick shrugged.
 
“Depends on how many tera-flops you want.”

“Tera-what??”

“Flops, meaning operations per second, and tera meaning trillion,” Hager explained.
 
“Basically, lots of very fast flopping.”

“And the prices are coming down,” Ferreira pointed out.
 
“The new ones only cost a couple hundred million, give or take.”

“Those kids are going to try to fry a —” Schweer couldn’t get the words out of his suddenly constricted throat.

“Not fry, really,” Hager said.
 
“More like tug on.”

“Exactly,” Renwick nodded in agreement.

“Tug on?”
 
Schweer was definitely looking apoplectic now.

“Yeah, think of a big tinker-toy structure, made up of lots of extremely powerful computers, all connected together three-dimensionally, and all sending out lots of little tentacles that try to probe at doors and brick walls,” Ferreira explained.

“These kids are going to tug at a tentacle —?”

“Actually, if they can get a good grip on one, they’re probably going to try to rip it out by its roots,” Renwick corrected.

“And then what?”
 
Schweer’s mouth had dropped open.

“Good question.”
 
Renwick shrugged.
 
“I imagine it’s going to hurt.”

“Jesus —”

“Might as well face it, boss,” Bulatt said, leaning back in his chair and smiling at
 
to his stunned boss, “you’re a technological dinosaur, at best, and I’m rapidly heading toward —”

The jury-rigged conference-call system rang, and Bulatt lunged for the ANSWER button.

“Hello?” he queried.

“Khun Ged?”

“Hello, Achara, it’s good to hear your voice again.”
 
Bulatt smiled pleasantly, ignoring the raised eyebrows and suspicious looks passing between the three forensic scientists and his SAC boss.

“And good to hear your voice as well, Khun Ged.
 
As you requested, I now have Biology Professor Chalermchai and Chief Narusan here as well, and we are now speaking on a secure Interpol line.”

“Excellent,” Bulatt exclaimed happily.
 
“Professor Chalermchai, Chief Narusan, I have here with me this morning my supervisor, Special Agent in Charge Fred Schweer, the commander of our Special Operations Branch; Dr. Juliana Ferreira, our chief geneticist; Donn Renwick, our senior firearms examiner; and Steve Hager, our senior latent print examiner.
 
As I told Captain Kulawnit, I’m calling to make you aware of some things our forensics lab staff discovered with respect to your evidence, and make you aware of some other on-going issues as well.
 
I’m going to ask Dr. Ferreira to speak first because her information, I think, is the most crucial.”

Bulatt nodded to Ferreira who leaned in toward the speaker.

“Professor Chalermchai,” Ferreira began, “the information I have involves the two Clouded Leopards that Agent Bulatt sent to us from Thailand.
 
In examining the carcasses, and collecting samples for our analysis, we discovered that both animals have considerable numbers of nano-tube-based genetic probes in their blood and tissues.
 
Are you familiar with these materials?”

The men around the conference table could hear the Thai biology professor hesitate.
 
“I’m familiar with the theory that nano-tube structures might, someday, be used as a transport mechanism for gene manipulation; but I’m not aware that such materials have actually been applied to wildlife populations.”

“This is the first application we’ve seen, also,” Ferreira replied.
 
“As I’m sure you’re aware, these nano-tube probes can easily pass through cell and nuclear membranes, including human skin; which makes them potentially very dangerous to the handlers.
 
But, according to theory, the probes should be destroyed by the liver before they ever managed to escape the animal’s blood stream.
 
Unfortunately, it seems that theory is no longer valid, because we found large numbers of the intact probes in the leopard’s saliva.”

“Oh, dear,” Professor Chalermchai whispered.

“On the positive side, based on the attached DNA segments, we believe these particular probes were specifically configured to increase the body mass of felines such as the Clouded Leopard.
 
As such, they shouldn’t have any direct impact on humans; but as a safety precaution, we would strongly suggest you decontaminate your laboratory and any other facilities and personnel who might have come in contact with these animals as soon as possible.
 
I faxed you the procedures we use for such situations a few minutes ago, and I’m sure there are several other neutralizing protocols that work equally well.”

“Yes, thank you, Dr. Ferreira, I will see to that precaution immediately.”
 
The sound of a scraping chair and then an opening door was audible to the men in the Ashland conference room.

“Dr. Ferreira,” Achara Kulawnit broke in, “I gather from your comments that you believe these leopards were deliberately enhanced in size with an experimental genetic probe, and I understand from Professor Chalermchai that such research is not being conducted anywhere in Thailand.
 
As such, do you have any idea where these leopards might have come from?”

“No, I don’t,” Ferreira replied, “but we’re assuming, for the moment, that the leopards were brought into Thailand and let loose in the Wildlife Preserves by the suspect guides in this case.
 
I’ve put out confidential queries to a few of my trusted geneticist colleagues to see if we can figure out who might have jumped the gun on this experimental technology, hopefully without alerting the perpetrator in the process.
 
I’ll contact you and Professor Chalermchai the moment I hear anything of interest.”

“Yes, please do.
 
Thank you.”

“Captain Achara,” Bulatt broke in, “Steve Hager, our latent print expert, has some information that may be of use to you and the Chief.”

Bulatt nodded to Hager who leaned in toward the speaker.

“Yes, I wanted you both to know that I processed all of the internal component parts of the M4 carbine and flashers that agent Bulatt brought to us from Thailand.
 
And I’m sorry to say that I found no latent prints on any of the components.
 
In fact, it’s fairly obvious from the oil smears that the individuals who handled the weapon — including disassembling and cleaning — wore gloves the entire time.”

Achara sighed.
 
“I suppose we should have expected these men to be careful about leaving incriminating evidence.
 
I’m surprised they were so careless about that remote battery that Chief Narusan processed.”

“I am too,” Hager agreed, “but I took that latent that the Chief found and sent electronic copies of it to several federal fingerprint database search engines. They all came back negative, which wouldn’t have been all that unusual, especially in an international case like this, except for the fact that one of the responses — the one from our Defense Department — came back almost instantaneously instead of hours later, like all of the others.
 
I understand a similar situation occurred when Agent Younger sent that same print to his Interpol people.”

“I’m sorry,” Achara said, “but I’m not sure I understand.”

“Donn and I send out hundreds of queries to federal fingerprint and firearm databases every week, and we never get instant responses back,” Hager explained.
 
“Probably because we’re working ‘bunnies and guppies’ cases that have a lower priority in the greater scheme of things; which is perfectly understandable, and fine with us, as long as we do get a response back within some reasonable time-frame.
 
But in this case, the instant response seemed a little curious — not to mention suspicious — so we asked Linda Reston, our senior computer wizard to take a look at the response.

“At this point, I’m going to let Donn explain what Linda found out,” Hager said, nodding to Renwick.
 
“I’m talking a little over my head here.”

“What Linda did was look at the packet-distribution data that’s attached in a ‘behind-the-scenes’ manner to every e-mail message traveling through the Internet,” Renwick said, leaning in toward the conference microphone.
 
“When she didn’t like what she saw, she queried the chain of individual servers across the United States that received and transmitted the packets of data that comprised the response message.”

“Yes, I understand that part,” Achara said.
 
“What did she discover?”

“That the message we received was an automated response from a fingerprint data search engine we’d never heard of, probably because it seems to be located within our National Security Agency; or, more likely, I suppose, at one of their off-site facilities.”

“Am I correct: you did say ‘search engine’ and not ‘database’?” Achara asked.

“Yes, Linda was very specific about that,” Renwick replied.
 
“She believes this is a system specifically programmed to look for a small subset of subjects.”

“But it did send back a response as if it was a database?”

“Yes, according to Linda, that’s correct.
 
Only the response wasn’t sent back to us, it was sent back to the Defense Department search engine.
 
What we got was a copy of the response, probably transmitted back to us accidentally — again according to Linda — because the DOD server that did the transmitting is no longer operational as of two hours ago.
 
And, at this point, I’m talking over my head also.”

“Uh, I don’t wish to be impolite, Mr. Renwick, but could I please speak to Linda directly?” Achara asked.

“Yes, you could, except for the fact that approximately an hour and half hour ago, someone made a very determined and very professional attempt to penetrate the firewalls that protect our lab server systems,” Renwick replied.
 
“At the moment, Linda and three of her sub-wizards are engaged in what sounds to us — if we’re interpreting her cussing and their activities correctly — like electronic warfare.”

“This sounds terribly serious,” Achara said quietly, the concern audible in her transmitted voice.

“Serious enough that Linda asked and received permission from our lab director to bring her fourteen-year-old twins in to help,” Hager commented.

“Her own children … really?”
 
There was a pause.
 
“Are they, uh, sufficiently experienced to help defend against a professional probe?”

“Actually, their forte doesn’t seem to be defense,” Ferreira corrected.

“Oh.”
 
Another pause.
 
“Is your lab director authorized to do something like that, against another federal agency?”

“I don’t think he asked,” Renwick said.
 
“I gather he’s still a little irritated at the moment.
 
I’m sure the shit will hit the proverbial fan at some point; but I guess that’s what he gets paid for.”

“Then I suppose we should assume this conversation is being monitored?” Achara asked after a moment.

“I don’t think so,” Renwick said.
 
“According to Linda, your call-back was linked through an encrypted Interpol line at our end that would take NSA and their supercomputers several years to break into; and she also made some alterations to our conference phone which she claims will send out an extremely high frequency jamming signal that should fry any unauthorized device that attempts to link into our conference call.
 
I probably should explain that we stole Linda from the CIA a couple of years ago, and she looked pretty pissed — but also pretty determined — when she was working on our conference phone, so I assume she knows what she’s doing.”

“And the twins?”

“As of fifteen minutes ago, they were working side-by-side at a pair of terminals next to their mom’s workstation, and occasionally whispering to each other.
 
I assume she’s keeping an eye on them; but, to tell you the truth, I don’t think any of us really want to know,” Hager said.

Other books

The Sad Man by P.D. Viner
Las trompetas de Jericó by Nicholas Wilcox
The Black Room by Gillian Cross
A Table for Two by Janet Albert
Maelstrom by Jordan L. Hawk
The Rocks Below by Nigel Bird