As Barnett studied the mechanics of the computer theft, his speaker phone buzzed.
‘Yes, Sally?’ he answered.
‘Phillip Moy is here to see you.’
Barnett glanced at his wristwatch and quickly noticed two things. First, the hours between 1:00 and 4:30 P.M. had passed very quickly today, and, second, Phillip Moy was as punctual as ever. ‘Show him right in.’
Sally Kirsch escorted an Asian man of average height and build into Barnett’s office. The man wore the corporate uniform of highly paid executives around the world-a well-tailored conservative gray suit with a starched white shirt, a floral-print silk tie, and a pair of black Italian loafers whose sheen cast no doubt about the suppleness of the leather. Phillip Moy’s face was nearly round and had, as its most dominating feature, a pair of dark brown eyes that burned with a fiery intelligence.
Moy was the founder and CEO of the computer corporation that bore his name. He looked remarkably sharp and unperturbed following a day of briefings and testimony on Capitol Hill. Today’s session had, no doubt, added a few more gray hairs to his otherwise blue-black mane.
Kirsch placed several pink message slips on Barnett’s desk and collected a small stack of classified files from his out-basket for a return trip to the file room.
Barnett rose to greet his guest. Both men, who had started from humble beginnings, were in their early fifties and nearing the pinnacle of their careers.
‘Can I get you a drink, Phillip?’ Barnett asked as he poured himself a scotch and soda.
‘Sure, just splash a little scotch over some ice. Keep the water.’
Barnett brought the drinks over and sat in a brown leather chair opposite Moy. He sipped on his drink, then loosened his tie, signaling an end to any formality for this meeting. ‘How are things going with the Gatekeeper Project?’
‘We’re still on schedule, so far. Our initial tests show the device is capable of monitoring all the signal traffic moving over a major computer network without degrading that network’s performance. The defensive aspects of the Gatekeeper appear to be equally impressive.’
‘I’m glad to hear that. Lord knows that we need to get those units in place ASAP. Just last week, some kid broke through an Internet server into one of the Pentagon’s low-level computers.’ Barnett took a hard swallow of scotch and smacked his lips, sighing.
‘She spoofed the router, a real nice hack. It was dumb luck she got caught.’Moy noticed Barnett’s eyebrow arch slightly. ‘Professional admiration, Jackson-the young lady has talent.’
‘Maybe you should hire her.’
‘She’d fit right in. Some of my best and brightest programmers have a similar wild, inventive streak. I just give them a constructive way to express their creativity. It’s a good thing she wasn’t working for someone else, like Ames.’
Barnett nodded in agreement, recalling as if it were yesterday the arrest of the CIA counterintelligence officer on charges of spying for the Soviets. By exploiting the weak internal security on Langley’s computer network, Ames used his office PC to steal dozens of files classified beyond his clearance. It was in the aftermath of the Aldrich Ames affair that Moy’s security projects with the government began.
‘We’ve come a long way since the early nineties, but the memory of Ames won’t soon be forgotten.’
‘I understand and share your concerns, Jackson. The Gatekeepers will provide our government’s computers with the security they need.’
Moy was a firm believer in the Gatekeeper vision, a strategy for protecting the government’s vast computer networks by providing those machines with the tools necessary to thwart a computer-based attack and pursue the attacker. The Gatekeeper vision was born from a fortunate accident in the Moy Electronics research labs. Almost a year earlier, a group of engineers working on a method to increase the flow of information inside a new type of parallel-processing computer hit an impasse. Unlike traditional computer designs, which relied upon a single chip to perform each instruction one after another, the new design linked hundreds of individual chips together like the oarsmen of a Roman galley. Each chip in the new design would tackle just a piece of a larger problem, allowing the team of small processors to outperform the massive single processor of a supercomputer.
The problem the engineers encountered was a simple matter of communication. The faster they tried to run the team of parallel processors, the more tangled the flow of information among individual chips became. They were ready to start over, when the project leader of the parallel-processing team had a discussion about their problems with the young woman who led Moy Electronics’ most esoteric group of researchers-the neural and cognitive sciences team.
Over a two-hour lunch, the two project leaders brainstormed an idea that later evolved into the Gatekeeper, an artificially intelligent device capable of learning and adapting itself to its host computer’s environment.
It was a giant step in programming, giving the Gatekeeper the ability to determine from where a user was calling and if the user was legitimate. In its current form, the device could discover a hacker trying to break into its host computer and trace the connection back to its source. Like taking a picture of a burglar in your house, Moy’s Gatekeeper could follow the electronic trail to the hacker’s computer and even strip evidence from the intruder’s machine. The hacker wouldn’t know he had been traced until the police showed up at the front door.
‘Phillip, I’ve been thinking about something since you first explained these neural-network systems to me. Given that a Gatekeeper is capable of learning everything about the computer environment that it’s attached to-and I believe you said that includes every machine that it comes into contact with-can it be taught to look for other things while it’s out there?’
Moy arched an eyebrow at his friend as he thought about the question. ‘You want to turn my Gatekeeper into a hacker?’
Barnett nodded and took another sip of his drink as Moy settled back a little farther into the soft leather chair to consider the idea. He didn’t disturb his colleague, knowing that Moy’s outward calm belied the furious pace of thought within. True geniuses, he mused, seemed to possess a remarkable ability to block out distractions and focus their minds completely. While different thoughts floated in and out of his consciousness, Barnett knew that Moy’s mind was racing through the possibilities posed by his question. After a few quiet moments, Moy looked up from his swirling glass with a mischievous smile.
Barnett broke the silence. ‘Judging from that look on your face, I assume you’ve found an answer. Can you program your Gatekeeper to break into another computer?’
‘Of course, the tools are already there.’ To Moy, the technical issues seemed trivial. ‘The Gatekeeper is driven to learn about its computer environment in order to protect that environment. This includes the host computer and every system within its network. Each time another computer comes into contact with the Gatekeeper, it becomes a learned part of the Gatekeeper’s experience. This mutant Gatekeeper would share a similar thirst to learn, but the intentions behind its actions would be markedly different.’
‘Give me an example, Phillip.’
‘Okay,’ Moy replied, relishing his role as computer villain. ‘Say I wanted to break into the network here at Langley. Your high-security computers aren’t on the Net, so I can’t hack my way in. And breaking into this building is obviously a little more difficult than getting into the English Department at Podunk State University.’
‘Obviously,’ Barnett agreed, playing along.
‘If I wanted to get into your information, and I had one of these devices, I would find out where the CIA buys their personal computers and laptops. Then I would get a job at that company, say testing the computers before they get delivered. As soon as an order for the CIA came through, I’d plant my device in one of your computers and ship it. With any luck, that computer would be connected to the information that I’m interested in. The odds are also very high that the CIA’s well-protected intranet has at least one dedicated phone line to the outside world. My device would find that line and stealthily contact me for further instructions.’
Barnett was intrigued by the hacker-Gatekeeper scenario Moy proposed. ‘Could such a device be easily detected?’
Moy shook his head. ‘I envision this device as something very similar physically to our Gatekeeper, just one of a hundred anonymous black chips on a circuit board. Operationally, it would be completely invisible, and it would have total control over its host. In all likelihood, no one would ever know the device was there. Even if its activities could be detected, they would be dismissed as the work of a person. After all, who in their right mind would suspect a computer of espionage?’
Barnett sipped his drink, then smiled. ‘I think you’ve reached the conclusion that I was hoping for. Recent international events are forcing the White House to reevaluate our diplomatic and trade relations with several countries, including Iraq, Iran, North Korea, and the People’s Republic of China.’
‘The Red Chinese will rot in hell before I sell them any ofmy computers, regardless of what the White House thinks of them.’
Barnett showed no surprise at Moy’s reaction. The defection of Moy’s father, a Chinese Oppenheimer, had resulted in the imprisonment of several relatives. Little word ever came out of China about the people they left behind.
‘I would never ask you to deal with the PRC. I know your family history well enough not to make such a request.’With that assurance made, Barnett returned to his original point. ‘What I wanted you to consider is what might happen if a computer equipped with one of these devices was to disappear in shipment and find itself someplace that we don’t officially want it. Further suppose that once our electronic spy had learned its way around this hostile nation’s computer network, it found a way to call home.’
‘Interesting.’Moy’s eyes narrowed as he studied the DCI’s face. ‘Is China to be a target for this type of operation?’
Barnett just shrugged his shoulders. ‘This is purely speculation on my part, nothing more than an exercise in wishful thinking. I will admit that our current shortage of intelligence assets in the PRC, coupled with their desire for high-end computers, make them an ideal target.’
Moy took the hint. ‘The modifications you propose would require significant funding and man-hours-at least a year of software development and testing. I expect that you’ll want the accounting for this little venture kept separate from the Gatekeeper Project.’
‘That’s correct. We’ll assign some of our technical people to work with yours on developing the…’Barnett paused as he found himself at a momentary loss for words. ‘What shall we call this new device?’
‘I’m not sure. What’s the word you used to describe someone like Aldrich Ames, a hidden spy working for your enemies?’
‘Ames was a mole. Like its namesake, intelligence moles burrow deep and are difficult to root out.’
‘Mole,’ Moy mused. ‘I’m sure my marketing people could dream up something from that, but it just doesn’t sound right. It’s too cute. The device we’re talking about is coldly logical, calculating and precise. It’s a finely tuned machine.’
‘Sounds like one of your sports cars.’
‘Exactly.’ A glint then appeared in Moy’s eyes, a flash of inspiration that could only have been more obvious had a cartoonist drawn a lightbulb over his head. He flipped to a blank page on his legal pad and sketched something very quickly. ‘I recently acquired an old Porsche, one identical to the car that James Dean drove into oblivion. This particular model had a very unique name. If the goal of this project is to create an electronic spy, one that operates exclusively in a World Wide Web of networked computers, then the resulting device would be a…’
Moy paused dramatically as he handed the legal pad to Barnett. Barnett saw on it a menacing arachnid leering at him, and one word in large block letters.
‘ Spyder,’ Barnett said, finishing the sentence. He thought about the name for a minute as Moy sat back, pleased with his quick wit. ‘I give up, Phillip; Spyder it is. I’ll get everything arranged on this end to get you started. I’ll fund the project through my discretionary budget. That should keep it hidden long enough for us to complete development.’
1
ANN ARBOR, MICHIGAN
November 17
The masonry walls of the Canham Natatorium reverberated with the rhythmic sound of swimmers pounding the shimmering surface of the fifty-meter pool into a froth. All the lanes were occupied by members of the defending champion Michigan women’s swim team. At the far end of the pool, Kelsey Newton carefully studied the strokes of the young women who swam the eighthundred-meter freestyle relay.
The sophomore who normally swam the third leg of the four-part event was lagging slightly behind the others, hampered no doubt by a badly bruised thigh that she had injured while traying. Traying was the collegiate version of sledding, in which trays borrowed from dormitory cafeterias were used instead of toboggans. The injured swimmer had lost control of her tray and tumbled harshly near the bottom of the hill. Kelsey barely suppressed a smile as she thought about her own pathetic attempts to steer those unwieldy slabs of fiberglass down the bumpy hills of the Nichols Arboretum.
These morning workouts were for conditioning and building endurance; the girls essentially swam on autopilot. Kelsey made a few notes on her clipboard and returned to the poolside office. She remembered these early-morning sessions from her four years as an undergraduate at Michigan and from the thousands of miles she had swum before and since. A wall in the basement of her parents’ home bore the trophies, medals, and ribbons from her days as a competitive swimmer. As a senior, she had been the captain of this team and had led it to a collegiate conference championship and earned for herself honours as an all-American athlete.