Keeplock: A Novel of Crime

Home > Other > Keeplock: A Novel of Crime > Page 14
Keeplock: A Novel of Crime Page 14

by Stephen Solomita


  “I think this is wise to give it to him,” Avi said. He’d never come close to losing his Israeli accent, though he claimed to have learned English when he was seven years old. “It is to be medicine as Pete is saying.”

  “You think so, cuz?” Eddie asked the question seriously. Avi spoke so rarely that his words automatically carried weight.

  “Yes, this I think.” Avi looked directly at Tony. “Give him or kill him. I do not care which.”

  Tony didn’t react to Avi’s threat. He wanted release from the fury that dominated his life, to be able to sit peacefully in front of the television set and watch cartoons without having to jump out of his chair every few minutes.

  “Give it to him,” Eddie said, finally. “Give him the shit.”

  I tossed the envelopes at Tony. He caught several, but the rest fluttered to the linoleum floor. Tony fell to his knees and began scooping them up. He looked like a dog sniffing for table scraps.

  “Do you have works? You got a point?”

  He was asking for a syringe. I shook my head. “Just put it up your nose, Tony. It’ll work all right.”

  We ate breakfast while Tony puked in the bathroom, forking eggs, bacon, and sausage into our mouths to the sound of his retching. Heroin is a poison. If you take enough, you die. If you take a little less, you throw your guts up and love it.

  When Tony reappeared, he had less than no interest in breakfast. He went upstairs without bothering to say goodbye.

  “I don’t like it,” Eddie said. “It ain’t the way I figured it.”

  “I’d like to know what you did figure,” Annie said. She stood by the stove with her hands on her hips, all five feet of her. “I’d like to know why you brought Tony Morasso into this in the first place. The guy is a lunatic. Did ya think you were gonna get Little Miss Muppet?”

  If anyone else had challenged him, Eddie would have jumped down his throat, but the soft spot he had for his old lady became even more obvious when he answered her meekly.

  “We been all over this, Annie. We need him.”

  “We need him like we need cancer.”

  John Parker gave me an elbow in the ribs. “I think I’ve heard this song before,” he said to me. “Come upstairs and take a look at my equipment.”

  “Are you propositioning me?”

  “I mean my computer equipment.”

  Even Eddie managed a grin. “You could do worse, cuz,” he said to me. “John ain’t bad lookin’. Put him in skirt, he could work the cell blocks.”

  The truth was that I really didn’t give a damn about John Parker’s computer genius, but there was no way I could get out of it. We were all partners, now. I looked John over carefully. From his pepper and salt crew cut to his even features and firm mouth, he still came across as an eager junior executive about to make a presentation to the board of directors.

  “Okay, but try not to make it too technical. One goddamned course doesn’t make me a computer genius.”

  “You know something, Pete,” Parker said, standing up and moving toward the stairway, “the beauty is that it isn’t really technical. It’s military. It’s about finding a weakness and exploiting it.”

  EIGHTEEN

  MORASSO WAS IN THE living room of the upstairs apartment. He was sitting in a recliner, watching Popeye kick the crap out of his archenemy, Bluto. As we passed, he turned toward us. His eyes were empty.

  “Pete,” he said. “I didn’t mean nothin’ before. I was like fuckin’ shocked when I seen ya face. Nobody told me you was comin’.”

  What Tony wanted was more dope and he knew I was the only conceivable source. That’s why he was apologizing for getting his ass kicked.

  “We had a lot of trouble between us when we were inside,” I said, “but now we have to put it behind us. The job comes first, right?” I watched his head bob eagerly. “The thing that’s good for you is that I gotta go back where I’m livin’ every night. If I don’t show up, this motherfucker of a P.O.’s gonna violate me. Now it just happens that my official place of residence is in the middle of a heavy dope neighborhood. As long as you don’t fuck up and get Eddie pissed off, I’ll take care of you.”

  He grinned happily, then leaned over and threw up into a wastebasket. I shook my head in disgust. This was everything I wanted to avoid when I left Cortlandt. I could feel the anger starting to rise. If I let it go, it would own me.

  Parker led me into the master bedroom. Aside from a small bed in the corner, it was filled with equipment. I recognized the computer, of course, but the rest of it meant no more to me than a pile of scrap metal.

  “Something, isn’t it?” Parker asked. “One thing, Eddie didn’t cheap out.” He turned on the computer and waited for it to load. “No disrespect, Pete, but I gotta ask you to turn around. I don’t want you to see the access code. The others, Eddie and Avi, they wouldn’t know what to do with it, but you have enough knowledge to put it together. Especially with what I’m going to tell you about it.”

  I turned without comment. Parker was playing it smart, smarter than I gave him credit for. If he was the only one who could access the computer, Eddie would have to make sure he stayed in one piece. That was another reason why Eddie had been so happy to hear from me.

  “Okay, turn around and take a seat. This is going to be a long story.”

  “Gee, and I was plannin’ to attend the opera.”

  “Don’t be a wise guy.”

  “That’s what she said.”

  He answered by turning to the computer and pounding out a series of instructions punctuated by the inevitable beeps and boops. The cursor danced under his fingers for a moment, then the computer shouted, “Shut up and sit down, please!”

  “Damn,” I said, taking the requested seat, “that thing talks like a human.”

  Parker smacked the keyboard for a moment and the computer spoke again: “And no talking!”

  “A voice synthesizer,” Parker announced. “Nothing but the best. That’s what I told Eddie. Does it matter if I picked up a few toys so I wouldn’t get bored? Morasso has his dope. Avi plays with his guns. Eddie struts around like a tin dictator. I’ve got my computer. It’s all working out for the best.”

  “Including murder, John?” I kept my voice calm.

  His mouth tightened and he looked away. “I had a problem with that, but I worked it out. Look, Pete, suppose a soda company asked me to write a program that would allow them to schedule deliveries. Suppose the company was located in Chicago and wanted to deliver as far away as Los Angeles. Would it make sense for me to write a program that only gets the soda bottles to Phoenix?”

  What he could do was write programs for a company that didn’t commit murders. I didn’t mention that, of course. What I said was, “Ya know, Eddie says it doesn’t matter for him and me. With our records, we’ll do twenty-five years whether we kill the cop or not. But you? You’re not in that position.”

  “Come on, Pete. I was busted for a homicide. I pled to manslaughter and I’m on lifetime parole. If I get popped for a million-dollar armed robbery, I won’t see daylight until I’m sixty-five. At the earliest.”

  Maybe I had some small fantasy of using Parker and Avi to convince Eddie to forget the cop, but I gave it up on the spot. “John, my boy,” I said, “when you’re right, you’re right. Now, weren’t you about to show me something?”

  “Not so fast, son. Let me begin at the beginning. I want you to get the whole picture.”

  “This I already figured out.”

  He ignored me. “You remember how we talked about breaking into a computer? When we were stoned on the courts? You remember what I told you?”

  “You said it was almost impossible if the company took reasonable precautions.”

  “Right. You remember what those precautions were?”

  “As a matter of fact, I don’t. I lost interest when you told me it was impossible.”

  “Allow me to refresh your memory. The first precaution is the use of multiple access codes.
Note that I don’t use the term ‘passwords.’ Access codes are random numbers, usually five digits. Let me show you a real example.”

  He slid his chair over to the computer and typed: C:MODEM. The computer searched its memory, beeping away merrily, then displayed: ENTER NUMBER HERE. Parker typed in a phone number and the modem began to work. Finally, a single sentence appeared on the screen: ENTER ACCESS CODE.

  “Note that the system has not identified itself.” He entered a series of numbers and the modem stopped flashing. “The system hung up on us. That’s what it’s designed to do. If you don’t enter something within thirty seconds, or if you enter the wrong code, the system automatically disconnects. Now let’s assume that you know the phone number of the system you want to penetrate and you know the number of digits in the access code. You could write—hell, you could buy—a program that would keep calling back and entering codes until it found the right one, but it would take several years to do it. Meanwhile, most sophisticated systems, like the one owned by Chapman Security, trace calls back after a given number of disconnects.”

  It was the first time I’d heard the name of the armored car company. Chapman was one of the biggest. Not as big as Wells Fargo or Brinks, but still a national company.

  “Chapman? Eddie doesn’t aim low.”

  “Actually, Eddie didn’t aim at all. You have to start with a company large enough to need phone access to their system. For most of the little guys, the computer is no more than a large filing cabinet. With an operation like Chapman’s, you have salesmen on the road, executives working out of their homes on weekends. Chapman has thousands of trucks and they rotate their schedules. A computer can write a new schedule in a couple of minutes. Without having eight trucks show up at the same place at the same time. It would take a hundred man-hours to do it manually.”

  He leaned back in his seat and lit a cigarette. “The computer’s second line of defense is a callback system. When you enter the right access code, the computer hangs up, then calls you back, using a number you’ve left in its memory. This way, even if you’ve learned the access code, you’d have to use it from a phone known to the computer.”

  “So it’s impossible,” I said.

  “That’s what I told Eddie when he first brought it up. I told him, ‘Forget about it. Put it out of your mind. There’s no magic formula that can pluck an access code out of thin air.’”

  “Did he accept that?”

  “Yeah. What could he do? For Eddie, it was just another trial balloon. But after he spoke to me, I began to think about it. You spend a lot of time alone when you’re in prison.”

  “Gee, I think I read that somewhere.”

  “The question you should be asking is how systems are ever penetrated.”

  “How are systems ever penetrated?”

  Parker ignored the sarcasm, taking a moment to lean back and stretch. I shook my head in wonder. He was so absorbed in the pleasure of telling his story that he looked like a twelve-year-old boy bragging about a Little League home run. Fifteen years ago, he’d come home to find his best friend pumping his wife. If he’d come home thirty minutes later, if he’d been delayed in traffic, he’d still be sitting in an office somewhere, the very essence of the respectable, slightly befuddled computer scientist.

  “In the old days,” he said, “when passwords were still common, there were always a few schmucks who used words like ‘open sesame’ or ‘bravo’ or their kid’s first name. Now I admire hackers because I used to be one, but with thousands of computer freaks pounding away in their bedrooms, there were bound to be a few who liked to play near the edge. Some of them wrote programs that tried the most common passwords first. If that didn’t work, the program started at one end of the dictionary and worked through. Remember, the systems they were trying to penetrate didn’t trace calls back. Some of them would let you enter five or ten passwords before hanging up. That approach became impossible when the industry switched to multiple-digit access codes.”

  “But computer breakins still happen, right? I read about them every once and a while.”

  “They occur because the few hackers who like to commit felonies get the access code from a third party. Usually by looking over some asshole’s shoulder when he enters it.”

  “You know a worker from Chapman Security with a low shoulder?” I lit another cigarette. It was my turn to stretch it out. Parker’s story had grabbed hold of me despite my earlier indifference. It was the big score come to life, the collective dream of every caged human being.

  “I’m just trying to let you understand my frame of mind after Eddie spoke to me. Of course I didn’t know anyone at Chapman Security, and even if I did, that person would be very unlikely to lower his shoulder for an ex-convict. I suppose I could have gotten Eddie to kidnap some executive and force him to give up the code, but that wouldn’t necessarily help us. Modern systems use multiple codes. You punch in one number to enter the system as a whole, but you need other codes to access sensitive information. The only way to be sure you have all the codes is to grab one of the top executives, preferably the director of computer operations. Unfortunately, if you beat the codes out of your director, you can’t very well let him go back to the computer and change them. Maybe Eddie wouldn’t mind killing him (and maybe I wouldn’t mind, either), but the sudden disappearance of the director of computer operations would be certain to arouse suspicion. On top of that, you’d have to use the director’s personal phone, which is clearly impossible if you’re thinking long term. How many times can you break into someone’s home? You could always change the callback number in the computer’s memory, but if you did that, the director wouldn’t be able to access the company computer.”

  “There’s gotta be a punch line here,” I interrupted. “I don’t mind long stories, but this one’s a fucking novel.”

  He grinned happily, then continued in the same breezy tone. “The point of vulnerability isn’t in the computer itself, it’s in the system that links the computer to the executive sitting in his den. It’s in the phone system. It came to me one day when I was in the shower—”

  “While you were bending over, looking for the soap?”

  He ignored that one. “Visualize the phone system as a long wire stretching between the central computer in Chapman Security headquarters and the home of the director of computer operations. If you tap into the line, you get everything going back and forth, including the access codes. I grabbed Eddie that afternoon and told him that if he could find someone who knew enough electronics to install a phone tap, I could probably do the rest. Three days later he brought Avi to my cell.”

  “Avi?” I was so used to thinking of Avi as a kind of homicidal wooden Indian that I was shocked to hear that he had other potentials. Apparently Eddie had looked a little deeper.

  “Avi was a trained Israeli soldier. He served in a unit that specialized in collecting information on terrorists. They taught him to bug telephones, to plant listening devices, to jam broadcasts. Didn’t you know Avi before he went inside? I thought you were friends.”

  “I guess I didn’t know him well enough to ask him the right questions.”

  “Well, between Avi and myself, the deal went down smoothly enough, even though Eddie’s a maniac for detail and made us work it out ten times before he was satisfied. First, Eddie and Avi went up to the Bronx and relieved a New York Telephone repairman of his uniform and identification. That’s when Morasso and I got into it.”

  “You had trouble with Tony?” I hadn’t been far off the mark. Eddie had needed me badly. It was a fact I could and would use to my own advantage.

  “Pete, I wanted to kill him in the worst way. I had a knife alongside the cushion where I was sitting, but I knew that if I used it, I’d blow the job. I tried to calm him down, to tease him into a better mood, but he wouldn’t let me off the hook. He was sitting next to me, running his hand up the back of my neck, telling me I was sweet as sugar. It wasn’t a proposition, just another excuse to hu
miliate me. I went after him with my hands, but he was too strong. He probably would have killed me if Annie hadn’t brained him with a frying pan.”

  “I don’t understand why Eddie doesn’t get rid of him,” I said. “His part isn’t that important. It just isn’t.”

  Parker shrugged, his eyebrows lifting over his gray eyes. “Everybody’s got a flaw somewhere. I’ve worked with enough senior vice presidents to know. Eddie’s stubborn. He has to be the top dog and he won’t admit it when he makes a mistake. This fight happened before we got into the computer. We could have cut Morasso loose without killing him, because he didn’t know anything about where or when the job was going down. But Eddie refused outright. He promised to find a way to control Morasso and left it at that. Your solution, the dope thing, is perfect. I didn’t think of it myself, but I’ll bet it occurred to Eddie. The only thing was Eddie had already decided that drugs were forbidden, and he was too stubborn to change his mind.”

  “That’s why I brought it without asking.” I was filing Parker’s insight away for later use. Up in Cortlandt, Eddie had always been quick to compromise. Now that he was top dog, another part of his personality had emerged. “Let’s get back to the computer. This is starting to become a two-semester course.”

  “I went over to the library on Fifth Avenue and got the annual reports for several companies, including Chapman Security. Annual reports are super-slick glorifications of whoever happens to be running the company. Chapman’s included a piece on their new computer and the man who’d designed it, Dominick Spinelli. According to the report, Spinelli lived and worked in New York City.

  “It took us a week, but we finally tracked him to a high-rise condo on East End Avenue. Then Avi used the telephone company uniform and the i.d. to get down to the switchboard in the basement. There were two lines—they’re called subscriber loops—running from the punch-down connectors in the basement up to Spinelli’s apartment. Avi put a bug with a transmitter on each of them. Like I expected, one turned out to be for the computer and the other for his regular phone.

 

‹ Prev