Book Read Free

The Blue Nowhere: A Novel

Page 5

by Jeffery Deaver

“Oh, hell shit,” he said in very un-Booty language. His computer had frozen up again.

  This had occurred several times recently and it pissed him off that he couldn’t figure out why. He knew computers cold and he could find no reason for this sort of jamming. He had no time for crashes, not today, with his 6:30 deadline. Still, the boy jotted the occurrence in his hacker’s notebook, as any diligent codeslinger would do, and restarted the system then logged back online.

  He checked on the Cray and found that the college’s computer had kept working away, running Crack-er on Booty’s password file, even while he’d been offline.

  He could—

  “Mr. Turner, Mr. Turner,” came a nearby voice. “What are we up to here?”

  The words scared the absolute hell out of Jamie. But he wasn’t so startled that he failed to hit ALT-F6 on his computer just before Principal Booty padded up to the computer terminal on his crepe-soled shoes.

  A screen containing an essay about the plight of the rain forest replaced the status report from his illegal cracking program.

  “Hi, Mr. Boethe,” Jamie said.

  “Ah.” The tall, thin man bent down, peering at the screen. “Thought you might be looking at nasty pictures, Mr. Turner.”

  “No, sir,” Jamie said. “I wouldn’t do that.”

  “Studying the environment, concerned about what we’ve done to poor Mother Nature, are we? Good for you, good for you. But I can’t help but notice that this is your physical education period. You should be experiencing Mother Nature firsthand. Out in the sports fields. Inhaling that good California air. Running and kicking goals.”

  “Isn’t it raining?” Jamie asked.

  “Misting, I’d call it. Besides, playing soccer in the rain builds character. Now, out we go, Mr. Turner. The greens are down one player. Mr. Lochnell turned left and his ankle turned right. Go to their aid. Your team needs you.”

  “I just have to shut down the system, sir. It’ll take a few minutes.”

  The principal walked to the door, calling, “I expect to see you out there in full gear in fifteen minutes.”

  “Yessir,” responded Jamie Turner, not revealing his huge disappointment at exchanging his machine for a muddy patch of grass and a dozen stupid students.

  Alt-F6ing out of the rain forest window, Jamie started to type a status request to see how his Crack-er program was doing on the passcode file. Then he paused, squinted at the screen and noticed something odd. The type on the monitor seemed slightly fuzzier than normal. The letters seemed to flicker too.

  And something else: the keys were a little sluggish under his touch.

  This was way weird. He wondered what the problem might be. Jamie had written a couple of diagnostic programs and he decided he’d run one or two of them after he’d extracted the passcode. They might tell him what was wrong.

  He guessed the trouble was a bug in the system folder, maybe a graphics accelerator problem. He’d check that first.

  But for a brief instant Jamie Turner had a ridiculous thought: that the unclear letters and slow response times of the keys weren’t a problem with his operating system at all. They were due to the spirit of a long-dead Indian floating between Jamie and his machine, angry at the boy’s presence as the ghost’s cold, spectral fingers keyed in a desperate message for help.

  CHAPTER 00000101 / FIVE

  At the top left-hand corner of Phate’s screen was a small dialogue box containing this:

  Trapdoor—Hunt Mode

  Target: JamieTT@hol.com

  Online: Yes

  Operating system: MS-DOS/Windows

  Antivirus software: Disabled

  On the screen itself Phate was looking at exactly what Jamie Turner was seeing on his own machine, several miles away, in St. Francis Academy.

  This particular character in his game had intrigued Phate from the first time he’d invaded the boy’s machine, a month ago.

  Phate had spent a lot of time browsing through Jamie’s files and he’d learned as much about him as he’d learned about the late Lara Gibson.

  For instance:

  Jamie Turner hated sports and history and loved math and science. He read voraciously. The youngster was a MUDhead—he spent hours in the multiuser domain chat rooms on the Internet, excelling at role-playing games and in creating and maintaining the fantasy societies so popular in the MUD realm. Jamie was also a brilliant codeslinger—a self-taught programmer. He’d designed his own Web site, which had received a runner-up prize from Web Site Revue Online. He’d come up with an idea for a new computer game that Phate found intriguing and that clearly had commercial potential.

  The boy’s biggest fear—reminiscent of Lara Gibson’s paranoia—was losing his eyesight; he ordered special shatterproof glasses from an online optometrist.

  The only member of his family he spent much time e-mailing and communicating with was his older brother, Mark. Their parents were rich and busy and tended to respond to every fifth or sixth e-mail their son sent.

  Jamie Turner, Phate had concluded, was brilliant and imaginative and vulnerable.

  And the boy was also just the sort of hacker who’d one day surpass him.

  Phate—like many of the great computer wizards—had a mystical side to him. He was like those physicists who accept God wholeheartedly or hard-headed politicians who’re devoutly committed to Masonic mysticism. There was, Phate believed, an indescribably spiritual side to machines and only those with limited vision denied that.

  So it wasn’t at all out of character for Phate to be superstitious. And one of the things that he’d come to believe, as he’d used Trapdoor to stroll through Jamie Turner’s computer over the past few weeks, was that the boy had the skill to ultimately replace Phate as the greatest codeslinger of all time.

  This was why he had to stop little Jamie T. Turner from continuing his adventures in the Machine World. And Phate planned to stop him in a particularly effective way.

  He now scrolled through more files. These, which had been e-mailed to him by Shawn, gave detailed information about the boy’s school—St. Francis Academy.

  The boarding school was renowned academically but, more important, it represented a real tactical challenge to Phate. If there was no difficulty—and risk to him—in killing the characters in the game then there was no point in playing. And St. Francis offered some serious obstacles. The security was very extensive because the school had been the scene of a break-in several years ago in which one student had been killed and a teacher severely wounded. The principal, Willem Boethe, had vowed to never let that happen again. To reassure parents, he had renovated the entire school and turned it into a fortress. Halls were locked down at night, the grounds double-gated, windows and doors alarmed. You needed passcodes to get in and out of the tall razor-wired wall surrounding the compound.

  Getting inside the school was, in short, just the right kind of challenge for Phate. It was a step up from Lara Gibson—moving to a higher, more difficult level in his game. He could—

  Phate squinted at the screen. Oh, no, not again. Jamie’s computer—and therefore his too—had crashed. It’d happened just ten minutes ago as well. This was the one bug in Trapdoor. Sometimes his machine and the invaded computer would simply stop working. Then they’d both have to reboot—restart—their computers and go back online.

  It resulted in a delay of no more than a minute or so but to Phate it was a terrible flaw. Software had to be perfect, it had to be elegant. He and Shawn had been trying to fix this bug for months but had had no luck so far.

  A moment later he and his young friend were back online and Phate was browsing through the boy’s machine once more.

  A small window appeared on Phate’s monitor and the Trapdoor program asked:

  Target subject has received an instant message from MarkTheMan. Do you want to monitor?

  That would be Jamie Turner’s brother, Mark. Phate keyed Y and saw the brothers’ dialogue on his screen.

  MarkTheMan: Can you ins
tant message?

  JamieTT: Gotta go play sucker I mean SOCCER.

  MarkTheMan: LOL. Still on for tonight?

  JamieTT: You bet. Santana RULES!!!!!

  MarkTheMan: Can’t wait! I’ll see you across the street by the north gate at 6:30. You ready to rock n roll?

  Phate thought, You bet we are.

  Wyatt Gillette paused in the doorway and felt as if he’d been transported back in time.

  He gazed around him at the California State Police Computer Crimes Unit, which was housed in an old one-story building several miles from the state police’s San Jose headquarters. “It’s a dinosaur pen.”

  “Of our very own,” Andy Anderson said. He then explained to Bishop and Shelton, neither of whom seemed to want the information, that in the early computing days huge computers like the mainframes made by IBM and Control Data Corporation were housed in special rooms like this, called dinosaur pens.

  The pens featured raised floors, beneath which ran massive cables called “boas,” after the snakes they resembled (and which had been known to uncurl violently at times and injure technicians). Dozens of air conditioner ducts also crisscrossed the room—the cooling systems were necessary to keep the massive computers from overheating and catching fire.

  The Computer Crimes Unit was located off West San Carlos, in a low-rent commercial district of San Jose, near the town of Santa Clara. To reach it you drove past a number of car dealerships—EZ TERMS FOR YOU! SE HABLA ESPAÑOL—and over a series of railroad tracks. The rambling one-story building, in need of painting and repair, was in clear contrast to, say, Apple Computer headquarters a mile away, a pristine, futuristic building decorated with a forty-foot portrait of cofounder Steve Wozniak. CCU’s only artwork was a broken, rusty Pepsi machine, squatting beside the front door.

  Inside the huge building were dozens of dark corridors and empty offices. The police were using only a small portion of the space—the central work area, in which a dozen modular cubicles had been assembled. There were eight Sun Microsystems workstations, several IBMs and Apples, a dozen laptops. Cables ran everywhere, some duct-taped to the floor, some hanging overhead like jungle vines.

  “You can rent these old data-processing facilities for a song,” Anderson explained to Gillette. He laughed. “The CCU finally gets recognized as a legit part of the state police and they give us digs that’re twenty years out of date.”

  “Look, a scram switch.” Gillette nodded at a red switch on the wall. A dusty sign said EMERGENCY USE ONLY. “I’ve never seen one.”

  “What’s that?” Bob Shelton asked.

  Anderson explained: The old mainframes would get so hot that if the cooling system went down the computers could overheat and catch fire in seconds. With all the resins and plastic and rubber the gases from a burning computer would kill you before the flames would. So all dinosaur pens came equipped with a scram switch—the name borrowed from the emergency shutdown switch in nuclear reactors. If there was a fire you hit the scram button, which shut off the computer, summoned the fire department and dumped halon gas on the machine to extinguish the flames.

  Andy Anderson introduced Gillette, Bishop and Shelton to the CCU team. First, Linda Sanchez, a short, stocky, middle-aged Latina in a lumpy tan suit. She was the unit’s SSL officer—seizure, search and logging, she explained. She was the one who secured a perpetrator’s computer, checked it for booby traps, copied the files and logged hardware and software into evidence. She also was a digital evidence recovery specialist, an expert at “excavating” a hard drive—searching it for hidden or erased data (accordingly, such officers were also known as computer archaeologists). “I’m the team bloodhound,” she explained to Gillette.

  “Any word, Linda?”

  “Not yet, boss. That daughter of mine, she’s the laziest girl on earth.”

  Anderson said to Gillette, “Linda’s about to be a grandmother.”

  “A week overdue. Driving the family crazy.”

  “And this is my second in command, Sergeant Stephen Miller.”

  Miller was older than Anderson, close to fifty. He had bushy, graying hair. Sloping shoulders, bearish, pear-shaped. He seemed cautious. Because of his age, Gillette guessed he was from the second generation of computer programmers—men and women who were innovators in the computer world in the early seventies.

  The third person was Tony Mott, a cheerful thirty-year-old with long, straight blond hair and Oakley sunglasses dangling from a green fluorescent cord around his neck. His cubicle was filled with pictures of him and a pretty Asian girl, snowboarding and mountain biking. A crash helmet sat on his desk, snowboarding boots in the corner. He’d represent the latest generation of hackers: athletic risk-takers, equally at home hacking together script at a keyboard and skateboarding half-pipes at extreme-sport competitions. Gillette noticed too that of all the cops at CCU Mott wore the biggest pistol on his hip—a shiny silver automatic.

  The Computer Crimes Unit also had a receptionist but the woman was out sick. CCU was low in the state police hierarchy (it was referred to as the “Geek Squad” by fellow cops) and headquarters wouldn’t spring for a temporary replacement. The members of the unit had to take phone messages, sift through mail and file paperwork by themselves and none of them, understandably, was very happy about this.

  Then Gillette’s eyes slipped to one of several erasable white-boards against the wall, apparently used for listing clues. A photo was taped to one. He couldn’t make out what it depicted and walked closer. Then he gasped and stopped in shock. The photo was of a young woman in an orange-and-red skirt, naked from the waist up, bloody and pale, lying in a patch of grass, dead. Gillette had played plenty of computer games—Mortal Kombat and Doom and Tomb Raider—but, as gruesome as those games were, they were nothing compared to this still, horrible violence against a real victim.

  Andy Anderson glanced at the wall clock, which wasn’t digital, as would befit a computer center, but an old, dusty analog model—with big and little hands. The time was 10:00 A.M. The cop said, “We’ve got to get moving on this. . . . Now we’re taking a two-prong approach to the case. Detectives Bishop and Shelton are going to be running a standard homicide investigation. CCU’ll handle the computer evidence—with Wyatt’s help here.” He glanced at a fax on his desk and added, “We’re also expecting a consultant from Seattle, an expert on the Internet and online systems. Patricia Nolan. She should be here any minute.”

  “Police?” Shelton asked.

  “No, civilian,” Anderson said.

  Miller added, “We use corporate security people all the time. The technology changes so fast we can’t keep up with all the latest developments. Perps’re always one step ahead of us. So we try to use private consultants whenever we can.”

  Tony Mott said, “They’re usually standing in line to help. It’s real chic now to put catching a hacker on your résumé.”

  Anderson asked Linda Sanchez, “Now, where’s the Gibson woman’s computer?”

  “In the analysis lab, boss.” The woman nodded down one of the dark corridors that spidered out from the central room. “A couple of techs from crime scene are fingerprinting it—just in case the perp broke into her house and left some nice, juicy latents. Should be ready in ten minutes.”

  Mott handed Frank Bishop an envelope. “This came for you a few minutes ago. It’s the preliminary crime scene report.”

  Bishop brushed at his stiff hair with the backs of his fingers. Gillette could see the tooth marks from the comb very clearly in the heavily sprayed strands. The cop glanced through the file but said nothing. He handed the thin stack of papers to Shelton, tucked his shirt in once more then leaned against the wall.

  The chunky cop opened the file, read for a few moments then looked up. “Witnesses report the perpetrator was a white male, medium build and medium height, white slacks, a light blue shirt, tie with a cartoon character of some kind on it. Late twenties, early thirties. Looked like every techie in there, the bartender said.” The cop
walked to the white-board and began to write down these clues. He continued, “ID card he was wearing said Xerox Palo Alto Research Center but we’re sure that was fake. There were no hard leads to anybody there. He had a mustache and goatee. Blond hair. Also there were several frayed blue denim fibers on the victim that didn’t match her clothes or anything in her closet at home. Might’ve come from the perp. The murder weapon was probably a military Ka-bar knife with a serrated top.”

  Tony Mott asked, “How’d you know that?”

  “The wounds’re consistent with that type of weapon.” Shelton turned back to the file. “The victim was killed elsewhere and dumped by the highway.”

  Mott interrupted. “How could they tell that?”

  Shelton frowned slightly, apparently not wishing to digress. “Quantity of her blood found at the scene.” The young cop’s lengthy blond hair danced as he nodded and seemed to record this information for future reference.

  Shelton resumed. “Nobody near the body drop site saw anything.” A sour glance at the others. “Like they ever do. . . . Now, we’re trying to trace the doer’s car—he and Lara left the bar together and were seen walking toward the back parking lot but nobody got a look at his wheels. Crime scene was lucky; the bartender remembered that the perp wrapped his beer bottle in a napkin and one of the techs found it in the trash. But we printed both the bottle and the napkin and came up with zip. The lab lifted some kind of adhesive off the lip of the bottle but we can’t tell what it is. It’s nontoxic. That’s all they know. It doesn’t match anything in the lab database.”

  Frank Bishop finally spoke. “A costume store.”

  “Costume?” Anderson asked.

  The cop said, “Maybe he needed some help to look like this Will Randolph guy he was impersonating. Might be glue for a fake mustache or beard.”

  Gillette agreed. “A good social engineer always dresses for the con. I have friends who’ve sewed together complete Pac Bell linemen uniforms.”

  “That’s good,” Tony Mott said to Bishop, adding more data to his continuing education file.

 

‹ Prev