A month later Agent Bean examined his carefully understated appearance
in the mirror before heading out for the day. The service had him busy
chasing small counterfeiting reports not likely to be anything
significant. Just bad photocopy jobs, corner clippers, and bill
splitters. Stuff the service usually left to local law enforcement. He
wasn't aware of having flirted with a senior agent's girl friend or
stepping on anybody's toes, but ever since they told him to close the
"suicide" case he'd been assigned stacks of scutt work. There was a new
pile of folders on his desk everyday. One was marginally interesting
until he discovered it was just another photocopy counterfeiter. Only
marginally interesting until he figured out a local Postal Mail Stop and
copy store had figure out how to defeat the currency protection on their
color Xerox machine. The machine did make good looking prints even if
it was just on heavy linen paper stationary. One thing about getting
all these garbage cases is he was closing lots of cases and making lots
of arrests. These kinds of counterfeiters don't tend to be very smart
or plan very well. Still he wondered, "Why am I getting all these small
nearly nothing cases. Its not the sort of work we usually spend a lot
of time on. Its like they are just trying to keep me busy for some
reason. Its been a busy month."
"HEY DAD," Shouted Bennie from his bed room. "Why can't you just turn
this over to the guys in your service." "I'm not complaining about
this brand new state of the art 32bit Pentium computer, but I'm sure you
have guys who could sort all this stuff out in a few days."
Agent Bean duck into his sons room and said, "You know in light of that
video message at the end of the tape I can't risk sharing it until I
know what it is in case somebody at the Secret Service is involved in
something questionable. They have been giving me a lot of busy work
since they told me to close the case where I retrieved that tape. Have
you found anything yet?"
"Well, its clearly assembly language code for a Unix operating system.
It looks like some kind of control system for a multiplexer, but its
huge. It seems to be designed to manage potentially millions of
simultaneous independent connection. Parts of it looks like its
intended to talk to itself or copies of itself."
"Yeah, Bennie. You told me that in the first couple days. Have you
learned anything else."
"The first part of it is pretty easy. It just what I said, but that's
only a small part of the code. Most of it is dormant. There are a few
keys that appear to be instructions to compile and execute more of the
code, but they don't make any sense. Other parts look like its intended
to look back at itself from somewhere else on a network to download code
if certain conditions are met."
"What do you mean."
"Its almost like it was written to run on computers bigger, faster, and
with more storage than anything I know exists. When I just read
sections of the dormant code that is executed by triggers it looks like
a worm intended to steal computing time from across millions of
computers on a network. Parts of it looks like a simple self
replicating virus. At least a dozen different viruses that do the same
thing by different methods. There may be more, but I haven't even read
all the code yet. There are some things that seem to be about voice
recognition. There is a lot here. I don't really understand most it
it, but I have this weird thought."
"What's your thought?"
"Its silly. There isn't enough computing power in the world to do all
of what I think this is for. Some of it could work. I wish you would
let me show it to Bit Trapper or Covenant."
"I am keeping this secret from my own agency. There is no way I want
you sharing it with known hackers. So, what's your thought. I'm open
to crazy ideas right now."
"Well, I think its primarily some kind of voice communication management
system. Like a big complex telephone switching system. That part will
easily run on modern computers. Its the active part of the program. It
has something that seems to be digitizing storing and overwriting about
30-40 seconds of every connection in a buffer and doing some sort of
analog to digital conversion and comparing the signal to a database. On
some match conditions it saves the buffer and sends it off to an outside
system. Its like it monitors conversations and if there is a keyword
trigger it saves the recording and sends the data somewhere."
"Where does it send it?"
"I'm not sure. Its over some kind of distributed network like the
Internet, but this was written before the Internet was public. It
almost has to be the military and university network that predated the
public Internet. That means government, university, or maybe some big
company that had access to it."
"AT&T," thought Agent Bean silently. "That's why they had guys sitting
out on that site. They thought this might be there."
"That's not all dad. I've seen pieces of this code. Most viruses use
some of the same basic methods, but some I've seen use this exact code.
They were either written by the same people or this program is wild on
the Internet. Replicating parts of itself, stealing processor time, and
checking systems big enough to download and run more of its code.
Mostly it looks like its looking for copies of itself on other
multiplexing platforms, but its also looking for anything else it can
run on."
"What does all that mean? Bennie. You are way over my head."
"I think its intended to spy on every telephone conversation in the
world simultaneously, and its just looking for enough processing power
to do it."
"So its not working yet."
"No, I think it is working. Right now it only runs most of its voice
analysis code on certain systems, but its looking for the power to
monitor everything."
"What systems?"
"Well, I think it runs on big long distance telephone switching
computers primarily. Lots of local calls won't go through them, but as
systems computers upgrade this will look to see if there is room and
power to replicate itself. That's crazy right?"
"No Bennie. Its not crazy. Its deadly. If its true its probably why
the mysterious John got the tape out, and may be why Danger Mouse died
of "natural causes." It may be why my agency has had me chasing busy
work out of the office, and it may be why I saw..."
"Saw what dad?"
"I can't say," he replied as he thought about that mysterious guys who
just sat there in that AT&T service van when he had been on that
investigation a month ago.
"Keep working on it. Do not connect your computer to any network or
bulletin board. If you want to message on the old BBSs just use your
old computer. DO NOT TELL ANYBODY ABOUT ANY PART OF THIS. Not police.
Not other agents. Especially not your hacker friends. NOTHING. I need
to think about this, and I need you to see if you can confirm your
theory. TELL NOBODY. I think people have been killed over this."
"What about Mom."
"No not even Mom. I think even knowing about this is dangerous. If
nobody knows you know its better for your safety."
"Well, I need to get to school."