Bücher online kostenlos Kostenlos Online Lesen
The Fool's Run

The Fool's Run

Titel: The Fool's Run Kostenlos Bücher Online Lesen
Autoren: John Sandford
Vom Netzwerk:
calculation somewhere.
    “Or say that you want to design the kind of round gas-cap cover that goes on the outside of some cars, on the fender. Say you make the round metal cover a quarter inch too big in diameter. It won’t fit; it’s useless. You can’t make it fit any more than you can push a nickel through a pop-bottle top. But it looks fine, right up to the moment you try to put it on the car.”
    She considered it for a moment, staring dead into the eye of an onion bagel.
    “That sounds pretty crude,” she said finally.
    “Those examples are,” I agreed. “But if you do analogous things in electronics, it gets more complicated. You can’t see which parts are wrong; it can take days to figure out a mistake. Every individual part works, and every part is just as specified, but the system won’t work. Anytime you build a complicated electronic machine there are always mistakes, pure accidents. They’re night-mares. Sometimes it takes days to find them. You don’t know if you’re dealing with a basic design flaw, or if there’s a bad electrical connection somewhere. If mistakes are generated on a large scale, by design . . . I don’t know of a cure.”
    She thought that over as she got into the onion bagel. “How do you know that they just won’t check the computer and fix it?” she asked as she chewed.
    “They will, sooner or later. But probably later. Computers are the water engineers swim in. They don’t question the answers they get from computers any more than a fish questions water. They know the computer is correct: the problem must be somewhere else.”
    That seemed to satisfy her, although she was more thoughtful than pleased. Later in the morning, I injected the first of the viruses into the Whitemark system. When it was done, I wandered into the kitchen and heard her talking on an extension phone, relaying what I’d told her. When she got off the phone, she came in and sat down.
    “I was talking to our systems man,” she said. “I didn’t tell him what we’re doing, of course, but I did say that I’d talked to a guy about computer security. He says you’re right. But he says the chances of a good enough programmer ever getting into our system are slim and none.”
    “That’s why it could be done.”
    I was tempted to tell her that Bobby had already been in the Anshiser system, but some things are best left untold. “If I were you, I might have another little chat with him.”
    “I made a note,” she said. She smiled, and the skin crinkled at the corners of her eyes.
     
    WHILE I WAS working on the attack programs that we’d insert into the Whitemark system, Dace was working on the publicity angle. His first product was a package on the systems director, the pornographer.
    “I put it together with words cut out of the Post ,” he said. He was wearing surgeon’s latex gloves and holding the paper by the corners. It was an ugly jumble of clipped-out news type Scotch-taped to a piece of spiral notebook paper. “The hardest part was getting the words right. Nothing too big, but nothing too small, either. Something just right for a half-bright crackhead.”
    The text was three paragraphs long and explained:
    It specified names, the address, and the day and time of the burglary.

    A sample magazine was enclosed, along with the list of subscribers.
    “One thing that strikes me as phony is that we’re sending it to the right police jurisdiction. A junkie would probably send it to the Washington cops,” Dace said as he sealed the envelope. “I don’t want to take a chance that the whole thing would get lost in the bureaucracy, so I’m going to send it to the right place, to the chief. Even if they’re a little suspicious, they’ll check. Especially with the magazine and the subscriber list.”
    “What do you think they’ll do? The cops?” Maggie asked.
    “When I was working a police beat years ago, they’d pass it off to the vice squad. The vice cops would go over to the house, see if the door looks like it had been broken in recently. I’m assuming that the break-in wasn’t reported. Then they might look in the windows and see if we described the place right. Or knock on the door with some phony excuse, to see if it looks right. If everything jibes, they’ll watch the place, see who comes and goes. Maybe have a quiet talk with a neighbor or two. They’ll do a computer search and see if these people have ever been involved in a sex thing in the past. If they

Weitere Kostenlose Bücher