The Miracle Strain (7 page)

Read The Miracle Strain Online

Authors: Michael Cordy

BOOK: The Miracle Strain
9.06Mb size Format: txt, pdf, ePub

"One risk is that the retrovirus goes AWOL and invades a healthy cell, and then inserts the genes into the wrong part of your genetic sequence."

"What would that do?"

"It could give the healthy cells cancer too. But the odds of that happening are very, very small."

"Could I catch AIDS?"

"No, we've tested the retroviral vehicle--or vector as we call it--over the last three years, and we've proved that it's harmless. That's why the FDA sanctioned it. Frankly, Hank, the only real risk to you is that it might not work." He felt the bony shoulder shrug beneath his hand.

"So I ain't got zip to lose, then?" asked Hank.

Tom paused for a second and looked into Hank's eyes. He remembered him first coming here three weeks ago, the once fit outdoorsman already so weak he could barely walk. "I ain't good at being sick," he'd explained then. "So kill me or cure me. But just get me the hell outta here." The man had been willing to try anything as long as he could get out of his bed and the hospital.

"Let me be completely straight with you, Hank," said Tom. "The chances of this treatment failing are high--perhaps eightyfive percent. But the odds of it making you worse are minimal. And the chances of you surviving without it are zero. So you have a choice. One, you do nothing and let the disease take its course. Or, two, you do this and have a fifteen percent chance of being cured."

Hank frowned as if thinking, then wheezed, "Fifteen percent?"

Tom kept his face impassive. "At best."

Hank smiled, a big grin that lit up his thin face and made him look almost well. "I've had worse odds."

Tom returned his smile. "So have I. I've seen people with far less chance than that walk out of here. So don't give up on me just yet." It would take many weeks, months, even years before the results were conclusive. But Tom didn't care how long it took, if he could only keep death's greedy hands off this young man for a while longer. He turned to the nurse, who was hanging a drip bag on the stand by the bed. In the bag was the first batch of red retroviral serum that had been cloned in the upstairs lab.

He said, "Right, Beth. We'll wait for Hank's mother to arrive. She said she'd be here at seven. Then could you get one of the NIH doctors to check what we're doing? I suggest Karl Lambert. When you've done that, come and get me and we'll start the first intravenous drip. Okay?"

When Beth nodded, Tom could see the excitement in her eyes. He felt quietly confident about curing Hank. He only wished he felt as confident about the infinitely more complex cancer threatening his daughter. Bob and Nora had said they'd be ready to check the retrovirus they'd developed to combat glioblastoma multiforme at nine o'clock. He checked his watch; only two more hours to go.

Across the ground floor of the pyramid Jasmine Washington was spending the first half hour checking around her domain. Soon, the keenest of her staff would start arriving, and she liked to have some time alone with her machines.

She walked through the Experimental Genescope facility. This facility was similar to the one upstairs, where Holly's genome had been read. Except here there were only four Genescopes, and all were upgraded experimental models. The two on the right were holo-models equipped with the prototype Gene Genie software. Jasmine was confident they would be up and running within the next few days.

Again she felt the conflicting emotions stir within her. Four days ago she and Larry had taken Holly to the classic Disney animation movie The Lion King, and as always they had laughed and teased each other, but Jasmine had been unable to stop thinking about DAN's verdict. She was proud of the Genescope's ability to predict disease, especially when it could be prevented or cured. But if all the invention could do was predict misery without offering any solace, then it didn't seem so very clever.

She sighed and walked through the Genescope facility, passing the main IT office suite on her right, with its silent workstations and terminals. She opened the chrome and glass door in front to reveal a large dazzling chamber. This room was the heart of her IT department, and the information heart of GENIUS worldwide.

It was in this cool, all-white space, referred to simply as the White Room, that Jasmine liked to walk and think. Kept at a constant fifty-five degrees, it contained four enormous boxes that hummed away in the center. Two of the four large boxes housed Big Mother, the large protein-based ultracomputer that was linked to all the Genescopes in existence. This mother brain knew at any one time what scans were being conducted by its "brood," anywhere around the world. And it was Big Mother that allowed the existence of the database that resided in the other two boxes: the Individual Genome Ordered Repository--IGOR.

The ethical guidelines on gene scanning were rigorous. Genomes could be tested only if patients were accompanied by their doctor, or had professional counseling. Strict matching checks were used to ensure that an individual couldn't have his genome scanned without his knowledge. The other major guideline was that all scans should be kept strictly confidential. The life and health insurance companies had frequently tried to challenge this, claiming that if an individual discovered that he had an imminent incurable disease that individual could take out extremely high insurance coverage at standard premiums. The law, however, was adamant that the privacy of the individual was paramount. And this was why Jazz and Carter were so keen to keep the database secret. IGOR was strictly illegal.

The Individual Genome Ordered Repository had been Tom's idea. He had asked Jasmine to tell Big Mother to pull off one in five of all gene scans conducted by the licensed GENIUS Processing Labs around the world and store them in a database, along with the names, addresses, and family and medical records of the individuals concerned. There were now over one hundred million people on IGOR, and GENIUS knew more about them than they did themselves.

Tom's motives were far from sinister; he wanted to use the database at a macro level to validate much of his genetic work--checking trends of actual medical illness in families versus genetic markers for the illness. IGOR had helped validate much of the work that led to the cure for schizophrenia and had given vital clues to treating other genetic diseases. However, despite this worthy intention, Jasmine had no doubt that if any of the individuals, or relevant authorities, learned of the database they would be horrified and GENIUS's credibility would be seriously compromised. But Tom had judged that the benefits outweighed any potential threat to the particular individuals and to his company. So he had taken the risk.

After walking around her domain, Jasmine returned to her computer and began her daily cyberpatrol. She clicked on the computer. With a processing speed of 100 terahertz, 600 gigs of disk space, and 200 gigs of RAM, it was easily powerful enough to cruise the fast lane of the congested information superhighway. The computer monitor flashed into life and a virtual reality head, the spitting image of Jazz, appeared. The Afro hair and fine-featured dark face almost matched her own reflection in the screen. The image greeted her with a: "Salutations, Razor Buzz. Where are you going today?" Even the synthesized voice sounded like her own.

She rarely used it anymore, but the Razor Buzz tag was a throwback to her youth in L. A., when she had been an irresponsible net head with a sharp attitude and a haircut to match. If her strict Baptist parents thought they were keeping her out of trouble by banning her from the streets and allowing her to kick up her heels on the information superhighway, then they were mistaken. She had chosen the anonymous User ID of Razor Buzz because a lot of what she did in those days wasn't strictly legit. Still, legit or not, back then she was something of a legend.

She spoke into the microphone. "Today, I'm on patrol."

"I need the code before you can go on the road," said the talking head.

Jazz smiled. The password she'd chosen this week still gave her an adolescent kick. It was the name of a job that harked back to the bad old rebellious days before she went legit and won scholarships and Nobel Prizes--to when she could hack into everything and anything. This job wasn't "Accountant," or "Doctor," or even "GENIUS Information Technology Director." No, this job was cool, seriously cool.

"Cybercop," she typed, enjoying playing the ultimate poacher turned gamekeeper.

The head on the screen suddenly donned a helmet, did a double flip, and saluted her. "Special Agent Razor, you are nowfree to roam the infobahn. Take care out there in cyberspace."

She reached across the ordered desk for her can of Diet Coke, and considered her destination. Most days she would try to break into one of GENIUS's technical or financial systems. She employed two other guys to try to breach these protected databases, highlighting weaknesses and suggesting better protective measures. Both guys were good, but she still liked to check for herself how good her defenses really were. Today she would try to hack into their most sensitive and best-protected database--IGOR.

She ignored the world wide web, because none of the GENIUS systems were visible there. Instead she tapped out the number of Big Mother, intending to hack into the live connection used by all the Genescopes to feed data into the mother brain, and then into IGOR. Almost instantly the front-end screen appeared demanding a password. She punched in yesterday's--she had purposely not looked at today's.

"Access denied" flashed up on screen.

Good. The password had been changed. The data was secure from her.

Or should be.

She'd have to find another way in. She pressed the keys on the board in front of her, trying to get around the front-end title screen, which gave no information about what IGOR contained. She would still not be in the system once she'd done this, because she had designed IGOR to have two levels of security--one to prevent prowlers from browsing the front-end menu and one to stop them from accessing the data--but at least it would be a start. She tried the easy tricks first, the ones known to all high school cyberpunks. First, she tried to find it by interrogating the program behind it.

No joy. All the simple breaches were closed.

Good. So far.

She moved on to the next approach: using the base computer language to reprogram the password commands. This was more difficult and took years of experience. If you put in the wrong program code you could damage all your other software.

She did it without thinking. It took her a little over four seconds to try this technique. But then Razor Buzz was a supremo, a cyberlord.

Nothing. No breach. Her team had covered this angle.

Excellent.

Now to the final approach. This entailed writing her own program to tell the program that ran the password system what to do. Like creating higher orders for the system to obey. This took Razor a little longer. This was clever.

Then her eyes saw the message flashing on the bottom right of the screen.

"Program already resident... Program already resident... Program already resident..."

This had never happened before. "Shit," she said aloud, both impressed and nervous.

The screen changed and she realized she was entering the first stage of IGOR--only one final password defense away from the data.

But she hadn't finished her own higher language program. She must have got in on the coattails of someone else.

Someone else must have opened the door using the same program she was writing and inadvertently let her in. Ignoring the perspiration on her brow, she rode the intruder's slipstream, checking how far he'd penetrated. Whoever it was, he had infiltrated the first-stage defenses and appeared to be browsing the front-end menus--just window shopping, seeing what IGOR contained.

Her hand hovered over the hot key that would catapult both the intruder and herself out of the database.

But she didn't press it yet. She would press it only if the intruder looked as if he was doing the impossible--breaking through the impregnable second stage of defenses and accessing any of the highly confidential data stored there. Before that happened she wanted to find out who the intruder was. The automatic Predator tracer would start immediately if the intruder managed to get beyond the second stage--assuming he could. But she wanted the trace to start now.

Other books

Man Candy by Melanie Harlow
King of the Mountain by Fran Baker
SeducetheFlame by Ella Drake
The Comedy of Errors by William Shakespeare
Samurai's Wife by Laura Joh Rowland