WWW 3: Wonder (9 page)

Read WWW 3: Wonder Online

Authors: Robert J Sawyer

BOOK: WWW 3: Wonder
7.21Mb size Format: txt, pdf, ePub
 
Peyton Hume got out of the limo and entered his own car in the parking lot at WATCH. He waited for the other vehicle to pull away, then used his notebook computer to download a local copy of the black-hat list the NSA kept. He felt his skin crawling as he did so, but not because he found the people on the list distasteful. A few different life choices, and he might have ended up on it himself. No, what was creeping him out was the thought that Webmind was likely aware of what he was doing; the damn thing was clearly monitoring even secure traffic now and was able to pluck out classified information at will. They’d left too many back doors in the algorithms—and now they were taking it up the ass.
Once he had the copy of the database on his own hard drive, he turned off his laptop’s Internet connection. He also pulled out his cell phone and turned that off, and he shut off the GPS in his car. No point making it easy for Webmind to track his movements.
He didn’t have the luxury of traveling far; he needed somebody nearby, somebody he could speak to face-to-face, without Webmind being able to listen in. He sorted the database by ZIP code, rubbed his eyes, and peered at the screen. He was exhausted, but he could sleep when he was dead. For now, there was no time to waste. This was it, the showdown between man and machine—the only one there would ever be. Once Webmind took over, there would be no going back. There had been other times when one man could have acted, and didn’t. One man could have saved Christ; one man could have stopped Hitler. History was calling him, and so was the future.
He examined the list of names in the database and clicked on the dossier for each one. The first ten—the closest ten—didn’t have the chops. But the eleventh . . . He’d read about this guy often enough. His house was seventy-four miles from here, in Manassas. Of course, there was always a chance that he wasn’t home, but guys like Chase didn’t have to go anywhere; they brought the world to themselves.
Hume turned on the radio—an all-news channel; voices, not music, something to keep him awake—and put the pedal to the metal.
The current announcer was female, and she was recapping the day’s campaign news: the Republican candidate trying to pull her foot out of her mouth in Arkansas; a couple of sound bites from her running mate; some White House flak saying that the president was too busy responding to the “advent of Webmind” to be out kissing babies; and . . .
“. . . and in other Webmind news, oncologists across the globe are scrambling to analyze the proposed cure for cancer put forth by Webmind earlier today.” Hume turned up the volume. “Dr. Jon Carmody of the National Cancer Institute is cautiously optimistic.”
A male voice: “The research is certainly provocative, but it’s going to take months to work through the document Webmind posted.”
Months? It was a ruse on Webmind’s part; it had to be. Webmind was buying time. Hume gripped the steering wheel tighter and sped on into the darkness.
eight
 
Masayuki Kuroda was leaning forward in his chair now, looking at the face of Anna Bloom on his screen. “The Americans have a technique that
does
work to scrub most of Webmind’s packets,” he said into the little camera at the top of his monitor. “Now all they have to do is get the Ciscos and Junipers of the world to upload revised firmware that would cause their routers to reject all packets with suspicious time-to-live counters.”
“Oh, I don’t think you have to worry about that,” Anna said.
“Why not?” asked Masayuki.
“Most of the routers on the Internet are running the same protocols they’ve been using for decades,” she replied. “The reason is simple: they
work.
Everyone’s afraid of monkeying with them. You know the old adage—if it ain’t broke, don’t fix it. Plus there are thousands of different models of routers and switches; you’d need a different upgrade package for each one.”
“Oh,” said Masayuki.
Anna nodded. “In 2009, an Internet provider in the Czech Republic tried to update the software for routers there,” she said. “A small error he introduced propagated right across the Web, causing traffic to slow to a crawl for over an hour. Can you imagine the lawsuits if Cisco or Juniper mucked up the whole net—if, say, the new firmware had a bug that caused it to delete
all
packets, or modified the contents of random packets?”
“Well,” said Masayuki, “obviously, they’d test—”
“They
can’t,”
said Anna. “Look, before Microsoft rolls out a new version of Windows, they have tens of thousands of beta testers try it out on their individual computers, so that bugs can be found and fixed prior to the release going public—and, still, as soon as it
does,
thousands of additional bugs immediately come to light. You can test router software on small networks—a few hundred or even a few thousand machines—but there’s no way to test what will happen when the software goes live on the Internet. There’s no system anywhere on the planet that duplicates the Internet’s complexity, no test bed for running large-scale experiments to see what would happen if we changed
this
or tweaked
that.
The Internet is a house of cards, and no one wants to send it all tumbling down.”
“What about the Global Environment for Network Innovations?” asked Webmind’s disembodied voice.
“What’s that?” asked Masayuki.
Anna said, “GENI is a shadow network proposed by the American National Science Foundation in 2005, precisely to address the need for a test bed for new ideas and algorithms before they’re turned loose on the real Internet. But it’s years away from completion—and unless it ends up having a Webmind of its own, there’ll be no mutant packets acting like cellular automata on it to perform tests on.”
“So Webmind is safe?” asked Masayuki, sounding relieved.
Anna raised a hand, palm out. “Oh, no, no. I didn’t say
that.
If the US government wants to bring you down, Webmind, they’ve got an easy way. That test they did to see if they could eliminate you: it was doubtless only phase one. You said they used an AT&T switching station?”
“Yes,” Webmind replied.
“Proof of concept, and with AT&T equipment.”
“That’s significant?” asked Kuroda.
Anna made a forced laugh. “Oh, yes indeed. AT&T has a secret facility that nobody speaks about publicly; employees in the know just call it ‘The Room.’ It has multiple routers with ten-gigabit ports, and, quite deliberately, a significant portion of the global Internet backbone traffic goes through it. Of course, the NSA has access to The Room. Had his small-scale test succeeded, Colonel Hume doubtless would have modified those big routers to scrub your mutant packets. They wouldn’t necessarily get them all, but they’d take out a big percentage of them. Of course, if you hit The Room with a denial-of-service attack scaled up from the one you used against the initial switching station, you’d choke the whole Internet—and Internet cartographers like me would be able to pinpoint the target as being on US soil; there’s no way the Americans could keep under wraps that they’d tried to kill you.”
“For the moment,” Webmind said, “the president has rescinded his order to eliminate me.”
“I’m sure,” said Anna. “Still, The Room exists—and someday, they might use it this way.”
“I hope the US government will come to value me,” Webmind said.
“Perhaps it will,” said Anna, “but there’s another way to kill you—and it’s decentralized.”
“Yes?” Webmind said.
“It’s called BGP hijacking. BGP is short for Border Gateway Protocol—it’s the core routing protocol of the Internet. BGP messages are shared between routers all the time, suggesting the best route for specific packets to take. Do all your mutant packets have the same source address?”
“Not as far as we know,” Webmind said.
“Good, that’ll make it harder. Still, they must have
some
distinguishing characteristic—some way to tell if their hop counters are broken.
One could spoof a BGP message that says the best place to send your specific packets is a dead address.”
“A black hole?” said Masayuki.
“Exactly—an IP address that specifies a host that isn’t running or to which no host has been assigned. The packets would essentially just disappear.”
“That is not unlike the method I use to sequester spam,” Webmind said. “But it hadn’t occurred to me that it could be used against me.”
“Welcome to the world of human beings,” Anna said. “We can turn anything into a weapon.”
 
 
It was almost 2:00 A.M. when Hume pulled to a stop outside Chase’s house. The neighborhood was nice—posh, even. And the house was large and sprawling; Chase clearly did all right for himself. He had a couple of small satellite dishes on the roof, and there seemed to be a big, commercial air-conditioning unit at the side of the house; guy probably had a server farm in the basement.
He also probably had a sawed-off shotgun or a .357 magnum under his desk, and he likely didn’t answer the doorbell when it rang this late at night. Although Hume could remove his blue Air Force uniform jacket before going in, he was pretty much stuck with the uniform shirt and pants, not to mention the precise one-centimeter buzz cut.
It looked like Chase was still up: light was seeping around the edges of the living-room curtains.
There was no indication that Webmind tapped regular voice lines—at least not yet. Hume had stopped at a 7-Eleven along the way and bought with cash a disposable pay-as-you-go cell phone. He used it now to call Chase at the unlisted number that was in his dossier.
The phone rang three times, then a gruff voice said, “Better be good.”
“Mr. Chase, my name is Hume, and I’m in a car out front of your house.”
“No shit. Whatcha want?”
“I can’t imagine you’re not sitting at a computer, Mr. Chase, so google me. Peyton Hume.” He spelled the names out.
“Impressive initials,” said Chase, after a moment. “USAF. DARPA. RAND. WATCH. But it don’t tell me what you want.”
“I want to talk to you about Webmind.”
He half expected the curtain to be drawn a little and a face to peek out at him, but doubtless Chase had security cameras. “No parking on my street after midnight, man. Get a ticket. Pull into the driveway.”
Hume did that, got out of the car, and headed through the chill night air to the door; mercifully, the rain had stopped. By the time he was on the stoop, Chase had opened the door and was waiting for him.
“You packing?” asked Chase.
Hume did have a gun, but he’d left it in the glove compartment. “No.”
“Don’t move.”
The man turned and looked at a monitor in the hallway, which was showing an infrared scan indeed revealing that he wasn’t carrying a weapon.
Chase stood aside and gestured toward the living room. “In.”
One wall was covered with shelving units displaying vintage computing equipment, much of which had been obsolete even before Chase was born: a plastic Digi-Comp I, a mail-order Altair 8800, a Novation CAT acoustic coupler, an Osborne 1, a KayPro 2, an Apple ][, a first-generation IBM PC and a PCjr with the original Chiclet keyboard, a TRS-80 Model 1 and a Model 100, an original Palm Pilot, an Apple Lisa and a 128K Mac, and more. The second wall had something Hume hadn’t seen for decades although there was a time when countless computing facilities had displayed it: a giant line-printer printout on tractor-feed paper of a black-and-white photo of Raquel Welch, made entirely of ASCII characters; this one had been neatly framed.
Another wall had a long workbench, with a dozen LCD monitors on it, and four ergonomic keyboards spaced at regular intervals. In front of it was a wheeled office chair on a long, clear plastic mat; Chase could slide along, stopping at whichever screen he wished.
Chase was tall, black, and heroin-addict thin, with long dreadlocks. There was a gold ring through his right eyebrow and a series of silver loops going down the curve of his left ear.
“You ever kill anyone?” Chase asked. He had a Jamaican accent.
Hume raised his eyebrows. “Yes. In Iraq.”
“That’s a bad war, man.”
“I didn’t come here to discuss politics,” said Hume.
“Maybe Webmind stop all the wars,” said Chase.
“Maybe humanity should be able to determine its own destiny,” said Hume.
“And you don’t think we be able do that much longer, so?”
“Yes,” said Hume.
Chase nodded. “You right, maybe. Beer?”
“Thanks, no. I’ve got a long drive home.”
Hume knew that Chase was twenty-four. He’d come to the States three years ago—the required paperwork magically appearing; more proof that he was one of the best hackers in the business. In other circumstances, someone else might have gone off the reservation to hire a former black-ops sniper, but for this, a digital assassin was called for.
“So, what you want from me?” said Chase.
“Webmind must be stopped,” Hume said. “But the government is going to waste too much time deciding what to do, so it has to be done by guys like you.”

Other books

ARM by Larry Niven
Medusa by Timothy C. Phillips
Hot Pursuit by Anne Mather
Love Is in the Air by A. Destiny and Alex R. Kahler
El jinete del silencio by Gonzalo Giner
Carolyn G. Hart_Henrie O_02 by Scandal in Fair Haven
LOVE LIFE and VOWS by LaShawn Vasser