Read The Fool's Run Page 7


  “That’s all we ask,” Anshiser said. He pointed a finger at her. “If there’s any sign of trouble, you get out.”

  “Right.”

  “Speaking of trouble,” Anshiser said to me, a cold note in his voice, “let me say a few words to the wise. Do not try to steal this money from us, Mr. Kidd. We want performance. If you can’t perform, say so. But you must try. I won’t be stolen from. I’m not threatening to break your legs should you abscond, but a billion dollars can purchase a world of legal and financial trouble for anyone I’d choose to pick on. Understood?”

  “Fine,” I said. I picked up the money bag. A million dollars . . . It was lighter than I’d expected. “A friend and I are leaving for Washington tomorrow. I’ll get back to you when we’ve got a place. Maggie can fly out then.”

  “Good luck,” Anshiser said, standing and extending a hand. His hand felt cool and damp and mealy, like tightly wound wet tissue paper. I shook it, dropped it hastily, and left.

  “Partners in crime,” Maggie said in the hallway.

  “I hope you’re well paid,” I said. “This will be a major event.”

  “I’m well taken care of,” she said.

  I opened my mouth, and quickly shut it.

  “What were you going to say?”

  “A wisecrack,” I said.

  “You’re not deferential,” she said, looking up at me with mild amusement. “Why’d you hold back?”

  I shrugged. “My mouth sometimes gets me into trouble with women I like. I’m trying to be friendly and it comes out wrong.”

  “You like me?”

  I looked into her cool green eyes. “I could. You’re bright and mean as a snake. Those are decent recommendations.”

  She laughed out loud, the first time I’d ever heard her do it. It sounded nice, unrehearsed.

  “A MILLION BUCKS,” LuEllen said in a reverent tone. “We could be in Brazil in eight hours.”

  The money was spread on the hotel bed, so we could look at it, count it, check serial numbers, and run our fingers through it. When we were satisfied that it was all there, we packed it into three bags. There was $600,000 for me, $250,000 for LuEllen, and $150,000 for Dace. We put the hundred thousand of expense money in with Dace’s cash.

  “A hundred thousand for expense money,” LuEllen said. She looked at it, looked at me, and started giggling.

  When she finally stopped, we checked out of the hotel, dropped our personal shares at the bank, and mailed the safety deposit keys back home—mine to Emily and hers to somebody in Duluth. I didn’t ask who, and didn’t tell her where mine went. The rest of the money, less a few thousand for pocket and purse, went into a small, hidden box just forward of the spare tire well in the trunk of the car.

  Late in the afternoon, armed with the Chicago Tribune’s want ads, we drove around the suburbs and paid cash for two used Kaypro IBM-compatible computers and a Toshiba printer. Then we drove south, made the big turn at Gary, and headed for Washington.

  “You sure about this friend of yours in Washington—Dace?” LuEllen asked.

  “I’m sure.”

  “He’s got a place for us?”

  “Yes. Furnished, telephones, dishes, the whole works. We can move in the same day.”

  “How much?”

  “Two thousand a week.”

  She whistled. “That’s steep.”

  “It’s a special deal. The landlord runs a call girl operation for the Pentagon brass, in Alexandria. The apartments are for the girls, but he let Dace have one. He’s a crook himself, so he won’t talk to anyone. There won’t be any records, there won’t be any receipts. He won’t be around, won’t see our faces; he stays out of sight himself.”

  PERSONAL CARS ARE invisible in America as long as you don’t buy gas on credit cards or get traffic tickets. And if you drive off the main interstate highways, down into the midsized towns when you’re looking for a motel, you can find one where all transactions are done in cash. They don’t want to see a Visa card, they don’t check your license plate to see if you wrote down the right number. Hand over forty dollars in advance, and they’re satisfied.

  There was a reason for our caution. Despite what Anshiser said about the powers of political protection, it was still possible that he didn’t understand the magnitude of what we were doing. A computer attack on a major corporation is a technological-age nightmare. If word of a corporate war got out to the computer community, the reaction could be violent. Some very unpleasant people could come looking for us. Given that possibility, the whole job was best done with as few personal traces as possible.

  WE TOOK OUR time getting to Washington, and talked about the attack.

  “So if things started to get hairy,” LuEllen said, “you might not even need me around at all? Especially toward the end?”

  “Right. You could take off. You could probably take off anyway. Your job will be right up front, before the attack starts. I’d like you to hang around for a while, but you won’t have to stay until the end.”

  “I’d like to know how it comes out.”

  “You’ll know, one way or the other,” I said. “Either I’ll call you and tell you or you’ll read all about it in the newspapers.”

  “You fill me with confidence,” she said.

  LuEllen was pleasant company; she didn’t feel pressure to talk all the time. In the evenings, after dinner, we would catch a movie on Home Box Office and afterward make love, a reasonably athletic event that made a nice transition into sleep. We were feeling almost domestic by the time we got to Washington.

  We arrived in the late afternoon on a hot, damp Thursday. Our new headquarters was in a pretty neighborhood of narrow, green lawns, neatly trimmed hedges, and tastefully shabby private homes interspersed with well-kept apartments. The apartment buildings were mostly of dark brown or wheat-colored brick. Tenant parking was tucked discreetly behind screens of bridal wreath or in reproduction carriage-house garages with weathered wood siding. At the address Dace had given us we parked the car in a guest slot. The building was a long, two-story rectangle, with the narrow end toward the street. There were four separate entrances, each with eight apartment numbers above the outer door. We went to the door nearest the front of the building. A call phone hung on the wall of the entry. I dialed the apartment and Dace buzzed us in.

  “Nice,” LuEllen said as we stepped inside. “This is the kind of place I might do a job.” A heavy, wine-red carpet covered the lobby floor, setting off the green-figured wallpaper. Four oak doors led off the hall. Between the two on the right was an elevator. Our apartment was on the second floor, on the right as we came out of the elevator. From the outside, it would be the second apartment in, on the back side of the building, away from the driveway. I rapped on the door and Dace answered.

  “Hey, Kidd,” he said. He was barefoot, in khaki shorts and a golf shirt. He stepped back and looked curiously at LuEllen as we shook hands. I’d told him other people were involved, but hadn’t mentioned who.

  “Dace, this is LuEllen, LuEllen, Dace.” They said pleased-to-meet-yous and I said, “LuEllen is, uh, a spacial intrusion engineer.”

  “What?”

  “A burglar,” said LuEllen.

  “Oh.” Dace wiggled his eyebrows and looked interested. “Well, come on in and look around.”

  From where I was standing I could see a kitchen with a dining area, and a comfortable living room with overstuffed couches facing a console television. The fabric wallpaper was done in a discreet gold figure over beige, and nineteenth-century British sporting prints hung on the walls. A hallway led back to the bathrooms and bedrooms.

  “Pretty nice,” I said. “A little classier than I expected.”

  Dace shrugged. “He’s got an upscale business. Can’t have the place looking like a cathouse.”

  “You order the furniture?”

  “Already here. In the big bedroom.”

  He led the way to the rear of the apartment. There were four bedrooms with a bat
h off each. The master bedroom had been converted to a neat and efficient office, with a big library table in the middle and four office chairs facing it. A telephone perched on one end.

  “What happened to the bed?” I asked.

  “He took it down the hall. He owns the whole building.”

  “Is there another phone?”

  “Yeah. Four more. One in each bedroom, and one in the living room. There’s a separate line for each.”

  “Jesus, you could run a book out of here,” LuEllen said.

  “I thought about getting somebody to move the phones, but then I figured maybe you would want to do it.”

  “Good. The fewer people who see this place, the better,” I said.

  In an hour, the whole thing was set up. I moved a second phone into the office, hooked both lines through the portables, and set up the printer. I tested it by calling Bobby.

  What?

  I gave him the new number.

  Got a dump. Want now?

  Sure.

  Set to receive.

  Two minutes later I had the files in the memory of one of the computers, and dumped them to the printer. The printer took another five minutes to print out two copies.

  “I’ve never seen a computer working,” LuEllen said, looking over my shoulder as I stripped paper off the printer. Dace was in the kitchen making coffee. “What is all that stuff?”

  “Names, addresses, phone numbers, and background information on Whitemark executives, plus a few people who have home computer terminals we might want to get at. That’s where you come in.”

  “We steal their computers?”

  “No, no. We just steal the information they keep on their computer disks.”

  “I don’t know what that means.”

  “A computer disk is like magnetic recording tape, except that it’s flat, like a phonograph record. The information is stored on the disk in the form of magnetic markers. When we play the disk into the computer, the computer translates the markers into letters and puts them on the screen.”

  “So we’re going to steal the disks.”

  “I hope not. We can use the computers to copy them. It takes a minute or two to make each copy. I’d rather copy the disks and leave the originals in place so nobody will know that we took anything.”

  Dace came back with the coffee. “So. What’s next?” he asked.

  “I want to look at this stuff and do some thinking,” I said. “Why don’t we call it a day? I’ll brief both of you tomorrow morning. What we do first, where, all of that.”

  Dace nodded. “Nine?”

  “Good.”

  “Think it would be all right if I went downtown and looked at the Washington Monument and the Capitol and everything?” LuEllen asked.

  “I’ve never seen them.”

  I shrugged. “Sure. Go ahead.”

  “I’ll show you around,” Dace offered.

  When they were gone, I started working through the printout. It was neatly done, dozens of names with some personal background—appearance, credit ratings, marital status, type of automobile.

  LuEllen got back about ten o’clock, yawned, and said she was going to bed. I went back a half hour later to get a copy of the Whitemark report I’d left on the chest of drawers, and found that we were no longer sleeping together. LuEllen had moved to another bedroom.

  Curious, I poked my head into her room. The lump on the bed was too quiet to be asleep.

  “Uh, do we have a problem?”

  She half rolled toward me, so I could see a crescent of her face in the hallway light. “No, I just thought this would be better. As long as we’re, like, going into combat.”

  “Does Dace have anything to do with this?”

  There was a moment of silence.

  “He’s an awful nice guy,” she said in a small voice. “He wants to go to Mexico and write.”

  “You’re going with him?”

  “I don’t know. Nothing happened tonight, if that’s what you’re asking.” She sounded a bit frosty, like she was about to claim she wasn’t that kind of girl, but couldn’t, since we both knew she was. “He’s a nice guy. I like him.”

  “Okay, just asking,” I said, turning away from the door.

  “Kidd,” she called.

  I stepped back.

  “I like you an awful lot, too,” she said. Now she sounded sad. “But you’re not a nice guy. I always wanted, you know, a nice guy.”

  “Gee, thanks.”

  “No, really. Do you think you’re a nice guy?”

  I had to think about that for a minute. Was I a nice guy? The question had never occurred to me.

  “See?” LuEllen said in the lengthening silence.

  SOMETIMES I’M SURE I don’t relate well to women. There always seem to be a couple around, but they always leave. LuEllen, I thought, would be different. She was as self-contained as I was; we fit well together, we each thought the other was interesting. We didn’t talk too much, didn’t rub anything.

  I went back to my bedroom, accepting the change of condition, but when my undershirt came off I found myself wadding it up and pitching it at the wall like a fastball.

  THE NEXT MORNING Dace showed up at nine o’clock with a package under his arm and a look of mild embarrassment on his face. He walked casually through to the office bedroom and couldn’t quite contain a look of satisfaction when he saw the rumpled blankets in LuEllen’s bedroom.

  “Ah, I see. . . .” he said, when he noticed me noticing him.

  “Yeah, don’t worry about it. You must have hit it off last night.”

  “A fascinating woman,” he said. “We’re talking about Mexico. Afterward.”

  “So I hear.”

  LuEllen came out of the kitchen with a cup of coffee. “Are my ears burning?”

  “Just straightening out administrative details,” I said.

  “Details,” repeated Dace. “Say, we got a box.” He handed it to me.

  The box had no return address, but the post-mark indicated that it came from a California friend of mine who operates an electronics specialty business. He usually works from a rented garage, and his appliances are very, very expensive.

  “Tools,” I said. “Let’s start sorting things out.”

  Chapter 8

  What?

  Need fix on MURs.

  Give me numbers.

  Can’t be simple patch.

  Will do cutout.

  OK. How much?

  1K

  OK

  The phone company keeps computer records of local phone calls. Hackers call them “muthers,” for Message Unit Records. If a hacker uses his home phone for illegal computer entries, and the law gets interested, the phone company can check his muthers to see when and to where he made calls.

  Once Whitemark realized that their computer was under attack, they would call in federal investigators. The feds, with their Crays, could sweep the Washington muthers looking for a pattern of calls to Whitemark.

  “If Bobby did a simple software patch, one that tells the muther computer to ignore calls from this number, the feds might find the patch and read the number right off it,” I told LuEllen.

  “So what’s he going to do?”

  “He’ll rig a cutout. Every time we dial out, the call will be assigned to a random number. That’s what muther will record.”

  “He can do that from wherever he is?”

  “I don’t know. He might hire a tech out here, but for the price, I doubt it. I think he does it from wherever he is.”

  MURs out w/ random bypass.

  Thanx.

  We ready for backup.

  I’ll get back.

  We would attack Whitemark in two ways. We would enter the company’s computer system and alter it. Some of the changes would be subtle, some crude. The damage would be extensive. As the computer breakdown got Whitemark into deeper and deeper trouble, we’d open the second front: Dace would leak word of the company’s problems through the Pentagon rumor
mills and the defense press. If it was done right, Whitemark’s credibility would crumble, and with it, Hellwolf’s. But first we had to get into the Whitemark computers.

  Defense industries like Whitemark have physical security ranging from adequate to pretty tight. Fortunately for the craft of industrial espionage, they do have weak points. One of them is greed. They like the idea of their engineers and key managers working at home. Those people inevitably have home terminals with phone links to the main computer center.

  The existence of those outside terminals creates a paradoxical problem for the computer centers. On the one hand, if nonexperts, like engineers or accountants, are going to use the computers, the computers have to be friendly—easy to enter and easy to use. On the other hand, if they’re too friendly, a bunch of hackers—or spies, if paranoia’s your style—could get in and trash the system.

  The usual answer is a tough, but thin, security screen. There are a number of different techniques for building the screens, but most are based on coded access. The home users of the system would have entry codes. To get into the Whitemark computers, we had to have the codes. We had to steal them.

  The only way to do that was to get into the users’ homes. We could copy the code-carrying software and leave behind a concealed bug that would relay computer traffic. If the whole business looked like an ordinary burglary, no one would suspect that computer security had been penetrated.

  Once we had the codes, though, we had to start using them, because the damn things expire. And once we attacked the Whitemark computer, we had to keep the attack rolling. When Whitemark figured out what was happening, they would isolate the computer system and shut us out.