to the point of being counterproductive. One section might create an action, another would stop it; then it would be created again, then stopped again, sometimes in long, pointless strings. An amazing amount of code could be written to produce almost nothing. Useless code lay everywhere, occupying a cyber universe with its clutter.
Then there were the hackers such as Vladimir. These were artists of the most rare and talented sort. Their code was lean and strong, producing results with the sparest of keystrokes. What they wrote was elegant, masterful.
The Russian had made his cyber reputation by discovering a vulnerability in Windows XP. He’d posted the details in various chat rooms to claim the credit. Several weeks later, Microsoft confirmed the vulnerability when it released a patch to repair it. Vladimir had responded by posting the details of a second vulnerability. This time it took Microsoft three months to release a patch.
In standard computer protocol, Vladimir had no business publishing the vulnerabilities. He should have given the information directly to the company. By taking the approach he had, he’d gained an initial reputation for himself, but he’d also exposed many thousands of Windows XP owners to virus attacks. By posting, he had been able to claim full credit. Had he notified Microsoft, then posted the details only after the security patch was released, he would have been mocked.
Vladimir’s reputation had grown when he posted the first vulnerability in Windows Vista within hours of its being released. In fact, he’d discovered three vulnerabilities while examining the beta version—but by that time he was losing interest in what he considered the juvenile game of claiming credit for finding weaknesses in the software giant’s programs. It was impossible to produce a complex program to serve so many millions of users and not leave something vulnerable. He’d claimed the one, but had quietly informed Microsoft of the other two.
Still, Vladimir’s reputation had been made. He’d had no lasting desire to involve himself daily in the cyber-hacker world and had always been a private person, so with the posting of the first Windows Vista vulnerability, he’d withdrawn from regular active exposure in the hacker chat rooms and forums.
By this time Vladimir had realized he possessed an extraordinary aptitude. It took another two years to turn it into meaningful income. Now his services were much sought after, and he could pick and choose his assignments. He maintained an e-gold account—a digital gold currency created to allow the instant transfer of gold ownership between users—into which his fees were deposited outside Russia. There were over 3 million e-gold accounts and nearly 4 million ounces of gold in storage. But one of the unintended uses of the accounts was to, in essence, allow the laundering of payments.
For his immediate need, Vladimir decided no help was to be found on the Internet. He returned to the code he was writing and tried again. Still … something eluded him. He went back and rewrote a section, then nodded. He copied the sequence and dropped it into his test computer. It worked.
Vladimir smiled. Slick. This last was his best. Even he was impressed.
9
MANHATTAN, NYC
IT CENTER
FISCHERMAN, PLATT & COHEN
TUESDAY, AUGUST 15
2:32 A.M.
As was his habit when working, Jeff set his digital watch to chirp every two hours. When it went off, he would stand from his station, stretch, then take a walk around the offices to exercise his body and clear his head, though a part of him never let go of the problem he was grappling with. He’d drink a Coke or a cup of black coffee, use the restroom, wash his face, then return to his place.
Respectful of his dedication, Sue didn’t break his concentration with idle chatter or questions about what she was seeing over his shoulder. She took her breaks at different times, always returning with the smell of cigarette smoke about her.