He had spent most of the flight using his computer to search for Maya. All these efforts were channeled through the Brethren’s Internet monitoring center located in an underground site in central London.

Privacy had become a convenient fiction. Kennard Nash once lectured on that subject to a group of Evergreen Foundation employees. The new electronic monitoring had changed society; it was as if everyone had been moved into a traditional Japanese house with interior walls constructed of bamboo and paper. Although you could hear people sneezing, talking, and making love, the social assumption was that you shouldn’t pay attention to it. You had to pretend the walls were solid and soundproof. People felt the same way when they walked past a surveillance camera or used a cell phone. These days the authorities were using special X-ray machines at Heathrow Airport that could see through passengers’ clothes. It was disturbing to realize that different organizations were watching you, listening to your conversations, and tracking your purchases-so most people pretended that it wasn’t true.

Government officials who supported the Brethren had provided access codes to crucial databases. The largest source was the Total Information Awareness system, established by the American government after the passage of the United States Patriot Act. The TIA database was designed to process and analyze every computer-connected transaction in the country. Whenever a person used a credit card, checked out a library book, transferred money overseas, or went on a trip, the information was entered into the centralized database. A few libertarians objected to this intrusion, so the government transferred control of the program to the intelligence community and changed its name to the Terrorism Information Awareness system. Once the word “Total” was replaced by the word “Terrorism,” all the criticism stopped.

Other countries were passing new security laws and setting up their own versions of TIA. In addition, a variety of privately owned companies were collecting and selling personal information. If the Tabula employees at the computer center in London couldn’t obtain the access codes, they had software programs called Peephole, Hacksaw, and Sledgehammer that allowed them to break through firewalls and enter every database in the world.

Boone felt that the most promising weapons in the battle against the Brethren’s enemies were the new computational immunology programs. The CI programs had originally been developed to monitor the Royal Mail’s computer system in England. The Brethren’s programs were even more powerful. They treated the entire Internet as if it were an enormous human body. The programs acted like electronic lymphocytes that targeted dangerous ideas and information.

During the last few years, CI programs had been released onto the Internet by the Brethren’s computer team. The self-contained programs wandered unnoticed through thousands of computer systems. Sometimes they lingered like a lymphocyte in a person’s home computer, waiting for an infectious idea to appear. If they found something suspicious, the program would return to the host computer in London for further instructions.

The Brethren scientists were also experimenting with a new interactive program that could actually punish the Brethren’s enemies, like a cluster of white blood cells dealing with an infection. The CI program identified people who mentioned the Travelers or the Harlequins in their Internet communications. Once that was done, the program automatically placed a data-destroying virus in the owner’s computer. A small proportion of the most dangerous computer viruses on the Internet had been created by the Brethren or their government allies. It was easy to place the blame on a seventeen-year-old computer hacker living in Poland.

Maya had been tracked down using both computational immunology and a conventional data scan. Three days earlier, the Harlequin had entered an automobile parts warehouse and killed some mercenaries. When Maya fled the area, she’d either had to walk, get a ride from someone, buy a car, or find public transportation. The computer center in London had sorted through Los Angeles police reports involving a young woman in the target area. When that wasn’t successful, they entered taxi company computer systems to discover what passengers hired cabs during the four-hour period after the murders. These pickup and drop-off addresses were matched against information obtained by the CI programs. The central computer had the names and addresses of thousands of people who might help the Travelers or the Harlequins.

Five years ago, the Brethren’s psychological evaluation team had plugged into the computers of the shopping clubs run by American grocery stores. Whenever a person bought something and used their discount card, the purchases were entered into a general database. During the initial study, the Brethren’s psychologists attempted to match a person’s food and alcohol consumption with their political affiliation. Boone had seen some of the statistical correlations and they were fascinating. Women living in northern California who bought more than three kinds of mustard were usually political liberals. Men who bought expensive bottled beer in East Texas were usually conservative. With a home address and data from a minimum of two hundred grocery-store purchases, the psychological evaluation team could accurately predict a person’s attitude toward a mandatory citizen ID card.

Boone found it interesting to see what kind of people resisted social discipline and order. Opposition sometimes came from antitechnology tree huggers who ate organic food and shunned the factory food manufactured by the Vast Machine. But equally troublesome groups were organized by the high-technology freaks that ate candy bars for dinner and searched the Internet for rumors about the Travelers.

By the time Boone’s plane flew over Pennsylvania, the monitoring center had sent a message to Boone’s computer. Drop-off address corresponds to residence of Thomas Walks the Ground-nephew of a terminated Native American Traveler. Computational immunology picked up negative remarks concerning the Brethren placed by this individual on a Crow tribe Web site.

The jet plane banked steeply as they approached a regional airport near the Evergreen Foundation’s research center. Boone switched off his computer and glanced over at Michael. The Brethren had found this young man and saved him from the Harlequins, but he might refuse to cooperate. It annoyed Boone that people still refused to recognize the truth. There was no need to worry about religion or philosophy; the truth was determined by whoever was in power.

* * *

THE CORPORATE JET landed at the Westchester County Airport and taxied to a private hangar. A few minutes later, Boone climbed down the steps of the plane. The sky was gray with clouds and there was a cold autumn feeling in the air.

Lawrence Takawa was waiting beside the ambulance that would transport Michael to the Evergreen Foundation Research Center. He gave orders to a team of paramedics, and then walked over to Boone.

“Welcome back,” Takawa said. “How’s Michael?”

“He’ll be all right. Is everything ready at the center?”

“We were prepared two days ago, but we’ve had to make some last-minute adjustments. General Nash contacted the psychological evaluation team and they’ve given us a new strategy for dealing with Michael.”

There was a slight tension in Lawrence Takawa’s voice and Boone glanced at the young man. Every time he saw Nash’s assistant, Lawrence was carrying something-a clipboard, a folder, a piece of paper-an object that proclaimed his authority.

“Do you have a problem with that?” Boone asked.


Перейти на страницу:
Изменить размер шрифта: