Chapter 28

“Well, there’s no doubt now, is there?” said Shoshana, shifting her gaze from the painting to Dr. Marcuse and then back again. “That’s me again, all right.”

They were in the main room of the bungalow, watching the live video feed as Hobo painted away in the gazebo. Four LCD monitors were lined up on a workbench, one for each of the cameras; it reminded Shoshana of the security guard’s station in her apartment building’s lobby.

Marcuse nodded his great lump of a head. “Now, if he’d just paint something other than you.” A pause. “Note that he’s doing your same profile again: you looking off to the right. If he’d done it the other way, that might have torpedoed my thought about it reflecting brain lateralization.”

“Well,” said Shoshana, “it is my good side.”

He actually smiled, then: “Okay. Let’s put your video-editing skills to work.”

Shoshana had a not-so-secret hobby: vidding. She took clips of TV shows she’d snagged from BitTorrent sites and cut them to fit popular songs, making humorous or poignant little music videos that she shared with like-minded vidders on the Web. Her fandoms included the TV medical drama House, which had a lot of slashy subtext that was great for mixing to love songs, and the latest incarnation of Doctor Who. Marcuse had caught her working on these once or twice over lunch, using the fancy Mac the Institute had had donated to it.

“When Hobo’s done,” continued Marcuse, “take the footage from all four cameras and splice together a version that shows the whole thing as it happened. Real Hollywood-style, okay? Shot of Hobo, shot of canvas over Hobo’s shoulder, close-up on canvas, back to Hobo, like that. I’ll write up a voice-over commentary to go with it.”

“Sure,” Shoshana said, looking forward to the assignment. Timbaland has nothing on me.

“Good, good.” Marcuse rubbed his big hands together. “After this hits YouTube, the only cutting room our Hobo is going to be involved with is your edit suite.”

* * *

“What we really could use,” Kuroda said, down in the basement, “is an expert on self-organizing systems.”

“And there’s never one around when you need one!” Caitlin declared in mock seriousness. “But my dad’s a physicist. He must know something about them.” In fact, he knew something about just about everything, in her experience — at least in theoretical areas. “I’ll go get him.”

Caitlin headed upstairs. She took a detour, going all the way up to her bedroom first. It really was chilly in the basement, so she grabbed her PI sweatshirt, which her mom had thoughtfully run through the dryer after last night’s storm.

She found her dad in his den, which was a little room near the back of the house. It was easy enough tracking him down: he had a three-disc CD player in there, which seemed perpetually loaded with the same discs: Supertramp, Queen, and The Eagles. “Hotel California” was playing as she stepped through the open doorway. He was typing on his keyboard; he had an ancient, heavy IBM one that clicked loudly. She rapped her knuckles gently on the door jamb, in case he was too absorbed in his work to notice her arrival, and said, “Can you help Dr. Kuroda and me?”

She heard his chair pushing back against the carpet, which she took as a “yes.”

Once they got downstairs, Caitlin let her dad have the chair she’d been sitting in, and she leaned against the worktable; through the small window, she could hear a few of the neighborhood kids playing street hockey. Anna Bloom was still hooked up via webcam from the Technion in Israel.

“Even if there are lost packets persisting on the infrastructure of the Web,” her dad said, after Kuroda had briefed him, “why would Caitlin see them? Why would they be represented at all in the feed she’s getting from Jagster?”

Kuroda shifted noisily in his chair. “That’s a good question. I hadn’t—”

“It’s because of the special method Jagster uses to get its data,” Anna said.

“Sorry?” said Kuroda, and “What?” said Caitlin.

Anna’s voice sounded tinny over the computer’s speakers. “Well, remember, Jagster was created as an alternative to the Google approach. PageRank, the standard Google method, looks for how many other pages link to a page, right?

But that isn’t necessarily the best measure of how frequently a page is accessed. If you’re looking for info on a hot rock star, like, say, Lee Amodeo…”

“She’s awesome!” said Caitlin.

“So my granddaughter tells me,” said Anna. “Anyway, if you’re interested in Lee Amodeo, how do you find her website? You could go to Google and put ‘Lee Amodeo’ in as the search term, right? And Google will serve up as number one whichever page about her has the most links to it from other pages. But the best Lee Amodeo page isn’t necessarily the one people link to the most, it’s the page they go to the most. If people always go directly to her page by correctly guessing that the URL is leeamodeo.com—”

“Which it is,” Caitlin said.

“ — then that might be the most popular Lee Amodeo site even if no one links to it, and Google wouldn’t know it. And, in fact, if you upload a document to the Internet but don’t link it to any Web page, but you send a link to it to people via email, again, Google — and other search engines — won’t know it’s there, even if ten thousand people access the document through the email links.”

“Okay,” her dad said. Caitlin doubted Anna knew how privileged she was to get an acknowledgment at all.

Anna went on. “So, besides just traditional spidering, Jagster monitors raw Web traffic going through major trunks, looking at the actual stream of data moving through the routers, and that would include lost packets.”

“Isn’t that sort of like wiretapping?” Caitlin asked.

“Well, yes, exactly,” said Anna. “But Jagster is the good guy here. See, in 2005, a whistle blower named Mark Klein outed the fact that AT T has special equipment at its central office in San Francisco — and, indeed, at several of its other facilities — that allows the NSA to tap into raw Internet traffic.”

Caitlin knew the NSA was the National Security Agency in the US. She nodded.

“It’s a tricky technical problem,” continued Anna. “You can monitor what’s going on in copper wire without interfering with the signal, because the magnetic fields leak out. But more and more of the Web is carried by fiber optics, and those don’t leak. If you want to monitor the traffic, you actually have to put in a splitter, diverting part of the signal, which reduces the signal’s strength. And that, among other things, was what they were — and are — doing at AT T, apparently. It’s called vacuum-cleaner surveillance: they just suck up everything that’s going down the pipe.”

“And that’s where Jagster gets its data?” Caitlin asked. “From AT T?”

“No, no,” said Anna. “There’s a class-action suit about all this, initiated by the Electronic Frontier Foundation: Hepting versus AT T.” She paused, perhaps trying to remember — or maybe she was googling at her end. “AT T is a for-profit corporation, but an awful lot of Internet traffic goes through universities — always has, right back to the early days. And a bunch of universities decided to tap their trunks, just to show what sort of data could be mined, so they could file amicus briefs in Hepting; they wanted to show that the government could access all sorts of private stuff this way — things they should need a warrant to get. The university consortium put scrambling routines in up front, so that certain data strings — email addresses, credit-card numbers, and the like — are always munged before the feed is made public, but otherwise, they’ve basically done what AT T did under government instructions, in order to demonstrate, despite the government’s claims to the contrary, just how invasive this sort of monitoring can be.”


Перейти на страницу:
Изменить размер шрифта: