We were one of last prosperous families to install a phone; it was new in household when I was opted. We were prosperous because we never bought anything farm could produce. Mum disliked phone because rates to Luna City Co-op Comm Company were passed on in large measure to Authority. She never could understand why I could not ("Since you know all about such things, Manuel dear") steal phone service as easily as we liberated power. That a phone instrument was part of a switching system into which it must fit was no interest to her.

Steal it I did, eventually. Problem with illicit phone is how to receive incoming calls. Since phone is not listed, even if you tell persons from whom you want calls, switching system itself does not have you listed; is no signal that can tell it to connect other party with you.

Once Mike joined conspiracy, switching was no problem. I had in workshop most of what I needed; bought some items and liberated others. Drilled a tiny hole from workshop to phone cupboard and another to Wyoh's room--virgin rock a meter thick but a laser drill collimated to a thin pencil cuts rapidly. I unshipped listed phone, made a wireless coupling to line in its recess and concealed it. All else needed were binaural receptors and a speaker in Wyoh's room, concealed, and same in mine, and a circuit to raise frequency above audio to have silence on Davis phone line, and its converse to restore audio incoming.

Only problem was to do this without being seen, and Mum generaled that.

All else was Mike's problem. Used no switching arrangements; from then on used MYCROFTXXX only when calling from some other phone. Mike listened at all times in workshop and in Wyoh's room; if he heard my voice or hers say "Mike," he answered, but not to other voices. Voice patterns were as distinctive to him as fingerprints; he never made mistakes.

Minor flourishes--soundprooflng Wyoh's door such as workshop door already had, switching to suppress my instrument or hers, signals to tell me she was alone in her room and door locked, and vice versa. All added up to safe means whereby Wyob and I could talk with Mike or with each other, or could set up talk-talk of Mike, Wyoh, Prof, and self. Mike would call Prof wherever he was; Prof would talk or call back from a more private phone. Or might be Wyoh or myself had to be found. We all were careful to stay checked in with Mike.

My bootleg phone, though it had no way to punch a call, could be used to call any number in Luna--speak to Mike, ask for a Sherlock to anybody--not tell him number, Mike had all listings and could look up a number faster than I could.

We were beginning to see unlimited possibilities in a phoneswitching system alive and on our side. I got from Mike and gave Mum still another null number to call Mike if she needed to reach me. She grew chummy with Mike while continuing to think he was a man. This spread through our family. One day as I returned home Sidris said, "Mannie darling, your friend with the nice voice called. Mike Holmes. Wants you to call back."

"Thanks, hon. Will."

"When are you going to invite him to dinner, Man? I think he's nice."

I told her Gospodin Holmes had bad breath, was covered with rank hair, and hated women.

She used a rude word, Mum not being in earshot. "You're afraid to let me see him. Afraid I'll opt out for him." I patted her and told her that was why. I told Mike and Prof about it. Mike flirted even more with my womenfolk after that; Prof was thoughtful.

I began to learn techniques of conspiracy and to appreciate Prof's feeling that revolution could be an art. Did not forget (nor ever doubt) Mike's prediction that Luna was only seven years from disaster. But did not think about it, thought about fascinating, finicky details.

Prof had emphasized that stickiest problems in conspiracy are communications and security, and had pointed out that they conflict--easier are communications, greater is risk to security; if security is tight, organization can be paralyzed by safety precautions. He had explained that cell system was a compromise.

I accepted cell system since was necessary to limit losses from spies. Even Wyoh admitted that organization without compartmentation could not work after she learned how rotten with spies old underground had been.

But I did not like clogged communications of cell system; like Terran dinosaurs of old, took too long to send message from head to tail, or back.

So talked with Mike.

We discarded many-linked channels I had suggested to Prof. We retained cells but based security and communication on marvelous possibilities of our dinkum thinkum.

Communications: We set up a ternary tree of "party" names:

Chairman, Gospodin Adam Selene (Mike)

Executive cell: Bork (me), Betty (Wyoh), Bill (Prof)

Bork's cell: Cassie (Mum), Colin, Chang

Betty's cell: Calvin (Greg), Cecilia (Sidris), Clayton

Bill's cell: Cornwall (Finn Nielsen), Carolyn, Cotter

--and so on. At seventh link George supervises Herbert, Henry, and Hallie. By time you reach that level you need 2,187 names with "H"--but turn it over to savvy computer who finds or invents them. Each recruit is given a party name and an emergency phone number. This number, instead of chasing through many links, connects with "Adam Selene," Mike.

Security: Based on double principle; no human being can be trusted with anything--but Mike could be trusted with everything.

Grim first half is beyond dispute. With drugs and other unsavory methods any man can be broken. Only defense is suicide, which may be impossible. Oh, are "hollow tooth" methods, classic and novel, some nearly infallible--Prof saw to it that Wyoh and myself were equipped. Never knew what he gave her as a final friend and since I never had to use mine, is no point in messy details. Nor am I sure I would ever suicide; am not stuff of martyrs.

But Mike could never need to suicide, could not be drugged, did not feel pain. He carried everything concerning us in a separate memory bank under a locked signal programmed only to our three voices, and, since flesh is weak, we added a signal under which any of us could lock out other two in emergency. In my opinion as best computerman in Luna, Mike could not remove this lock once it was set up. Best of all, nobody would ask master computer for this file because nobody knew it existed, did not suspect Mike-as-Mike existed. How secure can you be?

Only risk was that this awakened machine was whimsical. Mike was always showing unforeseen potentials; conceivable he could figure way to get around block--if he wanted to.

But would never want to. He was loyal to me, first and oldest friend; he liked Prof; I think he loved Wyoh. No, no, sex meant nothing. But Wyoh is lovable and they hit it off from start.

I trusted Mike. In this life you have to bet; on that bet I would give any odds.

So we based security on trusting Mike with everything while each of us knew only what he had to know. Take that tree of names and numbers. I knew only party names of my cellmates and of three directly under me; was all I needed. Mike set up party names, assigned phone number to each, kept roster of real names versus party names. Let's say party member "Daniel" (whom I would not know, being a "D" two levels below me) recruits Fritz Schultz. Daniel reports fact but not name upwards; Adam Selene calls Daniel, assigns for Schultz party name "Embrook," then phones Schultz at number received from Daniel, gives Schultz his name Embrook and emergency phone number, this number being different for each recruit.

Not even Embrook's cell leader would know Embrook's emergency number. What you do not know you cannot spill, not under drugs nor torture, nor anything. Not even from carelessness.

Now let's suppose I need to reach Comrade Embrook. I don't know who he is; he may live in Hong Kong or be shopkeeper nearest my home. Instead of passing message down, hoping it will reach him, I call Mike. Mike connects me with Embrook at once, in a Sherlock, withoul giving me his number.


Перейти на страницу:
Изменить размер шрифта: