Decoy
idea, why don’t you just turn off the computers?”
    Sir Clive sighed. “Come now Jack. Don’t play dumb, I’ve read your CV. You’re studying Computer Science. You know full well how vulnerable IT systems are to abuse, to malicious code. All it takes is one hacker with a lot of time on their hands. Only last year someone hacked into the Pentagon’s secure database.”
    â€œYeah I read about that. Made me laugh. You know how he did it, Sir Clive?” Jack asked, waving a fork in his direction. “Pentagon staff hadn’t re-set the password from its default setting. Which was of course ‘Password.’ So he could just march on in and take a look at whatever he felt like. Someone like that isn’t a threat. There’s no big ideology behind them, no political agenda, just a lonely man engaged in a painful piece of attention seeking.” He chewed thoughtfully on a mouthful of korma, it wasn’t half-bad.
    â€œAn IT system is only as secure as the people who use it,” he continued, warming to his theme. “You want to guard against Cyber Terrorism, try teaching your staff to change their password on a regular basis.” He could feel his strength coming back with the food, he was starting to feel more bolshie.
    Sir Clive picked at his madras. It wasn’t up to the usual standard.
    â€œThere’s more to it than that, Jack. Estonia last year. Defence websites brought to a standstill. A highly co-ordinated attack by a network of high-jacked computers. A botnet. Zombie machines.”
    Jack sat back in his chair. He could feel his belly expanding, seemed to be pulling against the stitches. Maybe he’d have to save the bharji for later. “Botnets?” He said thoughtfully. Sir Clive sensed he’d got his attention.
    â€œI wrote a paper on the topic last year.” Jack said, “they’ve been around for a while, but no one really knows how many are out there. Malicious code is downloaded as part of an innocent-looking app, then lies dormant in a home PC awaiting an order. People don’t even realise they’re part of a high-jacked network. So easy with all the kids file sharing.”
    Sir Clive relaxed a little, satisfied Cambridge still appeared to be teaching its students something useful.
    â€œExactly. Once the malicious code is installed, it simply waits to be told what to do, and then . . . ” He paused, “and then you’ve got yourself a problem.” He pushed his plate away, dissatisfied at the mildness of the dish. “But you know what the real problem is in preparing for Cyber war?” Sir Clive asked, pausing for effect.
    â€œNo, but I suspect you’re about to tell me.” Jack replied.
    â€œYou can never be certain who’s attacking you. Impossible to trace who set up the servers, who wrote the code. A network of zombie machines in China can be programmed to send an attack from anywhere in the world, to anywhere in the world. Does that mean the Chinese are behind it? Of course not. Could be anyone.”
    â€œIf it could be anyone then it could be the Chinese,” Jack said belligerently. Sir Clive laughed, shook his head. “You’re right, good to be suspicious. Coffee and a brandy?”
    â€œWhy not?” Jack replied, watching Sir Clive, sensing he might finally be about to get to the point. Sir Clive leaned in close, drew a deep breath.
    â€œIt was a carefully planned operation, Jack. You and the other nine patients. The implanted devices. A careful set-up, a steady leak of information from our side, a couple of servers not quite as secure as they should be, discussing a new project. We knew the concept would be irresistible. Once the word was out about the devices we’d developed they’d be queuing up to try and steal them. The price of a thing like that on the open market would be astronomical. All we had to do was set up the clinical trial then sit back and

Similar Books

A Baby in His Stocking

Laura marie Altom

The Other Hollywood

Legs McNeil, Jennifer Osborne, Peter Pavia

Children of the Source

Geoffrey Condit

The Broken God

David Zindell

Passionate Investigations

Elizabeth Lapthorne

Holy Enchilada

Henry Winkler