idea, why donât you just turn off the computers?â
Sir Clive sighed. âCome now Jack. Donât play dumb, Iâve read your CV. Youâre studying Computer Science. You know full well how vulnerable IT systems are to abuse, to malicious code. All it takes is one hacker with a lot of time on their hands. Only last year someone hacked into the Pentagonâs secure database.â
âYeah I read about that. Made me laugh. You know how he did it, Sir Clive?â Jack asked, waving a fork in his direction. âPentagon staff hadnât re-set the password from its default setting. Which was of course âPassword.â So he could just march on in and take a look at whatever he felt like. Someone like that isnât a threat. Thereâs no big ideology behind them, no political agenda, just a lonely man engaged in a painful piece of attention seeking.â He chewed thoughtfully on a mouthful of korma, it wasnât half-bad.
âAn IT system is only as secure as the people who use it,â he continued, warming to his theme. âYou want to guard against Cyber Terrorism, try teaching your staff to change their password on a regular basis.â He could feel his strength coming back with the food, he was starting to feel more bolshie.
Sir Clive picked at his madras. It wasnât up to the usual standard.
âThereâs more to it than that, Jack. Estonia last year. Defence websites brought to a standstill. A highly co-ordinated attack by a network of high-jacked computers. A botnet. Zombie machines.â
Jack sat back in his chair. He could feel his belly expanding, seemed to be pulling against the stitches. Maybe heâd have to save the bharji for later. âBotnets?â He said thoughtfully. Sir Clive sensed heâd got his attention.
âI wrote a paper on the topic last year.â Jack said, âtheyâve been around for a while, but no one really knows how many are out there. Malicious code is downloaded as part of an innocent-looking app, then lies dormant in a home PC awaiting an order. People donât even realise theyâre part of a high-jacked network. So easy with all the kids file sharing.â
Sir Clive relaxed a little, satisfied Cambridge still appeared to be teaching its students something useful.
âExactly. Once the malicious code is installed, it simply waits to be told what to do, and then . . . â He paused, âand then youâve got yourself a problem.â He pushed his plate away, dissatisfied at the mildness of the dish. âBut you know what the real problem is in preparing for Cyber war?â Sir Clive asked, pausing for effect.
âNo, but I suspect youâre about to tell me.â Jack replied.
âYou can never be certain whoâs attacking you. Impossible to trace who set up the servers, who wrote the code. A network of zombie machines in China can be programmed to send an attack from anywhere in the world, to anywhere in the world. Does that mean the Chinese are behind it? Of course not. Could be anyone.â
âIf it could be anyone then it could be the Chinese,â Jack said belligerently. Sir Clive laughed, shook his head. âYouâre right, good to be suspicious. Coffee and a brandy?â
âWhy not?â Jack replied, watching Sir Clive, sensing he might finally be about to get to the point. Sir Clive leaned in close, drew a deep breath.
âIt was a carefully planned operation, Jack. You and the other nine patients. The implanted devices. A careful set-up, a steady leak of information from our side, a couple of servers not quite as secure as they should be, discussing a new project. We knew the concept would be irresistible. Once the word was out about the devices weâd developed theyâd be queuing up to try and steal them. The price of a thing like that on the open market would be astronomical. All we had to do was set up the clinical trial then sit back and