emphatically.
âItâs exactly because of things you experienced that I hold back some information for now. We need a little more time,â Stephen said. It was a plea as much as a statement of fact. âI will tell you one thing that I havenât before. The connection between physics and biology may be closer than you think. It looks like certain properties of matter predispose the formation of life. Understand one well and you understand the other better. The symmetry in physical laws is somehow related to the organization of life. Your tests will help prove some of this. Thatâs part of the reason Iâm involved.â
Viktor sat silently for a few minutes, lost in thought, and then said, âIn some ways, thatâs not surprising. Iâve often speculated about the incredible odds involved in evolution and have never been satisfied with the idea of an overwhelming large universe, or an infinite number of multiverses, as an answer, despite what the math says is possible. But itâs all the more reason that I need to know whatâs going on.â
âWhen the timeâs right, I promise that youâll receive all the information and assurances you need, from as high an authority as you could want.â
âIâm going to hold you to that,â said Viktor. âAnd remember, I value truth, not authority.â
âDonât worry, youâll be satisfied.â
âWhat do we do about computer security in the interim? The labâs servers arenât capable of protecting the data, and things could easily get hot in more ways than one after next weekâs experiments,â Viktor stated.
âIâm taking care of that tonight,â said Stephen.
âWith your not-so-friendly friend Dan, the guy you keep trying to get in touch with? Is he even up for this? Canât we get someone else?â
âHeâs one of the best and, once heâs on board, we can depend on him without question.â Stephen looked away into the distance.
After a long pause, Viktor said, âYour silence doesnât inspire confidence.â
Stephen replied, âDan is the right guy for us. For a good part of his career, he worked in a government intelligence agency as one of its top data encryption and computer security experts. We need both of these capabilities to protect our work.â
âI hope youâre right about Dan. Take a look at this,â Viktor said. He pulled an 8½-by-11-inch image from his jacket pocket, unfolded it, and placed it on the desk between them. On it, lines indicated the major geographic features and borders of the United States. DifferentÂ-sized colored circles were dispersed over the area.
Stephen sat straight up as though a massive electric shock hadjust traveled through his spine, grabbed the image, and said, âIs this what I think it is?â
âAbsolutely. The circles indicate the type, quantity, and location of all significant amounts of nuclear material within the geographic area of the image.â
âThen what the hell are you doing carrying this around?â Stephen said loudly. âDonât you have any idea what certain countries would do to get hold of images like this, what theyâd do with them? You know what could happen.â
âSure I do.â
âHow did you generate them?â
âYouâre not the only one with clever ideas. All I did was tap into and adapt technologies that were already in place, plus borrowed equipment from a few labs. Anyway, Iâll tell you my secrets when you tell me yours.â
âYou know I could cut you out of this program anytime I want. Welch works with me,â Stephen answered with more than a little threat in his voice.
âYou can relax. Welch knows how I created the images. And weâre a long way from being able to generate global images. These are only proof-of-concepts.â
After a brief pause, Viktor added,