The Bear and the Dragon - Tom Clancy [107]
"Good luck, honey," Nomuri whispered, as he closed the door and headed to the bathroom for a shower.
CHAPTER 14—(dot)com
It was a sleepless night for Nomuri. Would she do it? Would she do what she was told? Would-she tell a security officer about it, and then about him? Might she be caught with the CD-ROM going into work and questioned about it? If so, a casual inspection would show it to be a music CD, Bill Contis musical score for Rocky—a poorly marked knockoff of an American intellectual property that was quite common in the PRC. But a more careful examination would have revealed that the first—outermost—data line on the metallic surface told the computer CD-ROM reader to skip to a certain place where the content was not music, but binary code, and very efficient binary code at that.
The CD-ROM didnt contain a virus per se, because a virus circulates mainly across computer networks, entering a computer surreptitiously the way a disease organism enters a living host (hence the term virus). But this one came in the front door, and on being read by the CD-ROM reader, a single prompt came up on the screen, and Ming, after a quick look-around in her office, moved her mouse to put the pointer on the prompt, clicked the INSTALL command, and everything immediately disappeared. The program thus implanted searched her hard drive at nearly the speed of light, categorizing every file and setting up its own index, then compressing it into a small file that hid in plain sight, as it were, identified by any disk-sorting program with a wholly innocent name that referred to a function carried out by another program entirely. Thus only a very careful and directed search by a skilled computer operator could even detect that something was even there. Exactly what the program did could only be determined by a one-by-zero reading of the program itself, something difficult to accomplish at best. It would be like trying to find what was wrong with a single leaf on a single tree in a vast forest where all the trees and all the leaves looked pretty much alike, except that this one leaf was smaller and humbler than most. CIA and NSA could no longer attract the best programmers in America. There was just too much money in the consumer electronics industry for government to compete effectively in that marketplace. But you could still hire them, and the work that came out was just as good. And if you paid them enough—strangely, you could pay lots more to a contractor than to an employee—they wouldnt talk to anyone about it. And besides, they never really knew what it was all about anyway, did they?
In this case, there was an additional level of complexity that went back over sixty years. When the Germans had overrun the Netherlands in 1940, theyd created a strange situation. In Holland the Germans had found both the most cooperative of their conquered nations and the most fiercely resistant. More Dutchmen per capita had joined the Germans than any other nationality—enough to form their own SS division, SS Nordland. At the same