Access to the office was certain to show on the security screens in the lobby. Ginny had been schooled not to attempt to shield Dart’s activities from these screens. Although it risked Dart’s getting caught, it also allowed security to inform Proctor, or other superiors, of Dart’s movements-something critical to the sting working.
The clock was now running and the trap set: the cheese was there for the taking. Dart slipped into a chair in front of a computer monitor, where a screen saver drew geometric patterns on the screen. He tapped the shift key, and the screen saver vanished, replaced by dozens of computer software icons.
“I’m at a terminal,” Dart announced softly.
“Well done, people,” Haite said for the benefit of anyone eavesdropping.
Joe Dart was on-line.
If Dart was right about Martinson’s scientific ego, then she had stored copies of the earlier clinical trial reports somewhere in the mainframe’s memory, and only Martinson herself could retrieve them. Ginny could not gain entrance to the password-protected file without the cooperation of Martinson herself.
By 2:00 AM, under the authority of a wire surveillance warrant, Martinson’s two unpublished home phone lines were being monitored. Under separate warrant, Terry Proctor’s residential lines were under tap-and-trace surveillance, forbidding recording but allowing the identification of phone numbers coming and going over the lines.
Since the inception of the surveillance, no traffic had been reported at Martinson’s. Records would later show that Proctor’s lines had been incredibly active that night.
“I’m logged on,” Dart announced for Ginny’s benefit. His hope was that, if not immediately, within minutes this radio traffic would be overheard by Proctor’s people and passed up to both Proctor and Martinson.
Dart therefore had to slip up, making believable mistakes as he went. The Lexus-a car not registered to any Roxin employee-was part of that fiction; use of the police radio frequencies-impossible to scramble with so many participants involved-was also part of the ruse. Proctor had to be led to believe that Dart was close to uncovering Martinson’s files.
But so what? Dart doubted that Terry Proctor was aware of the existence of any such evidence. It seemed likely that once Zeller had blown open Martinston’s scam, Proctor would have advised her to destroy all evidence-he would have accepted Martinson’s word that she had done so. Only Martinson-and intuitively, Dart-knew the truth: No way would she destroy eleven years of research. Dart would have to enlighten Proctor, without it seeming intentional, and to sting him into panicking Martinson to finally destroy the evidence she held so dearly.
By necessity, Ginny was also part of the ruse, manipulating and monitoring and preparing to trap Martinson.
Most important was that Dart not allow himself to be discovered or abducted before completing the sting. To be caught was to fail.
“Logged on and awaiting instructions,” Dart repeated.
“Okay, Dart,” Ginny said, “here’s what I want you to do.”
Keystroke by keystroke, Ginny navigated Dart flawlessly through a hole in the upper-level security firewall that she herself had run only an hour earlier.
The Roxin Laboratories ROX NET logo, in gold and silver, sparkled on the screen, followed by a greeting and a cautionary non-disclosure statement warning of FBI investigation.
“I’m in,” Dart acknowledged.
“Enter the following,” Ginny instructed, rambling off a series of entries for Dart to duplicate.
He began typing furiously. Nervous, he made several mistakes and had to start again.
“Hold it,” Ginny said anxiously, now not having to play-act. “I’m seeing some movement within the facility.”
The lookout said, “I copy that. Lights have come on in the box.”
“I think they’re on to you, Joe,” Ginny said, her voice gripped in fear.
Dart took the news two different ways: If they were coming after him, then they knew he had broken into their computer and they knew where to find him-all of which was good, because Terry Proctor was certain to be notified; but he could not allow himself to be caught.
“I’m moving,” Dart announced. Dart left the room in a hurry, his sole mission for the next five to ten minutes to distance himself from security while maintaining the possibility of computer access. Roxin’s security computers were capable of tracking access on an office-by-office basis. The moment Dart had entered the office, the computer had registered that access and alerted the guards. Similarly, every time a security guard used his pass to enter a hallway, or an elevator, Ginny knew about it. The result was a kind of electronic cat-and-mouse-each side able to monitor the other’s movement.
Had Ginny been given days or weeks to override the security systems, she might have been capable of misleading security by creating false electronic clues for Dart’s whereabouts, thus giving him the advantage. But as it was, she was lucky to be able to monitor movements at all, and Dart was forced to keep on the move. Working against the security team was the facility’s all-glass design, for each time a hallway or office light went on, the lookout saw this and warned Dart of his pursuers’ location.
As he ran into the hall, Dart heard the lookout warn, “E-S ascending. Repeat: Eagle-Sam ascending. Copy?”
“Eagle-Sam. Copy,” Dart replied, already running down the hall in a northerly direction. For communications purposes, they had designated the structure’s four imposing elevator hubs east and west, south and north. East-south was the elevator bank nearest the parked car. Dart turned around and ran to the stairs adjacent to elevators E-N and descended to the second floor.
The complexity of the layout worked against Dart and in the favor of those who pursued him: He was a rat in a maze, and the keepers knew the way. Armed keepers, at that. Dart bounded down, pausing occasionally for the telltale sounds of anyone approaching, with a running dialogue in his ear as the lookout and Ginny both advised him of security’s location.
At 2:53 A.M. Eastern Standard Time, November 19, Dr. Arielle Martinson was recorded as logging onto Rox Net from a remote terminal in West Hartford. Ginny was right there with her.
Using a land-link telephone line that connected her to the common van via the only scrambled radio frequency available to HPD, she announced cryptically, “The fish is on the line,” just as she had been told to. “Access password,” she spelled, “is L-E-A-N-M-O-N-T.”
Ginny studied Martinson’s on-line movement, as her second laptop computer, patched into the high-speed data line by the SNET worker down the manhole outside the governor’s mansion, recorded Martinson’s every keystroke. Ginny divided her attention between the one laptop, monitoring security, and the other, monitoring Martinson. Rox Net’s central interface utilized both graphics and menus, allowing the user to click through desired addresses and functions. Martinson was clearly no stranger to the network. She moved quickly and flawlessly, often clicking her choice so fast that Ginny had no time to read or make note of it, though her laptop did record it.
Martinson’s first choice, selected from the welcoming menu, was for OTHER SERVICES. Ginny missed the names of the next two selections because of Martinson’s speed, but she caught the heading DAILY DIARY because it required a password. Martinson typed in: 1E2Q3T4Z, and Ginny wrote this down, despite the fact that the laptop continued to capture it all.
The CEO chose OPTIONS next, followed by SET DATE FUNCTION, and Ginny took note of it all because Martinson had to slow down to enter a date: June 14, 2000.
Ginny followed her with a computer hacker’s admiration. She had expected her to have used the network’s personal file area, a section devoted to an individual user’s personal storage. It was the logical location to upload information into the server. As a rule, network software restricted user storage to such limited areas, and only such areas, allowing the system operator to predict, control, secure, and maintain a specified amount of storage. Martinson had cleverly found another location that would allow the uploading of files, one that, through a series of passwords and now a date function, installed several secure gates in place, effectively locking the information away so that she, and only she, could access it.