“Not really—?”
“No,” admitted Handley. “The VACCINE program took care of most of them. Although, to tell the truth, rumor has it that there are still a couple of VIRUS programs floating around loose, ones with an immunity factor.”
“The whole thing is just crazy enough to be true, you know.”
“Believe me, it is. Or was. Anyway, what I’m getting at is this: There were a few people, programmers mostly, who realized that the VIRUS program was more than just a practical joke. For instance, why did it have to dial phone numbers at random? Why not provide it with a complete directory of other computers’ phone numbers?”
“Where would they get that?”
“The phone company.”
“Would they release such information?”
“You don’t even need to ask them. You feed a modified VIRUS program into the phone company’s computer. It searches the memory banks for phone numbers assigned to computers, makes a list of them, then dials your phone number and injects itself and its stolen information into your machine, where you can examine it at leisure.”
“Wow…” whispered Auberson.
“That’s not all. Once you have that list of phone numbers, you can tap into any computer you want, raid it for any information you want, and do it all without any possibility of being detected. Or, you could set the VIRUS program to alter information in another computer, falsify it according to your direction, or just scramble it at random, if you wanted to sabotage some other company.”
“I’m beginning to see the dangers of such a thing. What would happen if somebody erased everything in the Master Beast?”
“Right. That’s one of the reasons the National Data Bureau was three years late in setting up its files. They couldn’t risk that kind of security breach, let alone the resultant outcry if the public felt that an individual’s supposedly private dossier could be that easily tapped.”
“Well, there must have been safeguards—”
“Oh, there were — right from the start — but you don’t know programmers, Aubie. Any system that big and that complex is a challenge. If there’s a fault in it, they’ll find it. They function as a hostile environment for computers, weeding out inferior systems and inadequate programs, allowing only the strong to survive. They force you to continually improve your product. If IBM makes a claim that their new system is foolproof, it may well be — but if it’s not genius-proof as well, within a week one of their own programmers will have figured out a way to foul it up.”
Auberson looked at him. “Why?”
“Isn’t it obvious? Purely for the sheer joy of it. They’re like kids with a big, exciting toy. It’s a challenge, a way for man to prove he’s still mightier than the machine — by fouling it up.” He lifted his coffee cup, discovered it was empty, and settled for a glass of water instead. “It happened right here with our own Master Beast. Remember when we set it up, how we said no one would be able to interfere with anyone else’s programs? Well, within two days the whole system had to be shut down. Someone — we still don’t know who — had added a note of his own to the Memo-Line. It was titled something like ‘Intersexual Procedures in the Modern Corporation.’ As soon as somebody punched for that title — and that didn’t take long — the machine began hunting for the memo to accompany it. Of course, there was none, but the hunting procedure (accidentally, it seemed) triggered a ‘go-to-the-next-function, repeat-previous-function’ loop. The machine started twiddling its fingers, so to speak, and immediately registered ‘Busy, No Time Available’ on all its terminals. Well, we knew that couldn’t be possible — the Master Beast was designed to handle more than maximum possible load, an allowance for future growth — so we shut down the system and went exploring. You know, we had to write a whole new program just to prevent that from happening again.”
“Hm,” said Auberson.
“Anyway, I’m getting off the track. What I was driving at is that you have no way of knowing about a flaw in your system until someone takes advantage of it. And if you correct that one, likely as not there’s still half a dozen more that someone else is liable to spot. The National Data Bureau is more than aware of that. Congress wouldn’t let them establish their memory banks until they could guarantee absolute security. It was the VIRUS programs that were giving them their biggest worries.”
“I can think of one way to avoid the problem. Don’t put in a phone link to the Data Banks.”
“Uh uh — you need that phone link. You need it both ways, for information coming in and going out. Any other way just wouldn’t be efficient enough.”
“And the VACCINE program wouldn’t work?”
“Yes and no. For every VACCINE program you could write, somebody else could write another VIRUS program immune to it.”
“That doesn’t sound very secure.”
“It isn’t — but that’s the way it is. Any safeguard that can be set up by one programmer can be breached or sidestepped by another.”
“Well, then, what did they finally do with the Data Banks?”
“Search me,” Handley shrugged. “It’s classified information — top secret.”
“Huh?”
“All I know is that one day they announced that they’d solved the problem and could now guarantee absolute security of information — the National Data Banks are now in business. If I knew how they’d done it, maybe I could figure out a way to get around it, so that’s why it’s classified.”
“How do you think they did it?”
“Who knows? Perhaps they have an all-encompassing VACCINE where the key to breaking it would be to work out the ultimate value of pi. You could connect with it, but you’d never get any information out of the machine — your computer would be too busy computing an irrational number. Or maybe they have a complicated system of check-backs and ask-me-agains. Or maybe they have a thing which erases your program as it makes its requests. Or maybe they have some kind of program-analyzing function which automatically cancels out and traces back to its source anything that even remotely resembles an unauthorized program. I know that’s what a lot of lesser corporations have done. Or maybe they’ve got a combination of all these things. The only way to program the machine is through a coded input — and the codes change every hour according to a random number table. Output is the same, except over the phone, where you need a special code key for your computer as well.”
“Wow,” said Auberson.
Handley shrugged again. “National security,” as if that were enough explanation. “The problem is that it’s very hard to maintain any kind of security system when anyone with a console and a telephone can tap into your banks. A lot of smaller companies with their own computers can’t afford the same kind of really sophisticated protection. A skillfully written information-tapping VIRUS program would be very hard to distinguish from an ordinary request for information — especially if both were coming in over the phone.”
“Couldn’t you classify certain information as not to be released over the phone?”
“Not if you want it retrievable. Aubie, anything you can program a computer to do, someone else can program it not to do. Or vice versa.”
“Oh,” said Auberson.
“Anyway, for the most part, most companies have protected themselves with analysis programs which hopefully weed out all unauthorized programs.”
“You say ‘hopefully’…?”
“Well, most of them are based on a user giving the correct code signal when he punches in to certain classified programs — a different recognition signal for each authorized user. If he doesn’t give the right one, the receiving computer disconnects. Most of the code signals are simple patterns of digit combinations. If somebody were really patient, he could keep dialing and re-dialing, each time trying a different signal. Sooner or later, he’s bound to hit someone’s recognition code.”