organization that hired more forensic investigators than CyberNet. And, no, he wasnât being paid the big bucks, such as they were, to break into systems; he was paid to figure out how identity thieves had made their way into the systems and to make sure that no one else could ever do the same.
The truth, however, was that like every other cybersleuth, it was ânailing the targetâ that Gil loved. Once he had proof positive of a crime and the identity of the perpetrator, the task of making the system secure for the future didnât run anywhere near a close second. It was the very love of the hunt and his dislike for the cleanup that ended up being Gilâs salvation.
While looking for a shortcut in order to patch up the FBIâs payroll system, heâd written a set of computer instructions designed to sniff out the gaps in the original program. He called his subprograms Dobermans because, once set in motion, they hunted down their prey and pounced on it, holding it at bay until he gave them the okay to obliterate it. A single tap on the return key and the security breach in the system was literally gobbled up.
At the time, George had been beside himself with joy. He predicted that, with Gilâs Dobermans in action, the world would be beating a path to CyberNetâs door. Which it had, though the money never seemed to find its way beyond Georgeâs office on the top floor. Gil looked around at his own small, windowless office.
Well, so much for the Trickle-Down Theory of Economics .
Gil swiveled to face the largest of his three computer screens and settled back to savor his morning bagel and cream cheese as he perused his e-mail. It was early, George wouldnât be in for a couple of hours, and Gil would have plenty of time to figure out how he was going to play down last Fridayâs dinner fiasco with Ludlow.
The familiar âYouâve Got Mailâ alert interrupted Gilâs final sip of coffee.
Jesus! Whatâs he doing in this early?
Obviously, someone had already informed George of the problem. Nothing but a potentially lost source of income would get the big guy in at this hour.
A piercing alarm proclaimed that Gilâs main computer had gone down and the rest were about to follow. He rushed to delete Georgeâs message. He was too late. The screens on his two alternate computers and the lights on his Internet server went dark. Gil held his breath as he waited for the whirr that would confirm that the backup system had kicked in. He sighed with relief. The backup systemâs welcome drone promised that, within a few minutes, everything would be up and running and more than seven terabytes of information would have been saved from oblivion.
Until recently, Georgeâs e-mail would have simply meant yet another pain-in-the-ass communication that required Gilâs attention. For the past two weeks, however, any incoming e-mail bearing Georgeâs screen name sent Gilâs computer network crashing.
Gil had warned George that if he continued to refuse to incorporate RSA security codes, they were inviting a major hacking catastrophe. George refused to discuss the matter. Gil offered to brave Georgeâs maze of computers to try and tease out the problem. George refused. Finally, they came to a truce. Gil agreed to drop the whole thing with the promise that George would phone, rather than send any e-mail until Gil figured out a workaround. The cease-fire lasted two days. By the third day, the big guy was sending e-mail messages as if there had never been a problem.
Each time an incoming e-mail shut Gil down, George would claim, as if for the first time, that he was doing his best to remember. âAfter all,â he would add with a shrug and an innocent smile, âI guess Iâm just a creature of habit.â
Gil pulled his chair in close to the largest of the monitors and rapidly typed in a series of commands. Line by line, he examined the