22
 
Gwen walked into the Parklawn Building on Monday morning with a bit less enthusiasm than usual. A meeting with Ralph Snyder could do that to a person. Gwen deliberately wore her PHS dress whites. There was nothing like gold eagles on a woman’s blouse to keep a man like Snyder mired in his insecurity. She was going to act professionally and she considered dressing the part to be essential for a possible confrontation with this pencil pusher.
When she reached Snyder’s pallid office suite, Snyder’s secretary motioned for Gwen to sit, shrugging apologetically. Did the man have anyone who truly respected him?
The magazines on the end tables were predictably sterile. Gwen absentmindedly leafed through twenty pages of Public Administration when Snyder’s door opened, revealing a man whose comb-over was less convincing than usual, strands of hair clumped on his all-too-visible bald pate.
“Good morning, Dr. Maulder,” he said thinly.
He motioned her toward the famous “victim’s chair” in his office. Rumor had it that he’d shortened one leg of this chair to keep his subjects uncomfortable during their encounters with him, a trick he’d likely learned from a correspondence course on leadership and intimidation. The chair kept tottering on its uneven legs, forcing Gwen to spend much too much attention on keeping her balance. She flashed on Fitz Rule Number Four: Don’t let the morons of the world cause you to compromise your beliefs.
“Bring me up to date on your work in the Epidemiology Division, if you would,” Snyder began, settling into his armchair. He was a thin man, and his baggy suit was obviously straight off the rack.
Gwen realized instantly that Snyder was playing games, asking her to state what he already knew. She obliged him, however, by going through the general protocols for her department. She explained that her division of the Center for Drugs was a support unit for the entire Center, the mission of which was to track underlying disease processes in the general population. She often received assignments that went beyond these parameters, but this explanation encompassed the main mission statement of her department. If the FDA were considering approval for a new cholesterol-lowering drug, for instance, her unit could provide up-to-the-minute information on how many people in the country had high cholesterol and to what degree. Along these lines, she related to Snyder the results of a recent study on the prevalence of asthma in inner-city children.
Snyder clasped his hands, elbows resting on the arms of his chair. “That’s all very interesting, and I’m sure it’s invaluable to the scientific community, but my job, Dr. Maulder, is to make sure that our manpower is used to the taxpayers’ maximum advantage. I’m afraid I’m going to have to shift the focus of your efforts, at least temporarily. Your colleague, Dr. Wayne Spitzer, will be overseeing your division’s studies for an unspecified period. I’ve gotten complaints from the front office that we’re two years behind in reporting out our Adverse Event files from the Medwatch system—you know, the voluntary reporting database. It’s all about the 9/11 Commission Report. Someone upstairs is worried that we may have some data buried in those files related to bioterrorism. Expertise like yours is our only hope for catching up. I’m assigning you to examine these files.”
Gwen had prepared for many different scenarios for this meeting, but not this one. “But those AE reports and Medwatch belong to the Office of Drug Safety. That has nothing to do with my mandate. Everybody knows that the stuff in that database is useless from an epidemiologist’s perspective.”
“I understand your concern, Dr. Maulder, but this request comes from the highest levels. We have increasing intelligence that terrorists might attempt to tamper with the pharmaceutical supply chain in order to harm Americans. Rumors have surfaced that there have been some dry runs. Perhaps the FDA already has evidence that it has overlooked. Given the post 9/11 climate, we have decided that we need to examine certain files to be sure that we haven’t overlooked anything that might indicate terrorist activity.”
“But the CDC has BioNet to handle that kind of job, sir. With all due respect, I think we’d be wasting the taxpayers’ money.”
Snyder flashed a humorless smile. “BioNet is certainly a valuable new asset, but I still think there’s no substitute for old-fashioned human intuition. I can think of no one better qualified than you to give our retro-analysis that indefinable human touch. Moreover, the CDC budget is grabbing a disproportionate share of the new Homeland Security allocations. It’s time we got some of that money to come home to Rockville.”
Gwen’s throat went dry. This was the bureaucratic equivalent to being sent down to the minors. What was going on here? She burned inside, but she maintained a calm, professional demeanor. “Mr. Snyder, there are thousands of AE files. There’s no way I could do this job in less than a year. It deserves a staff of several people and should be handled by a separate division with its own administrator.”
“I’m afraid the FDA is not budgeted for that at present. If you want to use an assistant, I have no problem with that.”
“One assistant?” Gwen asked incredulously.
“Yes, Dr. Maulder. One assistant.”
“But—”
“Be thankful, Doctor, that I’m not assigning you to liaise with the Army on their combat virus control program. They want to start doing their own vaccine trials for diseases the civilian sector has never heard of. The only problem is the assignment will take that appointee to Somalia for six months. I haven’t figured out on whom to spring that little nugget. I thought I was actually doing you a favor, as well as selecting the best person for the job. Your files show that you were a master diagnostician while in family practice.”
Gwen felt a migraine sliding into her brain like a warm front scorching the Midwest. This didn’t make sense. Assigning a captain in the USPH to go over Adverse Event files? That was the kind of drudgery first year medical officers had to endure. This had to be about something else. She was on the verge of asking Snyder if he knew about her call to Jan, but decided not to show her hand. She would follow Fitz Rule Number Five: Act, don’t react. She’d find out later what was behind Snyder’s ludicrous orders. In the meantime, she had ways of continuing her investigation in a more clandestine fashion. It might be risky, but she fully intended to find out what else BioNet had to say about the seizure stats. She would call Jan from home and suggest that they both open an account with iPrive.com to communicate only via secure mail.
“I guess my only answer is ‘aye-aye, sir’” Gwen said innocently. “I’ll start immediately.”
“I appreciate your cooperation, Doctor,” Snyder said smugly. “Your service has always been exemplary. I’ll note your cooperation in your file. With any luck, you’ll be back to your regular duties soon.”
What did that mean? More than ever, Gwen sensed that this new assignment was all about keeping her from doing other work.
027
BioNet was malfunctioning.
Jan Menefee sat at one of the many computer terminals connected to the medical surveillance computer, a cup of coffee next to the monitor. She’d been named director of Project BioNet because she was both an excellent physician and a master at the computer keyboard, thanks to some undergrad classes in programming. It was 2:30 in the morning, and after several hours of prep work, her general plan was to search for more info on the seizure trends, hoping that BioNet might have explanations or predictions at its quantum level. All of this was surreptitious, of course, and she’d have to cover her tracks. She knew she couldn’t erase the computer’s boot log completely because there were too many security features built into the system, but she could shunt the log of the night’s clandestine activity to a sub-directory that no one was likely to check.
But the damned system wasn’t cooperating. She received repeated error messages more appropriate to a PC running Windows 95 with a Pentium I:
Input error
Bad command
Data not available
Requested file does not exist
Programming error: If problem persists, please contact system administrator.
 
Jan folded her arms and sighed. In the universe of bytes and RAM, BioNet was one of the Seven Wonders of the World. The problems that BioNet encountered during trial runs presented in numerical codes, not outdated error messages. The designers of BioNet did not imprint Microsoft jargon in its state-of-the-art chips.
Jan got up and stretched, walking into the adjoining room where the mainframe—BioNet’s brain—was kept.
“Damn,” she muttered. Several digital readouts indicated that the system was not only in optimal condition but was actually in the process of carrying out various commands. Large spools of tape spun behind a dark glass casing. “I’m being shut out of the freakin’ system. This is nuts. Okay, Hal 9000, let’s see why you’re acting pissy.”
The room was dark except for the glow coming from the computer screen. Jan returned to the desktop terminal. “We’ll try something simpler,” she said. “No programming commands. Just a straightforward question.”
She opened the system’s main diagnostic window and tapped a few keys in order to determine BioNet’s current operating mode. The following text appeared on the screen: UPLOADING FILE 23789.626.
“No, goddammit,” she cried. “Stop!”
File 23789.626 contained every byte of information she’d gathered about seizure activity around the country. But if it was uploading, where was it going?
She frantically opened another window and typed in DESTINATION.
The reply from BioNet was swift: PLEASE WAIT UNTIL UPLOAD IS COMPLETE.
Frantically, Jan tried to cancel the upload, but the system ignored her efforts. Something was overriding.
“Okay, let’s do things the hard way.”
She took a sip of coffee and called up a hidden file on her desktop computer. Jan had been part of Project BioNet from the beginning, but even as director, she was not familiar with every single command that could be given to the supercomputer.
The file, available to administrators only, appeared on her screen, but the options displayed on its panel were anything but user-friendly.
Programmers naturally had to adjust the highly complex system on a daily basis and she couldn’t stay on top of every single bit of techno-jargon. Jan studied a line of programming code and saw “&whoR594job!enteradclear.” Did the “adclear” refer to “administrative clearance?” Was the panel requesting what amounted to a password?
She pulled open a drawer to her lower right and found a floppy handbook titled BioNet Administrative Job-Control. After several frustrating minutes, she found an entire directory of “&who” commands. Her index finger slid down the page until she found the entire line currently displayed in the panel. Next to it was a password.
She typed in “biodestination/operator27” and got an immediate response. “Yes!” Jan proclaimed, throwing her right arm up in victory.
UPLOAD 45D
120,887 KB SUCCESSFULLY SENT TO:
user9187@network.iceland.net
 
Jan was stumped. Why should BioNet send the file to an anonymous re-mailer in Iceland? What had triggered the upload? More importantly, who had triggered it? She was confident that the system hadn’t been zombied by an outside party. As director, she had ordered the same level of security as the National Security Agency—and even more secret “shops”—to prevent outside hacking. The source, therefore, almost certainly had to be internal.
The BioNet director buried her face in her hands. She could hardly believe the implications of what she just saw. Jan rolled her chair back to the nearest BioNet terminal to determine what other uploads, if any, had been sent in the last forty-eight hours. Thankfully, there had been none.
She would get CDC security people on the problem first thing in the morning, and she had a hunch that the investigation into the upload would go even higher. This kind of penetration was exactly what the executive branch of the government had been worried about. But here was the catch. There were many reasons that might drive someone to steal CDC files, and yet the hot topics on the CDC agenda—Ebola, avian flu, and other viruses that could turn someone’s face to mush—had been neglected. Out of thousands of available files, the intruder chose number 23789.626.
Still, why had any file been uploaded and sent anywhere outside the CDC network?
It was a sobering question and Jan decided it would be prudent to wait awhile before calling in the agency’s security division. Once they started an investigation, everyone, including the perpetrator, would run for cover in a general atmosphere of paranoia. The leak would be plugged with sophisticated patches and firewalls, rendering any hope of finding the responsible party virtually impossible. She owed it to Gwen to keep things quiet for the time being.
There was another option, however. In March, she’d been a fly on the wall in the White House Conference Center at a meeting of the president’s Information Technology Advisory Council. PITAC was especially interested in security around cutting-edge antiterror computer programs, and Jan was there because of her top-level position with BioNet. One of the presenters, Peter Tippett, had made a great deal more sense than most of the people babbling for the sake of recognition in their various fields.
“The most important action after a penetration has been detected,” Tippett remarked, “should be no different for computer spying than it was for the old-fashioned kind. It’s crucial not to let the adversary know you are aware of the penetration. Use the adversary’s own conduit to trap him.”
It took Jan all of fifteen seconds to Google “Tippett” and find his contact information. She’d call him in the morning.
As originally planned, Jan sent her boot log to the predetermined sub-directory and then went home. There, she retrieved a voice-mail from Gwen that said “iPrive.com” and nothing else.
It was difficult to believe that was coincidental. She recalled a line from Sir Arthur Conan Doyle’s famous detective: “The game’s afoot, Watson.”
What kind of game was another matter altogether.
Capitol Reflections
titlepage.xhtml
jacket.xhtml
Capitol_Reflections_split_000.html
Capitol_Reflections_split_001.html
Capitol_Reflections_split_002.html
Capitol_Reflections_split_003.html
Capitol_Reflections_split_004.html
Capitol_Reflections_split_005.html
Capitol_Reflections_split_006.html
Capitol_Reflections_split_007.html
Capitol_Reflections_split_008.html
Capitol_Reflections_split_009.html
Capitol_Reflections_split_010.html
Capitol_Reflections_split_011.html
Capitol_Reflections_split_012.html
Capitol_Reflections_split_013.html
Capitol_Reflections_split_014.html
Capitol_Reflections_split_015.html
Capitol_Reflections_split_016.html
Capitol_Reflections_split_017.html
Capitol_Reflections_split_018.html
Capitol_Reflections_split_019.html
Capitol_Reflections_split_020.html
Capitol_Reflections_split_021.html
Capitol_Reflections_split_022.html
Capitol_Reflections_split_023.html
Capitol_Reflections_split_024.html
Capitol_Reflections_split_025.html
Capitol_Reflections_split_026.html
Capitol_Reflections_split_027.html
Capitol_Reflections_split_028.html
Capitol_Reflections_split_029.html
Capitol_Reflections_split_030.html
Capitol_Reflections_split_031.html
Capitol_Reflections_split_032.html
Capitol_Reflections_split_033.html
Capitol_Reflections_split_034.html
Capitol_Reflections_split_035.html
Capitol_Reflections_split_036.html
Capitol_Reflections_split_037.html
Capitol_Reflections_split_038.html
Capitol_Reflections_split_039.html
Capitol_Reflections_split_040.html
Capitol_Reflections_split_041.html
Capitol_Reflections_split_042.html
Capitol_Reflections_split_043.html
Capitol_Reflections_split_044.html
Capitol_Reflections_split_045.html
Capitol_Reflections_split_046.html
Capitol_Reflections_split_047.html
Capitol_Reflections_split_048.html
Capitol_Reflections_split_049.html
Capitol_Reflections_split_050.html
Capitol_Reflections_split_051.html
Capitol_Reflections_split_052.html
Capitol_Reflections_split_053.html
Capitol_Reflections_split_054.html
Capitol_Reflections_split_055.html
Capitol_Reflections_split_056.html
Capitol_Reflections_split_057.html
Capitol_Reflections_split_058.html
Capitol_Reflections_split_059.html
Capitol_Reflections_split_060.html
Capitol_Reflections_split_061.html
Capitol_Reflections_split_062.html
Capitol_Reflections_split_063.html
Capitol_Reflections_split_064.html
Capitol_Reflections_split_065.html
Capitol_Reflections_split_066.html
Capitol_Reflections_split_067.html
Capitol_Reflections_split_068.html
Capitol_Reflections_split_069.html
Capitol_Reflections_split_070.html
Capitol_Reflections_split_071.html
Capitol_Reflections_split_072.html
Capitol_Reflections_split_073.html
Capitol_Reflections_split_074.html
Capitol_Reflections_split_075.html
Capitol_Reflections_split_076.html
Capitol_Reflections_split_077.html
Capitol_Reflections_split_078.html
Capitol_Reflections_split_079.html
Capitol_Reflections_split_080.html
Capitol_Reflections_split_081.html
Capitol_Reflections_split_082.html
Capitol_Reflections_split_083.html
Capitol_Reflections_split_084.html
Capitol_Reflections_split_085.html
Capitol_Reflections_split_086.html
Capitol_Reflections_split_087.html
Capitol_Reflections_split_088.html
Capitol_Reflections_split_089.html
Capitol_Reflections_split_090.html
Capitol_Reflections_split_091.html