Reads Novel Online

The Broken Window (Lincoln Rhyme 8)

« Prev  Chapter  Next »



A young man appeared in the doorway. At first she thought it was Martin, the assistant, but she realized that was only because of the similarity in build and the black suit. "Andrew, I'm sorry to interrupt."

"Ah, Jeremy."

So this was the second assistant. He looked at Pulaski's uniform, then at Sachs. Then, as with Martin, when he realized he wasn't being introduced he ignored everyone in the room except his boss.

"Carpenter," Sterling said. "I need to see him today."

"Yes, Andrew."

After he was gone, Sachs asked, "Employees? Is there anyone you've had disciplinary problems with?"

Sterling said, "We run extensive background checks on our people. I won't allow hiring anybody who's had any convictions other than traffic violations. And background checks are one of our specialties. But even if an employee wanted to get into innerCircle it would be impossible for him to steal any data. Mark, tell her about the pens."

"Sure, Andrew." To Sachs he said, "We have concrete firewalls."

"I'm not a technical person," Sachs said.

Whitcomb laughed. "No, no, it's very low-tech. Literally concrete. As in walls and floors. We divide up the data when we receive them and store them in physically separate places. You'll understand better if I tell you how SSD operates. We start with the premise that data is our main asset. If somebody was to duplicate innerCircle we'd be out of business in a week. So number one--'protect our asset,' as we say here. Now, where does all this data come from? From thousands of sources: credit card companies, banks, government-records offices, retail stores, online operations, court clerks, DMV departments, hospitals, insurance companies. We consider each event that creates data a quote transaction, which could be a call to an eight hundred number, registering a car, a health insurance claim, filing a lawsuit, a birth, wedding, purchase, merchandise return, a complaint. . . . In your business, a transaction could be a rape, a burglary, a murder--any crime. Also, the opening of a case file, selecting a juror, a trial, a conviction."

Whitcomb continued, "Any time data about a transaction comes to SSD it goes first to the Intake Center, where it's evaluated. For security we have a data masking policy--separating the person's name and replacing it with a code."

"Social Security number?"

A flicker of emotion crossed Sterling's face. "Ah, no. Those were created solely for government retirement accounts. Ages ago. It was a fluke that they became identification. Inaccurate, easy to steal or buy. Dangerous--like keeping a loaded gun unlocked around the house. Our code is a sixteen-digit number. Ninety-eight percent of adult Americans have SSD codes. Now, every child whose birth is registered--anywhere in North America--automatically gets a code."

"Why sixteen digits?" Pulaski asked.

"Gives us room for expansion," Sterling said. "We never have to worry about running out of numbers. We can assign nearly one quintillion codes. The earth will run out of living space before SSD runs out of numbers. The codes make our system much more secure and it's far faster to process data than using a name or Social. Also, using a code neutralizes the human element and takes the prejudice out of the equation. Psychologically we have opinions about Adolf or Britney or Shaquilla or Diego before we even meet them, simply because of their name. A number eliminates that bias. An

d improves efficiency. Please, go on, Mark."

"Sure, Andrew. Once the name is swapped for the code, the Intake Center evaluates the transaction, decides where it belongs and sends it to one or more of three separate areas--our data pens. Pen A is where we store personal lifestyle data. Pen B is financial. That includes salary history, banking, credit reports, insurance. Pen C is public and government filings and records."

"Then the data's cleansed." Sterling took over once again. "The impurities are weeded out and it's made uniform. For instance, on some forms your sex is given as 'F.' In others, it's 'Female.' Sometimes it's a one or a zero. You have to be consistent.

"We also remove the noise--that's impure data. It could be erroneous, could have too many details, could have too few details. Noise is contamination, and contamination has to be eliminated." He said this firmly--another dash of emotion. "Then the cleansed data sits in one of our pens until a client needs a fortune-teller."

"How do you mean?" asked Pulaski.

Sterling explained, "In the nineteen seventies, computer database software gave companies an analysis of past performance. In the nineties the data showed how they were doing at any given moment. More helpful. Now we can predict what consumers are going to do and guide our clients to take advantage of that."

Sachs said, "Then you're not just predicting the future. You're trying to change it."

"Exactly. But what other reason is there to go to a fortune-teller?"

His eyes were calm, almost amused. Yet Sachs felt uneasy, thinking back to the run-in with the federal agent yesterday in Brooklyn. It was as if 522 had done just what he was describing: predicted a shootout between them.

Sterling gestured to Whitcomb, who continued, "Okay, so data, which contain no names but only numbers, go into these three separate pens on different floors in different security zones. An employee in the public records pen can't access the data in the lifestyle pen or the financial pen. And nobody in any of the data pens can access the information in the Intake Center, and link the name and address to the sixteen-digit code."

Sterling said, "That's what Tom meant when he said that a hacker would have to breach all of the data pens independently."

O'Day added, "And we monitor twenty-four/seven. We'd know instantly if someone unauthorized tried to physically enter a pen. They'd be fired on the spot and probably arrested. Besides, you can't download anything from the computers in the pens--there are no ports--and even if you managed to break into a server and hardwire a device, you couldn't get it out. Everybody's searched--every employee, senior executive, security guard, fire warden, janitor. Even Andrew. We have metal and dense-material detectors at every entrance and exit to the data pens and Intake--even the fire doors."

Whitcomb took up the narrative. "And a magnetic field generator that you have to walk through. It erases all digital data on any medium you're carrying--iPod, phone or hard drive. No, nobody gets out of those rooms with a kilobyte of information on them."

Sachs said, "So stealing the data from these pens--either by hackers outside or intruders or employees inside--would be almost impossible."

Sterling was nodding. "Data are our only asset. We guard them religiously."



« Prev  Chapter  Next »