“We also remove the noise-that’s impure data. It could be erroneous, could have too many details, could have too few details. Noise is contamination, and contamination has to be eliminated.” He said this firmly-another dash of emotion. “Then the cleansed data sits in one of our pens until a client needs a fortune-teller.”
“How do you mean?” asked Pulaski.
Sterling explained, “In the nineteen seventies, computer database software gave companies an analysis of past performance. In the nineties the data showed how they were doing at any given moment. More helpful. Now we can predict what consumers are
Sachs said, “Then you’re not just predicting the future. You’re trying to change it.”
“Exactly. But what other reason is there to go to a fortune-teller?”
His eyes were calm, almost amused. Yet Sachs felt uneasy, thinking back to the run-in with the federal agent yesterday in Brooklyn. It was as if 522 had done just what he was describing: predicted a shootout between them.
Sterling gestured to Whitcomb, who continued, “Okay, so data, which contain no names but only numbers, go into these three separate pens on different floors in different security zones. An employee in the public records pen can’t access the data in the lifestyle pen or the financial pen. And nobody in any of the data pens can access the information in the Intake Center, and link the name and address to the sixteen-digit code.”
Sterling said, “That’s what Tom meant when he said that a hacker would have to breach all of the data pens independently.”
O’Day added, “And we monitor twenty-four/seven. We’d know instantly if someone unauthorized tried to physically enter a pen. They’d be fired on the spot and probably arrested. Besides, you can’t download anything from the computers in the pens-there are no ports-and even if you managed to break into a server and hardwire a device, you couldn’t get it out. Everybody’s searched-every employee, senior executive, security guard, fire warden, janitor. Even Andrew. We have metal and dense-material detectors at every entrance and exit to the data pens and Intake-even the fire doors.”
Whitcomb took up the narrative. “And a magnetic field generator that you have to walk through. It erases all digital data on any medium you’re carrying-iPod, phone or hard drive. No, nobody gets out of those rooms with a kilobyte of information on them.”
Sachs said, “So stealing the data from these pens-either by hackers outside or intruders or employees inside-would be almost impossible.”
Sterling was nodding. “Data are our only asset. We guard them religiously.”
“What about the other scenario-somebody who works for a client?”
“Like Tom was saying, the way this man operates he’d have to have access to the innerCircle dossiers of each of the victims and the men arrested for the crimes.”
“Right.”
Sterling lifted his hands, like a professor. “But customers don’t have access to dossiers. They wouldn’t want them anyway. innerCircle contains raw data and wouldn’t do them any good. What they want is our
She said in response, “But if a client bought a number of mailing lists, say, they could come up with enough data about one of our victims to commit the crimes, couldn’t they?” She nodded at the evidence list she’d shown Sterling earlier. “For instance, our perp could get lists of everyone who bought that kind of shave cream and condoms and duct tape and running shoes and so on.”
Sterling lifted an eyebrow. “Hm. It would be a huge amount of work but it’s theoretically possible… All right. I’ll get a list of all our customers who’ve bought any data that included your victims’ names-in the past, say, three months? No, maybe six.”
“That should do it.” She dug through her briefcase-considerably less organized than Sterling’s desktop-and handed him a list of the victims and fall guys.
“Our client agreement gives us the right to share information about them. There won’t be a problem legally but it will take a few hours to put together.”
“Thanks. Now, one final question about employees… Even if they’re not allowed in the pens, could they download a dossier in their office?”
He was nodding, impressed by her question, it seemed, even though it suggested an SSD worker might be the killer. “Most employees can’t-again, we have to protect our data. But a few of us have what’s called ‘all-access permission.’”
Whitcomb gave a smile. “Well, but look who that is, Andrew.”
“If there’s a problem here, we need to explore all possible solutions.”