Kettler was still engrossed in the machine code showing on his monitor. “God, Maestro, this is beautiful work! Whoever paid to have this little monster made sure went to the right place.”
Unable to contain himself any longer, Thorn cut in. “Much as I hate to break up this little mutual admiration session, can either of you tell me just who the hell this Bulgarian guy is?”
Rossini filled him in, with Kettler interjecting occasional comments.
Only a few viruses had ever been traced back to people with names. Several, the nastiest of a nasty breed, had been linked to a mysterious individual “the Bulgarian.”
Nobody knew his name, but detective work, much of it unofficial, had traced some viruses back to Bulgaria and to a master programmer working covertly there. Bulgaria’s secret service had always had an evil reputation. It had been involved in several assassinations, and even linked to an attempt on the life of the Pope. As a result, many in the computer world assumed the Bulgarian had originally been trained and paid by that country’s now-defunct communist government, probably as part of a plan to wreak havoc on the technologically advanced West. Whatever he had once been, it was now clear that the virus-maker was working as a cybermercenary selling his destructive wares to the highest bidders.
Kettler finished by saying, “Whoever made the deal for this program paid pretty dearly for it. There’s all kinds of gossip on the Net, the computer bulletin boards, about what the Bulgarian charges to do his thing including some pretty wild guesses. But I’d bet you’re talking at least a couple of million bucks to craft this baby, and probably a lot more.”
“Several million dollars?” Thorn raised an eyebrow and looked at Rossini. “You believe that a white racist group or a band of black radicals could raise that kind of cash without anybody hearing about it?”
“Not a chance. That has to be a government’s money,” Rossini said flatly. “Whichever it is, I’d say your theory is looking better and better. This campaign is being orchestrated from overseas.”
Kettler stared at both of them. “Let me get this straight. You guys think these terrorists are working for some foreign government?”
They nodded slowly.
“Wow.” Kettler shook his head. “Far freaking out. This’ll sure rock some boats on the Net.” He pawed through the diskettes on his desk and came up with a stack of four. “See these? That’s almost four megs of traffic on the terror wave alone. Practically everybody with a modem and two brain cells to knock together has his or her own theory about what’s going on.”
The computer expert slipped his diskettes back into place and shrugged.
“Between this terrorism shit and the code controversy, I’ve been on the Net almost constantly.” “Code controversy?” Thorn asked.
Rossini nodded. “Some government agencies wanted to restrict commercially available E-mail encryption programs to ones the government could break…”
“Hell, no, Maestro. Not that old gripe. That’s yesterday’s news,” Kettler interrupted. “This is a privacy issue deal. It broke out a couple of months ago when some guy started bitching about unbreakable, coded E-mail he’d spotted on CompuNet, one of the worldwide computer bulletin boards. Said he’d been intercepting a ton of scrambled posts from somewhere in England to a bunch of users scattered across the country all using an encryption program he’d never seen before. Boy, did that set off fireworks!”
The computer expert smiled at the memory. “Geez, you should have read all the screaming about the sanctity of private electronic mail, and the First Amendment, and all the usual shit…”
“Hold it,” Thorn broke in, his mind racing in high gear. Two or three months ago? The timing could be coincidence, but he’d been wondering how the terrorists coordinated their attacks. Were they using computer hookups to communicate? He looked down at the younger man. “Are you saying someone has spotted coded messages coming from a foreign source to people here in the U.S.?”
“Yeah,” Kettler answered with a nonchalant shrug, “and as far as I’m concerned, they can put them in left-handed Swahili. I don’t give a rat’s ass. I’m just getting a kick seeing how loud all the Net prudes squawk about it.”
Thorn took a step closer and spoke slowly, intensely. “You’re missing the point. We’ve got terrorist attacks going on right and left, and now you’re telling me someone’s been intercepting coded messages?”
Kettler nodded, a little taken aback, but starting to understand.
“Yeah. But that’s not necessarily unusual. A lot of Email these days is PEM, privacy-enhanced E-mail. It’s just that these messages are using a real high level encryption program nobody’s ever heard of.” He shook his head. “Like I said, a bunch of us have been arguing the issue on some of the Net forums. It’s not general knowledge. Cripes, if CompuNet or any of the other public bulletin boards knew that someone was routinely breaking into their private message files, they’d have a conniption fit.”