Font Size:  

“We’re peeling the layers off the vic’s holo-system,” Feeney said in the same tone. “Looking for any shadows, echoes, and signs of tampering. So far, it’s coming up a hundred percent on all levels. Same with his droid. No sign of tampering, no breaks in time or programming.”

“Holo-room security’s clean as well,” Roarke told her. “We’re picking it apart, bit by byte, but there’s no indication anyone left or entered that room after Bart and before the droid bypassed the lock the next morning.”

“If I didn’t know better, I’d say the kid’s head just magically chopped itself off.” Feeney puffed out his cheeks. “I sent a team over there this morning. Had them scan and manually search every inch of that room, looking for another access. It’s tight.”

“I’ve got some semi-good,” Callendar told her. “I’ve done analysis on the logs from the office holo-room and the vic’s. Serious player. He could easily put in ten-twelve hours on a series of games in a day, and pulled a few all-nighters. A lot of solo play in there, too, but he logs in with a variety of partners, home and office.”

She took a swig from a tube of Orange Sweet. It made Eve’s teeth ache.

“He logged in a lot of time on the new game over the last several months, again solo and office. And this isn’t the first time he took a demo disc home to give it a whirl.”

“Is that so? Always logged it before?”

“Always. Like a half-dozen home whirls before the last one. Crossing it with his home unit it was always solo play. The thing is, it’s different stages and versions of the game.”

“Improvements,” Eve concluded. “He’d take it home to test it out with the tweaks, or maybe add some from there.”

“That’s how it reads. Early days, they called it Project Super X.”

“You’re kidding.”

“No, seriously. Project Super X, or PSX. Playtimes after five or six on weekdays, and some long multi-player sessions on weekends. Anyone who worked on any section of it had to log in and know the passcode, then had a user code. The four user codes that had full access track back to the four partners, but if any of those who worked sections confabbed with any of the others who worked sections, they’d have most of it.”

“Then it could be duplicated.”

“Close.” Callendar took another swig from the bright orange tube. “It would take a lot of time, trouble, skill, and cooperation, but you could get close.”

“What about the scenario he was playing at TOD?”

“That’s trickier. Passing to you,” she said to Roarke.

“One of the security measures, what I’d call an on-the-fly sort of precaution, was to change user names and codes every few runs.”

“So if anyone tried to hack from outside, or inside, they’d hit a new wall.”

“Theoretically,” Roarke agreed. “Still, even with the firewalls and fail-safes, you’d only have to get lucky once, access from that point. I’ve found some hack attempts, some attempts at infections from outside sources, typical stuff, and none of it successful. And there are several hack attempts from inside, but they coincide with basic security checks. To run the game in its holo form, the player would have to input his current name, code, and ID with thumb- and voiceprint. All of those are possible to bypass, of course.”

Eve aimed a cool look. “Of course.”

“But they had their additional security, which would have sent out alarms at an attempted hack. Assuming the hacker hadn’t already bypassed those. The discs themselves, at least the one in Bart’s home unit and the copy we have here, are imprinted to jam if any of these steps are missed or the ID process fails. An attempt to remove the disc, as we learned, results in self-destruct.”

“I know all of this.”

“Laying the groundwork, Lieutenant. They were careful, clever, vigilant. But certainly not absolutely hackproof as nothing is. In any case, those precautions make it tricky to ascertain absolutely who played what and when. So we have to extrapolate.”

“Meaning guess.”

“A reasoned and educated guess based on probability. Bart used a variety of user names and codes between his home and office, but as with most people, he has a pattern, and he repeats. To simplify, I’ve had the computer cull him out and label him User 1 in both locations.”

>

He ordered the data on-screen. “Here you see the dates and times he logged in on their PSX, by location, and whether it was solo or multi-player. We’ve crossed that with the other players, going alpha last name, you have Cill Allen as User 2, Var Hoyt as User 3, and Benny Leman as User 4. We have a separate data run on every employee who worked on the game, when, how long, in what capacity. You’ll want to run an analysis on those, I expect.”

“Who’s particular pals with who, sleeping with who, how long they’ve worked there. I know the drill.”

Roarke smiled at her. “It’s taken us this long to get here simply because the log-ins for this game alone are legion, and between the four of them they used several dozen user names and codes. Next problem.”

“Would be?”

Source: www.allfreenovel.com