Изменить стиль страницы

Gragg had begun to suspect that the Monte Cassino map made a registry entry on his machine that prevented the map from appearing in the game listings again. To test his hypothesis, he cleared out hard-drive space on another PC and installed Over the Rhine on it in the hope that the clean machine would give him access to the Monte Cassino map, but it still didn't appear in the Internet listings.

Had the game somehow restricted his IP address? Or his router's MAC address? Goddamnit, he was grasping at straws now.

Think!

The problem: he had an encrypted string but no key-and no idea what encryption algorithm was used to create the string. Boerner had looked straight at him-or at least his avatar-and said, "…use your key, and ve vill meet again."If Gragg found the key and decrypted the string, where did he enter the decrypted value? Would entering it somewhere make the Monte Cassino map reappear?

Gragg got up and wrapped the scratchy, smelly blanket around him. He shuffled across the room toward his workbench. Four desktops and two laptops were still powered up there. One was running a dictionary file against the encrypted string using a series of standard decryption algorithms. He stared at the lines spinning past in the debug window and laughed.

This was ridiculous. It could take a thousand years with all the permutations of a thirty-two-character string.

He thought about it for a moment. He could harness a few dozen zombie computers and distribute the task among them. He shook his head. He'd have to design the program to distribute the load-and it would still take too long to run. What, a hundred years? And what if the result wasn't a proper word? How could he programmatically detect a successful decryption? He didn't even know the encoding algorithm.

He cast off the scratchy blanket and sat down before a keyboard. He'd searched the chat boards, but he hadn't done the obvious thing and Google-proxied the problem. He launched a Web browser and prepared to type the URL in manually. Perhaps there was a Web page dedicated to this.

Gragg froze just after his home page loaded. It was a popular news portal, and there off to the right were the news stories of the moment. The top headline screamed at him:

Dead Computer Genius Kills Eight

Gragg clicked the link, and the extensive news coverage of the siege at Sobol's estate unfolded before him. Gragg voraciously read every word and followed every link. An hour later and he was wide-awake again with one 'factoid' echoing in his mind: "…Matthew Sobol, game designer and AI architect for Over the Rhine."

This Sobol guy had been a genius. Beyond a genius. Gragg was rarely impressed by other people's hacks-but this Sobol was the king. Engineering a daemon that took vengeance on the world once you were safely dead and beyond all punishment. Gragg's mind ran through the possibilities. They were endless.

How much money had Sobol spent on this? The planning! And the Daemon was still on the loose. The Feds didn't know how to stop it. You could hear it in the closed-lip pronouncements of the government spokespeople.

Goose bumps swept over Gragg's skin. It felt like a new world had opened up to him. Was the Monte Cassino map just a coincidence? It had appeared in the last few days-only after Sobol's death.

He couldn't say that for sure, though. He'd been otherwise engaged prior to the mess with the Filipinos.

It couldn't be a coincidence, though, could it?

Gragg knew, now more than ever, that he had to decipher the encrypted text. He felt he could never be sane again unless he knew more about the Monte Cassino map and about Sobol's Daemon. He might have the inside track on something incredible-a new frontier in a world filled with familiar hacks, police surveillance, and drab suburban vistas. How long had it been since he'd felt a sense of wonder in his jaded soul? He was feeling that now. Was Monte Cassino Sobol's work?

Gragg did a Web search for Monte Cassino and came up with a slew of hits-all relating to World War II. Instead, he reran the search, adding Over the Rhineas criteria. He still got about seven hundred hits, all of them historical because the Italian campaign, ultimately, was aimed toward Germany.

Gragg looked up from his laptop and stared at a desktop computer's debug window scrolling the results of his program's decryption attempts. Output appeared every millisecond or so and varied between gibberish and the words "Bad Data." He sighed, realizing that encryption could even be something like a proprietary Triple DES, where the designer re-encrypted the message multiple times. Hadn't the Russians done something like that with their Venona project? Gragg felt quicksand rising up to swallow his efforts. Would he go to his grave never knowing the answer to this riddle?

He knew a little more now, though. Didn't he? Well, assuming that Matthew Sobol had designed the Monte Cassino map, he did. He halted the decryption program and brought up the immediate window. Gragg typed the stub of his decryption function:

?DecryptIt(

He had to supply the only argument for the function-the key to use for the encryption. His function was hard-coded to use the encrypted string he got from the Monte Cassino map along with any key he entered here as an argument for the function. It would then cycle through a dozen common decryption algorithms-DES, Triple DES, RSA-feeding the key as the variable. Gragg thought hard. What would Sobol use as a key? Gragg typed: ?DecryptIt("MatthewSobol")

And hit ENTER. The output was twelve lines of gibberish or "Bad Data" once again-one line for each algorithm attempted by the function. He tried scores of variations on Sobol's name, and then variations on CyberStorm Entertainment, then variations of Over the Rhine.He started entering the names of some of the games Sobol had created-or at least ones Gragg could remember. Then the names of notable game characters, like Boerner.

The output was all gibberish.

Gragg just stared at the flat-panel monitor. He might as well curl up and die now because some bastard had placed this virus in his head, and he would never be free of it. If he ever got his hands on the Monte Cassino map designer, he was going to wring that fuck's scrawny neck. Gragg pounded his head on the desk-not hard enough to hurt himself, but hard enough to inform his brain of the danger.

Clues. He needed to examine what would be important to someone-say, Sobol-who wanted to keep a secret away from the Feds, but who also wanted Generation Y to find it. Those Feds would no doubt be using sniffers, crackers, and decompilers in order to find encrypted strings in Sobol's work. If not now, then soon. But they couldn't decrypt it if they didn't find it. Where to hide data from automated forensics tools?

Gragg had an epiphany: there was no encrypted string in the Monte Cassino map. Gragg had perceived the encrypted text, but it wasn't really computer text; it was a graphical image-and one done in a Teutonic stone-carved font, no less. The encrypted string, "m0wFG3PRCo JVTs7JcgBwsOXb3U7yPxBB," was an arrangement of pixels that only a human eye-or a really good optical character-recognition scanner-could interpret. Programmatically scanning the contents of this map wouldn't uncover any encrypted text-only a human being viewing the map in the context in which it was meant to be seen could see its significance. But even within the game the significance of the coded string wasn't truly revealed until…

Gragg smiled. Herr Oberstleutnant Boerner pointed out its significance. The combination of the picture file and Boerner's verbal statement, "…use your key, and ve vill meet again…" — these were the components of the encryption, the data and the key to unlocking it. The more he contemplated it, the more sense it made. The data and the key appeared in proximity to each other only within the context of the game, and then only if the player was dedicated and capable enough to reach the inner sanctum of that difficult map. That probably ruled out anyone over thirty years of age. Certainly it ruled out anyone in a position of responsibility.