I have not been paying enough attention to the cyberpunk list,
but I did notice that some of you were concerned with the subject, and
that Tim May was mentioning "pure information" as a better model to
play with, so I thought I would send this in as a sample. Perhaps
some ideas of where to take the story will come out of using this
model for another game. Anyway, this game theme should not push as
many hot buttons as drugs do (though it should!).
This fragment of a tale was written shortly after I came back
from the first Computers, Freedom and Privacy conference. It is
placed in the time period between now and the usual time frame of
Gibsonian cyberpunk. It was written to help me think about the social
& legal responses we might see when encryption is more widely
available-- and used. Sorry the story is incomplete, I just got too
busy to finish it, and ran short of ideas as well. And sorry for the
obsolete technology involved. I am sure something better than MS DOS
will come along eventually. :-)
(The usual conditions of posting apply--copyright H. Keith Henson
1991)
Green Rage by H. Keith Henson
"'Nother hour and I can 'crypt and email this mess."
Lenny closed the forth of five files: maps, diagrams, schedules,
assignments, and instructions. It was a four person monkey wrench
project for destroying a big piece of a paper mill and (he hoped) making
it look like an accident. It was due to take place on the east coast in
a few weeks. Lenny had never met any of the people who had scouted out
the plant, nor the bitter, out-of-work engineer who had figured out how
to wreck it, and none of the operators who were involved would meet each
other. Made for hard-to-crack operations. Some people on the east coast
did the same for the covert side of the GreenRage group that paid Lenny.
The tofu sandwich he had for breakfast was a dim memory.
"Lunch first." Lenny thought.
As he headed out to pick up a vegetarian pizza, he looked through
the little glass panels in the front door.
"Oh, shit, suits outside,"
Lenny said it with feeling, but kept his voice down. He turned on
his heel in the hall leading to the front door and ran back into the
grubby GreenRage office in the dining room of a rented house in San
Samon. He managed to hit the power switch on the PC at Stel's desk
before the door opened. Stel was in the bathroom. Whether she heard the
warning or not, Lenny could get no help from her, and Marge was out on
errands. The door was opening--there was no chance to get to the other
two computers or to take down the '586 file server in the kitchen--he
looked up and in his best bright and cheerful voice (which to Lenny
sounded hollow and rehearsed) said, "May I help you?"
The first of the four suits, a beefy dude in a grey outfit spoke up.
"Yes, you can. We're from the CCA. (The Computer Control Agency):
We have a court order to copy all the computer files in this building,"
(he held up an official looking piece of paper--more trees destroyed,
thought Lenny.) "so unless you want to be charged with contempt, you can
step back from that computer, and don't touch anything till we are done."
Lenny stepped back. He wasn't as terrified as he could have been,
though his heart rate must have been close to 120 and his mouth was dry.
He had been through raid drills and a few real confrontations with the
law at pickets and bleed-ins.
"At least it isn't a search warrant, we might keep operating" he
thought. Then remembering the drill, spoke up:
"Can I see the order?"
The beefy one handed it over while his three leaner and younger
companions fanned out to the computers. They obviously knew where the
computers were, but that did not necessarily mean rot in the
organization. How well they coped with the 'puters would say something
about that.
The paper was about what he expected, an order signed by a judge to
copy every storage device in the GreenRage's office to an encrypted WORM
drive. The box for paper documents wasn't checked, so they knew they
wouldn't find anything useful on paper. Bad sign, it meant they knew
more about GreenRage than Lenny liked. "Waste as much time as I can,"
Lenny thought to himself, and in a very polite voice he asked:
"Can I see some ID for you and your men?
The closest of the technoids, as Lenny thought of them looked up in
disgust after putting his hand on the back of the ancient '386 clone
Lenny had just killed.
"Its been turned off in the last 2 minutes. Did you do it when we
came in?" he said this looking right into Lenny's eyes, while digging out
his badge. Lenny didn't lie with his reply,
"Its Stel's, she was about to go out, and we try to save power by
turning them off when we go out." He said this as loud as he dared,
hoping that Stel would hear him in the bathroom, then spoke up even
louder,
"Stel, we have official visitors, so don't make any sudden moves."
At 200+ pounds, and fifty plus years, Stel didn't make many fast
moves, unless they were on young guys. In view of the constant water
shortage, the chances were only about one in four that she would flush
the toilet, and less than even that Stel would wash her hands. Without
any running water sounds, she come out.
"Pigs, huh." Stel had been politically imprinted as an anarchist at
Madison over thirty years ago in the late '60s and early 70's. When it
suited her, she could be one of the most obnoxious people Lenny had ever
known. At least it diverted the attention from him, chances were low
that the cops would grill Stel on who shut off the power on her computer.
Beefy, whose' badge claimed to be one Dan Barker, and technoid #1
(Lenny never did get a name for him, flashed their badges. Lenny grabbed
a whiteboard marker (almost dry, and the only non computer writing device
permitted in the office) and scribbled Barker's name and badge number on
the edge of a badly cluttered whiteboard. The other two technoids had
fanned out, one to Lenny's desk, and the other to the kitchen. The
kitchen one came back shaking his head.
"No damn keyboard or display on the server. Have to go in through
the other ones to dump the disk."
Technoid #2 moved the mouse on Marge's machine, but thank the green
mother, thought Lenny, the screensaver program had timed out, and the "I
NEED A PASSWORD!" message came up. That meant the password was gone from
memory on that machine. Technoid #3 hit paydirt on Lenny's machine: the
screen was still alive. He hit the space bar, and pulled out a little
alarm timer which he set to go off every 3 minutes. "Damn, damnit"
thought Lenny, "I should have set the timeout shorter, has it really been
less than 5 minutes since I got up?" And he was mentally kicking himself
for not wiping the password when he got up.
Technoid #3 noted the directory (ACIDRAIN/TRMINATE) where Lenny had
been working and went back up, a level at a time to the main directory on
the file server. He seemed prepared to deal with a no printer machine,
pulling out a pad of paper from a little portfolio (more trees!) and
started making notes on the directory structure.
Technoid #2 looked up from Marge's machine and asked Lenny,
"I don't suppose you would know the password?"
Lenny shook his head and then looked the agent in the eye.
"No sir! I certainly wouldn't know Marge's password to get into her
personal machine!" And wouldn't admit it if I did know, he thought.
Technoid #2 looked over at Stel frowning at the machine on her desk
and asked mildly,
"I don't suppose you would remember your password?"
"Fuck off sharp one," Stel said with a straight face. Even in a near
state of panic, Lenny got a flash of amusement as Beefy started to spit
out a hot reply. Beefy checked himself as he saw #2 write down
fuckoff#1. Stel grinned slightly; she had almost scored one on the
agents.
Without making a move toward Stel's machine, #2 asked #3,
"Shall I try it, Jim?" Jim was engrossed, paging through directories
but he mumbled:
"No, let's see what I can get before we risk a password given under
duress." And, half a minute later,
"This is going to be a bitch, I can't find any programs to dump
memory, no debug, no basic, no smalltalk, no turbo, nothing." Lenny
grinned, and straightened his face with an effort. The crypt program had
come with instructions to delete or encrypt under a special key a long
list of compilers and interpreters-- not that he understood exactly what
they were anyway.
"Bob, could you have one of the uniformed officers get the camera
out of the car? Looks like we are going to have to photograph some of
this." Beefy went to the door and tried to get the attention of one of
the uniformed cops that had come with them. No luck, they were both out
back, keeping an eye on the building power switch so no one could turn it
off. It was less distance to the car, so he just walked out to the car,
rummaged around in the back seat and brought back the camera kit. Jim
waited for him, typing a space every 3 minutes.
"Take it easy on the polaroid, damn film costs two dollars a shot,"
as he handed the camera kit to technoid #3. Technoid #2 came over to
help and started clicking shots of the screen as Jim worked his way
around in the directory tree. There were *lots* of interesting directory
and file names. Stel, Marge, and the three masked visitors from back
east had spent a whole evening making up provocative names like HIT_LIST
(Lenny's address book), and $LAUNDRY (data for a spreadsheet program
Marge used), and a lot of disaster names like HINDENBG, and TEX_CITY.
Since the crypt program left the directories in the clear, they thought
they might as well make them amusing. At the moment, with cold sweat
dripping down his back, Lenny wished he had made the directories a little
*less* provocative.
Once in a while, technoid #3 or Jim as Lenny was beginning to use to
identify him--gotta scribble that name on the white board--would give the
command to type out a file to the screen. He either got a mess of
published material from decade-old anarchist newsletters, some of which
they carefully photographed on the screen, or computer-generated random
bytes (which, of course, they thought was encrypted material). One or
the other of the technoids not sitting at the screen kept themselves
shielding the power switch and plug. Stel was sitting on the grubby
couch waiting for the technoids to either break into the system or screw
up. Lenny went over and joined her, feeling miserable about the agents
getting in through _his_ system and unwilling to watch any more and give
away by body language when they were about to trip. He glanced at his
watch. The damn cron program should ask for the password in another 20
minutes. "Jeez," he thought, "I hope they don't get anything."
"There are _10_ copies of something which looks like a word processor
on the server hard drive--they all have the same byte count and date, and
there is _NO_ 'path' set," technoid #3 bitched loudly enough for Lenny to
hear. (Happened that this was an accident. Lenny had found that if he
copied the word processor into each directory he made, it worked fine.)
The server had an old 700 Mbyte drive, and a few copies more or less of a half
Meg program made no big difference. However at the moment, the technoids
had concluded that this was a clever hack, that the system would wipe the
password out of memory if they tried to run the wrong word processor
program. They outfoxed themselves: any one of them would have worked
fine. ("Type" or "copy" to the screen wouldn't work because the WD*11.0
stored files in compressed binary.)
"Well, Bob, it is moment of truth time. We can take a 1 in 10
chance of starting up the word processor and looking at the files, or we
can try to load in a program to extract the key from this thing's
stinking memory. What say?"
"You guys are the experts, don't ask me."
After a short conference, technoid #3 fished a diskette out of his
pocket, kissed it for luck, and stuck it in the drive on Lenny's machine.
"Here goes nothing." and he typed "dir a:". The crypt program was
watching for diskette access, and came back with:
"I NEED A PASSWORD!
"Shit." whispered a dejected technoid under his breath. "Know
anybody at NSA?"
----------------
Lenny put the back of his palmtop on the microphone of a payphone
and hit the dial button.
"That will be one dollar for the first minute."
Bong, bong, bong, bong.
"Thank you for using ESJI, you have one minute." Buzz-click,
"Hello, there is no one here at the moment, but you can record a
message."
"Here" was a little module of code in an automated PBX/voice mail
machine watching for incoming calls after working hours on a line deep in
the list of numbers assigned to a small corporation. It was an old
machine, and unlikely to get another software upgrade. After taking a
call, it would not take another for several hours, and it rotated through
several recorded messages.
Lenny hit the next button down on the palmtop.
#-Beep, 4-Beep, 3-Beep, 6-Beep.
"confirm with password.
L-beep, E-beep, N-beep.
"Record message. End with any key."
Beeeeep.
"Nancy, its Murray, just called to say hi. Get back to me sometime
when you get a chance." #-beep.
"Message confirmation number 36, repeat 36," and a click.
The PBX made a local call to a paging company and transmitted what
looked like a phone number. The phone number digits added up to 36.
Lenny punched 36 into his palmtop and hit the enter key. It came up
with an address, a description, and a phone number. It was the phone
next to the K-mart entrance about a mile away.
"K-mart will be closing about the time I get over there," he thought.
"Could have taken the bike." He closed the palmtop. It sensed the
closing and erased its encryption password.
Lenny got back in his tiny 5 year old "B-car," the 60 mpg car some
rich dude had been force to take in a package deal when he bought a 20
mpg Lincoln Towncar. He twisted the key. The lights dimmed as the
catalytic convertor came back up to heat on the battery. There was a few
seconds' wait to let the battery recover, and the car started. Lenny
watched for cops as he drove over to the K-mart, but he didn't drive
*too* cautiously. That was one sure way to attract attention. There
wasn't much of a mob leaving the closing K-mart on a weekday. Lenny
parked near the phones and walked over. He was about 20 feet away when
the one on the left rang. He picked it up and said,
"36."
"What's the problem? If you forgot your key, I can't help."
The voice on the other end sounded odd. It was probably going
through some blind location in Mexico where the automatic number
identification had not yet been installed. It also had the quality of
digital speech. Original words of the speaker were being converted to
phonemes and back to words. Not a hint of the speaker's real voice
quality came through, though this dodge did not affect word choice and
rhythm patterns.
"Agents," Lenny said. The CCAs came in early this afternoon. I
don't think they got anything, but I needed someone to talk to."
"Dumb idea if they are watching you, but tell me what happened
anyway."
Lenny related the events of the afternoon up to the point where the
agents lost the password on his machine by trying to load a memory dump
program from a diskette. And then he went on.
"After that, they popped the cover off the server, hooked up their
gear and copied the 700 Meg disk, a few dozen 60Mbyte SMs, and a few
dozen 3 meg floppies. One of them had your crypt package. They didn't
mention my palmtop, and Marge keeps the backup tapes at home. Only
took them about 2 hours. They put the covers back on and left me with
what they called a PK encrypted 2.4 Gig WORM cartridge. They took one
just like it, and even made me choose which one I got. The order said I
was required to take one of them. It has all kinds of legal seals and
signatures on it. They said take it to our lawyer. One of us took it
over about 5 pm. None of us have a way to read it. Are we in trouble?"
There was quite a delay. Then, the digital voice spoke up.
"Even if they were able to track me down, *I* am not in trouble. I
make a point of posting all the programs I ever give out. In source code
yet."
"I don't think you are in trouble from what they took with them.
The copy they left with you is the data off your disk, encrypted with a
half-key the judge issued. Until the hearing they can't read it because
they lack the other half of the key. The only use for it is to keep them
from making a copy of data, changing the data and making another one of
those write-once cartridges. So, you are ok till the hearing."
There was more delay, then the funny sounding voice on the other end
of the line went on.
"Presuming the passwords are not compromised, even getting the other
half of the key from the judge to look at what they took should not be a
big problem. But since they came in at all, I would say you are in big
time trouble. That was a piece of dumb luck that they didn't try WD* on
your files. Of course they always have the option to give you blanket
immunity and force the key out of you, but by the time they get around to
doing that, you can forget the key. I sure would. I presume you had the
machine convert all the files after they came in to a new password?"
"Not yet. I haven't let anyone put a password into any of the
machines since they showed up. I'm afraid they will have a camera bug
looking over my shoulder. About a month ago, I read in the paper that
they did that to a bookie in St Paul."
"Not likely for you--but possible. Hmmm, did they leave any
judicial orders about not moving the machines?"
"Not from what I read on the court order. I can ask our lawyer.
Our lawyer may be good at filing objections to logging company projects,
but I think he is out of his depth if they go after us criminally. I
can't afford a criminal lawyer. I called around and the best deal I
could get was $100k retainer, cash or gold, no checks."
"They have already gone after you criminally. You don't get a data
search order from a judge without a fairly good reason. On the other
hand, it was not a search warrant. It is arguable that they shouldn't
have gone looking at stuff in your files, but who needs to argue? They
either don't have enough on you for that or they are waiting to see what
you do and who you talk to after the DSO. I don't know and don't want to
know what you are doing, but there must have been something that tipped
them off."
"I can't think of anything--even if the people we are sending email
to on the east coast had all been turned, I can't see how they could have
traced it back to us. Mail to them was going through about 10 blind
links, sometimes took 3-4 days to get cross country, it was deep 'crypted
all the way, and somebody donated the digital stamps."
"Never like to use digital stamps I haven't bought myself with cash,
and then only from a reputable Swiss bank. But I can't see how that
would have done any harm . . . . is there any chance the stamps might
have been 'used?' That would certainly compromise your traffic, though
not the messages."
"Nope, a few of the messages circulate back to us. They wouldn't if
the "stamps" were no good."
"Not necessarily true. The mom and pop forwarders often accumulate
stamps for a week or more before sending them to the bank. You just
can't check with a bank on dollar or sub-dollar amounts--connect time
eats you up.
"The first link was Telesis, and I know they are on line to the bank
that issued the stamps . . . . Unless they are . . . . in on it. . . ."
Lenny was looking right at the Telesis logo on the phone.
"Yeah, '/Paranoia strikes deep/' . . . . Did the court order say
anything about why they were going after you?"
"No, there was a note on the order that the supporting affidavits
were sealed."
"You guys rate! There hasn't been a sealed affidavit for a DSO I
know about in the last ten years. The stink around the Steve Jackson
warrant took years to wear off! Well, they have to unseal them before
the hearing. The hearing has to be within the next three weeks if I
remember right."
"You do, it's on the 9th of next month, 20 days from now."
"Well, the first thing you should do is change the password, so you
can start forgetting the old one. How much clear stuff was on the disk?
"None that I know about . . . . well actually about half the disk
was filled with the nastiest old published stuff we could find--rabid
libertarian literature and anarchist newsletters, public domain stuff off
a CD ROM. The rest was filled with random numbers from a noise card when
your guy set it up last year, then we deleted about half of it to give us
working space. But far as I know, there was nothing to worry about in
the clear. Snooper hasn't been complaining about unencrypted files when
I run it on startup every morning."
"There is a hole in that program, but it takes some very special
circumstances for it to fail. I kind of doubt you are being watched. If
they were going to go to that much trouble, a search warrant instead of a
digital search order would have been the way to go, but if you are really
worried about them looking over your shoulder, take your machine and the
server to a random motel you've never been to before. Lets see, if you
had to do the whole disk, it would take maybe two hours. You shouldn't
lose anything if you have to interrupt the process in the middle--wait,
yours is a 3 person office?"
"Yes."
"Main password, and then one for each of you?"
"Yes."
"Option 4:7 is what you want to use. It will decrypt only through
the old main password, and reencrypt through the new password. Data
never comes up to clear. Try that."
"Ok. Should I take it off to a motel?"
"Suit yourself. You know how good or bad you have been. But do
keep me informed. Hasn't been a case this interesting in years. Random
route Email by preference, but call if you need to, same method."
-------------
Lenny and Marge checked into a motel which had definitely seen
better times, but was happy to take cash. A lot of people had quit using
credit cards, especially for checking into a motel on the hourly plan.
It was just too easy for people to tap into credit card records. The
swimming pool was dry in July, but what the heck, they weren't here for
swimming.
"I can't believe this, Marge, this power outlet has only _two_
holes."
"Lenny, this place was built before they invented grounding plugs,
what do you expect."
"Well, what the heck are we going to do now?"
"First we look around. No problem, the socket in the bathroom is a
3 pronger."
Lenny plugged in the powerstrip while Marge plugged the pieces of
the PCs together and connected a short network cable between them. Lenny
joked to keep down his nervousness;
"Wonder what they thought of us." Not many couples bring in couple
of PCs to do perverted things in the dark."
"Lenny!" Marge said sharply.
"No, Marge, I meant the _PCs_ will be doing things in the dark, not
us." Marge picked up on the joke by looking disappointed. She really
wasn't. Lenny was one of those rare guys who just did not care about sex
with anybody. Her regular boyfriends knew she was not getting any at
work.
--------------
The 'crypt program rejected the first three passwords Lenny tried as
too simple. Which to him meant easy to remember. He finally got it to
accept anhtre spelled a@n7t%h7e$r (the password program would drop the
final r). Lenny's first password had been sesame. He had used
variations on opendoor, opendore, openwindow, enterhere, portculius,
drawbridge, safedoor, gateway at various times. If anybody had a list of
his passwords, they would be a long way up on selecting attacks. He felt
he was doing the best he could to make them complex, but still
rememberable. He left the duress password (bugout) alone. It was one he
had kept using for years, and never had needed. Lenny wasn't certain he
would use it if he got a chance. Even though Marge backed up the disk
every week, he would lose a lot of work if he used the duress password
and wiped the disk.
-----------
They crammed the computers back into the tiny car five hours later.
Marge dropped the key in the slot by the office and they drove back to
the GreenRage office where Marge and Lenny set up the machines and Marge
started the backup program. The CCA observer made voice and printed
notes of their return on his palmtop from the stakeout location inside a
furniture company office about a block down the street.
---------
The office never got up to full productivity over the next five
weeks, but Lenny did finish and email the project--with notes to the
effect that the enclosed was chapters from a book he was writing, and a
true-to-life description of the data search order being carried out. He
left it up to the folks on the other end. If they wanted to carry out a
project which was in the hands of the cops, it was on their heads.
----------
The DSO hearing went about as expected. The judge granted a two
week extension over the protest of Bruce, the GreenRage's lawyer. When
the day came, Lenny, Marge, Stel, and Bruce were all looking more
respectable than they usually did. Even Stel was wearing a dress (long
out of style, but the only decent one she owned).
The hearing at the federal building started in open court with a
request from the US Attorney for the judge to review the CCS's material
in camera.
"Mr. Mulronny, I have already looked over the affidavits you sent
over, and I can't do it. I already granted you an extra two weeks, and
the law can only be stretched so far. You either have to make a case and
let these people defend their data, or you have to drop it."
Mulronny looked unhappy, but was prepared with the unsealed
affidavits. He gave one to Lenny, one to Bruce, and one to the judge.
The judge looked at Bruce,
"Your honor, this is only about 11 pages, I think my client and I
can review it during a short recess, or you could take up other actions
while we review this."
Court matters were running a little ahead of schedule that morning,
so the judge had the clerk pencil them in after the next two short
actions. They went out in the hall, not worrying about snoops except
being overheard. The last time a judge found out that someone was
bugging the courthouse, the head of the agency that did it spent time in
the drunk tank for contempt.
Lenny had read the affidavit almost through when they reached the
far end of the hall. Bruce waited till he finished, and said,
"Well?"
Lenny shook his head,
"They're after someone else. I've read about some of the events
they are citing, but I sure don't know anything about them."
That wasn`t entirely true. One of the "events" was one Lenny had
put together, but when it didn't come off within a year, he had decided
they had chickened out. Since the project he had put together took out
much of an oil refinery, he was not surprised. Industrial sabotage on
that scale took more than a little guts. When the plant finally blew up,
Lenny watched the papers for weeks, but never found out if it was ruled
accidental. The feds did not seem to be sure either, they only mentioned
it as a possibility. The other accusations were split between cases
where Lenny strongly suspected sister organization had done the deed, or
industrial accidents where some organization had taken credit for what
was probably an accident.
Back in court Bruce complained to the judge that there was nothing
substantial in the affidavit supporting the DSO, and that while his
client did not have anything to hide, the government was asking to break
into the confidential business records of a public interest group. And
if they would not just forget the whole thing, he wanted more time to
respond.
The US Attorney would have asked for more time to respond if Bruce
had not, so he was agreeable. The clerk set a date for 6 weeks off.
--------
Lenny was paralyzed from the neck down. The judge was asking him
for the password, and he could not remember it. The bailiff, clerk,
Bruce and Mulroony were all talking in a huddle and he could not make
sense out of anything they said, no matter how hard he tried.
"This will do it!" one of them said, and jammed a furry dead fish
under his nose.
Lenny found he could move as he pushed it away. He woke up to find
the cat had been licking his face and smelling of fish flavored cat food.
5:14 AM. "There isn't much point in trying to get back to sleep," he
thought but Lenny flopped back on the bed. The cat started to purr and
kneed the covers. Lenny absently rubbed its head, and thought about the
next fundraising letter. The DSO had had the effect of galvanizing the
GreenRage membership, so donations were way up, and for the first time in
several years, there was more than just a little money in the bank
account of GreenRage. Of course, it was flowing out almost as fast.
Even though Bruce charged about half the going lawyer rate to public
interest organiztions, fighting the DSO was going to cost them a bundle.
"Just how much of the stuff on the disk is going to cause trouble,"
Lenny realized he had spoken outloud. If they asked for a special
master, the membership list could be declared off limits. Unlike the old
days, when the cops could look through outgoing mail at the post office,
an electronic mail list was fairly secure.
There wasn't much of interest in the finantial records either. Oh,
a few thousands spent for sabatage material would be hard to account for
if they really dug into it, but the bulk of the money was spent on
saleries, office supplies, rent, and telecom charges. They could always
claim the money was spent on spray cans and ceramic spikes for trees.
And we can say we spent it for dope. Lenny grinned at this one. He had
given up smoking dope, made him too paranoid. But, every fall some
unknown but appreciated benifactor sent the office a plastic tub of the
stickyest buds you could imagine. Perhaps one of their above ground
efforts had saved some trees screening the "crop." Marge and Stel had
split the tub the last two years.
The problem was not the lastest project. Nor was it the one or two a
month Lenny had put together over the last 3 years. They were long
perged, and the disk space overwritten. And he didn't worry about the
contents of the newletters. Presumably *somebody* on the list was a
ringer, and the cops had a collection of *The GreenFlag.* What woke
Lenny up in the middle of the night (besides his cat) was the stuff which
they had on that WORM disk which *had not yet happened*. He could
probably get away with claiming that the files on the events which had
happened were interactive fiction based on news stories. Or could he?
Nope, the damn files are dated prior to the "events," he thought. And,
even though fewer than half of the projects he had worked on ever came
off, there were at least three or four of them they could nail me on.
Lenny turned the light on and pulled his palmtop out of the charging
stand next to the bed. He stretched the keyboard out to full size and
set there trying to put his thoughts in order. After entering his
password, he brought up an organizer program. It prompted: State the
problem.
"I don't want to go to jail for conspiricy. The only way to stay out
of jail is to keep the cops from looking through the GreenRage computer
files. Or is it? If they can't convence the judge that they need to
look through the files, then no problem. If they can, then they come
asking me for the password. Assuming they can't crack the encryption--
which seems likely. If I give it, I go to jail, if I don't, I may get
jailed for contempt, unless they give me blanket immunity. In either
case, my days of managing monkey wrench projects are over."
The organizer program came up with:
You have used one or more legal terms. We recommend you submit your
completed outline to a lawyer.
It then proceeded to break the statements into an if-then-else logic
tree which did not help Lenny much either.