Counting from Zero (21 page)

Read Counting from Zero Online

Authors: Alan B. Johnston

Tags: #FIC036000, #FIC022000

BOOK: Counting from Zero
4.99Mb size Format: txt, pdf, ePub

He had missed her as well.
 
Jocelyn worked part time at a public library a few blocks away, mainly while Sam was at school.
 
They caught up over a cup of coffee until Sam burst through the door, kicking off her shoes, dropping her coat, and shedding her book bag in a single fluid movement.

“Uncle Alec!” she shouted with a big grin on her face.
 
Her hug was short as she grabbed his hand and pulled him up out of his chair and towards her part of the apartment.
 
There were few walls in the space, but her corner was clearly identifiable by the artwork on the walls and colorful books on the shelves.
 
“Let’s do Origami!” she exclaimed, sitting down and pulling out colorful squares of paper.
 
Fortunately, he had anticipated this and had learned a few new patterns in Nihon.
 
They passed quite a few hours happily with one project naturally and seamlessly leading to the next.

Joe arrived home when it got dark, shaking Mick’s hand firmly.
 
Joe was a photojournalist for the Globe and had a weather-beaten air he had no doubt perfected on trips to Iraq, Afghanistan, and Palestine.
 
Mick could see why Jocelyn would be attracted to him, but he couldn't really see how she could be married to him – they seemed too different.
 
He suspected that Kateryna would probably enjoy talking with him about photography.

 

Later, he helped put Sam to bed.
 
She asked for a story, and again he was prepared.
 
He told a story from Tokyo about the Forty Seven Ronin, samurai left without a master after the murder of their warlord.
 
They spent years plotting and planning revenge on a rival warlord responsible for the murder.
 
When they accomplished this, they all committed ritual suicide together, known as Seppuku in Nihon.
 
Mick hoped his sister wasn't listening in, or he would get it later, but Sam loved it, and wanted to talk about honor and self-sacrifice and why people do the things they do.
 
Eventually, she went quiet and he managed to slip out as she drifted off into sleep.

At the kitchen table, Jocelyn looked tired, so he declined her offer of coffee, suspecting she was just doing it out of politeness.
 
Mick hoped perhaps there'd be a chance to talk tomorrow.
 
He shared a few choice observations about the evening with his social network,
then
retired without even checking mail.

 

The next morning, over breakfast, Mick was grilled.

“So, explain to me again what a 'buffer overflow attack' is?” Sam led off the questioning.

“Have you been trying to read Uncle Alec’s dissertation again?” Jocelyn inquired from behind the sink.

“Yes, but I still don't get it,” she pouted.

“That’s OK… it is a little theoretical,” Mick began.
 
Seeing that Jocelyn was about to interrupt, he continued.
 
“I don’t mind, really, sis.
 
Let me try an analogy…” he began.
 
He enjoyed the challenge of trying to explain complicated technical topics to his youngest admirer.

A few minutes later, Jocelyn had a look on her face that suggested that perhaps she just had a glimpse into her brother’s world for the first time...
 
Sam seemed satisfied for the moment, too.

“OK, I'm off to school.
 
Bye Uncle Alec!” Sam said running out the door, waving to her uncle, kissing her mother, and dashing out of sight.

Joe joined them for breakfast a few minutes later, so Mick couldn't bring up his topic with Jocelyn.
 
Joe continued the grilling where Sam had left off.

“Alec,” he began, “What if someone invented an unbreakable encryption algorithm!
 
Could you imagine what would happen?”

“Actually, there already is an unbreakable encryption algorithm, and governments of the world have been using it for decades now.
 
It is known as a ‘one time pad’!” Mick replied, having been asked this question before, probably as a result of a popular, but inaccurate fictional thriller on the topic.

“Oh, I see.
 
Hmm.
 
I had another question,” he continued.
 
“So you are the security guru and so you make us use all these weird programs to email you and call you and everything, right?
 
You're big on security – I get that.
 
But do you have triple deadbolts on your doors?
 
Do you drive an armored car?
 
It seems like you aren't consistent.”

Mick nodded and leaned back in his chair.
 
Joe had a good point.

“Well, I do keep my door locked at my apartment, I don’t actually own a car; car sharing works quite well for me.
 
But if I did, it wouldn’t be an armored car.
 
I don't go overboard on my physical security, and I don’t think I go overboard on my Internet security, even if it perhaps appears that way.
 
Here’s the big difference: if criminals want to break into my house, they have to travel to my apartment, drive or walk down my street, break a window or door, right?
 
If they want to steal something, they have to carry it out under their arm or throw it in their vehicle.

“Now compare this to my electronic possessions.
 
If cyber criminals want to break into my computer and steal or delete my information, they can do it from anywhere in the world if I am connected to the Internet.
 
They can sit in complete anonymity in any part of the globe and launch attacks on my computer.
 
Consider the risk to them.
 
Which is more risky, having to be present on my street, or typing in commands over the Internet?

“Think about tapping my communication.
 
Before the Internet, to tap my phone, they would have to attach alligator clips to the phone wires in the wiring closet in my building, or climb a telephone pole on my street, or break into the local telephone company central office building where the wires that go into the mainframe computer (known as a telephone switch) are located.
 
All of these involve a lot of risk; the wiretappers could easily get caught.
 
Now with Internet phone calls, they can potentially listen in using a piece of software installed remotely on my computer or server.
 
The software can then record all my calls and email the recordings to someone on the other side of the globe.
 
The attackers never have to leave their house or have any physical connection to monitor me.

“And that’s not considering the automation possible, that a single piece of software can search the Internet looking for any particular type of communication.
 
So maybe they aren't targeting me personally, they are just recording calls, then doing automatic speech recognition to look for spoken digits that might be a bank account, credit card, or pin number, for example.

“Just as communication becomes very easy with the Internet, attacking and monitoring someone becomes easy as well, and requires adequate security to protect against it.

Joe nodded slightly.
 
“But isn't it just about who you trust?
 
You don't trust anyone, and it forces you do all this?” he countered.

“Joe, the great thing about the Internet is that you don't have to trust anyone.
 
Just by using proper security techniques, you can verify everything and everyone.
 
Of course, this does all fall down if someone steals your secret keys or hijacks your personal accounts by learning your passwords.”

“Yeah, I kind of get it.
 
But don’t you get tired of it all?
 
Don’t you feel like a spy or something?
 
And, what do your girlfriends think?”
 
Joe had hit close to home with this question.
 
Sometimes, it did grate on Mick, but he just couldn’t ignore it and pretend to be oblivious.
 
Perhaps this was one reason why he had felt so comfortable with Kateryna: there was no need to explain this whole side of his life as she already got it.

Joe seemed to realize how much time he was wasting discussing such trivial topics, and packed up his things and got ready to set off.

“Oh, Alec, you said you’d tell me the address of that website that lets photographers securely upload their images for archiving.”

“Sure, here it is,”
Mick
replied, writing it down on a piece of paper.

“Why do you do that?
 
Why do you put a slash through a zero?” he asked.

“To distinguish a zero from the letter ‘O’, of course,” he replied, surprised it needed an explanation.
 
Most programmers did this out of habit, as confusion between Ø and O could easily cause a password to fail, or code to not compile.

When Joe left, Mick finally had his sister to himself.

“So, Jocelyn, come have a
cuppa
with me,” he called out to her, offering a cup of coffee.
 
She smiled and sat down in the chair next to him and took the cup.

“So, what’s on your mind?” she asked.

“What makes you think something’s on my mind?” he replied.

“I knew as soon as you walked through the door.
 
What is it?
 
Or should I say, who is she?”
 
she
asked.
 
Mick smiled back at her.
 
His emotional encryption was obviously just
a two-time
pad to her – encryption that was easily broken.
 
He briefly wondered if this was obvious to others besides her.

“OK, yes, there is someone.
 
Her name is Kateryna, but we’re just friends…

 
Jocelyn smiled.
 
“And she’s married.” The smile melted away.
 
“I know, I know.
 
We met a few weeks ago in Hiroshima, and then again in Seattle – I had no idea she was married.”
 
Mick held up his hand as Jocelyn looked about to interrupt.
 
“We’ve been working on a few work projects together.
 
Then last week in Vegas she tells me she is married.
 
I just don’t know what I’m doing, or even what I want...”

“Oh, no!” she began.
 
Mick shrugged.

“I should be angry with her, but I’m not.
 
I should stop thinking about her, but I can’t.
 
What’s the matter with me?” Mick asked.

“You know the answer…” Jocelyn replied, and Mick nodded.
 
“Any kids?” Mick shook his head.

“No.
 
Her husband is a Romanian immigrant as well.”

“Oh, Alec, please be careful.
 
I know you can take care of yourself, but I think you’ve fallen for this woman,” she began.
 
“Does anyone know?” she asked.

“No one besides you, I think.
 
Although maybe Liz has guessed.”

“Sure, makes sense.
 
You still need to sort things out with her, too, you know!
 
So, brother, you obviously want to talk about Kateryna, so tell me about her.” Jocelyn replied leaning back in her chair.

Mick gave a little grin in spite of
himself
and began to tell the story of how they met in Nihon and their adventures in Seattle and Vegas.

Thank goodness for sisters!

Nearly an hour later, Jocelyn indicated she had to head out to the library.

“Alec, I’d love to chat longer, but I have to get to the library early to check out the new RFID system,” she said, referring to a Radio Frequency Identification system.

“Cool!
 
So all the books have a little RFID tag in them?
 
I’ll bet it makes re-shelving and inventory a breeze,” he replied.

“You’re not kidding!
 
We now have an automated system that sorts the returned books and tells us exactly where to put them back on the shelves.
 
And inventory used to take days with the library closed.
 
Now we just walk up and down the shelves with a reader, and it tells us which books are in the wrong place.
 
It is just great!”

“OK, no problems.
 
I have plenty to amuse myself here,” he replied.

Mick thought it fitting that Jocelyn worked in a library.
 
As children, they went together to the library nearly every day, and sometimes he couldn’t get her to leave.
 
She was one of the few people he knew who read more books than
himself
.

Mick relaxed when she left, replaying the conversation in his head.
 
Jocelyn was right – he mainly just wanted to talk about Kateryna to someone.
 
But he did plan on taking her advice seriously, and to not get more involved with Kateryna.

After the conversation about RFID tags, Mick did a little research about RFID trackers in clothing.

Other books

Short of Glory by Alan Judd
A Nose for Death by Glynis Whiting
Girls Under Pressure by Jacqueline Wilson
Dead Woods by Poets, Maria C
Under An English Moon by Bess McBride
Chain of Attack by Gene DeWeese
Broken Butterflies by Stephens, Shadow