Read Deadline Y2K Online

Authors: Mark Joseph

Deadline Y2K (5 page)

BOOK: Deadline Y2K
9.65Mb size Format: txt, pdf, ePub
ads

Bo Daniels' father was an accountant and his mother owned a fashionable boutique. He spoke middle-class English with a Boston accent, went to all the right schools, and had learned early on that computers didn't care if he was black or white. Chase had hired him right out of Boston College, put him in the back room of the Boston branch and left him alone. As he watched the drones in the bank being moved around like chess pieces by higher management, he'd decided he didn't want a career at Chase. Corporate culture didn't interest him unless he created it, and that wouldn't happen at Chase or any other bank. He wanted to jump right to the top and be the boss. Less of an outlaw than the others, he had an entrepreneurial spirit and saw in his new work an opportunity to go into business for himself. In the months after the millennium bug struck, he figured electric utilities would need new software to get up and running again. Bo and Doc agreed that the software they were developing for ConEd could be repackaged and sold after January 1, 2000.

Judd Fernandez's Mexican mother had raised him alone in the barrios of San Jose. Surrounded by poverty and gangs, he had enough sense to look beyond the low-rider life around him to the neatly trimmed industrial parks that sprouted like mushrooms right next door in Silicon Valley. He wanted a job as a programmer, and there were jobs galore, but not for him. He was a punk from the barrio, self-taught, with no recognized merit badges and unskilled at writing sophisticated resumés. His talents went unrecognized. Rebuffed when he applied for work as a programmer at Intel, he decided to get even. He hacked into Intel's most secure systems and stole schematics for a dozen new chips. Then, full of himself, he took his stolen goods to Los Angeles and was snared in a sting by the LAPD. Tried in superior court, he was sent to state prison for three years. Getting caught selling the goods in no way diminished his achievement of hacking into Intel and downloading their most precious files. In hackerland, that was extreme, perhaps beyond belief, and no one would have believed it if it hadn't been proven in court.

And finally there was Adrian Hoffman whose life might have been a sequel to
Natural Born Killers.
He grew up in seven different trailer parks in Central Florida. His mom was a ticket seller at Disneyworld, and his dad drank himself to death when Adrian was twelve. Adrian was a totally dysfunctional human being from K-Mart America with one saving grace. He understood the relationship between trains and computers better than anyone on the planet.

The day after Judd dressed him down, Adrian disappeared for three days. Doc was ready to replace him when he realized the kid was riding subway trains and exploring the city's private railroad.

“For God's sake, Adrian,” Doc pleaded when the prodigal returned, “just tell somebody where you're going and what you're doing.”

To keep him around Nassau Street, Doc bought HO scale models of the subway trains and let Adrian build a layout in the computer lab. With gentle coaxing, Doc got him to model the subway's signal system and use the toy trains to test his software patches.

*   *   *

Doc bought a huge condo a few blocks from Nassau Street in Battery Park City for them, and they had no choice but to learn to live and work together. Their constant proximity produced countless squabbles, two relationships and one breakup, but ultimately, using gentle persuasion, sensitive guidance and the discipline of an implacable deadline, Doc forged them into a unified team with a mission. By the end of 1997 the mission had taken possession of their psyches, and they gradually began to withdraw from the world. Outside relationships became difficult as the constraints of secrecy and silence made anything beyond small-talk impossible.

Judd helped by recounting how he'd learned to live in prison. “Just keep yourself to yourself and live in your heads,” he told them, and their heads became a collective head as their ethnic and personal identifications faded away. It wasn't long before they were swept up in the urgency of their task. Two and a half years seemed like a long time, but it grew shorter every day. Nothing could be put aside or left undone.

Ronnie quickly became an expert in the city's water supply that flowed from the Catskills through hundreds of miles of tunnels, aqueducts and reservoirs. Adrian played with his model trains and took sight-seeing trips through the tunnels and into the yards. Carolyn walked the streets of Manhattan, following phone lines from junction box to building to Bell Atlantic router. Doc bought her a truck, a hard hat and genuine Bell Atlantic ID, and she went into the tunnels beneath the streets, inspected the lines foot by foot and tested every chip with a logic probe. In a year she worked her way a hundred blocks from Nassau Street to the ConEd Systems Command Center at 65th and West End Avenue, and from there to the four power plants on the island and the huge Ravenswood plant across the East River in Queens. When she finished hardwiring the lines to the power plants, she started on the lines from Nassau Street to the Department of Environmental Protection offices in the Bronx and the subway's central dispatch office in Brooklyn.

Bo visited the bookstores around Columbia University and bought himself an education in electrical engineering for a few hundred dollars. An ordinary computer nerd would have hacked into ConEd and stolen applications without knowing or caring about the physical systems they controlled. That wasn't good enough. Bo had to know how and why and where, and in the end, who.

Six months after he started, Bo knew more about Con Edison than the CEO, Mr. Peter Wilcox, whose e-mail he could read although he didn't have time. He knew where the different subsystems worked together efficiently and where they didn't, and which sub-stations between Manhattan and the power plants were likely to blow like weak links in a chain. He'd figured out how to correct the Y2K problems and build a system that would keep the power on in Manhattan, but he had no way to trick the power company into switching over to the computer on Nassau Street. He needed secret override passwords to put his knowledge to work.

“Well,” Doc asked him one day in 1998, “can we save New York?”

“Not without help,” Bo answered. “I need someone inside who can give me passwords. Without the override codes, at the moment of the century rollover, I'm dead in the water. Find me a spy.”

“No problem,” Doc replied. “They're all over the Internet.”

Finding an insider who occupied a key position in the power company's control rooms was less difficult than finding competent hackers. No one had a better understanding of Y2K problems than the hardcore professionals who sat at the controls. These men and women communicated extensively via the Internet, often using pseudonyms to hide their identities. Power plant engineers, telephone system programmers, transit system authorities, and dozens more exchanged ideas and technical information in cyberspace.

Doc logged on to the Usenet and within a month had found an engineer who posted messages under the name “Deep Volt.” A senior operator at ConEd's system operations command center, Deep Volt was convinced the power grid was going to fail. Doc started sending the anonymous engineer the locations of Y2K bugs Bo had found that were missed by the company's own Y2K programmers. In exchange, Deep Volt provided secret documents, applications and system schematics. They had their insider, and from that moment on, the work progressed much more quickly.

As they got into it, they started to call themselves the Midnight Club. Ronnie had T-shirts printed with the skyline of Manhattan at night. They worked like dogs, and by the end of 1998 they'd ascertained the city's true state of readiness for the coming assault. The prospects were dismal.

After spending several hundred million on Y2K, Con Edison had the most advanced remediation program of any power company in the world, but the giant utility was at the mercy of malfunctions anywhere on the Northeast electrical grid. The interconnected systems were so complex that the chances of every company on the grid making each fix exactly right were nil. Probability studies predicted failure. If the power went down, nothing else would matter.

The telephone system had the best chance of survival because Bell Atlantic had done everything they could think of at a companywide level to correct their Y2K problems, replacing embedded chips in routers and switches and checking every application for flaws. At the local level the work was uneven and inconsistent. Like every other system, Bell Atlantic was part of a wider network of interconnected systems, and the interconnects were extremely vulnerable and subject to failure.

The Department of Environmental Protection had one of the oldest, most decrepit computer systems the Midnight Club had ever seen. Like many city departments, the DEP was the private bailiwick of senior managers who dwelled in their own hermetically sealed universe. Their system had worked efficiently for decades and they saw no reason to change.

“We'll just have to do it for them,” Doc said.

The Metropolitan Transit Authority had recognized the Y2K problem early, and the overall compliance was remarkably advanced, but the subway's train control system was ancient, having been hardly touched since the 1950s. The advantage of running an antique was that the electrical relays were mechanical devices without embedded chips. The trains would be safe, but the problems lay in the automated train boards at the MTA's traffic control center on Jay Street in Brooklyn. Adrian found undetected millennium bug flaws that would shut down the screens, and the system operators wouldn't be able to see where the trains were. They'd have to rely on the MTA's radio communication system, which was dependent on flawed chips in the radio transmitters. When the screens and communications failed, the system would come to an immediate halt.

Left alone, New York's most vital systems would break down. In midwinter, the technological overlay that made the city work would be stripped away like bad varnish, reducing New York to medieval conditions. Projecting what would happen after that depended on one's view of human nature. If people were evil and wicked, then looting and pillaging would be the order of the day. On the other hand, if the citizens of New York were concerned with their mutual benefit and survival, people would adapt and help one another. Doc believed he'd see plenty of both.

*   *   *

After two years, the Midnight Club had hardened into dedicated, militant soldiers of cyberspace. They were ready to take over and operate the deep infrastructure of the island of Manhattan, but they needed the essential Con Edison override passwords for the final switchover. With them, they had a chance to wrest control from the ConEd computers and save the island from a massive power failure. Without them, New York was kaput.

With six months left, they had almost everything they needed, but not quite. Deep Volt was unable to obtain an essential set of ConEd passwords that unlocked the override controls that switched the primary system to the backup. Without those passwords, Bo's work would go for naught. Instead of switching to Nassau Street, the ConEd computers would switch to their own backup systems that contained the same flaws as the primary, and power would be lost. The passwords were kept on a locked PC with no connection to the outside world, and there was no way to hack in and get them.

“Your spy isn't worth a damn,” Bo complained.

“She's doing the best she can,” Doc said in her defense. “She's risking her job. If she breaks in and steals the passwords, she'll be caught and they'll change the passwords.”

“There must be a way,” Bo insisted. “Find a thief.”

“Thieves don't advertise on the Net.”

*   *   *

The Midnight Club was isolated from the rest of the city, but they weren't operating in a vacuum. By March of 1999 news of the coming millennium bug was beginning to reach the general public. In that month companies whose fiscal year began in March started encountering problems they hadn't expected. If no man is an island, neither is a company. The world was learning that virtually all the computers on the planet were part of one huge network that was as vulnerable as the weakest link. Firms who believed their systems were Y2K compliant suddenly found their expensive new software was corrupted by files imported from suppliers and customers who were not compliant. The technical difficulties of finding corrupted code in a maze of computer languages, lost documentation and shoddy programming became apparent. Bankruptcies mounted and panic began to creep into the financial community. Companies that had delayed the allocation of funds for Y2K because they believed the return on investment was zero realized they'd made a mistake. To their horror they discovered that no programmers were available to sort out their problems. It was too late. Every month as another round of firms began their fiscal year, the problems intensified. Billing and accounting programs went haywire, exactly the way Doc had demonstrated on Old Blue.

People looked to the federal government for leadership, but none was forthcoming. The Senate and House held hearings and experts repeated what they'd been saying for years, and the result was to call more panels of experts and create bureaucracies that argued over definitions. Every day, as the inevitable deadline crept closer, the responsible authorities argued and debated and discussed, and another day was lost. Unclear on the concept, the government foundered. Agencies such as the Social Security Administration that had been working on Y2K since 1989 learned that inadequate measures in other agencies thwarted their meeting objectives. When 2000 arrived, Social Security would be able to distribute funds, but the Treasury Department would be unprepared to cut checks. Faced with impending paralysis within its own systems, the government was revealed as powerless and irrelevant, reduced to nothing more than an obstacle and a nuisance.

*   *   *

Millennia, years, days, and nanoseconds are convenient ways of measuring time, and accurately measuring time is important to computers. Units of time are finite objects a computer can recognize and count, and it is the counting that allows a computer to compute. Computers count time as a way of sequencing processes. One of the first things a computer does when it is turned on is tell itself the time and date.

BOOK: Deadline Y2K
9.65Mb size Format: txt, pdf, ePub
ads

Other books

The God Box by Alex Sanchez
Traditional Change by Alta Hensley
THE CRITIC by Davis, Dyanne
Dangerous Mercy: A Novel by Kathy Herman
The Scribe by Matthew Guinn
A Home for Haley by Mary Jane Morgan
ZOM-B 11 by Darren Shan
Dangerous Times by Phillip Frey