foundation. The voice-over describes her many accomplishments and ends with a visual of the White House and: W ILL SHE OR WON â T SHE ? F IND OUT TOMORROW AT EIGHT P.M. IN E RICA S PARKS â S EXCLUSIVE INTERVIEW WITH K AY B ARRISH .
Erica clicks off the set, feeling a combination of excitement and almost overwhelming pressure. She retrieves her deck of cards, sits on the edge of the bed, and plays three hands of solitaire. Then she calls the front desk and asks for a printer to be sent up. When it arrives, she prints out the introduction and the questions she has written up. Then she starts to rehearse, walking around the room as if she were at Barrishâs house. She goes over it again and again until she has it just about memorized. She wants to be prepared for any eventuality.
Before she knows it, itâs almost ten oâclock. She takes a shower, slips into an oversize T-shirt, gets into bed, and turns out the lights. She lies there as her exhaustion battles her adrenaline. She needs to sleep. She closes her eyes and tries to clear her mind. Just as sheâs dozing off, her hotel phone rings.
âThis is Erica.â
âErica, itâs Mark Benton.â His voice is charged and urgent. She sits up, throws off the covers, and swings her legs to the floor. âIâve been working nonstop on our project. I was up all last night and called in sick to work today. I borrowed a page from the North Koreans and hacked into the computer of a midlevel manager at the NYC Department of Transportation. I took on his identity and then used it to maneuver through a maze of DOT systems. But I finally got into the ferryâs system. Erica, the ferryâs controls were hacked.â
âAre you sure?â
âYes. The log files on the DOT router I used to get into the ferry system show invasive activity minutes before the crash.â
âDo you know by who?â
âNo. Finding their identity is going to be a lot harder. I need an IP address or something else to go on, and these people are very good at covering their tracks. They use proxy servers to block or mask their IPs, and Tor, a freeware program that hides your identity online no matter what youâre doing. It basically makes them invisible, or at least indistinguishable from millions of other people online. It could be anyone anywhere. The ferry could have been hacked from Beijing, or it could have been done from Fourteenth Street.â
âBut still, the crash was an act of cyberterrorism.â
âIt certainly looks that way to me.â
Erica stands up and starts pacing. âWhere do we go from here?â
âIâm just going to keep digging, looking for anything that might tell us where the hacking originated. They may have been sloppy somewhere along the line. But listen, forget about this until after the Barrish interview.â
âThat wonât be easy. Five people died in that crash. A dozen more are still in the hospital.â
âThe closer we get to the hackers, the greater the danger that theyâll find out about us. Theyâre very sophisticated and are no doubt monitoring for intrusions, just like Dave Mullen is up on the sixth floor at GNN.â
âGreat work, Mark.â
âItâs exciting. And scary.â
Erica suddenly feels cold. âWe may have opened Pandoraâs box.â
âYeah, the demons are out.â
They hang up. Erica grabs a throw and wraps it around her shoulders. She walks over to the window and looks out at the California nightâthe Pacific is glistening under a three-quarter moon, and the pierâs amusement park is lit up like a pinwheel. But all she sees is darkness.
CHAPTER 20
ERICA â S INTRODUCTION AND THE TOUR of the grounds with Kay Barrish have gone well. The crew is busy setting up for the live interview in the living room. Erica, Greg, and Kay are in the kitchen, alongside Kayâs chief of staff, Audra Ruiz, and
Simon Scarrow
Mary Costello
Sherryl Woods
Tianna Xander
Holly Rayner
Lisa Wingate
James Lawless
Madelynne Ellis
Susan Klaus
Molly Bryant