Sheldon looked at Ann. “So, what do you think they’re selling? Japanese tea gardens? European sports cars? Evening wear and sexy shoes? For all I know, they were selling those little Cat Woman ears.”
Ann glared at him. “You just made that whole thing up. Nobody would shoot a commercial like that.”
“I didn’t make it up,” Sheldon said. “That’s what I’m trying to tell you. Japanese commercials are all like that. They don’t make sense to anybody who wasn’t born into the culture.”
He set down his coffee cup. “When we get back to the States, I’ll find that commercial on the Internet, and download it for you. I’m really not joking.” He laughed, and started singing again. “Kitty paws … Like Santa Claus …”
He chopped off in mid-note. His cell phone was ringing. He flipped it open and held it to his ear. “Sheldon Miggs.”
He listened for a second. “Thanks. We’ll be right out.”
Sheldon closed his phone, and took a final gulp of coffee. “Grab your bags. The excitement has arrived. In this particular case, the excitement takes the form of a U.S. Air Force van, with a government-issue driver.”
He pushed back his chair and stood up. “How about it, Cat Woman? Ready to go rescue mankind from certain destruction?”
The titanium cylinder hung suspended in the water 100 meters below the ice, at the end of a Kevlar-jacketed cable. The cylinder was anodized in a flat gray color, the precise shade of which had been calculated by marine biologists to resemble neither food, nor predator. The protective Kevlar cable jacket had been molded in the exact same color, for the same reason.
The sea creatures inhabiting the strange twilight world beneath the ice pack were ravenously hungry, and the more predatory species guarded their territories with jealousy. Although the Kevlar and titanium were tough enough to resist easy damage, it was important that they not invite attacks by any fish or mammal that might mistake them for an enemy, or for an easy meal.
This last was particularly critical, because the titanium cylinder was an acoustic transducer. It transmitted and received audio signals underwater, and those signals were modulated to closely simulate the noises produced by the shrimp-like krill that lived under the ice pack in teaming schools.
When it was broadcasting, the transducer made the same frying bacon hiss produced by swarms of krill as they fed on ice-algae and phytoplankton. Because the krill themselves were a major source of nutrition for many of the fish and sea creatures living in the water beneath the ice pack, that meant that the transducer’s signals sounded like food. And — the durability of titanium and Kevlar aside — a piece of equipment that sounds like food, should not look like food as well. The carefully non-food coloring of the cable and transducer had been selected with this in mind.
Apart from the obvious drawbacks inherent in making sounds like an easy meal, the feeding noise of the krill was nearly perfect for masking a digital audio signal. The crackling hiss was rich with white noise, a jumble of high and low frequencies into which binary information could be encoded with ease.
The advantages of this were twofold. It would be nearly impossible for an outside listener to decode the digital messages without the proper encryption/decryption algorithm. But more importantly, the sound of feeding krill occurred naturally in the waters under the ice pack. If an acoustic surveillance sensor happened to intercept a transmission, the sound would be classified as typical ambient noise made by local sea life. No sensor operator or acoustic analyst in the world would recognize it as a manmade communications signal. For all practical purposes, that made the system invisible to anyone who did not already know of its existence.
The encryption/decryption algorithm at the heart of this covert transponder system had been programmed by a pair of graduate students from the Massachusetts Institute of Technology. Perhaps one or both of the students had eventually grown to suspect that their enigmatic employer did not really represent an eco-friendly alternative energy firm, as he had claimed. Perhaps the young programmers had also guessed that the true purpose of the software had nothing to do with bio-density surveys. But any misgivings the two students might have felt were now moot. Both men had been killed within hours of delivering the final version of their software.
Detectives from the Cambridge Police Department were investigating both deaths, but had failed to turn up evidence of a connection between the cases. One of the students had slipped in a hotel shower and cracked his skull. The other had been killed by a hit-and-run driver. The circumstances of the cases were quite different, and both deaths appeared to be accidental. Even so, the police found it exceedingly suspicious that two students from the same department at MIT had died on the same afternoon.
At various points in the investigation, the homicide detectives considered and discarded a long list of possible suspects, including friends of the victims, fellow students, known enemies, relatives, girlfriends, possible romantic rivals, and several smalltime drug dealers known to ply their wares near the MIT campus.
The drug angle was a stretch. Neither of the victims were known users, and the toxicology screens from their autopsies showed no traces of any controlled substances. The dealers had been added to the list when the detectives realized that they’d run out of suspects. With two college-age men dead under suspicious circumstances, it was possible that drugs were somehow involved, and no one seemed to have any alternative leads.
But the suspicions of the police — whatever they might have been — did not involve trained assassins from the Chinese military, nor covert under-ice communications systems, nor hijacked Russian nuclear submarines. Which meant that the Cambridge police had no chance of actually figuring out who had murdered their two students, or why.
A little over 4,600 nautical miles northwest of Cambridge, Massachusetts, the motive for the MIT murders was gliding quietly through the frigid waters beneath the Siberian ice pack. Submarine K-506 had been built as part of the Soviet Union’s Project 667BDR construction program: the Kal’mar class — what the NATO countries called the Delta III class.
Although the submarine was more than three decades old, and much noisier than current generations of missile subs, it was still quiet enough to escape detection at low speeds. So it moved slowly and deliberately, creeping through the dark waters under the ice at less than four kilometers per hour — just enough speed to keep water moving across the rudders and stern planes, for steering and depth control.
At a range of one kilometer from the designated coordinates, the submarine’s Burya underwater communications system began transmitting an acoustic signal into the water. The signal sounded nothing like an ordinary Burya transmission. The equipment had been modified to broadcast and receive only the crackling and hissing signal that so closely mimicked the feeding noises of the under ice krill.
The signal was received by the cylindrical titanium transducer. Thin wafers of piezoelectric crystal within the transducer resonated in time with the vibrations of the sound waves. The tiny stresses created by these vibrations caused the crystal wafers to alternately contract and expand. The fluctuations were nearly microscopic in scale, but each deformation of the piezoelectric crystals generated a minute pulse of electricity.
The technology had been invented for quartz movement wristwatches, but it worked equally well in this application. Each electrical pulse was channeled into a transistor, where it was amplified for better examination. The amplified pulses were then routed to a binary discriminator circuit, where they were converted to digital ones, or digital zeroes, depending upon their strength and polarity.
The stream of digital pulses from the discriminator circuit passed through a splitter bus, and then a short length of ribbon cable, to reach a microprocessor configured as a binary parser.
The parser stripped out ambient ocean sounds and the masking junk information that had been woven into the acoustic signal to disguise it as random biological noise. The output of the parser was a complete and coherent digital message, rendered in perfectly-legible binary code.
The digital message shot up the fiber-optic wires at the core of the Kevlar cable, and followed the cable through the thick ice layer, to another microprocessor, sheltered in an insulated protective housing under a few centimeters of concealing ice and snow.
The second microprocessor examined the contents of the digital signal, to determine whether or not it contained a destruct command. If a destruct command had been present, the microprocessor was programmed to detonate an array of shaped explosive charges drilled into the ice in a circular perimeter.
No destruct signal was present, and the explosives were not triggered.
The microprocessor reverted to its secondary program, encrypting the digital signal to protect its contents. When the encryption process was complete, the computer immediate re-encrypted the signal, using an entirely different code scheme. The double-encrypted block of digital code was uploaded to the outgoing message queue of a satellite phone within the same insulated enclosure.