
He placed his device back in his briefcase, snapped it closed, stood up, and walked out. At that point he made one minor mistake, one he would not be expected to know. You had to tell the damned thing to clear and reset the codes. If you didn’t, this computer didn’t react like all others and simply stay on—intolerable, with access to such secrets—or shut itself down. When it “saw” that the operator had left the room without resetting it, the machine advised control personnel of that fact, then locked in emergency shutdown until reset.
As the little man reached the first checkpoint door on his way out, things were already starting to crack around him.
The young woman glared for a moment at the red alert light that had flashed on her console. She ran a quick check to make sure there was no internal malfunction, then punched up the trouble—the Eyes Only Storage Computer.
Although she was one of those with part of the code that would activate the computer, she could not ask it any questions on its information storage from where she was—but she could get security information. She knew she had given no access so far today, so she punched two buttons and instructed, “Run tape last operation.”
The little man’s face showed clearly. Not only his face, but his retinal pattern, thermal pattern, everything about him that could be read by remote sensors and recorded. She brought in the rest of the computer net. “Identify!” she commanded.
“Threht, Augur Pen-Gyl, OG-6, Logistics,” came the computer’s reply.
Before her hand could hit the alarm it had already been hit by two of her associates.
No alarms sounded, no flashing lights and whistling bells that would panic or tip off a spy. Instead, as Threht reached the third and last security door, peered into the oculator, and pressed his palm on the identiplate, it simply refused to open.
