
The utility appeared next to him in the customized iconography he'd given it: a trode-patch electrocardiograph monitor like those used in hospitals. Programming on the fly, Red Wraith modified its outer casing, shaping it into a gleaming chrome spike like those on the treads of the tank. Then he reached up and jammed it home. The trode patch on the wide end of the spike sampled the graphic imaging of the IC, then adhered firmly as it was incorporated into the tank's programming.
A series of pulsing red lines appeared in the darkness in front of Red Wraith as the utility began its analysis. He scanned them quickly as the tank rumbled clear of the I/O port, noting the oscillation of the sine wave and the frequency of the peaks on the baseline below it. The readouts told him not only what type of IC he was up against- blaster, an attack program that could send his cyberdeck's MPCP chips into meltdown on a successful hit-but also how tough the program would be to crack.
Diagnosis: tough. But not mega. And that puzzled Red Wraith. He'd decked into a military computer system containing confidential personnel datafiles; the IC here should have had ratings that were off the scale. Sure, the datafiles were merely the records of personnel who had "retired" from active service. They hardly contained anything that would be considered damaging to UCAS national security. Just addresses, medical records, next-of-kin forms. No active service records. But they should have been guarded more closely, just the same.
