Their parents had been delighted that it was ‘work’ which had brought them home from Africa so unexpectedly; they always knew how clever Robin was with computers. And Robin’s tutor was delighted that he had elected to carry out his research project at his old University; perhaps, after all, he could be tempted into a PhD course and take a teaching post there. As for Jim, he had managed to persuade the HR people at the Bank of England in Threadneedle Street that he could take leave of absence for up to four weeks. He had, in any case, two weeks leave owing to him, and had been granted an extra week as compassionate leave, given that his father had just died and his frail mother needed him at home to help sort things out. He had agreed to work off the other week as overtime, or something. The one thing he did not want was to resign from his job - it was too interesting, too well paid, and in exactly the right place to help Robin with his plans, whatever they might be.
Grudge was very excited about the prospect of working at Oxford, and he was only too happy to get there early, with Valya. Sergei ‘Grudge’ Volkov had only been able, again, to get part-time work on his return to Russia after his vacation, and he had become even more resentful of the Americans and his previous employers. Valya also had only temporary work, although that was her choice rather than anything else. She was quite sure that the university authorities in Oxford would jump at the chance of providing her father with the long term and secure work he craved, and it had been agreed that she would move to England with him if that came about. Like her father, she was also a clever mathematician, although had not specialised in computer science as he had done.
Robin and Marian paid brief visits to their parents before returning to Oxford, where they had found a couple of adjoining flats for themselves and the Volkovs, in one of the smarter northern suburbs of the City. There was a spare room for Jim, and it meant that they would all easily be able to work together when they weren’t at the university science facilities. Robin was sure there would be some aspects of their work that would be better carried out away from the public gaze. He was sure, too, that Valya would make a useful addition to his team, if she were willing to help, even though she was not a computer specialist.
Jim Farlow had arranged to meet Grudge and Valya at London Airport, and to travel on with them on the express coach from Heathrow to Oxford, where Robin and Marian awaited them. It was an excited reunion, which they celebrated later that evening with a meal and a bottle of wine at one of their old haunts, Ma Belle’s. Everyone talked at once. The Volkovs wanted to know about Africa and the Bank of England, while Jim wanted to know about Russia and what Sergei had been doing, and they all wanted to know what scheme it was that Robin had in mind for them to get involved in.
“We’ll have a full briefing tomorrow,” Robin promised. “You three need to get settled in first, but I suggest about half-past nine in our flat, when all will be revealed!”
“Not even a clue?” pleaded Valya.
“Not even a clue!” responded Robin. “Although I will tell you that, if things go according to plan and we are able to achieve what I’m sure we can achieve, then we should all make a considerable sum of money.”
“I’ll drink to that!” said Jim. “Since we have about twelve hours to recover before your briefing, let’s have another bottle of that excellent house wine.”
They met as planned next morning in the dining room of Robin and Marian’s flat, in which two computers had already been installed, across the corridor from the Volkov’s. Marian had coffee ready when they arrived, and they were soon settled, wondering expectantly what it could be that had brought them together. They were not kept in ignorance for long.
“This has to do with the security of the world’s banking systems,” Robin announced. “It is my belief that the systems currently in place are not as secure as the banks and their customers assume, and that they are vulnerable to a concerted attack on their integrity. We shall be mounting that attack,” he announced, “from here.”
They looked at him in disbelief.
“You mean you dragged us here just to try a bit of hacking?” demanded Jim.
“Before you start thinking you’re wasting your time, Jim, just hear me out,” demanded Robin. “If, at the end of this briefing any of you do not want to proceed, then of course you are free to leave, and I shall understand - and no hard feelings. But I firmly believe that we, as a team, are quite capable of breaking into the banking community computer systems.”
“And I suppose then we just help ourselves to the cash, do we?” asked Jim. “And nobody will find out! Is that what you meant last night when you said that we could all make considerable sums of money?”
“That is not what I meant,” replied Robin, sensing the growing opposition to what he was proposing. “I have no intention of turning us into some sort of criminal gang. That would be plain stupid.”
“But surely, in this country, computer hacking is a crime?” said Valya.
“Let him finish, for goodness sake,” said her father. “Robin and Marian aren’t crooks, so give the man a chance to tell us what he has in mind. Then we can form an opinion and come to a judgement.”
“Thank you, Sergei,” said Robin. “My theory is simply this. Breaking the security of the banking system is only a part of my proposal, and will probably be the easiest part. What we then do is develop a counter system that will prevent others from doing what we have done. This is what we sell, and this is where we make our money. Once the banks know that what they believe to be a foolproof system is vulnerable to attack, they will fall over themselves to get their hands on a system that will prevent that from happening.”
Grudge nodded, frowning. The others still looked apprehensive, but kept silent.
“As Sergei told us when we first met him, Jim,” continued Robin, “the present encryption system, which is the most widely used throughout the international banking system, was developed by a team of Russian mathematicians, which he led.”
“I remember,” said Farlow.
“Which is why I said,” continued Robin Hood, “that finding weak points in the system should be the easiest part of the exercise. If the guy who developed it can’t crack the codes, nobody can.”
Sergei nodded again.
“So why would you want to do that, Sergei?” asked Jim.
“Revenge,” said Robin. “Am I right?” he turned to Grudge.
“Yes,” replied Sergei. “Although I am not entirely clear at the moment how breaking into my own system will help me and my colleagues. It will be inconvenient for the banking world, but that will hardly bring us the satisfaction we seek.”
“But it can, in two ways,” said Robin. “First of all, you are all owed considerable sums of money by the corporation for whom you worked, who have paid none of you any compensation, or royalties or given you any share of the millions they have made from your development work. So if we can gain access to the banking systems, we shall be in a position to relieve that corporation’s accounts of the sums they owe you.”
“Bloody hell,” said Jim, and Grudge frowned even more.
“That’s not theft, but righting a grievous wrong,” pronounced Robin. “Secondly, if and when we develop a patch for the system to prevent fraud by others, then we shall make sure that the thing is properly registered and licensed in our names, and that we get a fair share of the royalties when we sell it on. That should give us all an income for life, judging by what the people Grudge worked for have made from it.”
“Grudge?” queried Sergei.
Marian giggled.
“I’m sorry, Sergei, but you once said that you had a grudge against the Americans because of your treatment at their hands, and we have rather adapted that as your nick-name, I’m afraid.”
“I rather like it!” grinned Sergei. “By all means call me that all the time. What do you think, Valya?”
“I like it too,” she said, and they all laughed.
The tension was broken and they began to relax as Robin went into more detail about his plans.
“There are several distinct stages to this little exercise,” he said. “First of all, we have to crack the present system. Until we do that, we can do nothing else. But once we have access to the inner workings of the banks, then we can right a few wrongs, as I put it - and there are a few of my own that I need to attend to,” he looked at Marian, who understood, “and that is the second stage. Finally, we can then take our time to develop a marketable solution to the problem which we will have created for the banking community.”
“I have some questions,” said Grudge. “First of all, if we do gain access to corporate money, how can we possibly move it without immediately being traced? It is the easiest thing in the world to find who has taken money from an account and where the money has gone.”
“I’ve thought of that,” replied Robin, “and there is a way around it. But let’s cross that bridge when we come to it.”
“Second of all, and perhaps most important, why are you so confident that we shall succeed?”
“Just what I was going to ask,” said Jim Farlow. “I’ve always enjoyed working with you and trying to hack into things you’ve developed, Robin, but this is of an altogether different order of magnitude, for both of us.”
“But between us,” chipped in Valya, “we have considerable mathematical brain power to bring to bear on the problem, plus the man who developed the system we are trying to break down. So it should be possible, given time.”
“I agree,” said Robin. “I’m sure we can do it, and probably it won’t take all that long, as we shall be working on nothing else. Actually, I’ve already made a start, and, I think, proved that it can be done.”
“How on earth?” exclaimed Jim and Valya in unison.
“I have already managed to devise a system - two systems, in fact, - which allow me to take money from any bank through its ATM machines.”
There was a shocked silence.
“I have been able to adapt two credit cards, one of which allows me to withdraw money from the account of the last user of the cash machine, while the other allows me to withdraw cash direct from the bank’s own reserves, without going through any personal account, either my own or anyone else’s.”
“It was a brilliant piece of work,” said Marian, “and I can confirm that it works. Not only in this country, either. We tried it out in Africa, and it works just as well there. You don’t need a PIN number or anything.”
“Obviously, it is of only limited value, although any criminal would be delighted to be able to do what we can now do. The point is, though,” continued Robin, “that it proves that there is a weakness in the banking security system. What we now need to do is to exploit that weakness and to gain access to their reserves through the Internet by using computers, rather than pieces of plastic.”
“What you have done is stealing, surely,” objected Grudge. “You told us that we would be acting honestly.”
“And so we shall,” Robin reassured him.
“Once we had developed the first system,” Marian explained, “we tried it out on our own accounts, so that was all right. The second system, though, did mean taking money that was not ours, so you are quite correct. To prove it worked, we took ten pounds from each of five banks - too little to draw any attention to what we were doing, but enough to prove that it worked at any bank. But we stole the money - there’s no escaping the fact. But there was no other way of testing the card. I have kept meticulous records of every transaction with both cards, and we have donated the money we took from the banks to charity.”
“So we haven’t personally benefited from this work at all,” concluded Robin. “When we do benefit, we shall all benefit, and it will be legitimate, as I’ve proposed.”
“What about in Africa?” asked Jim.
“We used the card there to help friends who had been robbed of almost everything they had,” said Marian. “We took the money from the bank account of the man responsible, and returned it to them. Obviously it was only a drop in the ocean compared with all that they had lost, but it helped at the time.”
“That’s part of what I meant,” continued Robin, “when I said that I had a few wrongs of my own I wanted to right, apart from yours, Sergei.”
“I would like to see these cards work,” said Grudge, “and to understand the methodology you used to develop them.”
“I can certainly demonstrate them to you later,” agreed Robin, “and when we start work on this new project, I shall obviously brief you on how I managed to achieve the breakthrough. A fourth part of our work will be to devise a safer security system for cash machines, to prevent others doing what we are able to do. So we have a lot of work ahead of us, I’m sure you agree.”
“I had no idea you were working on these cards,” said Jim. “That is a surprise.”
“I didn’t tell you about it, chum, because I wanted to make sure it could be done, and that I could do it without your help. If that had proved impossible, then the idea of using computer networks to achieve the same thing would not have been a starter, and we wouldn’t be here today.”
“As a matter of interest,” asked Grudge, “have you tried your cards for buying goods in shops?”
“No, I haven’t,” replied Robin. “The object was to see if the banking system was vulnerable to fraud, and it is. Checking the security of the chip and PIN system in shops is a different exercise, I think, although I know that each terminal at the checkout is linked direct to the bank’s main frame computer.”
“We’ll do that next!” joked Valya.
“I take it from what you say that you are with us on this project?” queried Robin. “Is everyone else?”
They all nodded enthusiastically.
“Good! Now let’s move on, then,” said Robin. “As you will see, I already have two computers set up here. They are networked, with links to the powerful computers in the laboratory in the university science area. We also have the use of a study-room at my old College, Trinity, again with a computer terminal installed, so we have available considerable power and flexibility. My tutor when I was here as a student has offered us all the help we need, which is wonderful.”
“Have you told him we are trying to carry out a bank robbery?” asked the Russian, half joking.
“As a matter of interest, he helped me with the work I did on the cash machine cards, and I’ve told him exactly what we are trying to do - i.e. find weaknesses in the banking computer systems so that we can make those systems more secure,” replied Robin reassuringly. “He supports those aims, and thinks we are being very public spirited.”
“Which of course, we are,” confirmed Marian. “We shan’t be helping ourselves to anything we aren’t entitled to, and will make our money, if possible, from selling the new security systems we develop.”
“As a matter of interest, Grudge,” added Robin, “my tutor’s nickname is ‘electric whiskers’, for reasons which will become obvious when you meet him, although for goodness sake don’t call him that! If you don’t meet him before, which I’m sure you will, he will probably be on the panel of Dons selected to interview you to decide whether or not to offer you a post here.”
“Why is he so keen to help?” asked Jim.
“I think he hopes I shall come back here to do a post graduate PhD course,” replied Robin.
“My interview is in two week’s time,” said Sergei. “We should have made some progress by then.”
“Let’s get started, then,” said Robin enthusiastically. “Marian has agreed to do all the admin for us, and to keep us fed and watered as well as keeping detailed notes of what we do. We will keep all that on a second hard disc, here.”
“Don’t hesitate to give me things to put on the computer,” said Marian. “As I understand it, we need to keep the most detailed records we can of our development work. And it’s so handy having our two flats next door to one another. I’ve had extra keys cut, so you can come into ours at any time to use these machines, if we’re not here.”
“Now let’s nip out so that I can show you how these reprogrammed cards work, then I can explain what I did to achieve that,” said Robin. “I suggest then, Grudge, that you brief us as best you can on the encryption system you developed with your colleagues while in the States, and then we can decide the best way of trying to break it down.”
Once they all understood what Robin had done to alter the two credit cards, they settled to a long a detailed briefing by Sergei about the encryption operating systems he and his colleagues had developed. It was not immediately apparent to them where Robin’s work fitted into the complex algorithms which Grudge had developed, but he had fortunately brought with him copies of his programmes, which they hoped eventually to be able to run on the computer network that Robin had been able to establish.
By the end of the first week, they had been able to identify discrete tasks for each member of the team, under the skilful guidance of Grudge, and, with regular debriefing sessions, they all managed to keep abreast of what other team members had achieved. As Robin had thought, it was not proving easy, by any means, but some limited progress soon became obvious, and this they all found encouraging. They were now using some new programmes that they had developed between them, one of which had been running for two days and nights trying to unravel the complexities of the Russian’s work.
“This is computer hacking with knobs on!” commented Jim at one stage. “I really am enjoying the challenge of this, and I can almost begin to see that we shall succeed.”
“I agree,” said Valya. “And I know my father is tremendously keen that we should succeed, and convinced that we shall.”
It was nearly two weeks later when they made their first major advance. After several attempts, each one of which ended in failure and disappointment, they suddenly achieved the breakthrough they had been aiming for. They were able to penetrate the initial line of encrypted defence in the operating system that Grudge and his Russian colleagues had developed.
This caused huge excitement, and they carefully installed the new operating system into their own computer network, checking again that it really worked, so that they could use it at will in the future. As a fail-safe, back-up copies of the software programme were made and safely stored away. What all this meant was that, from now on, they could quite easily, and at will, infiltrate the first line of defence of a bank’s computer system. They had found the major weakness that Robin had all along believed to exist. But there was still a long way to go before the new development was of any real use, but at least now they could plan the next vital steps.
Eventually it was agreed that they would concentrate their future work on a single bank, which operated widely both in the UK and around the world. As it happened, the bank used by Robin and Marian fitted that bill exactly, and also meant that, if they should reach the stage of being able to transfer money electronically from one account to another, they would be able to experiment using their own accounts and not other people’s. This was a vital safeguard against being detected.
The next part of their operation saw them surreptitiously install a Trojan horse programme onto the bank’s computer, which then enabled them to use the machine remotely and at will, without the bank’s knowledge. To break through the bank’s next line of defence, however, they needed to gain access to the passwords used by the bank’s staff to log on to the various levels of the system. With an insider working in the bank, that would have been relatively simple, but they didn’t have one. Instead, again surreptitiously, they introduced a keylogging virus into the system, which automatically recorded every key that was pressed when the system was switched on, and then emailed the results to the team’s own network of machines in Oxford. Since the first thing any operator did was to log on, using both his own personal password, and then the encrypted password used by the bank for access to that level of the computer system, it was not long before they had almost all the information they needed for their own computer to search the pages and pages of data to identify the critical passwords.
Valya was in charge of this aspect of the work, but it was a long process, and took hours of computer time.
“I can see now,” said Jim, “why you were keen for me to stay at the Bank of England. If I was at my computer terminal there, I would be able to access this information in half the time.”
“That’s what I hope you will be able to do for us eventually,” said Robin. “We can’t sit here forever, getting this information from each of the banks we need access to.”
“Let’s see how we get on with your own bank first, working from here,” suggested Jim, “but I should be able to help to get into almost any bank - certainly those using the Grudge protocols - just by using the software we have developed. After that, getting into individual accounts will largely depend on whether or not we can get sufficient detail about the accounts, not least the branch sort code and account number.”
“Does that include foreign banks?” asked Valya.
“Any bank anywhere, so long as they are using a security system based on Grudge’s encryption device,” replied Jim Farlow.
“That’s good news,” said Grudge. “I would certainly not want to make much use of our new toy before we offer up a counter-measure, so the less we use it the better it will be. We shall only draw attention to ourselves if we play around with it too often.”
“I agree,” said Robin. “But let’s not get ahead of ourselves - we must press on to complete the process we have started, but we really have made excellent progress so far, and, I dare suggest, done the hard bit.”
“I think you’re right,” said Grudge. “Once we know that we can get at both your accounts remotely, and move money between them, we shall need to carefully plan what else we can do - to right a few wrongs, as you put it. Then, with all speed, we must develop a patch for the system we have penetrated.”
“That will take carefully planning, too,” said Robin.
“I think,” said Marian, “that we all deserve a bit of a break. Certainly the cook does! Why don’t we have the evening off, and go out for a quick meal somewhere, if only to celebrate the progress we’ve made so far.”
Sergei Volkov stretched and yawned. “I for one could certainly do with a break,” he said. “Let’s have a meal out and an early night. I have my interview tomorrow. Perhaps we could agree what I can tell the panel about what we’re doing.”
In fact, Grudge didn’t need to worry too much about that, since ‘electric whiskers’ did it for him. It was obvious that Robin’s old tutor was greatly impressed by the work they were all doing, and equally impressed with the pioneering work that Sergei had done earlier in the States. He was obviously keen for the Russian to join the tutorial staff of the University, and therefore set out to impress his fellow panellists.
It was a few days later that Valya announced, “Do you know, I think we now have enough information about the bank’s passwords to try gaining access to individual accounts. We could probably even try to penetrate the bank’s own treasury system. What do you think?”
“Let’s try the easy bit first,” suggested Robin, “and have a go at getting into my own account.”
“I suggest first of all,” said Grudge, “that we shut down our whole system and start again from scratch, using the new software we have developed and the stored information we have accumulated to run through the whole sequence necessary, from start to finish.”
“Why?” asked Jim.
“Just to make sure that our work is robust enough to run ‘from cold’, so to speak,” explained Grudge. “Once we have developed a new security system to combat what we have developed, we shall have to demonstrate both to the bank, probably at a remote site from here.”
“Good thinking,” agreed Robin. “If we are sure that all the information we need is properly saved and backed up, then let’s log off and turn off the system.”
Everyone nodded, and, for the first time is several days, the team’s computers were turned off. They all looked at one another, each secretly fearing that some vital piece of information might have been lost.
“Right,” said Jim. “No good sitting here looking at one another. Let’s boot up again, and see if we can get straight into Robin’s bank account.”
There were anxious moments, as the system sparked into life again. Robin sat at the keyboard, opening the various programmes they had devised, as they all gathered round him, to watch his screen.
“So far, so good,” he said, as the bank’s logo appeared on the screen. “Now let’s see if I can use the passwords we have found to get at some real money.”
“Not much real money in your account, my dear!” said Marian, breaking the tension.
“Enough!” he exclaimed. “Look at that! You can even see that I paid for dinner the other evening!”
They cheered and clapped him on the shoulder, punching the air.
“We’ve done it!” exclaimed Grudge. “Congratulations everyone.”
“I knew the system had its weak points,” said Robin. “Now we can set about patching it up - that’s where we shall make a few bob, I hope.”
“So what’s next?” asked Valya.
“I suppose the next sensible thing to do would be to try transferring some of my limited funds in Marian’s account,” said Robin.
“Or mine, if you like!” said Jim.
“That’s exactly what I shall do, next. We need to know if the system works between banks, as well as within a bank.”
“I was joking, really,” said Jim, “but since I use a different bank from yours, it would make life simpler to use my account. I shall regard it as a loan, nothing else!”
“Then we could try to gain access to the bank’s own deposits,” suggested Grudge. “We shall need to be very careful about that, but if we succeed, that will convince the banking world more than anything that they should take our security development, when we have done it.”
“And then,” suggested Valya, “we should try the system out internationally, as you did with your cards in Africa.”
“That’s a good point,” agreed Robin, “not least because if we are to try to compensate you and your colleagues, Sergei, we shall need to move money between America and Russia. I have in mind doing it through Switzerland, too,” he added mysteriously.
“Now what scheme are you devising?” asked Jim.
“Yet another security safeguard, I hope,” replied Robin. “But we are getting ahead of ourselves again.”
He turned to Marian. “How much would you like?” he asked, smiling.
“Ten quid will do, thank you,” she replied, laughing.
Robin set about making the electronic transfer of cash between the two accounts. He then closed down his own account, and tapped in the details of Marian’s.
“Look at that!” he exclaimed. “Quick as a flash, and you’re ten pounds better off!”
“My turn, next!” said Jim.
“You come and sit here, then” said Robin. “Move my tenner from Marian’s account to yours. Let’s see if you can do it!”
Jim repeated what Robin had done, in an attempt to move the cash from Marian’s account to his own.
“Now I suppose I have to shut this whole thing down, and hack into my own bank to see if the cash has moved across,” said Jim with a frown.
Jim managed the first stage without any real problem, but once he had got through the initial computer encryption system, he sat back and raised his arms in the air.
“Damn and blast it,” he swore. “We haven’t trawled through this bank with the keystroke programme, so I can’t get any further. We just don’t know the passwords!”
“That’ll take a few more days,” said Valya.
“Try just typing in your sort code and account number,” suggested Grudge.
He typed in the numbers, as the Russian had suggested. “Access Denied” flashed on to his screen.
“That’s what you call a bloody nuisance,” said Jim. “It would have been a very handy short cut if that had worked.”
“At least it shows that you can’t get further without the passwords,” said Marian. “That means that we shall have to do that work for every bank we need access to.”
“Unless we know someone who works there,” said Jim.
“If not, it will take a lot of time,” added Valya, “in spite of the faster programme that we have developed.”
“And it will take a lot of computer power,” said Robin. “And we shan’t have that available to us once we’ve left here.”
Sergei’s mobile phone rang, and he went into the hallway to answer it. Before long, he came back with a broad grin on his face.
“From next month onwards,” he proudly announced, “you shall have all the computer power you need. They’ve offered me the job here in the science laboratory.”
Valya rushed over to hug her father, with tears in her eyes. “I am so pleased for you and so proud of you,” she said. “I shall stay here with you and look after you.”
Everyone joined in the congratulations, and for a time, their project was forgotten.
“I think a drink is called fo