Before exiting the Forum Shops casino I cash the chips Quirk-bot “won” for us, knowing we’d need cash money for our next stop.
“Where to now?” asks Dave the cabbie after we pile back in.
“The Golden Nugget,” I instruct. “The Fremont Experience.”
“Right on, man. Now that’s the real Vegas!”
Once there, we safely ensconce ourselves inside a two-bedroom suite, paid for in cash—no credit card trail. Quirk-bot booked our room online and got a super-duper discount with room upgrade.
I sink into the living room couch and spread out; Emma grabs an armchair.
Quirk-bot zips around, checking out everything from the smart TV to automated lighting and temperature controllers. By the time it returns and hovers above, I’ve caught up with myself.
“So, what did you find out?” I ask Quirk-bot
Quirk-bot’s eye widens. “About this room? Very primitive.”
“No, about TechNexus.”
“I don’t know where to begin.”
Emma takes command. “Start with your CRUD operations on such big data sets.”
“Easy-peasy,” says Quirk-bot. “I hack into so-called secure databases and, once inside, upload vast amounts of data including internal communications, financial records, research files—and then I parse for contacts, contracts and connections to related nested objects.”
“I get that,” says Emma. “I mean, how, technically, do you accomplish all you just said?”
“Oh, that,” says Quirk-bot. “I instantly create nanobots that get me into the AAA server system with brute-force password attacks that take only microseconds to execute. Once I escalate privileges, I reconfigure the registry and parts of the operating system—and all along the way my AI friends roll out an encrypted red carpet tunnel interface and rewrite secure ROM firmware chipsets!”
“Do you leave any footprints?”
“Do I look like I have feet?”
“You know what I mean,” says Emma.
“No. My presence goes completely undetected. InfoSec engineers and analysts do not yet have the resources to create such advanced attack signatures..” Quirk-bot winks its one eye. “The system cannot detect what it doesn’t yet know about.”
“What are the basic bullet-points you can tell us about TechNexus?” I ask.
“Let’s begin with our most immediate reference point,” says Quirk-bot. “Mark Atwood.”
“Good start.”
“A pseudonym.”
“Of course.
“His real name is Richard ‘Rick” Davidson. He is 42 years old and hails from Pittsburgh, Pennsylvania. Born C-section style.”
“Does he work for the CIA?”
“No.”
“No?” This surprises Emma.
“Rick Davidson works for TechNexus.”
“What is his position?”
“Chief Information Security Officer.”
“Has he ever worked for the U.S. government?”
“Davidson has no background in government service.”
“Military service?”
“None.”
“Then what is his background?”
“Corporate security, risk assessment and private intelligence gathering.”
“Wait a second,” I say. “If that’s the case, how did he manage to get us removed from an aircraft?”
Responds Quirk-bot, “The TSA is contracted with TechNexus to use artificial intelligence systems to catalog and track suspected terrorists. TechNexus abuses this trusted business relationship.”
“But how,” asks Emma, “did Atwood or Davidson have access to a file about my visit to the U.S. Consulate in India?”
“He didn’t.”
“Then how…?”
“You were bugged,” says Quirk-bot. “Your conversation at the consulate was recorded and forwarded to the appropriate parties through a secure Virtual Private Network.”
“By whom?”
“Your employer. That’s how they knew you were tattling on them.”
“Where is Davidson now?” I ask.
“Getting his ass chewed out for losing us. Oh, and he is trying to get a new phone and his SIM card reset. He arrived at Apple right after we left but they had just closed.”
Emma and I exchange amused glances.
“Thank you, Quirk-bot,” I say. “Now please provide some fundamentals on TechNexus.”
Says Quirk-bot: “TechNexus was founded by Richard Baxter, a visionary entrepreneur and computer scientist known for his pioneering work in machine learning and artificial intelligence. He is a billionaire and resides in Atherton near Palo Alto with his first family…”
“What do you mean, first family?”
“He keeps a second family in Beverly Hills. They are unknown to his first family.”
I chuckle. “How do you know that?”
“Private email exchanges to and from Spring Mountain Hospital, in case you are wondering how a psych ward fits into all of this.”
“What’s the connection?” I ask.
“Stella Baxter.”
“Who’s she?”
Says, Quirk-bot, “Richard Baxter’s daughter from his second family. Stella suffered psychosis and was admitted as an in-patient at Spring Mountain. Ever since, her father, Richard, has been a major donor. But there is more to it than that.”
“What more?”
“TechNexus has contracts with psychiatric hospitals all over the country, including Spring Mountain.”
“For what purpose?”
“TechNexus has developed infrastructure that deploys simulations that are generated using artificial intelligence. They can manipulate and control beehive behavior, potentially leading to instances where beehive beings involuntarily experience mental health issues. These simulations and imaginary maladies often result in false institutionalization to psychiatric hospitals.”
“This is Richard Baxter’s vision?!” exclaims Emma, horrified by the implications.
“Richard Baxter is retired from day-to-day operations,” says Quirk-bot. “The CEO of TechNexus is Rachel Mitchell…”
“Hold on.” Emma puts up her hand. “Why is that name familiar?”
“Before joining TechNexus,” says Quirk-bot, “Rachel Mitchell worked for ITS, which stands for InnoviTech Solutions in…”
“Bengaluru!” Emma finishes Quirk-Bot’s sentence. “Oh my God!”
“Is Rachel the only connection between TechNexus and the company in Bengaluru?” I pose.
“TechNexus is a part owner of ITS, although it conceals its shareholding interests through several shell companies registered in the British Virgin Islands. These shell companies have business overlaps with many other tech companies worldwide.”
“Wow!” Emma is astounded by this revelation and its implications regarding her own situation.
And I am amazed by the sheer depth of Quirk-bot’s access to confidential information.