To Miles' surprise, within a few days of providing Homosoto with is recruitment lists, his 'staff' began calling him on his com- puter. To call Miles, a computer needed his number, and the proper security codes. To a man, or woman, they all did. And, as he spoke to them over the public phone lines, in encrypted form of course, he was amazed at their quality and level of technical sophistication. Whoever Alex was, he knew how to do his job.

Over a period of a few months, Miles commanded the resources of over 100 programmers. But, Miles thought, there was something strange about most of those with whom he spoke. They seemed ready to blindly follow instructions without questioning the assigned tasks. When a programmer takes a job or an assignment, he usually knows that he will be designing a data base, or word processor or other application program. However, Miles' staff was to design programs intended to damage computers.

He had assembed the single largest virus software team in the world, and none of them questioned the nature or ethics of the work. Miles would have thought that while there is considerable technical talent around the world, finding people who would be willing to work on projects to facilitate the interruption of communications and proper computer operations would have been the most difficult part of recruitment. He realized he was wrong, although he did not know why. Technical mercenaries perhaps? He had never seen an ad with that as a job title, but, what the hell. Money can buy anything. Weapons designers since Oppen- heiner have had to face similar moral dilemmas, and with wide- spread hatred of things American, recruitment couldn't have been all that difficult.

As he sat in his apartment, he was receiving the latest virus designs from one of his programmers who lived in the suburbs of Paris, France. While there was somewhat of a language barrier when they spoke, the computer language was a common denominator, and they all spoke that fluently. It broke down communications errors. Either it was in the code, or it wasn't.

Miles knew this designer only as Claude. Claude's virus was small, less than 2K, or 2000 characters, but quite deadly. Miles went over it and saw what it was designed to do. Ooh, clever, thought Miles. As many viruses do, this one attached itself to the Command.Com file of the DOS Operating System. Rather than wait for a specific future date, the next time the computer was booted, or turned on, Claude's virus in the O/S would play havoc with the chips that permit a printer to be connected to the computer. In a matter of seconds, with no pre-warning, the user would hear a small fizzle, and smell the recognizable odor of electronic burn. During the time the user poked his nose around the computer, to see if the smell was real or imaginary, the virus would destroy the contents of the hard disk.

According to Claude, whose English was better than most French- men, there was a psychological advantage to this type of double- duty virus. The victim would realize that his computer needed repair and take it be fixed at his local computer shop. But, alas! Upon its return, the owner would find his hard disk trashed and attempt to blame the repairman. Deviously clever. Of course this type of virus would be discovered before too long. After a few thousand computers had their printer port blown up, word would get around and the virus would be identified. But, mean- while, oh what fun.

As Miles prepared to send Claude's latest and greatest to another of his staff for analysis and debugging, the computer dedicated to speaking to Homosoto beeped at him. He glanced over at Nip- Com. He labeled all his computers with abbreviations. In this case, Nippon Communications seemed appropriate.

<<<<<<CONNECTION>>>>>>

MR. FOSTER

Miles scooted his chair over to NipCom and entered his PRG re- sponse..