Showing posts with label banks. Show all posts
Showing posts with label banks. Show all posts

11 January 2025

The Holmes-Inspired Bank Heist, on Baker Street


January is a time for new inspiration, and for many of us, inspiration came from Sir Arthur Conan Doyle. Many of us read his Sherlock Holmes stories and decided to keep reading mysteries. Some of us tried writing a mystery ourselves. Or maybe, as really happened, someone digs a forty-foot tunnel into a bank vault. 

And the plan worked.

Mostly. 

The Holmes outing that inspired the crime is, of course, "The Red-Headed League," up there with my favorites. The story has nothing ingenious about it, by such standards, except the Holmes stories usually hide their humor more. This one nails a mystery that--in my opinion--only works as comedy. 

The plot: A pawnshop owner, at the great insistence of his clerk, scores a paying gig with a benefactor society dedicated to the advancement of red-headed men. All the bloke has to do is hang around League HQ all day. He turns to Holmes when the League abruptly closes shop. Holmes deduces a distraction. The clerk is in fact an aristocrat criminal genius who set up a front and uses his alone time to dig into the bank vault next door. Holmes is waiting when the aristocrat genius surfaces inside the bank.

In 1971, a British criminal gang tried the plot in real life. They targeted Lloyds Bank, no less, the renowned securer of London society lockboxes. 

The bank sits at 185 Baker Street.

Now, everyone knew London's wealthy kept serious loot in Lloyds basement vault. No heist team had tried the job for a simple reason: The idea was pure insanity. Lloyds was a high-tech fortress, with trembler alarms and feet of reinforced concrete protecting the vault. Getting in and out couldn't be done.

Enter Anthony Gavin, the real-life genius if not aristocrat. Gavin was Army-trained and connected in the London underworld. And Gavin was properly inspired. 

Nobody was busting in the front way. But somebody equipped and disciplined could tunnel in, Conan Doyle-style. And in May 1971, two doors from Lloyd's at Number 189, the leather goods shop Le Sac had just gone under. Blueprints said its basement sat on the same level as the vault. 

The game was afoot. Gavin worked through an associate Benjamin Wolfe to secure the lease. Wolfe's job was financing and cover. He would keep Le Sac open so that Gavin's crew could come and go as renovators. Not open personally, mind you. For plausible deniability, Wolfe stayed clear of Le Sac.  

The exact size of the crew isn't known. Gavin had a security systems expert. He had a lookout, a demolitions guy, a tunnel man who could navigate tight spaces. And crucially, he had an insider, Reg Tucker, a friend with no criminal record. 

Tucker fashioned himself into a Man About Marylebone and in December 1970 deposited £500 at Lloyds. In February 1971, he returned to rent a safety deposit box in the basement vault. Over six months, Tucker revisited the vault and mapped its layout and dimensions using an umbrella as a yardstick. He walked Baker Street between Le Sac and Lloyds until the crew had precise distance and direction for tunneling. Forty feet, no more, no less. It didn't pay to pop up at the fried chicken joint in between. 

The news got better. Baker Street was torn up for repairs. The security expert checked around and learned the utility work set off so many false alarms that the tremblers had been shut off altogether.

The tunneling started in late August and went on for two weekends. They dug after hours only to lower the risk of being heard. And it wasn't loose dirt they dug through. This was decades and decades worth of old London foundations. A cave-in was one wrong shovel or loose brick away. 

Foot after foot they dug, no ventilation, no calling for help. And nights or not, they were making a lot of noise picking away and clearing tons of debris by bags and a pulley as they moved deeper. The chicken place staff eventually came banging on Le Sac's door to complain. Gavin's crew didn't hear the knocking at first because they were busy mining directly below the chicken place. 

By Friday, September 10, the crew was ready. They had cut forty feet and loaded eight tons of rubble into Le Sac's basement. They'd constructed a chamber 7x4x5 feet where they loaded a 100-ton hydraulic jack onto railroad ties. The vault would time-lock at close of business, as the manager had bragged to Tucker. No one, not even the manager, could open it until Monday morning. Gavin's lookout confirmed over the walkie that the branch had emptied. The crew had all weekend--if they could crack through the reinforced concrete. 

On Saturday, the crew gave it a go. As happens in a heist, the plan immediately frayed. Their staging chamber sat above wet earth from an underground spring. The hydraulic jack pushed the floor down rather than the vault concrete up. 

Gavin was ready for contingencies. Next, and this is not embellishment, they took a thermal lance to the vault floor. That's right, they shot molten slag upward in a tiny space filling with noxious fumes. And for naught. The reinforced concrete held. 

It was time for old-fashioned methods. The crew drilled chunks out of the concrete and stuck gelignite inside. A detonator did the rest. 

Explosives. In the makeshift tunnel. But the crew's engineering was up to the task. As for noise, the lookout confirmed that Baker Street didn't seem to notice a blast under their feet. Which left only basic physics in the way. Bank vaults are airtight. Gavin and his crew pried upward into a thick brume of smoke and dust, too much for starting on the deposit boxes. The crew argued over their walkies about whether and how to change the plan.

Which was a problem Gavin hadn't accounted for. One mile away, a ham radio enthusiast was recording their transmissions.

The ham radio guy was Robert Rowlands, of Wimpole Street. He'd been trying to catch Radio Luxembourg but instead had tuned into the heist. He listened on and even reported a suspected burglary--somewhere--to his local precinct. The cops advised him to record what he was hearing if he wanted anyone to believe him. So Rowlands did. On his home cassette recorder, he caught Gavin's crew wrangling about pressing on or retreating before being overcome by fumes.

By 2am Sunday, Rowlands phoned in a second report. This time, he called Scotland Yard. The Flying Squad drove to Rowlands' flat and listened with him as the crew chattered their progress reports. Eventually, the crew switched channels, but not until the evidence had mounted.

Scotland Yard knew a bank job was happening, but they didn't know where. So they put teams on the streets and canvassed banks in an 8-mile radius of Wimpole Street--all 750 branches.  

One of those banks was Lloyds. 

There wasn't any sign of foul play outside Lloyds, but no one was taking chances. The cops and bank manager went into the basement and listened inside the sealed vault, likely while the crew was inside thinking each breath sounded like thunder. But after a good listen, the police called Lloyds all clear.

Which it wasn't, as was obvious when Lloyds opened Monday morning. The crew had broken into 268 deposit boxes, a quarter of the vault count. A note scrawled in paint challenged Sherlock to solve the case. Also obvious was the hole in the vault floor. That led the cops to Le Sac and the discarded equipment, which quickly led them to Benjamin Wolfe. He had signed the lease under his real name.

Shocked. Wolfe was shocked, shocked, to learn that a crew had used his basement for thievery. Yes, he'd let a crew use the property, but he'd understood it to be for legitimate storage. 

Needless to say, Scotland Yard wasn't buying Wolfe's story. They put him under surveillance and made note of his contacts and movements. Wolfe made repeated contacts with Anthony Gavin, whose voice on the police recordings sounded an awful lot like the crew leader from Rowlands' tapes. Eventually, the police tracked Wolfe to a pay-off. That was that. Gavin, Wolfe, Tucker, and a few others got rounded up. But some of the alleged crew had left England, and possible others have never been identified.

Also needless to say, this was a public sensation. Headlines were written. Fingers were pointed. The job had been ambitious, the crew had gotten away, the police sported a black eye, and rumors sprouted over what other incriminating evidence might've been taken (the 2008 film The Bank Job indulges the conspiracy theories). More than a few Lloyds customers refused to disclose their contents stolen.

Only £231,000 was ever recovered. Some estimates speculate the haul at £3,000,000. In today's money, that is £50,000,000 ($64,000,000), plenty to disappear or pay off bent cops or set aside for retirement. Gavin and Tucker did twelve years. Wolfe did eight.

And that is London 1971 and "The Red-Headed League" come to life. Brilliant criminals, bold plot, and inept police who get their man eventually. And even its sublime ridiculousness, in the form of fake identities, simple mistakes, and irate fry cooks. All that was missing was a great detective. 

Good thing, though, that no real-life Holmes waited there to nab the crew. Gelignite packs a punch.


* * *

In researching this piece, I came across this entertaining dramatization of the crime. They set the stage nicely and visualize the tunneling and the twists and turns of the crime. Like any good heist drama, you're not rooting for the crooks, but you're not not rooting for them, either.

The whole Great Heists series is worth a watch for caper or true crime buffs. 

23 April 2023

The Digital Detective, Banco and Bunco, Part 2


Resuming from last week

Money Laundering

Checks (‘cheques’ in other English-speaking countries) are becoming less common in our digital society, but they still have their uses: Investors often receive dividend checks, some companies send refund checks, and many of us write checks to our lawn guy and housekeeper. Check handling still holds a place in our economy and so does a scheme called ‘check washing’.

Crime segments on programs like Dateline and 20/20 have warned us against the practice of bad guys plucking checks out of mailboxes and ‘washing’ them in a ‘household chemical’ bath. Then with a blank check in hand with the original signature, they fill in a new payee and amount. The scheme can work with bonds, wills, and other instruments, anything with a dye-based ink written with ordinary pens. Very old inks comprised of iron compounds remain unaffected.

Wait. Are you going to share with us?

What is the household chemical? Enquiring crime writers want to know.

The answer is ink-dependent and I’m aware of two compounds. Women baddies may have an advantage: The primary go-to chemical, acetone, is the principle ingredient in fingernail polish remover. Other dye-based inks may better respond when treated with ordinary bleach.

Here’s a how-to video by Dr Uniball… (Shh. I know, I know, the poor man. I’m afraid Dr Uniball suffered an unfortunate lab accident.) That aside, here is one of his experiments:

Note: Although not mentioned in the video, fraudsters can preserve the signature by covering it with transparent tape. Ink not so protected washes away.

So how can you shield yourself against lawnmower man bleaching your check or your nifty cleaning lady rewriting the palty cheap-ass amount after an acetone bath? You can purchase speciality India ink pens costing in the hundreds of dollars. Or, as I recently learned, you can buy a less than two dollar Uniball at your local Dollar Store. This pigment-based pen is made by Mitsubishi Pencil Company, yes, a sister company of the car manufacturer. Look for Uniball 207, pictured here:

UniBall 207 pen

But wait. If you’re a fraudster and your victim banks with Chase or certain other banks, you don't have to bother erasing and filling in checks. Crooks have discovered Chase’s sloppy remote banking by smartphone looks only at the numeric dollar amount and routing number. Bad guys can add in an extra digit to the dollar amount, changing it from hundreds to thousands. Chase doesn’t trouble themselves to validate the written amount or check the written payee matches the conman’s name on the account. They even allow the same check to be deposited more than once.

BoA Signs of Fraud
Signs of Fraud from Bank of America

A casual survey suggests Chase Banks may figure in more frauds than all other banking institutions combined.Worse yet, Chase battles customer victims who try to get their money back. Lily, our Chase target in a previous article did everything right, trying to get an oblivious and lackadaisical Chase to take action. And they die– they blamed her.

No place in the world is safe from fraud, but if YouTube is to believed, Arizona suffers an outsized number of attacks. And naturally, Chase customer service isn't there when needed.

From A to Z, ATM to Zelle

Zelle is German for jail, literally, a prison cell. I’m frankly surprised it doesn’t mean Sucker!

I can’t trust Zelle. If accounts of a money app can’t be viewed and studied on the web, the customer/victim is at a disadvantage when attempting to reconcile transactions. Unfortunately banks and society at large push us in that direction.

Former business partners owed me money and had been steadily paying me through Sun Bank. Abruptly payments stopped. I notified them. It turned out Sun wanted to cease sending direct, electronic payments to my bank (and others) and insisted its ‘partners’ use Zelle. The problem was that Sun submitted payments into the black hole of Zelle, but my bank didn’t see them.

“Not our problem,” said Sun. “Call Zelle.”
“Not our problem,” said my bank. “Call Zelle.”
“Not our problem,” said Zelle. “Call your bank.”

This occurred after repeated and futile attempts to get a phone number for Zelle, who declined to help because they were ‘too far removed from the situation’, claiming they were outside the transfer rather than being the conduit. It took four months of repeated complaints to resolve the issue.

☚☛

As you might imagine, Zelle is a convenient tool for fraud. In one particular scam, you receive an SMS text that your bank account has been put on hold, pending unusual activity. You phone the conveniently provided phone number, and a polite professional asks how she can help you.

She ‘checks’ your account, saying it appears nefarious forces are attempting to penetrate your security. The solution is to safely move your money into a bank-approved Zelle account. If you’ve not heard of Zelle, she provides you a web link showing your bank works with Zelle, and she’ll help you set up a new free account, which will make bill paying so much easier.

Ten minutes later, your new Zelle account is all set up and your money moved into it. “Thank you, thank you,” you say before hanging up, upon which the scammer sets to work. You receive another text message, this time from your real bank. Your accounts have been emptied.

“Not our problem,” says Zelle. “Call your bank.”
“Not our problem,” says your bank. “Call Zelle.”

16 April 2023

The Digital Detective, Banco and Bunco, Part 1


One upon a time I was scammed, or rather American Express was. In my consulting days, a pair of cancelled flights kept me hostage at Chicago Airport for ten hours, which covered a couple of mealtimes. For one of those, I plunked down in their sit-down restaurant and partook. And was partaken without my knowledge.

The end-of-month credit card statement showed a charge that could have fed a family of twelve instead of not-so-little ol’ me. AmEx explained this was called a ‘waiter’s charge,’ literally so in my case. A waiter hands you a bill in a black leather folder. The diner casually tucks a credit card in the folder and the waiter carries it away. At this juncture, the fraud happens.

If the restaurant keeps a computerized tally, the waiter adds on an additional lobster and a hell of a tip. Without an ongoing account, a waiter simply adds in a dollar figure. In olden days, waiters might run two or three blank slips through the imprinter for later use. These days thanks to skimming devices, a waiter can mint a new card before you leave the premises.

Once a card is out-of-sight, waiters can do anything they wish.

As did a waitress in Minneapolis’ beloved Pannekoeken Huis. Two things had come together to draw my attention to a minor racket. Unlike my girlfriend whose sharp eye for cash register fiddles caught one in the middle of a famous theme park, I don’t have specialized training in these things. However, a conversation with a vice president of finance at the company I consulted for raised my awareness. After meals, he carefully perused the bill and credit card slip, commenting he’d find mistakes nearly half the time and went on to prove it.

Bad Taste

And so I found myself in the very restaurant where he’d enlightened me. Frankly, the waitress did little to avert attention to herself. In a Midwestern city where everyone is friendly, she was unusually hostile. Perhaps it was the result of a bad morning, but she acted distinctly sour. Thus when the check came and bearing in mind the VP’s admonition, I looked over the register’s paper tape and there it was… or in this case wasn’t. The line items didn’t match the inflated total.

Her scam took but a moment to unravel. The register tape provided the clue– the restaurant’s logo was missing at the top of the tape. She’d rung in a false item, rolled the register’s tape forward several inches and tore it off, and then rang in the real breakfast tab.

I brought it to the attention of the front-of-house manager. That trusting soul cheerfully waved off the discrepancy as a register glitch. Fine, not my problem, but the practiced moves of the waitress announced she’d done this many times. I did not encourage her by leaving a tip.

That wasn’t why he glanced at your derrière

Does your credit card have a tap ’n’ go icon? If so, it has a built-in bit of electronics called passive NFC… near field communications, a cousin of RFID. Your cell phone may have something similar, but is active NFC because it’s battery powered. They work on the same principal as store exit scanners that sense security tags still attached to the jacket you just bought.

Besides the likelihood of your butt mashing your phone, NFC is a major reason you shouldn’t carry your phone in your hip pocket. A passerby brushes her phone past your pocket and *snap* — she’s captured your information.

Sleight-of-Hand

Scams can happen other ways. You check out of your doctor’s office, or you pay at the window of that overpriced restaurant, or you’re enqueued at Wendy’s drive-thru window and your fuel gauge is running low as is the patience of the guy behind you who taps his horn for the third time but it’s not your fault because your salad isn’t ready and finally the server comes to the window and hands you a bag with a freckled girl’s face on it and says, “That will be $36.80,” and you realize for that kind of money you could have dined at Pannekoeken Huis with money left over but you dig through your purse and there’s your MasterCard that you hand over and a second later he hands it back followed by a receipt that you stuff in your purse and before the guy behind you can blast his horn again you pull forward and out of his way, yet when you get home you receive a text message that your credit card has hit its limit. What? How can that be? You should have at least fifty dollars to spare.

And there it is: Instead of $36.80, you were charged $96.80. Maybe the guy’s finger slipped ringing it up. But wait, there’s another $23 charge from the same place at the same time. That shouldn’t be possible. What happened?

When you handed over your card, you lost sight of it for an instant only. But it was enough time for the window guy to pass the card over a pocket skimmer or even a second NFC machine, a modern analogue of imprinting an extra credit card slip.

Contactless Cards (NFC, RFID)
Universal Contactless Cards (NFC, RFID)

ATM : Access Thy Money

You may seen recent warnings about ATMs with inoperable card slots, glued shut according to articles. Nearby, a helpful guy who’s standing a respectable, unobtrusive distance behind you offers a suggestion. “You can tap your card.”

But of course you can. You thank the guy, boink the card over the symbol, stuff $200 in your purse, and nervously flee the scene to safety. Or so you think. The helpful guy, he moves in and empties your account.

When an ATM’s mechanical reader returns your card, it automatically logs you out of the system. Likewise in store transactions, once the clerk rings you out and you see the Thank You message on the screen, you’re once again disconnected from your account.

Surveys show at ATMs, tap ’n’ go customers often don’t manually log out of their accounts. Without a mechanism holding their card and releasing it as they sign out, clients fail to realize the connection to their account remains active and vulnerable. Please, log out.

Next Week: Money Laundering

17 January 2021

The Bank Job


bank vault

In the waning days of my stint at Data Corp, a bank-owned subsidiary in Virginia’s Shenandoah Valley, security auditors visited the company. These stern-faced men and women differed from bank and financial auditors. They studied physical facilities, detectors, alarms, and personnel. They reminded employees that banking is serious business.

Thus it came to pass, they paid particular attention to me, rogue hired-gun, expert in multiple languages and knowledgeable in the intricate arts of operating systems and the mysterious software void. I had delved deep into the labyrinth of the sacred OS and lo, I not only survived the puzzles of the Minotaur, but my reputation grew, a mark of my shadowy powers and the peril I represented.

Sandman, Matt… how different could we be? Birds of a feather, cut from the same cloth, tarred with the same brush. The auditors were determined to unmask… Danger Man.

Caught between the security professionals and Data Corp’s need to keep me around, the company assigned their top programmer to watch me, to make certain no Harry Potter magical enchantment passed my fingertips to the detriment of the Eastern Seaboard banking community. My transition from legendary hero to potentially a bad, bad boy had the spectacular effect of enhancing my dark reputation amongst the fair sex of the Shenandoah Valley. That’s a story improper for a scholarly work such as this.

“It’s nothing personal,” said the vice president.

“It seems personal,” I said. After the fiascos with Sandman and then Matt, I felt peeved, petulant and perhaps a little petty, those p-offed adjectives. Later, I would become better known for guarding my tongue, but I childishly couldn’t resist showing off. “The auditors are looking in the wrong place. They shouldn’t be suspicious of talent, but of simple vulnerabilities. I bet I can have money out of the bank and on your desk in 24 hours.”

“I don’t believe in gambling.”

“Neither do I. I prefer certainties. Wanna wager?”

“You’re serious?” He sighed. “We have to tell them.” He started to beep the chief auditor but stopped himself. Cogs visibly turned in his head. On the off chance I was right, why reveal weaknesses to the auditors? “How?” he asked.

“The obvious everyone overlooks.”

“It’s obvious you’re presumptuous.” He didn’t say it unkindly. The vice president leaned forward on the edge of his chair, hands braced on his desk. I could see his mind churning, thinking over the computer rooms, an entire floor of programmers’ offices, the banking terminals scattered around the counties. “It doesn’t mean you can’t be right.”

Neither of us believed in gambling, but for different reasons. The VP was a pious man. He said, “I don’t bet, but I will pay you five bucks if you can pull it off.”

I said, “Fair enough. One thing though– keep things as they are– no extra security just because of this, okay?”

He muttered under his breath. If he hadn’t been a religious man, it would probably have sounded something like, “arrogant sodding bastard.”

 A Draft In The House

A few hours remained before my self-imposed night shift, so I visited the banking center off the lobby. I bought a money order to pay my phone bill, watching every move the teller made. Afterwards, I went back to my rooms to sleep a few hours.

The vice president fibbed about not stacking the deck against me. That evening for the first time, a guard searched my flight case as I entered the computer facility. The VP also ordered the data vault closed, a concrete and steel room with a blast-proof door. If I needed a data cartridge, I’d have to ask Nagle, the watchdog programmer they’d hung around my neck, to fetch it.

Like a personal albatross, he watched every move, my every keystroke. As I rolled my chair between consoles, he followed, straining to see if I attempted anything unusual. I simply did my job, asking him to give me breathing space as I studied program code.

We ordered Chinese food. Nagle consumed his with coffee rather than tea, striving to stay alert. I asked what his instructions were and he said he’d been directed to keep a special eye on me. “They think you’re up to something.”

green-bar, fanfold paper
green-bar, fanfold paper

“I am. I’ve got to debug this by morning.”

From time to time I pulled ‘green-bar’ stacks of paper off the big high-speed printers. I had a well-known propensity for leafing through paper listings, giving my eyes a rest from luminescent computer screens. Nagle had wearied from working all day, but occasional requests for tapes or discs kept him awake.

Taking great precautions but overlooking a small, seemingly insignificant but crucial details is only human. Long ago, I’d remarked upon one of these details to the computer room operators who’d forgotten by the next morning. They had stuffed a box of Christmas Club checks on a panel of the control unit next to the printer, handy if they had to make a quick check run. Nothing sinister about printers, right?

I asked Nagle to fetch a data cartridge from the vault as I gathered a listing from the printer, I simply tore off a sheet of three checks and slipped it among the pages of my printout.

An hour after midnight, I dragged manuals and listings into what tellers called the ‘back room’, and spread them out on work tables. To enter the computer room, operators and officials had to pass through a couple of electronically locked anterooms into the data center.

It was also possible to pass from the lobby into the customer area of the banking center where lexan barriers protected the teller area. Behind the glass, trusted employees could pass through the back room to the computer room itself– and vice versa. The computer room contained a photo lab at the back, which the security auditors didn’t like since it gave non-computer people access to the servers.

MICR cheque imprinter
MICR check imprinter

The back room was of special interest to me because it contained a small machine I needed, a MICR imprinter, a shoebox-size device with a simple keyboard used to encode the special magnetic ink numbers along the bottom of a check.

During the day, the back room was used by clerks to spread out reports and by tellers to imprint deposit slips and checks as needed. During the evening, operations bundled and unbundled stacks of checks and imprinted the occasional ‘carrier’, a glassine envelope for damaged checks. By night, I used the same room when I needed an expanded work area. Nagle stopped paying attention to me when I left the main room because the tellers’ back room contained no computers.

I’d never used the imprinter before, but I’d watched the operators. My plan was to key in the account number the bank used to pay me and that’s when I discovered the bank had made my task easier– and an easier crime for anyone else to carry out. When I filched the checks, my famed 007 powers of observation had been running low because I hadn’t inspected them closely. Rather than print individual account numbers on Christmas Club checks, the bank used one general account thoughtfully pre-printed on the checks along with the routing and serial numbers. The check numbers linked a given check to a customer. I didn’t need the MICR imprinter after all.

cheque numbers

I discovered something else. Next to the MICR machine were open boxes of bank drafts and money orders accessible not only to tellers, but any person who strolled in from the computer room. They were sequentially numbered and I had no idea if anyone took note of the number in the mornings. I took samples out of the middle.

Back in the computer room, Nagle was nodding off. He headed for the coffee machine.

Green-bar program listings from large computers were printed on continuous ‘tractor-feed’ fan-fold paper stock that were packed and stacked in a zig-zag fashion. The printer prints one accordion-pleated side only– the back is almost never used and, when fastened in a binder, the back is never seen. In other words, a page was actually two sheets back-to-back attached at the leading edge and bound at the back. It formed a pocket, perfect for nefarious smuggling.

Visit Bob Lemke's
vintage cheques

Cue Mission Impossible theme.

Uncapping a glue stick, I dabbed the drafts and the Christmas Club checks and tucked them within the multi-fold pages. James Bond had nothing on me.

Binder in hand, I told Nagle, “I’m going upstairs for an hour. I’ll be back.” He gratefully closed his eyes in the operations office. The security guard, mystified by the runes of technology, only cursorily glanced at the listings.

I needed time and privacy to duplicate the same type of printing on the draft and the Christmas Club check. From the tractor feed paper and proximity to the printer, it was easy to deduce the Christmas Club checks were printed on the high speed impact printer, a device the size of a roll-top desk capable of churning out hundreds of pages in seconds. I needed to duplicate its distinctive type face, so on one page of the program I had been working in, I’d printed a sample: my name, ‘FIVE AND ***’, and $5.00. All I needed was a way to emulate the printer’s font.

Beating the Draft

The bank draft presented a different problem. The name on the draft I purchased in the afternoon was printed using a monospace sans-serif font, and it wasn’t similar to any I could find on the PCs commonly used in the office. I was surprised– They had almost everything.

I expanded my search. Nothing. I didn’t have access to Illustrator or Photoshop. I couldn’t log onto the Adobe site for a matching font, and it didn’t seem sensible to pay them more than I was going to collect.

But wait; I was overthinking. The vice president expected me to engineer a hi-tech crime, but I’d gone lo-tech. Where had I seen an IBM Selectric? Chase’s secretary’s desk. The office kept a couple of typewriter balls in a junk drawer. I picked the most computerish style and dropped the font ball into the typewriter.

I tweaked the positioning and ran a test copy on plain paper. When I held it up to the light in front of the blank draft, it looked close. I adjusted the margins until I was satisfied and printed one of the drafts made out to me with several zeros in the amount. I repeated the process with one of the Christmas Club checks made out for five dollars.

Leaving the draft in my desk, I set the Christmas Club checks aside. No sense taking them back into the computer center.

I wrapped up early for which Nagle was grateful. The guard glanced in my briefcase. Seeing no wads of bills or bullion, he let us go.


After sleeping until noon, I drove through a branch drive-thru and cashed the $5 Christmas Club check. Back at the office, the security guards perked up. They gave my briefcase a thorough going over. Finding nothing incriminating, they let me pass.

When I casually strolled toward the vice president’s office, he glanced up and waved me in. “Any luck? You’ve just a couple of hours left.”

“Oh, yes. Here’s a bank draft made out to me, all legitimate looking. I didn’t cash it so I wouldn’t screw up the bank’s accounting.”

His lips thinned when he saw the number of zeroes. Pinching it between two fingers, he looked it over carefully with narrowed eyes. He set it aside as if I had handed him a used tissue. “You said you could get money out which I took to be cash.”

I pulled $5 from my pocket and put it on his desk.

“You’re conceding?” he asked.

“No.”

“What’s special about this?”

I put the receipt on top of it. “It’s from the bank’s Christmas Club account.”

Never before had I witnessed a ‘basilisk stare’. For a moment, I worried I’d crossed the line. However, he prided himself being a fair and rational man, and he went from personal offence to realizing I could help plug a hole or two the auditors hadn’t yet spotted.

“How much?”

“How much what?”

He sighed. “How much is this going to cost me?”

“Lunch.” I reconsidered, thinking about his tightwad reputation. “A good lunch.”

In fairness, he made it a very good lunch.

Loose Ends

Management instructed their tellers to lock away the blank drafts at night. The Christmas Club checks they moved into the vault as they should have from the beginning.

Nagle told me he’d been yelled at, but the shouting was only half-hearted. The vice president had merely instructed him to ensure their in-house Robin Hood didn’t attempt a Mission Impossible hi-tech transfer. Instead I had come in under their radar with an old-school lo-tech crime, which made it worse. They found it sobering, but they took comfort the security auditors hadn’t detected the gaffe and the price of one lunch was right.

03 January 2021

The Skating Mistress Affair, Part IIII


bank vault

Parts I-III provide the background of a unique bank fraud investigation.

In Part II, negotiations soured and in Part III, legal action failed miserably. The bank thought they were done for, but I wasn’t.


The Commentator

To continue developing and enhancing the software, I needed to understand it at least as well as the author. Nothing would do that like immersion in it, and nothing would aid in immersion like having to document the programs line by line, block by block, section by section.

Tedious. Refill the Ritalin, oil the exercise bike, and absorb.

Data Corp set up a pair of desks for me, not with their programming group but in a large room staffed with accountants, bookkeepers, and clerks. That made me the only guy amid thirty-some women.

pink office chair
 
pink Princess phone
Princess phone
 
boobs coffee cup
a slightly less risqué model
 
latex fingertip protectors
latex fingertips

Flirtatious and fun, the data center girls delighted in playing pranks on me. Some tricks were small, such as when they glued a dozen water-cooler cups together and hid the rest. Others were more ornate. They ordered a pink and gold chair for my desk, and installed a Playmate screen saver. My black office phone found itself replaced with a princess phone also in pink. A welcome gift box on my desk contained a coffee cup shaped like breasts.

My office mates flattered and flirted. Once, I asked a supervisor why the girls believed they could get away with such outrageous behavior. “You look easy to tease,” Shelly said. They read me like a Power Point slide.

They were also kind, sharing lunch with me. I never knew who installed a bud vase on my desk and kept its rose and water fresh.

One afternoon, the VP stopped by to pick up a couple of data cartridges. I opened my desk drawer… and immediately slammed it shut. I’d caught a glimpse of something lavender and lacy. Every eye was riveted upon me, watching what I’d do next.

“Er, maybe this drawer,” I muttered, only to spot another item, pink and frilly. The women had filled my drawers with, well, drawers, lingerie at least. I could feel the back of my neck burning.

“Er, I have to dash down to the computer room,” I said. “I’ll drop them off at your desk.”

“But…”

He peered after me suspiciously, knowing something was up. As I took off, he glanced around at the women who were all staring at him.

One morning I arrived to find a fat pink envelope on my desk decorated with hearts and cupids. Inside was tucked another plump envelope with a calligraphic message on it: “Shelly, Julie, DiDi, and Roxy invite you for the weekend. Necessities enclosed.” Heads craned my way as I slipped my thumbnail through the seal.

Out fell a dozen of the tiniest condoms. They’d filled the envelope with the thin latex fingertips clerks slip on when flipping through sheaves of checks and currency. Their cleverness cracked me up. When I stopped laughing, I took out a ruler and carefully measured one of the latex rings. Nodding judiciously, I placed one in my wallet. The lasses laughed, hooted, and jeered and cheered.

We Leave Our Light Off For You

At night, I pretty much lived at the data center, starting on the computers as soon as one was freed up from the work day. To snatch a few hours’ sleep, I holed up in a small motel near the bank’s Data Corp office.

During my extended stays, hotels generally grew used to me, A low-key and seldom demanding demeanor made the maids happy and sometimes pampering. Managers were pleased to X-out a room from their unrented list for a month or six, sometimes more. Across many states and a few countries, hotel life worked efficiently for me.

But deep in the Shenandoah Valley…

This local motel operator wasn’t used to a nomad like me, out all night, sleeping during the day. He glowered at my arrival each morning, frowned as I departed in the evening. Chambermaids reported reams of secret code documents in my room. Learning I skulked down to the bank building each night convinced him I was up to no good. He grew suspicious nefarious activities were afoot.

He telephoned the bank. They routed him to the Data Corp center and wound up with an operator who told him, “Oh, that’s the guy involved in the computer fraud.”

He’d heard enough.

Next morning, exhausted from a long and grueling bout of decoding and debugging, I arrived to find the motel manager in the lobby, arms folded, glaring at me. My haphazardly packed suitcases stood by the door.

Stiff-lipped and obviously fearful of a disheveled guy my size, he said, “Pay your bill and leave. I’ve called the police.” Activity in the motel stopped as a gallery of employees gathered at the balcony rails to witness their innkeeper deal with his dastardly guest. I disappointed them by producing my American Express.

With no internet at the inn, he refused to lend me a phone book to look up alternative hotels. The manager got his final satisfaction by ordering his bellboy to toss my bags outside.

Theirs was an independently owned franchise of something like Motel 7. An hour later, cheek buried in a Howard Johnson’s pillow, I sleepily fantasized complaining to Motel 7’s corporate office… and drifted off to sleep. Just another hazard of the road.

Reanimation

Here I delve into technical details of Sandman’s cryptography and computing. Feel free to skip ahead to The Flash Gorden Super Decoder Ring.

The first hurdle required overcoming a lack of tools, even a lack of tools to build tools. I needed to develop solutions on the bank’s computers, and they weren’t geared for deep-level development. The answer was to invent parsers in assembly language, the language of the machine itself, not meant for the type of character analysis and manipulation I needed. That filled the early days and then came the heavy lifting.

David Edgerley Gates previously brought to our attention substitution cyphers called cryptogramsfound in Sunday newspaper puzzles. Each encrypted letter translates or maps to a plain text letter. For example,

CryptoQuote Encryption Table
↪︎ ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 ↪︎
JXOHY28RGUPB1WA736SLZQF5MD40CN9VTKIE

In the ‘Adventure of the Dancing Men’, Sherlock Holmes took on a secret society’s messages that differed from cryptograms only in the ‘letters’ represented as pictographs. The Dancing Men glyphs corresponded one-to-one with letters of the alphabet.

Sherlock Holmes Dancing Men translation table

Sandman didn’t resort to half measures. I realized he’d built multiple tables that made decoding a multiple more complex. I had to figure out the mirror image of what he’d devised. The American Civil War saw the use of hair-yanking two-dimensional cyphers. Sandman hadn’t made decryption impossible, merely difficult.

Toward that end, I built a translator to fill holes in the reconstituted tables, gaps where uncertainty failed to reveal which letter represented what. The translator checked for errors, refined and reran the process repeatedly until the blanks filled in.

The process was a variation of stepwise refinement: shampoo, rinse, repeat. I’d decrypted so much, I no longer doubted the plan’s viability. The more I decoded, the smaller shrank the unknowns list.

As Sir Conan Doyle pointed out, the frequency of letters we use in writing varies considerably, useful to know when solving puzzles and Wheel of Fortune. In many examples, ETAOIN occur most frequently in ordinary writing and KXQJZ appear least often. In my code tables, I’d cracked the ‘E’s, the ‘S’s, the ‘T’s and most of the other letters. Here and there I might not know the occasional Q or J, but that decreasingly mattered. Over time, I could plug holes as the solution became clear. I was going to whip this thing.

Ironically, if Sandman had simply treated labels as serial numbers, e.g, No52000, No52010, No52020, etc, he would have robbed them entirely of meaning, making decoding moot. He probably avoided that path, thinking it went too far and might set off alarms within Data Corp’s programming staff.

In the days before I’d realized the labels were encrypted, I wrote a program to extract a sampling from 25,000 lines of code, sort them, hoping they’d point a way to patterns. The harvest yielded 3600 unique names, not one of them a recognizable word or abbreviation. That clue alone suggested something bogus. Programmers might omit vowels, might use peculiar abbreviations, or sometimes use slang drawn from popular fiction like grok and borg, foo and plugh. In 3600 labels, I found not one meaningful word. Patterns, yes, but nothing recognizable surfaced.

I built frequency counters, applets to show how often characters appeared. I had to be wary of vowels since labels were limited in length and the first thing people jettison when abbreviating are vowels. The tables from the frequency counters not only revealed which letters were the most crucial, but also helped zero in on likely character replacements.

The first pass turned out better than expected. A thousand labels suddenly appeared readable. A few unknowns became obvious, but in one table I inadvertently mixed M with N. Correct and rerun. Rinse and repeat. Letter by letter, the coded alphabets unmasked.

Discovering how Sandman selected which table to use helped narrow the focus. The first character of a label served as a table selector. If that letter fell within the first third of our thirty-six alphanumeric characters, he used table 1, or within the second third, table 2, and so on. That mapping didn’t immediately jump out from the encryption, but it could be deduced as labels revealed themselves.

Sandman’s Encryption Table
  ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789
selector

↪︎ JXOHY28RGUPB1WA736SLZQF5MD40CN9VTKIE
↪︎ 5FXABTS2V71K9Y6G048HUOLEIPQJNZCDMWR3
V52KGBXSLOM7TIWH6P18Q03NYDJZCEUFR94A

7-of-9 and Other Figures

An important issue I had to deal with was context. If you’ve ever glanced at raw HTML, you saw that formatting tags were mixed in with common text. You might see something like:

<html><head><title>Student Body</title></head><body>

This page discusses who shall head the student body.

</body></html>

Imagine searching and replacing the keywords ‘head’ and ‘body’ without affecting the HTML tags in a hundred-thousand lines and upwards of a million words without making a mistake. The solution is to comprehend meaning, to grasp when head is part of a formatting tag and when it isn’t.

Much like a human reader, the translation program needed to comprehend context. It parsed the text, distinguished actual programming statements, formatting commands, comments, and assorted runes in what technical people call a non-trivial exercise.

The smart enough parser had to recognize if “7,9” referred to two registers, two memory locations, a mix of the two, coordinates, formatting, a decimal number, part of a comment, or an actress in a television show.

To minimize errors as I restored the code, I borrowed a programmer to help check expansions. Late into the night, our flat conversations sounded like alien air traffic controllers:

“… Hex two-five-five, nought, bang paren dog-easy minus splat…”

“… Xor var fox fox, double word, two-seven baker niner able, no deltas.”

A splat meant an asterisk, bang an exclamation point, a delta implied a difference, and much of the rest was hexadecimal. You’re following this, right?

Deltas had to be identified and dealt with. A final pass matched the assembled output of the original and my newly created decrypted version.


The Flash Gordon Super Decoder Ring

It took a shade over two months, but finally I could inform the vice president he had viable source code, better documented than the original. Since most people couldn’t tell assembler code from alphabet soup, he awarded me congratulations with a vague smile. After all, he had to trust what I said it was.

More satisfying was a phone call I made, one to Sandman.

He said, “I don’t believe it. Impossible. You could not have done it. I couldn’t have done it.”

“It’s true. Got a fax number? I’ll send you a couple of pages plus a cross-reference list of labels.”

“Wow, that’s stupendous. Awesome. I didn’t think it could be done. I respect you, you know. This has been extremely satisfying in a way, a battle of brains. Thrust and parry. Check and mate. You’re as good as they say.”

“You could be a contender, Dan. Do the right thing, join the universe on the side of the angels.”

I thought it was end game, but it wasn’t over yet. When no one was looking, perhaps influenced by his corrupt skating Queen, Sandman slipped another rook onto the board.

Computer Associates

I continued development, expanding the product’s capabilities. Some time earlier I had invented Fx, a technique to carve out an independent partition tailor made for such a product to run in. I refined it for Data Corp, which pleased the customers.

On the sales side, matters were not going well. Sandman was right about one aspect. The business model Chase maintained in his head did not match the reality of the market. Australian Boyd Munro had managed to support a high-flying international sales organization– literally high flying– Boyd and the top officers flew their own private planes. Their salesmen personally visited companies to sell a product that leased for a thousand dollars and upwards a month.

Chase owned a Cessna, but with a product that sold for a fraction of Munro’s in an increasingly competitive and changing market, flying half way across the country to make a sales pitch wasn’t feasible. Although we’d solved the technical and legal catastrophes, the board eyed the bottom line, and S&M– sales and marketing– loomed in their gunsights.

During my break in Boston, the vice president phoned. Another situation. Couldn’t he time dramas to occur when I was in Virginia?

“Leigh, what is your opinion of Computer Associates?”

“My opinion? They have staying power, can’t argue that. They change with the times. The company has a chequered reputation, though, considered shady. Rumors persist about a clash with Tower Systems out in California and that the D-fast and T-fast products were cloned. Supposedly the president’s brother is the corporate attorney, so one story says they bully smaller companies in court, grind them down with legal fees, Software Darwinism, the beast with the biggest claws.”

“Computer Associates expresses an interest in buying the rights to our product. They want to send a software specialist to look over the programs. Can you fly here to show it to him?”

“You want to show a competitor our source code? In light of what I just explained, if only a small part is true, does this make sense?”

“Did I mention they are talking a five with a lot of zeros after it?”

“Five hundred thousand dollars? You are joking.”

“I do not joke.”

“Have them sign a non-disclosure agreement, maybe an MOU. Protect yourself.” I could tell from his reaction he wasn’t listening to anything but a five followed by five zeroes.

Bankers, hard-nosed but so naïve.

CA’s software guru turned out to be a Jersey guy with an enviable excess of kinetic energy. The bank’s coffee klatch girls studied Matt, sizing him up.

“He looks like the Leverage TV actor, you know, Christian Kane without the smile, don’cha think?”

“I picture that bad boy flying down the road on a motorcycle, long hair flattened back by the wind.”

“You hear how he talked to the receptionist? He gives me the creeps. You ever see Andrew Dice Clay?”

“Girlie, we got a male who fogs a mirror. What more do we need in a testosterone drought?”

Matt communicated mostly in monosyllabic grunts and nods, then dove head-first into the programs. The vice president hung about, all but wringing his hands before deciding his presence wasn’t contributing. Chase on the other hand, sat down prepared to answer questions. When Matt opened his notebook and began to make copious notes, I shot a questioning look at Chase. He merely shrugged and motioned me outside the room.

“The VP said anything goes. They want to sell it and don’t want us to throw up barriers.”

“What about the non-disclosure? Your bank had me sign one.”

“You are a consultant. This is an established company.”

“I don’t believe it. You wouldn’t give me a hint about the program until I signed sixteen documents. This guy waltzes in, they open the vault?”

“Pretty much. Look, they know your feelings; they just don’t see it your way.”

The VP returned and offered lunch, a largess almost unheard of. Barbecue, Southern buffet, Chinese… Matt waved them all away. “Cold pizza will do.”

Folks in the Shenandoah Valley like to get to know people they do business with. Matt did his best to keep a distance. Chase was clearly uncomfortable with this, but the vice president took it to mean Matt was all business and above frivolity while the rest of us worried about job security. The fact Matt saved the vice president forty bucks for lunch didn’t hurt either.

The afternoon turned into more of the same. Matt pored over the programs, taking extensive notes, filling page after page. From time to time he stepped out of the room to make private phone calls. About 5:30, we shut down for the evening, unusual for us. We invited Matt out to dinner. Chase suggested bluegrass, but Matt declined both.

We met again at nine the next day. Mid-morning Matt turned his attention to my Fx routine and his interest picked up, so much so that he was copying actual bits of code. How did this advance negotiations, I wondered. I closed the binder cover and excused myself, taking it with me.

I stopped in the VP’s office, and reported I didn’t like the way this was going. I’d developed this routine on my own, already had it purloined once, and I didn’t want it stolen again. Because I benefited from royalties, I allowed the bank to use it but they didn’t own it– I did. My holding out for a signed agreement did not make the vice president happy.

Lunch saw subs delivered. By mid-afternoon Matt said he was ready for a meeting. Even I wasn’t prepared for the audacity of his announcement.

“You know a guy named Daniel Sandman? We bought rights and title to the package from him. After minor changes, we shall bring it to market. We’re willing to pay you $10,000 for whatever rights you think you have and you turn your source code over to us.”

The blatant gall stunned us. Finally, Chase said, “The offer of a half million plus was just bullshit?”

The vice president, never one to forget proprieties, frowned at Chase but said to Matt. “You viewed our source under false pretenses?”

Matt shrugged. “You were under no obligation to show me a fucking thing. I suggest you consider this proposal quickly and unemotionally. I have no idea how long my bosses will keep the offer open. With or without you, we’ll bring the product to market within months.”

“What offer?” said Chase. “This is blackmail.”

“It’s actually extortion,” said the vice president. “It won’t fly here. We own the product. We have taken steps more than once to defend it. I cannot imagine what Sandman led you to believe, but the product is not yours. Now I’d appreciate it if you return the notes.”

“Forget about it. The notes are mine, freely allowed by you. You know Charlie Wong, the guy I work for? And his brother, their lawyer? Believe me, before this is over, we’ll own it, Fx and all, and you’ll be wishing you had the $10,000 to cover your first week of legal fees.”

“Fx is not for sale,” I said flatly.

“You think you can stop us?”

The vice president leaned in. “Our customer base monthly revenue is worth more than you’re offering. I suggest you leave, before Southern hospitality comes to an end.”

Matt tapped his fingers a moment and said, “You’ll regret it. Call me a fucking cab.”


The after-conference turned dismal. We had been humbled, deceived, threatened, misled and misused. Only our refusal to be bullied gave us the least comfort.

Matt’s feint and his company’s bluff corroded the bank’s confidence. Computer Associates’ audacity must surely have some credence, mustn’t it? The vice president sent out a tendril of query, tried a civilized probe into Computer Associates, which was met with stony implacability. Gradually, the cold acidic silence ate through the bank’s certainty and sense of justice. They decided to invest no more in the product.

I was retained for the time being because Data Corp still had customers who depended on the software and they would not abandon them. As manufacturers introduced new devices and operating system changes, our package continued to adjust and adapt.

Loose Ends

Chase departed, moving on to sell elsewhere. He reported an industry insider rumor that Computer Associates concluded Sandman either screwed them or they found him too volatile to work with. Either way, they killed off their project. But sadly, they’d also killed ours.

CA’s retreat came too late for us. With sales and marketing shut down, the die had been cast. Within a year or two, requests for updates to the software slowed and then tapered off altogether. The bank ceased billing the last few customers, letting them continue to use the product if they chose or migrate to a competitor’s offering.

Sand Castles

Sandman induced mixed feelings. He possessed a brilliant, if sadly injudicious mind. Like a Greek drama or a Russian novel, the characters and the outcome were doomed from the start. I thought of Sandman less a bad guy and more a pathetic protagonist hemmed in by a distorted perception of the world.

As a result, he acted vengefully and criminally. He’d defrauded a bank and its most important business clients. Goaded by his lover, he blew every chance, every opportunity to get it right. When the blunders of a cigar-chompin’ deputy gave him a get-out-of-jail card, he attempted one more dishonest end-run, reselling a product he no longer owned. It shouldn’t have turned out a tragedy, but characters seldom get to decide the plot.

I confess I relished the contest. Like a novel’s protagonist, I had to see it through until its end. A friend noted I would have fought the battle even if I hadn’t been paid.

As a freelancer, jokes surrounded me about riding into town, smiting a problem, and riding out again as winsome daughters clasped their hands to heaving bosoms and cried out, “Who was that masked man?” Even the industry slang of a hired ‘code-slinger’ evoked the image of a geekish gunfighter. We each enjoy our illusions, but the challenge felt exciting.

Although a resoundingly happy ending didn’t materialize, the case looms in my past with a sense of satisfaction, of skirmishes won and a job completed. One could argue otherwise, but I like to think it a shadow victory for the good guys who prevented the bad guys from winning.

As much as I enjoyed the battle of wits, the world would have been a happier place if Sandman had executed an ethical U-turn into the righteous lane. But if the ungodly, as The Saint was wont to say, always did the right thing, we’d have no story.

20 December 2020

The Skating Mistress Affair, Part III


bank vault

Part I and Part II provide the background of a unique bank fraud investigation. Last time, Sandman, influenced by his interfering inamorata, could not grasp that having cheated a bank once, he was no longer in a position to negotiate tough deals to make matters right.

No one had any notion of the unreal turn the case would take.


Off-Court Serve

A sizable entourage gathered in North Carolina: the vice president, a local consultant, a legal assistant, two attorneys, a company officer, Chase, and a brace of company people who stayed in the background.

I hadn’t previously met the bank’s attorney, a pretty, dark-haired girl with beauty, brains, and a beguiling sense of humor. Diane and I hit it off immediately.

The vice president introduced the other attorney, a local Greensboro man who’d made good. He’d graduated Harvard summa cum laude, then returned home to practice. His Clark Kent glasses lent a vague, intellectual uncertainty that would fool most people. Women zeroed in on tall, dark, and handsome, although he’d probably suffer an academic stoop in later life. Chase used the term ‘Esquire’, which became the man’s sobriquet for the rest of the trip.

The attorneys laid out a simple plan. They intended to search Sandman’s residence and, if necessary, his workplace for the source code. Since Sandman worked nights and slept days, they hoped to catch him napping– literally.

Esquire’s clerk had filed a brief and affidavits, including a couple from me, in support of search warrants for Sandman’s residence and place of work. They drafted carefully the motion to search the workplace, Carolina Steel. They weren’t Sandman’s employer, they merely let Sandman use their computers for development in exchange for his software and services. Two of their employees, Harry Church and Charley Barley, collaborated with Sandman.

Guilford County courthouse
Guilford County courthouse

An out-of-state entity requesting to search a local company might give a judge pause, but banks enjoyed certain federal privileges and protections. Trailing after the attorneys, we convened at the Guilford County courthouse to obtain a judge’s signatures on the court orders and warrant.

And then we waited. And waited. The courthouse’s architecture would have given Howard Roark apoplexy, a dull cell block unrelieved by a Greco-Roman temple façade. Its uncommonly hard benches had been cunningly copied from a Spanish Inquisition design. After painful hours of aching back and backside, I’d have confessed to assassinating Warren G Harding.

Once we discovered judges had adjourned for lunch, we followed suit. Esquire stayed behind in case a magistrate returned early. We need not have worried. The clock read well after lunch hour when Esquire came dashing back.

Why Southern Deputies Have Stereotypes

   
Sheriff J.W. Pepper   Sheriff B.T. Justus   our Deputy I.B. Dimbulb

The next step entailed the sheriff’s office executing the search warrant. While we waited, the Sheriff’s Department assigned a deputy to us. Jaws dropped. I wasn’t sure about the others, but I gulped in dismay.

Sheriffs J.W. Pepper and Buford T. Justice– movie fans might recognize them as the fat, stogie-chomping clichés portrayed by actors George Clifton and Jackie Gleason, respectively. Our guy looked like their bigger, nastier, meaner brother, the Southern deputy the South has done its best to stamp out.

Mean little eyes peeked out from the fat pads of his cheeks. His hair was losing the follicle war fought on an oily battlefield. He chewed a fat cigar mashed out so often, its end looked exploded. This good ol’ boy had worked hard developing a beer gut, the kegger kind that gave meaning to barrel-chested.

Chase and I’d been chatting up the pretty attorney between us, idly flirting to keep in practice. The deputy looked around at the gathered crew, hitched up his gunbelt and seized upon her to impress.

“Lil lady, whuz this here all about?”

Diane explained we were waiting for a warrant.

“Whut, you’re a legal lady? Purty lil theng lack you? Listen here, I’ll check on it, pull a few strings.”

He wandered off, came back, and glowered at Chase and me still sitting on either side of her. He plumped down next to the law clerk, facing us, legs apart to accommodate the sag of his kilderkin belly. Guilford County law enforcement shirts were made out of sturdy twill, not flimsy civilian fabric that might rupture at the next Big Mac.

“We wait a bit. At least this here’s simpler than last week. Yes sir. We wuz down in n-town, middle of the night, had my nightstick out whaling away, an’ you wun’t believe how shy them dark ones gets facing real lawnforcement.”

A man with a gun, a prejudice, and a loose screw had been turned loose on the streets of Greensboro.

The rest of us sat aghast. The local paralegal looked as if he wanted to shrink out of sight. Our VP, lounging against the wall, grimaced in disgust and departed the scene of the crime.

Next to me, attorney Diane tried to reassure me, the Yankee in the group. She whispered, “Believe me, this is not what Southerners are all about. This moron is… is…”

“An abomination,” muttered Chase. “Pardon the expression, but an utter asshole.”

His eye-watering cigar breath wilted most of us. I couldn’t decide if the deputy was oblivious to our reactions or encouraged by them. Had some of us managed to conjure obsequious interest, the course of events might have changed.

He continued. “Yep, now you takes a good oak nightstick, it makes a real good impression. It’s a grand persuader and if someones gets a bit messed up, you don’ gotta file no reports lack if you draw down. Nows this one darkie…” He didn’t use the word darkie.

I worked and traveled throughout the South, but I never encountered anything like this. More than sickening, this guy frightened us.

Once upon a time, the don’t-tread-on-me temper I inherited from my mother would override the quiet reason of my dad’s DNA contribution. Chase glanced at me in alarm. He’d seen me erupt once before. He leaned over and rested a calming hand on my wrist.

“Leigh, don’t, man. Don’t let anger cloud your vision. We need this guy on our side; it’s too important.”

Chase was right. We didn’t need to antagonize the repellant lawman assigned to us. I stalked toward the restrooms.

Hands on the marble counter, I leaned forward gathering myself. The vice president stepped out of a stall. He washed his hands and said, “Piece of work, isn’t he.”

“That bastard gets his jollies clubbing kids. Makes me sick.”

“That’s why I left before I told him off. We can’t change him now.” He clapped a hand on my shoulder. “C’mon, we endure.”

And we did for two more hours. None of us knew how much more of the deputy we could take before one of us turned homicidal.

Chase and the VP grew increasingly agitated the warrant was taking so much time. As shadows grew long, legal delays put at risk the plan to surprise Sandman asleep. Now past mid-afternoon, the time neared for his inner vampire to stir.

Esquire appeared and waved the vice president over. Minutes later they handed the deputy the court order.

The deputy squinted at the documents.

“Whut’s this here software?”

Chase said, “Computer programs, apps. Software runs the computer.”

“Whut’s it look like?”

“It could be listings, discs, hard drives, or even tape.”

“Yuh, but which?”

“It could be any of the above: print-outs, discs, cartridges, or tape.”

“Yuh, I said which?”

Chase turned helplessly to me.

I said, “We don’t know, sir. If this order was for music, it could be on a cassette, a CD, a vinyl record, or even sheet music, see? Same idea; we don’t know if it’s on a hard drive, CD, or printed sheets. It could be any or all.”

“Listen up. If you don’ know whut you’re lookin’ fur, we jez ain’t goin’.”

Attorney Diane stepped forward. Beguilingly, she said, “This is a court order signed by a judge; you have the warrant. Leigh here can recognize the software.” She rested her hand on his forearm. “We need an experienced officer like you to execute the warrant.”

“Thet judge pulls bogus orders outta his ass all the time. It don’t spell out what it is, I don’t execute it.”

Esquire hadn’t been regaled with the deputy’s adventures like we had, but the antipathy between the two men had blossomed, instant and intense. He said, “Come, Deputy, explain that to the judge.”

“Folks say you got fancy-ass Harvard law school, but that don’t cut no ice. I don’t tote for you. I works for the Sheriff.”

“The judge hears this, you might not work for anyone.”

The deputy stared at Esquire. He unhurriedly took the cigar out of his mouth, pulled out a paper pouch of tobacco, tucked in a chaw, and reinserted the cigar. He gave the distinct impression he’d like to address Esquire with the nightstick. Finally, he said, “Let’s git.” He turned and stomped away.

The Raid

The deputy’s heavily muscled Dodge led our convoy of four cars. The paralegals and staff came along as witnesses. We pulled in front of a modest house in a suburban neighborhood.

Chase stayed back to avoid antagonizing Sandman. I was kept waiting in the last car, I was told, for the premises to be secured.

Four got out. Both lawyers and the vice president followed the deputy up the walkway. The deputy banged on the door.

A spikey-haired, sleepy-eyed Sandman came to the entry, tying the belt of his bathrobe.

“We lookin’ for a Daniel Sandman. You happen to be him?”

“Yes.”

“We got a warrant for software. You got any this here software?”

“No, no sir, I don’t.”

“None at all?”

“No sir.”

“Well, then, a good day to you.”

“But… but…” said Esquire. “We came to search.”

“No, we ain’t gonna do no search.”

“But we have a warrant, a search warrant, as directed by a judge.”

“You heard the boy: He ain’t got none of this software. His word’s good enough for me.”

The vice president spoke up. “He has the software and we have a court order.”

The deputy spoke in mean, measured words. “You heard the boy. He said he ain’t got software. Now, you wantin’ to mess with me?”

Thwarted, the lawyers trudged back to the cars. Revving the Dodge’s big engine, the deputy whipped the powerful car down the street and out of sight.

“We still have the court order for his workplace,” said the vice president.

“A lot of good that will do us now,” said Esquire. “But let’s try.”

Nervy Steel

He directed us to Carolina Steel’s headquarters. As if anticipated, we were swept straight to the top floor where two company officers and their lawyers met us. Clearly, they knew we were coming.

The company attorneys blathered and blathered, made phone calls and blathered more. They claimed they were waiting for senior counsel. Outside the conference room, security gathered.

One of the executives said, “Our boys downstairs assure us they don’t have any of this software mentioned in the court order.”

Chase muttered in my ear. “Least not anymore.”

“That’s why we brought an expert and a court order to search,” said our vice president.

“Now, now. Normally in Carolina, police or deputies conduct searches. You don’t do it differently in Old Vir-gin-I-A, do you? All y’all can’t expect us just to let you poke around, can you, especially since our boys assure everyone nothing’s to be found? Certainly you don’t mean to question our veracity or abuse our hospitality?”

A legal argument ensued, but it grew clear that without police presence, we wouldn’t be allowed beyond the boardroom.

Security personnel moved in to escort us to the parking lot. The burly males looked menacing enough, but the much scarier short female guard appeared itching to shoot one of us in the kneecap.

Thwarted yet again, we adjourned for a post-mortem. It felt like our own. What should have been a simple mission, abjectly nosedived.


Days later, talking to Sandman, he told me what happened behind the scenes.

“Man, the deputy gave me a scare. As soon as I closed the door, I lit the fireplace. Middle of summer and I get a blaze roaring. I’d stacked listings all over the house, one of them on an end table next to the door, not more than two, three feet from where the deputy stood.

“I gathered them up, feeding them piece by piece to the fire, burning the evidence. I also had a couple of mag tapes around. You wouldn’t believe how Mylar stinks when it burns. Gives off this black ash. The stench still reeks in my nostrils. That left a disc cartridge. I figured if worse came to worst, it might anciently sorta get dropped.

“Simultaneously, I called the computer room, and told Charley and Harry the situation. The entire time you were upstairs with the lawyers stalling you, they were downstairs erasing everything they could off of disc and tape, shredding so many listings they fried the shredder and had to roll in another.

“Every ten minutes the CIO would call in. ‘What’s left? What’s left?’ By the time our lawyers let you go, we’d hidden the key pieces and destroyed the rest.

“Harry, Charley, and me… we worried one or all of would be let go, but Carolina Steel’s attorneys nixed that, saying terminations could be used as prima facie evidence we’d done something wrong like destroying the programs specified in the warrant.

“Man, I shouldn’t gloat, but our insane clown deputy beat your Harvard summa cum laude lawyer. Lot of good he did y’all.”

Post Mortem

I accompanied the bank people back to Virginia. It wasn’t a happy trip. The vice president needed to prepare an explanation for the stockholders. The rest of us and Data Corp’s general manager met at the Arbor, a favorite restaurant for dinner, overeating, and imbibing. Comfort food and drink.

We agreed not to talk about the debacle while we ate, but we couldn’t bear the tension. We cursed the deputy, Sandman, Carolina Steel, and software in general. Finally we pushed fried chicken aside and sat back.

“Well,” said the bank’s attorney, dabbing lipstick where it had worn thin. “That was a right fiasco.”

“And other words that begin with Æ’,” Chase said.

Diane put her lipstick away. “What I don’t see is an option anymore.”

“That was it, the end of the line.”

“We’ve got to consider our exposure, to customers, to shareholders, to ourselves. We face serious liability if customers discover we don’t possess the source code.”

“Hmm,” I said.

“Damn,” said Chase, far down in his beer. “I have clients who want to buy it if we can add features and support for new hardware.”

“There is one option,” I said, but no one was listening.

“Oh Lord,” said the attorney. “I wonder if we’ve stepped on any state or federal banking regulations. We could be accused of fraud here.”

“Not necessarily,” I said.

“Even worse exposure,” she groaned, “most of our sales have been out of state.”

I said. “Folks, listen a moment. I can decrypt the code.”

Chase peered at me speculatively, the lawyer skeptically, and Data Corp’s general manager like I was crazy.

Chase said, “Danny told us over the phone it’s too complex even for him. It can’t be done.”

“When do you stop believing the guy who screwed you and start listening to the guy hired to save your butts?”

For the first time in weeks, Chase looked more relieved than morose. He gulped like a man given a Heimlich maneuver.

The general manager reached across for the last piece of chicken. “I’m pretty certain we can’t afford for Leigh to write us an entirely new program.”

Diane’s paralegal had followed both the legal and technical discussions. She had drafted the original purchase contract with Sandman.

“Leigh, what makes you think you can do this?” she asked. “Not only would you have to figure out the program in the ordinary course of events, but a brilliant and devious guy has done his best to see it can’t be done.”

“If anyone can do it, Leigh can,” Chase said with perhaps more conviction than he felt. “If you’d heard the two of them on the phone, you’d know he’s got Sandman on the run. I’ve seen his work, even more brilliant than Sandman.”

“Are we talking battle of the brains or war of the egos?” said the GM. “He may be quite the code-slinger, but experts say code-smashing can’t be done.”

I said, “The difficult part was figuring out it was encrypted. The second hardest has been deducing how. I’ve been working that out at home while I’ve been waiting.”

“You’re plugged into NSA or CIA or something?” said Diane’s paralegal.

“No, it’s merely a puzzle.” A famous quote came to mind. “A riddle wrapped in a mystery inside an enigma.” They stared at me. The Churchill reference fell flat. I couldn’t blame them; we’d undergone a bad day.

“What’s our guarantee?” the paralegal asked. “We already took the word of one guy. It’s not up to me, but I wouldn’t throw good money after bad.”

I said, “Sandman created programs to strip and encrypt the program. I have to design programs to decrypt and restore the code.”

Diane spoke up. “So why are you saying this isn’t the most difficult thing in the world?”

“Sandman didn’t want to trigger alarms, so no fancy NSA 128-bit encryption. Instead, he scaled up cypher obfuscation to support the legend of a hard-to-comprehend way of doing things. He believed he garbled the code too much to permit serious study. He’s wrong, but it’ll take detective work.”

“Even so,” said Chase, “you won’t get the documentation back, the comments.”

“True, but I’ve been living with this program for months. Once decoded, the label names give clues; that’s why Sandman encrypted them. As for the logic, in a circular way I can learn the code by having to document it and I can document the code by having to learn it. Does that makes sense? I’ll attain a deeper knowledge than if I hadn’t had to do the extra work.”

Chase raised his glass. “I bet on Leigh.”

The attorney– she of little confidence– shook her head. “He’s cute but…”

Chase picked up the check and said to me, “Let’s get sleep and start tomorrow.”


Sandman had blown his chance to negotiate a deal that would have benefited everybody. The bank boxed him in legally and I was closing in on breaking his unbreakable code. He still had one more wrong move to make as we wrap up in Part IV.