Trouble and her Friends Read online




  Paragons of Queer Fiction

  The Paragons of Queer Speculative Fiction series showcases the finer works of storytelling in the English language that embrace a variety of gender and sexual identities through the lens of the fantastical, the otherworldly, the supernatural, the yet-to-be. These are the books that continue to resonate with readers despite the passage of time. These are the books that a queered culture demands.

  M E L I S S A S C O T T

  TROUBLE

  A N D H E R

  FRIENDS

  Trouble and Her Friends

  Copyright © 1994 by Melissa Scott.

  First edition published by Tor Books in 1994.

  This edition by Lethe Press in 2014.

  “Legend of a Mind” lyrics and music by Ray Thomas, copyright © 1968 and 1969 Westminster Music, Ltd., London, England. TRO-Essex Music International, Inc., New York, controls all publication rights for the USA and Canada. Used by permission.

  Published by Lethe Press

  118 Heritage Ave, Maple Shade, NJ 08052

  lethepressbooks.com

  Paperback ISBN 978-1-59021-600-2 / 1-59021-600-8

  Cyber-ISBN 978-1-59021-561-6 / 1-59021-561-3

  Cover artwork by Fernando Cortes

  Cover design by Alex Jeffers

  Interior design by Matt Cresswell (Inkspiral Design)

  For Lab

  Contents

  Consequences

  1

  2

  3

  4

  5

  Seahaven

  6

  7

  8

  Silk

  9

  10

  11

  Showdown

  12

  13

  14

  about the author

  Acknowledgements

  I’d like to thank Don Sakers for all the useful information forwarded to me during the course of writing this book—it’s great to have a good friend who is also a good librarian. I’d also like to thank Nancy Bellhouse May of Wright, Lindsey, and Jennings, for steering me through the legal maze surrounding these issues; the interpretations are, however, entirely my own. Thanks are also due to David Hartwell, for asking the right questions, and to Lisa Barnett, for making me prove this would work at all.

  Consequences

  Timothy Leary’s dead.

  No, no, no, no, he’s outside

  Looking in….

  Ray Thomas,

  Legend of a Mind

  1

  Trouble was gone. Cerise had known it from the moment she entered the strangely neat apartment, the inevitable clutter—disks, books and papers, here a sweater, there a pair of shoes—all missing along with Trouble. She went through the two rooms in the greyed light of the winter afternoon, checked the single closet and the battered trunks that held the rest of their clothes, not looking at the computers until the last, already sure of what she would find. Half the system was gone, Trouble’s half, the portable holo-multex drive and the brainbox and the braid of cables and biojacks that carried signals to the implanted processors in their brains. There was no paper note.

  A light was flashing on the media console, and she touched the code keys to retrieve the single message. The voice that broke from the speaker was familiar, but not Trouble—Carlie, babbling on about something she couldn’t be bothered to hear right now—and she killed the message, not bothering to save it for later. She turned away from the wall of blank screens and cubbies filled with data decks and players, the ugly oyster-grey carpet squeaking underfoot, and looked around the little room as though she was seeing it for the first time. Outside the single window, the sun was setting beyond the buildings on the far side of the little park, throwing a last cold light across the grey stone and concrete. A reflection like a spark flared from the highest side windows of the Lomaro Building half a mile away—three-quarters of a kilometer, she corrected automatically—and faded as she stared. The sun dropped into a bank of dirty cloud, and the light went out as though someone had flicked a switch. On the horizon, beyond the five- and six-story buildings of the local neighborhood, neon flickered to life, running like lightning along the edges of the buildings.

  She shivered, and reached overhead into the web of invisible control beams that crisscrossed the apartment, waved her hand twice to bring on the main lights. A yellow light flashed on the display by the door instead, warning her that she hadn’t replaced the main battery. She swore under her breath—that had been Trouble’s chore—and went to the panel herself, switched lights and heat to full and touched the button that brought the opaque screen down over the window. It was sheer indulgence, this system, costing at least two months’ rent to install, but once the security—black security, black-market and blackest-night effective, run off an illegal direct-line power tap—had been in place, it had seemed a shame not to install the convenience systems as well. She remembered Trouble balancing on an uneven chair beside the door, drill-driver in hand, bolting the last of the extra control boxes into place. That had been their indulgence for a job well done, right before the hearings began, three months before David Terrel was actually convicted of armed robbery because of a particularly brutal icebreaker he carried in his toolkit. The last good times, she thought, feeling at the moment only the cold, and turned back to the dismantled machines.

  Seeing the system broken, the empty spaces where Trouble’s machines had been, made her shiver again, something like fear or rage or sorrow threatening to break through the numbness, but she shoved the feelings down again, and went back into the bedroom for the things she needed to repair the gaps. She had spares of everything that Trouble had taken, machines she had used before she’d met Trouble, and she hauled their cases out from under the bed, brushing dust from the lids. The wind moaned through the rungs of the fire escape that slanted down past the bedroom window; she glanced at it, hearing loose bolts rattle on the landing one story above, and went back into the outer room.

  It didn’t take long to rebuild the system. Trouble had worked with her usual precision, taking nothing that wasn’t hers, leaving the backup disks stacked prominently in front of the dusty keyboard. There was a hollyblock there, too, holographic storage, and Cerise moved it impatiently aside to plug her own holodrive into the multiple sockets. She replaced Trouble’s dedicated brainbox with her own—an older model, but still serviceable, still fast enough to let her run the nets without danger—and found a length of cable to reconnect the various components. She looked at the hollyblock, but did not pick it up, turned instead to the rarely used keyboard and began methodically to recreate her machine.

  The screen lit and windowed as she worked, giving her a schematic view of the reconstructed system; she touched keys, reestablishing virtual links that had been broken when the physical links were removed, and watched the schematic shift, rotating in the uppermost window to show her the new links outlined in red. A string of text asked for confirmation. She gave it the code it wanted, and watched as the red lines slowly turned to yellow and then to green, blending in with the rest of the design. When she was sure it was complete, she dismissed that image, and sorted through the directories until she found her private mailbox. It took two keys to open it, one a name—she made a mental note to change that—the other a meaningless string of letters, but she found nothing new in the lists of files. That was as she’d expected, and she closed the program, reaching instead for the hollyblock. If Trouble had left her anything, any explanation, it would be there.

  She fitted the box carefully into the replacement multex drive, and touched the keys that initiated the test sequence. Everything came back green, and she pressed a second set of keys to access the drive. A dozen files
, each indicated by an individual symbol, an icon, bloomed on her screen. She frowned then—she had expected more, some message, some more useful labels, something—but touched the first icon. The file blossomed in front of her, filling the screen with a peculiar half-squashed, half-stretched image that she recognized at once as the two-dimensional representation of a three-dimensional network file—of their network map, she realized suddenly, of the map she and Trouble had painstakingly built over the four years of their partnership. It was one of their more useful tools: there were no commercial maps available—not covering all the nets—and the ones that did exist were deliberately flawed, deliberately distorted to hide the control areas from people who had no business having access. And there were plenty of corporate spaces, privately owned systems that nonetheless also existed in the unreal “space” of the myriad networked computers that was the nets; all of those preferred to be invisible, at least to an outside eye.

  On the net itself, of course, things were different. Once you plugged yourself into the system—either via the implanted dollie-box and dollie-slot, the direct-on-line-image processor system, which gave a text-speech-and-symbol interface, or through the full-sense brainworm, with its molecular wires running directly into the brain that let you experience virtuality as though it were real—it was easy enough to find your way around the nets. There were signposts, vivid neon images, and the swirling rivers and lines of light that were the virtual reflection of the data itself, which anyone who’d been on the nets for any length of time could read like a tracker read spoor. But the map was useful for planning a job, when you had to enter the nets from the safest point, so that the security programs, watchdogs and trackers and callback systems, and all the panoply of IC(E)—Intrusion Countermeasures (Electronic)—would either lose your trail in the confusion of conflicting data or never have the chance to track you down. Remotely, Cerise was surprised that Trouble had taken the copy with her, though she supposed it was possible that Trouble had made two copies out of the network files, their own secure space. But then, Trouble had said it was time to give up cracking.

  It was very quiet in the apartment, too quiet, just the distant sound of wind and the occasional rattle of the fire escape in the other room. Cerise winced, and reached for the main remote, jabbed at buttons until the media center lit. Trouble had left the main screen tuned to the news channel, and the blare of the announcer’s voice filled the room.

  “—top story, the Senate today voted to override the presidential veto of the Evans-Tindale Bill, joining the House in handing the president a resounding defeat. Marjorie Albuez in Washington has more on the story.”

  “Thank you, Jim. By accepting the compromise bill sponsored by Charles Evans and Alexander Tindale, Congress today seems to have ensured that the United States will remain the only industrial nation that is not a signatory to the Amsterdam Network Conventions.”

  The voice droned on, but Cerise was no longer listening. She swung back to face the linked computers, the remaining files forgotten, and reached for the dollie-cord snugged into its housing at the base of the dedicated brainbox. She tilted her head to fit the cord into the dollie-slot behind her right ear, but did not launch herself directly onto the nets. This was why Trouble had left. She had been talking for months about what would happen if the U.S. rejected the Amsterdam Conventions, about how even the supposedly benign Evans-Tindale Bill would destroy the cracker community, bring them all finally under an alien, ill-conceived, ill fitting law. For a moment, Cerise almost believed those prophecies of doom. No one had believed that Congress would buy Evans-Tindale, it bore no relation to virtuality….

  “—completes what the so-called Nunberg Act—the Industrial Espionage Act, as it is more properly known—attempted to provide two years ago.” That was a new voice, but Cerise didn’t turn to identify the speaker. “The Evans-Tindale Bill codifies the various provisions of the Nunberg Act, and creates a new entity within the Treasury Department that will have enforcement responsibility on the nets, replacing the patchwork system currently in place. In a nutshell, Evans-Tindale, like the Nunberg Act before it, redefines so-called cyberspace as a particular legal jurisdiction, and establishes a code of law governing these electronic transactions.”

  Which means, Cerise thought, that we’re all screwed. She sat for a long moment, staring at her screen, at the distorted image displayed in its central window. That map no longer mattered, because now there was no reason to keep those secrets, at least not in the legal world of the bright lights: there was a new law out there, and one that could be enforced in the real world. And for the shadows—the illegal world of crackers and grey- and black-market dealers, the world where she had lived ever since she’d run away from her home, her true name, and the secretarial school that had been her second home—it meant the end of an era. It would no longer be possible to dodge the law in one jurisdiction by claiming that you, or your machines, or your target, were located elsewhere; it would no longer be possible to argue that there was no theft where there was no real property. All that had been decided, and by fiat, not the nets’ own powerful consensus. And Evans-Tindale also meant that there was no longer any possibility of legalizing the brainworm. The old-style crackers and the legal netwalkers had proclaimed their innocence by blaming everything on the brainworm and its users, and no one in authority seemed to know enough to know that they were lying.

  She reached for the safety, cupped it in her left hand, hesitated, and wound the cord twice around her wrist, just in case. If she pressed that button, or its virtual analogue, the system would shut down instantly and automatically, dumping her back in the safety of her own home system, her own body. She took a deep breath, fighting back despair, and used her right hand to touch the sequence that opened a net gateway. The brainworm responded perfectly, its impulses overriding the merely physical input of the apartment, and she flung herself out into the glittering perpetual night that was the net.

  Alice in Wonderland, Alice down the rabbit hole, Alice out in cyberspace, flung along the lines of data, flying across fields of light, the night cities that live only behind her eyes. Power rides her fingers, she moves from datashell to datashell, walking the nets like the ghost of a shadow, her trail vanishing behind her as she goes. She carries power in the dark behind her eyes.

  And she needs it, tonight, in the chaos that whirls between the islands of the corporate spaces, their boundaries marked by heaps and new whorls of glittering IC(E). The bulletin boards, the great sink of the BBS where all the lines of data eventually meet and merge and pool into a sink of slow transfer, limited nodes, and low-budget users, are in upheaval. The familiar icons and signpost-symbols that guide the unwary are gone completely, erased by their owners or remade in new and somehow threatening form. Icons whirl past her, some representing people she knows, has worked with. She smells fear sharp as sweat, hears the constant rustling murmur of the transactions that surround her as the brainworm translates what is truly only electrons, data transferred from computer to computer, to sensation in her brain. She glimpses a familiar shape, a hint of flowing robes that move against the current of the datastream that enfolds them, and tries to follow. But the crowding icons—balled advertising, jostling users, once a virtual pickpocket, groping for useful programs in other people’s toolkits—block her way and she loses the robed icon at the main exchange node, where the data flows down from the outer nets like a waterfall of lights.

  She turns back toward the center of the maze that is the BBS, following the shape of the underlying structural spiral rather than the illusion of shops and storefronts and tented stalls—unfamiliar shop-icons, old names and symbols blanked or greyed or simply missing—heading for a node where someone will surely know where Trouble has gone. Trouble will have left a message there, if she left anything at all. This is free space, unprotected, and the air stinks of it, the salt sea-smell the brainworm gives to undefended bits of data. At any other time, she would stop to taste, to savor, to see what ne
ws is drifting in the wind—and maybe especially tonight she should stop, listen to the whispers and shouts and read the posts that fill the message walls, but Trouble is gone, and that matters more than any law. She can hear voices, snatches of conversations, names repeated, not her own, but familiar nonetheless: the netgods have spoken, the oldsters who built and managed the first nets, and they’ve thrown their weight behind Evans-Tindale. Cerise sneers at that, and doesn’t care that the brainworm broadcasts that emotion. The old netwalkers are out of touch with the new conditions, with the better, faster, and wider-band dollie-slots and especially with the brainworm; of course they’d support this law as a way to keep their own power supreme.

  In a blank mirror that was once the center of a pair of swinging doors, she sees herself reflected, her icon blonde-girl-in-blue-dress-and-pinnie, the child she never should have been, and then the mirror empties, and she puts her hand through it just like Alice and walks, her feet barely touching the illusion of a floor, into a temporary space.

  Inside the mirror is a cave of ice, not the warm wood saloon she had expected, lined in IC(E) to keep out the intruders; the cowboys and the piano player are all missing, vanished into chill white silence, and a personal icon stands in the center where the bar had been, a woman-shape dressed like a dance-hall girl in snow-white velvet and silver fringe and silver-spangled stockings, the cloth drawn back into a bustle, cut down at the bodice to reveal breasts like hills of snow. Cerise feels the chill of the IC(E) on her skin, tingling down her spine like danger; she smells a tracker program, sharp as burned cloves, can almost taste the candy-sweet data that lies like shards of glass below the illusory floor. Miss Kitty deals in that data, stolen, borrowed, invented, even imagined, and in the commerce of messages passed unread.