18Tek sipped coffee as he walked around the eerily quiet office. He missed the background noise of conversation and keystrokes as he inventoried the floor to determine if anything was missing or out of place. Everything seemed in order. A large room along an interior wall held an array of servers that comprised the control center of the bank’s network. An electric hum was interspersed with random drumming of cool air being pumped through ceiling vents. In addition to maintaining information the bank collected, the servers operated all the systems necessary to support its activities. A six digit code was required to get through the room’s metal door after which a personal passcode was necessary to access to the systems, each keystroke, access and activity being recorded for historical and

