very public figure. People follow him. They jump into his stocks when he buys and run away when he sells. We donât allow that. We keep our trading secret. Weâve got a dedicated dark pool that hides our trades, and we spread them over a variety of market makers. And we control our overall investment. I could have a half a trillion dollars in assets under management if I wanted. Iâve got the clients lined up outside my door. But then weâd be big enough to tip the market. People would see our trades move the prices. Weâd have information leakage, and weâd lose our advantage. I donât need that. Thatâs why weâve kept the heart of Spike a secret ever since I invented it.â
âAnd you think Preston stole it from you.â
Some anger finally slips past the ice wall. âHe did steal it. Heâs taken the knowledge Iâve spent fifty years building, and is now getting rich from it.â
âI thought you said he was in data mining. Not stock picking.â
âItâs all numbers,â Sloan says. âThe heart of Eliâs business is a piece of software called Cutter. It analyzes the data for him. But the engine that drives Cutter is the same one that drives Spike. The one I built. It can be used on any set of facts, provided you can reduce those facts to computer input. Phone calls, credit-card purchases, social-media postsâmy algorithm can find the patterns hidden in all of it. Everything OmniVore does, itâs doing on the back of my work. Thatâs the genius of my discovery.â
âAgain, not to boast or anything.â
Sloan waves that off. He doesnât have time for false modesty.
âStill doesnât explain why youâve waited two years to go after him,â I say.
âIf I knew heâd stolen from me, I certainly would have done something about it sooner. I thought my security was adequate. There are no records of any breach. The software behind Spike is located inside secure computers that would have recorded any attempt to hack them. Access is strictly controlled. Every email is monitored. My analysts walk through a scanner and a strong magnetic field on their way into and out of the office, which means I would know if they carried any thumb drives or disks from the office, or they would be wiped clean if I didnât. Then, about six months ago, I received information from one of Eliâs former employees. Someone upset with his own pay package, of course. He told me that heâd heard Eli bragging to a client that his computer models were better than Spikeâthat heâd improved them.â
âThat doesnât prove he stole them from you.â
âNo. But Eliâs security isnât as thorough as mine. This informant showed me several blocks of the source code Eli uses for Cutter. With a few changes here and there, itâs the same as Spike. No question.â
He takes a manila folder and places it on the table. He opens it and shows two different printouts. One is marked SPIKE and the other is marked CUTTER . They look identical to me, but only because I canât make sense of either of them. Sloan seems pretty convinced, however.
âSo if he didnât download it from you, how was he supposed to steal it? Did he break your security system? Pay off one of your other employees?â
Sloan shakes his head. âNo. Again, I would have noticed any breach. I have redundant systems and loyal, well-paid people. He might have been able to corrupt one or two, but not all of them. It would have shown up.â
âThen how did he do it?â
âHe took my ideas out of here the old-fashioned wayâin his brain.â
That staggers me for a moment. âIs that even possible?â
Sloan radiates ironclad certainty. Thereâs no doubt in him. âHeâs smart enough, yes. He read the underlying computer code of Spike, line by line, until he found