Читаем Blue Warrior полностью

Al Rus stepped back over to his truck and dug around under the seat. He pulled out a radio and called his second-in-command, informing him it was now safe for the plane on the far horizon to land on the road ahead. In an hour, the cocaine would be loaded onto Algerian trucks and shipped north, making its way to the heart of the land of the Crusaders. If depraved Europeans wanted to pay good money for the poison he sold to them, so much the better. That money was used to wage jihad and help the poor and widows, and so it was blessed.

34

CIOS Corporate Offices

Rockville, Maryland

7 May

Jasmine Bath’s paranoia knew no bounds. She was determined to live long enough to enjoy the wealth she had accumulated over the last few years, and even more determined to enjoy a long and happy retirement, which, according to her schedule, would begin in precisely seven months, given current revenue streams.

It was probably time to get out by then anyway. Computer security was about to make a great leap forward with DARPA’s PROCEED initiative, exploring methods that would allow data computation of encrypted data without first decrypting it, even in the cloud, making it virtually impossible for hackers like her to write malware code to break it. Worse, security operations themselves would become automated, just like future combat. Advanced machine learning algorithms would soon become the security gatekeepers, not only preventing but even anticipating human-designed attacks.

Bath’s first line of defense was to remain hidden from the NSA. The easiest trick was to leak NSA training documents to various media outlets under the names of known whistle-blowers. That kept the NSA in a constant state of paranoia and self-limiting defenses as media and congressional inquiries escalated. The NSA simply didn’t have time to look for someone like Jasmine, especially not even knowing she was there to begin with.

The most effective tool in Bath’s defense arsenal was the alliances she created with other unwitting players in the field. Posing as an anonymous member of various hacktivist groups, Jasmine would empower them with resources that both distracted the NSA and created new targets of national interest. In the last few years, the anarchist hacker group ALGO.RYTHM had made frequent headlines by breaking into DoD computer bases, stealing embarrassing State Department cables, and disabling the LANs of the big national laboratories, then publishing their exploits. Of course, ALGO.RYTHM hackers managed to complete these missions only by following the guided maps through agency software defenses fed to them by Jasmine Bath. If ALGO.RYTHM hackers got sloppy with their opsec, CIOS would dispatch a specialized field operative to pinch off the potential leak, usually with a small-caliber bullet to the brain.

The closest anyone had ever come to identifying Jasmine occurred just weeks after the Utah Data Center at Bluffdale had gone online. She still wasn’t quite sure how he’d picked up her digital scent, but he did, and his abilities were far superior to those of anyone else she’d ever encountered at the Q Group, the NSA’s security and counterintelligence directorate. She finally evaded him by destroying his career, falsely linking him to the most recent Utah Data Center catastrophe. It was one of her best ops.

Jasmine knew the security protocols at the UDC because she’d designed half of them while in the NSA’s employ. The UDC was NSA’s vast, multibillion-dollar server farm, and the crown jewel in its burgeoning intelligence-gathering empire. It was deemed impossible to infect the computers there with any kind of virus thanks to the external firewalls, which suffered tens of thousands of automated attempted hacks daily.

But the internal security procedures were equally important. Those protocols kept any devices from being smuggled in that might carry infectious malware. The NSA knew that it was a USB thumb drive infected with the Stuxnet virus smuggled into the Natanz nuclear facility that wiped out over a thousand Iranian centrifuges. The NSA took every precaution to avoid a similar attack on the UDC.

Every precaution but one, Jasmine determined.

Перейти на страницу:

Похожие книги

Агент на месте
Агент на месте

Вернувшись на свою первую миссию в ЦРУ, придворный Джентри получает то, что кажется простым контрактом: группа эмигрантов в Париже нанимает его похитить любовницу сирийского диктатора Ахмеда Аззама, чтобы получить информацию, которая могла бы дестабилизировать режим Аззама. Суд передает Бьянку Медину повстанцам, но на этом его работа не заканчивается. Вскоре она обнаруживает, что родила сына, единственного наследника правления Аззама — и серьезную угрозу для могущественной жены сирийского президента. Теперь, чтобы заручиться сотрудничеством Бьянки, Суд должен вывезти ее сына из Сирии живым. Пока часы в жизни Бьянки тикают, он скрывается в зоне свободной торговли на Ближнем Востоке — и оказывается в нужном месте в нужное время, чтобы сделать попытку положить конец одной из самых жестоких диктатур на земле…

Марк Грени

Триллер