Читаем Blue Warrior полностью

Jasmine Bath was the best in the business. Period. Her cyberdefenses were impeccable, but her ability to counterattack was fearsome indeed. On the other hand, Senator Fiero and her husband would be more vulnerable and less able to retaliate in the digital realm, so they were the better targets to pursue. Undoubtedly, there would be some sort of exploitable link between Bath and the Fieros. Ian knew if he could break through the Fieros’ defenses, he might have a good shot at breaching Bath’s.

The problem with that strategy, though, was that Bath and CIOS would undoubtedly be keeping a watchful eye on the Fieros. Ian had to find a way to disable CIOS without being detected so that he could exploit any breaches in the Fiero firewalls. But how?

Ian wasn’t confident he had the resources to deal with Bath. It reminded him of an exam he was once given in computational semiotics at Oxford. The tutor came into the lecture hall and demanded that each student come up with a question too difficult to answer — and then answer it. The entire room groaned with frustration and anger. It took Ian a few moments to realize the purpose of the exercise. People prefer the path of least resistance. People tend to work on problems they already know they can solve, thereby limiting intellectual growth. But avoiding problems that seemingly can’t be solved also limits intellectual growth because it means that people become increasingly unaware of what it is they don’t know. Science, in the end, is about knowing, and the beginning of “knowing” is finding out what you don’t know. Only by becoming aware of the impossibility of a problem — insufficient knowledge or skill — would possibilities for solutions begin to suggest themselves. And that’s when the first solution to Ian’s insoluble problem suggested itself.

Ian knew he wasn’t smart enough to overcome Bath, so he needed to draw on others for help. The international hacktivist community had been under assault by the national security agencies of Western governments throughout the world in the last two years. Whether through DDOS attacks, counterhacking, or just old-fashioned spycraft — honey traps, bribes, break-ins — agencies like the NSA and Britain’s GCHQ had crushed the backbone of many autonomous hacker groups. The surviving members were both afraid and eager for payback. Ian knew how to tap into their collective talent and rage.

Ian reached out to an old contact in the GCHQ who provided him with the necessary info. Carefully hidden behind a series of hijacked computers, Ian faked a new Edward Snowden leak, distributing the explosive “secret” that CIOS corporation and Bath had been the primary architects of the most recent antihacktivist campaign, along with a few IP addresses. This tiny nick put enough blood in the water to draw in the hacktivist sharks, and within hours a digital feeding frenzy had begun.

Within twenty-four hours of Ian’s launch, CIOS was fighting for its digital life, with Jasmine Bath leading the defenses. If Ian couldn’t disable CIOS and Bath, he could at least distract them long enough so that he could accomplish his second strategic objective — going after the Fieros.

Ian attacked the Fieros on two fronts with Myers’s help. First, he deployed one of Pearce Systems’ most reliable human assets, a redheaded Kiwi named Fiona York. As a former JTRIG operative specializing in physical operations, she was perfectly suited for what he had in mind.

York and an assistant picked up sixteen specially fitted miniature air and ground vehicles from Rao’s lab. Some of the MAVs deployed the same high-speed miniature cameras swallowed in pill form to photograph colons.

The MGVs were fitted with gecko-inspired microfiber pads that allowed them to climb walls or other vertical objects. Their primary objective was building and car windows. They were equipped with low-powered infrared beams that could “hear” the vibrations on glass caused by people speaking on the other side of them — a surveillance technique invented in the 1940s by the Russian Leon Theremin, inventor of the Theremin music synthesizer.

York deployed the miniatures with the help of a SmartBird drone, dropping them near the Fieros’ personal residences and vehicles in California and D.C.

But Ian’s main attack was cyber. It was only logical that CIOS would have put better security on the senator since she was their primary client and her home was geographically proximate to CIOS headquarters. Ian further surmised that Anthony Fiero didn’t want his vast financial empire exposed to Bath’s probing queries, which was yet another reason Ian decided to focus his efforts on him. That focus paid off quickly.

Перейти на страницу:

Похожие книги

Агент на месте
Агент на месте

Вернувшись на свою первую миссию в ЦРУ, придворный Джентри получает то, что кажется простым контрактом: группа эмигрантов в Париже нанимает его похитить любовницу сирийского диктатора Ахмеда Аззама, чтобы получить информацию, которая могла бы дестабилизировать режим Аззама. Суд передает Бьянку Медину повстанцам, но на этом его работа не заканчивается. Вскоре она обнаруживает, что родила сына, единственного наследника правления Аззама — и серьезную угрозу для могущественной жены сирийского президента. Теперь, чтобы заручиться сотрудничеством Бьянки, Суд должен вывезти ее сына из Сирии живым. Пока часы в жизни Бьянки тикают, он скрывается в зоне свободной торговли на Ближнем Востоке — и оказывается в нужном месте в нужное время, чтобы сделать попытку положить конец одной из самых жестоких диктатур на земле…

Марк Грени

Триллер