Ian knew that Fiero’s private company would have its own IT resources, separate from CIOS. A frontal assault on mainframes or hard drives was possible, but time-consuming. Better to attack on the periphery. Fortunately, that kind of attack was easier than ever these days, thanks to the “Internet of Things,” the machine-to-machine communication that facilitated more and more of modern life. Ten billion devices were connected now. By 2020, that number would rise to fifty billion.
Ian began by downloading the latest hacker list of known back doors to the top ten business software apps. Through one of those back doors, he gained access into an older version of Microsoft Outlook on the tablet of Anthony Fiero’s personal assistant. From that infection vector, Ian was able to make the leap into a variety of other Microsoft software programs, which then spread into the assistant’s laptop, then other devices and apps connecting the assistant’s laptop to Fiero’s laptop. Then the infection really spread.
Once inside Fiero’s laptop, Ian’s malware infected Fiero’s tablet, iPod, and even his Xbox One game system. The Xbox One Kinect feature provided Ian with voice and video images inside of Fiero’s home, which activated whenever the motion-activated Kinect system was triggered by his presence, recording everything he did or said in front of the gaming machine.
Automated software and data synching between machines and cell phone then spread the virus to Fiero’s phone, a treasure trove of data unto itself. A side benefit was that the phone infection spread to Fiero’s wireless Bluetooth connection, which, in turn, gave Ian access to Fiero’s car and its “smart” radio and GPS apps. Now Ian could listen in on or record any conversation Fiero had in his car through the radio and speakers, and geo-locate him even if Fiero’s phone wasn’t there.
The other significant penetration Ian achieved through Fiero’s phone was to invade the “smart” thermostat system Fiero deployed to remotely control his utilities when he was away from his home. Unfortunately for Fiero, the apps that controlled the smart thermostat also sent wireless data to the utility company, which in turn had access to Fiero’s bank accounts for automatic bill pay. Once Ian was inside Fiero’s bank account, he downloaded copies of all his financial transactions and acquired the personal data needed to find and penetrate other bank accounts, domestic and offshore, including those of his wife, who was also linked to those accounts. Those financial holdings were so vast, however, that Ian had to bring in a trusted consultant, a former Europol bank examiner who specialized in tracking down illicit Russian mafia drug money around the globe.
Ian also created several botnets exploiting the viral pathways now infecting almost all of the Fieros’ computer and computer-controlled devices, including Anthony’s newly installed “robo-toilet.” The botnets all went to work copying, downloading, or recording every sliver of data they could get their digital hands on. Like the NSA and its massive data-collection capabilities, however, Ian was overwhelmed with the sheer volume of data pouring in. It would take several days, maybe even weeks, for them to sort through it all and connect the dots. Myers had set about the analysis task immediately, while Ian kept expanding the data-collection nets. She was happy to let him take the lead on this operation. She had always been smart enough to delegate the hardest work to the most talented members of her team.
For all of their success, Ian thought the best news was that they had managed to slip their noses under the tent without Bath even knowing they were there. In a long string of personal achievements in the digital world, Ian couldn’t think of anything to top that.
46
They rode until late evening, arriving at a wadi to rest and feed the camels. The sun had long before dropped below the jagged horizon of the Adrar miles behind them. The flat sands shimmered like a silvery sea beneath a high, blazing moon.
Balla stood watch in the distance over the camp while Moctar prayed the last prayer of the day. The camels stretched their long necks, grunting as they munched on the salty green leaves of the tamarisk trees. There was no water, but the camels had drunk their fill before they’d arrived at the Adrar. The Nigerien camel driver was baking bread in a shallow desert oven he’d dug with a trenching tool. That left Pearce, Mossa, Early, and Cella to sit and relax around the small campfire where the teapot was heating up. It was still near eighty degrees Fahrenheit, but that was thirty degrees less than the hottest part of the day, so the evening felt almost cool.