Читаем Point of Contact полностью

If he had to guess, Paul thought it looked like Jack had been in a fight. But Jack was a financial analyst, not a street brawler. If he’d been in a fight, why wouldn’t he just tell him that?

Paul stood chewing his cereal in the foyer, thinking. He wiped away another drop of milk dribbling down his chin, running through the possibilities.

Booze? Drugs? Brain chemistry?

Maybe.

Or maybe Jack wasn’t the man Paul thought he was, after all.

* * *

Paul was nervous. He wanted a drink. Needed one, in fact. But he needed his mind clear more.

After thinking about the Dalfan security protocols all day, Paul finally figured out a way to work around them. Like most brilliant solutions to complex problems, it was frighteningly simple. It was also kind of crazy.

His plan had only a few moving parts: Download the CIA program onto his laptop, then copy the CIA program from his laptop to a Dalfan encrypted USB. Once it was infected, Paul would then install the Dalfan USB into a Dalfan desktop and, thirty seconds later, his mission would be completed.

Tonight was the easy piece. All he had to do was download the CIA program from Rhodes’s USB drive to his laptop. Easy.

Unless it didn’t work.

Relax, he told himself. One step at a time.

He double-checked the lock on his bedroom door to make sure Jack wouldn’t suddenly walk in. No point in getting him tangled up in this mess.

He then sat on his bed and opened his laptop in order to load Rhodes’s CIA drive onto his computer. But what did Rhodes say? It was an automatically executing file. But it would execute only after he used his thumbprint to unlock it and typed in his verification code. Once he did those two things, the program would automatically launch.

That was a problem. Paul didn’t want the program to launch automatically — otherwise, he might not be able to copy it.

But Paul figured out a crack in the system. He inserted the CIA drive into the USB port, then pressed his thumb against the thumb pad. The drive recognized Paul’s print. It unlocked, as expected, flashing red, then blue.

The laptop screen then flashed a dialogue box, asking Paul for his security code, which would initiate the program launch. Paul ignored it. Instead, he opened up the USB drive icon on his laptop and examined its contents.

Paul saw a single unnamed file folder. The file didn’t appear to be doing anything. So far, so good.

He swallowed hard, then dragged the unnamed CIA file onto his laptop. A copy progress bar opened up. It was going to take about two minutes to transfer. Paul drummed his fingers nervously, waiting for the transfer to complete…

… waiting for an explosion.

It never came.

The progress bar completed, and the CIA file was successfully copied to his machine’s desktop. He ejected the CIA drive and the passcode dialogue box disappeared.

Paul stared at the copied file on his screen. It didn’t seem to be doing anything.

What was really interesting to Paul was that his MilSpec-grade antivirus software wasn’t picking up anything. In theory, the CIA program hadn’t launched inside his computer because he hadn’t entered his passcode.

Paul’s heart raced as panic set in. How could he enter his passcode and launch it on the Dalfan machine without the CIA drive inserted? Maybe the CIA program wouldn’t run on the Dalfan· machine without it.

A second later, a new passcode dialogue box generated by the copied CIA file opened. The copied CIA file was now ready to launch. That meant a copy would run from the Dalfan machine without the CIA drive inserted. Paul sighed, relieved.

Tomorrow he would copy the CIA file from his laptop to an encrypted Dalfan USB drive, then install the infected drive onto a Dalfan desktop. The copied CIA program would ask him again for his verification code, and once he entered it, the program would launch and his mission would be complete.

At least, that was the plan.

There was still one problem. He needed to acquire an encrypted Dalfan USB.

But how?

<p>25</p>

The next morning, Jack did two of his three S’s in quick succession and brushed his teeth. He pulled on a pair of chinos and a blue oxford shirt with a pair of his favorite urban hiking boots — super-comfortable and just dressy enough for the business-casual atmosphere at Dalfan. They were also waterproof. There was the strong possibility of thundershowers again today.

He’d promised Paul he’d be down in twenty minutes, and his watch told him it had already been twenty-two. But Jack needed to do one more thing before heading out the door.

Перейти на страницу:

Все книги серии Jack Ryan Jr.

Point of Contact
Point of Contact

In the latest electrifying adventure in Tom Clancy's #1 New York Times bestselling series, Jack Ryan, Jr., learns that sometimes the deadliest secret may be standing right next to you.Former U.S. Senator Weston Rhodes is a defense contractor with an urgent problem. His company needs someone to look over the books of Dalfan Technologies, a Singapore company — quickly. He turns to his old friend Gerry Hendley for help. Hendley Associates is one of the best financial analysis firms in the country and the cover for The Campus, a top-secret American intelligence agency. Rhodes asks for two specific analysts, Jack Ryan Jr., and Paul Brown, a mild-mannered forensic accountant.Both Ryan and Brown initially resist, for different reasons. On the long flight over, Ryan worries he's being sidelined from the next Campus operation in America's war on terror. Brown — who was never very good with people — only worries about the numbers, and finding a good cup of tea.Brown has no idea Jack works for The Campus but the awkward accountant is hiding secrets of his own. Rhodes has tasked him with uploading a cyberwarfare program into the highly secure Dalfan Technologies mainframe on behalf of the CIA.On the verge of mission success, Brown discovers a game within the game, and the people who now want to kill him are as deadly as the cyclone bearing down on the island nation. Together Ryan and Brown race to escape both the murderous storm and a team of trained assassins in order to prevent a global catastrophe, even at the cost of their own lives.

Майк Маден , Том Клэнси

Триллер

Похожие книги

Безымянные
Безымянные

«Безымянные» – мистический триллер, захватывающая философская головоломка.Восемь героев оказываются за чертой жизни. Атмосфера таинственного загробного мира заставляет задаться вопросами: что действительно для нас важно и стоит усилий? Чего мы на самом деле боимся? Чем может пожертвовать человек, чтобы спастись от неизбежного? Лишь сквозь призму смерти можно в полной мере осознать ценность жизни. Миллионы людей ищут разгадку и мечтают понять, что же «там» – за чертой. Но как они поведут себя, когда в действительности окажутся «по ту сторону»?«Роман "Безымянные" – интересная смесь философии, стилистики Стругацких и Пелевина. Смелая попытка автора заглянуть в вечное "нигде". Если вы устали от заезженных до смерти сюжетов – загляните в ближайший книжный за "Безымянными"». – Генри Сирил, автор триллера «Сценарий».

Игорь Дмитриевич Озёрский

Триллер