“Huh?” Roger said. The Asymetric Soldier group used a network separate from the main base network. They used the same physical systems for accessing SIPARNET and the Internet, but their internal working server was of a higher classification than the standard base system, so it was internally sealed off from most of the base systems.
“We’re getting more hits,” Traci said. “Something’s in the internal base system and trying to get through to ours. Damn,” she added, clicking a pop-up. “Add that it nearly made it. I just cut us off from the main base system.”
“We can’t upload this to the base computers, now,” Tom pointed out. “Even if it worked.”
“The hell we can’t,” Roger said. “The computer controlling the IBot program is up in the antenna farm. All we have to do is run this program up and load it to it.”
“Roger, that’s the top of the damned
“Pull the physical connections,” Roger said, sliding a USB memory card into the side of the laptop he’d moved the Megiddo program to. “I’ll give you two guesses where that attack is coming from, and only one counts.”
Shane blinked as the lights in the room went off then back on, then off, leaving the room lit only by red safety lights. His monitor flickered as well, changing views without command several times then went off. He looked over to the general just as a heavyset Air Force officer burst through the doors to the command center and stumbled down to the J-2 desk.
Most of the officers and NCOs in the room were muttering or questioning what had happened but Shane leaned back in his chair to watch the general. The major knew that there wasn’t anything in his area of control, or expertise, to be done about whatever was happening. All he could do was wait a few moments to see if things calmed down. And he wanted to watch what Riggs was going to do.
The J-2 listened to the heavyset lieutenant and then swore and got up and headed for the general. Other senior officers were closing in around the commander but the J-2, despite being a shrimp and outranked by most of them, shoved his way through and leaned over to whisper in Riggs’s ear. Given that a colonel was whispering in the other ear at the same time, Riggs seemed to be taking both conversations in.
Riggs nodded for a moment, then waved the J-2 and the colonel away and stood up.
“Listen up,” the general said. “We just got hammered, electronically, by the enemy. They got past most of our electronic defenses. They’ve got trojans and worms in the system which is why everything is shut down: what wasn’t corrupted by the attack has been taken off-line to prevent them getting into it. Data Security has most of it isolated and stopped the attack from the outside. Which is good: given that these things are ahead of us technologically and they are, after all, flying computers, the fact that we could stop them at all is surprising.
“Lasing. Your remotes have been physically pulled to prevent the machines from taking over the lasers. Data Security did that first thing. Get up there, physically, and take control of the lasers. I’ll set up runners to manage control. Colonel Guthrie! Your troops and those lasers are all that stands between this mountain and those probes, if they get going again. Get out there with your unit. Tell them: Hold The Line. J-3. I want paper maps and markers up on the walls in two minutes. We’re going to have to do this the old-fashioned way. Everyone else, we are shut down electronically. Get manual commo in place. Runners. Field phones. I don’t care if you’re using two tin cans and a string. Try to coordinate through the commo officer but
Dick was pretty sure he had gotten ahead of the tide.
At the first sign that a worm or trojan had gotten into the base system, he had set up a program he’d named “Babel Blaster” that shut down every link in the network. Dealing with the various worms and trojans like the MS Blaster had taught him that. As soon as the first trigger on the internal system went off, Blaster went on and began operating automatically. While Babel Blaster was running, he went into the server room and
Fortunately, the worms hadn’t managed to penetrate his master controls. Those were on a 256 bit encryption. The weakness of encryption was usually at the password level. If you used a high numeric encryption scheme and then used a simple four alphanumeric password, say your birth year and month, the attacker only had to break the password. And there were only so many children’s names and so many birthdays to go around.