Threat Vector jrj-4

Home > Literature > Threat Vector jrj-4 > Page 25
Threat Vector jrj-4 Page 25

by Tom Clancy


  “How is the pizza?” the man asked with a smile.

  “It’s okay. Look, shouldn’t we go somewhere private?”

  The young man in the thick glasses just shook his head with a little smile. He bit into his calzone and winced at the hot cheese. He gulped Pepsi and then said, “No, no. This is fine.”

  Todd rubbed his fingers through his hair. “This shop has security cameras. Just about every restaurant does. What if someone goes back and—”

  “The camera is not working at the moment,” the Chinese spy said with a smile. He started to take another bite of his lunch, but then he stopped. “Todd, I am beginning to wonder if you are looking for a bad excuse to avoid helping us.”

  “No. It’s okay. I’m just… worried.”

  The younger man took another bite, then another sip from his can. He shook his head and waved a hand dismissively. “Nothing to worry about. Nothing at all. We would like to ask a favor of you. It is very easy. One favor, and that’s it.”

  Todd had spent the past month thinking about little else other than this “favor.”

  “What is it?”

  With his continued nonchalance, the Chinese spy said, “You are planning on making a delivery to one of your customers in the morning.”

  Fuck, thought Wicks. He was due at Bolling Air Force Base at eight a.m. to drop off a pair of motherboards at DIA. Panic shot through his heart. He would be spying for the Chinese. He would be caught. He would lose everything.

  But he had no alternative.

  Todd lowered his head halfway to the table. He wanted to cry.

  The Chinese man said, “Hendley Associates. In Maryland.”

  Todd’s head came back up quickly.

  “Hendley?”

  “You do have an appointment with them?”

  Wicks did not even wonder how it was the Chinese knew about his dealings with this particular customer. He was elated that he was being asked to do something involving corporate espionage as opposed to something involving the U.S. government. “Right. Eleven a.m. Dropping off a new high-speed drive from a German manufacturer.”

  The young Chinese man who had not given his name slid the shopping bag under the table.

  “What is that?” Todd asked.

  “It is your product. The drive. It is exactly the same product you would deliver. We want you to make that delivery but substitute this drive. Do not worry, it is identical.”

  Wicks shook his head. “Their IT director is kind of a security freak. He is going to run all sorts of diagnostics on your drive.” Todd paused, unsure if he should say out loud what was obvious. After a moment he blurted out, “He is going to find whatever you put on there.”

  “I did not say we put anything on there.”

  “No. You did not. But I’m sure you did. I mean… why else would we be doing this?”

  “There is nothing on there that any IT director can find.”

  “You don’t know this guy, or his company. They are top-notch.”

  The Chinese man smiled as he bit into his calzone. “I know Gavin Biery, and I know Hendley Associates.”

  Wicks just looked at him for a long moment. Behind them, a group of high school kids entered, talking loudly to one another; a boy put another in a headlock as they stepped up to the counter to order, and the rest of the group laughed.

  And Todd Wicks sat in the middle of this normalcy, knowing that his life was not normal at all.

  An idea popped into his head. “Let me take the unit and run my own diagnostics on it. If I can’t find anything on it, then I’ll deliver it to Gavin.”

  The Chinese man smiled yet again. He was all smiles. “Todd. We are not entering into a negotiation. You will do as you are told, and you will do it when you are told to do it. The product is clean. There is nothing for you to worry about.”

  Todd took a bite of his pizza, but he let the food sit in his mouth. He wondered when he would feel like eating again. He realized that he had to trust the Chinese.

  “I do this and I am done?”

  “You do this and you are done.”

  “Okay,” he said, and then he reached down and brought the shopping bag closer to him.

  “Excellent. Now just relax. You have nothing to worry about at all. This is just business. We do this sort of thing all the time.”

  Todd picked up the bag and stood up. “Just this once.”

  “I promise.”

  Wicks left the restaurant without another word.

  THIRTY

  Adam Yao had been working all day at his “white side” job as president, director, and sole employee of SinoShield, his one-man intellectual property rights investigation firm. As much as duty called with the CIA, it was also his job to maintain the front company that kept him over here in Hong Kong, kept him in touch with members of the local police and government, and gave him a ready cover for his CIA surveillance activities.

  But it was nine p.m. now and, with the twelve-hour difference between Langley and Hong Kong, Adam decided to check in on the “black side” of his duties via his secure e-mail link.

  He had not wanted to send the message yesterday afternoon; he knew somewhere in the Asia sector of CIA’s National Clandestine Service there existed a leak.

  But he had to send the message.

  Yesterday the entire U.S. drone fleet, military, intelligence, Homeland Security, the entire enchilada, had been shut down full stop, because someone had hacked into the network or the satellite signals or both, which was the prevailing opinion in the NSA’s prelim tech reports about the incident Adam had read.

  As soon as he heard about the UAV incident in Afghanistan, Adam knew he would have to come out of the dark and let Langley know that, over here in Hong Kong, he was tailing Zha Shu Hai, a Chinese drone hacker and American fugitive.

  No, he couldn’t very well sit on that information.

  Yao knew his cable to Langley was going to be a tough sell. His supposition, that a young Chinese hacker who had stolen UAV software code two years earlier might somehow be involved in this week’s computer attack and hijacking of several American drones, was not based on any hard evidence.

  On the contrary, there seemed to be some evidence that Zha Shu Hai was not working on anything as high-level as drone hijackings. Yao did not mention the Triads in his cable, but hacking drones and killing American soldiers in Afghanistan hardly seemed like the modus operandi of the 14K. No, hacking banking software or other forms of computer embezzlement seemed like it would be the more likely aim of Zha if he was, in fact, employed by 14K.

  But Adam needed to be sure, and he had asked only for some additional resources to help him dig deeper into whatever was going on above the Mong Kok Computer Centre.

  But Langley had declined his request, explaining that all assets in Asia were tied up at the moment and assets at Langley were similarly otherwise engaged.

  The response Adam received had been reasonable, he had to admit, even if it pissed him off. The reply from Langley had explained simply that, in the unlikely case that China was involved with the UAV incidents, it would come from inside China. All intelligence out of China indicated that offensive computer network operations of a military nature on the scale of a UAV attack would originate from the PLA’s General Staff Department, Fourth Department. These were China’s elite cyberwarriors.

  A well-coordinated attack on the United States would originate with them, not with a hacker or group of hackers in Hong Kong.

  The cable went on to explain to Adam Yao, in what he saw as a patronizing tone, that Zha working in Hong Kong in an office building was not a threat to the Department of Defense’s secure computer network.

  After all, Hong Kong was not China.

  “No shit,” Adam responded to the message on his monitor. He knew the situation he described in his cable was highly unusual, but his evidence, his on-the-ground intelligence collection, though circumstantial, surely warranted a closer look.

  But his superiors, the CIA�
��s analysts, did not agree.

  So Adam did not get his assets, but that was not the worst news in the cable from Langley. His superiors in the National Clandestine Service indicated that they would pass on the helpful information about the location of Zha Shu Hai to the U.S. Marshals Service.

  That meant, Adam was certain, that within a few days a couple of four-doors would show up in Mong Kok and a team of deputy marshals would climb out. They would be identified as a threat by the Triads, the Triads would get FastByte22 out of town, and that would be the last Yao saw of Zha.

  Adam logged off the secure e-mail system and leaned back in his chair. “Shit!” he shouted to the small empty room.

  * * *

  Zha Shu Hai had never been in Center’s office before. Few of the employees of the Ghost Ship, even the important ones like Zha, had personally been inside the surprisingly cramped and spartan work area of their leader.

  Zha stood with his hands at his sides and his knees locked, an affected military stance because Center had not asked him to sit down. The rock-hard gel in his spiked hair shone and sparkled in the light from the flat-screen displays on Center’s desk. Center himself was in his chair in front of his monitors, his ever-present VOIP earpiece in his ear and his rumpled demeanor on display here just as it always was on the operations floor.

  He said, “Three American drones were downed before the Americans ceased all flights.”

  Zha just stood there at semi-attention. Was that a question?

  Center cleared up the confusion. “Why just three?”

  “They were quick to land their other UAVs. We managed to break into one more in Afghanistan within minutes of the crash of the first one, but it had landed before our pilot achieved input control and the weapons had been offloaded. As soon as I realized that, I took the Global Hawk off the coast of Africa. That is a very valuable and technologically advanced machine. It will show the Americans that the capacity is there for great harm to them.

  “The Global Hawk crashed into the ocean.” Center said it in a way that Zha could not read.

  “Yes. It is a Northrop Grumman product, and my software was optimized for the Reaper and Predator platforms from General Atomics. I had hoped that the pilot could have crashed it into a ship, but he lost control soon after I passed responsibility to him.

  “The third vehicle I took was on the American mainland, for the obvious effect of causing them great concern.”

  Zha was proud of himself for all three hacks. He wanted more appreciation from Center than he was getting.

  “We should have had more pilots,” Center said.

  “Sir. I felt it necessary to be personally involved with each hijack. I could have captured the signal and given control to different pilots, but there were many technical nuances with each operation. The pilot was not trained to maintain the signal.”

  Tong looked over a report Zha had sent him with details of each operation. He looked like he was going to comment further, but instead he laid the paper down.

  “I am satisfied.”

  Zha breathed a long inward sigh. He knew that was Center’s highest compliment.

  The older man then said, “I’d hoped for five, or even more, but the three UAVs you took were well chosen for maximum impact.”

  “Thank you, Center.”

  “And the Trojan in their network?”

  “It remains. I have provided them with the false trail, they will find this within the week, but the actual Trojan is ready to go to war again as soon as they fly their drones.”

  “The false trail should focus their attention on Iran?”

  “Yes, Center.”

  “Good. The PLA has hopes the Americans will attack Iran over this. That is their ultimate goal. I, however, think they are underestimating the abilities of the NSA to recognize the misdirection. Still, every day Washington’s understanding of China’s involvement in Earth Shadow remains unclear is another day closer our forces are to achieving their goals.”

  “Yes, Center.”

  “Very well,” said Center, and Zha bowed, then turned to leave the office.

  “There is one other item.”

  The young man snapped back to attention, facing Dr. Tong. “Sir?”

  The older man picked another sheet of paper up off his desk and looked it over for a moment. “It seems, Zha, that you have been under surveillance by the Central Intelligence Agency. There is a spy from their organization here in Hong Kong, and he is watching you. No, don’t worry. You aren’t in trouble. Even with your disguise we knew it was possible that someday you would be recognized. He has your name, and he has your computer handle. Do not use the name FastByte Twenty-two again.”

  Zha said, “Yes, Center.”

  “But the local CIA man does not seem to have any other concrete details about our operation. CIA leadership has told him you are not a concern of theirs at the moment, although they may notify police to try and bring you back to America.”

  The young man with the spiked black hair did not speak now.

  After a moment Center waved a hand in the air. “This is something I will bring up with our hosts. They should be taking better care of us. They are making a lot of money from our banking operations, after all.”

  “Yes, Center.”

  “You should limit your activities around town, and I will insist your guard is doubled.”

  Now Zha asked, “What will we do about the Americans?”

  It was clear Center had already given this consideration. “For now? Nothing other than warn Fourteen-K to be on the lookout. This is a critical time in Operation Earth Shadow; we can’t do anything overly”—he searched for the word—“kinetic to this operative without receiving too much scrutiny from the Americans.”

  Zha nodded.

  “We will wait for now. Later, when there is no longer any reason for us to remain in the shadows, we will leave Hong Kong and we will have our friends here take care of Mr. Adam Yao of the CIA.”

  THIRTY-ONE

  Jack Ryan, Jr., dropped into the chair in his cubicle at eight-thirty a.m., as he did each workday.

  He had fallen into a predictable morning routine. Up at five-fifteen, coffee with Melanie, a jog or a workout, a kiss good-bye, and the fifteen-minute drive to work.

  Once in the office, normally he would start his day by picking through overnight traffic sent from the CIA down in Langley up to NSA in Fort Meade. But that had changed since the cyberhijacking of three American drones. Now he spent more time watching traffic flow in the opposite direction. The cybersleuths at NSA were delivering daily updates to CIA about their investigation into the attack.

  Jack read the information from NSA each morning, hoping the folks over there would get to the bottom of the affair quickly, but the drone hijackings were not something The Campus was working on officially. No, Jack and the other analysts were still digging into the investigation of the Istanbul Drive, but he read every bit of data he could understand from NSA to see where they were with the investigation.

  He’d even had a long conversation with his girlfriend about the events. He’d become something of an expert on keeping his tone light and only semi-interested when he discussed Melanie’s work, although in truth he wanted to pick her brain like the highly skilled intelligence analyst he was. She was working on the matter for Mary Pat Foley, but at this point the computer forensic people at NSA were running lead in the investigation.

  There was a new development this morning. Hard evidence, as far as Ryan could tell from the data, that Iran was involved in the UAV attack.

  “Damn,” said Ryan as he took notes down on a legal pad for his morning meeting. “Dad is going to have a coronary.” Jack’s father had fought it out with the United Islamic Republic several years ago, kicked Tehran’s ass and assassinated its leader. Even though Iraq and Iran were once again two separate nations, Ryan wasn’t surprised to see that the Iranians were still causing trouble.

  Ryan figured his dad would take this news out
of NSA and start preparing his retaliation.

  Jack spent much of the morning reading NSA-to-CIA traffic, but when he’d finished going through all the new data from Fort Meade he quickly thumbed through CIA internal communication. He did not see much here regarding the UAV matter, but he noticed that one of his data-mining targets had received a flag.

  Jack clicked on the program to launch it.

  Ryan used data-mining software to hunt through CIA traffic for key terms, and daily he got anywhere from ten to one hundred hits on terms such as “Libya JSO operatives,” “computer hacking,” and “assassination,” and as he waited to see what flagged term had just appeared in CIA traffic, he hoped it was something that would help him get the operational stand-down lifted on The Campus.

  When the software launched, he blinked his eyes several times in surprise.

  The flagged term was “FastByte22.”

  “I’ll be damned,” Jack said. The hacker of the Istanbul Drive had shown up in a CIA cable.

  Quickly Ryan read the cable. A CIA nonofficial cover operative named Adam Yao, based in Hong Kong, had found an American computer hacker of Chinese descent named Zha Shu Hai living and working in a Hong Kong neighborhood. Zha, Yao explained, may also be using the computer handle FastByte22 in cyberspace, and he is definitely a fugitive from American justice.

  Yao pointed out in his cable that the hacker had been a penetration tester for defense contractor General Atomics, and had been imprisoned for offering to sell secrets about drone hacking and classified network penetration to the Chinese.

  Jack said it again: “I’ll be damned.”

  Adam Yao suggested that CIA send a team to Hong Kong to follow Zha to learn more about his actions, associations, and affiliations in HK to determine if he may have been involved in the recent computer penetration of the Department of Defense’s secure information network.

 

‹ Prev