Hide and Seek

Home > Other > Hide and Seek > Page 4
Hide and Seek Page 4

by H. L. Wegley

“How do you use the correlated data?”

  “The short and sweet of it is that it helps the authorities find and catch the bad guys without having to process so much data by brute force and without having to use those highly targeted programs. That is…it does when the laws don’t stop us cold. Living in a free society is both wonderful and frustrating, depending upon whether you’re an ordinary, law-abiding citizen, or one who’s tasked with catching those who aren’t.”

  Maybe her answer was a bit condescending, but he had come across as an idiot. He deserved a little condescension.

  She was beautiful, intelligent, and self-confident.

  He sensed no arrogance.

  When she talked about her work, she let it stand on its own merit—no bragging.

  It was time for the invitation. “How soon can you come over to my work area at National Aerospace? I need help locating some people…the type who aren’t law-abiding citizens.”

  “I can show up in about thirty minutes. I just need to collect some tools of the trade.”

  “Sounds good. Do you drive?”

  At Lee’s question, Jennifer’s gaze burned into his eyes like laser beams.

  You fool!

  The accusation came from Lee’s right brain. You should’ve asked her if she had a car. Look at her. The DOD could have used those eyes for its missile defense system. If you insult her again, she’ll burn a hole right through you.

  Her laser look ended in a frown. “I drive, Mr. Brandt, and I own a car.”

  He cleared his throat. “You’ll need to park outside of the gate in the lot at North Fourth and Park Place. I’ll meet you there to get your visitor’s badge.”

  “I’ll see you in thirty minutes.”

  When Jennifer walked out the door, Howie’s grin said he was very pleased with himself.

  That made Lee nervous. Jennifer Akihara, already distracted and intimidated him…maybe there was something else going on here.

  “So what do you think, Lee?” A grin spanned Howie’s face. “Her IQ is in the over one-hundred eighty category, maybe as high as two hundred. Very near Einstein’s.”

  Lee turned to leave, not wanting to voice his thoughts.

  “I trust you with Jennifer, Lee. She needs someone to…” The door swung and latched, cutting off Howie’s last words.

  Lee drove back to work, but his thoughts kept returning to the young woman…Jennifer. Part of him wanted to plunge in and drown in the depths of those intense, brown eyes. Another part feared her eyes might burn through him like a cutting torch, leaving a scarred, disfigured heart in the aftermath.

  He’d parked his Mustang outside the gate in the public lot. He would have to escort Jennifer to this lot when they finished working. Though he usually opted for a secure parking area inside the compound, Randy Matthews was on duty at the gate shack. He could be trusted to watch out for Lee’s classic car.

  Lee hurried through the turnstile and the cipher-locked door to his desk. He needed to prepare for Jennifer’s visit. First, he compiled a list of known facts about the breach, and then he listed his suspicions. Finally, he made a list of things he still needed to know.

  Still needed to know—did that category include more about Jennifer Akihara?

  ****

  As Jennifer collected her DVDs containing the software tools she’d need at National Aerospace, she reflected on Lee Brandt. He was not a typical computer nerd or geek. That had set off all of her alarms at once. He was on the rugged side of handsome. He stood when she entered the room. But his eyes went all gaga when he saw her.

  He would probably be like all the others. Howie might think he was a good guy, but she watched his IQ drop to near zero when she walked into the room—a sure sign of trouble.

  Jennifer had doubts about spending an evening working with Lee Brandt. But she told Howie she’d give it a shot. She hoped she wouldn’t have to give Mr. Brandt one…from her Smith and Wesson.

  Speaking of shots…she pulled the gun from her purse and secured it in her locker in the computer lab. She had never been inside the gates at National Aerospace, but she assumed they, like other defense contractors, had policies preventing employees from taking guns through their gates.

  Grabbing her pack, she was ready for National Aerospace. But was she ready for Mr. Lee Brandt? It was too bad she couldn’t trust men, because there was something about him that—no, there was nothing about Lee Brandt except a concern that she should keep her distance. She would do her work as quickly as possible and leave.

  5

  When Lee finished his three lists, he glanced at his watch. Thirty minutes since he’d left Howie’s office. He hurried to the gate shack.

  Randy stood in the doorway staring down the parking lot. “Hey, Randy, have you seen…uh…” Lee paused, searching for appropriate words to describe Jennifer, “…a young lady arrive here looking for me?”

  “Do you mean the Miss Universe candidate with long, dark hair and big, brown eyes? The one who asked me where to park?”

  “This is about work, Randy. It’s not a social visit.”

  “That’s too bad, Lee. But I bet it’s going to be a pleasant work session.” Randy’s grin spanned the width of his face. “On a scale from one to ten, she’s a ninety-nine.”

  He scowled. “Just get me a visitor’s badge form.”

  Jennifer approached the guard shack.

  He hurried, trying to expedite the badging process and minimize her exposure to Randy’s obnoxious remarks.

  “Jennifer, we’ll need your signature here, and Randy needs to see your driver’s license.” Lee positioned the paper on the counter and turned towards Jennifer. “Please keep the badge clipped on after we enter the compound. Since you’re a visitor, you’ll need to stay with me at all times after we go through the turnstile.”

  “And you wouldn’t want it to be any other way, right, Lee?”

  He glared at Randy, but the security guard’s smirk remained on his face.

  Jennifer shook her head at Randy’s comment and then signed the form.

  Ignoring Randy, Lee directed her through the turnstile. He punched the code into the lock. After the click he opened the door and they entered the lab starting a chain of events Lee prayed he wouldn’t regret.

  Once inside, Jennifer stepped in front of Lee cutting him off. When she turned to face him her laser look was back. “About what you said at the gate…because I’m your visitor, you have to escort me everywhere?”

  “Is that a problem?”

  Jennifer’s gaze bored into him. “If anyone tells me that applies to the restrooms I’m out of here.”

  “No, it most certainly does not.”

  He tried to imagine what life must be like for her. Her beauty was stunning, but she looked young and vulnerable. Evidently this combination brought her problems. He would try not to add to them.

  He walked to Ram’s desk and wiggled the mouse attached to the docking station. “This laptop belonged to the contractor who accessed the classified data. I watched port and IP address usage on this machine for several minutes. It communicated with a computer outside of our firewalls. But I couldn’t locate any malware, nor could I trace where the communications were going. That’s why I need your help.”

  “I see you’re still logged in…as administrator, I assume?”

  He nodded.

  Jennifer pulled a DVD from her carrying case and started loading software directly onto Ram’s laptop—no flash drive.

  Several alarms went off inside his head. This could go very badly for him if they were caught. “What are you loading onto my company’s machine?”

  “Mr. Brandt…you don’t want to know.”

  “What if I do want to know, but just don’t want National Aerospace to know?”

  “Trust me on this. You don’t know the details of what I’m doing and it’s best if we keep it that way. It makes you mostly innocent—well…innocent of anything really serious.” She flashed him a glance.

  Was th
at a smirk on her face?

  “Innocent of what?” He paused, but she ignored his question. “Ms. Akihara, mostly innocent means partly guilty.”

  For a woman who hated deception she needed to practice what she preached.

  Peering over her shoulder questions began loading like cartridges into his mind. When the magazine in his mind filled his mouth started firing. “You’re logging directly onto an outside machine. That’s not supposed to be possible. How are you getting out? You need an account on our firewall server to do that, unless you’re just logging onto a website from a browser.”

  Jennifer turned towards Lee and exhaled a forceful sigh. Her eyes narrowed, piercing him with their intensity. “Look, Mr. Brandt, it’s OK if you want to keep looking over my shoulder. But please be quiet. I need to concentrate.”

  The left side of his brain screamed into his left frontal lobe. Unplug the docking station, you fool, before this gets any worse!

  He listened to the right side and did nothing.

  Jennifer opened two windows.

  Lee guessed they ran the programs she loaded onto the laptop.

  One window displayed information on local port usage and the other displayed the output from something running on another computer, one outside National Aerospace.

  He couldn’t be sure, but the range of IP addresses scrolling across the screen indicated she had access to a network traffic database for a huge chunk of the Internet. Was it NSA’s database?

  He noticed a third program minimized to the tray at the bottom of the screen. What had he gotten himself into?

  She could get them both hung out to dry, first by National Aerospace, and then by the federal government.

  After three or four minutes of intense concentration, Jennifer turned. “Well, I found the malware. It was cleverly disguised. I would bet money it’s designed to replicate and spread, but I’d have to reverse engineer it to be sure. We don’t have time to do that tonight. I captured the file so we can fingerprint the malevolent code.”

  “Is that what’s displayed in the window on the left—the malware information?”

  She nodded.

  “And the window on the right?”

  She squinted and frowned. “That one is going to take a while. It looks like the malware is communicating with an unknown hacker at some unknown location. The problem is he, or she, is hiding behind some compromised machines.”

  He rubbed his chin and thought about his initial findings. “The compromised machines wouldn’t happen to be in Texas and Colorado, would they?”

  Jennifer looked up and her eyes widened. “Uh…yes…well, two of them are. We’ll get back to that subject in a moment. As I was explaining, my algorithm utilizes a little graph theory along with heuristics derived from Internet-wide communications patterns, to resolve the circuitous path that a line of communication like this one is using.”

  “Would you please just tell me what it is you actually do to wade through that mess and find the bad guy?”

  She smiled.

  What would life be like if he woke up every day knowing he would see that smile on that face? He was being ridiculous.

  “Mr. Brandt?”

  “Uh…yes. We’re finding the bad guys.”

  “And we do that by running my algorithm for Internet-scale analysis using data queried from one of NSA’s computers—data that was collected from servers on the backbone of the Internet and some other carefully selected machines.” Jennifer swiveled her chair to face him. “We know a lot about both Internet topology and routing. I used that knowledge to reduce the number of servers we need to analyze to detect the bad guys doing their dirty work. I also used it to formulate some heuristics to make the required computation manageable. Mr. Brandt…do you remember those classes of complexity you learned about in theory of computing?”

  “Yes. P, NP, NP-Complete, recursively unsolvable—I dreaded that subject coming up during my master’s oral exam.”

  “Well, identifying heuristics that can turn some of those seemingly intractable problems into computable ones, and implementing algorithms to do so, is my specialty.”

  Clearly Jennifer was working at the fringes of mathematics and computer science, pushing the limits of human knowledge. She intimidated him, but she also strongly attracted him. That intimidated him even further. “OK, assuming you and your tools do all of that, how long do we have to wait to determine where this guy is located?”

  “With this algorithm and this scale of analysis, there’s no way to predict how long it will take. It may be five minutes, and then again, it may be five hours or more.”

  He gestured towards the lab door. “Well then, shall we make a run to a coffee house, or grab something to eat while we wait?”

  “Uh…just a minute. The intermediate printout I directed to standard output indicates we’re converging quickly to a solution. I think this run is of the five-minute variety. Let me look at what’s coming back to the screen for a minute. Maybe we’ve found the bad guys.”

  “Sounds good to me.” Although going to get coffee with Jennifer sounded better.

  Jennifer sat silently until more text appeared in the window she monitored. “Mr. Brandt, what software does your company use for its VPN?”

  “Please, just call me Lee.”

  She continued watching text scroll through the window on the laptop. “OK…Lee, what sof—rather…what protocol does your VPN client use on the company laptops?”

  He noticed she didn’t reciprocate with an invitation to use her first name.

  “The VPN clients all use IPSec.”

  “That’s what I thought you were going to say.”

  “Is that a problem?”

  “No. But I think these guys hacked your VPN client and hijacked it.”

  Lee gestured with his right hand, fingers spread wide. “They hijacked the software every National Aerospace employee uses for telecommuting?”

  “Evidently. And that’s going to cause National Aerospace a lot of problems, especially if the bad guys start grabbing account information from infected machines.”

  He didn’t like where this was leading. “So now I suppose you’re going to tell me a hacker can actually look like one of our employees working from home, yet be at another location and have control of an infected PC located inside the company?”

  “That’s exactly what I’m telling you. You could have a botnet inside your firewall. Or if they know precisely what they want they can just access it like an employee would.”

  “Wonderful.”

  This was a whole lot more than Ram looking at one classified drawing. The military side of National Aerospace had developed dozens of weapons and surveillance systems that could all be compromised by a scheme to access the classified engineering data from DEDS. The commercial side had trade secrets, proprietary information, and employee identity data.

  Lee could certainly say “I told you so” to Barry and their CEO, but that would give him little satisfaction, because Jennifer’s discovery transcended his worst fears by an order of magnitude.

  She pointed to the laptop screen. “They can communicate right through your firewall for quite a while before you discover what’s happening. By then, they will likely have obtained what they’re looking for and will split, covering their tracks as they go.”

  Lee stared at the wall. The national security ramifications were frightening to him. “And from where is our friendly hacker controlling this machine?”

  “He will appear to be local.” Jennifer sighed sharply. “But to answer your question, it’s more than one place. Probably more than one hacker. Who knows how many infected machines there are in this building, or elsewhere inside National Aerospace. That’s the good news.”

  “Great.” He rolled his eyes. “What’s the bad news?”

  “I can sum it up in four words…Iran, Yemen, Colombia, Mexico.” She studied him as she spoke.

  “Not good. Not good at all,” he muttered. “I’ve heard Iran has
been increasing its presence in Latin America and that it funds the recruiting and training of terrorists there. Do you think we’ve encountered an instance of Iran’s activity a little closer to home?”

  Jennifer paused for a moment, squinting and playing with the ends of her hair. “Perhaps…but we’ve still got the Yemen factor to consider. Some U.S. based companies used technology training in Yemen to try to ameliorate the situation. You know…give the guys a good career and they’ll love us. The jury’s still out on its effectiveness. But there could be a cause-and-effect relationship between the technology training and the sophisticated hacking we uncovered.”

  “I see the logic. It could account for both the Trojan and the hacked VPN clients.”

  “But Mexico…” Jennifer paused, fiddling with her hair again. “Seeing activity in Mexico really bothers me, especially after the recent increase in alliances between drug cartels and Islamic terrorists.”

  That was news to him. “I know Mexico is littered with drug cartels, but who reported their cooperation with Islamic terrorists?”

  She studied him again. “General Pace testified to Congress about this trend a few years ago. At the time, the activity was confined to South America. More recently, a Navy admiral reiterated General Pace’s concerns saying the activity was moving north.”

  He could sure conjure up some frightening possibilities from Jennifer’s discoveries. “So what was the congressional reaction to the warning—the more recent one?”

  She exhaled sharply. “Basically…our politicians either pooh-poohed it, or shrugged.”

  “That’s all?” Lee frowned and gave her a palms-up shrug. “Not even any saber-rattling?”

  “That’s it.” Jennifer sighed. “Even after we exposed the link between Iran and Hezbollah in Latin America.”

  “That link sounds like it might explain what we saw tonight, especially if the cooperation has extended northward into Mexico.”

  The look in her eyes became intense. “Explain it by which, the military’s warning, or the politicians’ shrugs?” She was testing the political waters.

  It was good to see they were on the same page. The left side of Lee’s brain jumped all over his deduction.

 

‹ Prev