Ghost Fleet : A Novel of the Next World War (9780544145979)

Home > Other > Ghost Fleet : A Novel of the Next World War (9780544145979) > Page 5
Ghost Fleet : A Novel of the Next World War (9780544145979) Page 5

by Singer, P. W. ; Cole, August


  “I have abused your time, so I will end my presentation with three questions. First, just as we acted then to meet the people’s true expectations of their nation’s leaders, we must ask, What would the people expect of us now? Second, what do you expect the Americans to do once they learn of our energy discovery? Third, and most important, is a simple question of the arc of history: If now is not the time, then when?

  “You know the answers to these questions, and thus you know that you, the truly powerful, actually have no choice.”

  Admiral Lin appeared at Wang’s shoulder and placed a hand on his back. Wang noticed that the commandos now surrounded them. Perhaps he had gone too far.

  “Admiral, the Presidium thanks you for your views,” said Lin. “These men will see you out.”

  As Wang walked down the hallway, wedged between the commandos, he replayed the presentation in his mind. He could find faults with his performance, but he was at peace.

  At the elevator door, the commandos stood in silence. Wang wondered where they would take him next. Then he noticed that they were tensing up as the elevator lights numbered ever closer to their floor. The door opened and another armed phalanx emerged; these bodyguards were Caucasian in ethnicity and wearing civilian suits, but they were clearly military. While the two groups eyed each other warily, Wang watched how the elderly man in the middle didn’t bother even to look up from the outdated computer tablet he tapped away on. Red diamonds and purple hearts reflected in his traditional eyeglasses. He was surprisingly fit for his age, but supposedly the old Russian spy was addicted to memory-improving games, an effort to stave off what Directorate intelligence suspected was dementia. A strong body still, but not the mind.

  So, Wang realized, this had not been a strategy session but an audition. The Presidium had already made its choice.

  PART 2

  Attack your enemy where he is unprepared,

  appear where you are not expected.

  —SUN-TZU, THE ART OF WAR

  Joint Base Anacostia-Bolling, Washington, DC

  Armando Chavez exhaled when he made the initial slice. As his mentor Dr. Jimenez had explained so long ago, the key to precision was to move slow but steady, advancing the blade at a consistent pace. The cut complete, Armando reached down, picked up the withered rose branch, and placed it into the faded canvas bag slung over his shoulder.

  Landscaping was a step down for someone with an MD from Universidad Central de Venezuela. But it was the only kind of work Armando had been able to get since he’d arrived as a refugee from the chaos in his homeland seven years ago. He could get angry or he could focus on achieving the little perfections that made life satisfying.

  As he trimmed the flowers at the base of the sign, he glanced at the etching in the black marble: DEFENSE INTELLIGENCE AGENCY.1 He wasn’t sure what the DIA did. Hadid, his supervisor, said it was something like the CIA, but for the U.S. military. It didn’t matter. The landscaping crew was almost done here. After the break, Hadid said they would head over to trim the hedges behind the base’s elder-care center.

  Because of security, the landscapers were not allowed inside the building. When break time came, the others gathered in the shade, but Armando walked over to sit by the small decorative pond beside the entrance doors.

  He flipped open the tablet he kept in his pocket to see if he had any messages. The screen projected a 3-D packet from his cousin back in Caracas. More pictures of his granddaughter. Such lovely eyes.

  Armando’s smile went unnoticed by Allison Swigg as she cut across the grassy field by the pond in her rush from the parking lot. The imagery analyst had gotten stuck in the traffic on I-295 on her way back from a networking lunch out at Tysons Corner. And now she was late for the staff meeting.

  Neither of them noticed the other, but as she passed the landscaper, his tablet recognized the RFID chips embedded in Allison’s security badge. A localized wireless network formed for exactly 0.03 seconds. In that instant, the malware hidden in the video packet from Caracas made its jump.

  As Armando finished the iced tea his wife had made for him the previous night, Swigg approached the security desk manned by a guard in a black bullet-resistant nylon jumpsuit. A compact HK G482 assault rifle hung from the glossy gray ceramic vest that protected his chest. The only insignia on his uniform was the eagle-silhouette logo of the security company that guarded the DIA headquarters. No Personal Devices Allowed read the sign suspended above a row of silver turnstiles.

  “Hey, Steve,” said Allison. “How’s the little one?”

  “Pretty good,” the guard replied with a smile. “She slept through the night.”

  She placed her iTab bracelet in a metallic lock box and pulled out the key. But Allison’s badge stayed with her. As she walked toward the gate, the software in her badge automatically communicated her security clearance to the machine via a radio signal. And at the same moment of network linkage, the malware packet jumped again in less time than it would take to read the engraving on the entrance wall: Committed to Excellence in Defense of the Nation.

  The idea of using covert radio signals3 to ride malware into a network unconnected to the wider Internet had actually been pioneered by the NSA, one of the DIA’s sister agencies. But like all virtual weapons, once it was deployed in the open cyberworld, it offered inspiration for anyone, including one’s enemies.

  The turnstile gate lifted. Swigg rushed down the hall, too far behind schedule to make her ritual stop at the Dunkin’ Donuts stand just inside the spy agency’s entrance. By the time she had passed the old Soviet SS-20 ballistic missile that stood mounted in the lobby like a Cold War totem pole, the malware packet had jumped from the gate onto another security guard’s viz glasses. When the guard walked his rounds, the packet jumped into the environmental controls that cooled a closet full of network servers supporting aerial surveillance operations over Pakistan. After that, it went to an unmanned-aircraft research and development team’s systems. And bit by bit, the malware worked its way into the various subnetworks that linked via the Defense Department’s SIPRNet classified network.4

  The initial penetrations didn’t raise any alarms among the automated computer network defenses, always on the lookout for anomalies. At each stop, all the packet did was link with what appeared to the defenses as nonexecutables, harmless inert files, which they were, until the malware rearranged them into something new. Each of the systems had been air-gapped,5 isolated from the Internet to prevent hackers from infiltrating them. The problem with high walls, though, was that someone could use an unsuspecting gardener to tunnel underneath them.

  Shanghai Jiao Tong University

  A thin teenage girl stood behind a workstation, faintly glowing metallic smart-rings6 on her fingers, one worn above each joint. Her expression was blank, her eyes hidden behind a matte-black visor. Rows of similar workstations lined the converted lecture hall. Behind each stood a young engineering student, every one a member of the 234th Information Brigade—Jiao Tong, a subunit of the Third Army Cyber-Militia.

  On the arena floor, two Directorate officers watched the workers. From their vantage point, the darkened arena seemed to be lit by thousands of fireflies as the students’ hands wove faint neon-green tracks through the air.

  Jiao Tong University had been formed in 1896 by Sheng Xuanhuai, an official working for the Guangxu emperor. The school was one of the original pillars of the Self-Strengthening Movement, which advocated using Western technology to save the country from destitution. Over the following decades, the school grew to become China’s most prestigious engineering university, nicknamed the Eastern MIT.7

  Hu Fang hated that moniker, which made it seem as if her school were only a weak copy of an American original. Today, her generation would show that times had changed.

  The first university cyber-militias had been formed after the 2001 Hainan Island incident.8 A Chinese fighter pilot had veered too close to an American navy surveillance plane, and the two planes crashed in m
idair. The smaller Chinese plane spun to the earth and its hot-dogging pilot was killed, while the American plane had to make an emergency landing at a Chinese airfield on Hainan. As each side angrily accused the other of causing the collision, the Communist Party encouraged computer-savvy Chinese citizens to deface American websites to show their collective displeasure. Young Chinese teens were organized online by the thousands and gleefully joined in the cyber-vandalism campaign, targeting the homepage of everything from the White House to a public library in Minnesota. After the crisis, the hacker militias became crucial hubs9 of espionage, stealing online secrets that ranged from jet-fighter designs to soft-drink companies’ negotiating strategies.

  That had all taken place before Hu Fang was born. She’d grown up sick from the smog; a hacking cough kept her from playing outside with the other kids. What Hu thought was a curse became a blessing: her father, a professor of computer science in Beijing, had started her out writing code at age three, mostly as a way to keep her busy inside their cramped apartment. Hu had been inducted into the 234th after she’d won a software-writing competition at the age of eleven.

  Officially, militia service fulfilled the Directorate’s universal military service requirement, but Hu would have volunteered anyway. She got to play with the latest technology, and the missions the officers gave her were usually fun. One day it might be hacking into a dissident’s smartphone, and another day it might entail tangling with the IT security at a Korean car designer. The Americans, though, were the best to toy with—so confident of their defenses. If you pwned them—the word taken from the Americans’ own lingo for seizing digital control—the officers of the 234th noticed you. She’d done well enough that the apartment she and her father lived in now was much bigger than any of her father’s colleagues’.

  But it was not the reward that mattered to Hu; rather, it was escaping the physical limitations that had once defined her life. When linked in, Hu felt like she was literally flying. Indeed, her gear worked on the same principles as the fly-by-wire controls on China’s J-20 fighter.10 The powerful computers she drew on created a three-dimensional world that represented the global communications networks that were her battlegrounds. She was among the few people who could boast that they had truly “seen” the Internet.

  Hu had made her mark by hacking phones belonging to civilian employees in the Pentagon. Despite the restrictions on employees bringing devices into the building, a few did so every day. Her technique involved co-opting a phone’s camera and other onboard sensors to remotely re-create the owner’s physical and electronic environment. This mosaic of pictures, sounds, and electromagnetic signals helped the Directorate produce an almost perfect 3-D virtual rendition of the Pentagon’s interior and its networks.

  She noticed with pleasure her pump kicking in. Access to the latest in medical technologies was another perk of the unit. The tiny pump, implanted beneath the skin near her navel, dumped a cocktail of methylphenidate and other stimulants into her circulatory system.11

  Originally designed for children with attention deficit disorder, the mix produced a combination of focus and euphoria. For well over a decade, kids in America had popped “prep” pills to tackle tests and homework, which Hu thought was laughable. It was another sign of America’s weakness, kids using this kind of power just to make it through schoolwork. Hu’s pump enabled her to do something truly important.

  When she’d been told a week ago to prepare for a larger operation than they’d ever tried, she hacked the pump’s operating system. It was a risk, but it paid off. She raised the dose level by 200 percent. No more steady-state awareness. Now it was like falling off a skyscraper and discovering you could fly right before you hit the ground.

  Hu moved her hands like a conductor, gently arcing her arms in elliptical gestures, almost swanlike. The movement of each joint of every finger communicated a command via the gyroscopes inside the smart-ring; one typed out code on an invisible keyboard while another acted as a computer mouse, clicking open network connections. Multiple different points, clicks, and typing actions, all at once. To the officers watching below, it looked like an intricate ballet crossed with a tickling match.

  The young hacker focused on her attack, navigating the malware packet through the DIA networks while fighting back the desire to brush a bead of sweat off her nose with her gloved hands. The Pentagon’s autonomous network defenses, sensing the slight anomalies of her network streams, tried to identify and contain her attack. But this was where the integration of woman and machine triumphed above mere “big data.” Hu was already two steps ahead, building system components and then tearing them down before the data could be integrated enough for the DIA computers to see them as threats. Her left arm coiled and sprung, her fingers outstretched. Then the right did the same, this time a misdirect, steering the defense code to shut down further external access, essentially tricking the programs into focusing on locking the doors of a burning house, but leaving a small ember on the outside for them to stamp on, so they’d think the fire was out.

  Having gained access, she set about accomplishing the heart of her mission. Hu’s hands punched high, then her fingers flicked. She began inserting code that would randomize signals12 from the Americans’ Global Positioning System satellite constellation. Some GPS signals would be off by just two meters. Others would be off by two hundred kilometers.

  Of course, shutting it all down would be easy. But she could swing that hammer later; today was all about sowing doubt and spreading confusion.

  332 Kilometers Above the Earth’s Surface

  If it weren’t so frustrating, it would be funny.

  Less than a millimeter’s worth of extra metal on just one bolt was about to derail an operation that involved literally billions of moving pieces of software and hardware.

  “Are you done yet?” asked Lieutenant Colonel Huan Zhou, an unmistakable edge in his voice.

  The wrench that Major Chang Lu held in his gloved hand was a perfect copy of a HEXPANDO, just like the one that Colonel Farmer was banging at the ISS hatch with half an Earth orbit away. This wrench, though, had been produced from a design pirated by a patriotic hacker unit based in Shenzhen and manufactured at the Manned Space Engineering Office in Beijing. The problem was that, unlike the wrench, the bolt that Chang was trying to pry free was not a perfect copy and had become stuck. He pushed harder and harder, but it still wouldn’t budge.

  “Nearly,” said Chang.

  He saw the three other taikonauts reentering the Tiangong-3 space station. Lucky bastards.

  The Tiangong (“Heavenly Palace”) space station13 program had been planned ever since China launched its first manned crew into space, in 2003. Western commentators had mocked those early Shenzhou vessels as poor copies of the United States’ 1960s-era Gemini spacecraft. But the program rapidly advanced, aided by a healthy amount of NASA computer design files that found their way into Chinese engineers’ hands. After the Shenzhous came the first Tiangong space station, a ten-meter-long, eight-thousand-kilogram single-module test bed that launched in 2011. It was the equivalent of NASA’s 1970s-era Skylab. That was followed in 2015 by the multimodule Tiangong-2, which was fifteen meters long and weighed twenty thousand kilograms, comparable to NASA’s 1990s design of the first ISS. Soon after, the program accelerated fast enough to finally match its competitors. Western commentators no longer mocked but instead marveled that in a decade and a half, China had achieved what it had taken NASA sixty years to accomplish.

  The twenty-five-meter-long, sixty-thousand-kilogram Tiangong-3 space station was the pride of the nation, its launch celebrated with an official state holiday. It had seven modules laid out in a T, including a core crew module that could support six taikonauts; four solar panels that extended out thirty-seven meters; and a docking port that could accommodate four ships. At the two upper ends of the T were parallel laboratory modules designed to conduct various experiments in microgravity.

  At least, that was what the rest
of the world thought. The port-side module actually had a different purpose. And now, its cover just wouldn’t shake free, all because of a single faulty titanium bolt.

  Chang realized that to get enough torque to pry the bolt loose, he’d have to untether, which was against protocol.

  “Repositioning,” said Chang.

  “Negative,” said Huan. “Return and I will send someone to finish your work.”

  “There’s no time,” said Chang. “I’m now off tether.”

  Chang heaved on the long wrench, and the bolt loosened. He easily removed the hatch cover and found himself staring into the mirrored surface of a laser’s lens. He studied the Earth’s reflection in it, and his own form superimposed above the peaceful blue beneath.

  “Done,” said Chang.

  “I didn’t think you had it in you, Chang. Good work,” said Huan, the edge in his voice gone.

  Chang resecured himself to the space station and made his way to the main hatch while Huan brought Tiangong-3’s weapons online. The station crew had realized they were moving to war footing twelve hours ago when Huan switched off the live viz feed of their activities. But it still felt slightly unreal.

  Once the taikonauts were all inside the station, Huan powered up the weapons module. The chemical oxygen iodine laser,14 or COIL, design had originally been developed by the U.S. Air Force in the late 1970s. It had even been flown on a converted 747 jumbo jet15 so the laser’s ability to shoot down missiles in midair could be tested. But the Americans had ultimately decided that using chemicals in enclosed spaces to power lasers was too dangerous. The Directorate saw it differently. Two modules away from the crew, a toxic mix of hydrogen peroxide and potassium hydroxide was being blended with gaseous chlorine and molecular iodine.

 

‹ Prev