Singapore Under Attack (International Espionage Book 1)

Home > Other > Singapore Under Attack (International Espionage Book 1) > Page 16
Singapore Under Attack (International Espionage Book 1) Page 16

by Uzi Eilam


  The command room was utterly silent as the general entered, accompanied by Dr. Fakari and the officer managing the training program. Fifteen people stood tautly at attention until Ja’afari instructed them to sit down. Trays bearing a variety of Malaysian delicacies prepared by the house’s kitchen crew were laid out on a long table next to the command room wall.

  “We’re funding all this luxury?” Ja’afari grumbled, refraining from tasting the treats that the officer took the trouble of serving to him. He knew exactly what would happen to him after uninhibited consumption of sweets, even when using the most sophisticated functions of the insulin pump.

  “Everything is generously funded by the Malaysian Royal Intelligence Corps and served in accordance with General Razek’s instructions. You can see, General Ja’afari, how much people are enjoying these delicacies. It’s a ray of light for them amidst the conditions of isolation and the grueling training regimen they’re undergoing.” The officer signaled his people to finish their snacks and sit down around the long table, while the chef and his assistants cleared whatever was left on the table without uttering a sound.

  “The people you’re seeing have completed an intensive training period. They’ve learned everything they need to know in order to carry out successful attacks on enemy ground. We’ve trained them on a variety of weapons, and each of them is equipped to operate independently and also, of course, as part of a team. All of them are willing to give their lives to the cause. We’ve put them through a series of tests, and they’ve successfully passed them all.”

  Ja’afari, who was comfortable with the idea of operating explosive charges, wasted no time. “What do you still need in order to commence the operation?”

  “We need a new safe house in Singapore, after the previous apartment that the students were using was exposed. We need to decide on a safe route to enter Singapore. We know the Johor Causeway is being closely monitored.”

  “Let’s hear from Dr. Fakari,” the general said, looking commandingly at his young assistant. “He’s got a solution to almost every problem. What do you say, Fakari?”

  “Our contact person in Singapore is waiting for a signal from us. In fact, we already have an apartment ready,” Fakari said. Ja’afari noted to himself that the tentative young researcher, as he was perceived by everyone in Tehran, had acquired initiative, creativity, and self-confidence here in Kuala Lumpur. “We’ve established a sophisticated, secure communication network to the apartment, so you have no reason to worry. As for entering Singapore, there are two options…” Fakari hesitated briefly, waiting for a nod from the general. “There’s a secret tunnel under the Straits of Johor. It was dug many years ago, when tensions between Malaysia and Singapore were rising. Today, only five people in Malaysia are aware of its existence, and in our organization, only the general and I know about the tunnel. Malaysian intelligence personnel have looked into it per our request, and they gave it a thumbs-up,” Fakari concluded confidently.

  “Move on to the second option,” the general commanded. “I still don’t entirely understand it,” Ja’afari admitted, smiling for the first time since the meeting began.

  “The general is right, and this method really is a lot more sophisticated than the first one.” Fakari surveyed the attendees sitting around the table, who were alert and silent. “I’m talking about entering through the Port of Singapore. Even the best-protected location has an Achilles’ heel. We’ve learned our lesson from our previous failures at smuggling containers into the port. Today, we know how to hack the system monitoring container conveyance in the port without the enemy even being aware of it. In fact, we’ve already activated our cyber means, which have been proven to be efficient.”

  “And how does this help us?” the officer challenged.

  “We can fill one or more containers with equipment, explosives, and people,” Fakari explained patiently. “Once we’re manipulating the computerized control center, it will be easy for us to camouflage the nature of the shipping container and guide it to a place where it will be safe to unload the cargo and get going. The getaway will also utilize the container terminal’s control center. The center conveys electronic authorization to trucks that received cargo from the containers, and that applies to our cargo as well.”

  “Okay, gentlemen.” Ja’afari resumed control of the discussion. “There’s an important point I want to emphasize…”

  The room grew entirely silent, and all eyes turned to the general.

  “The operation we’re working on is important in its own right, and the damage that Singapore will face justifies the effort, but let’s not forget that this is only the introduction to the attacks that will be directed against the Great Satan, the United States, and Little Satan, Israel. There’s a reason that representatives from those two enemy countries have shown up in Singapore. Our success in smuggling the shipping containers and the fighters within them will be followed up by an important enhancement in our ability to carry out future attacks. They have no idea what’s coming for them,” Ja’afari concluded.

  “We’re honored to take part in such important activity,” the officer said. “What do we need to do?”

  “By the end of the day tomorrow, I want to see a detailed plan for the attacks, including logistic details on entering Singapore, getting settled in the safe house, and the planned timeline for the explosions. Dr. Fakari will be in touch.”

  “We will proceed, with Allah’s blessing,” the officer replied.

  ***

  “What do you think?” The general turned to his young assistant as they sat in Ja’afari’s office at the embassy.

  “I think the people there are capable of carrying out even the most complex assignments when it comes to warfare and operating explosives. But I think they’re weak in the more sophisticated areas, requiring advanced communication and computer technology. I know, sir, that the people of your older generation are used to the same old methods…”

  “I’ve never seen an electron, and I don’t know how to kill with one.”

  “I gave the fighters a brief explanation of how to infiltrate the container terminal, but that’s only one aspect of cyber warfare,” Fakari replied.

  “What else do you have in your electronic quiver?”

  The young man felt confident in an area in which he was so fluent. It felt good to be on even ground with his commander, and perhaps even superior to him in some respects.

  “Electrons might not kill people directly, but even smaller particles, such as photons in rays of light, can kill. We’re all familiar with laser beams, which, at certain intensities, are actual death rays. But I’m talking about something else. I’m talking about taking over computer systems in control centers and using them to cause damage that’s significantly larger than the kind caused by explosives.

  “As I briefly explained to the fighters today, you can cause immense confusion at the port through the computer system that directs the movement of the containers via cranes and levers. You could cause the kind of confusion and chaos that would continue to reign for many days. You could infiltrate—electronically, of course—the systems controlling the aircraft taking off and landing in Changi Airport. The result might even be aircraft collisions, and would definitely include the airport shutting down. You don’t need to exercise your imagination too much to estimate the damage in terms of reputation and finance, and the task can be carried out without leaving any fingerprints.”

  “That’s very interesting, Fakari. What else?”

  “You can disrupt Singapore’s underground public transit system, the MRT, and temporarily paralyze all activity in Singapore. It might not be as dramatic as hitting air transportation, but it would certainly cause damage,” Fakari stated. “The next thing has to do with the main electrical grid. We’ve witnessed previous assaults on the electrical grid in Ukraine, when suspicions focused on Russia. That would be a serious dis
ruption of the energy infrastructure, which would damage the economy immensely.”

  “And who knows how to shoot all these electronic arrows?”

  “Hitting specific points with a limited scope could also be done by independent hackers. In contrast, damaging major infrastructure systems, which we can assume are well protected, would require the kind of effort that only a large country with advanced technology could invest. That leaves us with one more important area, sir—the banking system.”

  “What? The banks don’t know how to protect themselves? Are we putting our money at risk when we deposit it with them?”

  “The banks are not entirely immune to hacking attempts. We all remember the big embezzlement affair in 1995 at the Singaporean branch of the British Barings Bank. That was an inside job by Nick Leeson, the investment manager at the bank’s Singapore branch. You might also remember the 2011 case of a two-point-three billion dollar embezzlement at the Swiss UBS Bank, which is partially owned by Singapore. It’s safe to assume Singapore is aware of the hazards of the banking world, and infiltrating the system won’t be easy. But it’s very possible to make smart, careful withdrawals from the banks’ coffers.”

  “And we’re capable of doing that, too?” Ja’afari asked with alacrity. The topic of money always put him on alert. “Please prepare a file on operations in all the areas of attack you mentioned. Define what’s required in each case, and what sort of assistance we’d require, and from whom, in order to realize each attack. You’ll be responsible for launching this area, and I’ll stick to explosives,” the general concluded contentedly.

  Chapter 25

  Gideon and Dan were in the “war room,” as Dan referred to the room he’d been allocated at the technology lab. Dan’s daily routine now began with rising early and then rushing to see the information that had been collected overnight. Gideon would join him for the latest updates, and after receiving the daily report, would update the other parties involved.

  “I was summoned to our embassy today. Nahari wants me to travel to Israel to take part in some consultations. There are some developments that require my presence.”

  Dan was sorry he could not join Gideon. He acknowledged his own limitations as a single individual, even with the knowledgeable support of Tyler, the cyber expert from the American embassy. A visit in Israel, he thought, would allow him to meet the leading people in the field of cyber technology and receive some constructive criticism from them, as well as confirmation of the course he was taking. Dan decided to compose a list of IOT-related questions for Gideon to take with him, focusing on recent innovations in defending against cyber attacks.

  Gideon wasn’t surprised to have been summoned to meetings in Israel. The diverse experience he had accrued in various roles in the system had taught him that when defense agencies identified an unfamiliar obstacle, they tended to employ familiar solutions. He knew that some of the meetings were intended for what was informally called CYA, or Cover Your Ass. Let it be noted somewhere, the cover-seekers would say, that Dr. Gideon Ben Ari was called in for consultations in Israel and that these details or others were duly conveyed to him.

  ***

  Gideon didn’t allow himself to nap during the long El Al flight from Bangkok to Israel. The spiral notepad he was holding was full of details about the assessments he had prepared for his presentations in Israel. He didn’t store such information on his laptop. You never knew who was sitting next to you on the plane, or about their capabilities to “suck” information from your computer. Dan had prepared an entire page for him, written so densely that reading it proved difficult. Gideon dedicated plenty of time to understanding and memorizing the questions that Dan had asked him to relay to his interlocutors in Israel. He stubbornly persisted in studying the questions and the problems Dan raised, one after the other, torturing himself for his difficulties in understanding this new technological language. Gideon began to regret not bringing Dan along for this trip. But Nahari had only invited him… He tried to justify the decision to himself.

  Nahari’s bureau greeted Gideon with soft hues and with the familiar smell of leather armchairs in the waiting room. Binyamin, Nahari’s assistant, already waiting at the office, shook Gideon’s hand very firmly.

  Gideon glanced at Yitzhak Nahari, and then at Binyamin and at the bureau manager. A silence that seemed to last forever filled the room until a smile graced Nahari’s face, making him suddenly appear less rigid.

  “We’ve recently received some disturbing information about what’s going on in Malaysia, Singapore’s neighbor,” Nahari began. “Binyamin will give you a short description of the main points of the information that put us on high alert. After that, we’ll want to get your perspective and, mostly, to understand what Singapore does and doesn’t know about the dense cloud of threats hovering over them.”

  “We’re monitoring Iran’s involvement in the preparation for terrorist attacks originating in Malaysia,” Binyamin stated. “We’re aware of General Ja’afari, currently serving as Iran’s ambassador in Kuala Lumpur, and of the enthusiastic assistance he’s receiving from General Razek, head of the Malaysian Royal Intelligence Corps, but so long as the plans we were monitoring consisted of using explosives, that didn’t raise any unusual red flags with us.”

  “You’re right, Binyamin,” Gideon interjected. “But Singapore is coming to the conclusion that something a lot more serious is going on, something involving a cyber attack…”

  “I’m just getting to that,” Binyamin’s baritone thundered. “In the last few days, we’ve received a growing number of indications that China is assuming the role of an active agent in Southeast Asia, rather than just watching from the sidelines. We’re still not certain if this is in response to a request from Iran, or whether China has a strategic agenda and a new policy. Their contribution might take the form of providing Iran with information on cyber attacks. The result might be significant harm to the economy in Singapore.”

  “Gideon, I’m sure I don’t need to explain to you how important Singapore is to us,” Nahari said. “Above and beyond the fact that it’s a strategic and defense ally, and in addition to the funds that its industry contributes to our industries in Israel, we’re very interested in studying the cyber threats Singapore is facing. It’s essential for our own ability to prepare to defend ourselves against these rapidly developing threats. You could say that Singapore is acting as a sort of human shield for us. We’re convinced this front is as crucial to us as it is for Singapore,” Yitzhak Nahari said.

  “I understand the importance of Singapore, but why did you call me in, rather than representatives of the Israeli defense agencies in Singapore? There’s a military attaché, and there’s also David Rogel, who’s the representative for Rafael, a former high-ranking officer and an intelligence guy to his very core. I’ve only been recruited to the cause recently.”

  “And you, Gideon, are more knowledgeable than our people in Singapore about the history of relations between the two countries, and the experience you’ve acquired is of ultimate importance. Why don’t you tell us what you’re seeing in Singapore, and whether they’re reacting properly to these new threats? Are they aware of the scope of the danger?”

  “General Tan, who’s leading the response, Dr. Chang Mei, manager of the national holding company for technological industries in Singapore, and Mr. Fang Quan Lin, a prominent businessman, are at the core of the efforts to defend Singapore.”

  “Do they have effective means of collecting intelligence?” Nahari asked. “Or are they relying on us, the Israelis, and on the crumbs they’re getting from NSA personnel at the American embassy in Singapore?”

  “The information on massively increasing cyber activity, particularly the indications of growing assistance by China to Iran, raises the fear that this is beyond what Singapore can handle. Dan Avni, who’s with us in Singapore, is managing to obtain good information about what’s going o
n in Malaysia, but he’s just one person. I have a list of questions and problems that Dan prepared, and I’d like to sit down with some people who could help him.”

  “There’s no problem coordinating a meeting or a series of meetings on your behalf. Binyamin will take care of it,” Nahari replied. “First of all, you should meet the director general of the Ministry of Defense, who asked to see you. We’ve already set a time for the meeting. The defense team focusing on protecting Israel from cyber attacks has already acquired a lot of experience and can answer any questions Dan Avni presents to them. There’s also a cyber warfare task force at the prime minister’s office, which is designed to assist the entire private sector in Israel.”

  “There’s something troubling in what Gideon was saying,” Binyamin ventured.

  “There is? What?” Nahari asked bluntly.

  “The fact that Dan is working closely with American NSA representatives in Singapore. We have to warn Dan that when he receives sensitive information from us, he shouldn’t pass it on to Singaporean and American allies without screening it first.”

  “Gideon, you’re the responsible adult acting on our behalf in Singapore. You’ll know how to instruct the young genius not to get carried away. I suggest we start with your meetings, and that we see you again before you leave for Singapore,” Nahari concluded.

  ***

  Gideon remembered the director general of the Ministry of Defense from previous years, in which they had collaborated on defense technology issues. The man excelled at quiet, effective leadership, and his direct style caused people to trust him and cooperate. He greeted Gideon with a firm handshake and a clap on the shoulder, noting that Gideon had “disappeared on him” in the last few years. The head of the Information Security Department and his assistant, the head of the Defense Aid Branch and two of his staff members, and the head of the Administration for the Development of Weapons and Technological Infrastructure (ADWTI) were all seated around the massive conference table in the director general’s room, nodding at Gideon in greeting.

 

‹ Prev