Book Read Free

Blue Warrior

Page 1

by Mike Maden




  G. P. PUTNAM’S SONS

  Publishers Since 1838

  Published by the Penguin Group

  Penguin Group (USA) LLC

  375 Hudson Street

  New York, New York 10014

  USA • Canada • UK • Ireland • Australia • New Zealand • India • South Africa • China

  penguin.com

  A Penguin Random House Company

  Copyright © 2014 by Mike Maden

  Penguin supports copyright. Copyright fuels creativity, encourages diverse voices, promotes free speech, and creates a vibrant culture. Thank you for buying an authorized edition of this book and for complying with copyright laws by not reproducing, scanning, or distributing any part of it in any form without permission. You are supporting writers and allowing Penguin to continue to publish books for every reader.

  Library of Congress Cataloging-in-Publication Data

  Maden, Mike.

  Blue warrior / Mike Maden.

  p. cm.

  ISBN 978-0-698-14110-0

  1. Insurgency—Fiction. 2. Drone aircraft—Fiction. 3. Sahara—Fiction.

  I. Title.

  PS3613.A284327B58 2014 2014027615

  813'.6—dc23

  This is a work of fiction. Names, characters, places, and incidents either are the product of the author’s imagination or are used fictitiously, and any resemblance to actual persons, living or dead, businesses, companies, events, or locales is entirely coincidental.

  Version_1

  For Angela, my wife

  Always.

  Everything.

  Knowledge is more than equivalent to force.

  —SAMUEL JOHNSON, The History of Rasselas, Prince of Abissinia, ch. xiii

  Contents

  TITLE PAGE

  COPYRIGHT

  DEDICATION

  EPIGRAPH

  MAP

  2015

  Chapter 1

  Chapter 2

  Chapter 3

  Chapter 4

  Chapter 5

  Chapter 6

  Chapter 7

  Chapter 8

  Chapter 9

  Chapter 10

  Chapter 11

  Chapter 12

  Chapter 13

  Chapter 14

  Chapter 15

  Chapter 16

  Chapter 17

  CELLA & TROY: 2003

  Chapter 18

  Chapter 19

  Chapter 20

  Chapter 21

  Chapter 22

  Chapter 23

  Chapter 24

  Chapter 25

  Chapter 26

  Chapter 27

  CELLA & TROY: 2009

  Chapter 28

  2015

  Chapter 29

  Chapter 30

  Chapter 31

  Chapter 32

  Chapter 33

  Chapter 34

  Chapter 35

  Chapter 36

  Chapter 37

  Chapter 38

  Chapter 39

  Chapter 40

  Chapter 41

  Chapter 42

  Chapter 43

  Chapter 44

  Chapter 45

  Chapter 46

  Chapter 47

  Chapter 48

  Chapter 49

  Chapter 50

  Chapter 51

  Chapter 52

  Chapter 53

  Chapter 54

  Chapter 55

  Chapter 56

  Chapter 57

  Chapter 58

  Chapter 59

  Chapter 60

  Chapter 61

  Chapter 62

  Chapter 63

  Chapter 64

  Chapter 65

  Chapter 66

  ABBREVIATIONS AND ACRONYMS

  DRONE AND OTHER SYSTEMS

  AUTHOR’S NOTE

  ACKNOWLEDGMENTS

  2015

  1

  Maputo International Airport

  Maputo, Mozambique

  1 May

  The gusting wind battered Troy Pearce’s bearded face. He didn’t care. It kept the humidity low and the stink of jet fuel at bay while he and Johnny Paloma finished loading up the last of the gear into a rented Toyota Land Cruiser pickup. They had two drone contracts to fulfill this trip.

  Johnny hardly said a word. Unusual for the former LAPD detective.

  “Something on your mind?” Pearce asked. A pair of dark aviators hid his world-weary blue eyes.

  “Been meaning to ask you something.”

  “So why haven’t you?”

  “Seems like the last couple of weeks you haven’t been yourself.”

  More like a couple of months, Pearce thought. He didn’t think it showed.

  Even though Pearce was the CEO of his global contracting firm, he liked getting his hands dirty out in the field. Didn’t believe in leading from behind. He slammed the truck gate shut. “So ask.”

  “How about I run this first training consult by myself?”

  Pearce liked Johnny a lot. He was street smart and fearless, a real door buster. Proved his worth last year in the ops they ran against the Mexicans and Iranians. Since then, Johnny had picked up on the basic technical aspects of drone operations and proved himself a decent small unmanned aerial systems (sUAS) operator.

  Pearce Systems specialized in drone operations. Their first gig this week was an sUAS delivery and training consult with Sandra Gallez and the World Wildlife Alliance. Four days from now, they would deliver a security package to the South African special forces training center at Fort Scorpio.

  For the first time in a while, Pearce smiled. “You want that Gallez woman all to yourself.”

  “She’s a friend, that’s all. I just think I’m ready to lead the training. Don’t need you to wet-nurse me.”

  Sandra Gallez had flown up to Addis to sign the WWA contract three months before. The two of them obviously hit it off.

  “I call bullshit.” Pearce saw the way he looked at her when she came into their office.

  “We’ve stayed in touch.” Johnny grinned. “By phone, mostly.”

  Pearce couldn’t blame him. The Belgian wildlife conservationist was a real looker, and bright. It was a good match.

  “Maybe it is time you took point.” Pearce tossed him the truck keys. “No point in wasting that picnic basket, either.” He’d seen Johnny sneak it into the pickup that morning. “Unless you packed it for me.”

  Johnny smiled. “Not exactly.”

  “I’ll secure the Aviocar.”

  Pearce was glad to let Johnny do the training. Their destination today was the Great Limpopo Transfrontier Park, but Lake Massingir bordered the wilderness reserve. Pearce had fished all of his life, all over the world. He thought he wouldn’t get a chance to bait a hook this trip, but now Johnny made that possible. Maybe things were looking up after all.

  He headed back into the rented hangar. Pearce and Johnny had arrived with Dr. Rao’s shipment last night from Addis in the Pearce Systems C-212 Aviocar, a boxy, top-winged, twin-propped STOL cargo plane. Pearce was doing most of his own flying these days now that his personal pilot, Judy Hopper, was gone.

  The South African equipment was stowed away in a secret, locked compartment under the deck. Pearce shut and locked the plane’s cargo door, then shut and locked the hangar doors. Determined thieves could still break in, but he hired an armed security service to keep an eye on things while they w
ere in the field.

  Pearce climbed into the truck cab on the passenger side. The a/c was blowing good and cold.

  Johnny checked the map on his satellite phone. Didn’t look at Pearce.

  “You see those two jokers in the silver Mercedes G-Class, by the fence?”

  “They picked us up back at the hotel an hour ago,” Pearce said.

  “You could’ve said something.”

  “How’d you manage to survive in LA with eyes like yours?”

  “High-capacity magazines.” Johnny chambered a round into his Glock 19 pistol. “Any idea who they are?”

  “SVR. Russian intelligence service.”

  “What do you think they want?”

  “My head.” Pearce had killed Ambassador Britnev for masterminding the plot that murdered President Myers’s son last year and nearly drew the United States into a shooting war with the Russians.

  “I thought you got away clean on that one.”

  “So did I.”

  “What do you want to do?”

  “They had a clear shot at me. So taking me out isn’t the objective.”

  “An exfil back to the Motherland? They must be really pissed.”

  “Britnev was a douche bag, but he was their douche bag.”

  “Two against two. We can take them.”

  “Too risky.”

  “Got a better idea?”

  “I always liked the G-Class. Reminds me of a Tonka truck.” Pearce pulled out his smartphone. “Let’s roll.”

  Johnny pulled away from the hangar and through the fence gate, heading for the road exiting the airport. The boxy German SUV sat tight as Johnny passed by their parking place, just as Pearce instructed.

  By the time Johnny cleared the airport, the Mercedes was in his rearview mirror, keeping a discreet distance.

  “The driver’s good,” Johnny said.

  Pearce tapped keys on his phone screen. “The SVR only sends the best. They won’t try anything until we’ve cleared the city.”

  —

  Thirty minutes outside of Maputo, traffic disappeared. The highway was an empty straight line for miles. The silver Mercedes glinted in Johnny’s rearview mirror a mile back. Couldn’t miss it.

  “That G-Class AMG is a sweet ride,” Johnny said. “Hundred thirty grand plus, just to drive it off the lot.”

  “It’s an amazing piece of technology. All the latest bells and whistles.”

  “Ready?” Pearce asked.

  Johnny smiled. “Say the word.”

  “Red-line it,” Pearce said.

  “God, I love this job.” Johnny mashed the gas pedal to the floorboard.

  The Toyota rocketed forward, but the straight-six engine was topping out at 180 kph. Not good enough.

  Pearce glanced in the side mirror. “He’s coming on, fast.”

  The Mercedes’s thundering 5.5-liter turbocharged V-8 was still accelerating. They were just a quarter mile back.

  Shooting distance.

  Pearce tapped his phone screen, capturing the Mercedes Distronic Plus radar-controlled cruise control. Ran his finger along a slider. Told the radar unit that an object was just one inch away from the Mercedes’s front bumper.

  The power disc brakes locked. Pads and rotors screamed.

  The big Mercedes tumbled end over end on the asphalt, glass flying, steel crunching, doors exploding. On the third rotation, a body flew out, cartwheeling on the asphalt. Four more devastating rotations, and the crumpled Mercedes finally landed in a shattered heap on the side of the road.

  “How’d you manage that?” Johnny asked. He pulled his foot off of the gas pedal, dropping back down to the legal speed limit.

  “Pirated his Bluetooth back at the parking lot.”

  Johnny chuckled. “Technology’s a bitch.”

  Pearce powered down his smartphone. “Let’s go find your girl.”

  2

  CIOS Corporate Offices

  Rockville, Maryland

  1 May

  She was there at the beginning, when the U.S. government first weaponized the Internet. In fact, she had loaded some of the first rounds into the cylinder and cocked the hammer.

  Jasmine Bath was twenty-four years old when she earned her M.S. in computer science from UC Berkeley, one of the first recruits into the NSA’s Office of Tailored Access Operations (TAO) program. They started her at Fort Meade but moved her around, grooming her for bigger things. She was a software specialist but became familiar with hardware operations, too. She helped write some of the first coding for the NSA’s pervasive XKEYSCORE surveillance software before moving up into senior development positions within TAO’s aggressive counterintelligence ANT program. Her coding fingerprints were all over persistent software implants like JETPLOW (firewall firmware), HEADWATER (software backdoors), and SOMBERKNAVE (wireless Internet traffic rerouting). Those successes earned her multiple commendations and promotions, leading to training and supervisory positions in newly developed TAO sites in Hawaii, Texas, Colorado, and even the Dagger Complex in Germany.

  That meant the vast resources of the NSA were entirely at her disposal. She now had access to TAO’s shadow networks of servers and routers, used for covertly hijacking or herding unsuspecting Internet traffic through them. It was the Internet equivalent of the CIA opening up a cell phone store in Abbottabad and secretly selling supposedly untraceable burner phones to al-Qaeda terrorists.

  With the help of the CIA, FBI, and other national security agencies, TAO also planted hardware and software bugs and malware in electronic devices manufactured around the globe—including memory chips, hard drives, motherboards and cell phone cameras, to name just a few—to gain access to their data.

  TAO also remotely implanted software bugs and malware into network firewalls and security software programs, allowing the NSA to back-door more malware into, and harvest data out of, entire computer networks or individual computers, tablets, and phones. They even had their own manufacturing facilities, producing comprised keyboards, monitors, routers, and connector cables that secretly transmitted user data. The NSA also operated mirrored cell phone base stations that acted like legitimate cell phone towers, secretly capturing entire networks of cell phone users without their knowledge.

  In short, nearly every kind of commercially produced electronic device had been compromised, infected, and harnessed to TAO purposes, allowing them to hear, see, or read virtually any data-capable device on the planet without the knowledge of either the users or manufacturers. Best of all, these devices, once installed, remained in place, continuously harvesting data for future NSA use—data that Bath still had access to as well.

  But that wasn’t all.

  The NSA and its sister agencies successfully compromised nearly every social networking site on the planet. They even penetrated the “Dark Web,” where criminal and terrorist activity supposedly occurred without public knowledge or government interference.

  The NSA also created hundreds of fake jihadist, anarchist, and terrorist websites, blogs, and Twitter accounts in order to gather data from unsuspecting users, identify new suspects, compromise those individuals and organizations, and plant false data into hostile communities. They operated cybercafés around the world, offering free Internet access to unsuspecting users, not unlike the CIA conduct of fake vaccination campaigns to harvest DNA data on terror suspects. Conservative politicians who supported intrusive surveillance activities never realized that certain security agencies had also created virtual “Honey Pot” websites in order to draw out the most extremist elements within Tea Party, nationalist, constitutionalist, and “prepper” circles.

  Jasmine Bath had access to all of these fake portals as well.

  With all of these weapons in hand, Jasmine Bath could find out just about anything about anybody, or plant credible false evidence against any person. That ga
ve her the kind of power that state security agencies had sought since the time of the pharaohs but could only dream of.

  And that’s when she quit.

  Bath’s extensive experience and exposure gave her a big-picture overview of the NSA’s far-reaching capabilities and boundless resources. It also allowed her to secretly pocket a number of keys she would later use to pick her own locks at her former employer, which she would use to form her new company, CIOS. In effect, she used the NSA’s resources against them in order to exploit the NSA as her own spying agency. Who watches the watchers? Jasmine Bath does, she’d joke. She spied on the spies—or, more accurately, spied through the spies—without their even knowing it.

  With her top-security clearances, impeccable credentials, and agency contacts, she acquired several legitimate NSA contracts for CIOS just hours after tendering her resignation. But the real money to be made had nothing to do with honest work. She knew her unparalleled ability to find or fake information on virtually anybody, anywhere, would pry open the deepest wallets in Washington.

  She felt no guilt. She lost count of the number of “false flag” operations governments around the world—including her own—had used to start wars in the last forty years, or the lies told by politicians, bureaucrats, and advocacy groups to justify radically new domestic policy agendas. Venerable science journals and prestigious research institutions were plagued with falsified data in the scramble for federal grants and venture-capital investments. Bath just wanted her piece of the pie.

  All she lacked was the funding to launch the venture. But she didn’t have long to wait. A silent investor approached her and offered her unfettered control of her company. In exchange for no-strings-attached financing came his quid pro quo of no questions asked, and in turn, she was to be available when called upon, which would be both rare and remunerative.

  The silent investor’s name, she would discover much later after proving herself to him, was startling. One of the true power brokers in Washington. His connections provided her with all the cover she would ever need should her formidable defenses ever fail. Owing to his preeminence in her corporate life, she always referred to him as The Angel.

  3

 

‹ Prev