Trojan Horse

Home > Other > Trojan Horse > Page 11
Trojan Horse Page 11

by Mark Russinovich


  Feng sat back and lit another cigarette as he waited for his stomach to calm. All that work and then this guy comes along. He shook his head. Life just wasn’t fair.

  15

  PRAGUE 3, CZECH REPUBLIC

  TABORITSKA 5

  1:43 P.M. CET

  Ahmed skipped class that morning. He was too tired to feign interest.

  The blond Czech girl had exceeded his expectations in bed. He consistently found these Western women to be amazing. The only part of the experience he’d found unpleasant was discovering the large tattoo across her lower back bearing the name of an old boyfriend. Why did these women insist on marking themselves? And with a throwaway relationship? It was disgusting.

  He showered, bundled the sheets and clothing to be washed later, then made breakfast. He lit his first cigarette of the day as he opened his net-book. He browsed several minutes, then promptly at 2:00 p.m. went to a Web site he entered from memory. It was down. He waited, then refreshed his browser. Still down. He waited a full minute this time, then refreshed again. There it was.

  A porn site. He liked the pictures. He wanted to meet the man behind them someday as their taste was identical. But he wasn’t here for that. In the lower left-hand corner of the page was a small link in the form of a pulsating green ball. He clicked and it took him to a forum, or rather what was laid out like a forum. He hit his print tab and a small, fast printer clicked to life. In less than a minute, the forum was in hard copy. As he started to back out of the page to take another look at the pictures the Web site went down. He’d just made it.

  Ahmed turned off the printer and computer, removed the pages, and moved to the small table to analyze them. He glanced at the calendar. It was the fourth month in the cycle so he went to the fourth entry on the forum. It was the eighth day. He went down eight lines. The line read, “. . . real? I think the babes are hot, hot, hot. I think you should post at least six new photos every . . .”

  The number then was “six.” He moved his finger to the bottom of the forum, then carefully counted up six lines. He read, “. . . set up with phones for talk. I’d love to spend five hot minutes with . . .”

  Phone. He straightened. Now that was something. He’d never been ordered to phone before—never.

  Ahmed dressed, taking time to look good, pocketed cash from his dresser, retrieved a fresh pack of cigarettes, slung his backpack over his shoulder, then went for a walk. He stopped once for a coffee and studied the foot traffic from the way he’d come and spotted nothing. He went to a marketplace, wandered aimlessly, twice checking surreptitiously by pausing at windows and using their reflection. He emerged on the far side, then sat for more coffee and a cigarette. Again, he saw no familiar faces.

  He’d expected none. He’d done nothing to attract interest since coming to Prague. He’d been very careful. Next, he took several short back streets, stopping again at a coffee shop he’d never been to for a sweet roll. He sat and ate, scanned back the way he’d come. He lit a cigarette and watched. Nothing.

  Such caution had been ingrained in him before coming to Prague and Hamid reminded him during every visit to keep his guard up. The Crusader was everywhere and no one could be trusted. Not that there was anything special about him to attract attention. He went to his classes and was an attentive student. To the extent possible, he made his trips over long weekends in what would be the normal pattern for a student. He still visited some of the trendy nightclubs, especially when Saliha was out of town. It was best to appear secular.

  He finished his cigarette and set off casually, shifting his backpack to his other shoulder as he once again scanned a narrow alley. Still nothing. He walked briskly to a small mall and went directly to a kiosk where he bought a phone and supply of minutes, paying in cash. Afterward, he made his way to Letna Park with its famous beer garden. Here he could sit alone on the grass well away from any pathway and observe the expanse all about him. A couple was taking in the spring sunshine but they were folding up their blanket when he sat down. Once they were gone he punched in the number.

  Whoever he’d reached answered at once. It was a one-way conversation. Ahmed listened closely, locking the information into his memory, thinking he could detect Hamid’s voice at the other end but wasn’t certain. The man was a chameleon. The caller disconnected without pleasantries.

  Ahmed rose and walked out of the park. Along the way he removed the SIM card, then took the extra precaution of dismantling the phone itself. He discarded the bits and pieces at various trash receptacles. As he crossed the bridge, he dropped the SIM card into the slow-moving waters of the Vltava River.

  He made his way across town, stopping twice, once for a soft drink, but primarily to check his trail. Nothing.

  He found the apartment building in an alleyway, one used by pedestrians. He’d told Karim to rent a place where he could blend in and the man had done a good job. There wasn’t a native Czech in sight. On the third floor, Ahmed used the key he’d been given, then entered the tiny room. Karim was out. No surprise. He didn’t get off work until five. Ahmed sat to wait patiently for the man to return, slowly working his way through his pack of cigarettes.

  16

  LANGLEY, VIRGINIA

  CIA HEADQUARTERS

  EASTERN MEDITERRANEAN BUREAU

  3:56 P.M. EST

  I want to advise you,” Frank Renkin said, “that we’ve got a very effective word-processing-based Trojan and as it potentially involves your area you should know about it.” As assistant director of Counter Cyber Research, he was responsible for informing the appropriate chiefs whenever anything came across his desk that might be of concern to their area.

  Agnes Edinfield was chief of the Eastern Mediterranean Bureau in the Company. She was in her forties, fit if perhaps a bit overweight with short dark hair and dressed in a well-tailored dark pinstriped business suit. Though she had strong features she was a handsome woman.

  “Which country?” she asked.

  “Likely Iran—one way or another.” Frank gave her a brief summary of what he knew, the gist of which was that it appeared that the UNOG report they’d been anticipating on the Iranian nuclear weapons program had been doctored by means of the Trojan.

  Everyone involved knew the significance of the report. After stalling for more than a decade the United Nations had finally indicated it was prepared to move. Frank understood that a source had, for its own reasons, elected to leak critical documents directly to the United Nations Office for Disarmament Affairs in Geneva. The information detailed the groundwork for concerted military action against the mullahs had already been anticipated.

  “What changes?” she asked.

  “We understand this was to be the final draft. The report is scheduled for release tomorrow. Now we learn that it has been altered to say there is no prospect of an imminent nuclear test.”

  Edinfield grimaced. “Altered, you say?” Frank nodded slowly. “I take this as confirmation,” she continued, “if any was needed, that UNOG’s source had it right.”

  Iran already possessed a midrange missile delivery system and was not that far from a long-range system that would extend their nuclear threat into Western Europe. The mere existence of such a system would profoundly alter the European Union’s position toward Iran and Israel. The immediacy of an actual nuclear test was the most vital problem either of them faced. Frank was not free to disclose it to her but the first test was reportedly in just two weeks. The Iranians had made remarkable progress since bringing their new computers online and establishing an air gap to protect them from Stuxnet. If nothing was done, all indications were that they’d be a nuclear power before the end of the month.

  “We’ve not seen anything previously resembling this Trojan,” Frank continued. “It’s not like the infected PDF files we encountered before. In its own way, it’s as sophisticated as Stuxnet. When you open an infected OW file, the Trojan enters the computer. There it uses an entirely new method to conceal itself. Very clever.” He omitted
the details. Edinfield would have no interest in them. “We’ve known this technique was coming for some time; now it’s here. It’s going to make our work much more difficult.”

  “I’m sorry to hear that. Where’s it originate from?”

  “We can’t confirm a source at this point. But its creator seems to be using it to try to influence events as the time comes for the release of this important report on the Iranian nuclear program. This is very clean stuff, Agnes, unlike almost everything we’ve seen and my people tell me that in their opinion it’s beyond the ability of the Iranian government. All of their computer expertise is dedicated to the nuclear weapons program and to combating the Stuxnet variants that continue to significantly hinder them.”

  “How did this come to your attention?”

  Frank brightened. “As I said, according to the author of the final draft of the UNOG report, his document was altered.”

  Edinfield thought for a moment. “Can you do that?”

  “Not without leaving tracks. In this case there are none.”

  “I suppose he could be lying.”

  “We’ll know soon enough. I’ve printed you copies of the original report, as the author says he sent it, and the one with the changes he denies making.” He laid them on her desk and Edinfield pulled them to her. “I had the changes analyzed. They systematically water down the report and finally give it a different conclusion altogether. They aren’t alterations you can dash off in a minute. It took talent and real effort, as well as a very sophisticated Trojan, though we’ve still not cracked the core of what it does. We’re just working around the fringes. I don’t know how events will play out at UNOG. So far this is tightly held information but that won’t last long.”

  “Good job. Let me know what you learn when you can. By the way, where did you get the info?” Edinfield asked. The source of such information often told her a great deal and was always something useful to know.

  “Daryl Haugen alerted us. We got lucky. The virus had a bug that caused OfficeWorks to crash, which alerted the IT staff and prompted their investigation. If that hadn’t happened, the altered document would be changing the course of events.”

  Edinfield paused as she searched her memory. “Dr. Haugen? The one who worked for the National Security Agency?”

  “That’s her.”

  Edinfield thought a moment. She’d been involved in blunting, nearly stopping, the Al Qaeda cyber-attack on the West not that long ago. A great job all around, one the Company should have done, not an outsider. Then more of the story returned. “Didn’t she leave the NSA and go to work with Jeff Aiken?”

  “They have a company, yes. The British Foreign Office brought Jeff in to troubleshoot this and they turned up the Trojan. Daryl has been working with him remotely and gave me a heads-up, passing along the code once it was identified.”

  “I’ll have my people check into this from our side. Maybe there’s been some chatter that will be useful to you. Thanks for coming.”

  Frank rose and went back to his office, feeling utterly exhausted. His team was getting to the heart of the Trojan, he was certain, but he still had a long night ahead of him. At his office, he instructed his assistant there were to be no interruptions for an hour. Inside, he stretched out on his couch, wondering briefly when he’d next go home.

  DAY FIVE

  MONDAY, APRIL 13

  INTERNATIONAL PC REVIEW MAGAZINE

  CYBER WARFARE, THE NEW BATTLEGROUND

  April 13 10:30 A.M.

  Palo Alto—The digital penetration of an adversary’s computers is now a reality. Every major country uses computer malware for espionage. It allows them to gather intelligence more easily, quickly and cheaply than do traditional methods. But the line between digital espionage and cyber warfare has become blurred as nations have come to understand that such malware can be repurposed for interference, disruption and attack.

  The continuing success of the Stuxnet virus against the Iranian nuclear weapons program has introduced a new age in warfare according to experts. “Stuxnet is a game changer,” says Reginald Bradshaw, a London cyber warfare simulation specialist. “From the date of its introduction the modern world has never been the same. It’s the digital equivalent of the machine gun or artillery.” A better comparison might be the nuclear bomb because a concentrated Stuxnet-style attack has the potential to destroy a nation’s industrial capacity, according to a yet to be released UK Whitehall report.

  Until now viruses, Trojans and worms attacked the data within computers. These assaults have been designed to learn what the owners wanted kept private. In many cases financial information is obtained to allow the looting of bank accounts. But now highly sophisticated malware commands industrial machinery to self-destruct, in effect to commit suicide. The consequences can be catastrophic especially if the machinery is part of a nation’s infrastructure or national defense network.

  In response to this heightened threat every major country now commits resources to counter measures. The United States has the US Cyber Command, or USCYBERCOM, a part of the US Strategic Command. It is the umbrella organization for all existing U.S. military cyber warfare operations. Significantly, it has both a defensive and offensive capability. “The Americans are no longer strictly playing defense,” Bradshaw says. “They’ve moved into offensive operations. These will be the most secretive in history as deniability is the hallmark of such attacks.”

  It is not too far-fetched, Bradshaw muses, to see a day when one nation will attack another through the Internet and in so doing deliver a knockout blow. “I anticipate seeing that within my lifetime,” the forty-three year-old cyber expert says.

  For more information, visit Leslie Washington-Tone.com.

  17

  MANNHEIM, GERMANY

  FROHE ARBEIT 20

  2:19 A.M. CET

  Ahmed eased the Volkswagen Jetta down the street as Karim examined the passing houses carefully, searching for the address in the darkness. Ahmed was concerned that their actions go smoothly, especially at this hour. If they were forced to drive too often up and down this deserted street, someone would surely call the police.

  “There,” Karim said. “That’s it.”

  Ahmed drove to the side and came to a stop. “Don’t take long,” he cautioned. “I’ll drive once around the block. Be here when I return.”

  Karim eased out of the car, tossed his cigarette into the gutter, closed the door quietly behind him, and set off across the yard to the side of the house where Ali lived. Ahmed put the car back in gear and drove away as slowly as he dared, and made a succession of right turns down equally deserted streets before returning to the same spot.

  No one.

  He sat with the engine idling, wondering if he should make another circuit. He lit a cigarette to buy time. Hamid had drummed it into his head repeatedly that operations and agents were undone by just such stupid incidents. It was situations like this that drew the attention of the authorities. As he pondered what to do, knowing he had to make a decision at once, two figures emerged from the shadows.

  Karim slipped into the front seat. “Salam,” Ali said, taking a place in the rear, placing a small overnight bag next to him. A wave of cold air swept in with them.

  “Salam,” Ahmed answered. He then drove off with a sense of relief, turning the heater up slightly. Karim opened a fresh packet of cigarettes, turning to hand one to Ali.

  Since meeting Karim, it had been a busy six hours. They’d left his apartment and walked to the car lockup around the corner where the gray Volkswagen Jetta was kept for such occasions. Every few months, the vehicle was replaced. One of Karim’s responsibilities was to see to that and keep the car serviced and gassed. Once a week, he ran the engine for half an hour and checked the tire pressure.

  The car had started at once and Ahmed had been pleased to see a full tank of petrol. He drove cautiously out of Prague, initially confused as usual by the heavy traffic, the lights, and complicated cross streets. Once on
the E50, however, the traffic thinned, the drivers became more predictable. Thereafter the trip went smoothly.

  On the way to Mannheim, Karim briefed Ahmed on his recent activities. He maintained a ring of agents in northern Germany. He supervised recruitment from various sympathetic mosques, arranging training and for providing the cash so essential to such networks.

  His personal life certainly lacked excitement, and that, Ahmed reminded himself, was good. Boring was safe. It was important they remain in the shadows. Karim worked as a waiter in a restaurant that specialized in, of all things, American food for American tourists. He had no girlfriend, not wanting to risk a relationship with anyone, but he confided that once a week he went to a brothel where he spent time with the same Ukrainian whore.

  “I would not marry her, of course,” he said, “but for a whore she is very sweet, and most agreeable.”

  The two agents could not have looked more different. Karim was a slender man, quick and alert, whereas Ali was large, over six feet tall, and heavy. His network, with identical duties, extended throughout southern Germany. In fact, their primary function was to create and maintain their networks until the day when Hamid set an operation in motion.

  Ali had worked a time at the Daimler AG factory, building diesel engines. But his necessary trips proved too frequent to continue a job with such steady hours. Now he was working as a handyman for several rich Jews. He found that amusing.

  Though they passed close to the Swiss border, Ahmed stayed within the EU to avoid passport controls as long as possible. The longer they were out of the Swiss security computer system, the better. He didn’t drive often. He enjoyed the sensation of the car, the calming drone of the engine, the muted whine of the tires on the smooth surface. They were moving across space in this comfortable cocoon. From time to time, he took, in the enormity of the road system, considered the opulence that made it possible, and wondered how much would remain in the promised caliphate. He wondered if he’d live to see it. He certainly hoped so. He hadn’t joined Iranian intelligence to die for a cause. He was content to leave that to others.

 

‹ Prev