Tom Clancy Enemy Contact - Mike Maden Read online

Page 10


  “So basically we’re cops who are going to break into the mayor’s office so that he keeps putting cops on the city payroll.”

  “Or, ideally, hires even more. Anyway, that’s why I wanted to talk to you about the next Red Team attack. Where are we on the PassPrint program?”

  Watson was referring to the CloudServe research program Fung was heading up, using AI to create a master “passkey” of AI-generated fingerprints.

  In theory, every human fingerprint was unique, and in theory, only the human possessing the unique fingerprint could pass through a biometric screener. The intelligence community had fully embraced biometric security, and their fingerprint scanners were top-drawer.

  However, a couple flaws existed in every biometric scanner, even the high-dollar ones favored by the federal government, including the one on Watson’s desk.

  Just like computer virus scanners, fingerprint scanners worked by comparing data inputs—a finger placed on a screen now compared against a known database of fingerprints. If the new scan matched the prints on record, entrance was granted.

  The problem was that most people didn’t provide complete fingerprint scans for the database for all kinds of reasons, most of them human error, such as oily fingers or dirty recording glass. The same was true on the other end, too: Oily fingers and dirty scanner glass on security machines read only partial prints.

  Therefore, all biometric scanners were only able to compare partial prints to partial prints.

  It also turned out that while every complete human fingerprint was unique, portions of every fingerprint—arches, tents, whorls—were startlingly similar.

  The Red Team decided to try to exploit these flaws by designing an AI-driven program that built millions of fake fingerprints into a single master passkey, not unlike the ones maids used to enter hotel rooms, even though each door lock had a unique passcode. By generating enough digital arches, tents, and whorls, the PassPrint passkey would display enough fingerprint similarities to fool any biometric system.

  “I just ran the last of the simulations last night,” Fung said. He smiled. “I think we have a winner on our hands.”

  “That’s fantastic. Because I think I know the perfect way to deploy it.”

  21

  Deploy the PassPrint how?” Fung asked.

  “When I was at the Fort Meade conference with Foley, there was an analyst, Steve Hilton. Very quiet, very smart. He’s the IT director at the Department of the Treasury’s Office of Intelligence and Analysis. We struck up a conversation over coffee and he happened to mention his department needed a new printer, but there was some snafu in the paperwork and it wouldn’t arrive for another two weeks.”

  Fung shrugged, irritated. Is there a point to your stupid story? “Okay.”

  “I want to put a worm on his wireless printer that will jump from there to his computer.”

  “How? The Feds have bulletproofed their wireless devices.” Fung frowned. “But you already know that.”

  Watson accepted the compliment with her own shy smile.

  In her first meetings with Foley and the IC Cloud committee, Watson pointed out the unbelievable fact that throughout the federal government there was no comprehensive program in place to ensure that civilian or military systems didn’t contain integrated circuits with malicious functionality. American combat jets could be firing missiles at Chinese fighters with microchips designed by the PLA—and designed to fail. These malicious integrated circuits, if they existed, could be installed anywhere, including combat systems, medical devices, communication networks, and, of course, the computers used throughout the intelligence community.

  As seemingly insurmountable as that problem was, Watson was even more concerned about the fact that there were literally millions of devices throughout federal government offices with the potential for spying applications.

  The federal government didn’t manufacture the everyday devices required to run a modern office. Printers, phones, computer monitors, HVAC thermostats, and other commercial off-the-shelf (COTS) devices were manufactured and distributed by thousands of private vendors. Many, if not most, were not only manufactured overseas, but contained software or firmware created without any kind of security protocols.

  Worse, most of these machines were created to function wirelessly, not only for automated “machine-to-machine” software and firmware updates, but also for energy and work efficiencies.

  Globally, the so-called Internet of Things (IoT) comprised more than twenty billion devices, and that number increased exponentially each year. Millions were already in operation in the United States. Many of these IoT devices might already be compromised by foreign actors with bad intent.

  Watson had no solution to the first problem of compromised integrated circuits; she learned later that DARPA was launching the TRUST in integrated circuits program to address it.

  But Watson did have a very practical solution for the IC regarding the problem of a compromised IoT—get rid of every device and start over with certified equipment protected by IoT security protocols. It was an expensive solution, but far cheaper than the cost of a compromised intelligence community.

  Foley agreed, and under her leadership, closed-door congressional budget committees were dragged across the finish line and the costly cleanup process nearly completed.

  In short, it was impossible for Watson’s IoT worm attack to succeed.

  Or was it?

  “‘Bulletproofed’ is exactly what I’m talking about,” Watson said. “Foley and her people think that the IoT problem is solved now. That means they’re not looking in that direction, so that’s where I want to hit them.”

  “How? Every federal vendor is registered and must pass through their biometric security system. It isn’t possible unless—oh, snap.” Fung grinned. “Our guy will use the PassPrint device to get past security.”

  “Exactly. And with the compromised printer in place, we can count on Mr. Hilton to hand-deliver our worm into their system.”

  “After it’s in his computer, the worm could go anywhere in the building, and, hell, after that, the entire IC. God, I love it.”

  He really did. The spy stuff gave him a real boner. It was why he loved this job. Better still, Watson clearly wasn’t sniffing him out for anything suspicious. It was like she was describing the tantric sex the two of them were going to have that night without her realizing he was already sleeping with her boyfriend.

  Awesome.

  Watson added, “I know it’s a long shot and there are a lot of moving parts, but if we can pull this off, we’ll nail that new multiyear contract with the Feds we’ve been angling for.”

  “This is so very John le Carré of you. I’m impressed.”

  “Thank you.”

  Fung rose. “I’ll get right on it.” He turned to leave, eager to jump into a project that he could get excited about and dodging a bullet all at the same time.

  “Oh, wait,” Watson said. “There’s just one more thing.”

  Fung turned around, grinning. “Yes?”

  “I was lying in bed last night and it suddenly occurred to me that there’s an issue we never got resolved. I came in early this morning and looked at my notes and I don’t see a conclusion.”

  “What issue is that?”

  “We talked about an exploit that we thought might have existed in the CIA comms terminal at the NRO.” Watson frowned. “If someone broke into that terminal, they would have eyes on every piece of secured intel throughout the IC. It would be another disaster.”

  By “another disaster,” Watson was referring to the breach several years prior of the CIA’s Internet-based secure comms program in Iran. It had been compromised by a double agent and, of all things, a simple Google search. A similar breach occurred in the same system deployed in China. Agents, assets, and networks were rolled up in both countries before an
yone knew what had happened, putting all global clandestine operations at risk. A number of invaluable in-country assets were either imprisoned or killed as a result, undoing decades of fieldcraft.

  The Feds abandoned the flawed Internet-based system and instead put laser focus on securing all IC communications behind the impenetrable IC Cloud.

  If that system were subsequently breached?

  “Yeah, a disaster for sure,” Fung echoed, his mind racing as fast as his heart.

  But panic was the mind killer, and his mind was his best weapon. He took a deep breath through his nose, willing his heartbeat to slow.

  Think, damn it!

  Does she know? Is she just fishing? Testing my response? Trying to get me to confess?

  No. If she knew anything for sure, I’d already be in handcuffs. Hanlon’s razor applies here, or Occam’s.

  After all, she was the one who pointed out the flaw to me—it’s how I found it in the first place, and exploited it. She raised it before, and now she wants to close the books on it, that’s all.

  “Oh, that’s right. I remember now. We thought there was a problem in the code that would have allowed an external machine to read into the mirroring function. I double-checked it. There wasn’t a problem. The security protocol was just in a different part of the script.”

  “Did you test it?”

  “Yes.”

  “How? You can’t access the NRO machine remotely. Did you go out to Virginia?”

  “No. I was too under the gun around here for that. I just uploaded the code into one of our simulators here on premises and tried to break into it from my workstation. Couldn’t do it.”

  “You think that’s good enough?”

  “I’d bet my life on it.”

  “Whew. That takes a load off. I’ll make a note in my records. Thanks for taking care of that.”

  Fung shrugged. “It’s my job.”

  Watson leaned back in her chair. “You really are always one step ahead, aren’t you?”

  Fung smiled. “I try, boss. I try.”

  22

  SAINT PETERSBURG, RUSSIA

  The port of Saint Petersburg was a twenty-four-hour-a-day operation, the busiest commercial terminal on the Gulf of Finland, feeding into the Baltic Sea.

  At some sixty million tons of cargo a year, Saint Petersburg was also one of Russia’s busiest ports, but with a variety of Western embargoes in place, that wasn’t saying much these days. Rotterdam—Europe’s busiest port—serviced nearly seven times as much. Saint Petersburg hosted all kinds of shipping traffic, including big cruise liners, tankers, and RoRo ships. But container ships and their standardized intermodal containers made up the bulk of operations.

  The big steel boxes had revolutionized commercial shipping traffic, expediting loading and unloading from ships to trucks by many orders of magnitude. That was the reason more than twenty million containers were in service around the globe.

  Thousands of them were neatly stacked and organized according to ship destination in the first cargo area of the Saint Petersburg harbor. But tonight there was only one intermodal container that Officer Sergei Burutin was worried about.

  The one right in front of him.

  Burutin was perched on top of a rolling ladder. The container in question was the second of three in a stack eight meters high in one of the four orderly rows demarcated by a numbered yellow line. The thousands of multicolored stacks of steel containers all across the first cargo area were similarly organized and all precisely arranged like a giant English garden maze. Each intermodal container bore an ISO code—the international standardized letter and numbering system identifying country of origin, container type, owner/operator, serial number, and check digit.

  The still night air was chill and damp, the stars hidden behind a bank of low clouds bathed in the yellow glow of the port’s blazing sodium lamps. Men shouted over the din of rumbling cranes, clanging steel containers, and revving diesel engines at the busy facility.

  The anti-smuggling inspector checked his handheld RFID reader again and cast yet another glance back up at the overhead security camera—out of order for more than forty days now, according to the maintenance report he checked earlier.

  Strange.

  The camera covered operations for a thousand square meters of the staging area, an absolute necessity for his department, always seriously understaffed by the pencil pushers back in Moscow. He was new to this side of the port—in fact, this was his very first day of duty as a newly commissioned inspector—but he had a hard time believing they were any less concerned about the illegal transportation of chemicals, weapons, or persons in Saint Petersburg as they were back at the training academy.

  “Is there a problem, tovarich?” a man asked from down below.

  Burutin turned around. A large, bearded man in beige maritime coveralls and a light winter coat smiled broadly at him as he approached. A slightly built Asian man, ten years younger and half a head shorter, followed right behind him, similarly dressed.

  Burutin climbed down the ladder and shook the older man’s extended hand, lowering the pistol-gripped RFID reader by his side.

  “Name’s Voroshilov.” The bearded Russian threw a thumb over his shoulder, pointing at a rusty blue-and-white freighter docked a hundred meters behind him. It rode high in the water, its first container not yet loaded. “I’m the captain of the Baltic Princess.” He nodded to the Asian. “And this is my chief mate, Mr. Wu.”

  Wu nodded with a forced smile.

  The smooth-faced young inspector’s small hand was crushed in Voroshilov’s iron grip. He returned the same as best he could. “Sergei Burutin, at your service.”

  “We haven’t met before,” the captain said.

  “It’s my first day on the job.”

  “In Saint Petersburg?”

  Burutin squared his shoulders, trying to hide his insecurity. “Anywhere.”

  “Congratulations. It’s an important job.”

  “Thank you.”

  “Where is Oleg? He’s supposed to be on duty tonight.”

  “Officer Konev called in sick earlier. I’m his substitute.”

  “Oleg is a good man. Keeps things moving around here.”

  “I’ve never met him.” Konev was out with a hangover, according to one of his comrades back at the office. Not an unusual thing.

  The burly Russian captain wagged his head, thinking. Finally, he pointed up at a red steel container. “It looked as if you were having a problem with that container.”

  “Yes, as a matter of fact.”

  Burutin climbed back up the ladder. The lockbox on the double doors was padlocked, but the four vertical lock rods were not, as was customary. But one of the lock-rod handles was shut tight with an anti-terrorism supply chain device known as a CTPAT bolt. The certified bolt seal was embedded with an RFID chip and set through the catches. The RFID chip contained all of the data needed to identify the interior contents, content origin, and destination.

  In most cases, the cargo shippers themselves installed and removed the CTPAT bolt seal in order to ensure accuracy and security in transit. But containers subject to legal inspection could be resealed only with new bolt seals and identified as such.

  Burutin flashed the RFID gun at the bolt seal again, then came back down and showed it to the Russian and chief officer. The RFID readout flashed another error message.

  “You see? The contents of this container don’t match my database.” The three of them were standing at the foot of the ladder.

  “What do you mean?”

  “This container was inspected by my department yesterday and bolt-sealed by us, but this is not the bolt seal that was attached yesterday, according to the reader. That’s illegal.”

  The chief officer pointed at the RFID device. “Perhaps your reader is malfunctioning.”

/>   “The error message indicates a problem, not that the reader is malfunctioning.”

  “I’m sure there’s an explanation. But I assure you, the contents are legally registered and the container was inspected by Oleg—excuse me, Officer Konev—and myself just yesterday.”

  “I’m sure you did. But that doesn’t alter the fact that the bolt seal has been changed.”

  “It couldn’t have been changed. I’m in charge of all cargo operations. I would know about it.”

  The inspector smiled thinly. It was just possible this was a test. He had heard of such things at the academy.

  “Yes, you would know about it, wouldn’t you? Still, I must insist we open the container and reinspect.”

  “There is no time for that. We’d have to wait for a forklift—if we can even find one; they’re all busy right now—take the stack apart, and pull out crates of machine parts that would each have to be inspected. It would take hours, and we’re due to begin loading in thirty minutes.”

  “I’m sorry, but the law is quite clear. That, or you leave the container behind.”

  “That wouldn’t be possible, either.” Voroshilov chuckled. “I see you have been well trained. And I respect that. I’m a licensed professional myself, and I take my cargo security seriously. Here, let me show you my credentials.”

  The Russian reached into his coat and pulled out a thick leather billfold and handed it to the inspector. Burutin opened it. On one side of the billfold was Voroshilov’s maritime license, with photo and rank and ratings. On the other side was a thick wad of large-denomination rubles. About a month’s worth of Burutin’s wages.

  “Everything look in order?” Voroshilov smiled broadly.

  The inspector glanced back at the wallet. He was newly married, living in a cramped one-bedroom apartment with his mother-in-law, who slept on the couch. The cash was very tempting, and no doubt more would follow if he cooperated on this occasion. Konev must have worked a sweetheart deal with this man a long time ago. Mafia, maybe? It didn’t matter. It’s not the way his father had raised him.

 

    Changing of the Guard Read onlineChanging of the GuardClear and Present Danger Read onlineClear and Present DangerHounds of Rome Read onlineHounds of RomeBreaking Point Read onlineBreaking PointTom Clancy's Jack Ryan Books 7-12 Read onlineTom Clancy's Jack Ryan Books 7-12Full Force and Effect Read onlineFull Force and EffectThe Archimedes Effect Read onlineThe Archimedes EffectCombat Ops Read onlineCombat OpsInto the Storm: On the Ground in Iraq Read onlineInto the Storm: On the Ground in IraqUnder Fire Read onlineUnder FirePoint of Impact Read onlinePoint of ImpactRed Rabbit Read onlineRed RabbitRainbow Six Read onlineRainbow SixThe Hunt for Red October Read onlineThe Hunt for Red OctoberThe Teeth of the Tiger Read onlineThe Teeth of the TigerConviction (2009) Read onlineConviction (2009)Battle Ready Read onlineBattle ReadyPatriot Games Read onlinePatriot GamesThe Sum of All Fears Read onlineThe Sum of All FearsFallout (2007) Read onlineFallout (2007)Red Storm Rising Read onlineRed Storm RisingThe Cardinal of the Kremlin Read onlineThe Cardinal of the KremlinExecutive Orders Read onlineExecutive OrdersLincoln, the unknown Read onlineLincoln, the unknownThreat Vector Read onlineThreat VectorThe Hunted Read onlineThe HuntedShadow Warriors: Inside the Special Forces Read onlineShadow Warriors: Inside the Special ForcesEnd Game Read onlineEnd GameSpecial Forces: A Guided Tour of U.S. Army Special Forces Read onlineSpecial Forces: A Guided Tour of U.S. Army Special ForcesLocked On Read onlineLocked OnLine of Sight Read onlineLine of SightTom Clancy Enemy Contact - Mike Maden Read onlineTom Clancy Enemy Contact - Mike MadenFighter Wing: A Guided Tour of an Air Force Combat Wing Read onlineFighter Wing: A Guided Tour of an Air Force Combat WingSpringboard Read onlineSpringboardLine of Sight - Mike Maden Read onlineLine of Sight - Mike MadenEndWar Read onlineEndWarDead or Alive Read onlineDead or AliveTom Clancy Support and Defend Read onlineTom Clancy Support and DefendCheckmate Read onlineCheckmateCommand Authority Read onlineCommand AuthorityCarrier: A Guided Tour of an Aircraft Carrier Read onlineCarrier: A Guided Tour of an Aircraft CarrierBlacklist Aftermath Read onlineBlacklist AftermathMarine: A Guided Tour of a Marine Expeditionary Unit Read onlineMarine: A Guided Tour of a Marine Expeditionary UnitCommander-In-Chief Read onlineCommander-In-ChiefArmored Cav: A Guided Tour of an Armored Cavalry Regiment Read onlineArmored Cav: A Guided Tour of an Armored Cavalry RegimentTom Clancy's Jack Ryan Books 1-6 Read onlineTom Clancy's Jack Ryan Books 1-6The Ultimate Escape Read onlineThe Ultimate EscapeAirborne: A Guided Tour of an Airborne Task Force Read onlineAirborne: A Guided Tour of an Airborne Task ForceDebt of Honor Read onlineDebt of HonorCyberspy Read onlineCyberspyPoint of Contact Read onlinePoint of ContactOperation Barracuda (2005) Read onlineOperation Barracuda (2005)Choke Point Read onlineChoke PointPower and Empire Read onlinePower and EmpireEvery Man a Tiger: The Gulf War Air Campaign Read onlineEvery Man a Tiger: The Gulf War Air CampaignEndgame (1998) Read onlineEndgame (1998)EndWar: The Missing Read onlineEndWar: The MissingSplinter Cell (2004) Read onlineSplinter Cell (2004)The Great Race Read onlineThe Great RaceTrue Faith and Allegiance Read onlineTrue Faith and AllegianceDeathworld Read onlineDeathworldGhost Recon (2008) Read onlineGhost Recon (2008)Duel Identity Read onlineDuel IdentityLine of Control o-8 Read onlineLine of Control o-8The Hunt for Red October jr-3 Read onlineThe Hunt for Red October jr-3Hidden Agendas nf-2 Read onlineHidden Agendas nf-2Acts of War oc-4 Read onlineActs of War oc-4Ruthless.Com pp-2 Read onlineRuthless.Com pp-2Night Moves Read onlineNight MovesThe Hounds of Rome - Mystery of a Fugitive Priest Read onlineThe Hounds of Rome - Mystery of a Fugitive PriestInto the Storm: On the Ground in Iraq sic-1 Read onlineInto the Storm: On the Ground in Iraq sic-1Threat Vector jrj-4 Read onlineThreat Vector jrj-4Combat Ops gr-2 Read onlineCombat Ops gr-2Virtual Vandals nfe-1 Read onlineVirtual Vandals nfe-1Runaways nfe-16 Read onlineRunaways nfe-16Marine: A Guided Tour of a Marine Expeditionary Unit tcml-4 Read onlineMarine: A Guided Tour of a Marine Expeditionary Unit tcml-4Shadow Warriors: Inside the Special Forces sic-3 Read onlineShadow Warriors: Inside the Special Forces sic-3Jack Ryan Books 1-6 Read onlineJack Ryan Books 1-6Cold Case nfe-15 Read onlineCold Case nfe-15Changing of the Guard nf-8 Read onlineChanging of the Guard nf-8Splinter Cell sc-1 Read onlineSplinter Cell sc-1Battle Ready sic-4 Read onlineBattle Ready sic-4The Bear and the Dragon jrao-11 Read onlineThe Bear and the Dragon jrao-11Fighter Wing: A Guided Tour of an Air Force Combat Wing tcml-3 Read onlineFighter Wing: A Guided Tour of an Air Force Combat Wing tcml-3Patriot Games jr-1 Read onlinePatriot Games jr-1Jack Ryan Books 7-12 Read onlineJack Ryan Books 7-12Mission of Honor o-9 Read onlineMission of Honor o-9Private Lives nfe-9 Read onlinePrivate Lives nfe-9Operation Barracuda sc-2 Read onlineOperation Barracuda sc-2Cold War pp-5 Read onlineCold War pp-5Point of Impact nf-5 Read onlinePoint of Impact nf-5Red Rabbit jr-9 Read onlineRed Rabbit jr-9The Deadliest Game nfe-2 Read onlineThe Deadliest Game nfe-2Springboard nf-9 Read onlineSpringboard nf-9Safe House nfe-10 Read onlineSafe House nfe-10EndWar e-1 Read onlineEndWar e-1Duel Identity nfe-12 Read onlineDuel Identity nfe-12Deathworld nfe-13 Read onlineDeathworld nfe-13Politika pp-1 Read onlinePolitika pp-1Rainbow Six jr-9 Read onlineRainbow Six jr-9Tom Clancy's Power Plays 1 - 4 Read onlineTom Clancy's Power Plays 1 - 4Endgame sc-6 Read onlineEndgame sc-6Executive Orders jr-7 Read onlineExecutive Orders jr-7Net Force nf-1 Read onlineNet Force nf-1Call to Treason o-11 Read onlineCall to Treason o-11Locked On jrj-3 Read onlineLocked On jrj-3Against All Enemies Read onlineAgainst All EnemiesThe Sum of All Fears jr-7 Read onlineThe Sum of All Fears jr-7Sea of Fire o-10 Read onlineSea of Fire o-10Fallout sc-4 Read onlineFallout sc-4Balance of Power o-5 Read onlineBalance of Power o-5Shadow Watch pp-3 Read onlineShadow Watch pp-3State of War nf-7 Read onlineState of War nf-7Wild Card pp-8 Read onlineWild Card pp-8Games of State o-3 Read onlineGames of State o-3Death Match nfe-18 Read onlineDeath Match nfe-18Against All Enemies mm-1 Read onlineAgainst All Enemies mm-1Every Man a Tiger: The Gulf War Air Campaign sic-2 Read onlineEvery Man a Tiger: The Gulf War Air Campaign sic-2Cybernation nf-6 Read onlineCybernation nf-6Support and Defend Read onlineSupport and DefendNight Moves nf-3 Read onlineNight Moves nf-3SSN Read onlineSSNCutting Edge pp-6 Read onlineCutting Edge pp-6The Cardinal of the Kremlin jrao-5 Read onlineThe Cardinal of the Kremlin jrao-5War of Eagles o-12 Read onlineWar of Eagles o-12Op-Center o-1 Read onlineOp-Center o-1Mirror Image o-2 Read onlineMirror Image o-2The Archimedes Effect nf-10 Read onlineThe Archimedes Effect nf-10Teeth of the Tiger jrj-1 Read onlineTeeth of the Tiger jrj-1Bio-Strike pp-4 Read onlineBio-Strike pp-4State of Siege o-6 Read onlineState of Siege o-6Debt of Honor jr-6 Read onlineDebt of Honor jr-6Zero Hour pp-7 Read onlineZero Hour pp-7Ghost Recon gr-1 Read onlineGhost Recon gr-1Command Authority jr-10 Read onlineCommand Authority jr-10Tom Clancy's Power Plays 5 - 8 Read onlineTom Clancy's Power Plays 5 - 8Checkmate sc-3 Read onlineCheckmate sc-3Breaking Point nf-4 Read onlineBreaking Point nf-4Gameprey nfe-11 Read onlineGameprey nfe-11The Hunted e-2 Read onlineThe Hunted e-2Hidden Agendas Read onlineHidden AgendasDivide and Conquer o-7 Read onlineDivide and Conquer o-7