Threat Vector Read online

Page 14


  “Attack? You are speaking of cyberwarfare?”

  “Cyberwarfare and cyberespionage, communications between systems and forces to optimize their effect. The complete informationization of the battle space. We are the betters of the Americans by a wide margin.”

  Wei said, “You told me you had bad news. This sounds like good news.”

  “The bad news, General Secretary, is that the timetable you asked me to support with my military is unrealistic.”

  “But we must do this within the close of the party conference, within five years. Any longer and our leadership roles will diminish, and we cannot be certain that—”

  “You misunderstand me,” said the chairman. “I am saying there is no way we can take more than one year to achieve our objectives. You see, this new capability is our only real, true, tactical advantage over the Americans. And it is an incredible advantage. But it will wane. The Americans are building their cyberdefenses quickly, and their country and their forces are quick to adapt in the face of adversity. The U.S. network defense, at this moment, is based primarily on reactive controls. But America’s Cyber Command is quickly changing that, and they are changing the landscape for the future of warfare. President Ryan has increased all resources for Cyber Command, and it will soon have an effect on our capabilities.”

  Wei understood. “You are saying the time to use this is now?”

  “The window will close, and I fear it will not reopen. Ever again. America is catching up. Bills are moving along in their Congress that will modernize their domestic computer infrastructure. President Ryan’s administration is taking the matter seriously. If we slowly trickle out our . . . your program for expansion, we will disadvantage ourselves greatly.”

  “You want to begin immediately.”

  “We must begin immediately. We must reassert our belief that the South China Sea territory is a core interest of China, and we must push for control of the sea now. Within days, not weeks, we must strengthen our patrols down to the Strait of Malacca and begin moving naval and marine forces to the Spratlys and Huangyan Island. I can land forces on some of the uninhabited islands within the week. It is all in the report. Then we must announce our new relationship with Hong Kong, and begin the blockade with Taiwan, all in the next six months. In a year, with our aggressive and forward-thinking attitude apparent to all, we will have met all our goals and the Americans will be too busy licking their own wounds to stop us.”

  Wei thought it over for a moment. “America is the only strategic threat?”

  “Yes. Especially with Jack Ryan in the White House. Just as in our war with Russia, he is a problem once again. Not only from the direct threat of his military, but also in the bluster we are seeing from our neighbors. They tell themselves that China will do nothing against any ally of America as long as Ryan is in power.”

  Wei said, “Because he defeated us so soundly during the last war.”

  Su took issue with this. “It is debatable that he defeated us. The Russians were involved as well, you might remember.”

  Wei put up a hand in apology. “True, although I also remember that we attacked Russia.”

  Su said flatly, “We did not attack the United States. Even so, that was seven years ago, and still the American Navy routinely patrols the East China Sea, close to our waters. They have just sold another nine billion dollars’ worth of military hardware to Taiwan. They threaten us with their access to the region. I do not have to tell you that eighty percent of the oil we use to fuel our nation comes through the Strait of Malacca, and the United States could threaten that flow with a carrier battle group. We must go on the offensive against them in order for your plan to succeed.”

  Wei did not know much about military matters, but this fact was well known to everyone in the Politburo.

  “But if we initiate hostilities, Ryan will—”

  Su said, “Comrade. We will initiate hostilities without Ryan knowing we are initiating hostilities. We can do this without revealing ourselves as the aggressors.”

  Wei sipped tea. “Some sort of computer attack?”

  “Mr. President, there is a secret operation of which you are not aware.”

  Wei raised a narrow eyebrow behind his teacup. “I should hope there are many secret operations of which I am not aware.”

  Su smiled. “Indeed. But this one, in particular, will be crucial to the realization of your goals. I only need to give one order and we will begin, slowly at first, and with great care that no positive attribution will be made to China, to damage the United States’ ability to defeat us. We will send them off against other enemies, have them concentrate on issues at home that will require their focus and resources, and we can push our endeavors here in our region to the back of their consciousness.”

  Wei said, “That is a remarkable boast, Chairman Su.”

  Su considered Wei’s comment before saying, “I don’t make it lightly. We will strike many small cuts against the body, barely scratches to a giant like America. But the scratches will bleed, I promise you that. And the giant will weaken.”

  “And they will not know it is we who are weakening them?”

  “We will be an invisible army. America will not know they have been taken out at the knees by the PLA.”

  “It sounds too good to be true.”

  Su nodded slowly. “There will be setbacks, failures of a tactical nature. No battle plan goes off without problems. But strategically we will succeed. I stake my reputation on this.”

  Wei straightened in his chair. “As the leader of our military forces, comrade, you will have to.”

  Su smiled. “I understand. But the infrastructure is in place, and we should exploit our advantage while we have it. The need is great. Our capability is great.”

  Wei was taken aback that Su was, clearly, asking for the authority to implement the opening moves of the conflict at this moment. He wavered momentarily. “The same thing was said by our predecessors. Shortly before the war with Russia.”

  The chairman nodded gravely. “I know. And I cannot counter your comment in any way, except to remind you that there is one great difference between then and now.”

  “And what is that?”

  “Seven years ago our predecessors underestimated Jack Ryan.”

  Wei leaned back in the chair now, gazing at the ceiling for several seconds before chuckling without real mirth. “We certainly will not make that mistake.”

  “No. We will not. And if you agree to sanction me to initiate our opening moves, there is one more thing I would like you to consider. I have been speaking about the need to act in the South China Sea to protect our core interests for years. I am known, above everything else I have ever said or done, as the man who wants to take back the territory for China. If we begin our movements without your speaking out, I fear some in the West will feel these actions have been set in motion by me without your consent.”

  Su leaned forward, and in a friendly, imploring tone he said, “I do not want you to be marginalized. I think you should speak out strongly. Show the world you are in command.”

  Wei said, “I agree. I will speak out about our core interests in the South China Sea.”

  Su was pleased by this. He smiled. “So, let’s be clear. You are authorizing my initial military actions?”

  “Very well. You do what you think is best. You have my blessing to initiate initial preparations. But I warn you now, Chairman, that if this plot of yours is uncovered, and this threatens our enterprise, then I will ask you to cease your operation immediately.”

  Su fully expected such a lukewarm sanction. “Thank you. The actions we begin now will soften the enemy’s blows if hostilities ensue later. You can rest easy knowing that your decision tonight has helped our endeavor greatly.”

  Wei Zhen Lin just nodded.

  Su
left the meeting knowing good and well that Wei Zhen Lin had no idea what he had just authorized.

  —

  Chairman Su was back in his office twenty minutes later. He’d asked Xia, his two-star adjutant, to personally put a call through for him, and when Xia leaned in through the doorway and said, “He’s on the phone,” the big chairman nodded curtly and waved his adjutant back out the door with his fingertips.

  When the door shut, Su lifted the phone to his ear. “Good evening, Doctor.”

  “Good evening, Comrade Chairman.”

  “I have important news. This call serves to initiate your sanction authorizing Operation Earth Shadow.”

  “Very well.”

  “When will you begin?”

  “Physical assets are in place, as you requested, so action will begin immediately. Once these are completed, in a week, two weeks at most, we will begin cyberkinetic operations. Things will proceed very quickly after that.”

  “I understand. And how are the preparations for Operation Sun Fire?”

  There was no pause. “Preparations will be complete as soon as we receive a shipment of hardware on the way from Shenzhen, and bring it online. In ten days we will be ready. I await your orders.”

  “And I await mine.”

  “Comrade Chairman?”

  “Yes, Doctor?”

  “I feel it my duty to remind you, once again, that key aspects of Earth Shadow, once initialized, are beyond my capability to rescind.”

  Chairman Su Ke Qiang smiled into the phone. “Doctor . . . I am relying on our inability to reverse course once Earth Shadow begins. Civilian leadership has sanctioned us to tip the first domino in the row as if we can simply stop the momentum before the second and third dominoes fall. The will of our president is strong at the moment, here before the onset of adversity. If he wavers under pressure, I will stress to him that the only way is forward.”

  “Yes, Comrade Chairman.”

  “You have your orders, Doctor. Do not expect to hear from me again until I contact you with sanction to initiate Sun Fire.”

  “I will continue to report through channels.”

  “I wish you fortune,” Su said.

  “Shi-shi.” Thank you.

  The phone went dead in Chairman Su’s hand, and he looked at it with a chuckle before placing it back in its cradle.

  Center was not one for small talk.

  FIFTEEN

  Silicon Valley is home to Intel and Apple and Google and Oracle and dozens of other major technology companies. In support of these firms, hundreds if not thousands of smaller businesses have sprung up in the area in the past twenty years.

  Menlo Park, California, is in the Valley, just north of Palo Alto, and its office buildings and business parks house hundreds of high-tech start-ups.

  In a midsized complex on Ravenswood Drive, just up the road from mega-tech research firm SRI, a sign on a glass door reads Adaptive Data Security Consultants. Below this, the sign claimed the company shared the same daytime hours of operation as all the other small tech start-ups that shared the business park. But the night security officer who drove by the business in his golf cart at four a.m. was not surprised to find several cars in the lot that had been there since his shift started six hours earlier.

  The principals of ADSC, Lance Boulder and Ken Farmer, were well accustomed to working long hours. It came with the territory.

  Lance and Ken had grown up next door to each other in San Francisco, and they all but lived on their computers in the early days of the Internet. By the time they were twelve the boys were building machines and customizing software, and at age fifteen the two friends had become accomplished hackers.

  The hacking subculture among intelligent teenage boys was a powerful force for Ken and Lance, and they began working together to break into the computer networks of their high school, local universities, and other targets around the world. They did no great damage, they weren’t involved with credit card fraud or identity theft, nor did they sell data hauls to others—they were more in the game for the excitement and the challenge.

  Other than a few graffiti attacks on website homepages for their school, they did not cause any harm.

  But the local police didn’t see it that way. Both boys were picked up for computer graffiti that was tracked back to them by their junior-high computer teacher, and Lance and Ken immediately confessed.

  After a few weeks of community service they decided to reform their ways before they became adults, when such brushes with the law would stay on their records and could seriously affect their future prospects.

  Instead they focused their talents and their energies in the right direction, and gained admittance to Caltech, majored in computer science, and then took jobs for computer software companies in Silicon Valley.

  They were model citizens, but they were still hackers at heart, so in their late twenties they left the corporate world to start their own company, specializing in penetration testing, or “pentesting,” known in the computer networking world as “ethical hacking.”

  They hired themselves out to the IT departments of banks, retail chains, manufacturers, and others, and then endeavored to break into their clients’ networks and hack their websites.

  And soon they boasted a one hundred percent success rate hacking their customers’ systems.

  They developed a reputation as some of the best “white hat” hackers in Silicon Valley, and the big antivirus companies, McAfee and Symantec, tried to buy them out several times, but the two young men were determined to grow their company into a powerhouse of its own.

  Business grew along with their reputation, and soon they began pentesting networks under government contract, attempting to break into so-called bulletproof systems run by top-secret government contractors, looking for ways in that the black-hats—the malicious hackers—had not yet found. Lance and Ken and their two dozen employees had excelled in this task and, flush with fresh government contracts, ADSC was poised to expand again.

  The two owners had come a long way in five years, but Lance and Ken still knew how to work twenty hours a day when a project demanded it.

  Like tonight.

  They and three more of their staff were working overtime because they had found a new exploit in a Windows server component that could be potentially calamitous for any secure government network. It had revealed itself during penetration testing on the network of a government contractor headquartered in nearby Sunnyvale, California.

  Lance and Ken had discovered the vulnerability in the software, then they had built their own Trojan, a malware that leeches on to a legitimate process, and used it to climb into the secure network. From here they were astonished to find they could execute an “upstream attack,” using the company’s connection to the U.S. Department of Defense’s secure network to make their way into the bowels of the U.S. military’s most secure information databases.

  Everyone at ADSC knew the implications for what they had found. If a smart and determined hacker discovered the vulnerability before Microsoft patched it, the black-hat could build his own virus to steal, alter, or erase terabytes of crucial data necessary for war fighting.

  Lance and Ken had not alerted their customers, the DoD, or their colleagues at Microsoft’s Digital Crimes Unit yet; they knew they had to be certain about their findings, so they tested through the night.

  And this critical project would be going at full steam, even now at four in the morning, if not for one significant snag.

  The power had just gone out in the entire office park.

  —

  Well . . . that blows,” Lance said as he looked around the dark office. The glow from the monitors in front of the five men working there was the only light in the room. The computers were still running; the backup battery power supply attached to each
machine kept the men from losing their data, although the batteries would keep the devices juiced for only an hour, so the men would need to power down if the electricity did not come back on soon.

  Marcus, one of ADSC’s lead data-flow analysts, grabbed a pack of cigarettes and a lighter from the drawer in his desk and stood up. As he stretched his arms and shoulders over his head he said, “Who forgot to pay PG and E?”

  Pacific Gas and Electric was the local utility, and none of the five young men in the room thought for a second the culprit was a missed payment. The office had two dozen workstations, several high-capacity servers in the basement server farm, and dozens of other electronic peripherals, all of which drew power from the grid.

  This was not the first time they’d tripped a breaker.

  Ken Farmer stood up, then took a quick swig of lukewarm Pepsi from a can. “I’m going to take a leak and then I’ll go down and flip the breaker.”

  Lance said, “I’m right behind you.”

  Data-flow analysts Tim and Rajesh stayed at their machines, but put their heads in their hands to rest.

  A resilient, powerful, and utterly secure computer network was a necessity for a company whose business plan consisted of tracking down computer hackers, and ADSC had the tools and the protocols in place to make sure that any cyberattacks targeting their company did not make it through.

  Lance and Ken focused great attention on making certain ADSC had all but bulletproofed its network.

  But they did not place the same attention on the physical security of their property.

  —

  One hundred twenty yards from where Lance and Ken and their three employees stretched and smoked and pissed, a lone individual walked in the heavy mist hanging between trees alongside dark and quiet Ravenswood Drive, approaching the business park that housed ADSC. Other than the early hour and a slight altering of his path to stay out of the direct light of the streetlamps, the figure in no way appeared out of the ordinary.

  He wore a black zip-up raincoat with the hood down, his gloved hands were empty, and his pace was a leisurely stroll.

 

    Changing of the Guard Read onlineChanging of the GuardClear and Present Danger Read onlineClear and Present DangerHounds of Rome Read onlineHounds of RomeBreaking Point Read onlineBreaking PointTom Clancy's Jack Ryan Books 7-12 Read onlineTom Clancy's Jack Ryan Books 7-12Full Force and Effect Read onlineFull Force and EffectThe Archimedes Effect Read onlineThe Archimedes EffectCombat Ops Read onlineCombat OpsInto the Storm: On the Ground in Iraq Read onlineInto the Storm: On the Ground in IraqUnder Fire Read onlineUnder FirePoint of Impact Read onlinePoint of ImpactRed Rabbit Read onlineRed RabbitRainbow Six Read onlineRainbow SixThe Hunt for Red October Read onlineThe Hunt for Red OctoberThe Teeth of the Tiger Read onlineThe Teeth of the TigerConviction (2009) Read onlineConviction (2009)Battle Ready Read onlineBattle ReadyPatriot Games Read onlinePatriot GamesThe Sum of All Fears Read onlineThe Sum of All FearsFallout (2007) Read onlineFallout (2007)Red Storm Rising Read onlineRed Storm RisingThe Cardinal of the Kremlin Read onlineThe Cardinal of the KremlinExecutive Orders Read onlineExecutive OrdersLincoln, the unknown Read onlineLincoln, the unknownThreat Vector Read onlineThreat VectorThe Hunted Read onlineThe HuntedShadow Warriors: Inside the Special Forces Read onlineShadow Warriors: Inside the Special ForcesEnd Game Read onlineEnd GameSpecial Forces: A Guided Tour of U.S. Army Special Forces Read onlineSpecial Forces: A Guided Tour of U.S. Army Special ForcesLocked On Read onlineLocked OnLine of Sight Read onlineLine of SightTom Clancy Enemy Contact - Mike Maden Read onlineTom Clancy Enemy Contact - Mike MadenFighter Wing: A Guided Tour of an Air Force Combat Wing Read onlineFighter Wing: A Guided Tour of an Air Force Combat WingSpringboard Read onlineSpringboardLine of Sight - Mike Maden Read onlineLine of Sight - Mike MadenEndWar Read onlineEndWarDead or Alive Read onlineDead or AliveTom Clancy Support and Defend Read onlineTom Clancy Support and DefendCheckmate Read onlineCheckmateCommand Authority Read onlineCommand AuthorityCarrier: A Guided Tour of an Aircraft Carrier Read onlineCarrier: A Guided Tour of an Aircraft CarrierBlacklist Aftermath Read onlineBlacklist AftermathMarine: A Guided Tour of a Marine Expeditionary Unit Read onlineMarine: A Guided Tour of a Marine Expeditionary UnitCommander-In-Chief Read onlineCommander-In-ChiefArmored Cav: A Guided Tour of an Armored Cavalry Regiment Read onlineArmored Cav: A Guided Tour of an Armored Cavalry RegimentTom Clancy's Jack Ryan Books 1-6 Read onlineTom Clancy's Jack Ryan Books 1-6The Ultimate Escape Read onlineThe Ultimate EscapeAirborne: A Guided Tour of an Airborne Task Force Read onlineAirborne: A Guided Tour of an Airborne Task ForceDebt of Honor Read onlineDebt of HonorCyberspy Read onlineCyberspyPoint of Contact Read onlinePoint of ContactOperation Barracuda (2005) Read onlineOperation Barracuda (2005)Choke Point Read onlineChoke PointPower and Empire Read onlinePower and EmpireEvery Man a Tiger: The Gulf War Air Campaign Read onlineEvery Man a Tiger: The Gulf War Air CampaignEndgame (1998) Read onlineEndgame (1998)EndWar: The Missing Read onlineEndWar: The MissingSplinter Cell (2004) Read onlineSplinter Cell (2004)The Great Race Read onlineThe Great RaceTrue Faith and Allegiance Read onlineTrue Faith and AllegianceDeathworld Read onlineDeathworldGhost Recon (2008) Read onlineGhost Recon (2008)Duel Identity Read onlineDuel IdentityLine of Control o-8 Read onlineLine of Control o-8The Hunt for Red October jr-3 Read onlineThe Hunt for Red October jr-3Hidden Agendas nf-2 Read onlineHidden Agendas nf-2Acts of War oc-4 Read onlineActs of War oc-4Ruthless.Com pp-2 Read onlineRuthless.Com pp-2Night Moves Read onlineNight MovesThe Hounds of Rome - Mystery of a Fugitive Priest Read onlineThe Hounds of Rome - Mystery of a Fugitive PriestInto the Storm: On the Ground in Iraq sic-1 Read onlineInto the Storm: On the Ground in Iraq sic-1Threat Vector jrj-4 Read onlineThreat Vector jrj-4Combat Ops gr-2 Read onlineCombat Ops gr-2Virtual Vandals nfe-1 Read onlineVirtual Vandals nfe-1Runaways nfe-16 Read onlineRunaways nfe-16Marine: A Guided Tour of a Marine Expeditionary Unit tcml-4 Read onlineMarine: A Guided Tour of a Marine Expeditionary Unit tcml-4Shadow Warriors: Inside the Special Forces sic-3 Read onlineShadow Warriors: Inside the Special Forces sic-3Jack Ryan Books 1-6 Read onlineJack Ryan Books 1-6Cold Case nfe-15 Read onlineCold Case nfe-15Changing of the Guard nf-8 Read onlineChanging of the Guard nf-8Splinter Cell sc-1 Read onlineSplinter Cell sc-1Battle Ready sic-4 Read onlineBattle Ready sic-4The Bear and the Dragon jrao-11 Read onlineThe Bear and the Dragon jrao-11Fighter Wing: A Guided Tour of an Air Force Combat Wing tcml-3 Read onlineFighter Wing: A Guided Tour of an Air Force Combat Wing tcml-3Patriot Games jr-1 Read onlinePatriot Games jr-1Jack Ryan Books 7-12 Read onlineJack Ryan Books 7-12Mission of Honor o-9 Read onlineMission of Honor o-9Private Lives nfe-9 Read onlinePrivate Lives nfe-9Operation Barracuda sc-2 Read onlineOperation Barracuda sc-2Cold War pp-5 Read onlineCold War pp-5Point of Impact nf-5 Read onlinePoint of Impact nf-5Red Rabbit jr-9 Read onlineRed Rabbit jr-9The Deadliest Game nfe-2 Read onlineThe Deadliest Game nfe-2Springboard nf-9 Read onlineSpringboard nf-9Safe House nfe-10 Read onlineSafe House nfe-10EndWar e-1 Read onlineEndWar e-1Duel Identity nfe-12 Read onlineDuel Identity nfe-12Deathworld nfe-13 Read onlineDeathworld nfe-13Politika pp-1 Read onlinePolitika pp-1Rainbow Six jr-9 Read onlineRainbow Six jr-9Tom Clancy's Power Plays 1 - 4 Read onlineTom Clancy's Power Plays 1 - 4Endgame sc-6 Read onlineEndgame sc-6Executive Orders jr-7 Read onlineExecutive Orders jr-7Net Force nf-1 Read onlineNet Force nf-1Call to Treason o-11 Read onlineCall to Treason o-11Locked On jrj-3 Read onlineLocked On jrj-3Against All Enemies Read onlineAgainst All EnemiesThe Sum of All Fears jr-7 Read onlineThe Sum of All Fears jr-7Sea of Fire o-10 Read onlineSea of Fire o-10Fallout sc-4 Read onlineFallout sc-4Balance of Power o-5 Read onlineBalance of Power o-5Shadow Watch pp-3 Read onlineShadow Watch pp-3State of War nf-7 Read onlineState of War nf-7Wild Card pp-8 Read onlineWild Card pp-8Games of State o-3 Read onlineGames of State o-3Death Match nfe-18 Read onlineDeath Match nfe-18Against All Enemies mm-1 Read onlineAgainst All Enemies mm-1Every Man a Tiger: The Gulf War Air Campaign sic-2 Read onlineEvery Man a Tiger: The Gulf War Air Campaign sic-2Cybernation nf-6 Read onlineCybernation nf-6Support and Defend Read onlineSupport and DefendNight Moves nf-3 Read onlineNight Moves nf-3SSN Read onlineSSNCutting Edge pp-6 Read onlineCutting Edge pp-6The Cardinal of the Kremlin jrao-5 Read onlineThe Cardinal of the Kremlin jrao-5War of Eagles o-12 Read onlineWar of Eagles o-12Op-Center o-1 Read onlineOp-Center o-1Mirror Image o-2 Read onlineMirror Image o-2The Archimedes Effect nf-10 Read onlineThe Archimedes Effect nf-10Teeth of the Tiger jrj-1 Read onlineTeeth of the Tiger jrj-1Bio-Strike pp-4 Read onlineBio-Strike pp-4State of Siege o-6 Read onlineState of Siege o-6Debt of Honor jr-6 Read onlineDebt of Honor jr-6Zero Hour pp-7 Read onlineZero Hour pp-7Ghost Recon gr-1 Read onlineGhost Recon gr-1Command Authority jr-10 Read onlineCommand Authority jr-10Tom Clancy's Power Plays 5 - 8 Read onlineTom Clancy's Power Plays 5 - 8Checkmate sc-3 Read onlineCheckmate sc-3Breaking Point nf-4 Read onlineBreaking Point nf-4Gameprey nfe-11 Read onlineGameprey nfe-11The Hunted e-2 Read onlineThe Hunted e-2Hidden Agendas Read onlineHidden AgendasDivide and Conquer o-7 Read onlineDivide and Conquer o-7