Point of Contact Read online

Page 19


  Yong nodded at Bai, who grabbed a desk phone and speed-dialed a number. Paul guessed it was the IT department. Bai and the party on the other end of the line chatted in Chinese for a bit. Bai hung up. “Mr. Brown is right. They don’t want to upload his software.”

  “Even if they check it?” Yong asked.

  “No, sir.”

  “There is one other possibility,” Paul suggested. “If you can loan me one of your encrypted USB drives, I can download the data I need and transfer it to my machine. That way my machine is never in direct contact with your computer.”

  “Why can’t you just use Bai’s?”

  “I prefer one of my own.”

  “Why?”

  “It would be a violation of the International Auditing and Assurance Standards Board auditing protocols to allow a Dalfan employee—or a Marin Aerospace employee, for that matter—to have access to the data and records I’m examining. Surely you see how that would be an ethical violation?”

  Yong rubbed his face, thinking. “Yes, I suppose it would be.” He turned to Bai. “Get him one of our drives—and wipe it clean. Then make sure he’s registered with it and the serial number is recorded.”

  “Yes, sir. Will he have to turn it in each day before he leaves?”

  “Yes, of course.” He turned to Paul. “Is that a problem?”

  “No. I’ll BleachBit the drive clean each day, just to keep things . . . ethical.”

  “You must also return the drive to us when you’re finally through with it. It’s proprietary, and we keep a strict accounting of each device.”

  “No problem. I’m sorry for the inconvenience. It’s just that I have a job to do.”

  “I understand. Hopefully this will be the last hurdle for you to jump in order for you to complete your assignment.”

  Paul smiled. “That’s the plan.”

  —

  It was mostly bullcrap, of course.

  Paul had to lie. It was his only choice. But he wasn’t happy about it.

  Bai was right. IDEA was a great piece of analytical auditing software, and just about anything Paul needed to do on this “due diligence” audit could’ve been done with it. Paul’s software was even better because he’d written the macros and templates himself, based on his years of experience in fraud analysis. But to do a proper fraud investigation would take several weeks for a company this size. What Paul really needed was the Dalfan encrypted USB flash drive. That didn’t solve his problem, but it got him one step closer to completing his mission.

  Or so he hoped.

  In the meantime, he had work to do. Rhodes had told him that the audit was legit, but that it was in addition to his more important task. Paul couldn’t shake the feeling that the auditing assignment was just a cover for the software upload. A giant waste of time. That didn’t make sense, either, though. Rhodes was paying a lot of money to send him and Jack out here. But then again, it wasn’t his money, was it?

  Paul pushed that idea aside and opened up his program. Time to eat the elephant.

  Even if he had all the time in the world, on a project this size the trick was to cut it up into bite-sized pieces rather than try to swallow it whole. If there was some kind of fraud or illegal activity taking place, and if whoever was behind it was careless enough to record the transactions somewhere in the general ledger, his auditing software might be able to sniff it out. It would take a great deal of luck to find anything, since all he could do with so little time available was perform random checks of selected data sets. But Fortune was a lady, and she favored the bold, statistically.

  Paul had constructed thirty discrete tests to perform, most of them numerical, but some were qualitative, searching and comparing the names and addresses of vendors, banks, warehouses, and products, as well as key words related to transactions, assets, destinations, and personnel. Connecting people, places, and patterns of behavior sometimes proved more valuable in cracking a fraud case, especially when the fraudsters were good at hiding the numbers. In fact, one of the Singapore banks that did business with Dalfan had been connected to the North Korean rare-earth-element debacle a few years ago, though no charges were ever filed. It was an interesting coincidence he would check out later.

  But it was number-crunching that dominated Paul’s work. He believed that most fraudsters weren’t as good at hiding the numbers as he was in finding them, and he had the track record to prove it. But he was no fool, and it usually took a combination of both investigative approaches to crack the hardest cases. As far as he knew, Dalfan was innocent of any wrongdoing, but for the sake of this exercise, he was going to assume they were hiding something, and hiding it very well.

  Would he find Dalfan vendors that changed bank accounts frequently? Had any Dalfan employees authorized multiple payments for items below a certain threshold limit to avoid triggering a limit alarm? Were there invoice receipts paid for amounts greater than the goods receipts they were matched to? How many purchase payments were made that exceeded the purchase-order amounts?

  And then there was his Benford’s law search engine.

  Paul rolled up his sleeves. It was going to be another long day, but it was still going to be a lot of fun. It was hard for him to believe that anybody could find this kind of work boring.

  28

  Okay,” Jack said. “So what else is there?”

  “Mostly technical details,” Singh said. “Maybe not that interesting.”

  “Try me.”

  Lian’s eyes narrowed, calculating.

  Jack flashed a roguish smile. “I’m sure those technical details will look really great on that report.”

  She nodded to Singh, defeated. “Fine. Go ahead.”

  Singh pointed at the video wall. He punched another button.

  The red and yellow terminal points flashed specific addresses, then a list of names and accompanying photos of the occupants of each residence on record. Singh paused the program again.

  “Where did you get that data?” Jack asked.

  “What you see on the screen right now is all OSINT. Facebook, Twitter, LinkedIn, YouTube—these are all big platforms in Singapore just like the U.S. We also utilize phone number listings, tax records, and all of the public filings.” Singh paused. “But because this is a pilot project for the SPF, we’re also linked into their databases—immigration, prison records, internal security, civil defense, and even Interpol. So we can get virtually any information we need about anybody at any time if they’re in Singapore.”

  “And you’re pulling all of them together into one analytical platform?”

  Singh beamed with pride. “My teams write great algorithms. That’s our secret weapon, Mr. Ryan.”

  “Even more impressive.”

  Singh then highlighted the photo of a twenty-eight-year-old male named Ho who was living in the red terminal point. He tapped another key and more data came up. “You can see that Mr. Ho is employed by the delivery company we’ve been tracking. So now we have a good confirmation that he’s one of our targets.”

  Singh hesitated.

  “Is there a problem?”

  Singh glanced at Lian one last time for a final nod of confirmation.

  Singh continued. “If we let the software keep tracing their movements from the previous day, week, month, or year, we can collect all sorts of interesting data. Every time they enter a building we can determine who they are meeting with. Then we can trace the movements of those new targets as well. In this way, we can reconstruct entire networks of people, establish relationships, property locations, patterns of movement, et cetera, and all in far less time and for far less cost than traditional methods.”

  Jack ran the calculations in his head, multiplying the number of policemen times the number of hours in stakeouts, surveillance ops, shift rotations, vehicle miles driven, and a dozen other cost factors that added up to hundred
s of thousands of dollars in salaries and expenses for even small intelligence operations over a decent length of time.

  “Let me show you a quick example. We’ve been running this test program for the last sixty-four days. So let’s see what Mr. Ho has been up to.”

  Singh tapped several more keys. First, he cleared the screen of the yellow line representing the other delivery driver, then extended the time-trace parameter to sixty-four days. Nearly instantly, the screen filled with a crazy spiderweb of red lines, all tracing Ho’s movements, and all centered on Ho’s residence. The red lines mostly tracked along the same routes, with a few loose strands snaking around the island to parks, recreation areas, and shopping centers.

  “Now, if I hit another key, the software will show me Mr. Ho’s five most visited locations as measured by length of stay.” Singh executed the new function, isolating five specific locations, and took away all of the red spiderweb trace lines to clarify the image.

  “As you can see, two of those five locations are his home and his place of work. A third looks to be a local bar, and the fourth a horse-racing venue. The fifth . . .”

  Singh tapped more keys. “Is the residence of this woman.” A photo popped up, along with her personal stats. It was a thirty-two-year-old single woman, plain and somewhat heavyset.

  “So Mr. Ho spends quite a bit of time with this woman. For the sake of her privacy, I won’t pull up her name. But just for fun—”

  “Dr. Singh—” Lian said, but too late.

  Dozens of tracer lines, each in a different color, radiated out from the woman’s apartment. The home terminal of each line appeared, along with the images of their occupants—all men, of various ages and races.

  “It seems Mr. Ho’s ‘friend’ has a lot of other friends.” Singh raised an eyebrow. “If you catch my meaning.”

  “Friends who are friendly by the hour, judging by the time stamps,” Jack added.

  “That’s enough, Dr. Singh.”

  “Yes, ma’am.” Singh tapped another key and all of the data disappeared, leaving only the live overhead image of Singapore on the screen.

  Jack shook his head. “I’m utterly amazed. You’re putting a beat cop in the sky. A beat cop with a perfect set of eyes and a perfect memory.”

  Singh nodded thoughtfully. “More or less, yes.”

  “This is what military and intelligence agencies have been doing for the last ten years,” Jack said. “I know you’ve written your own AI programs, but what’s your value-added?”

  “You know how these government systems run. A Predator operation might have eighty, a hundred, even two hundred people in the loop, everyone from the ground-control station and flight crew all the way back to the Pentagon, with civilian and military analysts added in for good measure.” He held up the tablet again. “Here’s your analysis team. The UAV we’ve developed can be transported in the back of a truck, unloaded, assembled, and made ready to launch in less than thirty minutes by just two people with a wrench and a screwdriver. Compared to the large military systems, Steady Stare is cheap, easy to use, and requires very little manpower.” Singh flashed a smile. “And of course, Dalfan is prepared to provide any or all of those manpower services if the client requires them. If not, Dalfan provides all of the training and technical support they might need.”

  Jack glanced around the room. There were four analysts sitting at workstations with headsets on, speaking. “How does a police department actually use a system like this?”

  “The SPF is responding to various calls around the city every day. If they conduct their initial investigation and can’t identify the culprits in a crime—for example, a hit-and-run car accident—an assigned detective will call us and give us the street address of the accident, and then we perform a ‘time travel’ search function like the one I just showed you. We would then call in the terminal address of the alleged vehicle to the detective and officers would be dispatched to the location. We’re not replacing police work, we’re just making it far more efficient.”

  “Politicians will love it because their police departments will be solving far more crimes for less money,” Lian said. “And when word gets out, it will deter crime. If every speeding vehicle automatically gets ticketed because of Steady Stare, fewer people will speed—that means fewer accidents, lower insurance costs, and fewer injuries and deaths.”

  No wonder Marin Aerospace wants a piece of this, Jack thought. He ran his hand through his hair, considering the possibilities—and the profits.

  Jack turned to Lian. “Now I’m getting a better idea why Dalfan has such tight security. The Chinese would love to steal this kind of technology.”

  “They’ve already tried.” Lian smiled. “And not just the Chinese.”

  Jack checked his watch. “This has been fascinating, Dr. Singh. I’d like to see the airport facility.”

  “When?”

  “Why not now?”

  Lian shrugged. “Fine. Let’s go.”

  —

  The Dalfan hangar at the Seletar Airport was unremarkable, a duplicate of several other leased hangars on the property. A single-wide trailer was parked next to it.

  Singh, Lian, and Jack parked the company car and headed into the hangar, big enough to accommodate two Cessna 172s or a medium-sized executive jet. Inside was neither.

  “That’s the Steady Stare UAV,” Singh said.

  The pilotless plane had no cockpit, of course. Its wingspan was about sixteen feet, and the fuselage about half of that. It had a six-bladed propeller. Singh pointed at the glass-orbed housing on the belly. “Our camera, sensor, and communication payloads are mounted in here. Optical, infrared, night vision, laser rangefinder, GPS—you name it—everything can be interchanged. They’re all modular and designed to fit in the unit.”

  “What kind of runway length do you need to launch?”

  “None.” Singh nodded toward the corner. Four lengths of aluminum pipe were welded together with smaller, thinner pieces, forming a ten-foot-long piece of scaffolding. “That’s a spring-loaded catapult. It launches the Steady Stare into the air, so no runway is needed.”

  “What if you don’t have the catapult?”

  “Then I’d go get it. Right now it’s not equipped for a conventional takeoff, but it’s designed to attach landing gear. We didn’t see any advantage to doing that over the catapult.”

  Jack tapped on the fuselage with the tip of his finger. It was hollow.

  “The fuselage is made of carbon-fiber composites. Super-strong and lightweight.”

  Jack shook his head. “I’m trying to find another word besides ‘impressive,’ but I can’t. I’m sold on the concept. It looks as easy to use as you say, and I’ve seen what the cameras and software can do. What are the downsides to this system?”

  “High winds will ground the system, and night flying is only possible if the operating and backup batteries are fully precharged. Of course, you can always deploy the auxiliary internal combustion engine if needed.”

  “I only see one problem, and I don’t know how you overcome it.”

  “What’s that?” Lian asked.

  “In the United States, the Fourth Amendment to the Constitution prohibits warrantless searches, and I know that some legal scholars would consider continuous surveillance like this a violation of civil rights.”

  “Our sales team has encountered this issue on several occasions in the States, but American cities keep finding out about us and still contact us,” Singh said. “You’re right, it’s still a contested legal issue, and we suspect that our American operations won’t really pick up for another few years. But until then, Asian police departments have shown a tremendous interest in our product, and my best guess is that Western governments won’t be far behind. After all, they already deploy closed-circuit surveillance cameras everywhere, don’t they? That’s just an inefficient version of wh
at we offer, and it fails to deliver our nearly perfect results.”

  Lian added, “Police departments are our first target market, but any government agency that needs to track the movement of people—polluters, poachers, illegal immigrants, pirates—will all demand a system like this.”

  Singh nodded in agreement. “We also believe there will be an even bigger market for private companies. For example, trucking firms that want to track their delivery vehicles or auto insurance companies that want to determine the actual cause of car wrecks.”

  Terrorist groups and crime syndicates would love to “time travel,” too, Jack thought. So would outfits like The Campus.

  “If history teaches us anything, it’s that human morality follows technology, and not the other way around,” Lian said. “It’s only a matter of time before your crime-infested urban areas come around to our way of thinking.”

  Jack agreed. He understood all the advantages of this kind of program, and it made sense for governments to deploy it on behalf of their citizens’ safety.

  But he couldn’t help wondering, What happens when a government can’t be trusted? Dictators and tyrants would definitely use this kind of technology against their own people. But even in the United States, lone wolves in federal agencies like the IRS, the FBI, and even the CIA used their power to persecute domestic political enemies.

  Jack glanced up into the hazy sky. He couldn’t see the Dalfan drone circling overhead, but he knew it was there, and he hated the idea that it was watching him. It was irrational, he knew, but it was already changing the way he was thinking about himself and his personal security—and he wasn’t one of the bad guys.

  He ran a hand over the smooth fuselage again. It seemed just like an ordinary airplane, but today’s demonstration proved it was anything but ordinary.

  “Have you seen enough, Mr. Ryan?” Lian asked.

  “Yes, thank you. Quite enough.”

  At least for now, Jack told himself.

 

    Changing of the Guard Read onlineChanging of the GuardClear and Present Danger Read onlineClear and Present DangerHounds of Rome Read onlineHounds of RomeBreaking Point Read onlineBreaking PointTom Clancy's Jack Ryan Books 7-12 Read onlineTom Clancy's Jack Ryan Books 7-12Full Force and Effect Read onlineFull Force and EffectThe Archimedes Effect Read onlineThe Archimedes EffectCombat Ops Read onlineCombat OpsInto the Storm: On the Ground in Iraq Read onlineInto the Storm: On the Ground in IraqUnder Fire Read onlineUnder FirePoint of Impact Read onlinePoint of ImpactRed Rabbit Read onlineRed RabbitRainbow Six Read onlineRainbow SixThe Hunt for Red October Read onlineThe Hunt for Red OctoberThe Teeth of the Tiger Read onlineThe Teeth of the TigerConviction (2009) Read onlineConviction (2009)Battle Ready Read onlineBattle ReadyPatriot Games Read onlinePatriot GamesThe Sum of All Fears Read onlineThe Sum of All FearsFallout (2007) Read onlineFallout (2007)Red Storm Rising Read onlineRed Storm RisingThe Cardinal of the Kremlin Read onlineThe Cardinal of the KremlinExecutive Orders Read onlineExecutive OrdersLincoln, the unknown Read onlineLincoln, the unknownThreat Vector Read onlineThreat VectorThe Hunted Read onlineThe HuntedShadow Warriors: Inside the Special Forces Read onlineShadow Warriors: Inside the Special ForcesEnd Game Read onlineEnd GameSpecial Forces: A Guided Tour of U.S. Army Special Forces Read onlineSpecial Forces: A Guided Tour of U.S. Army Special ForcesLocked On Read onlineLocked OnLine of Sight Read onlineLine of SightTom Clancy Enemy Contact - Mike Maden Read onlineTom Clancy Enemy Contact - Mike MadenFighter Wing: A Guided Tour of an Air Force Combat Wing Read onlineFighter Wing: A Guided Tour of an Air Force Combat WingSpringboard Read onlineSpringboardLine of Sight - Mike Maden Read onlineLine of Sight - Mike MadenEndWar Read onlineEndWarDead or Alive Read onlineDead or AliveTom Clancy Support and Defend Read onlineTom Clancy Support and DefendCheckmate Read onlineCheckmateCommand Authority Read onlineCommand AuthorityCarrier: A Guided Tour of an Aircraft Carrier Read onlineCarrier: A Guided Tour of an Aircraft CarrierBlacklist Aftermath Read onlineBlacklist AftermathMarine: A Guided Tour of a Marine Expeditionary Unit Read onlineMarine: A Guided Tour of a Marine Expeditionary UnitCommander-In-Chief Read onlineCommander-In-ChiefArmored Cav: A Guided Tour of an Armored Cavalry Regiment Read onlineArmored Cav: A Guided Tour of an Armored Cavalry RegimentTom Clancy's Jack Ryan Books 1-6 Read onlineTom Clancy's Jack Ryan Books 1-6The Ultimate Escape Read onlineThe Ultimate EscapeAirborne: A Guided Tour of an Airborne Task Force Read onlineAirborne: A Guided Tour of an Airborne Task ForceDebt of Honor Read onlineDebt of HonorCyberspy Read onlineCyberspyPoint of Contact Read onlinePoint of ContactOperation Barracuda (2005) Read onlineOperation Barracuda (2005)Choke Point Read onlineChoke PointPower and Empire Read onlinePower and EmpireEvery Man a Tiger: The Gulf War Air Campaign Read onlineEvery Man a Tiger: The Gulf War Air CampaignEndgame (1998) Read onlineEndgame (1998)EndWar: The Missing Read onlineEndWar: The MissingSplinter Cell (2004) Read onlineSplinter Cell (2004)The Great Race Read onlineThe Great RaceTrue Faith and Allegiance Read onlineTrue Faith and AllegianceDeathworld Read onlineDeathworldGhost Recon (2008) Read onlineGhost Recon (2008)Duel Identity Read onlineDuel IdentityLine of Control o-8 Read onlineLine of Control o-8The Hunt for Red October jr-3 Read onlineThe Hunt for Red October jr-3Hidden Agendas nf-2 Read onlineHidden Agendas nf-2Acts of War oc-4 Read onlineActs of War oc-4Ruthless.Com pp-2 Read onlineRuthless.Com pp-2Night Moves Read onlineNight MovesThe Hounds of Rome - Mystery of a Fugitive Priest Read onlineThe Hounds of Rome - Mystery of a Fugitive PriestInto the Storm: On the Ground in Iraq sic-1 Read onlineInto the Storm: On the Ground in Iraq sic-1Threat Vector jrj-4 Read onlineThreat Vector jrj-4Combat Ops gr-2 Read onlineCombat Ops gr-2Virtual Vandals nfe-1 Read onlineVirtual Vandals nfe-1Runaways nfe-16 Read onlineRunaways nfe-16Marine: A Guided Tour of a Marine Expeditionary Unit tcml-4 Read onlineMarine: A Guided Tour of a Marine Expeditionary Unit tcml-4Shadow Warriors: Inside the Special Forces sic-3 Read onlineShadow Warriors: Inside the Special Forces sic-3Jack Ryan Books 1-6 Read onlineJack Ryan Books 1-6Cold Case nfe-15 Read onlineCold Case nfe-15Changing of the Guard nf-8 Read onlineChanging of the Guard nf-8Splinter Cell sc-1 Read onlineSplinter Cell sc-1Battle Ready sic-4 Read onlineBattle Ready sic-4The Bear and the Dragon jrao-11 Read onlineThe Bear and the Dragon jrao-11Fighter Wing: A Guided Tour of an Air Force Combat Wing tcml-3 Read onlineFighter Wing: A Guided Tour of an Air Force Combat Wing tcml-3Patriot Games jr-1 Read onlinePatriot Games jr-1Jack Ryan Books 7-12 Read onlineJack Ryan Books 7-12Mission of Honor o-9 Read onlineMission of Honor o-9Private Lives nfe-9 Read onlinePrivate Lives nfe-9Operation Barracuda sc-2 Read onlineOperation Barracuda sc-2Cold War pp-5 Read onlineCold War pp-5Point of Impact nf-5 Read onlinePoint of Impact nf-5Red Rabbit jr-9 Read onlineRed Rabbit jr-9The Deadliest Game nfe-2 Read onlineThe Deadliest Game nfe-2Springboard nf-9 Read onlineSpringboard nf-9Safe House nfe-10 Read onlineSafe House nfe-10EndWar e-1 Read onlineEndWar e-1Duel Identity nfe-12 Read onlineDuel Identity nfe-12Deathworld nfe-13 Read onlineDeathworld nfe-13Politika pp-1 Read onlinePolitika pp-1Rainbow Six jr-9 Read onlineRainbow Six jr-9Tom Clancy's Power Plays 1 - 4 Read onlineTom Clancy's Power Plays 1 - 4Endgame sc-6 Read onlineEndgame sc-6Executive Orders jr-7 Read onlineExecutive Orders jr-7Net Force nf-1 Read onlineNet Force nf-1Call to Treason o-11 Read onlineCall to Treason o-11Locked On jrj-3 Read onlineLocked On jrj-3Against All Enemies Read onlineAgainst All EnemiesThe Sum of All Fears jr-7 Read onlineThe Sum of All Fears jr-7Sea of Fire o-10 Read onlineSea of Fire o-10Fallout sc-4 Read onlineFallout sc-4Balance of Power o-5 Read onlineBalance of Power o-5Shadow Watch pp-3 Read onlineShadow Watch pp-3State of War nf-7 Read onlineState of War nf-7Wild Card pp-8 Read onlineWild Card pp-8Games of State o-3 Read onlineGames of State o-3Death Match nfe-18 Read onlineDeath Match nfe-18Against All Enemies mm-1 Read onlineAgainst All Enemies mm-1Every Man a Tiger: The Gulf War Air Campaign sic-2 Read onlineEvery Man a Tiger: The Gulf War Air Campaign sic-2Cybernation nf-6 Read onlineCybernation nf-6Support and Defend Read onlineSupport and DefendNight Moves nf-3 Read onlineNight Moves nf-3SSN Read onlineSSNCutting Edge pp-6 Read onlineCutting Edge pp-6The Cardinal of the Kremlin jrao-5 Read onlineThe Cardinal of the Kremlin jrao-5War of Eagles o-12 Read onlineWar of Eagles o-12Op-Center o-1 Read onlineOp-Center o-1Mirror Image o-2 Read onlineMirror Image o-2The Archimedes Effect nf-10 Read onlineThe Archimedes Effect nf-10Teeth of the Tiger jrj-1 Read onlineTeeth of the Tiger jrj-1Bio-Strike pp-4 Read onlineBio-Strike pp-4State of Siege o-6 Read onlineState of Siege o-6Debt of Honor jr-6 Read onlineDebt of Honor jr-6Zero Hour pp-7 Read onlineZero Hour pp-7Ghost Recon gr-1 Read onlineGhost Recon gr-1Command Authority jr-10 Read onlineCommand Authority jr-10Tom Clancy's Power Plays 5 - 8 Read onlineTom Clancy's Power Plays 5 - 8Checkmate sc-3 Read onlineCheckmate sc-3Breaking Point nf-4 Read onlineBreaking Point nf-4Gameprey nfe-11 Read onlineGameprey nfe-11The Hunted e-2 Read onlineThe Hunted e-2Hidden Agendas Read onlineHidden AgendasDivide and Conquer o-7 Read onlineDivide and Conquer o-7