Stephen Coonts - Combat

Здесь есть возможность читать онлайн «Stephen Coonts - Combat» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Город: New York, Год выпуска: 2011, ISBN: 2011, Издательство: Tom Doherty Associates, Жанр: Триллер, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Combat: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Combat»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

As the world moves into the next millennium, the United States finds itself at the forefront of this new age, policing not only its own shores but the rest of the world as well. And spearheading this overwatch are the men and women of America's armed forces, the "troops on the wall," who will go anywhere, anytime, and do whatever it takes to protect not only our nation but the rest of the free world.
Now, for the first time,
brings the best military-fiction authors together to reveal how war will be fought in the twenty-first century. From the down and dirty "ground-pounders" of the U.S. Armored Cavalry to the new frontiers of warfare, including outer space and the Internet, ten authors whose novels define the military-fiction genre have written all-new short stories about the men and women willing to put their lives on the line for freedom:
Larry Bond takes us into the wild frontier of space warfare, where American soldiers fight a dangerous zero-gee battle with a tenacious enemy that threatens every free nation on Earth.
Dale Brown lets us inside a world that few people see, that of a military promotion board, and shows us how the fate of an EB-52 Megafortress pilot's career can depend on a man he's never met, even as the pilot takes on the newest threat to American forces in the Persian Gulf-a Russian stealth bomber.
James Cobb finds a lone U.S. Armored Cavalry scout unit that is the only military force standing between a defenseless African nation and an aggressive Algerian recon division.
Stephen Coonts tells of the unlikely partnership between an ex-Marine sniper and a female military pilot who team up to kill the terrorists who murdered her parents. But, out in the Libyan desert, all is not as it seems, and these two must use their skills just to stay alive.
Harold W. Coyle reports in from the front lines of the information war, where cyberpunks are recruited by the U.S. Army to combat the growing swarm of hackers and their shadowy masters who orchestrate their brand of online terrorism around the world.
David Hagberg brings us another Kirk McGarvey adventure, in which the C.I.A. director becomes entangled in the rising tensions between China and Taiwan. When a revolutionary leader is rescued from a Chinese prison, the Chinese government pushes the United States to the brink of war, and McGarvey has to make a choice with the fate of the world hanging in the balance.
Dean Ing reveals a scenario that could have been torn right from today's headlines. In Oakland, a private investigator teams up with a bounty hunter and F.B.I. agent to find a missing marine engineer. What they uncover is the shadow of terrorism looming over America and a conspiracy that threatens thousands of innocent lives.
Ralph Peters takes us to the war-torn Balkan states, where a U.S. Army observer sent to keep an eye on the civil war is taken on a guided tour of the country at gunpoint. Captured by the very people he is there to monitor, he learns just how far people will go for their idea of freedom.
R.J. Pineiro takes us to the far reaches of space, where a lone terrorist holds the world hostage from a nuclear missle-equipped platform. To stop him, a pilot agrees to a suicidal flight into the path of an orbital laser with enough power to incinerate her space shuttle.
Barrett Tillman takes us to the skies with a group of retired fighter jocks brought back for one last mission-battling enemy jets over the skies of sunny California.

Combat — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Combat», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

But every now and then, reality took a bite out of this cherished isolation. As the saying went in the Keep, even Disneyland has a cloudy day.

“Okay,” Eric finally whispered as he took the newspaper before him and flipped it over. Mustering up as much enthusiasm as he could, he turned to face Major Hines. “Let’s get it on.”

Four

The Pit

The days when a high-school kid, parked in front of his computer in the comforts of his bedroom, could rain down death and distraction upon the world were gone. So was the Lone Ranger approach, especially within the 401st. When executing a major operation, known as a hack attack, the exercise had all the intricacies of a Broadway production. The room in which they made their attack was not as nearly as sophisticated as one would have imagined, though it did have more than its fair share of bells and whistles common to most government operations. Yet even these, like everything found in that room, nicknamed the Pit, had a purpose.

The Pit was isolated for reasons of security. The official name of the Pit, posted on the red door that separated it from the rest of the tunnel complex, was Discrete Strike Operations Center, or DSOC, pronounced “dee sock” by the operations staff. Within the DSOC were two chambers, the Pit itself, where the actual cyberattack would take place, and a second, in which observers, straphangers, and miscellaneous personnel not directly involved in the mechanics of the attack could watch via closedcircuit TV and dummy monitors. The Army staff called this the observation suite. The Cyberknights referred to it as the Spook Booth.

Whenever Eric Bergeron had been in the Pit it had always been dark. The only illumination in the room was that which was thrown off by the computer monitors located there and small reading lights at each workstation. Everything else was so dark that if asked by someone, he would be unable to tell them what color the walls were.

The furniture in the Pit was quite sparse, consisting of two long tables, one set upon a platform behind the other. Along one side of each table were armless chairs. These chairs faced a wall that was actually one huge screen that covered that surface from ceiling to floor. Both tables were fitted out with four computer workstations, though there were power trees bolted at either end of the tables and space to accommodate two more if required. Unlike the normal haunts where the Cyberknights went about their day-to-day activities, there were no dividers between the individual workstations. This was done to permit quick access, both verbal and nonverbal, between the members of the 401st at each of the tables. A person working at one position could easily reach in front of anyone to their left or right to pass on a handwritten note or sketch. Even though everyone in the strike center wore a headset with a tiny boom mike that permitted them to speak to other members of the team, it had been found that there were times when these notes worked best, especially when the personnel in the Pit didn’t want those in the Spook Booth to know something.

Located at each of the eight permanent workstations was a computer. Each was set up to perform a discrete function during an attack. The primary assault computer, labeled PAC, was the center-right workstation on the front table. It was from this position that Eric Bergeron would make his way into macnife’s computer, then on to those that ran the chemical plant located in the supporting nation. To Eric’s immediate right sat the primary foreign language expert, or FLE. While much of the traffic on the World Wide Web was in English, many of the programs and protocols, especially those concerning security and safety, were written in the language of the actual user. Hence there was a need for someone to be there, at Eric’s side, to translate in real time. These interpreters, recruited in much the same way as the Cyberknights were, had to be as computer savvy as the knights themselves. This was how Bobby Sung, a second-generation Chinese American, had made his way into the ranks of the Cyberknights. Since this hack attack would be going into the systems of two different nations, there was a second FLE located at a computer at the right end of the table, set up at the overflow slot.

The left-center workstation belonged to the systems expert, or SE. While good, the Cyberknights could not possibly know every nuance and quirk of the computers they were working from or hacking. The SE was one of the many on-site civilian tech reps ordinarily charged with maintaining machines supplied by their companies. During an attack, an SE familiar with the targeted systems was brought in to answer any questions Eric might have during the hack or assist if the Cyberknight came across something that he did not quite understand. Oftentimes these SEs were members of the design team who had actually manufactured the computer being attacked. To the SE’s left was a language/ programs expert, or LPE. Like the hardware specialist, the LPE was on hand in case Eric needed help with the software he encountered.

Immediately behind the primary assault computer, on the rear table, sat the electronic-warfare station. Manned by a second Cyberknight, the operator of this computer had the task of assisting the hacker whenever he ran into a firewall or other security measure during the break-in. Once the hacker was in, the electronic-warfare knight, EWK for short, monitored the systems admin and security programs of the hacked network. It was his responsibility to protect the hacker from countermeasures initiated by automated security programs or systems administrators.

This feat was accomplished in any number of ways. The preferred countermeasure was simply to lie low, or cease the hack, until any detected security sweep was completed. If it appeared as if someone was starting to become wise to the hack, the EWK attempted to spoof the systems administrator by making him think everything was in order. When this failed and the administrator started to track the unusual activity that the hack was causing, the EWK began to feed his foe data that would create the appearance that the security program was malfunctioning. More often than not, this made the system administrator hesitate as he tried to determine if the suspect activity was nothing more than an anomaly in the system or a glitch with the security program of his computer. When this ploy didn’t work, the EWK was forced to employ the least desirable trick in his bag, the dreaded red herring.

Every EWK had a totally fictitious hack sequence loaded on the EW computer and ready to initiate with nothing more than the touch of a special function key. Often they used the screen name and tactics of another hacker that the Cyberknights had come across during their day-to-day efforts to protect the Army’s computers. This ruse was designed to be both sloppy and obvious, yet not easily countered. When initiated, more often than not, it gave the primary hacker more than enough time to finish his attack and back out before the system administrator caught on. Occasionally, however, the defensive measures taken against the feint were too quick. When the EWK saw that he was losing the fight to keep their foe at bay, he would call out, “eject,” signaling the hacker he had to stop the hack, no matter where he was.

To the right of the EWK was an intel wizard. Major Gayle Rhay herself frequently took this seat. Like the systems or the language/ programs experts, the intel officer was there to provide the primary hacker with advice and recommendations should he run across something that was unfamiliar or unexpected. The presence of someone from the intelligence section in the Pit also had the benefit of providing the wizards themselves with valuable firsthand knowledge of the capabilities of their foes.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Combat»

Представляем Вашему вниманию похожие книги на «Combat» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Владимир Колышкин - Combat
Владимир Колышкин
Владимир Колышкин - Combat (СИ)
Владимир Колышкин
Stephen Coonts - Pirate Alley
Stephen Coonts
Stephen Coonts - The Disciple
Stephen Coonts
Stephen Coonts - Arctic Gold
Stephen Coonts
Don Pendleton - Fatal Combat
Don Pendleton
Elle James - Hot Combat
Elle James
Don Pendleton - Combat Machines
Don Pendleton
Отзывы о книге «Combat»

Обсуждение, отзывы о книге «Combat» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x