Stephen Coonts - Combat

Здесь есть возможность читать онлайн «Stephen Coonts - Combat» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Город: New York, Год выпуска: 2011, ISBN: 2011, Издательство: Tom Doherty Associates, Жанр: Триллер, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Combat: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Combat»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

As the world moves into the next millennium, the United States finds itself at the forefront of this new age, policing not only its own shores but the rest of the world as well. And spearheading this overwatch are the men and women of America's armed forces, the "troops on the wall," who will go anywhere, anytime, and do whatever it takes to protect not only our nation but the rest of the free world.
Now, for the first time,
brings the best military-fiction authors together to reveal how war will be fought in the twenty-first century. From the down and dirty "ground-pounders" of the U.S. Armored Cavalry to the new frontiers of warfare, including outer space and the Internet, ten authors whose novels define the military-fiction genre have written all-new short stories about the men and women willing to put their lives on the line for freedom:
Larry Bond takes us into the wild frontier of space warfare, where American soldiers fight a dangerous zero-gee battle with a tenacious enemy that threatens every free nation on Earth.
Dale Brown lets us inside a world that few people see, that of a military promotion board, and shows us how the fate of an EB-52 Megafortress pilot's career can depend on a man he's never met, even as the pilot takes on the newest threat to American forces in the Persian Gulf-a Russian stealth bomber.
James Cobb finds a lone U.S. Armored Cavalry scout unit that is the only military force standing between a defenseless African nation and an aggressive Algerian recon division.
Stephen Coonts tells of the unlikely partnership between an ex-Marine sniper and a female military pilot who team up to kill the terrorists who murdered her parents. But, out in the Libyan desert, all is not as it seems, and these two must use their skills just to stay alive.
Harold W. Coyle reports in from the front lines of the information war, where cyberpunks are recruited by the U.S. Army to combat the growing swarm of hackers and their shadowy masters who orchestrate their brand of online terrorism around the world.
David Hagberg brings us another Kirk McGarvey adventure, in which the C.I.A. director becomes entangled in the rising tensions between China and Taiwan. When a revolutionary leader is rescued from a Chinese prison, the Chinese government pushes the United States to the brink of war, and McGarvey has to make a choice with the fate of the world hanging in the balance.
Dean Ing reveals a scenario that could have been torn right from today's headlines. In Oakland, a private investigator teams up with a bounty hunter and F.B.I. agent to find a missing marine engineer. What they uncover is the shadow of terrorism looming over America and a conspiracy that threatens thousands of innocent lives.
Ralph Peters takes us to the war-torn Balkan states, where a U.S. Army observer sent to keep an eye on the civil war is taken on a guided tour of the country at gunpoint. Captured by the very people he is there to monitor, he learns just how far people will go for their idea of freedom.
R.J. Pineiro takes us to the far reaches of space, where a lone terrorist holds the world hostage from a nuclear missle-equipped platform. To stop him, a pilot agrees to a suicidal flight into the path of an orbital laser with enough power to incinerate her space shuttle.
Barrett Tillman takes us to the skies with a group of retired fighter jocks brought back for one last mission-battling enemy jets over the skies of sunny California.

Combat — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Combat», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

A computer, in and of itself, is an inert object. Like a projectile, it needs energy to propel it. Young Angelo and the electricity flowing from the overloaded wall socket provided that energy. But engaging in an activity can quickly becomes boring if there is nothing new or thrilling to capture a young, imaginative mind, especially when that activity involves an ultramodern data-crunching machine. Like the projectile, to have meaning the exercise of power must have a purpose, a target. That is where the X Legion came in.

The X Legion, properly pronounced Tenth as in the roman numeral, was a collection of young South and Central American computer geeks who had found each other as they crawled about the World Wide Web in search of fun, adventure, some sort of achievement. In the beginning they played simple games among themselves, games that involved world conquest, or that required each of the participants to amass great wealth by creating virtual stock portfolios. Slowly, and ever so innocently, the members of the X Legion began to break into the computer systems of international companies, not at all unlike those owned or operated by their own fathers. They did this, they told each other, in order to test their growing computer skills and engage in feats that had real and measurable consequences. “We live in a real world,” a legionnaire in Argentina stated one night as they were just beginning to embark upon this new adventure. “So let us see what we can do in that world.”

At first, the targets selected for their raids were chosen by the legionnaires themselves, without any controlling or centralized authority. This, quite naturally, led to arguments as fellow members of their group ridiculed the accomplishments of another if they thought the object of a fellow legionnaire’s attack had been too easy.

“Manipulating the accounts of a Swiss bank must have more meaning,” a Bolivian boy claimed, “than stealing from a local candy store.” Though intelligent and articulate, no one had a clear idea of how best to gauge the relative value of their targets.

To resolve this chaotic state of affairs, a new member who used the screen name “longbow” volunteered to take on the task of generating both the targets to be attacked by the members of the legion and the relative value of those targets. Points for the successful completion of the mission would be awarded to the participants by longbow based upon the security measures that had to be overcome, the creativity that the hacker used in rummaging around in the targeted computer, and the overall cost that the company owning the hacked site ultimately had to pay to correct the problem the legionnaire created. How longbow managed to determine all of this was of no concern to the young men like Angelo who belonged to the legion. Longbow offered them real challenges and order in the otherwise chaotic and shapeless world in which they lived, but did not yet understand.

When they were sure he was not listening, which was rare, the rank and file of the legion discussed their self-appointed leader. It didn’t matter to Angelo and other members of the X Legion that longbow was not from South or Central America. One of the first clues that brought this issue into question was the English and Spanish longbow used. Like all members of the X Legion, longbow switched between the two languages interchangeably. Since so many of the richest and most advanced businesses using the World Wide Web communicated in English, this was all but a necessity. When it came to his use of those languages, it appeared to the well-educated legionnaires that both Spanish and English were second languages to their taskmaster. Everything about longbow’s verbiage was too exact, too perfect, much like the grammar a student would use.

That longbow might be using them for reasons that the young Latin American hackers could not imagine never concerned Angelo. Like his cyber compatriots, his world was one of words, symbols, data, and not people, nationals, and causes. Everything that they saw on their computer screen was merely images, two-dimensional representations. In addition to this self-serving disassociated rationale, there was the fear that longbow, who was an incredible treasure trove of tricks and tools useful to the legion of novice hackers, might take offense if they became too inquisitive about longbow’s origins. The loss of their cyber master would result in anarchy, something these well-off cyber anarchists loathed.

* * *

While the security guards went about their rounds, protecting the young Chilean and his family from the outside world, Angelo was reaching out into that world. As he did each time he received a mission from longbow, Angelo did not concern himself with the “why” governing his specific tasking for the evening. Rather, he simply concentrated on the “how.”

Upon returning from school that afternoon, Angelo had found explicit instructions from longbow on how to break into the computer system of the United States Army Matériel Command in Alexandria, Virginia. This particular system, Angelo found out quickly, handled requests for repair parts and equipment from American military units deployed throughout the world.

The “mission” Angelo had been assigned was to generate a false request, or alter an existing one, so that the requesting unit received repair parts or equipment that was of no earthly use to the unit in the field. Knowing full well that the standards used to judge the success of a mission concerned creativity as well as the cost of the damage inflicted, Angelo took his time in selecting both the target of his attack and the nature of the mischief he would inflict upon it. After several hours of scrolling through hundreds of existing requests, he hit upon one that struck his fancy.

It concerned a requisition that had been forwarded from an Army unit stationed in Kosovo to its parent command located in Germany. The requesting unit, an infantry battalion, had suffered a rash of accidents in recent months because of winter weather and lousy driving by Americans born and raised in states where the only snow anyone ever saw was on TV. Though the human toll had been minimal, the extensive damage to the battalion’s equipment had depleted both its own reserve of on-hand spare parts as well as the stock carried by the forward-support maintenance unit in-country. While not every item on the extensive list of replacement parts was mission essential, some demanded immediate replacement. This earned those components deemed critical both a high priority and special handling. With the commander’s approval, the parts clerk in Kosovo submitted a request, via the Army’s own Internet system, to the division’s main support battalion back in Germany to obtain these mission-essential items.

As was the habit of this particular parts clerk, he had waited until the end of the normal workday before submitting his required list of repair parts. In this way the clerk avoided having to go through the entire routine of entering the system, pulling up the necessary on-screen documents, and filling out all the unit data more than once a day. Though parts that had been designated mission essential and awarded a high priority were supposed to be acted upon as soon as they landed on the desk of the parts clerk, lax supervision at the forward-support unit where the clerk worked permitted personnel in his section to pretty much do things as they saw fit. So it should not have come as a great surprise that the parts clerk in Kosovo chose to pursue the path of least resistance, executing his assigned duties in a manner that was most expedient, for the clerk.

This little quirk left a window of opportunity for someone like Angelo to spoof the United States Army Matériel Command’s computer system. Since the request was initiated in Kosovo and relayed to the forward-support battalion’s parent unit after normal working hours in Kosovo, the personnel in Germany charged with reviewing that request were not at their desks. Those personnel had the responsibility of reviewing all requests from subordinate units to ensure that they were both valid and correct. They then had to make the decision as to whether the request from Kosovo would be filled using on-hand stocks in Germany or forwarding back to Army Matériel Command to be acted upon using Army-wide sources.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Combat»

Представляем Вашему вниманию похожие книги на «Combat» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Владимир Колышкин - Combat
Владимир Колышкин
Владимир Колышкин - Combat (СИ)
Владимир Колышкин
Stephen Coonts - Pirate Alley
Stephen Coonts
Stephen Coonts - The Disciple
Stephen Coonts
Stephen Coonts - Arctic Gold
Stephen Coonts
Don Pendleton - Fatal Combat
Don Pendleton
Elle James - Hot Combat
Elle James
Don Pendleton - Combat Machines
Don Pendleton
Отзывы о книге «Combat»

Обсуждение, отзывы о книге «Combat» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x