He stopped the truck where the MICLIC had been planted. The mine-clearing line charge was a hundred feet of C4 block assemblies strung together by nylon rope. The deadly charge was given to him by brothers from Fallujah who had retaken that city in 2014. The city was full of U.S. Marine Corps ordnance left behind for the worthless Iraqi army and police—tons of it. Guns, grenades, radios, claymore mines, and even MCLC.
Al Rus knew that the French would use electronic jammers—that was standard operating procedure against wireless remote IED detonators. But the jammers couldn’t stop an old-fashioned hand-cranked generator connected to copper wire. Primitive, but effective, especially in the hands of a trained engineer like Al Rus. The former BP employee had converted to the true Islamic faith, Salafism, when he was stationed in Saudi Arabia. Before he joined AQS, white German jihadi brothers in a Waziristan village taught him how to handle weapons and explosives and took him on their raids into Afghanistan against NATO forces, where he killed his first European infidels. He had a talent for it.
Al Rus stepped back over to his truck and dug around under the seat. He pulled out a radio and called his second-in-command, informing him it was now safe for the plane on the far horizon to land on the road ahead. In an hour, the cocaine would be loaded onto Algerian trucks and shipped north, making its way to the heart of the land of the Crusaders. If depraved Europeans wanted to pay good money for the poison he sold to them, so much the better. That money was used to wage jihad and help the poor and widows, and so it was blessed.
34 
CIOS Corporate Offices
Rockville, Maryland
7 May
Jasmine Bath’s paranoia knew no bounds. She was determined to live long enough to enjoy the wealth she had accumulated over the last few years, and even more determined to enjoy a long and happy retirement, which, according to her schedule, would begin in precisely seven months, given current revenue streams.
It was probably time to get out by then anyway. Computer security was about to make a great leap forward with DARPA’s PROCEED initiative, exploring methods that would allow data computation of encrypted data without first decrypting it, even in the cloud, making it virtually impossible for hackers like her to write malware code to break it. Worse, security operations themselves would become automated, just like future combat. Advanced machine learning algorithms would soon become the security gatekeepers, not only preventing but even anticipating human-designed attacks.
Bath’s first line of defense was to remain hidden from the NSA. The easiest trick was to leak NSA training documents to various media outlets under the names of known whistle-blowers. That kept the NSA in a constant state of paranoia and self-limiting defenses as media and congressional inquiries escalated. The NSA simply didn’t have time to look for someone like Jasmine, especially not even knowing she was there to begin with.
The most effective tool in Bath’s defense arsenal was the alliances she created with other unwitting players in the field. Posing as an anonymous member of various hacktivist groups, Jasmine would empower them with resources that both distracted the NSA and created new targets of national interest. In the last few years, the anarchist hacker group ALGO.RYTHM had made frequent headlines by breaking into DoD computer bases, stealing embarrassing State Department cables, and disabling the LANs of the big national laboratories, then publishing their exploits. Of course, ALGO.RYTHM hackers managed to complete these missions only by following the guided maps through agency software defenses fed to them by Jasmine Bath. If ALGO.RYTHM hackers got sloppy with their opsec, CIOS would dispatch a specialized field operative to pinch off the potential leak, usually with a small-caliber bullet to the brain.
The closest anyone had ever come to identifying Jasmine occurred just weeks after the Utah Data Center at Bluffdale had gone online. She still wasn’t quite sure how he’d picked up her digital scent, but he did, and his abilities were far superior to those of anyone else she’d ever encountered at the Q Group, the NSA’s security and counterintelligence directorate. She finally evaded him by destroying his career, falsely linking him to the most recent Utah Data Center catastrophe. It was one of her best ops.
Jasmine knew the security protocols at the UDC because she’d designed half of them while in the NSA’s employ. The UDC was NSA’s vast, multibillion-dollar server farm, and the crown jewel in its burgeoning intelligence-gathering empire. It was deemed impossible to infect the computers there with any kind of virus thanks to the external firewalls, which suffered tens of thousands of automated attempted hacks daily.
But the internal security procedures were equally important. Those protocols kept any devices from being smuggled in that might carry infectious malware. The NSA knew that it was a USB thumb drive infected with the Stuxnet virus smuggled into the Natanz nuclear facility that wiped out over a thousand Iranian centrifuges. The NSA took every precaution to avoid a similar attack on the UDC.
Every precaution but one, Jasmine determined.
A search of UDC employees uncovered the medical records of a senior programmer at the facility. The fifty-eight-year-old woman had recently had one of the new wirelessly programmed heart pacemakers implanted. The wireless pacemaker was monitored and updated via a cell phone call. All Bath did was hack into the poorly secured mainframe of the medical device manufacturer and install a Stuxnet-like worm on the woman’s pacemaker via the cell phone. Once the infected programmer was at her computer station, the self-propogating worm used the pacemaker’s wireless capabilities to infect the SCADA system Wi-Fi routers. Those SCADA computers, in turn, controlled the air handler units that cooled the 1.2 million square feet of the vast server farm. Once the air handler units failed—along with the warning alarms and software monitoring the failure, disabled by the same worm—acres of servers overheated and eventually caught fire, destroying 400 terabytes of collected foreign intelligence. While this represented only a small fraction of the total amount of data stored at the UDC, it was an amount of data equal to all of the books ever written in the history of the world.
Internal security inspections investigating the multimillion-dollar catastrophe located the worm, and it was traced back to the home computer of the Q Group investigator who had nearly uncovered CIOS and its operations. His hard drive also contained encrypted links to offshore bank accounts affiliated with the anarchist hacker group ALGO.RYTHM.
The innocent Q Group investigator was swiftly arrested, tried, and convicted. A life ruined, a family bankrupted, all thanks to falsified evidence created and planted by Jasmine Bath.
35 
Adrar des Ifoghas
Kidal Region, Northeastern Mali
7 May
The convoy of five Toyota pickups sped through the desert toward the mountains in a long, steady line, spread out enough that the sand kicked up by the truck in front didn’t spatter the windshield of the one behind. Overladen with extra ammo, weapons, gear, and people, they couldn’t do top speed for fear of hitting the soft patches of sand and either busting shocks or, worse, spilling the trucks over and tossing their human cargo onto the ground. The ride was hardly smooth, though. The extra weight caused the trucks to rise and fall like a ship on a heavy ocean swell, especially in back where Pearce and Early rode in Mossa’s truck. They’d suffered far worse in years gone by, but hours of sweltering heat and stinging sand in an open truck bed wasn’t exactly a Disneyland ride, either.
Читать дальше