Michael Crichton - State Of Fear
Здесь есть возможность читать онлайн «Michael Crichton - State Of Fear» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: Детская проза, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.
- Название:State Of Fear
- Автор:
- Жанр:
- Год:неизвестен
- ISBN:нет данных
- Рейтинг книги:4 / 5. Голосов: 1
-
Избранное:Добавить в избранное
- Отзывы:
-
Ваша оценка:
- 80
- 1
- 2
- 3
- 4
- 5
State Of Fear: краткое содержание, описание и аннотация
Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «State Of Fear»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.
State Of Fear — читать онлайн бесплатно полную книгу (весь текст) целиком
Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «State Of Fear», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.
Интервал:
Закладка:
But ears didn't change. The shape of the forehead didn't change. So the programs were therefore weighted to rely on the configuration of ears, and the shape of the forehead. Changing these parts of the face would result in a "no-match" outcome on a computer.
The guy from Santa Cruz knew that. He knew security cameras would photograph him when he got near the rig. So he changed his appearance in a way that would prevent identification by computer.
Similarly, the three extremists at Weddell clearly had formidable backing to carry out their high-tech terrorist act. It took months of planning. Costs were high. And they obviously had in-depth support to obtain academic credentials, university stencils on their shipping boxes, shell companies for their Antarctic shipments, false websites, and dozens of other details necessary for the undertaking. There was nothing unsophisticated about their plan or the way they had executed it.
"And they would have succeeded," Kenner said, "except for that list George Morton obtained shortly before his death."
All of which suggested that if ELF was once a loose association of amateurs, it was no longer. Now it was a highly organized networkone that employed so many channels of communication among its members (e-mail, cell phones, radio, text messaging) that the network as a whole eluded detection. The governments of the world had long worried about how to deal with such networks, and the "netwars" that would result from trying to fight them.
"For a long time, the concept of a netwar was theoretical," Kenner said. "There were studies coming out of RAND, but nobody in the military was really focusing on it. The notion of a networked enemy, or terrorists, or even criminals was too amorphous to bother with."
But it was the amorphous quality of the networkfluid, rapidly evolvingthat made it so difficult to combat. You couldn't infiltrate it. You couldn't listen in on it, except by accident. You couldn't locate it geographically because it wasn't in any one place. In truth, the network represented a radically new kind of opponent, and one that required radically new techniques to combat it.
"The military just didn't get it," Kenner said. "But like it or not, we're in a netwar right now."
"And how do you fight a netwar?" Evans said.
"The only way to oppose a network is with another network. You expand your listening posts. You decrypt around the clock. You employ techniques of networked deception and entrapment."
"Such as what?"
"It's technical," Kenner said vaguely. "We rely on the Japanese to spearhead that effort. They are the best at it in the world. And of course we extend our feelers in multiple directions at the same time. Based on what we've just learned at Weddell, we have lots of irons in the fire." Kenner had databases being searched. He had state organizations mobilized. He had inquiries into where the terrorists had obtained their academic credentials, their encrypted radio transmitters, their explosive charges, their computerized detonation timers. None of this was commonplace stuff and it could be traced, given enough time.
"Is there enough time?" Evans said.
"I'm not sure."
Evans could see that Kenner was worried. "So: What is it you want me to do?"
"Just one very simple thing," Kenner said.
"What's that?"
Kenner smiled.
III. ANGEL
LOS ANGELES
SATURDAY, OCTOBER 9
7:04 A.M.
"Is this really necessary?" Peter Evans said, with a worried look.
"It is," Kenner said.
"But it's illegal," Evans said.
"It's not," Kenner said firmly.
"Because you are a law-enforcement officer?" Evans said.
"Of course. Don't worry about it."
They were flying in over Los Angeles, approaching the runway at Van Nuys. The California sun shone through the windows. Sanjong was hunched over the dining table in the middle of the plane. In front of him lay Evans's cell phone, the back removed. Sanjong was attaching a thin gray plate the size of his thumbnail right on top of the battery.
"But what exactly is it?" Evans said.
"Flash memory," Sanjong said. "It'll record four hours of conversation in a compressed format."
"I see," Evans said. "And what am I supposed to do?"
"Just carry the phone in your hand, and go about your business."
"And if I get caught?" he said.
"You won't get caught," Kenner said. "You can take it anywhere. You'll go right through any security, no problem."
"But if they have bug sweepers amp;"
"They won't detect you, because you're not transmitting anything. It's got a burst transmitter. For two seconds every hour, it transmits. The rest of the time, nothing." Kenner sighed. "Look, Peter. It's just a cell phone. Everyone has them."
"I don't know," Evans said. "I feel bad about this. I mean, I'm not a stool pigeon."
Sarah came to the back, yawning, clearing her ears. "Who's a stool pigeon?"
"It's how I feel," Evans said.
"That's not the issue," Kenner said. "Sanjong?"
Sanjong took out a printed list, passed it to Evans. It was Morton's original sheet, now with additions to it:
662262
3982293
24FXE
62262
82293
TERROR
Mt. Terror, Antarctica
882320
4898432
12FXE
82232
54393
SNAKE
Snake Butte, Arizona
774548
9080799
02FXE
67533
43433
LAUGHER
Laugher Cay, Bahamas
482320
5898432
22FXE
72232
04393
SCORPION
Resolution, Solomon Is.
ALT
662262
3982293
24FXE
62262
82293
TERROR
Mt. Terror, Antarctica
382320
4898432
12FXE
82232
54393
SEVER
Sever City, Arizona
244548
9080799
02FXE
67533
43433
CONCH
Conch Cay, Bahamas
482320
5898432
22FXE
72232
04393
SCORPION
Resolution, Solomon Is.
ALT
662262
3982293
24FXE
62262
82293
TERROR
Mt. Terror, Antarctica
382320
4898432
12FXE
82232
54393
BUZZARD
Buzzard Gulch, Utah
444548
7080799
02FXE
67533
43433
OLD MAN
Old Man Is., Turks amp; Caicos
482320
5898432
22FXE
72232
04393
SCORPION
Resolution, Solomon Is.
ALT
662262
3982293
24FXE
62262
82293
TERROR
Mt. Terror, Antarctica
382320
4898432
12FXE
82232
54393
BLACK MESA
Black Mesa, New Mexico
344548
9080799
02FXE
67533
43433
SNARL
Snarl Cay, BWI
482320
5898432
22FXE
72232
04393
SCORPION
Resolution, Solomon Is.
"As you see, Sanjong has identified the precise GPS locations," Kenner said. "You've undoubtedly noticed a pattern in the list. The first incident we know about. The second incident will take place somewhere in the American deserteither Utah, Arizona, or New Mexico. The third incident will be somewhere in the Caribbean, east of Cuba. And the fourth incident will be in the Solomon Islands."
"Yes? So?"
"Our concern right now is for the second incident," Kenner said. "And the problem is that from Utah to Arizona to New Mexico there are fifty thousand square miles of desert. Unless we can get additional information, we'll never find these guys."
"But you have exact GPS locations amp;"
"Which they will undoubtedly change, now that they know of the trouble in Antarctica."
"You think they have already changed plans?"
"Of course. Their network knew something was wrong as soon as we arrived at Weddell yesterday. I think that's why the first guy left. I think he's actually the leader of the three. The other two were just foot soldiers."
Читать дальшеИнтервал:
Закладка:
Похожие книги на «State Of Fear»
Представляем Вашему вниманию похожие книги на «State Of Fear» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.
Обсуждение, отзывы о книге «State Of Fear» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.