Michael Crichton - State Of Fear

Здесь есть возможность читать онлайн «Michael Crichton - State Of Fear» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: Детская проза, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

State Of Fear: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «State Of Fear»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

State Of Fear — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «State Of Fear», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

But ears didn't change. The shape of the forehead didn't change. So the programs were therefore weighted to rely on the configuration of ears, and the shape of the forehead. Changing these parts of the face would result in a "no-match" outcome on a computer.

The guy from Santa Cruz knew that. He knew security cameras would photograph him when he got near the rig. So he changed his appearance in a way that would prevent identification by computer.

Similarly, the three extremists at Weddell clearly had formidable backing to carry out their high-tech terrorist act. It took months of planning. Costs were high. And they obviously had in-depth support to obtain academic credentials, university stencils on their shipping boxes, shell companies for their Antarctic shipments, false websites, and dozens of other details necessary for the undertaking. There was nothing unsophisticated about their plan or the way they had executed it.

"And they would have succeeded," Kenner said, "except for that list George Morton obtained shortly before his death."

All of which suggested that if ELF was once a loose association of amateurs, it was no longer. Now it was a highly organized networkone that employed so many channels of communication among its members (e-mail, cell phones, radio, text messaging) that the network as a whole eluded detection. The governments of the world had long worried about how to deal with such networks, and the "netwars" that would result from trying to fight them.

"For a long time, the concept of a netwar was theoretical," Kenner said. "There were studies coming out of RAND, but nobody in the military was really focusing on it. The notion of a networked enemy, or terrorists, or even criminals was too amorphous to bother with."

But it was the amorphous quality of the networkfluid, rapidly evolvingthat made it so difficult to combat. You couldn't infiltrate it. You couldn't listen in on it, except by accident. You couldn't locate it geographically because it wasn't in any one place. In truth, the network represented a radically new kind of opponent, and one that required radically new techniques to combat it.

"The military just didn't get it," Kenner said. "But like it or not, we're in a netwar right now."

"And how do you fight a netwar?" Evans said.

"The only way to oppose a network is with another network. You expand your listening posts. You decrypt around the clock. You employ techniques of networked deception and entrapment."

"Such as what?"

"It's technical," Kenner said vaguely. "We rely on the Japanese to spearhead that effort. They are the best at it in the world. And of course we extend our feelers in multiple directions at the same time. Based on what we've just learned at Weddell, we have lots of irons in the fire." Kenner had databases being searched. He had state organizations mobilized. He had inquiries into where the terrorists had obtained their academic credentials, their encrypted radio transmitters, their explosive charges, their computerized detonation timers. None of this was commonplace stuff and it could be traced, given enough time.

"Is there enough time?" Evans said.

"I'm not sure."

Evans could see that Kenner was worried. "So: What is it you want me to do?"

"Just one very simple thing," Kenner said.

"What's that?"

Kenner smiled.

III. ANGEL

LOS ANGELES

SATURDAY, OCTOBER 9

7:04 A.M.

"Is this really necessary?" Peter Evans said, with a worried look.

"It is," Kenner said.

"But it's illegal," Evans said.

"It's not," Kenner said firmly.

"Because you are a law-enforcement officer?" Evans said.

"Of course. Don't worry about it."

They were flying in over Los Angeles, approaching the runway at Van Nuys. The California sun shone through the windows. Sanjong was hunched over the dining table in the middle of the plane. In front of him lay Evans's cell phone, the back removed. Sanjong was attaching a thin gray plate the size of his thumbnail right on top of the battery.

"But what exactly is it?" Evans said.

"Flash memory," Sanjong said. "It'll record four hours of conversation in a compressed format."

"I see," Evans said. "And what am I supposed to do?"

"Just carry the phone in your hand, and go about your business."

"And if I get caught?" he said.

"You won't get caught," Kenner said. "You can take it anywhere. You'll go right through any security, no problem."

"But if they have bug sweepers amp;"

"They won't detect you, because you're not transmitting anything. It's got a burst transmitter. For two seconds every hour, it transmits. The rest of the time, nothing." Kenner sighed. "Look, Peter. It's just a cell phone. Everyone has them."

"I don't know," Evans said. "I feel bad about this. I mean, I'm not a stool pigeon."

Sarah came to the back, yawning, clearing her ears. "Who's a stool pigeon?"

"It's how I feel," Evans said.

"That's not the issue," Kenner said. "Sanjong?"

Sanjong took out a printed list, passed it to Evans. It was Morton's original sheet, now with additions to it:

662262

3982293

24FXE

62262

82293

TERROR

Mt. Terror, Antarctica

882320

4898432

12FXE

82232

54393

SNAKE

Snake Butte, Arizona

774548

9080799

02FXE

67533

43433

LAUGHER

Laugher Cay, Bahamas

482320

5898432

22FXE

72232

04393

SCORPION

Resolution, Solomon Is.

ALT

662262

3982293

24FXE

62262

82293

TERROR

Mt. Terror, Antarctica

382320

4898432

12FXE

82232

54393

SEVER

Sever City, Arizona

244548

9080799

02FXE

67533

43433

CONCH

Conch Cay, Bahamas

482320

5898432

22FXE

72232

04393

SCORPION

Resolution, Solomon Is.

ALT

662262

3982293

24FXE

62262

82293

TERROR

Mt. Terror, Antarctica

382320

4898432

12FXE

82232

54393

BUZZARD

Buzzard Gulch, Utah

444548

7080799

02FXE

67533

43433

OLD MAN

Old Man Is., Turks amp; Caicos

482320

5898432

22FXE

72232

04393

SCORPION

Resolution, Solomon Is.

ALT

662262

3982293

24FXE

62262

82293

TERROR

Mt. Terror, Antarctica

382320

4898432

12FXE

82232

54393

BLACK MESA

Black Mesa, New Mexico

344548

9080799

02FXE

67533

43433

SNARL

Snarl Cay, BWI

482320

5898432

22FXE

72232

04393

SCORPION

Resolution, Solomon Is.

"As you see, Sanjong has identified the precise GPS locations," Kenner said. "You've undoubtedly noticed a pattern in the list. The first incident we know about. The second incident will take place somewhere in the American deserteither Utah, Arizona, or New Mexico. The third incident will be somewhere in the Caribbean, east of Cuba. And the fourth incident will be in the Solomon Islands."

"Yes? So?"

"Our concern right now is for the second incident," Kenner said. "And the problem is that from Utah to Arizona to New Mexico there are fifty thousand square miles of desert. Unless we can get additional information, we'll never find these guys."

"But you have exact GPS locations amp;"

"Which they will undoubtedly change, now that they know of the trouble in Antarctica."

"You think they have already changed plans?"

"Of course. Their network knew something was wrong as soon as we arrived at Weddell yesterday. I think that's why the first guy left. I think he's actually the leader of the three. The other two were just foot soldiers."

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «State Of Fear»

Представляем Вашему вниманию похожие книги на «State Of Fear» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Michael Crichton - Drug of Choice
Michael Crichton
Michael Crichton - Gold - Pirate Latitudes
Michael Crichton
Michael Crichton - Esfera
Michael Crichton
Michael Crichton - Latitudes Piratas
Michael Crichton
Michael Crichton - Beute (Prey)
Michael Crichton
Michael Crichton - The Terminal Man
Michael Crichton
libcat.ru: книга без обложки
Michael Crichton
libcat.ru: книга без обложки
Michael Crichton
libcat.ru: книга без обложки
Michael Crichton
libcat.ru: книга без обложки
Michael Crichton
Michael Crichton - The Andromeda Evolution
Michael Crichton
Отзывы о книге «State Of Fear»

Обсуждение, отзывы о книге «State Of Fear» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x