Daemon d-1

Home > Science > Daemon d-1 > Page 36
Daemon d-1 Page 36

by Daniel Suarez


  The general looked to her. “The cop on death row?”

  “His appeals are moving through the federal courts unusually fast. He’s scheduled to die by lethal injection.”

  Fulbright didn’t respond immediately. “I’ll take that under advisement, Doctor.”

  “You could fake his execution-”

  “This might seem harsh, but Peter Sebeck must suffer the full penalty demanded by law-and the sooner the better. Faking his execution would risk tipping our hand to the Daemon.”

  “Sir, please-”

  “Philips, you yourself said that the Daemon has operatives in thousands of organizations. It could also have operatives in the penal system or law enforcement. So we must take the safe course. Sebeck is a casualty of this war, Doctor. You must put him out of your mind and concentrate on saving the lives and property of millions more Americans.”

  Philips stared at him for a moment. “But surely we-”

  “There is no ‘but,’ Doctor. Please focus on your work.”

  She was about to speak again when the general leaned in.

  “Any word from Jon Ross?”

  Philips was still distracted but collected herself. “Not recently.”

  The general nodded. ” There’s a hacker we need in custody ASAP. All these hackers should be rounded up and shot.”

  She eyed the general. ” I’m a hacker, General, and if it weren’t for people like Jon Ross, we’d be in far worse shape than we are now.”

  Fulbright kept his eyes on her. “Find him. We need him on the Joint Task Force. Tell him we’ll offer amnesty and U.S. citizenship, if you think it will matter. Just get him here. In the meantime, I need you and your people focused and working to find a way to stop this thing. Is that clear?”

  She did not respond with enthusiasm. “Yes, sir.”

  Fulbright didn’t relent. “Are we clear on this?”

  “Sir, I-»

  “You are a perceptive woman, Natalie. You, of all people, should be able to do the math on this. If we risk the lives and livelihoods of hundreds of millions of people to save the life of a single man, we’ll be guilty of a heinous crime. Do you see the truth of this?”

  She nodded after a moment.

  “Now perhaps you can gain some appreciation for the cruel calculus I’m forced to use every day.” He put a hand on her shoulder. “Your heart is in the right place. There’s nothing wrong with that. But keep a sense of perspective. Ask yourself how many children you’d be willing to sacrifice so that Detective Sebeck can live.”

  Philips realized he was right.

  The general cleared his throat. “I need to report back to the Pentagon.”

  Philips turned to the deputy director. He nodded. She called after the general. “There’s more, sir.”

  “Let’s hear it.”

  “I detected something unusual emanating from the networks of Daemon-infected companies. It’s a pulse-an IP beacon of sorts. The tech industry calls these ‘heartbeats.’ This one consists of a lengthy burst of packets issuing from TCP port 135 at a predictable interval and bit length. Once we noticed the beacon was present at infected companies, we started looking for it elsewhere on the Internet. We found it echoing all over. That’s how we estimate that thirty-eight hundred corporations have been compromised. Some of those companies might not even know they’re infected yet.”

  The general was nonplussed. “What’s the purpose of this ‘IP beacon’?”

  “That was the question. We first thought it might be a signal to indicate a company was a Daemon host. But then the signal wouldn’t need to be so long-and each burst is a pretty long stream of data. It’s always identical for a single company, but never the same between two different companies. And all companies project it in a sequence-like a chain. A pulse from Company A is sent to Company B, then from Company B to Company C, and so on until we start back at Company A again. Stranger still, when our infiltration attempt caused one company to be destroyed, another beacon appeared at a new company to take its place, and it exactly matched the beacon that was lost.”

  She paused. “That’s when I first suspected this was a multipart message.”

  “The companies are communicating with each other?”

  “No. They’re communicating to us.”

  The general weighed what that meant. He regarded Philips with something akin to dread. “What are they saying?”

  “The message was encoded with a 128-bit block cipher. It took us weeks to decrypt-and that was on Cold Iron.The good news is that, besides the Japanese and maybe the Chinese, it will take other nations years to decrypt, so we’re convinced that Sobol intended it for us. When we assembled the constituent pieces from all the beacons at all the companies, we discovered a single, very large GNU compressed file. When we extracted the package contents, we found two things: an API and an MPEG video file.”

  “What’s an API?”

  “It’s an application programming interface-rules for controlling a process. It’s basically a guide for communicating with-and possibly controlling-the Daemon.”

  “Good lord! Why would Sobol give us that?”

  “I think it’s a trap, sir.”

  “What sort of control is it saying it will give us?”

  “We’ve only begun our analysis, but the most significant function we’ve discovered is in the Daemon’s Ragnorok class library. It’s a function named Destroy. It accepts a country code and a tax ID as arguments. We believe that invoking it destroys all the data in the target company.”

  The general thought about this. “My God…why would he give that to us?”

  “We don’t know yet.”

  “You said there was a video. What did the video contain?”

  Philips took a deep breath. “Something you need to carry up the chain of command.”

  *

  In the boardroom of building OPS-2B, the group of agency directors sat arrayed around a broad mahogany conference table. The tension was thick as ominous looks passed from one director to the next. Their host opened the emergency meeting.

  NSA: “Gentlemen, you are all aware of the gravity of the current situation. I’ve brought in representatives from both Computer Systems Corporation and its subsidiary, EndoCorp, to provide additional technical expertise in this matter. These are the same folks who built the FBI’s new case management system. They are cleared UMBRA, so we may speak freely. Some of you have already worked together at NBP-1.”

  Both representatives gave dour nods. They were in their forties and looked more conservative than the window mannequins in the FBI gift shop.

  NSA: “What you’re about to see is a matter of the utmost secrecy. Were this information to be made public, there is every likelihood that the world economy would falter.” He let it sink in. “A-Group has decrypted a video message from Matthew Sobol.”

  An animated buzz spread through the room. He waited until it died down.

  NSA: “We’re going to screen that video. Watch it carefully, and we’ll discuss it afterward. Lights, please.”

  The lights dimmed, and a plasma screen set into the wall glowed to life. In a moment Matthew Sobol appeared in high-definition color. The image was so clear it seemed as if a window had opened in the side of the somber boardroom. Sobol stood outdoors, in the sun on high ground overlooking the ocean. He was dressed in khakis and a pressed linen shirt. He looked normal, healthy, the breeze tossing his hair.

  Sobol betrayed no emotion. He stared into the camera for several moments before speaking. “They built a twenty-trillion-dollar house of cards. Then they told you to guard it. And they call me insane.”

  Sobol started to walk along the cliff’s edge. The camera followed him, Steadicam-like, in medium close-up. “Technology. It is the physical manifestation of the human will. It began with simple tools. Then came the wheel, and on it goes to this very day. Civilizations rise and fall based on technological innovation. Bronze falls to iron. Iron falls to steel. Steel falls to gunpowder. Gunpowd
er falls to circuitry.” Sobol looked toward the camera again. “For those among you who don’t understand what’s happening, let me explain: the Great Diffusion has begun-an era when the nation state dissolves. Technology will cause this. As countries compete for markets in the global economy, diffusion of high technology will accelerate. It will result in a diffusion of power. And diffusion of power will make countries an ineffective organizing principle. At first, marginal governments will fail. Larger states will not be equipped to intercede effectively. These lawless regions will become breeding grounds for international crime and terrorism. Threats to centralized authority will multiply. Centralized power will be defenseless against these distributed threats. You have already experienced the leading edge of this wave.”

  Sobol stopped walking and gazed longingly out at the ocean. In a moment he turned to the camera again.

  “My Daemon is not your enemy. And thankfully it cannot be stopped. By anyone or anything. It is neither good nor evil. It is like fire, and it will burn those who do not learn to use it. It will burn the enemies of reason. It will burn the hypocrites and the fools. Use the tools I’ve given you, and the Daemon will become a valuable resource. Or, if you prefer, don’t. Remember that the Daemon is now firmly established throughout the world. Other cultures will use these tools, even if you do not.”

  He stared straight into the camera. “There will be violence soon. It will shock you with its scope and ferocity. Don’t waste your time interceding. It isn’t directed at you. It is directed at other parasites in the network.

  “Distributed daemons are a foregone conclusion in the coming world. You should befriend this one. Because the next daemon might not be so friendly. And, unlike your current leaders, my Daemon can protect you from your enemies.”

  The video ended, and the lights came up.

  Everyone looked suddenly haggard.

  CIA: “Jumping Jesus…”

  NSA: “Gentlemen, you’ve seen the devil himself, and now we need to figure out what to do about him.”

  CIA: “Forget him. What can we do to stop his Daemon?”

  DARPA: “We need to destroy the Daemon’s darknet, that’s what we need to do. This message is just propaganda. Another misdirection.”

  CSC: “Destroying the Daemon will require a coordinated cyber attack on numerous corporate data systems. An attack unprecedented in scale-a digital D-Day.”

  DARPA: “Too risky. One misstep, and the Daemon destroys thousands of companies.”

  EndoCorp: “We can’t just let this thing take over. Whatever the cost.”

  FBI: “What does Sobol mean when he says there’ll be violence? Is he talking revolution?”

  DARPA: “He’s a megalomaniac.”

  DIA: “If he means revolution, we should have troops in the streets. Sobol could be planning a coup.”

  NSA: “The markets are already shaky. Mobilizing troops and declaring martial law will cause a panic.”

  CSC: “We have private security forces available.”

  CIA: “He said we weren’t the target.”

  FBI: “You’re not going to take him at his word, are you?”

  DIA: “He did say nation states were doomed.”

  CIA: “Yes, but he didn’t say he would be the instrument of their destruction. He could be warning us.”

  FBI: “You’re starting to worry me.”

  CIA: “I don’t mean that Sobol is on our side. I think he’s an evil bastard-I mean was an evil bastard-but he had a demented vision that I think we should try to wrap our heads around. He talked about small groups-‘The Great Diffusion’ is how he termed it. That small groups would be battling nation states.”

  DARPA: “Sobol mentioned lawless regions and failed states. What if he was talking about terrorism?”

  DIA: “Terrorists use our own technology against us.”

  CIA: “And so do international crime rings. Does Sobol think his Daemon could be used against terrorism and transnational crime?”

  DARPA: “It took over the online porn and gambling industries easily enough.”

  NSA: “We’ve got to get a handle on this.”

  EndoCorp: “Gentlemen, this Daemon is comprised of distributed networked systems with a companion human network. This is no different from many enemies we’ve already defeated.”

  DARPA: “I think it’s clearly different.”

  EndoCorp: “In specifics, maybe, but not in the abstract. Whether he’s dead or alive, Sobol’s network can be disrupted and his people put to flight. In order to knock out his human network, we need to hit them hard and hit them everywhere-keep them on the run and keep them looking over their shoulder.”

  CSC: “And in order to prevent the various Daemon components from interacting, we stage a regional power outage immediately preceding operations. We exert our control over major media outlets to prevent the Daemon from reading the news-or we fabricate the news to suit our purposes.”

  The directors seemed taken aback by the sudden turn in the discussion.

  NSA: “What about the Daemon’s human operatives? Wouldn’t they still be able to communicate?”

  EndoCorp: “This is classic infowar-which we invented. We have highly skilled cyber and electronic warfare experts. We’ll be monitoring Daemon activities in coming weeks. And as for the Daemon’s human operatives: they won’t stand up long against ex-Special Forces soldiers. We’ve operated successfully in Colombia against leftwing rebels and narco-terrorists, and in subSaharan Africa against Islamic rebels. Our men operate in small groups with minimal supervision-no legislative oversight necessary.”

  CIA: “That’s fine in Colombia and subSaharan Africa, but how the hell are you going to sell that in Columbus, Ohio? And how do you tell friend from foe in a tech park server room?”

  EndoCorp: “You don’t. We move in our own people to operate the data centers and detain the current staff until we can satisfy ourselves that they pose no risk.”

  NSA: “This is crazy talk. You can’t round up IT workers in thousands of companies. You don’t have the manpower, for one thing. Also, a substantial percentage of the infected sites are in foreign countries. Most Fortune 500 companies have their back-office data processing operations in India and Southeast Asia.”

  EndoCorp: “Borders mean nothing to us. We have private military provider and support firms in place in twenty-five countries, incorporated under a hundred different names. And we have influential voices in dozens more countries. Certain financial interests currently at risk are willing to underwrite this effort to protect the global economy.”

  NSA: “The moment you attack, the Daemon will destroy the infected networks.”

  FBI: “He’s right. There are too many targets to hit all at once.”

  The CSC representative looked soberly around the table.

  CSC: “That’s correct. That’s why we need to pick and choose. If we defend a cross-section of Western interests in numerous industries, the global economy can achieve survivability. But only if strategic investments are made in the shares of selected survivors. This can defray the loss of the other companies.”

  The directors were speechless for a moment.

  DARPA: “What about these ‘tools’ that Sobol mentioned?”

  The faces shifted in his direction.

  NSA: “It’s a programming interface of some type included in Sobol’s message. Group A has a team analyzing the components now. They suspect Sobol might be extending some form of communication with his Daemon. Perhaps even rudimentary control.”

  FBI: “What kind of control?”

  NSA: “For starters, there’s a function that, on demand, destroys the data of any chosen Daemon-infected company.”

  Everyone immediately grasped the significance of this.

  DARPA: “And this is still being broadcast around the world in an encrypted beacon?”

  NSA: “Yes. Which means it’s only a matter of time until other governments have this knowledge, too.”

  CIA: “Sobol�
��s forcing our hand.”

  DARPA: “We’ll need to see that API as soon as possible. It could provide intelligence on the topology of the Daemon’s darknet.”

  FBI: “You’re not seriously suggesting we start communicating with this thing? We don’t negotiate with terrorists.”

  NSA: “No one’s negotiating with anyone. This is an object library. We’re analyzing it.”

  FBI: “Look, we’ve been messing around long enough. We need to kill it. It’s taken over a big chunk of the Fortune 500, and it can cause irreparable harm to this nation.”

  CSC: “To the global economy.”

  NSA: “That’s the whole point: if we make one move against it, the Daemon will flush all that corporate data down the toilet. And if we ignore it, then some other government might invoke the Destroy function to attack us.”

  CSC: “We must attack it.”

  NSA: “I don’t think losing three quarters of the companies is an option.”

  EndoCorp: “You need to move on Sobol’s organization. Infiltrate it, identify all the ringleaders, nab them, turn the screws on them, and roll their whole damned group. We’ve done it before.”

  CSC: “You’ll need handpicked teams.”

  NSA: “Gentlemen, I hope we’re not disturbing your meeting.”

  They looked impassively at the director.

  Chapter 36:// The Powers That Be

  A gleaming Dassault business jet taxied out of the darkness and into a brightly lit, spotlessly clean hangar. It rolled to a stop alongside a black Cadillac Escalade and a Chevy Suburban. The aircraft engines whined to a stop as men in suits removed their ear protection and approached the plane.

  The jet door was pulled open, letting down a short row of steps. In a moment Russell Vanowen, Jr., stepped from the plane, as always looking resplendent in a bespoke, black pinstriped suit. He cast his commanding gaze around the hangar. Everything looked secure. Only his hired security team was present. Korr Security Services-ex-Special Forces soldiers. Smart, capable, trustworthy.

  He strode toward the Escalade as one of his half dozen bodyguards stepped up to meet him.

 

‹ Prev