Combat

Home > Other > Combat > Page 43
Combat Page 43

by Stephen Coonts


  “Exactly,” the older outlander stated. “Otherwise, the cycle will simply repeat itself, with macnife becoming smarter and the nation supplying the equipment and funding getting away scot-free.”

  “Do you folks have any specific targets in mind?” Eric asked as his enthusiasm for this operation continued to mount.

  “We have been assigned two targets,” Major Hines stated as he finally found an opportunity to elbow his way back into the briefing he was chairing. “The first hack is the supporting nation’s cyberwarfare center. We want you to get inside the system there and see what you can find.”

  Excited, Eric blurted out his questions as he thought of them. “Is this a simple snoop and scoot?”

  “If possible,” Hines stated, annoyed at the interruption, “we want you to plant a Trojan horse, which the NSA rep will provide you with.”

  To hackers, a Trojan horse is an implanted code or program that runs an operation or performs functions that the host computer user is unaware of or alters an existing program so that the original functions do not behave as they were intended to. If done well, a Trojan is all but impossible to find and can totally corrupt the original program.

  “Okay, so far, this sounds like a piece of cake,” Eric quipped.

  Again, the two outlanders turned to face each other before continuing. “The second hack is a straight-out attack against a chemical plant located within the supporting nation.”

  Suddenly, Eric’s tone changed. “A denial of service attack?” he asked cautiously.

  “No,” the older outlander stated without betraying any emotion. “The objective of this hack is destruction. Whether this can be best achieved by altering settings or by incapacitating automated safety protocols will be determined once you’re into their system. It’s the results that matter.”

  It was more than the words that caused the hairs on Eric’s neck to bristle. It was the cold, unemotional manner in which the outlander mouthed them that bothered the Cyberknight. “If it’s a chemical plant,” the young hacker stated cautiously, “then we’re talking serious roadkill. Aren’t we?”

  Though they never saw it up close and personal, the loss of human life as a result of their hacks, referred to as roadkill, bothered even the most hardened Cyberknight. So long as there was no blood shed as a direct result of their activities, the young hackers belonging to the 401st could engage in a bit of self-deluding disassociation. But once that line was crossed, once they became aware that their activities, if successful, would produce death, many a Cyberknight hesitated. On more than one occasion, a Cyberknight even declined to execute an assigned task.

  Realizing what was going on, Colonel Shrewsbery chose this moment to insert himself into the proceedings. “I am well aware of the fact, Specialist Bergeron,” he stated in a gruff voice that commanded everyone’s attention, “that you do not think of yourself as a soldier, at least not in the conventional sense.”

  Eric looked across the room and into the dark, unflinching eyes of the colonel. “I do not believe,” the Cyberknight whispered, “in the taking of human life.”

  “Unfortunately,” Shrewsbery countered without hesitation, “those who oppose us do not share that sentiment. While it would be wrong to characterize them all as monsters, let there be no doubt in your mind that they are willing to do whatever they need to in order to achieve their national goals.” Pausing, Shrewsbery reached down, without breaking eye contact with Eric, and picked a newspaper off the floor. With an underhanded toss, he flung the paper on the table, faceup, in Eric’s direction.

  Reaching out, the young Cyberknight stopped it just before it slid off the table and into his lap. In bold print the paper announced that any hope of finding the F-16 pilots alive was waning. Below that banner headline was a photo of one of the pilots’ wife, looking up into the empty sky, as she clutched a crying child to her side. As Eric read the caption accompanying the photo, Shrewsbery continued. “How many tears do you think the folks behind that hack shed?”

  Looking up at the colonel, Eric’s resolve hardened, but only for a moment. “I cannot speak for them, sir.”

  “I’m not asking you to, son,” Shrewsbery replied as he moderated his tone. “All I am asking you to do is to do your best to keep that sort of thing from becoming a daily occurrence. While none of us can bring those pilots back, we damned sure can do something to protect those who are still out there, doing their duty, just like you.”

  Unable to find a suitable reply, Eric again looked at the photo before him. Then he lifted his eyes and looked over at the people gathered about the table. They were all staring at him, waiting for him to say something.

  Glancing back at Shrewsbery, Eric found that he was barely able to contain his anger. How he hated it when someone like the colonel rubbed his nose in what he, and the other Cyberknights, really did. Eric knew that the 401st was not a video arcade. He understood, on an intellectual level, that his actions had very real consequences that affected very real people. He just didn’t want to be reminded of this day in, day out. Like the bomber crews in World War II, the young Cyberknight managed, for the most part, to insulate himself from what he was doing. That’s why he and all the other Cyberknights used the colorful terms they did. Such words hid the meaning of their actions. Nor did the Cyberknights allow themselves to think of their foes as real people. And, like the young men who had flown the planes that had smashed Coventry, flattened Dresden, and eradicated Hiroshima, once they had finished an action, they moved on. No need, he often found himself thinking, to bother himself about what lay behind in his wake. He was, after all, simply following orders. Let the people who generated those orders lose sleep over the price.

  But every now and then, reality took a bite out of this cherished isolation. As the saying went in the Keep, even Disneyland has a cloudy day.

  “Okay,” Eric finally whispered as he took the newspaper before him and flipped it over. Mustering up as much enthusiasm as he could, he turned to face Major Hines. “Let’s get it on.”

  Four

  The Pit

  The days when a high-school kid, parked in front of his computer in the comforts of his bedroom, could rain down death and distraction upon the world were gone. So was the Lone Ranger approach, especially within the 401st. When executing a major operation, known as a hack attack, the exercise had all the intricacies of a Broadway production. The room in which they made their attack was not as nearly as sophisticated as one would have imagined, though it did have more than its fair share of bells and whistles common to most government operations. Yet even these, like everything found in that room, nicknamed the Pit, had a purpose.

  The Pit was isolated for reasons of security. The official name of the Pit, posted on the red door that separated it from the rest of the tunnel complex, was Discrete Strike Operations Center, or DSOC, pronounced “dee sock” by the operations staff. Within the DSOC were two chambers, the Pit itself, where the actual cyberattack would take place, and a second, in which observers, straphangers, and miscellaneous personnel not directly involved in the mechanics of the attack could watch via closedcircuit TV and dummy monitors. The Army staff called this the observation suite. The Cyberknights referred to it as the Spook Booth.

  Whenever Eric Bergeron had been in the Pit it had always been dark. The only illumination in the room was that which was thrown off by the computer monitors located there and small reading lights at each workstation. Everything else was so dark that if asked by someone, he would be unable to tell them what color the walls were.

  The furniture in the Pit was quite sparse, consisting of two long tables, one set upon a platform behind the other. Along one side of each table were armless chairs. These chairs faced a wall that was actually one huge screen that covered that surface from ceiling to floor. Both tables were fitted out with four computer workstations, though there were power trees bolted at either end of the tables and space to accommodate two more if required. Unlike the normal haunts where the Cyberkn
ights went about their day-to-day activities, there were no dividers between the individual workstations. This was done to permit quick access, both verbal and nonverbal, between the members of the 401st at each of the tables. A person working at one position could easily reach in front of anyone to their left or right to pass on a handwritten note or sketch. Even though everyone in the strike center wore a headset with a tiny boom mike that permitted them to speak to other members of the team, it had been found that there were times when these notes worked best, especially when the personnel in the Pit didn’t want those in the Spook Booth to know something.

  Located at each of the eight permanent workstations was a computer. Each was set up to perform a discrete function during an attack. The primary assault computer, labeled PAC, was the center-right workstation on the front table. It was from this position that Eric Bergeron would make his way into macnife’s computer, then on to those that ran the chemical plant located in the supporting nation. To Eric’s immediate right sat the primary foreign language expert, or FLE. While much of the traffic on the World Wide Web was in English, many of the programs and protocols, especially those concerning security and safety, were written in the language of the actual user. Hence there was a need for someone to be there, at Eric’s side, to translate in real time. These interpreters, recruited in much the same way as the Cyberknights were, had to be as computer savvy as the knights themselves. This was how Bobby Sung, a second-generation Chinese American, had made his way into the ranks of the Cyberknights. Since this hack attack would be going into the systems of two different nations, there was a second FLE located at a computer at the right end of the table, set up at the overflow slot.

  The left-center workstation belonged to the systems expert, or SE. While good, the Cyberknights could not possibly know every nuance and quirk of the computers they were working from or hacking. The SE was one of the many on-site civilian tech reps ordinarily charged with maintaining machines supplied by their companies. During an attack, an SE familiar with the targeted systems was brought in to answer any questions Eric might have during the hack or assist if the Cyberknight came across something that he did not quite understand. Oftentimes these SEs were members of the design team who had actually manufactured the computer being attacked. To the SE’s left was a language/ programs expert, or LPE. Like the hardware specialist, the LPE was on hand in case Eric needed help with the software he encountered.

  Immediately behind the primary assault computer, on the rear table, sat the electronic-warfare station. Manned by a second Cyberknight, the operator of this computer had the task of assisting the hacker whenever he ran into a firewall or other security measure during the breakin. Once the hacker was in, the electronic-warfare knight, EWK for short, monitored the systems admin and security programs of the hacked network. It was his responsibility to protect the hacker from countermeasures initiated by automated security programs or systems administrators.

  This feat was accomplished in any number of ways. The preferred countermeasure was simply to lie low, or cease the hack, until any detected security sweep was completed. If it appeared as if someone was starting to become wise to the hack, the EWK attempted to spoof the systems administrator by making him think everything was in order. When this failed and the administrator started to track the unusual activity that the hack was causing, the EWK began to feed his foe data that would create the appearance that the security program was malfunctioning. More often than not, this made the system administrator hesitate as he tried to determine if the suspect activity was nothing more than an anomaly in the system or a glitch with the security program of his computer. When this ploy didn’t work, the EWK was forced to employ the least desirable trick in his bag, the dreaded red herring.

  Every EWK had a totally fictitious hack sequence loaded on the EW computer and ready to initiate with nothing more than the touch of a special function key. Often they used the screen name and tactics of another hacker that the Cyberknights had come across during their day-to-day efforts to protect the Army’s computers. This ruse was designed to be both sloppy and obvious, yet not easily countered. When initiated, more often than not, it gave the primary hacker more than enough time to finish his attack and back out before the system administrator caught on. Occasionally, however, the defensive measures taken against the feint were too quick. When the EWK saw that he was losing the fight to keep their foe at bay, he would call out, “eject,” signaling the hacker he had to stop the hack, no matter where he was.

  To the right of the EWK was an intel wizard. Major Gayle Rhay herself frequently took this seat. Like the systems or the language/ programs experts, the intel officer was there to provide the primary hacker with advice and recommendations should he run across something that was unfamiliar or unexpected. The presence of someone from the intelligence section in the Pit also had the benefit of providing the wizards themselves with valuable firsthand knowledge of the capabilities of their foes.

  The station to the left of the EWK was occupied by a recently recruited Cyberknight. Since a highly technical hack attack such as the one Eric was about to undertake was both difficult and involved operations against a sovereign power, only the most senior Cyberknights were permitted to make them. To qualify for what was, among the Cyberknights, these most prestigious assignments, a novice had to observe six actual hacks in the Pit and successfully complete twelve consecutive simulations. On this day, the honor of checking off his first observed Pit hack fell to Hamud Mdilla, the bright young newbie Eric had shown around.

  Most people who wander onto the World Wide Web from their home computers give little thought about how their input makes it from the keyboard sitting on their laps to the sites they are seeking. Nor do they much care that so much data about who they are, and where they are, is bounced about the web in a rather haphazard manner, from one web server to another, in search of the most direct route to the site desired. Few appreciate how much personal data is left behind, like footprints, during this process.

  Things were not that easy for the 401st. They could not simply dial up a local server, plug into the Web, and charge out into cyberspace in search of hackers messing with the Army’s computers. This was especially true when going head-to-head with a foreign power who possessed the same ability to tap into servers around the world in search of a foe. Since this was how the Cyberknights themselves found most of their adversaries, it was safe to assume that their counterparts working for other masters would do likewise.

  To counter this threat, every major cyberattack, such as the one which Eric was about to embark upon, followed a pathway along the Web plotted out by a network-routing specialist. To the Cyberknights, they were the pathfinders. Working at the computer located on the far left of the rear table, the pathfinder opened the route the hack attack took through the World Wide Web. This normally involved going through a number of servers located around the world. Unlike the home web surfer, there was nothing random about the pathway that data would travel. Yet it had to appear that way. To accomplish this little trick the pathfinder mimicked the route that a hacker the 401st had dealt with in the past had followed. This not only served to confuse the cyberwarfare specialist who might come back at them later, but it also covered the unit’s own tracks as the Cyberknights crawled along the Web en route to their target. Any webmaster monitoring a Web server along the way who caught the Cyberknights hack would think that it was the same hacker who had visited them before.

  This intricate course through the Web also served to protect the security of the 401st and the Keep. By knowing, in advance, where the outgoing data packets were going, the EWK would be able to go back, when the hack attack was over, and erase any record of the traffic at selected servers. This would make it impossible for anyone tracing the hack to discover the real point of origin. Since the Keep was, at that moment, a one-of-a-kind facility, protecting it was always a major concern. While the attack Eric and the team assembled in the Pit was important, it was not worth comp
romising the entire unit, a unit that could very well be needed to parry the opening attack of the next war.

  The last member of the assault team, the officer in charge, had a seat at the rear table, but no computer. This paradox was the result of a decision made by Colonel Shrewsbery’s predecessor when the operational procedures for the 401st were being drafted. Since the officer in charge had the responsibility for the attack, the first commander of the 401st felt it was important that he or she be unencumbered by a computer. “Who’ll be keeping an eye on the overall ebb and flow of the attack, the big picture of what’s going on,” the unit’s first commander pointed out, “if the OIC is fiddling about with a computer mouse.” Though none of the Cyberknights since then understood how the OIC of a hack could run things without a computer, the issue was never debated or discussed.

  A well-orchestrated hack attack did not simply happen. How various Cyberknights thought of their collective efforts was reflected by the terminology they used. Those who followed professional sports spoke of scoring when they accomplished an assigned task, or fumbling the ball when a hack went astray. Other Cyberknights with an ear for the classics liked to think of themselves as members of a well-tuned orchestra. And, of course, there were those who enjoyed spicing up their mundane lives by taking on superhero personas that would make Walter Mitty blush.

  None of these alternate realities, however, could disguise the fact that this was, from beginning to end, a military operation. Once the officer in charge of the hack had assembled his team, all pretenses were dropped. With few exceptions these officers were like Shrewsbery, professional soldiers with a muddy-boots background who had been pulled into the 401st because they had a demonstrated ability to lead troops.

  Their task was not at all an easy one. Most hackers, by their nature, were loners. They did not readily surrender their cherished individualism since so much of their self-worth was based upon what they, and they alone, could do. To overcome this common personality quirk, every OIC staged a rehearsal once all the preliminaries had been completed and the various players felt they were ready. While standing before his assembled strike team, the OIC walked through the hack attack step by step, from beginning to end.

 

‹ Prev