Jack Ryan Books 7-12
Page 373
“My captain is not pleased.”
The FBI agent nodded. “Yeah, bosses are like that in the Bureau, too, but he’s supposed to know what the problems are, right? If he does, he knows he has to give you the time and the resources to play it out. How many men you have on it now?”
“Six here, and three more in St. Petersburg.”
“May want to get some more, bro.” In the FBI’s New York OC office, a case like this could have as many as twenty agents working it, half of them on a full-time basis. But the Moscow Militia was stretched notoriously thin. For as much crime as there was now in Moscow, the local cops were still sucking hind tit when it came to government support. But it could have been worse. Unlike much of Russian society, the militiamen were getting paid.
You tire me out, ”Nomuri protested.
“There is always Minister Fang,” Ming replied with a playful look.
“Ah!” was the enraged reply. “You compare me with an old man?”
“Well, both of you are men, but better a sausage than a string bean,” she answered, grasping the former in her soft left hand.
“Patience, girl, allow me to recover from the first race.” With that he lifted her body over his and let it down. She must really like me, Nomuri reflected. Three nights in a row. I suppose Fang isn’t the man he thinks he is. Well, can’t win ’em all, Charlie. Plus the advantage of being forty years younger. There was probably something to that, the CIA officer admitted to himself.
“But you run so fast!” Ming protested, rubbing her body on his.
“There is something I want you to do.”
A very playful smile. “What might that be?” she asked while her hand wandered a little.
“Not that!”
“Oh ...” The disappointment in her voice was noteworthy.
“Something for work,” Nomuri explained on. Just as well she couldn’t feel the shaking inside his body, which, remarkably enough, didn’t show.
“For work? I can’t bring you into the office for this!” she said with a laugh, followed by a warm, affectionate kiss.
“Yes, something to upload onto your computer.” Nomuri reached into the night-table drawer and pulled out a CD-ROM. “Here, you just load this into your machine, click INSTALL, and then dispose of it when you’re done.”
“And what will it do?” she asked.
“Do you care?”
“Well ...” Hesitation. She didn’t understand. “I must care.”
“It will allow me to look at your computer from time to time.”
“But why?”
“Because of Nippon Electric—we make your computer, don’t you see?” He allowed his body to relax. “It is useful for my company to know how economic decisions are made in the People’s Republic,” Nomuri explained, with a well-rehearsed lie. “This will allow us to understand that process a little better, so that we can do business more effectively. And the better I do for them, the more they will pay me—and the more I can spend on my darling Ming.”
“I see,” she thought, wrongly.
He bent down to kiss a particularly nice spot. Her body shuddered in just the right way. Good, she wasn’t resisting the idea, or at least wasn’t letting it get in the way of this activity, which was good for Nomuri in more than one way. The intelligence officer wondered if someday his conscience would attack him for using this girl in such a way. But business, he told himself, was business.
“No one will know?”
“No, that is not possible.”
“And it will not get me into trouble?”
With that question he rolled over, finding himself on top. He held her face in both hands. “Would I ever do something to get Ming-chan in trouble? Never!” he announced, with a deep and passionate kiss.
Afterward there was no talk about the CD-ROM, which she tucked into her purse before leaving. It was a nice-looking purse, a knockoff of something Italian that you could buy on the street here, rather like the genuine ones in New York that “fell off the back of the truck,” as the euphemism went.
Every time they parted, it was a little hard. She didn’t want to leave, and truly he didn’t want her to depart, but it was necessary. For them to share an apartment would be commented upon. Even in her dreams, Ming couldn’t think of that, actually sleeping at the apartment of a foreigner, because she did have a security clearance, and she had been given her security brief by a bored MSS officer, along with all the other senior secretaries, and she hadn’t reported this contact to her superiors or the office security chief as she ought to have done—why? Partly because she’d forgotten the rules, because she’d never broken them or known someone who had done so, and partly because like many people she drew a line between her private life and her professional one. That the two were not allowed to be separate in her case was something that the MSS briefing had covered, but in so clumsy a way as to have been disregarded even upon its delivery. And so here she was, not even knowing where and what here was. With luck, she’d never have to find out, Nomuri thought, watching her turn the corner and disappear from view. Luck would help. What the MSS interrogators did to young women in the Beijing version of the Lubyanka didn’t really bear much contemplation, certainly not when one had just made love to her twice in two hours.
“Good luck, honey,” Nomuri whispered, as he closed the door and headed to the bathroom for a shower.
CHAPTER 14
(dot)com
It was a sleepless night for Nomuri. Would she do it? Would she do what she was told? Would she tell a security officer about it, and then about him? Might she be caught with the CD-ROM going into work and questioned about it? If so, a casual inspection would show it to be a music CD, Bill Conti’s musical score for Rocky—a poorly marked knockoff of an American intellectual property that was quite common in the PRC. But a more careful examination would have revealed that the first—outermost—data line on the metallic surface told the computer CD-ROM reader to skip to a certain place where the content was not music, but binary code, and very efficient binary code at that.
The CD-ROM didn’t contain a virus per se, because a virus circulates mainly across computer networks, entering a computer surreptitiously the way a disease organism enters a living host (hence the term virus). But this one came in the front door, and on being read by the CD-ROM reader, a single prompt came up on the screen, and Ming, after a quick look-around in her office, moved her mouse to put the pointer on the prompt, clicked the INSTALL command, and everything immediately disappeared. The program thus implanted searched her hard drive at nearly the speed of light, categorizing every file and setting up its own index, then compressing it into a small file that hid in plain sight, as it were, identified by any disk-sorting program with a wholly innocent name that referred to a function carried out by another program entirely. Thus only a very careful and directed search by a skilled computer operator could even detect that something was even there. Exactly what the program did could only be determined by a one-by-zero reading of the program itself, something difficult to accomplish at best. It would be like trying to find what was wrong with a single leaf on a single tree in a vast forest where all the trees and all the leaves looked pretty much alike, except that this one leaf was smaller and humbler than most. CIA and NSA could no longer attract the best programmers in America. There was just too much money in the consumer electronics industry for government to compete effectively in that marketplace. But you could still hire them, and the work that came out was just as good. And if you paid them enough—strangely, you could pay lots more to a contractor than to an employee—they wouldn’t talk to anyone about it. And besides, they never really knew what it was all about anyway, did they?
In this case, there was an additional level of complexity that went back over sixty years. When the Germans had overrun the Netherlands in 1940, they’d created a strange situation. In Holland the Germans had found both the most cooperative of their conquered nations and the most fiercely resistant. More Dutchmen p
er capita had joined the Germans than any other nationality—enough to form their own SS division, SS Nordland. At the same time, the Dutch resistance became the most effective in Europe, and one of their number was a brilliant mathematician/engineer working for the national telephone company. In the second decade of the twentieth century, the telephone had reached a developmental roadblock. When you lifted a phone, you were immediately connected with an operator to whom you gave the destination you were trying to call, and she then physically moved a plug into the proper hole. This system had been workable when only a few telephones were in use, but the appliance had rapidly proved too useful for limited applications. The solution to the problem, remarkably enough, had come from a mortician in the American South. Vexed by the fact that the local operator in his town referred the bereaved to a competing undertaker, he had invented the stepping switch, which enabled people to reach their own phone destinations merely by turning a rotary dial. That system served the world well, but also required the development of a whole body of new mathematical knowledge called “complexity theory,” which was systematized by the American company AT&T in the 1930s.
Ten years later, merely by adding additional digits to be dialed, the Dutch engineer in the resistance had applied complexity theory to covert operations by creating theoretical pathways through the switching gear, thus enabling resistance fighters to call others without knowing whom they called, or even the actual telephone numbers they were calling.
This bit of electronic skullduggery had first been noticed by an officer for the British Special Operations Executive, the SOE, and, finding it very clever indeed, he’d discussed it over a beer with an American colleague in a London pub. The American OSS officer, like most of the men Wild Bill Donovan had chosen, was an attorney by profession, and in his case, a very thorough one, who wrote everything down and forwarded it up the line. The report on the Dutch engineer had made its way to the office of Colonel William Friedman, then America’s foremost code-breaker. Though not himself a hardware expert, Friedman had known something useful when he saw it, and he knew there would be an after-the-war, during which his agency—later reborn as the National Security Agency—would still be busy cracking other countries’ codes and ciphers and producing codes and ciphers itself. The ability to develop covert communications links through a relatively simple mathematical trick had seemed a gift from God’s own hand.
In the 1940s and ’50s, NSA had been able to hire American’s finest mathematicians, and one of the tasks assigned them had been to work with AT&T to create a universal telephone operating system that could be used covertly by American intelligence officers. Back then, AT&T was the only real rival NSA had had in the hiring of skilled mathematicians, and beyond that, AT&T had always been a prime contractor for just about every executive agency of the government. By 1955, it was done, and for a surprisingly modest fee AT&T provided the entire world with a model for telephone systems that most of the world adopted—the modest cost was explained by the desire of AT&T to make its systems compatible with every other country’s to ease international communications. With the 1970s had come push-button phones, which directed calls electronically by frequency-controlled codes even easier for electronic systems to use, and infinitely easier to maintain than the former electro-mechanical stepping switches that had made the mortician hugely rich. They also proved even easier for AT&T to rig for NSA. The operating systems first given the world’s telephone companies by AT&T’s Parsippany, New Jersey, research laboratory had been upgraded yearly at least, giving further improvements to the efficiency of the world’s phone systems—so much so that scarcely any telephone system in the world didn’t use it. And tucked into that operating system were six lines of binary code whose operational concept traced back to the Nazi occupation of Holland.
Ming finished the installation and ejected the disk, discarding it into her waste can. The easy way to dispose of secret material was to have your adversary do it, through the front door, not the back one.
Nothing really happened for some hours, while Ming did her usual office tasks and Nomuri visited three commercial businesses to sell his high-powered desktop computers. All that changed at 7:45 P.M.
By this time, Ming was at her own home. Nomuri would get a night off; Ming had to do some things with her room-mate to avoid too much suspicion—watching local television, chatting with her friend, and thinking about her lover, while the whole reason for the wispy smiles on her face played out entirely outside her consciousness. Strangely, it never occurred to her that her roomie had it all figured out in an instant, and was merely polite enough not to broach the subject.
Her NEC desktop computer had long since gone into auto-sleep mode, leaving the monitor screen dark and blank, and the indicator light in the lower right position of the plastic frame amber instead of the green that went with real activity. The software she’d installed earlier in the day had been custom-designed for the NEC machines, which like all such machines had proprietary source-code unique to the brand. The source-code, however, was known to the National Security Agency.
Immediately upon installation, the Ghost program—as it had been christened at Fort Meade, Maryland—had buried itself in a special niche in the NEC’s operating system, the newest version of Microsoft Windows. The niche had been created by a Microsoft employee whose favorite uncle had died over North Vietnam while flying an F-105 fighter-bomber, and who did his patriotic work entirely without the knowledge of his parent company. It also dovetailed exactly with the NEC code, with the effect of making it virtually invisible even to a line-by-line inspection of all the code within the machine by an expert software engineer.
The Ghost had gone immediately to work, creating a directory that sorted the documents on Ming’s computer first by date of creation/modification, and then by file type. Some files, like the operating system, it ignored. It similarly ignored the NEC-created transcription program that converted Roman characters, actually the English phonemes of the spoken Mandarin language, into the corresponding ideographs, but the Ghost did not ignore the graphic-text files that resulted from that program. Those it copied, along with telephone indexes and every other text file on the five-gigabyte hard drive. This entire procedure took the machine, guided by the Ghost, seventeen-point-one-four seconds, leaving a large file that sat by itself.
The machine did nothing for a second and a half, then new activity started. The NEC desktop machines had built-in high-speed modems. The Ghost activated these, but also turned off their internal mini-speakers so that no evidence of the transmission would be heard by anyone. (Leaving the speakers on was a primary security measure. The flashing lights that told of their activity were hidden because the modem was inside the box for this model.) The computer then dialed (this term had somehow survived the demise of rotary dials on telephones) a twelve-digit number rather than the usual seven used by the Beijing telephone system. The additional five digits sent the seeker-signal on a round-robin adventure through the hardware of the central switching computer, and it came out in the place designated two weeks before by the engineers at Fort Meade, who, of course, never had an idea what this was all for, or where it would happen, or who might be involved. The number that rang—actually there wasn’t a mechanical or electronic ringer of any sort—was the dedicated modem line that exited the wall by Chester Nomuri’s desk and ended in the back of his very high-end laptop—which was not an NEC, because here, as with most computer applications, the best was still American.
Nomuri was also watching TV at the moment, though in his case it was the CNN international news, so that he could know what was going on at home. After that he’d switch to a Japanese satellite channel, because it was part of his cover. A samurai show he liked was on tonight, in theme and simplicity rather like the Westerns that had polluted American TV in the 1950s. Though an educated man and a professional intelligence officer, Nomuri liked mindless entertainment as much as anyone else. The beep made him turn his head. Though his computer
had software similar to that running in Ming’s office, he’d allowed the aural prompt to tell him that something was coming in, and a three-key code lit up his screen to show exactly what it was and where it was coming from.
Yes! the CIA officer exulted, his right fist slamming into his open left hand hard enough to sting. Yes. He had his agent in fucking place, and here was the take from Operation SORGE. A bar at the top of the screen showed that the data was coming it at a rate of 57,000 bits per second. That was pretty fast. Now, just hope that the local commie phone system didn’t develop a bad connection somewhere between Ming’s office and the switching center, and from the switching center to his flat, Chester thought. Shouldn’t be much of a problem. The outbound leg from Ming’s office would be first-rate, tasked as it was to the service of the Party nobility. And from the switching center to his place would be okay, because he’d gotten numerous messages that way, most of them from NEC in Tokyo to congratulate him on exceeding his sales quota already.
Yeah, well, Chet, you are pretty good at making a sale, aren’t you? he asked himself on the way to the kitchen. He figured he owed himself a drink for this bit of performance. On returning, he saw that the download wasn’t finished yet.
Damn. How much shit is she sending me? Then he realized that the text files he was getting were actually graphics files, because Ming’s computer didn’t store ideographs as letters, but rather as the pictures that they actually were. That made the files memory-intensive. Exactly how memory-intensive they were, he saw forty minutes later when the download ended.
At the far end of the electronic chain, the Ghost program appeared to shut itself down, but in fact it slept rather as a dog did, one ear always cocked up, and always aware of the time of day. On finishing the transmission, the Ghost made a notation on its inside index of the files. It had sent everything up until this day. From now on, it would only send new ones—which would make for much shorter and faster transmissions—but only in the evening, and only after ninety-five minutes of total inactivity on the computer, and only when it was outwardly in auto-sleep mode. Tradecraft and caution had been programmed in.