JK's Code (Brooks/Lotello Thriller Book 4)
Page 5
Austin was the only exception to the confidentiality protocols. Famous for his photographic memory, however, he never brought any recording device into the meetings or made any notes of any of the proceedings.
Austin remembered well when the attitude, if not the priorities, of EBCOM changed. It had been almost five months since the long-awaited “special counsel’s” report had issued. In Austin’s opinion, the title was misleading. He believed special prosecutor would have been a more apt label. Without exception, every member of EBCOM had agreed with Austin. Notwithstanding the intervening events, including in particular Baker’s foolish telephone call with the rookie president of Ukraine, in spite of the special counsel’s report and ensuing public attention, the unanimous vote shortly after the special counsel’s vote had sealed EBCOM’s pivot from campaigning to re-elect Baker, to protecting his presidency. This was not the kind of determination that was made on less than a unanimous vote.
Austin called the meeting to order. He informed the others that POTUS was reportedly growing impatient. Austin, however, considered one of his most important EBCOM responsibilities knowing when to ignore POTUS, hold him at bay, and prevent him from becoming his own worst enemy. Like his idiotic quid pro quo call to the president of Ukraine. Being was probably a better choice of words than becoming. POTUS already was his own worst enemy, at least if Austin didn’t count those whose mantra in gearing up for the November election was “Never Baker!”
He turned the meeting to the scheduled agenda. In succession, Austin invited each person in the room to summarize the expected progress on his or her respective assignment, subsequent to the immediately preceding meeting. They each did so, resolutely and succinctly. Questions were entertained and answered following each presentation. Any difficulties or problems were carefully scrutinized and addressed.
Austin was pleased with the progress the various EBCOM members reported. He had a timetable to maintain, and he knew he had to stick to it. His life might very well depend on it.
CHAPTER 12
October 2019, Three Days Later
JAKE WORKED THE DARK web on his anonymous laptop without bothering to change his IP address. Researching unlawful activity is not conducting unlawful activity. I could go watch a murder trial without being guilty of murder. The more chatter Jake found on the dark web about the likely manipulation of the 2020 election, the more intrigued he became.
Even on the dark web, Jake sensed a prevailing reluctance on the part of most visitors to be all that explicit on the subject of election meddling. Some were more outspoken, but he had no way to know if they were serious players or just braggarts, opportunists, and attention seekers. It was Jake’s experience that those who bragged the most about something were the least involved in the subject (sexual proclivity was a perfect example). Those genuinely willing to discuss election fraud seemed more interested in doing so off record and live.
Jake did manage to discover an apparently highly regarded and popular annual four-day hackers conference held every November in Kazakhstan. This year’s conference would take place the 19th through the 22nd. Known as KHC, this year’s agenda was understandably lacking in specifics, at least in comparison to customary registration materials for less “dark” computer science classes, with which Jake was more familiar, but it was clear that the convention would be heavily devoted to the 2020 U.S. elections.
Going to a conference that would discuss how to commit election fraud would not make me guilty of election fraud. In fact, I would be going there to learn more about how to prevent it.
Jake felt that attending the upcoming KHC event might be the most productive use of his limited Carter generated travel budget. But where exactly was Kazakhstan? Google provided the answer quickly enough. Kazakhstan was formerly a part of the defunct Soviet Union, and located in Eastern Europe, and fairly close to Russia.
The U.S. had no objection to American travel to Kazakhstan, no visa was required by the host country, and the passport he used a few years back to travel around Europe was still good. No inoculations were recommended, which was nice because Jake was not a fan of needles.
He decided to register for KHC, reserve a hotel room, buy a roundtrip airline ticket, pack his bags and get ready to visit his first live dark web event. He would bring along both his regular laptop and his anonymous laptop with the Tor Browser. Somehow, he didn’t wonder which device he would mostly be using on this trip.
The more Jake prepared for his journey to Kazakhstan, the more it dawned on him that there was one more resource potentially available to him that he had not yet tapped. He opened the contacts list on his smartphone and found what he was looking for under Abelson, Gali—his college pal on leave from Israel’s intelligence agency, Mossad, for some computer studies. He selected Abelson’s campus telephone number. After several unanswered rings, the call rolled over to voicemail:
HOME IN TEL AVIV ON A SERIES OF QUICK CHORES. BACK BY THE FIRST. IF YOU NEED ME SOONER, LEAVE A MESSAGE AFTER THE BEEP AND I’LL TRY TO GET BACK TO YOU FROM THE LAND OF MILK AND HONEY. SHALOM.
At the beep, Jake said:
HEY GALI, IT’S ME, JK. COULD USE YOUR HELP AFTER YOU GET BACK TO CAMPUS. LET’S ARRANGE AS SOON AS POSSIBLE. THANKS. SAFE TRAVELS.
He added his cell phone number, pushed all of the right buttons to designate his message as urgent, and clicked off.
Jake decided it was time to call it a day. His mind drifted back to one of his favorite novels, The Wizard of Oz by L. Frank Baum. Hmm, guess I won’t be in Kansas anymore either, Toto. Or at least, not in Connecticut.
CHAPTER 13
Early November 2019, Ten Days Later
THE ANNUAL KHC WAS Cipher’s brainchild. He would again be moderating the event and putting together the program and speakers as he did each year. He derived most of his revenues from the hacker visionaries who always attended the conference. Many were repeat registrants who attended every year, and were already well acquainted with Cipher. However, a good 50% of the registrants every year were first-timers, and he focused on them and growing his reputation in the cyber industry.
Many of those who attended the conference fell into the category of “what you saw was what you got”. These people were law-abiding information and curiosity seekers who had nothing to hide and registered using their authentic identities. Like those who visited zoos that housed unique and extraordinary animal species, these participants came to gawk and stare. And perhaps learn a trick or two.
Then there were the ghosts—those who made their living skirting the boundaries of society and its laws, and who attended the conference without revealing their true identities. Typically, they had reason to conceal who they were and where they were. They were at the conference, and yet they weren’t.
Cipher fell somewhere in the middle. Outwardly careful to follow the law—at least technically—he generally did not bother to ghost himself. Which was not to say that many genuinely knew all that much about his private life or his whereabouts.
In addition to heavily showcasing the latest developments in his own digital key-encrypted services programs for those who sought anonymity and security, Cipher also planned to devote a good part of this year’s KHC to election fraud. Given the upcoming U.S. elections, this made perfect sense. One of the featured speakers on this subject would be Lars Nilsen, from Denmark. Nilsen was well known in election fraud hacking circles.
For two reasons, Nilsen would be the first speaker following Cipher’s introductory remarks:
First, Nilsen was a quadriplegic who could only “speak” digitally. This required special accommodations. It was best to get these arrangements out of the way. By definition, at least when he chose to venture out into the public, he did not do so as a ghost. Like Cipher, Nilsen professed at all times to act within the law.
Second, Nilsen was a user of Cipher’s encrypted services program. An implicit endorsement of that program by Nilsen would be financially invaluable to Cipher.
ABELSON SAT
ACROSS FROM Jake, munching on his sandwich outside the dining room in the campus commons. He waited for Jake to explain the reason for their visit. Jake just sat there fidgeting.
“So, what was so urgent that you picked up the cost of my sandwich and extra-large drink?” Abelson finally asked.
Jake laughed. “Are you familiar with something in Kazakhstan called KHC?”
“If you mean the notorious Kazakhstan Hackers Conference, I am,” Abelson said. “It’s ‘da bomb’, as they say, whoever they is. Run by a guy who calls himself Cipher, or sometimes C1ph3r when he wants to get cute or a little more exotic. Mossad sends a couple of people to it every year, just to see the latest and who attends.”
“I’m going this year,” Jake said.
“Why?” Abelson asked.
“An assignment from Professor Carter. I’m helping him with a section of the book he’s trying to finish. He’s picking up the tab out of one of his grants, and I also get some unit credit.”
“Nice gig, but why are you telling me? How can I help? Are you looking for something from me?”
“You’ve already helped by telling me that KHC is the real deal. I’m wondering if you might be able to…” Jake paused.
“C’mon, bud. Spit it out. What is it you want? Don’t be shy.” Abelson added a mock frown.
“I was wondering if you might be able to help me out a bit. You know, to be as prepared as I can.”
“I don’t follow. Are you looking for information, introductions, something else?”
“I was thinking maybe something like bells and whistles I might be able to use.”
“Holy shit, Jake. Quit dancing all over the place. Are you asking me to provide you with some gadgets you might use while you’re in Kazakhstan? To play like James Bond’s Q? That’s pretty ballsy.”
“Well, you could if you’re willing, but your answer will sure be no if I don’t ask.”
“Are you telling me you might want to hack the hackers? That’s a lot of risk to take for some unit credit.”
“I just want to be prepared for … you know, for whatever.”
“Well, what’s in it for me?” Abelson asked.
“How about I share with you anything I learn that might be of use to Mossad?”
“You mean, in addition to what Mossad will already be learning at KHC?”
“Who knows? Can’t hurt Mossad to have another pair of boots on the ground, especially not suspected of any Mossad affiliation,” Jake replied.
“Unofficially, you mean?” Abelson asked. “Off the record?”
“Exactly.”
I have no idea what my amateur sleuth or hacker is really up to, or for whom, but it probably can’t hurt to keep an eye on what he’s really after here. “Okay, just call me mini-Q. I’ll spot you a couple of widgets.” He reached into his briefcase and pulled out a thumbnail drive. “I never leave home without this. Never know when it may come in handy. Put it in the USB drive on any computer for thirty seconds and pull it out. You now have a backdoor into that computer, ’til it’s spotted, which ain’t easy.”
“You’re kidding me. That’s incredible, but how do I access a computer in Kazakhstan when I’m back here at home in the good old USA?”
That’s the second widget I’ll share with you. Later today, I’ll email you a link to download a remote access software application we use to retrieve files from computers anywhere in the world. It’s how we keep tabs on our terrorist enemies. It will access the backdoor you create locally with the thumbnail, and it will copy targeted files on that computer. It will even retrieve deleted files.”
“Wow, that’s great,” Jake said. “I’d heard rumors that a couple countries had this kind of software, but only idle gossip. I had no idea whether this was really true or not.
“Yeah, the U.S., Israel, and maybe Russia, too, have developed this kind of software. Just don’t get cocky or carried away. Number one, it won’t save your ass if you get caught messing around. Number two, this meeting never happened. The remote access will expire and disappear from your computer in 180 days. I expect you to return the thumbnail as soon as you return home. It’s not for domestic use. Don’t let me catch you pilfering any answer keys for any of your class exams. By the way, this is a one-time special. I won’t do this again, bud.”
Jake shook his head appreciatively. “Understood.”
ABELSON SENT AN ENCRYPTED email to his Mossad superior fifteen minutes after he returned to his apartment:
LANDED A NEW RECRUIT. A REALLY DEEP ONE.
He recounted his meeting with Jake and hit send.
He received the following reply:
FULL SPEED AHEAD.
JAKE RECEIVED THE LINK from Abelson later that day. With one exception, I’ll share with Gali whatever I learn in Kazakhstan. Anything I figure out about countering election fraud is strictly mine. Anything else he can have.
NILSEN RECEIVED CIPHER’S EMAIL with the draft copy of the four-day KHC program. Cipher had come through and given him a highly visible stage presence on the first day. He knew the quid pro quo for the highly coveted opening presentation would be working a not-so-subtle endorsement of Cipher’s encrypted services into his remarks.
Nilsen always walked a fine line in describing his capabilities. That would be particularly true this year. On the one hand, he would love to share how he could use his skills to impact the outcome of the 2020 U.S. election; this would enhance his reputation and generate considerable new business for him. On the other hand, if he were too blatant about this potential, he could very well attract unwanted attention.
CHAPTER 14
November 18, 2019, Two Weeks Later
JAKE’S FLIGHT TOUCHED DOWN at Nursultan Nazarbayev International Airport in the capital of Kazakhstan. He had previously made all of the necessary arrangements. A little groggy from the long international flight and connecting puddle jumper, Jake looked around. He was carrying all of his luggage on him. He walked through the terminal to the exit, and spotted the young man holding a sign with printed block letters that spelled JK.
“I’m Jake,” he said to the young man.
The bearer of the sign looked perplexed.
“JK is short for Jake Klein, my full name.”
The man’s face lit up with understanding. “I get it. Me Amir.”
“Hello, Amir. The emails you sent to me were in English. Do you understand spoken English too?”
Amir was slow to respond. “For sure. Yes. Speak good English. Learn in school.” Amir reached for Jake’s duffel bag and backpack, in which he carried his computer equipment. Jake let him take the duffel, but held onto his backpack.
“Come. Follow me. We go hotel. One with convention. Yes?”
“Yes,” Jake said. Amir’s English is a little rough around the edges, but it’s a helluva lot better than my Kazakh!
They walked out front, and Amir directed him to an old Russian Lada. “My friend name Joe. Very good driver.” Joe and Jake smiled at one another. Amir pointed to the back seat, where Jake climbed in, still clutching his backpack. Amir ran around the car and gently put the duffel next to Jake. He then ran back around, and got in the front passenger seat next to Joe.
Fifteen minutes later, the Lada pulled into the entrance of a hotel that said Hilton International. Jake smiled. Even Hilton caters to dark web entrepreneurs.
“Convention here. Start morning. Tomorrow. Very good Wi-Fi. I check you in now. You sleep, JK. I come morning. Meet you coffee shop. Lobby. Seven o’clock. Tell you everything. Take you convention room. Check you in. Good?”
“Good,” Jake answered. In his email, Amir had said he knew ‘everything’ about the convention. Does that means Amir is a dark web entrepreneur too?
CHAPTER 15
November 18, 2019, Later that Same Day
AUSTIN SENT AN ENCRYPTED email to all of the members of EBCOM.
WE’VE BEEN WORKING DILIGENTLY AND MAKING VERY GOOD PROGRESS. FORTUNATELY, THE COMING IMPEACHMENT VOTE AND TRIAL, WHI
CH IS NOTHING BUT A PETTY NUISANCE THAT I’M ASSURED WILL BE SUMMARILY DISPOSED OF, IS NOT ON OUR PLATE. I’VE POLLED ALL OF OUR MEMBERS. THE PREVAILING SENTIMENT IS THAT WE SHOULD ADJOURN AND STAND DOWN FOR THE HOLIDAY SEASON. WE WILL RECONVENE NEXT ON 5 FEBRUARY 2020 AT THE USUAL TIME AND PLACE. HAPPY HOLIDAYS AND NEW YEAR. 2020 WILL DEFINITELY BE A SEMINAL YEAR, ONE THAT WE WILL LONG REMEMBER!
PERHAPS JUST A COINCIDENCE, only minutes later, Bianchi sent a secure email to all of the Democratic majority party chairs of the House standing committees.
THANK YOU ALL FOR THE PROGRESS WE HAVE MADE IN 2019, INCLUDING THE IMPEACHMENT VOTE THAT WILL BE CONSUMMATED NEXT MONTH. BAKER WILL BE ACQUITTED BY THE GOP CONTROLLED SENATE, BUT NOT BEFORE WE SCORE HUGE 2020 CAMPAIGN POINTS. WE NEED TO KEEP THE PRESSURE RUNNING ALL THE WAY TO NEXT NOVEMBER, AND WE WILL. WHAT A YEAR 2020 IS GOING TO BE FOR THE DEMOCRATS!! SAFE TRAVELS HOME AND HAPPY HOLIDAYS AND NEW YEAR! WE’LL BE BACK AT IT IN EARLY FEBRUARY. EXCEPT FOR THOSE OF YOU WORKING WITH ME ON THE IMPEACHMENT PROCEEDINGS, SEE YOU ALL IN FEBRUARY.
CHAPTER 16
November 19, 2019, One Day Later
JAKE WALKED INTO THE lobby restaurant at 7 a.m. sharp. He was still a little jet lagged, but ready to go. He looked around the room, but there was no sign of Amir. So much for Amir greasing the skids for me. Too much to have hoped for, I guess. The hostess seated Jake and handed him a menu.
Moments later, Amir came rushing up to the table.
“Oh, sorry, sorry,” Amir said. “A thousand pardons to be late, Mr. JK! I was making so many arrangements. How was your nocturnal respite? Room okay?”
“No worries, Amir,” Jake said. “Everything fine.” Shit. I’m starting to talk like Amir. Everything fine!
“Worries?” Amir asked. “Something wrong?”