Выбрать главу

Just for good measure, Ricardo put another two bursts into the robot. Then he slumped against the corridor wall. He worked a hand under his Kevlar, and although the hits were painful, he was not bleeding. The military grade body armor had held up against the lesser punch of the robot’s ammunition. He readjusted his vest, wiped his forehead with a gloved hand, then kissed the cross hanging on a chain around his neck for good measure. He stood up straight, and resumed his trip. A few minutes he emerged into the converted oil tank where the data center containers were held.

He thumbed his mic. “Ricardo here.”

“What took you so long?” Sam asked. “The tank is clear. I’ve started on the forward end, you take aft. Time to party.”

“Sorry, took a few hits from a bot on the way here,” Ricardo replied as he looked for the aft-most container. Shots echoed from the forward end.

“You OK?” Sam asked.

“Yeah fine, body armor held up.” Ricardo lined up his sights on the power junction box at the left forward corner of the container. Five shots slammed into the junction box, and sparks shot out. He moved on to the next container.

“Well, this beats the target range.”

Fifteen minutes later, with fire and smoke boiling out of much of the ship, they were satisfied they had neutralized everything on board. The mercenaries re-boarded the helicopters, and took off.

* * *

At the temporary base of operations in Sean’s house, the engineers and managers who had planned the operation waited tensely for reports to come in from the people who had carried out the operations. Slowly, by text message, email, or instant message, the reports trickled in. “Houston data center offline at 7:31am,” one of the engineers monitoring the incoming messages would announce.

Sean entered them into the spreadsheet where he was tracking the overall status, while Gene marked off a huge paper map plastered to one wall of the office. “Six sites remaining,” Gene called off.

Finally an engineer called out “Netherlands ODC offline at 7:52am, no fatalities.”

“That’s the last one, folks. All sites are down,” Gene yelled hoarsely.

There was a moment of hushed awe, as the realization sunk in that the plan had worked. They had successfully taken the largest Internet presence in the world offline, the very thing that most of them, in their regular jobs, worked to prevent day and night.

“Avogadro.com is down,” Sean called out, and the room erupted into applause. Clapping each other on the back, exchanging hugs and high fives, or sometimes exchanging somber, quiet handshakes, they congratulated each other.

The expense had been massive. The coordination effort, given all the constraints, a miracle of planning. The accuracy and effectiveness of the planning, all done on paper, was a testament to the intelligence of the men and women involved. The scene of Sean’s house, their temporary base of actions, covered in paper and flip charts and hand-drawn timelines, recalled great accomplishments of the mid-twentieth century, when humans routinely tackled tremendous efforts in nothing but shirtsleeves and paper charts.

Human intelligence, creativity, and planning had prevailed. They won!

Chapter 16

Bahnhof Data Center, Stockholm, 100 feet underground

“Helena, have you seen this?”

Helena looked up at her shift partner, Jan. They sat in the monitoring room of Europe’s most secure data center. Located in a converted underground bunker in Stockholm, the massive computer facility was fit for a scene from a James Bond movie. At just over 4,000 square feet, the concrete and stone tomb contained tens of thousands of servers and hard drives. Designed to be secure against a nuclear bomb, and using retired submarine engines for backup power, it even contained an independent air supply, kitchen, food stocks and office space for the administrators on duty. Armored steel doors protected against mere human incursions.

It was staffed twenty-four hours a day, three hundred and sixty-five days a year by specially vetted system administrators so that any issue could be addressed ASAP for the clients who paid for the privilege of hosting their data and web applications in the elite data center. The sysadmins worked in a glass-enclosed room with a separate air filtration system that overlooked the entire datacenter.

For Jan and Helena, it was just another day at work.

“Have I seen what?”

“My sandwich. Look, those idiots at the grocery put mustard on my sandwich. I never eat mustard on my sandwich.”

Helena sighed, and took a sip of her coffee. She went back to reading the book she’d brought that day, the latest sci-fi novel by some writer from Scotland.

“Holy shit, now look at this,” Jan cried out.

“No.”

“No, really look.”

“I don’t care about your sandwich,” Helena said, forcing her eyes to remain on her book.

The shrill beeping alarm seconds later drew Helena’s attention, and she looked up to where Jan was staring, dumbfounded, at the monitor board.

Jan pointed at the indicators on the sixty inch display hanging above their heads on the wall. “We’ve been humming along at thirty percent of processor capacity all morning, and now we’re running above ninety percent across the board. That leaves us with almost no spare processor power in case anything else peaks. And our bandwidth was running at about twenty percent of capacity all morning, and now it’s gone up to almost eighty percent of maximum capacity. What is it? A denial of service attack?”

As Jan spoke, Helena could feel a shift in the vibrations of the facility, as cooling fans were automatically sped up by the monitoring system in response to the higher processing load.

Helena paused to consider his suggestion. A denial of service, or DOS, attack was a technique used by hackers to bring down Internet service providers who hosted web servers on behalf of clients, or corporations running their own web servers. The hackers used thousands or millions of PCs that had been compromised by specially designed computer viruses. Those compromised systems formed a virtual army of slave computers that could be used to send email spam, or launch a DOS attack.

“Let’s look at the traffic before we jump to conclusions.” Helena set her book down. She silenced the alarm and started working with her primary computer to see which programs running on the servers accounted for the jump in CPU consumption, while she simultaneously worked on a second computer to look at the network traffic to see what accounted for the jump in bandwidth use.

“What the hell?” Helena looked puzzled. “This load is all being generated internally. Look, at 2500 hours, we launched an application simultaneously on all servers, on behalf of account 6502530000. That account is…” Helena paused while she looked up the record in the customer database. “That’s on behalf of Avogadro. Let’s see what their account says…”

Jan eagerly looked over her shoulder. He had started only a few weeks earlier, and he found it thrilling to watch a master admin like Helena navigate her way through myriad control and monitoring systems they used to administer the computers. Surrounded by two large displays, and her personal MacBook Pro on the side, she had dozens of applications open, monitoring everything from accounting databases to system logs to router dashboards. Before Jan could grok what Helena was doing with one application, she would move on to the next. His head started to hurt.