The big Russian tapped on the driver’s window. It rolled down. “I want you to call that guy in. Have someone run a check on those plates, too.”
“Already did, Lieutenant.”
Seven hundred meters away, Karlsen slammed the brakes. The rubber squealed on the asphalt.
Krasnov glanced toward the noise. He raised himself up on the Sherpa’s step to get a better vantage. Saw Karlsen’s truck parked on the road, driver’s door open. Where did he go?
Krasnov glanced down at the road beneath his feet, then the sand by the side of the road. He saw it. There.
Too late.
One hundred feet of C4 erupted. Even half a mile away, Karlsen felt the pressure wave. It rocked his truck and spattered sand in his face like buckshot. The earplugs hardly helped, but he covered his ears with his hands, too, and opened his mouth. The air sucked out of his lungs so hard he thought they’d come up through his mouth. But a second passed and he gasped for air and knew he’d survived. His nose was runny. He pinched it with his fingers. Blood. His ears rang and his head ached. His pagan forefathers would have said that Ragnarök had begun—the end of the world. But, inshallah, not yet. At least not for him. Not for Al Rus. Not for the Viking.
The big Norwegian muttered a prayer of thanksgiving to Allah, then stood and brushed himself off. He crawled back into his Nissan and sped back to the scene. Smoke and dust boiled over the explosion site like a fog of doom. On the far side of the road, the Sherpas were gone. A debris field of twisted steel littered the sand. Clearly, no one had survived.
He stopped the truck where the MICLIC had been planted. The mine-clearing line charge was a hundred feet of C4 block assemblies strung together by nylon rope. The deadly charge was given to him by brothers from Fallujah who had retaken that city in 2014. The city was full of U.S. Marine Corps ordnance left behind for the worthless Iraqi army and police—tons of it. Guns, grenades, radios, claymore mines, and even MCLC.
Al Rus knew that the French would use electronic jammers—that was standard operating procedure against wireless remote IED detonators. But the jammers couldn’t stop an old-fashioned hand-cranked generator connected to copper wire. Primitive, but effective, especially in the hands of a trained engineer like Al Rus. The former BP employee had converted to the true Islamic faith, Salafism, when he was stationed in Saudi Arabia. Before he joined AQS, white German jihadi brothers in a Waziristan village taught him how to handle weapons and explosives and took him on their raids into Afghanistan against NATO forces, where he killed his first European infidels. He had a talent for it.
Al Rus stepped back over to his truck and dug around under the seat. He pulled out a radio and called his second-in-command, informing him it was now safe for the plane on the far horizon to land on the road ahead. In an hour, the cocaine would be loaded onto Algerian trucks and shipped north, making its way to the heart of the land of the Crusaders. If depraved Europeans wanted to pay good money for the poison he sold to them, so much the better. That money was used to wage jihad and help the poor and widows, and so it was blessed.
34
CIOS Corporate Offices
Rockville, Maryland
7 May
Jasmine Bath’s paranoia knew no bounds. She was determined to live long enough to enjoy the wealth she had accumulated over the last few years, and even more determined to enjoy a long and happy retirement, which, according to her schedule, would begin in precisely seven months, given current revenue streams.
It was probably time to get out by then anyway. Computer security was about to make a great leap forward with DARPA’s PROCEED initiative, exploring methods that would allow data computation of encrypted data without first decrypting it, even in the cloud, making it virtually impossible for hackers like her to write malware code to break it. Worse, security operations themselves would become automated, just like future combat. Advanced machine learning algorithms would soon become the security gatekeepers, not only preventing but even anticipating human-designed attacks.
Bath’s first line of defense was to remain hidden from the NSA. The easiest trick was to leak NSA training documents to various media outlets under the names of known whistle-blowers. That kept the NSA in a constant state of paranoia and self-limiting defenses as media and congressional inquiries escalated. The NSA simply didn’t have time to look for someone like Jasmine, especially not even knowing she was there to begin with.
The most effective tool in Bath’s defense arsenal was the alliances she created with other unwitting players in the field. Posing as an anonymous member of various hacktivist groups, Jasmine would empower them with resources that both distracted the NSA and created new targets of national interest. In the last few years, the anarchist hacker group ALGO.RYTHM had made frequent headlines by breaking into DoD computer bases, stealing embarrassing State Department cables, and disabling the LANs of the big national laboratories, then publishing their exploits. Of course, ALGO.RYTHM hackers managed to complete these missions only by following the guided maps through agency software defenses fed to them by Jasmine Bath. If ALGO.RYTHM hackers got sloppy with their opsec, CIOS would dispatch a specialized field operative to pinch off the potential leak, usually with a small-caliber bullet to the brain.
The closest anyone had ever come to identifying Jasmine occurred just weeks after the Utah Data Center at Bluffdale had gone online. She still wasn’t quite sure how he’d picked up her digital scent, but he did, and his abilities were far superior to those of anyone else she’d ever encountered at the Q Group, the NSA’s security and counterintelligence directorate. She finally evaded him by destroying his career, falsely linking him to the most recent Utah Data Center catastrophe. It was one of her best ops.
Jasmine knew the security protocols at the UDC because she’d designed half of them while in the NSA’s employ. The UDC was NSA’s vast, multibillion-dollar server farm, and the crown jewel in its burgeoning intelligence-gathering empire. It was deemed impossible to infect the computers there with any kind of virus thanks to the external firewalls, which suffered tens of thousands of automated attempted hacks daily.
But the internal security procedures were equally important. Those protocols kept any devices from being smuggled in that might carry infectious malware. The NSA knew that it was a USB thumb drive infected with the Stuxnet virus smuggled into the Natanz nuclear facility that wiped out over a thousand Iranian centrifuges. The NSA took every precaution to avoid a similar attack on the UDC.
Every precaution but one, Jasmine determined.
A search of UDC employees uncovered the medical records of a senior programmer at the facility. The fifty-eight-year-old woman had recently had one of the new wirelessly programmed heart pacemakers implanted. The wireless pacemaker was monitored and updated via a cell phone call. All Bath did was hack into the poorly secured mainframe of the medical device manufacturer and install a Stuxnet-like worm on the woman’s pacemaker via the cell phone. Once the infected programmer was at her computer station, the self-propogating worm used the pacemaker’s wireless capabilities to infect the SCADA system Wi-Fi routers. Those SCADA computers, in turn, controlled the air handler units that cooled the 1.2 million square feet of the vast server farm. Once the air handler units failed—along with the warning alarms and software monitoring the failure, disabled by the same worm—acres of servers overheated and eventually caught fire, destroying 400 terabytes of collected foreign intelligence. While this represented only a small fraction of the total amount of data stored at the UDC, it was an amount of data equal to all of the books ever written in the history of the world.