Выбрать главу

“General, that’s part of the problem. The telephony matrix is tied into the computer network and it’s giving false readings. Log off and log back on, please, while I trace.” Gideon glanced over at the receptionist, who was still standing to one side, making a conscientious effort not to overhear.

He heard the tapping of keys. “Done.”

“Funny, I’m not reading any packet activity from your network address. Try signing off again.”

More tapping of keys.

“Nothing, General. Looks like your ID might have been compromised. This is bad — it’s going to require a report, an investigation. And it would be your system. I’m so sorry, sir.”

“Let’s not get ahead of ourselves, Hopkins. I’m sure we can fix it.”

“Well…we can give it a shot. But I’ll have to try resetting, and then accessing your account from down here. I’m going to need your ID and passphrase, please.”

A pause. “I’m not sure I can give you that.”

“You may not realize this, but in the case of network resets the passphrase is automatically changed, so you’re allowed to release the passphrase internally to IT. If you feel uncomfortable with that, sir, I understand, but then I’ll have to call the NSA for a passphrase override, I’m really sorry—”

“All right, Hopkins. I wasn’t aware of that regulation.” He gave Gideon the passphrase and ID. Gideon jotted it down.

After a moment, with huge relief in his voice, Gideon said: “Whew. That reset did it, sir. Apparently, it was just a hung screen. No security breach. You’re good to go.”

“Excellent.”

Gideon depressed the key and turned to the receptionist. “Sorry to bother you,” he said, handing her the receiver. “Everything’s straightened out.” He walked briskly out of the building to the waiting car.

Thirty minutes later he was back in his motel room, stretched out on the bed, laptop connected to an unsecured computer in the bowels of the General Services Administration that he’d remotely hijacked. He had chosen to target the GSA — the vast government bureaucracy that handles supplies, equipment, procedures, and the like — because he knew it would be a relatively easy mark, and yet one still within the government security perimeter.

Hopkins had explained—​unwittingly, of course—​​that the INSCOM archive could only send documents to previously authorized IP addresses, and unfortunately most of those were also inside classified perimeters…except for one: the National Security Archives at George Washington University. This private archive, the largest in the world outside the Library of Congress, collected vast amounts of government documents, including virtually everything being routinely declassified as part of the Mandatory Declassification Review: the government’s program for declassifying documents under several laws requiring them to do so. A veritable Amazon of information flowed into this archive on a daily basis.

Via the GSA computer, Gideon sent an automated request to the INSCOM secure archive at George Washington via port 6151, directing that a PDF file of a certain classified document be transmitted out through the same port, authorized via General Shorthouse’s passphrase, to be added to a routine dump of Cold War declassified documents headed for the National Security Archives daily batch files. The file was duly transmitted; it passed through the firewall at the sole authorized port, where the passphrase was examined and approved; and the document was subsequently routed to George Washington University and stored with millions of others in one of the archive databases.

Thus, Gideon had successfully arranged for the erroneous declassification of a classified document and hid it within a huge stream of data leaving the secure government perimeter. Now all that remained was to retrieve the document.

The next morning, at around eleven, a certain rumpled yet undeniably charming visiting professor by the name of Irwin Beauchamp, dressed in tweeds, mismatched corduroys, beaten-up wing tips, and a knitted tie (thirty-two dollars; Salvation Army) entered the Gelman Library at George Washington University and requested a slew of documents. His identity was not yet in the system and he had lost his temporary library card, but a kindly secretary took pity on the scatterbrained fellow and allowed him access to the system. Half an hour later, Beauchamp departed the building with a slender manila folder under his arm.

Back in the motel, Gideon Crew spread out the papers from the folder with a trembling hand. The moment of truth had arrived — the truth that would make him either free, or merely more miserable.

6

A Critique of the Thresher Discrete Logarithm Encryption Standard EVP-4: A Theoretical Back-Door Cryptanalysis Attack Strategy Using a Group of φ-Torsion Points of an Elliptic Curve in Characteristic φ.

Gideon Crew had studied plenty of advanced mathematics in college and, later, at MIT, but the math in this paper was still way over his head. Nevertheless, he understood enough to realize what he had in his hands was the smoking gun. This was the memo his father had written to critique Thresher, the memo his mother said had been destroyed. Yet it hadn’t been. Most likely, the bastard responsible — believing it too difficult or risky to destroy the document outright — had stuck it into an archive he believed would never be declassified. After all, what American general in the era of the Berlin Wall would have believed the Cold War could ever end?

He continued reading, heart racing, until, finally, he came to the final paragraphs. They were written in the dry language of science-speak, but what they said was pure dynamite.

In conclusion, it is the author’s opinion that the proposed Thresher Encryption Standard EVP-4, based on the theory of discrete logarithms, is flawed. The author has demonstrated that there exists a potential class of algorithms, based on the theory of elliptic functions defined over the complex numbers, which can solve certain discrete logarithm functions in real-time computing parameters. While the author has been as yet unable to identify specific algorithms, he has demonstrated herein that it is possible to do so.

The proposed Thresher standard is therefore vulnerable. If this standard is adopted, the author believes that, given the high quality of Soviet mathematical research, codes developed from this standard could be broken within a relatively short period of time.

The author strongly recommends that Thresher Encryption Standard EVP-4 not be adopted in its current form.

That was it. Proof that his father had been framed. And then murdered. Gideon Crew already knew all about the man who had done it: Lieutenant General (ret.) Chamblee S. Tucker, currently CEO of Tucker and Associates, one of the high-profile defense industry lobbying firms on K Street. They represented many of the country’s largest defense contractors, and Tucker had leveraged himself to the hilt in order to finance the firm. He was raking in huge bucks, but they managed to go right back out the door thanks to his extravagant lifestyle.

By itself, this document meant little. Gideon knew that anything could be counterfeited — or be claimed to have been counterfeited. The document wasn’t an endpoint; it was a starting point for the little surprise he had planned for Chamblee S. Tucker.

Using the remote computer he had previously hijacked at the General Services Administration, Gideon stripped the document of its classification watermarks and sent it to a dozen large computer databases worldwide. Having thus secured the document from destruction, he sent an e-mail directly from his own computer to chamblee.tucker@tuckerandassociates.com with the document as an attachment. The covering e-mail read:

General Tucker:

I know what you did. I know why you did it. I know how you did it.