Выбрать главу

There were some potential problems, though. For one, the hacker might not take part. Jeff thought that unlikely but he had to acknowledge it as a possibility. He would also be out of luck if the hacker had left the hotel after executing the attack and then returned since he would have a different IP. Still, he’d reasoned most attendees were staying at the conference hotel and it was unlikely many had left the premises and then come back. He’d explained the downside to Clive and Norm but in their opinion the plan had a good shot at success. In anticipation of that, Norm had called the local FBI office and summoned assistance.

Jeff called Clive and told him he was ready for him. A few minutes later the man entered the prep room and sat with him. For the next twenty minutes, he and Jeff brainstormed a number of trivia questions such as “What was the first PC virus named?” Answer: “Brain.” The process took less than half an hour.

The conference was scheduled to conclude with a keynote speech. This year the speaker was the head of security for the National Security Agency, or NSA, America’s omnibus information protection and communications intercept agency. The theme of his presentation was that cyber-security was the new theater of war and where the first, even final, shots would very likely be fired. It was a theme everyone in attendance was interested in and it would be well if not universally attended.

When the meeting room was nearly full, but a few minutes before the speaker was to begin, Jeff sat in an outside aisle seat in the middle of the room. Clive took to the public address system, and once he had the attendees’ attention he spoke. “This year,” he said, “as an added event we’re asking you all to take part in a cyber-security game of trivia before the keynote presentation. I think you’ll find it very interesting.” A few minutes earlier Jeff had uploaded the game to the conference Web site. Now Clive gave the Web address. Attendees were to log in as usual to access the game. “The user who submits the most correct answers first,” Clive added, “wins five hundred dollars and a special printed award certificate.” There were smiles all around. “Second- and third-place winners will also receive award certificates. So let’s get playing. We’ll announce the winners after the speech.”

Jeff watched the players frantically log in using their laptops, tablets, and smartphones. As they began playing he felt a thrill. In his work, he protected companies from cyber-attacks, from those whose faces he never saw. Or he cleaned up after such attacks, fixing the digital mess they’d left behind. It was rare he actually faced the hacker, saw the criminal face-to-face.

The events the year before, when he and Daryl had dampened an Al Qaeda cyber-attack on the Internet in the West, had brought him in personal contact with those who’d launched the assault. He’d nearly been killed as a result and those men died. He didn’t expect this to have the same extreme outcome, fortunately.

The game was proving to be popular, as he’d expected. From where he sat, Jeff accessed the hotel Wi-Fi to sniff about and to see if he could identify the culprit. He monitored the network, searching for traffic using the attacker’s IP address. Most of the traffic he saw was, as expected, encrypted and so did not reveal any personal information about any of the users.

He concentrated on the mail server accesses and spotted attendees from cnn.com, techmeme.com, and any number of smaller, less well-known companies. Then he saw Combined Technologies International. Sixteen of their attendees there were playing the game, no, twenty-four,…no, thirty-seven,…now more than forty.

Jeff watched all log-ins closely. Then there it was: the same IP address logging into the CTI e-mail server. The hacker wasn’t staying in another hotel and he’d not left this one. Jeff straightened and drew a deep breath as he experienced a wave of elation. Then for a fleeting moment, he wondered if it could be Dillon Ritter. The very thought struck him as impossible. There was no stronger opponent of hacktivism in the industry.

Then he thought of Chuck Chacko. He was doing contract work for CTI. Could it be possible?

No, Jeff told himself. It was surely another CTI employee, who had an ax to grind. He didn’t know all who were here but realized with a sinking heart he’d very likely know, and probably like, the Anonymous hacker. He’d have to wait to see what the Web site log file said.

Jeff looked about and realized the room was buzzing as the attendees submitted their answers and jovially taunted each other. The speech was about to begin and the room grew silent. A few moments later Clive introduced the keynote speaker to a round of applause. The NSA officer took the podium and walked the attendees through a well-crafted PowerPoint presentation. His point was simple enough: the world was at war and almost no one knew it. That had to change.

None of this was news to Jeff, and he suspected it wasn’t to nearly all of those here. It always seemed to be upper management or senior government officials who didn’t get it. They hid in the forest of the numbers, betting they’d never be targeted or that there was no reason to counterattack.

Hiding from reality had been the case with Reginald Hinton, CEO of RegSec. For all his posturing and bravado he’d run a company with no better than average security. During his forensic investigation Jeff had found all the usual failings — unpatched vulnerabilities, antivirus software not updated, firewalls turned off.

And RegSec held the most private and sensitive information a customer could give. Its Web site bragged that it employed the most sophisticated digital protections in existence. The company asked the public for its trust and Hinton had betrayed them. Anonymous had not looted any accounts — so far that had not been its style — but in such a ragtag group it was inevitable. And to Jeff’s knowledge no private records had been stolen, but Anonymous had done that in the past.

However, Anonymous wasn’t finished yet, Jeff reminded himself. It was important he catch the hacker now.

As the speaker continued, Jeff correlated the username to the attacker’s IP address. The man had simply been unable to resist. With a sinking heart Jeff made the match. He had it. He closed his laptop and looked to his right where Norm was sitting quietly, scanning the audience, glancing at Jeff every minute or two. Jeff texted him the name and watched. After a moment the agent looked at his cell phone, lifted his head, and their eyes met. He’s here in this room, Norm mouthed. I know him.

As he watched the agent exit the room, pressing his phone to his ear, no doubt moving agents outside to cover the exits, Jeff wondered how something like this could have happened. Everyone employed by CTI knew of the terrible consequences of hacker attacks. They’d been on the forefront in providing defenses against the relentless cyber-assaults they all knew originated in China against DOD contractors. They’d written and sold software expressly designed to thwart financial phishing attacks, primarily by former Eastern Bloc organized-crime syndicates. Now one of them had betrayed the very cause that employed them.

Jeff rose and walked quietly to the back of the room. He slowly scanned the audience until he’d spotted the hacker. He wondered what the man was thinking as he listened. Certainly he felt smug about what he’d done, superior to everyone else. But why the attack on Jeff personally? How much anger must the hacker feel to do that? What animus must he have for Jeff?

Jeff struggled to recall an event, something he’d done or said to create or to feed such hatred, and could come up with nothing. It was perplexing.

The speaker finally finished to a round of strong applause. His message was appreciated by the vast majority of those present. Clive took his place at the lectern. After thanking the speaker, then everyone for attending, he said, “Let me call Jeff Aiken up here to join me. He provided us with the trivia game you’ve all been playing and seem to have enjoyed so much. Come on up, Jeff!”