the port side of Challenger’s sail.

“Sir,” the phone talker reported, “Systems Administrator confirms good connection with the cable, handshake between supercomputers successful. Data feed from tap appears to be nominal.”

Jeffrey went below to visit the Systems Administrator. Bell remained in Control in case a threat was identified while the strike group was glued to the undersea cable like flypaper.

“How’s it going?” Jeffrey asked.

The Systems Administrator’s office was the size of a broom closet, just large enough to hold the equipment he needed to control the ship’s local area network performance and manage the status of different computers and software.

“Artificial intelligence routines are mapping out the contents of the cable strands right now, sir. Methods called expert systems and genetic algorithms. Pretty neat stuff.”

“What’s the map showing?”

“Well, the cables transmit a mixture of voice and data and video. Each strand handles several thousand separate message streams at once. But they all follow known formats and protocols, so step one is figuring out what’s where. The next step will be monitoring the information flow and finding which channels have the specific traffic we want to listen in on.”

Jeffrey nodded, and smiled. Supercomputers were very expensive, but they didn’t take up much space. What they did need was a very clean environment, a lot of electricity, and facilities to take away the immense waste heat they created. But with a reactor and turbogenerators — to drive air-conditioning and refrigeration equipment, which fed ventilation ducts and chilled-water pipes that already ran all over the ship to keep the combat-system electronics cool — a nuclear sub was the ideal place to install the most advanced available supercomputer. Rapid warnings to the CIA or the Pentagon could be sent with tight-beam laser or radio buoys, talking to dedicated submarine communication satellites.

And by the link between his ships, Jeffrey was using two supercomputers at once — massive parallel processing. Four NSA experts, who’d come from Carter in the German mini at the end of the first rendezvous, were in Challenger’s electronic support measures room; four more NSA men were in Carter’s. They’d guide the automated interpretive work done via hardware and software.

“OK, sir,” the systems administrator said. “The uh, the channel maps are completed. The sifting through to locate the stuff we care about is starting.”

“How long should that take?”

“I’m guessing about two hours, sir.”

“I’ll be in my office. You can reach me there if you have any problems. Otherwise, call me when we’re ready to stir up the hornet’s nest.”

Chapter 17

Jeffrey was back in Challenger’s control room. The system administrator had called him a few minutes ago. Carter confirmed through the acoustic link that they were ready, too.

As prearranged during the mission briefing days before, Carter positioned two of her Seahorses in polynyas spaced widely apart, with their signals intercept and electronic support measures antennas raised out of the water. These were coated with a white radar-absorbing material, for camouflage and stealth. They would capture radio and radar transmissions across the entire frequency spectrum, and by direction- finding triangulate on each transmitter’s position. The computers would produce a map of any facility that emitted anything at all. This map would be extremely wide-ranging, because surface ducting from side lobes, of even spaceward-focused satellite relay ground stations, could be picked up and amplified billions of times from hundreds of miles away. Side lobes were unavoidable leakage from any radiating antenna, in directions other than where the antenna was aimed. Ducting was an effect where a layer of air at ground or ocean level trapped and held radio and radar waves, minimizing signal-strength loss over vast distances, and bending them along the curve of the earth. Surface ducting was especially effective in mist and fog — and just such weather prevailed in the seas near Challenger this time of year, because differences between air and water temperatures caused heavy moisture condensation.

The computers and analysts on Challenger and Carter were ready to capture transmissions through the air and through the cable tap. To gather intelligence vital for completing the strike group’s mission, it was now necessary to get both the Siberian coastal defense forces, and Russia’s Strategic Rocket Forces, very excited very suddenly.

Jeffrey knew exactly how he would do this.

“Captain Bell, load a Mark Three brilliant decoy in tube eight.” The new Mark III design was a programmable decoy that, unlike the Mark IIs, could operate down to Challenger’s crush depth. Thus it could mimic the ship in every respect. Mark IIs would implode at about three thousand feet — much too shallow.

Bell issued orders to Torelli.

Jeffrey leaned against the side of Bell’s console. “Call up the large-scale tactical plot and let’s look at the predicted track of K-Three-three-five.”

Jeffrey began to issue instructions. “I want you to have the Mark Three programmed to sound and act like Challenger. You can work out the details on course waypoints and timing with the Nav. But basically this is what I want it to do.”

Jeffrey pointed with his index finger as he spoke. “Have the decoy proceed at stealth speed off of the continental shelf and on an intercept course with K-Three-three-five’s projected position over the Polar Abyssal Plain. Run it at a depth of eight thousand feet, to avoid any risk of collision and give a clearer acoustic path. When within six thousand yards of where we think the Akula-Two will be, have the decoy accelerate to fifty knots and turn sharply north. One of the Akula’s passive arrays should pick up the contact. Here, have the decoy go quiet, veer west, and gently bury itself in the bottom. It’ll have outrun and outdived K-Three-three-five before she can even get off a shot. We’ll put the Akula’s captain in a tizzy that he detected USS Challenger dashing into the middle of their boomer bastion at a speed and depth that only this ship can make.”

Bell broke into a grin. “You’ll light up every radar from here to Anadyr, and every switchboard from here to Polyarny.”

“And, I hope, once the Akula’s laser-buoy report hits the Kremlin via Russian Navy headquarters in Moscow, we also trigger a higher alert by their ground-based Strategic Rocket Forces.”

“How does that last part help us, sir?” Sessions asked. “It sounds destabilizing.”

“They’ll un-destabilize, for a while, when they see they lost contact with Challenger and nothing bad occurred to their boomers. Before then, we listen to them freak out over the fiber-optic cable. If we’re lucky, some important things will come through in plain text, or an encryption clerk will make a mistake and we’ll read a useful message in code we can break. This will hopefully aid Kurzin’s people to do their job. When I surface as Challenger’s captain in a different place, they’ll figure I used a decoy to evade one of their fast-attacks while on my way to blockade the Eight-six-eight-U. God willing, they won’t realize I’m playing a game on a much, much higher level.”

Bell’s people programmed and launched the Mark III decoy.

In ninety minutes, things did begin to happen. First, a higher-level naval antisubmarine alert was sounded. All sorts of radars and radios, on ships, on planes, at bases, and on satellites, that weren’t already radiating gave themselves and their technical specifications away. An invaluable charting of threats and spoofing strategies and gaps in Russian defensive coverage resulted. Several previously unidentified coastal supersonic antiship cruise missile installations were also plotted; these might have turned out to be fatal traps, given the way Harley intended to bring Carter close inshore.

Messages at the local Russian Navy level were caught and translated from the fiber-optic cable tap. The

Вы читаете Seas of Crisis
Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату