were all in their blood.

Their Hornets took off from Hualien air base and flew south toward the strait, toward the storm.

FIFTY-NINE

Gavin Biery sat at his desk rubbing his tired eyes. He looked like a beaten man, which he was, and the feeling of loss and hopelessness manifested itself in his slumped shoulders and his hung head.

Two of his top engineers were with him; they stood above him, and both men reached out. One patted him on the back, the other gave him an awkward hug. The men left the room without saying another word.

How? How can this be?

He blew out a long hiss of air and picked up his phone. Pressed a button and shut his eyes as he waited for it to be answered.

“Granger.”

“Sam. It’s Biery. Got a second?”

“You sound like someone died.”

“Can I get a quick meeting with you, Gerry, and the Campus operators?”

“Come up. I’ll get them together.”

Gavin hung up, stood slowly, and left the office, flipping the light off as he left.

* * *

Biery addressed the assembled group with solemnity. “This morning one of my engineers came to me to tell me that after a random security check he detected an uptick in outbound network traffic. It began immediately after I returned from Hong Kong, and it did not follow a strict pattern, though each incident of increased activity lasted exactly two minutes and twenty seconds.”

Biery’s announcement was met with a roomful of stares.

He continued: “Our network is targeted with computer attacks tens of thousands of times a day. The vast, vast majority of these attacks are nothing, just stupid phishing schemes that are pervasive on the Internet. Ninety- eight percent of all the world’s e-mail activity is spam, and most of it is hacking attempts. Every network on earth is hit by these things all the time, and moderately competent security measures are sufficient to protect them. But in the midst of all this low-level stuff, our network has been singled out for very serious and smart cyberattacks. It’s gone on for a long time, and only by the admittedly draconian measures I’ve been using have we kept the bad guys outside the wire.”

He sighed again, like a balloon deflating. “After I got back from Hong Kong, the low-level attacks continued, but the high-level attacks just stopped.

“Unfortunately, this uptick in outbound transfer activity means there is something inside our network. Something has been set up to send out data, our data, our secure data.”

Granger asked, “What does that tell us?”

“They are inside. We have been compromised. We have been hacked. The network has a virus. I dug into a couple of locations, and I regret to say I have found the FastByte Twenty-two fingerprint on our network.”

Hendley asked, “How did they do it?”

Biery looked off into space. “There are four threat vectors. Four ways for a network to be compromised.”

“What are the four?”

“A remote threat, like a network attack over the Web, but that didn’t happen. I’m firewalled here, meaning there is no direct line to the Internet that someone can use to access the network.”

Granger said, “Okay. What else?”

“A proximate threat. Like someone hacking into a wireless network from close range. Again, we’re as bulletproofed as we can be against that.”

“Okay,” said Chavez, urging Biery on.

“The third threat vector is the insider threat. That would be someone here in the building, working for the enemy, compromising our system.” Biery shook his head. “I can’t believe anyone here would do that. My hiring and vetting process is as tough as I can possibly make it. Everyone in this building has worked in top-secret—”

Hendley waved away the thought. “No. I don’t believe this was an inside job. What’s the fourth threat vector?”

Biery said, “Supply chain.”

“Meaning?”

“Compromising hardware or software that then makes its way onto the network. But again, I have safeguards against that. We monitor everything that comes in, every peripheral connected to the system, every —”

He stopped talking mid-sentence.

“What is it?” asked Chavez.

Biery stood quickly. “The German hard drive!”

“What?”

“Todd Wicks at Advantage Technology Solutions delivered a drive I ordered. I checked it out myself. It was legit. Clear of known viruses. But maybe there is something new. Something hidden in the master boot record that no one knows how to detect. I did not install it till I got back from HK, and that’s exactly when the virus began reporting back.”

“What do you want to do?”

Biery sat back down. He put his elbows on the table and dropped his head in his hands. “Step one? Shoot the hostage.”

“What?” Hendley exclaimed.

“We call it shooting the hostage. They have my network. That is the advantage they hold on us. But I can shut it all down. The entire network. Just go dark. That removes their advantage. Kill everything.”

Granger nodded. “Okay. Do it. Step two?”

“Step two? You send me down to Richmond.”

“What’s in Richmond?”

“Todd Wicks. If his board had been compromised, he would know about it.”

Hendley asked, “Are you sure he knew?”

Gavin thought back to Todd’s visit to Hendley Associates. He seemed overly friendly, a little nervous, especially when he met Jack Junior.

Biery said, “He knew.”

Chavez stood up quickly. “I’ll drive.”

* * *

Todd Wicks watched his kids play on the swing set in the backyard. Even though it was only forty-five degrees, they were enjoying the last of the daylight outside, and he knew they would enjoy the hamburgers he was grilling up even more.

Sherry was out here on the deck with him, talking on her phone with a client while she reclined on the chaise longue, bundled up in a polar fleece and ski pants but looking beautiful nonetheless.

Todd was feeling good about the day, about his family, about his life.

Through the constant din of the playing children, Wicks heard a new noise, and he looked up, away from the grilling burgers, and saw a black Ford Explorer pull up in his driveway. He didn’t recognize the vehicle. He flipped the four burgers on the grill quickly and called out to his wife.

“Honey, are you expecting anybody?”

She could not see the driveway from where she lay back on the chaise. She pulled the phone away from her ear. “No? Is someone here?”

He did not answer, because now he saw Gavin Biery climbing out of the passenger side of the Explorer, and he did not know what to do.

His knees went weak for a moment, but he fought his panic, put the spatula down, and took off his

Вы читаете Threat Vector
Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату
×