Triple Threat (17 page)

Read Triple Threat Online

Authors: H. L. Wegley

Tags: #christian Fiction

BOOK: Triple Threat
11.28Mb size Format: txt, pdf, ePub

“Isn't Hamas just a few poor Palestinians?”

“See the line from Saudi Arabia to the Gaza Strip? That's where Hamas usually gets its money. But I'm not sure if the communications from Saudi Arabia to Gaza represent funding, operational control, or both. Regardless, Hamas is active in Paraguay and in Northern Argentina.”

“So we have three trouble spots, Nicaragua, Colombia, and the Paraguay—Argentina area.”

“Which is called the Tri-Border Area. And there's the unknown piece that might belong to Boko Haram. I wonder if the shooter at Key Arena was somehow related to Boko Haram's role. If so, the unknown line of communication may come to the United States.”

“Or to Whistler?”

“We haven't tied Whistler to any one of these groups yet. Although they
have
to tie-in, somehow.”

“If we have four trouble spots, that would mean four separate, but coordinated, attacks.”

“Exactly. Forest fires, and three other things that you and I need to identify.”

“Kate, shouldn't we go to the FBI and show them what you have?”

“We have a little more time. Not much, but a little. I want to have a solid case to present when we do that.” She turned and looked into Josh's eyes. “We're almost there, Josh. With your help I think we can get there in three or four weeks, max.”

“But that takes us into July. It's the beginning of the high fire danger in Western forests. Sometime during the fire season they have to pull the trigger on this operation.”

“And that's why you and I need to keep our nose to the grindstone. So, are you with me on—”

“Kate, you should know that I am.” His eyes softened again. Josh hadn't a clue how that look affected her. Or, maybe he did. Josh was no dummy.

“You know a lot about Islamic history, beliefs, and what's happening among terrorists groups. I asked you once about being an agent in training, or—”

“Mom is still under contract to NSA, though she only works part time because of the twins. I ask her a lot of questions. She answers what she can. Some questions she doesn't answer. That's when I go to my intel sources on the Internet.”

“How much can you really learn from unclassified Internet sources?”

“There are think tanks on terrorism. Many of them issue unclassified reports and place them on their web sites. Also, some of the right-wing organizations run web sites. You have to weed out the conspiracy theorists from among them to get anything useful. The conspiracy guys ask all the wrong questions, come up with a mixture of right and wrong answers, and,
voila
, a conspiracy is born. I'll export my bookmarks for you and let you import them into your browser.”

“When do you have time to do all of this extra-curricular research, Kate?”

“I do most of it after I go home.”

“Sometimes you're here pretty late. When do you sleep?”

“Sleep?” She looked up at Josh and grinned. “What's that? But lunch, that's another matter. Let's take a lunch break and brainstorm when we get back.”

“Brainstorm what, Kate?”

“What these people plan to do other than start a bunch of forest fires.”

 

 

 

 

20

 

Katie's lunch with Josh would've been a wonderful, enjoyable time without the specter of terrorist attacks looming somewhere in the near future. When they returned to the computer lab, she pulled Josh into the conference room and locked the door behind them.

“Kate, there's nobody else in the lab today. We don't have to lock ourselves in the conference room.”

“We can't be too careful. The subject on our agenda is only meant for our ears.”

“That's not what I meant. You and I—”

“But it
is
what
I
meant, Josh.”

“You can't blame a guy for trying. So, is this our brainstorming session?”

“Yes. We need a list of the types of attacks these people might use. As we create it, keep in mind that they must have the skills and materials for each type of attack. If it's not likely, we rule it out.”

Katie stepped to the large whiteboard, picked up a marker, and wrote biochemical, biological, cyber warfare, bombs, guns, other. “Can you think of any other categories of attacks?”

“Let's go with those, but keep in mind there could be combinations, for example—”

“Josh, the combinations would apply to the targets, not the weapons. We'll get to those in a moment. First, which of these do you think the four groups we identified can actually utilize?”

“All of them.”

“Then let's summarize what we know about each method of attack. What do you know about biological weapons?”

“I've read that the most likely thing terrorists might try is to spread diseases like anthrax or smallpox.”

“When we're analyzing intercepted communications we'll need to look for any terms associated with biological warfare, and specifically, smallpox or anthrax. OK. If terrorists were planning a 9—11 type attack using cyber warfare, what do you think they might try, Josh?”

“They would attack our infrastructure, probably using unprotected SCADA systems, you know, supervisory control and data acquisition— most of the software comes from a German company. It was never meant to be exposed to the Internet, but it is.”

“I agree,” Katie said. “The vulnerable SCADA systems are being catalogued on the Internet. Anyone can just go online and look them up by querying SHODAN.”

“If I was president,” Josh met Katie's gaze, “I would put
you
in charge of cyber security, because I know what you would do.”

She waited to see what Josh had to say.

“You would launch a cyber attack to take down SHODAN, and then you would send agents after all the people involved in running the site. Then you would probably announce that you had a cruise missile with their name on it.” Josh grinned as he finished his analysis.

“If you thought that's what I would do, it's probably also what you would do. They say great minds think alike.”

Josh sometimes seemed too intimidated by her to take the lead. If there was to be a serious relationship between them, that needed to change.

Katie forced her mind back to the subject of attacks. She agreed with Josh about an attack on the power grid and other critical parts of the infrastructure as being the most likely cyber attack. And it would probably involve SCADA systems. “If they knew which parts of our power grid to attack, a handful of people could destabilize much of the grid across the country. If that attack coincided with the other types of attacks, we would have a severely degraded emergency-response capability.” Could that be what this conspiracy was all about?

Josh stared across the room, shaking his head. “Cyber warfare is nothing like the Cold-War nuclear threat. With our nukes, we relied on mutually assured destruction as a deterrent.”

“But you can toss that approach out when you're fighting in cyberspace. If they take out our power grid we have no capability to retaliate. A successful cyber attack is, in essence, a first-strike capability.”

“The scary part is that the power industry is making almost no headway against the threat—at least that's what the Information Technology e-zines that I subscribe to are saying.”

Katie scanned the whiteboard. “Let's move on to the other possible methods of attack.”

Over the next hour they discussed everything from ricin to dirty bombs, the kinds of things that gave the FBI and DHS nightmares.

Katie took a seat beside Josh. “There's way too much here. We need to narrow the scope a bit. Maybe do a little research to see who has the capability to pull off these kinds of attacks. Perhaps we can rule some of them out.”

“But, Kate, they could buy the needed skills from the North Koreans, the Chinese, or the Russian cyber mafia.”

“Or Iran,” she added. “You could be right, but that creates a bunch of frightening scenarios. Before we let our imaginations run too wild, let's make some more runs with my software and check to see if we find anything new.”

“You mean like where the Whistler couple ties in?”

“Speaking of them, did I mention that I fingerprinted the guy's browser?”

“No. You do a lot of things you
forget
to tell me about.”

“Yesterday, it seems I told you a lot of things I would like to forget about.” She looked at Josh from the corner of her eye, not wanting to meet his gaze directly.

“I hope not. I'm certainly not forgetting them. For the first time I caught a glimpse of what goes on in that brilliant, mysterious mind of yours. Kate, you begged me to—”

“Changing the subject—”

“Why?”

Because Josh was getting too close to the truth. “Because we have some work to do. As I was saying, the Whistler woman and man hadn't deleted their browser history before they left their suite. I have a list of sites they visited. Some they seem to visit every day. If we watch the web server's log on one of those sites, we'll see their machine's fingerprint, and then get their new IP address. Then we'll know where those two moved.”

“But wouldn't you have to hack a web server?”

Good. He had accepted her change of subject, but he had raised another touchy issue…risk. “I'll simply drop a CGI script into their CGI directory, a script that greps for the fingerprint of the browser and displays the IP address for us.”

“What if you get caught, Kate?”

“I'll choose a server in another country. What I'm doing isn't malicious and considering that we're spying for the US, it's not even illegal, here. There aren't even any treaties to stop me.”

“But what if you're detected?”

“I won't be. I'll be careful, and besides, what's some webmaster in a third-world country going to do, fly over here and shoot me? Not likely.”

“You take too many chances. One of these days even
your
brawn and
your
brain working together aren't going to be enough to save you.”

“And why are you so worried about me?”

“Because I'm worried about
me
. You really are scary, Kate. Scary, beautiful, and I don't know what I'd do if anything ever happened to—”

She pressed her fingertips to his lips and held them there, not wanting him to say too much. Or, was it not wanting him to state the obvious. “Josh, I'll be careful. I would kind of like to have you around, too…now that you know all my secrets.”

He slid an arm around her shoulders and slowly removed her fingers from his lips. Josh obviously wanted to kiss her.

At that thought her pulse went from a marching cadence to doubletime. Katie started to pull away, but hesitated for a moment.

Josh's deep brown eyes and his lips were only inches away.

She didn't move.

Then they were less than an inch from hers.

She was there waiting when his lips reached hers. And she contributed more than her fair share to the kiss and their embrace.

Big, strong, handsome, reliable Joshua West. She looked up into his eyes, arms still around his shoulders. “What are we going to do, Josh?”

“Kate, you asked me that yesterday.”

“And you didn't answer.”

“I don't know about you, but I'll do whatever I need to do to keep Kate Brandt in my life. And if she keeps putting herself in danger, I'll do whatever I have to in order to keep her alive.”

“Give me thirty minutes to drop my script in a certain web server's cgi-bin directory, then you can take me to some quiet little place for dinner. We need to talk, to come to an understanding about
us
.”

With his hands on her shoulders, Josh peered into her eyes, studying her. “Will this be a good talk?”

Katie stepped close, pressed her cheek against his chest and gave him a hug. “I hope so, Josh. I really hope so.”

 

 

 

 

21

 

A few miles east of Vancouver, BC, Hasan scanned the 60s era motel as he drove down Kingsway in Burnaby. “Cheap motels in Burnaby. The website was truthful.”

Arissa shook her head. “I will give you truthful, Hasan. This makes our suite in Whistler look like paradise.”

He turned onto a side street and entered the parking lot behind the motel. “Prepare yourself, Arissa. We may be here for a while, because we cannot cross the border and—”

“I know. And because of the two agents we cannot go back to Whistler. Who would have thought those two, hardly more than children, would be agents, spies?”

He pulled into a parking space. “But they were well trained, very intelligent. The girl, so feminine, so beautiful, yet she fought like a tiger. A Japanese tiger. Come. We will set up our operations here. This is a friendly, family owned motel. They will not ask questions.”

“And you did not ask the girl questions, Hasan. We still don't know how much she knows. Are you sure we can continue without modifying our plan?”

“She accessed my hard drive. But nothing on my hard drive gave times or specific locations. I'm certain that she only knew the method of delivery…and taunted me with it. I believe if she knew more, she would've taunted me with that, also. For one so young, she is a dangerous foe. When our business is concluded, if it is possible, the beautiful infidel and her accomplice should die to pay for interfering with the holy war.”

“Are you sure that it is not personal vengeance you want? When the cut on your head heals, handsome Hasan will wear a permanent scar on his face.”

“Do not taunt me, Arissa. You are no match for this girl, not in any way. She is strong as a man, throws like an American—what is it they call them—a baseball pitcher? And she is smarter than you, bright Arissa.”

“And I suppose more beautiful in your eyes?”

Other books

Broken Wings by V. C. Andrews
Glass Girl (A Young Adult Novel) by Kurk, Laura Anderson
SixBarkPackTabooMobi by Weldon, Carys
Easy Death by Daniel Boyd
A Dark Night Hidden by Alys Clare
The Beginning by Mark Lansing
Ever Winter by Alexia Purdy
The Jews in America Trilogy by Birmingham, Stephen;