Reads Novel Online

The Fox

« Prev  Chapter  Next »



Always the old-fashioned courtesy. She was giving an order, not making a request. For friendship she would use his given name. He would always call her by her title.

‘Of course, Prime Minister.’

There was nothing more to say, so the connection ended. Sir Adrian Weston rose and went into the small but sufficient bathroom to shower and shave. At half past four he went downstairs, p

ast the black-framed portraits of all the agents who had gone into Nazi-occupied Europe so long ago and never come back, nodded to the night watch behind the lobby desk and let himself out. He knew a hotel on Sloane Street with an all-night café.

Shortly before 9 a.m. on a bright autumn morning, 11 September 2001, a twin-jet American airliner out of Boston for Los Angeles designated American Airlines 11 swerved out of the sky over Manhattan and slammed into the North Tower of the World Trade Center. It had been hijacked in mid-air by five Arabs in the service of terrorist group al-Qaeda. The man at the controls was an Egyptian. He was supported by four Saudis who, armed with box-cutter knives, had subdued the cabin staff and hustled him on to the flight deck.

Minutes later, another airliner, flying far too low, appeared over New York. It was United Airlines 175, also out of Boston for Los Angeles, also hijacked by five al-Qaeda terrorists.

America and, within moments, the entire world watched in disbelief as what had been presumed a tragic accident revealed it was nothing of the sort. The second Boeing 767 flew deliberately into the South Tower of the Trade Center. Both skyscrapers sustained terminal damage in the mid-sections. Aided by the fuel from the full tanks of the airliners, savage fires erupted and began to melt the steel girders that held the buildings rigid. A minute before 10 a.m. the South Tower collapsed into a mountain of red-hot rubble, followed by the North Tower half an hour later.

At 9.37 a.m. American Airlines flight 77 out of Washington Dulles International Airport, also bound for Los Angeles with full tanks, dived into the Pentagon, on the Virginia side of the Potomac. It had also been hijacked by five Arabs.

The fourth airliner, United Airlines 93, out of Newark for San Francisco, again hijacked in mid-air, was recaptured by a passenger revolt, but too late to save the aircraft, which, with its fanatical hijacker still at the controls, dived into farmland in Pennsylvania.

Before sundown that day, now known simply as 9/11, a fraction under 3,000 Americans and others were dead. They included the crews and passengers of all four airliners, almost all those in the World Trade Center’s two skyscraper towers and 125 in the Pentagon. Plus the nineteen terrorists who committed suicide. That single day left the USA not simply shocked but traumatized. She still is.

When an American government is wounded that badly, it does two things. It demands and exacts revenge, and it spends.

Over the eight years of the George W. Bush presidency and the first four years of that of Barack Obama, the USA spent a trillion dollars constructing the biggest, the most cumbersome, the most duplicated and possibly the most inefficient national security structure the world has ever seen.

If the nine inner US intelligence agencies and the seven outer agencies had been doing their jobs in 2001, 9/11 would never have occurred. There were signs, hints, reports, tip-offs, indications and oddities that were noted, reported, filed and ignored.

What followed 9/11 was an explosion of expenditure that is literally breathtaking. Something had to be done, and be seen to be done by the great American public, so it was. A raft of new agencies was created to duplicate and mirror the work of the existing ones. Thousands of new skyscrapers sprang up, entire cities of them, most owned and run by private-sector-contracted enterprises eager for the fathomless dollar harvest.

Government expenditure on the single pandemic word ‘security’ detonated like a nuke over Bikini Atoll, all uncomplainingly paid for by the ever-trusting, ever-hopeful, ever-gullible American taxpayer. The exercise generated an explosion of reports, on paper and online, so vast that only about ten per cent of them have ever been read. There simply is not the time or, despite the massive payroll, the staff to begin to cope with the information. And something else happened in those twelve years. The computer and its archive, the database, became rulers of the world.

When the Englishman seeking an early breakfast off Sloane Street was a young officer in the Paras, then in MI6, records were created on paper and stored on paper. It took time, and the storage of archives took space, but penetration, the copying or removal and theft of secret archives – that is, espionage – was hard and the quantity removable at any one time or from any one place was modest.

During the Cold War, which supposedly ended with the Soviet reformer Mikhail Gorbachev in 1991, the great spies like Oleg Penkovsky could abstract only as many documents as they could carry about their persons. Then the Minox camera and its product microfilm enabled up to a hundred documents to be concealed in a small canister. The microdot made copied documents even smaller and more transportable. But the computer revolutionized the lot.

When defector and traitor Edward Snowden flew to Moscow it is believed he carried over one and a half million documents on a memory stick small enough to be inserted before a border check into the human anus. ‘Back in the day’, as the veterans put it, a column of trucks would have been needed, and a convoy moving through a gate tends to be noticeable.

So, as the computer took over from the human, the archives containing trillions of secrets came to be stored on databases. As the complexities of this mysterious dimension called cyberspace became more and more weird and increasingly complicated, fewer and fewer human brains could understand how they worked. Matching pace, crime also changed, gravitating from shoplifting through financial embezzlement to today’s daily computer fraud, which enables more wealth to be stolen than ever before in the history of finance. Thus the modern world has given rise to the concept of computerized hidden wealth but also to the computer hacker. The burglar of cyberspace.

But some hackers do not steal money; they steal secrets. Which is why a harmless-looking suburban house in a provincial English town was invaded in the night by an Anglo-American team of Special Forces soldiers and its inhabitants detained. And why one of those soldiers murmured into a radio-mic: ‘You are not going to believe what we have found here.’

Three months before the raid a team of American computer aces working at the National Security Agency in Fort Meade, Maryland, discovered what they also could not believe. The most secret database in the USA, probably in the world, had apparently been hacked.

Fort Meade, as the word ‘fort’ implies, is technically an army base. But it is a lot more than that. It is the home of the fearsome National Security Agency, or NSA. Heavily shielded from unwanted view by forests and forbidden access roads, it is the size of a city. But instead of a mayor it has a four-star army general as its commanding officer.

It is the home of that branch of all intelligence agencies known as ELINT, or electronic intelligence. Inside its perimeter, rank upon rank of computers eavesdrop the world. ELINT intercepts, it listens, it records, it stores. If something it intercepts is dangerous, it warns.

Because not everyone speaks English, it translates from every language, dialect and patois used on planet Earth. It encrypts and decodes. It hoards the secrets of the USA and it does this inside a range of super-computers which house the most clandestine databases in the country.

These databases are protected not by a few traps or pitfalls but by firewalls so complicated that those who constructed them and who monitor them on a daily basis were utterly convinced they were impenetrable. Then one day these guardians of the American cyber-soul stared in disbelief at the evidence before them.

They checked and checked again. It could not be. It was not possible. Finally, three of them were forced to seek an interview with the general and destroy his day. Their principal database had been hacked. In theory, the access codes were so opaque that no one without them could enter the heartland of the super-computer. No one could get through the protective device known simply as ‘the air gap’. But someone had.

Worldwide, there are thousands of hacker attacks per day. The vast bulk are attempts to steal money. There are endeavours to penetrate the bank accounts of citizens who have deposited their savings where they believed they would be safe. If the ‘hacks’ are successful, the swindler can pretend to be the account holder and instruct the bank

’s computer to transfer assets to the thief’s account, many miles and often many countries away.

All banks, all financial institutions, now have to encircle their clients’ accounts with walls of protection, usually in the form of codes of personal identification which the hacker cannot know and without which the bank’s computer will not agree to transfer a penny or a cent. This is one of the prices the developed world now pays for its utter dependence on computers. It is extremely tiresome but better than impoverishment and is now an irreversible characteristic of modern life.

Other attacks involve attempts at sabotage stemming from pure malice. A penetrated database can be instructed to cause chaos and functional breakdown. This is generally done by the insertion of a sabotage instruction called ‘malware’ or a Trojan horse. Again, elaborate protections in the form of firewalls have to be wrapped around the database to frustrate the hacker and keep the computerized system safe from attack.



« Prev  Chapter  Next »