Piranha (Oregon Files 10)
With nothing more to do now that he and his few charges were safe, Scott took Lutzen’s journal from his waistband and flipped through it. As he’d suspected, he couldn’t understand a word of it. Not only was every page written in German but the majority of the writing consisted of equations and scientific mumbo jumbo. Scott hoped Lutzen’s sister would know what to make of it and vowed to keep his promise to return it to her.
Scott thought about what he’d tell her when he met her upon his arrival in New York, whether to save her from the horror of what her brother had suffered. He thought she deserved the whole truth, including Lutzen’s last message to her.
He wanted to make sure he remembered it verbatim in the days it would take for the trip north, so he scrounged a pencil from one of the Suchet’s sailors and leafed to the first blank page. Scott scribbled the cryptic phrases he’d heard, Lutzen’s raw voice in his head.
Tell her I was there. I made the breakthrough. It will change everything. They shined like emeralds, as large as tree trunks.
Scott paused, still unsure whether he’d heard Lutzen’s final three words correctly. He shrugged and reproduced Lutzen’s strange message exactly.
I found Oz.
Chesapeake Bay
Nine months ago
The X-47B prototype attack drone made a sweeping turn, only minutes away from the target eighty miles northwest of the Chesapeake Bay Bridge-Tunnel. Frederick Weddell adjusted the frequency-hopping algorithm of the jamming transmission. His mission was to block the control signal coming in from the drone’s operator at Naval Base Ventura County in California and recode its onboard navigation system, causing the aircraft and its one thousand pounds of fuel to smash into a derelict barge.
Even without the two smart bombs it was capable of carrying, the drone could cause a deadly terrorist attack on the U.S.
Weddell relished the challenge. “We’re gonna do it,” he said to no one in particular, although there were two other men in the small room filled to the brim with electronic equipment and displays. The eighty-foot communications vessel anchored near the mouth of the Potomac was otherwise unoccupied except for its captain, who was topside on the bridge. Weddell adjusted his wire-framed glasses and looked up at the largest monitor to check the view from a camera on the deck. The drone was in its first turn after takeoff, a white wedge against the orange glow of dusk behind it.
To accomplish their mission, jamming the control signal wasn’t enough. If the drone’s contact with its controller was lost, it would revert to autonomous mode and return to its ba
se at Naval Air Station Patuxent River, the Maryland flight center that served as the test facility for most of the Navy’s aerial weapons systems. The key was to establish a new control authorization so that the coordinates for an alternative target designation could be loaded. In this case, the unmanned aerial vehicle would be instructed to crash into the barge at five hundred miles per hour.
This attack was the worst-case scenario for the Pentagon. No one—not the drone designers nor the Joint Chiefs—thought that the onboard systems could be hacked. But ever since a top secret RQ-170 Sentinel reconnaissance drone crash-landed in Iran, top brass had demanded that the Air Force and Navy prove that their communications protocols were unbreakable. Apart from losing a drone that cost hundreds of millions of dollars to build, the crash had given Iran a free peek inside one of America’s most advanced pieces of technology. If the Iranians could bring it down, they might be able to wrest a drone’s control away from its operator. The military was pouring funds into a program to make sure that never happened.
That was the reason for this hijacking simulation.
The call had gone out for the best and brightest in the drone community to put together a team to serve as the enemy infiltration unit. An electrical engineer by education and now the Air Force’s top communications specialist, Weddell had jumped at the chance. He was an expert in all manner of signal transmission, encryption, and disruption, so he was chosen to head up the signal intercept mission. His team consisted of two other top-notch scientists.
Lawrence Kensit, a mousy fellow with a stooped gait and an acne-scarred face, was a computer scientist and physicist who had gotten his Ph.D. from Caltech when he was twenty. Despite his penchant for calling anyone he felt didn’t rise to his level of brilliance “irredeemably stupid”—including officers who depended on his work—he nevertheless became the military’s most brilliant drone software developer. He sat to Weddell’s right, tapping away on a keyboard set in front of three screens winking with data.
The second man was Douglas Pearson, a hardware designer responsible for the technology that went into the most advanced drones in the military’s arsenal. He was a bear of a man whose bombastic voice and enormous gut suited someone who didn’t say no too much and wasn’t used to hearing the word, either. He ruled his fiefdom with an iron fist and would argue loudly with anyone who disagreed with his viewpoint. He sat to Weddell’s left with his feet up on the counter, a tablet computer in one hand and a coffee mug in the other.
If the three of them couldn’t crack the drone’s command system, no one else in the world could. After confirming that the drone would in fact proceed on an intercept path toward the derelict barge, Weddell planned to veer it from its course and have it waggle its wings over Patuxent in a final flourish before returning it to Ventura control.
Pearson slurped his coffee loudly before setting it down and tapping his tablet against the counter. “What’s happening, Larry? I’ve got nothing on the linkup so far.”
“Dr. Weddell,” Kensit said without looking away from his screens, “please remind Dr. Pearson that I don’t respond to that nickname. I prefer ‘Dr. Kensit,’ but I will accept ‘Lawrence,’ even though that privilege is usually reserved for people who could be considered equals.” He paused before adding, “If it’s not clear, I don’t consider him an equal.”
“Equal in what way, Dr. Kensit?” Pearson said with a mocking laugh. “We sure aren’t equal in height.”
“Or weight.”
Pearson snorted. “Why don’t I just call you shorty? Or how about pipsqueak?”
“My height is lower relative to yours, but close to average,” Kensit replied without inflection. “Much like your IQ.”
“Enough,” Weddell said, fed up with their constant bickering. “We’re not going through this right now.” He had spent half of the last six months playing referee between them.
“We’re about to win this thing,” he continued, “so try to remain civil until we’re done. We’ll only have a direct line of sight for two more minutes. What’s your status, Lawrence?”
Kensit pressed a final key with a decisive snap. “If Dr. Pearson’s hardware calculations are correct, as soon as you are able to wrest the control signal away from Ventura, I will be able to reconfigure the onboard navigation protocols.”
Weddell nodded and put his plan for blocking the transmission into motion. Spoofing the GPS navigation wouldn’t work because all U.S. drones relied on inertial navigation to prevent just such a tactic. He had to be much more creative. Using an antenna of his own design mounted on the deck of the boat, he blasted the receiver on the X-47B with an overload spike that would cause the onboard systems to momentarily freeze. The sensitive part of the operation was to do it just long enough so that its receiver would immediately go into search mode again, but not so long that it recognized someone was attempting to compromise its protocols and cause it to revert to autonomous operation.
“Get ready, Lawrence,” Weddell said. “Remember, you’ll have only twenty seconds to acquire the signal.”