Gideon's Sword (4 page)

Read Gideon's Sword Online

Authors: Douglas Preston

BOOK: Gideon's Sword
6.1Mb size Format: txt, pdf, ePub

“General? We’re showing your whole grid as down. It’s a security violation, sir—and you know what
that
means.”

“That’s preposterous. My computer’s on right now and working perfectly. And why are you calling me from reception?”

“General, that’s part of the problem. The telephony matrix is tied into the computer network and it’s giving false readings. Log off and log back on, please, while I trace.” Gideon glanced over at the receptionist, who was still standing to one side, making a conscientious effort not to overhear.

He heard the tapping of keys. “Done.”

“Funny, I’m not reading any packet activity from your network address. Try signing off again.”

More tapping of keys.

“Nothing, General. Looks like your ID might have been compromised. This is bad—it’s going to require a report, an investigation. And it
would
be your system. I’m so sorry, sir.”

“Let’s not get ahead of ourselves, Hopkins. I’m sure we can fix it.”

“Well…we can give it a shot. But I’ll have to try resetting, and then accessing your account from down here. I’m going to need your ID and passphrase, please.”

A pause. “I’m not sure I can give you that.”

“You may not realize this, but in the case of network resets the passphrase is automatically changed, so you’re allowed to release the passphrase internally to IT. If you feel uncomfortable with that, sir, I understand, but then I’ll have to call the NSA for a passphrase override, I’m really sorry—”

“All right, Hopkins. I wasn’t aware of that regulation.” He gave Gideon the passphrase and ID. Gideon jotted it down.

After a moment, with huge relief in his voice, Gideon said: “Whew. That reset did it, sir. Apparently, it was just a hung screen. No security breach. You’re good to go.”

“Excellent.”

Gideon depressed the key and turned to the receptionist. “Sorry to bother you,” he said, handing her the receiver. “Everything’s straightened out.” He walked briskly out of the building to the waiting car.

 

Thirty minutes later he was back in his motel room, stretched out on the bed, laptop connected to an unsecured computer in the bowels of the General Services Administration that he’d remotely hijacked. He had chosen to target the GSA—the vast government bureaucracy that handles supplies, equipment, procedures, and the like—because he knew it would be a relatively easy mark, and yet one still within the government security perimeter.

Hopkins had explained—unwittingly, of course—that the INSCOM archive could only send documents to previously authorized IP addresses, and unfortunately most of those were also inside classified perimeters…except for one: the National Security Archives at George Washington University. This private archive, the largest in the world outside the Library of Congress, collected vast amounts of government documents, including virtually everything being routinely declassified as part of the Mandatory Declassification Review: the government’s program for declassifying documents under several laws requiring them to do so. A veritable Amazon of information flowed into this archive on a daily basis.

Via the GSA computer, Gideon sent an automated request to the INSCOM secure archive at George Washington via port 6151, directing that a PDF file of a certain classified document be transmitted out through the same port, authorized via General Shorthouse’s passphrase, to be added to a routine dump of Cold War declassified documents headed for the National Security Archives daily batch files. The file was duly transmitted; it passed through the firewall at the sole authorized port, where the passphrase was examined and approved; and the document was subsequently routed to George Washington University and stored with millions of others in one of the archive databases.

Thus, Gideon had successfully arranged for the erroneous declassification of a classified document and hid it within a huge stream of data leaving the secure government perimeter. Now all that remained was to retrieve the document.

 

The next morning, at around eleven, a certain rumpled yet undeniably charming visiting professor by the name of Irwin Beauchamp, dressed in tweeds, mismatched corduroys, beaten-up wing tips, and a knitted tie (thirty-two dollars; Salvation Army) entered the Gelman Library at George Washington University and requested a slew of documents. His identity was not yet in the system and he had lost his temporary library card, but a kindly secretary took pity on the scatterbrained fellow and allowed him access to the system. Half an hour later, Beauchamp departed the building with a slender manila folder under his arm.

Back in the motel, Gideon Crew spread out the papers from the folder with a trembling hand. The moment of truth had arrived—the truth that would make him either free, or merely more miserable.

6

A Critique of the Thresher Discrete Logarithm Encryption Standard EVP-4: A Theoretical Back-Door Cryptanalysis Attack Strategy Using a Group of φ-Torsion Points of an Elliptic Curve in Characteristic φ.

G
ideon Crew had studied plenty of advanced mathematics in college and, later, at MIT, but the math in this paper was still way over his head. Nevertheless, he understood enough to realize what he had in his hands was the smoking gun. This was the memo his father had written to critique Thresher, the memo his mother said had been destroyed. Yet it hadn’t been. Most likely, the bastard responsible—believing it too difficult or risky to destroy the document outright—had stuck it into an archive he believed would never be declassified. After all, what American general in the era of the Berlin Wall would have believed the Cold War could ever end?

He continued reading, heart racing, until, finally, he came to the final paragraphs. They were written in the dry language of science-speak, but what they said was pure dynamite.

In conclusion, it is the author’s opinion that the proposed Thresher Encryption Standard EVP-4, based on the theory of discrete logarithms, is flawed. The author has demonstrated that there exists a potential class of algorithms, based on the theory of elliptic functions defined over the complex numbers, which can solve certain discrete logarithm functions in real-time computing parameters. While the author has been as yet unable to identify specific algorithms, he has demonstrated herein that it is possible to do so.
The proposed Thresher standard is therefore vulnerable. If this standard is adopted, the author believes that, given the high quality of Soviet mathematical research, codes developed from this standard could be broken within a relatively short period of time.
The author strongly recommends that Thresher Encryption Standard EVP-4 not be adopted in its current form.

That was it. Proof that his father had been framed. And then murdered. Gideon Crew already knew all about the man who had done it: Lieutenant General (ret.) Chamblee S. Tucker, currently CEO of Tucker and Associates, one of the high-profile defense industry lobbying firms on K Street. They represented many of the country’s largest defense contractors, and Tucker had leveraged himself to the hilt in order to finance the firm. He was raking in huge bucks, but they managed to go right back out the door thanks to his extravagant lifestyle.

By itself, this document meant little. Gideon knew that anything could be counterfeited—or be claimed to have been counterfeited. The document wasn’t an endpoint; it was a starting point for the little surprise he had planned for Chamblee S. Tucker.

Using the remote computer he had previously hijacked at the General Services Administration, Gideon stripped the document of its classification watermarks and sent it to a dozen large computer databases worldwide. Having thus secured the document from destruction, he sent an e-mail directly from his own computer to [email protected] with the document as an attachment. The covering e-mail read:

General Tucker:
I know what you did. I know why you did it. I know how you did it.
On Monday, I’m sending the attached file to various correspondents at the Post, Times, AP, and network news channels—with an explanation.
Have a nice weekend.
Gideon Crew

7

C
hamblee S. Tucker sat behind an enormous desk in the oak-paneled study of his house in McLean, Virginia, thoughtfully hefting a four-pound Murano glass paperweight in one hand. At seventy years old, he was fit for his age and proud of it.

He shifted the paperweight to the other hand, pressed it a few times.

A knock came at the door.

“Come in.” He set the paperweight down with exquisite care.

Charles Dajkovic entered the study. He was in civilian clothes, but his bearing and physique shouted
military
: whitewall haircut, massive neck, ramrod posture, steely blue eyes. A grizzled, close-clipped mustache was his only concession to civilian life.

“Good morning, General,” he said.

“Good morning, Charlie. Sit down. Have a cup of coffee.”

“Thank you.” The man eased his frame into the proffered chair. Tucker indicated a silver salver on a nearby side table with coffeepot, sugar, cream, and cups. Dajkovic helped himself.

“Let’s see now…” The general paused. “You’ve been with Tucker and Associates for, what, ten years?”

“That’s about right, sir.”

“But you and I, we go way back.”

“Yes, sir.”

“We have a history. Operation Urgent Fury. That’s why I hired you: because the trust built on the battlefield is the finest trust that exists in this crazy world. Men who haven’t fought together in battle don’t even know the full meaning of the words
trust
and
loyalty
.”

“That’s very true, sir.”

“And that is why I asked you to come to my home. Because I can trust you.” The general paused. “Let me tell you a story. It has a moral but you’ll have to figure it out on your own. I can’t be too specific—you’ll see why.”

A nod.

“Ever hear of John Walker Lindh?”

“The ‘American Taliban’?”

“Right. And Adam Gadahn?”

“Isn’t he the guy who joined al-Qaeda and makes videos for Bin Laden?”

“Right you are. I’ve come into possession of some highly classified information regarding a third American convert—only this one is far more dangerous.” Tucker paused again. “This fellow’s father worked for INSCOM when I was there. Turned out the man was a traitor, passing information to the Soviets. You may remember the aftermath: he took a hostage over at the old HQ. Our snipers took him down. His kid witnessed it.”

“I recall that incident.”

“What you don’t know, because it’s also classified, is that he was responsible for exposing twenty-six operatives. They were swept up in one night and tortured to death in Soviet gulags.”

Dajkovic said nothing. He set down the now empty coffee cup.

“That’s just background. You can imagine what it was like to grow up in that kind of environment…Anyway, just like Lindh and Gadahn, this fellow converted. Only he didn’t do anything stupid like go off to a training camp in Afghanistan. He went on to MIT and now he works at Los Alamos. Name’s Gideon Crew. C-R-E-W.”

“How’d he get security clearance?”

“Powerful friends in high places. He’s made no mistakes. He’s good, he’s totally convincing, he’s sincere. And he’s al-Qaeda’s pipeline to getting the Bomb.”

Dajkovic shifted in his seat. “Why don’t they arrest him? Or at least cancel his security clearance?”

Tucker leaned forward. “Charlie, are you really that naive?”

“I hope not, sir.”

“What do you
think’s
going on in this country? Just like we were infiltrated by the Reds during the Cold War, now we’re being infiltrated by jihadists.
American
jihadists.”

“I understand.”

“Now, with the kind of high-level protection this fellow has, he’s untouchable. There’s nothing concrete, of course. This information fell into my lap by accident, and I’m not one to shy away from defending my country. Imagine what al-Qaeda would do with a nuke.”

“It’s unthinkable.”

“Charlie, I know you. You were the top Special Forces guy in my command. You’ve got skills no one else has. The question is: how much do you love your country?”

The man seemed to swell in his chair. “You don’t ever need to ask me that question, sir.”

“I know that. That’s why you’re the only one I’d dare share this information with. All I can say is, sometimes a man has to take his patriotic duty into his own hands.”

Dajkovic remained silent. A faint flush had suffused his weathered face.

“Last time I checked, the fellow was in DC. Staying at the Luna Motel out in Dodge Park. We believe he’s going to make contact with a fellow jihadist. He may be getting ready to pass documents.”

Other books

Countess Dracula by Guy Adams
All Good Deeds by Stacy Green
Degeneration by Pardo, David
The Cruel Twists of Love by morgan-parry, kathryn
Basketball Disasters by Claudia Mills
Ride the Titanic! by Paul Lally
A Season of Love by Amy Clipston
Enchanted Dreams by Nancy Madore
Sports Camp by Rich Wallace