Read The Canton Connection Online

Authors: Fritz Galt

Tags: #Fiction, #Mystery, #Retail, #Suspense, #Thriller

The Canton Connection (5 page)

BOOK: The Canton Connection
12.32Mb size Format: txt, pdf, ePub
ads

“Could you help a sketch artist create a facial composite?”

She closed her eyes and shook her head. “I didn’t get a good look at him.”

It was clear she couldn’t relive the experience without it traumatizing her once again. She had already said a lot.

The encounter seemed more than coincidental. There she was, a computer programmer jogging down the path with the password to the A root server in her head. She suddenly encountered the president of a computer firm that specialized in encryption and defense contracts. Then a lean young assailant intervened and killed the computer company chief.

Jake studied her to see if she was hiding anything. But just as her emotions were clearly visible, her intentions and motives seemed open and transparent. Except…

“Why didn’t you give your name to the authorities? We always need help identifying a culprit.”

She tilted her head to one side and regarded him frankly. “Do you really think this is just a matter of law enforcement?”

That stopped him in his tracks. He, after all, was law enforcement. Maintaining the rule of law and applying justice was what he was all about.

She was approaching this incident on a whole different plane.

“Are you saying the FBI shouldn’t get involved?” he asked.

She glanced at the wall diagram, a complex system upon which the nation’s economy and security depended, and gave him a wry smile.

He wanted to take a moment to explain the role of the FBI and why he needed to know exactly what had gone down on that bike path. This was his case, and he needed all the facts to find the killer. And finding the killer
might lead him to the motivation behind the murder.

Stacy sighed and checked her watch.

He was tempted to let her go, given the weight of her responsibilities. But those responsibilities were precisely what prompted him to want to dig deeper.

“I may need to talk with you at a later date,” he said, standing up.

She rose to her feet and pulled a business card from her jacket pocket.

At that moment, he felt he understood her. She was all about business and transactional relationships. Little did she know that the FBI already had a file on her.

He took her card and pulled out one of his own.

“Call me if any detail that might be useful occurs to you.”

She smiled so that the corners of her cheeks widened, and her frank blue eyes twinkled. “I doubt it.”

 

Chapter 8

 

Werner Hoffkeit had asked Jake to see him after interviewing Stacy Stefansson, so Jake took the elevator up to Hoffkeit’s office.

Hoffkeit had a team there when Jake arrived. Jake looked around for a place to wait until the people cleared out.

“No,” the receptionist said. “They’re all waiting for you.”

He was suddenly thrust into the presence of numerous Bureau bigwigs he recognized immediately. He realized introducing himself was unnecessary. They knew who he was, and were there because of his assignment.

Today, he was rubbing shoulders with the director, associate director and assistant directors for the Counterterrorism Division, the Counterintelligence Division, the Directorate of Intelligence, the Criminal Division and the Cyber Division as well as people he didn’t know from Science and Technology.

But all attention was focused on the director, who took a personal interest in the case.

“We just watched your interrogation of Ms. Stefansson,” Hoffkeit said, indicating the flat screen, closed-circuit TV on his office wall. At the moment, it displayed an empty interrogation room. Jake recognized it as the room that he had just left.

He was slightly nervous. He had assumed
that the interview with Stacy was monitored in some way, but little did he know that the head honchos of the Bureau had been watching and listening.

“I got a call from the Secretary of Commerce this morning,” Hoffkeit began. “They’re wringing their hands over fresh breaches in security. Their computers have monitored direct attacks on the A root server in the past week. Levels Three and Two have already been breached. And there has been recent evidence of someone trying to gain unauthorized access to Level One. As you might guess, Level One would give the hackers complete access, for whatever purpose, to the internet.”

“What sort of purposes are we talking about?” the associate director asked.

“You remember the lost payroll last week?” Hoffkeit said.

Jake knew the problem well. His paycheck had never appeared in his account. The credit union was still trying to figure out what had happened. Meanwhile, he had a rent check to write.

“That was Level Three,” Hoffkeit said. “Did your cell phone go out for several hours yesterday?”

Everyone nodded, stunned.

“That was Level Two.”

“And Level One?” the associate director seemed afraid to ask.

“Commerce said that such a hacker could corrupt, usurp, manipulate or destroy the entire internet.”

Jake got the urgency of the situation.

“We’re all new to the case as of this morning, and just getting up to speed on the computer technology involved,” Hoffkeit said. “But Ms. Stefansson’s description of the internet’s layout makes it all crystal clear how it works. And it also shows how crucial her role is in keeping it functioning safely.”

The men and women in the room murmured in agreement.

“That she was present at a crime of any sort, merits our immediate attention,” Hoffkeit went on. “That the crime involved another computer expert raises this to even higher significance.”

“I believed her when she said she didn’t recognize the victim,” Jake said in her defense.

“Agent Maguire, it’s not that she didn’t recognize him,” Hoffkeit said. “It’s that he was there in the first place, approaching her and trying to
get her attention, as Ms. Stefansson put it. Maybe he was even trying to recruit her.”

“Recruit, sir?” Jake said.

Here the Counterintelligence director spoke up. “Agents of foreign governments are always on the lookout for soft targets within our country.”

“Assuming he was a foreign agent,” Jake said. “But who would want to compromise the entire internet? It would have the effect of rendering it useless.”

All eyes turned to the counterterrorism chief, a stern looking woman who oversaw coordination with the Department of Homeland Security and the Central Intelligence Agency as well as the National Security Agency that handled electronic surveillance.

“In the past, hackers working alone or in small groups tried to exploit vulnerable computer systems of companies and governments for their own sake,” she said. “Nowadays governments have learned the value of computer espionage and disruption. Any number of motivations could be behind the actions of hostile nations.”

Jake could barely comprehend who might be behind the effort. “I’m just not clear on who’s responsible for countering cyber attacks,” he said. “I know I’m new to this, but I don’t feel this falls under the FBI’s jurisdiction.”

“I agree,” another man said. The slim man in dark frame glasses was the head of the FBI’s Cyber Division. “Our division doesn’t monitor attacks or try to thwart them. However, if a crime does occur, my team is there to gather facts and evidence and present it to the U.S. Attorney.”

“Then who in Washington does monitor and thwart such attacks?” Jake asked.

The roomful of career law enforcement
officials stared at each other and shrugged.

Hoffkeit looked at the blank expressions. “Then we have a problem.”

As Jake saw it, all the FBI needed was someone to figure out who in the federal government was forward leaning enough to find and, if necessary, preemptively strike at hostile states or cyber criminals before the internet was compromised.

So he volunteered. “As I understand it, the director has put me in charge of this case. We must learn who was behind the murder, and why. I will put together the various jurisdictional pieces and assist the police in their investigation. In the meantime, I have Stacy’s, I mean Ms. Stefansson’s, card and I intend to follow up with her.”

“We need more than a follow-up interview,” Hoffkeit said. “If Ms. Stefansson is a target, she needs around-the-clock protection.”

“Hold on, sir,” Jake said. He knew the code words. The FBI couldn’t spy on someone without a search warrant, but could spy on someone by ostensibly “protecting” him or her. “I’m concerned that a heavy-handed approach might cause Ms. Stefansson to clam up.”

Hoffkeit ignored Jake’s objection and turned his attention to the Criminal Division director.

“I’ll assign a team to keep an eye on her,” the criminal guy said with a note of authority. Then he slipped Jake his card. “I’ll keep you in the loop.”

Jake stared at the card. He had no doubt that the balding, slightly built Michael Epstein and his Criminal Division had every intention of using the pretense of protection to investigate her.

She was cooperative with Jake, but how would she react to the entire apparatus of the Bureau coming down on her?

“May I suggest that the Commerce Department simply replace her,” Jake said. “That would seal whatever leak there might be.”

“No dice,” Hoffkeit said. “Commerce is one hundred percent behind her. Besides, without her, they might never find the hackers.”

Hoffkeit trained his gray eyes on the criminal division chief.

“Michael, your team will keep an eye on Stacy and look into any malfeasance or inappropriate contacts on her part or the part of Han Chu’s company.”

Then he turned to Jake.

“And Agent Maguire will look at the broader picture. What does our government know about what’s happening here, and what can we do about it? This one calls for more than the standard ‘follow the evidence’ kind of investigation. This will require sticking our nose in other agencies’ business and a heavy dose of intuition. We’re looking for a needle in a haystack here, and I’m not even sure there’s a needle to be found.”

“Can Commerce point us in some direction?” Jake asked.

“Commerce has tried repeatedly to trace the hackers to no avail. They’re at their wit’s end. They even raised this at a Cabinet meeting, and the attorney general promised to do something about it.”

“Who made the connection with the A root server and the murder?” Jake asked.

Hoffkeit’s gray eyes landed on him. “I did.”

“So Commerce doesn’t know who’s trying to hack into Level One security on the A root server,” Jake summarized. “Who do you suspect?”

“You’ve heard about all the Chinese, Russian, North Korean and Iranian attacks on our proprietary information and vital networks. We’re just waiting for the big one, and it could come from anywhere. I don’t want you to let standard opera
ting procedure interfere with your investigation. Kick in some doors. Bend a few rules. We don’t have the luxury of waiting for someone to compromise Ms. Stefansson’s computer. We have to prevent it from happening. Period. If there’s something imminent, I want to squash it.”

Jake watched Hoffkeit rise to his feet and hike up his pants.

Hoffkeit strode over to the window that looked down the street five blocks at the White House. He was a political appointee, but he had remained above politics his whole career. “I don’t feel right about letting this crime go unpunished, but something tells me from Agent Maguire’s interrogation that this case involves something far more important than homicide. And I don’t believe our public needs to look under the hood on what happened last Friday on that bike path.”

It gave Jake comfort that Hoffkeit wasn’t going to inflict public scrutiny on his investigation, but it gave him a chill to think that his work might be top secret. The public might never know what he did or learned.

“Do you suspect the murder amounted to…treason?” Jake asked.

Hoffkeit’s gaze lifted to the horizon. “Worse than that. I suspect patriotism.”

 

Chapter 9

 

The head honchos at the FBI shook hands all around as if such meetings were rare. Then they disappeared into the compartments of the Bureau they ran.

They might have a counterintelligence problem on their hands, mixed with a terrorism effort combined with a cyber attack all revealed by a criminal action.

Jake left the director’s office with the overwhelming impression that the Bureau was going back into its “stove-piping” mode. There would be no cross-division collaboration on the case. And the FBI had failed to learn its lesson from 9/11.

But Werner Hoffkeit had given Michael Epstein and him their marching orders.

Hoffkeit had directed the Criminal Division to “protect” Stacy Stefansson and make sure she and Quantum, Han Chu’s company, were operating on the right side of the law.

Because the FBI’s Cyber Division only played an enforcement role, Hoffkeit had given Jake the broad responsibility of figuring out what government body might be tracking Chu’s company and could thwart a cyber attack.

The more he thought about the question of which government department or agency looked after the nation’s computer security, the more Jake realized that everybody in Washington had a part to play. Did any one
agency coordinate all the security and threat analysis?

On the elevator ride down to the lobby, he began to feel excited by what he might accomplish. It was up to him to connect all the dots in the case and help raise America’s defense shield.

It might also make his career at the FBI.

He passed through the lobby and reconsidered the terror warning system. Maybe they should bring back the color-coded signs. On the other hand, the nonchalant look on the faces of passersby gave him confidence that some agency somewhere in the government was eliminating the kind of computer threats he could only now imagine.

He retrieved his cell phone from the security desk and shoved it in his pocket. There, he felt the two business cards he had collected. He pulled them out. One was for Stacy Stefansson at Verisign, and the other was for Michael Epstein at the FBI’s Criminal Division. These were his first two contacts in the case. In his view, the more he kept Michael Epstein and his surveillance teams away from Stacy, the more latitude he had to check her out.

But he wasn’t going to head back to his office in Arlington empty-handed. While in DC, he needed to get a clearer picture of the nation’s cyber security apparatus and find out whom to contact to discuss the case.

That required knocking on some doors.

He was only a stone’s throw away from the White House and it was lunchtime. He grabbed his phone and placed a call to the highest level contact in the government that he could call for lunch on such short notice.

Todd Williams worked on the National Security Staff, a busy office that advised the president about all security related matters: military, diplomatic and economic. They were the president’s eyes and ears on the ground with contacts across the government spectrum. The NSS coordinated the president’s national security policy and worked with agencies to implement it.

Todd picked up the phone at once with an assertive, “Strategic Planning.”

Jake knew Todd from their undergraduate days at UVa, after which Todd had begun a career in the Foreign Service, serving mostly in Europe.

“Todd, it’s Jake. I’m in the neighborhood and need to pick your brain. You available for lunch?”

“Checking…” Todd said in his official voice. “Alright, I have a fix on it. The Kimchi Taco Truck is at the corner of 12
th
and K. I’ll be there in ten minutes.”

There was a line, as always, for the mobile Korean food stand, and Jake was mid-way through the line when his friend a
rrived.

They chatted about mutual acquaintances while standing in line among strangers. Then they took their kimchi boxes out onto the National Mall for privacy.

They took a bench under a row of trees and watched the noontime joggers who had shed their business suits for a quick workout on the dusty path around the Mall.

“I’ve got a major bureaucratic question,” Jake said. “I need to meet with the people in our national security apparatus who handle cyber attacks. Who do I call first to find out about the current threats?”

Todd eyed him closely. “Why do you need to know?”

Jake knew the subject had already come up at a Cabinet meeting. But he had nothing to report. “It’s just a criminal case with a computer connection.”

“Well,” Todd said, “if you’re talking criminal, but you don’t think the FBI is up to the task, I’d take your question to the Department of Homeland Security. Unless, of course, you think it’s a hostile nation, in which you have your choice of the Department of Defense or the CIA.”

Jake scanned the horizon. The capital was surrounded by a giant, protective wall. The DHS was gradually moving from temporary quarters in Northwest DC to a new complex in Southwest DC, whereas the Pentagon was directly west across the Potomac and the CIA was up north along the river. It felt like a modern
-day firewall of agencies set up to protect the nation’s capital.

“Can you give me some names?” Jake asked.

Todd wiped his hands and consulted his Blackberry. “I’ve got contacts in all those places.”

“Do you think they’ll field calls from an FBI agent?”

Todd grinned and said, “I see your problem. People are likely to stop talking when they see the FBI coming.”

“I’ve seen ’em run for their lawyers and general counsels before taking my call.”

“Suppose I make the introductions.”

“Thanks. That’ll save me lots of red tape.”

“What should I tell them?” Todd asked.

“Tell them that in the spirit of 9/11, the FBI continues to try to connect the dots across various parts of the U.S. Government. Put that way, they won’t hesitate to divulge any and everything.”

At last Todd’s grin emerged fully. “Nice ploy. I could see it working.”

“Todd. It’s not a ploy.”

Before they departed, Todd had made several introductions for Jake. First was a meeting with Todd’s contact at the Department of Homeland Security.

 

 

BOOK: The Canton Connection
12.32Mb size Format: txt, pdf, ePub
ads

Other books

Mr. Darcy Came to Dinner by Jack Caldwell
Healing Dr. Fortune by Judy Duarte
Captive-in-Chief by Murray McDonald
Last Kiss by Sinn, Alexa, Rosen, Nadia
Behind Closed Doors by Michael Donovan