Read Independence Day Online

Authors: Ben Coes

Tags: #Thriller

Independence Day (13 page)

BOOK: Independence Day
9.05Mb size Format: txt, pdf, ePub
ads

Sally stared at her father, whose smile had vanished.

“I’m psyched for Montana,” she said enthusiastically.

He shook his head, smiled, then underhanded the ball back to his daughter.

“Sorry, Dad,” she said, squinting her eyes.

“It’s okay, sweetheart,” said Dellenbaugh, walking to her and putting his hand on her head. He leaned over and kissed her forehead. “You’re lucky you’re so cute.”

Dellenbaugh glanced at his wife, who was rolling her eyes and shaking her head.

“Honestly, J.P., you’re the biggest softie. That girl has you wrapped around her finger. How is she ever going to learn?”

“She’s supposed to have me wrapped around her little finger,” said Dellenbaugh, picking Sally up and walking toward the elevator.

The Dellenbaughs entered the elevator. Summer pressed a button for the first floor, and they descended. Outside the elevator, Calibrisi was standing, arms crossed, waiting. His face was ashen.

“Morning, Mr. President,” said Calibrisi. “Amy, Summer, Sally, how are you?”

“Hi, Mr. Calibrisi,” said Summer.

Calibrisi smiled, then shot Dellenbaugh a look.

“I’ll be right there,” Dellenbaugh said to his wife.

“No, I don’t think you will, sir,” said Calibrisi.

Amy saw the expression on Calibrisi’s face. She walked toward her husband and wrapped her arms around him.

“It’s okay, honey. I’ll save a hot dog for you.”

“I’m sorry.”

“Don’t be,” she whispered in his ear. “You’re president of the United States. Montana will be there when you’re done.”

Dellenbaugh walked his family through the Map Room and outside to the South Lawn, where Marine One, the presidential helicopter, was already waiting to take the first family to Andrews Air Force Base. Behind Marine One were two more helicopters. One looked exactly like Marine One; this craft served as a combination decoy and attack chopper, lest anyone attempt an action against the president while on board Marine One. The other helicopter was the one used by the CIA director.

Dellenbaugh cut back through the Rose Garden, then through a terrace door that led into the Oval Office. Calibrisi was already seated on one of the tan Chesterfield sofas, along with Josh Brubaker, the president’s national security advisor. Dellenbaugh sat down on the other sofa, across from Calibrisi.

“How bad is it?”

“Bad.”

“Let’s hear it.”

“This is not going to be a straightforward deal, Mr. President,” said Calibrisi.

“I’m not sure what you mean by that, Hector.”

“What I mean is, this is developing into an attack pattern that falls squarely into the Vulnerability Matrix, sir.”

Prepared for the president’s eyes only, the Vulnerability Matrix was a top secret analysis coauthored by the CIA, the Pentagon, and the RAND Corporation. Every quarter, the brief, highly classified analysis laid out America’s critical security vulnerabilities for the president. It was a chilling document.

Calibrisi pulled out a sheet of paper and handed it to Dellenbaugh.

“I took the relevant page,” said Calibrisi as Dellenbaugh grabbed it from him and quickly scanned it.

POTUS EYES ONLY
VULNERABILITY MATRIX 997-A-554

KEY:

1  MANAGEABLE: THREAT IS ABLE TO BE EFFECTIVELY MANAGED BY U.S. GOVERNMENT/LAW ENFORCEMENT

2  CRITICAL: THREAT HAS VERIFIABLE ODDS OF SUCCESS AND WOULD BE DIFFICULT TO STOP

3  QUANTUM: RISK POSED BY THREAT HAS NO RELIABLE OR PREDICTIBLE WAY TO BE MANAGED AND MUST THEREFORE BE PREVENTED THROUGH FORWARD AND/OR PREEMPTIVE ACTIONS

SCENARIO A5-788

SHIPBORNE NUCLEAR DEVICE: EAST COAST

RISK FACTOR: 3

Commentary:

America’s single greatest security risk remains the same as in the last 74 consecutive months: terror attack involving an improvised or stolen nuclear device, delivered by boat to a city on the U.S. East Coast. The reason for this is simple: the volume of commercial fishing vessels (est. 6–7 million)
×
the length of U.S. East Coast shoreline
=
extreme improbability of discovery. This is referred to as “quantum vulnerability,” meaning that if such a plot were ever actualized, the odds of stopping it would be minimal.

President Dellenbaugh stared at the sheet of paper. He had a haunted look on his face.

“What do we know about the bomb?” he asked.

“It’s a thirty-kiloton 1950s era Soviet bomb.”

“Is it bigger than Hiroshima?”

“Much. There’s more highly enriched uranium, and the science behind it is better. Depending on the integrity of the trigger, the yield from this device could be ten times bigger.”

Dellenbaugh put the paper down. His hand was visibly shaking.

“How many people are we talking about?”

“Assuming the target’s a city, at least a million.”

“How much time do we have?” asked Dellenbaugh.

Calibrisi didn’t answer. Instead, he looked at Dellenbaugh’s cowboy hat, which was on the sofa next to the president. Dellenbaugh always wore it in Montana. He looked back at the president.

“July Fourth,” said Calibrisi.

“Independence Day. That’s four days, Chief. Let’s get to work.”

 

14

NATIONAL SECURITY AGENCY (NSA)

TAILORED ACCESS OPERATIONS (TAO)

FORT MEADE, MARYLAND

Serena Pacheco and Jesus June were seated next to each other inside a brightly lit office at NSA headquarters. It was three o’clock in the morning.

Pacheco and June were two of the NSA’s top electronic signals intelligence analysts. They employed a wide gamut of custom-built, extremely powerful software programs that pored through Internet, phone, and satellite traffic, most of which was obtained secretly.

They’d heard of Cloud, but only in the context of other well-known Russian hackers, a group considered criminal in nature but never before rising to the level of a national security threat. When they listened to the recording of Calibrisi’s conversation with Malnikov, it was the first time anyone had confirmed what had been considered an urban myth: that problems with air traffic control systems on 9/11 had been intentionally caused by computer hackers.

Now they were dividing duties. Pacheco was focused on Cloud’s likeness. After receiving a high-resolution sketch from the CIA based on Malnikov’s description of Cloud, Pacheco had quickly pushed the sketch out to Interpol and other intelligence agencies. That effort was intended to find Cloud by tapping into any personal or professional knowledge or experience with him. In addition, Pacheco had digitized the sketch and run it against a number of NSA surveillance programs. One such program, PRISM, was running the photo against visual media channels across the globe. This included security cameras at both public and private institutions, like airports and train stations, as well as license scanners, and, in cities where they existed, such as London, police cameras on street corners. PRISM could scan social media networks, like Facebook and Instagram. It also included certain Web-based photo storage repositories, such as iCloud, Dropbox, Flickr, Google Drive, and dozens of others, large and small.

If an image appeared that resembled Cloud, either in real time or at some point in the past, the software would trigger an alert. By 1
A.M.
, four separate alerts had popped. Three were errors, but one was Cloud, an Instagram photo taken by a girl at Alexei Malnikov’s nightclub. In the photo, Cloud is in the background, in a tank top, gaunt and pale. His hair is what stood out, an alarming Afro of blond curls.

In turn, PRISM shared the photo, its origin, and any other data tied to it with the other NSA surveillance platforms, expanding their arc of detection.

June was focused exclusively on the one concrete piece of data they had: digital records of the hacker’s phone calls with Malnikov. There had been three in all. Because Malnikov was already on an NSA watch list, those phone calls had all been recorded. June did not even bother listening to the conversations. He wanted the phone numbers, which he quickly found and then matched to the companies that had provided cellular coverage for the specific calls.

Two of the numbers were attached to a company called Beeline. The third number belonged to a company called MegaFon.

Legally, June wasn’t supposed to be looking into the proprietary data of phone companies without permission from those companies. Certain companies allowed it for national security reasons, but neither Beeline or MegaFon was on that list. June, however, didn’t give a damn. When a nuclear bomb is headed toward American shores, the legalities were irrelevant.

Beeline was owned by a company based in Amsterdam and incorporated in Bermuda. June was able to quickly penetrate the company’s Bermuda offices, hacking into a server from which all corporate documents, submitted to taxation authorities, had been sent. Inside this server, June focused on billing records. It was a voluminous cache of data showing minute-by-minute transactions of all 220 million customers worldwide, going back several years.

When June ran the two prepaid numbers against the database, each came back with only one record: Alexei Malnikov. Cloud had called him, then presumably thrown the cards away. Both cards had been shut off the day of the calls.

June waged a similar intrusion into MegaFon’s records, this time going in through a “trapdoor” he’d built several years before. A hack that should’ve taken days, even weeks, now took less than an hour.

As with the prepaid phones, only one number had ever been dialed with the MegaFon Samsung cell: Alexei Malnikov. June expected as much. What he did not expect was for the Samsung phone to be live. He expected the phone to have been shut down. When he entered the number into MegaFon’s billing platform, he suddenly sat up and leaned in toward his computer screen.

“Call Jim,” said June, typing quickly.

“What is it?”

“His cell phone is still on,” said June.

When Bruckheimer entered the office, he moved behind June as, from beside him, Pacheco watched.

A map of Moscow appeared on the screen. A few keystrokes later, brightly lit gridlines appeared crisscrossed on top of the map. The feed sharpened and closed in, stopping on a street corner.

Bruckheimer leaned over next to June and hit the speakerphone.

“Get me Polk.”

 

15

NATIONAL CLANDESTINE SERVICE (NCS)

MISSION THEATER TARGA

LANGLEY

Two floors belowground, past multiple security checkpoints, in a dimly lit, windowless room walled in by high-def plasma screens, Calibrisi, Polk, and a half dozen others were gathered.

There were four mission theaters at CIA headquarters: Bravo, Echelon, Firehouse, and Targa. These were the epicenters of CIA covert operations around the world.

During a CIA operation, the mission theater served as tactical command control authority. Unless the senior case officer declared “in-theater command control,” someone at Langley was calling the shots. Using real-time visual and audio media, the theaters served to connect the many disparate, shifting elements of an operation in real time through the use of technology, data, and human intelligence. By managing an operation from a central hub, the Agency could direct the operators who were out there, at the front edge, risking their lives, with information such as the arrival of hostile forces or the detection of an operator’s movement.

The four CIA mission theaters occupied an entire floor two stories below ground level. Echelon was the largest, but Polk liked the intimacy of Targa. He wanted to be able to glance into the eyes of the dozen or so case officers, field experts, tactical support specialists, and analysts on his team.

A double chime sounded on the speaker, then Jim Bruckheimer came on.

“We have something and it’s live.”

“What is it?” said Polk.

“The phone he called Malnikov with is still on. I’m sending you the coordinates. He’s in Moscow.”

Polk moved behind one of his analysts, seated at the computer in front of a large black screen.

“Give me Moscow grid with all Langley assets,” said Polk.

The large plasma screen lit up. A live satellite image of Moscow came into sharp relief. A few seconds later, green lights began appearing on the screen, showing all CIA personnel available for deployment in or around Moscow. There were two CIA assets in the city.

“Put the coordinates of the target up,” said Polk.

In the lower left-hand side of the screen, a bright orange light, then the words “15 Prospekt Vernadskogo.”

“He’s near Moscow Polytechnic,” said the analyst.

Polk pointed to one of the green lights—a CIA agent who was close by.

“Highlight it,” said Polk.

The analyst hovered a cursor above the light and double-clicked it. A photo appeared of a young male with black hair and a mustache. Beneath the photo, an empty box appeared, asking for a password. The analyst turned to Polk.

“Sir?”

Polk glanced around the room, making sure every person present had requisite security clearance.

“553 dash TS dash 7,” he said.

When the analyst typed it in and hit Enter, the man’s biography spread in block letters beneath:

NOC:

 

344K-6T ALPHA

LTK:

 

4 OCT 2011

PDS:

 

MAYBANK, JOHN BRAEBURN, Lt.

DOB:

 

04/14/88, Charleston, SC

REW:

 

U.S. Navy SEAL Team 10 (SO1)

RANK:

 

4 V.E.X.

Polk pulled a small device from his chest pocket. It was an earbud, approximately the size of a gumdrop. He stuck it in his ear.

BOOK: Independence Day
9.05Mb size Format: txt, pdf, ePub
ads

Other books

Her Royal Baby by Marion Lennox
Reckless & Ruined by Bethany-Kris
Mujer sobre mujer by Carmela Ribó
A Beautiful Dark by Jocelyn Davies
Clover by R. A. Comunale
Black Run by Antonio Manzini
Shadowlark by Meagan Spooner