Satan's Spy (The Steve Church saga Book 2) AndrĂ© Gallo (top 100 books of all time checklist TXT) đ
- Author: André Gallo
Book online «Satan's Spy (The Steve Church saga Book 2) AndrĂ© Gallo (top 100 books of all time checklist TXT) đ». Author AndrĂ© Gallo
âGeorge, we canât wait,â the president said. âYou can inform them, and their opinion will go in the hopper only if itâs timely.â
âSecondly, sir, this event should remind us of the importance of establishing a new international agreement on limiting and punishing cyber attacks.â
Tremaine had immense respect for his Secretary of State, a woman with a proven track record and always highly focused on the task at hand. Unfortunately, she was out of the country. With all of the intelligent and able professional foreign-service officers serving in the Department of State, why George Orling, an academic with no field experience? George was no Kissinger. He would have to talk to her about George Orling.
âIâd like the Deputy Director for Intelligence Dr. Deborah Jamiston to give her analysis, Mr. President,â Walter Deuel said.
With a nod from Tremaine, the CIAâs chief analyst stood. A woman in her fifties with sensible short brown hair, good walking shoes, and a Junoesque figure, she held a pencil in one hand.
âThe backdrop is Iranâs effort to expand through and beyond the American embargo of thirty plus years. It sees the United States as the primary supporter of several countries that it believes it could include in its own zone of influence, if it werenât for American interference.â
Not bothering to look down at her notes on the table in front of her, she continued, hanging on to her pencil.
âIn other words, Iranâs ambition is to establish hegemony over the Middle East. Iranâs leaders believe that, if it were not for the United States, Egyptâs military could be won over. They hold that Jordan is not a real state, just a colonial fabrication, which should be replaced by a Palestinian State that would include Israel, Jordan, Gaza, and the West Bank; that Lebanon is sure to fall to its client the Hizballah; and that Bahrain is already a part of Iran. It just needs to be made official.â
George Orling interrupted, âThatâs absurd. It would be a mass violation of the sovereignty of states, a total renunciation of the Peace of Westphalia!â
Deborah Jamiston went on, âMaybe so. The Peace of Westphalia is not so high on Tehranâs list of priorities these days. The Iranian leadership believes that if the United States, occupied by problems elsewhereâat home for exampleâwould only retrench from the Middle East, Iran would have an easier time reaching its expansionary goals in the region, of fulfilling its vision of the future. A cyberattack could create that diversion, that internal focus. As I understand it, it could take us months, if not years, to recover from a major cyberattack. Looking at the possibilities through Iranian glasses, the cyber option looks good.â Jamiston sat back in her chair and looked for a reaction from the president.
âSo the attack would be a feint,â Tremaine asked, âjust to keep us busy at home?â
âNot a feint exactly, although it would certainly divert our focus from the Middle East,â Jamiston said. âThe resources to bring our economy back on line after what could be a cyber Pearl Harbor would probably force us to cut our military programs and expenditures several fold. It would mean decimating our presence in the Middle East, a vacuum that Iran would fill.â
The Director of National Intelligence General Sid âLeftyâ Killcut looked knowingly toward General Doredo, the Chairman of the Joint Chiefs, who had one more star than âLefty.â
âWhat do you think, Admiral?â President Tremaine asked of his NSA chief. He took a sip of coffee from his SĂšvres cup, a gift to a past American president from a past French president.
Admiral Wynn, tall and thin with a boyish face and undisciplined hair falling over his forehead, stood.
âI find the reference in the report that the probing has been concealed behind Chinese computers most significant. There is some history to this subject that we should all consider. In 1997, an unconvinced Department of Defense ran a test, Eligible Receiver, against its own computers. The attack, luckily it was only an exercise, was totally successful. In 2001, there was Code Red in which over three hundred thousand computers were remotely captured, to attack White House computer systems.â
âWhat do you mean âcapturedâ?â the president asked.
âSir, I mean these computers became zombies. They stayed in place in universities, labs, etc., but they were controlled remotely. We still donât know who the attacker was. Right after 9/11, there was the Ninja virus that cost Wall Street several billion dollars. No one paid attention because we were too close to the al Qaeda strike. Then there was Moonlight Maze, the theft of naval codes and classified missile data. We traced the hacking to a Russian computer, but that may not be where the action actually originated.â
He leaned forward to look at his notes on the table and continued, âOn the Fourth of July 2009, computers at Treasury, the Secret Service, Department of Homeland Security, and Wall Street were knocked out. The suspect was North Korea, but we donât know. The truth is we donât know who was behind any of these. The usual suspects are the Chinese, al Qaeda, the Russians, and maybe the North Koreans. Thereâs no reason why the Iranians couldnât have developed their own capability, especially with Russian help, as the report claims. Based on fragmented information, itâs clear that the skills and technology used against us is growing in leaps and bounds. Itâs what we donât know that is frightening. â
âWell ladies and gentlemen?â Tremaine asked. âIs the report credible, and if it is, what do we do?â
âThis is too important not to confirm or deny before we take action,â Orling, said. âI believe that we should talk to the Russians. After all, there is a specific name in the report, what is it again âKazak,â Kozak?ââ
âIsnât that like asking the
Comments (0)