20

 

Katie’s lunch with Josh would’ve been a wonderful, enjoyable time without the specter of terrorist attacks looming somewhere in the near future. When they returned to the computer lab, she pulled Josh into the conference room and locked the door behind them.

“Kate, there’s nobody else in the lab today. We don’t have to lock ourselves in the conference room.”

“We can’t be too careful. The subject on our agenda is only meant for our ears.”

“That’s not what I meant. You and I—”

“But it is what I meant, Josh.”

“You can’t blame a guy for trying. So, is this our brainstorming session?”

“Yes. We need a list of the types of attacks these people might use. As we create it, keep in mind that they must have the skills and materials for each type of attack. If it’s not likely, we rule it out.”

Katie stepped to the large whiteboard, picked up a marker, and wrote biochemical, biological, cyber warfare, bombs, guns, other. “Can you think of any other categories of attacks?”

“Let’s go with those, but keep in mind there could be combinations, for example—”

“Josh, the combinations would apply to the targets, not the weapons. We’ll get to those in a moment. First, which of these do you think the four groups we identified can actually utilize?”

“All of them.”

“Then let’s summarize what we know about each method of attack. What do you know about biological weapons?”

“I’ve read that the most likely thing terrorists might try is to spread diseases like anthrax or smallpox.”

“When we’re analyzing intercepted communications we’ll need to look for any terms associated with biological warfare, and specifically, smallpox or anthrax. OK. If terrorists were planning a 9—11 type attack using cyber warfare, what do you think they might try, Josh?”

“They would attack our infrastructure, probably using unprotected SCADA systems, you know, supervisory control and data acquisition— most of the software comes from a German company. It was never meant to be exposed to the Internet, but it is.”

“I agree,” Katie said. “The vulnerable SCADA systems are being catalogued on the Internet. Anyone can just go online and look them up by querying SHODAN.”

“If I was president,” Josh met Katie’s gaze, “I would put you in charge of cyber security, because I know what you would do.”

She waited to see what Josh had to say.

“You would launch a cyber attack to take down SHODAN, and then you would send agents after all the people involved in running the site. Then you would probably announce that you had a cruise missile with their name on it.” Josh grinned as he finished his analysis.

“If you thought that’s what I would do, it’s probably also what you would do. They say great minds think alike.”

Josh sometimes seemed too intimidated by her to take the lead. If there was to be a serious relationship between them, that needed to change.

Katie forced her mind back to the subject of attacks. She agreed with Josh about an attack on the power grid and other critical parts of the infrastructure as being the most likely cyber attack. And it would probably involve SCADA systems. “If they knew which parts of our power grid to attack, a handful of people could destabilize much of the grid across the country. If that attack coincided with the other types of attacks, we would have a severely degraded emergency-response capability.” Could that be what this conspiracy was all about?

Josh stared across the room, shaking his head. “Cyber warfare is nothing like the Cold-War nuclear threat. With our nukes, we relied on mutually assured destruction as a deterrent.”

“But you can toss that approach out when you’re fighting in cyberspace. If they take out our power grid we have no capability to retaliate. A successful cyber attack is, in essence, a first-strike capability.”

“The scary part is that the power industry is making almost no headway against the threat—at least that’s what the Information Technology e-zines that I subscribe to are saying.”

Katie scanned the whiteboard. “Let’s move on to the other possible methods of attack.”

Over the next hour they discussed everything from ricin to dirty bombs, the kinds of things that gave the FBI and DHS nightmares.

Katie took a seat beside Josh. “There’s way too much here. We need to narrow the scope a bit. Maybe do a little research to see who has the capability to pull off these kinds of attacks. Perhaps we can rule some of them out.”

“But, Kate, they could buy the needed skills from the North Koreans, the Chinese, or the Russian cyber mafia.”

“Or Iran,” she added. “You could be right, but that creates a bunch of frightening scenarios. Before we let our imaginations run too wild, let’s make some more runs with my software and check to see if we find anything new.”

“You mean like where the Whistler couple ties in?”

“Speaking of them, did I mention that I fingerprinted the guy’s browser?”

“No. You do a lot of things you forget to tell me about.”

“Yesterday, it seems I told you a lot of things I would like to forget about.” She looked at Josh from the corner of her eye, not wanting to meet his gaze directly.

“I hope not. I’m certainly not forgetting them. For the first time I caught a glimpse of what goes on in that brilliant, mysterious mind of yours. Kate, you begged me to—”

“Changing the subject—”

“Why?”

Because Josh was getting too close to the truth. “Because we have some work to do. As I was saying, the Whistler woman and man hadn’t deleted their browser history before they left their suite. I have a list of sites they visited. Some they seem to visit every day. If we watch the web server’s log on one of those sites, we’ll see their machine’s fingerprint, and then get their new IP address. Then we’ll know where those two moved.”

“But wouldn’t you have to hack a web server?”

Good. He had accepted her change of subject, but he had raised another touchy issue…risk. “I’ll simply drop a CGI script into their CGI directory, a script that greps for the fingerprint of the browser and displays the IP address for us.”

“What if you get caught, Kate?”

“I’ll choose a server in another country. What I’m doing isn’t malicious and considering that we’re spying for the US, it’s not even illegal, here. There aren’t even any treaties to stop me.”

“But what if you’re detected?”

“I won’t be. I’ll be careful, and besides, what’s some webmaster in a third-world country going to do, fly over here and shoot me? Not likely.”

“You take too many chances. One of these days even your brawn and your brain working together aren’t going to be enough to save you.”

“And why are you so worried about me?”

“Because I’m worried about me. You really are scary, Kate. Scary, beautiful, and I don’t know what I’d do if anything ever happened to—”

She pressed her fingertips to his lips and held them there, not wanting him to say too much. Or, was it not wanting him to state the obvious. “Josh, I’ll be careful. I would kind of like to have you around, too…now that you know all my secrets.”

He slid an arm around her shoulders and slowly removed her fingers from his lips. Josh obviously wanted to kiss her.

At that thought her pulse went from a marching cadence to doubletime. Katie started to pull away, but hesitated for a moment.

Josh’s deep brown eyes and his lips were only inches away.

She didn’t move.

Then they were less than an inch from hers.

She was there waiting when his lips reached hers. And she contributed more than her fair share to the kiss and their embrace.

Big, strong, handsome, reliable Joshua West. She looked up into his eyes, arms still around his shoulders. “What are we going to do, Josh?”

“Kate, you asked me that yesterday.”

“And you didn’t answer.”

“I don’t know about you, but I’ll do whatever I need to do to keep Kate Brandt in my life. And if she keeps putting herself in danger, I’ll do whatever I have to in order to keep her alive.”

“Give me thirty minutes to drop my script in a certain web server’s cgi-bin directory, then you can take me to some quiet little place for dinner. We need to talk, to come to an understanding about us.”

With his hands on her shoulders, Josh peered into her eyes, studying her. “Will this be a good talk?”

Katie stepped close, pressed her cheek against his chest and gave him a hug. “I hope so, Josh. I really hope so.”