been to the vast Army base before and tailed Corporal Jones through the woods and dewy fields looking at signs. Roads led to various headquarters, such as Defense Courier Service and Defense Information School as well as to barracks, houses, a preschool and a golf course.
Eventually they pulled up to a spanking new facility, complete with its own flying eagle emblem.
Jake parked between two pickup trucks with American flag decals and insignia from other military commands.
Corporal Jones led him into the building.
Jake logged in at the guard post, turned over his cell phone, and followed Jones into America’s nerve center for countering cyber attacks.
He had expected to see computer banks manned by vigilant soldiers, ready to spring into action and launch counterattacks. But the only computer he saw on a short walk to a conference room was a console at the guard’s desk.
Major Harold Simpson came briskly into the conference room and offered Jake a handshake. He had the firm grip of a combat veteran, and seemed out-of-place in the military’s computer nexus.
“I was just at Quantico yesterday,” Major Simpson said, as if the FBI spent all their time in training there. “I have to keep up my certifications.”
Jake imagined he was talking about practicing on the firing range, something also required on a regular basis for FBI special agents.
“So why are you here?” Major Simson asked.
“I’m here because I’m investigating a murder case involving some computer experts,” Jake began. He told about Stacy and Chu and how the A root server and Quantum, Inc. were linked.
The major listened attentively, and Jake could tell he was following the story.
“I need you to look into this,” Jake said. “My fear is that hackers, perhaps with foreign backing, are close to penetrating the A root server. And if they do, they will have the ability to disrupt any and all business in America.”
Simpson’s hands were neatly clasped on the table. “As far as a criminal investigation goes,” he said, “I’m afraid that’s a domestic matter and we can’t get the military involved.”
Jake knew that the military couldn’t conduct operations within the nation’s borders, and that was fine with him. He didn’t know that the restriction also extended to domestic investigations of actions harmful to national security.
“So you ask, what do we do here?” Simpson said, leaning back. “We were formed in 2009 to coordinate all our military cyber commands, be it Army, Navy or Air Force. We’re here to protect our DoD networks and prevent the enemy from attacking them.”
“Military only?”
Simpson nodded. “You’re talking about the internet. Well, just like the Department of Homeland Security protects all .gov sites, we’re in charge of protecting all .mil sites.”
“So who protects .com?”
Simpson’s stoic expression didn’t change. “That’s the realm of private industry. The economic information world is controlled by a complex and highly resilient body of international law and information market controls.”
“So you’re telling me that if Chinese hackers attack our economy, you’d do nothing?”
“Okay, say we were to identify the Chinese government as involved in your case. As you may or may not know, we at Cyber Command are hamstrung by Congress not to make a preemptive strike.”
“I’m not talking about warfare,” Jake said.
“No, but various interests are calling for a new branch to the military: Cyber Warriors. Nobody wants to acknowledge yet that we’re in an arms race built up for deterrence.”
“You think the Chinese government is preparing to attack?”
“Offense is everyone’s best defense. The same year we set up our Cyber Command, they set up a department just for cyber war and to protect their assets.”
Jake let out a low whistle. “So you keep an eye on them.”
“Of course we do,” Simpson said.
“And you’re aware of Chinese cyber attacks on the
Brian Peckford
Robert Wilton
Solitaire
Margaret Brazear
Lisa Hendrix
Tamara Morgan
Kang Kyong-ae
Elena Hunter
Laurence O’Bryan
Krystal Kuehn