Breakpoint (10 page)

Read Breakpoint Online

Authors: Richard A. Clarke

BOOK: Breakpoint
2.97Mb size Format: txt, pdf, ePub

“To signal Taiwan's new leader not to make good on his Independence platform. To tell us that they know we may think they are behind the attacks on our cyber infrastructure and we should not try any response because it could quickly escalate?” the National Security Advisor asked. “Is that what you're thinking, Bill?”

“Could be both. If it's about Taiwan, there are over sixty years of U.S. pledges to defend Taiwan from China, including the Taiwan Relations Act passed by Congress. If they go after Taiwan, we have no choice. Bill Clinton sent two carrier battle groups there the last time things were heating up.” Defense Secretary Chesterfield looked over at the Secretary of State and then continued, “But if it's about us, and after all, it's always about us…look, they know that we are trying to figure out who blew up the beachheads, hacked the Pacific commercial satellites and sent them hurtling toward Pluto. They know they must be a suspect. Therefore, they shake the cobwebs out of their military and at the same time their maneuvers remind us that they have modernized their forces. If we try anything against them, it won't be a walk in the park. That's what they're signaling,” Secretary Chesterfield said, sounding like he was still teaching at Princeton. “Or they could have learned about our own big Pacific exercise upcoming and want to get in place first.”

“We know that they know that we know what they might have done. Good god,” Neyers said. “And people wonder how nations fall into unintended wars. What big Pacific exercise of our own do we have coming up?”

“No one's talking about a war here, Brenda, just a big show of force by Pacific Command beginning next week,” the National Security Advisor admonished. “Sol, what do you have on the investigations? Is there a Chinese hand or not? The President wants options from us if it is China. He's meeting with his economic advisors again in the morning. The stock market's down twenty percent since the opening Monday, worse on the NASDAQ. And the media is beginning to turn on us for not knowing what's going on.” The two Navy stewards reappeared to clear the pizza plates and bring in the apple pie à la mode. Conversation halted until they departed. Rubenstein then went over his report.

“As my friends at the FBI would say, Wallace, the investigation is ongoing. But, not being them, I will actually tell you what's going on. I have four points in today's intel summary. First, on the internet cable beachhead attacks Sunday, it now appears that a Russian organized-crime figure was involved. He was last seen on video monitors on the George Washington Bridge going into New Jersey on Tuesday. His car was later found at Newark Liberty Airport. NSA discovered that this fellow Yellin had a very large amount of money deposited recently into an account he controls in the Ukraine. Now he's gone to ground.

“Second, on the Pacific communications satellites, we assume they were hacked by phony signals. They would have to have originated from somewhere in the western U.S.; we don't know where. The attack was smart, sending the satellites out of orbit and toward Uranus, Neptune, Alpha Centuri, your choice.

Number three, on the suicide bomber, it came back as a positive match with a known Iraqi terrorist. Can't explain that,” Rubenstein said, ticking through the bottom lines of in depth reports in his briefing book.

Defense Secretary Chesterfield looked exasperated. “I have to testify before Senate Armed Services tomorrow in closed session. I wish I understood all this cyber stuff better. I thought it was just for nerds. Who knew how important it was? Don't you guys know anything more about what happened?”

“We may know more, but it's speculation. China may not just be trying to get us to back off from helping Taiwan. They may be after our technological lead over them. My officers also identified a pattern of fires and accidents at major computer facilities and bio labs over the last few months,” Rubenstein responded. “If you add these all up, strip out some attacks or accidents at bio facilities, it looks like a Chinese attempt to take apart our cyber networks and to prevent us from implementing some of the fixes the President approved after the Cyber Crash of 2009. Those fixes might prevent Chinese industrial espionage on us, among other things. FBI is investigating a gas-leak explosion at one major computer lab that may have been a result of hacking into the gas line's computer controls, someone hacking in from China. CIA is sending someone in to see if we can trace who in China.”

“Russian mobsters, computers that we all know can be spoofed. All of that does not yet sound like you could go to the UN and prove the Beijing government had attacked us,” Neyers observed.

“Doesn't mean it didn't either, Brenda,” Secretary Chesterfield shot back.

“They're being careful,” Rubenstein interjected.

“Careful of what, Sol?” Reynolds asked.

Rubenstein closed his briefing book, signaling that what he was about to say was his own personal analysis and not what his staff had given him. “Careful not to kill. Only about ten people or so have been killed in all of this thus far, and two of them were suicide bombers, which by the way is not a traditional Chinese practice, suicide bombing. They probably hired the Russian organized-crime gangs and the Iraqi suicide bombers to operate in this country, but I can't prove that to the UN or even to us yet. In any event, there has been little killing. Maybe they do just want to signal and not really piss us off. Careful also to cover their tracks to keep deniability.”

The National Security Advisor looked around the table to see if anyone had anything more to add. Then he said his piece: “The President wants to give a prime-time speech on Monday, six days from now, to try to explain what has been happening and what we're going to do about it,” Reynolds said, looking straight at Rubenstein. “I hope we have something for him to say by then about who is doing this and how we know.” The National Security Advisor then looked at the Secretary of Defense. “And Bill, you will have options for him.” The SecDef nodded. “Good,” Reynolds continued, “then we will meet Sunday to go over what we will all say to him at Monday morning's National Security Council session. Anything else?”

Brenda Neyers pushed back from the table. “Having nothing else go wrong this week would be good.”

The four leaders of America's national security apparatus looked quietly at one another and the remnants of their meal. Wallace Reynolds looked up from his half-eaten slice of pepperoni pizza. “Or they could just go on destroying our technological edge bit by bit while we try to prove who they are and try to stop them. If they keep going, all we would have left going for us would be our amber waves of grain. That would really piss me off. To say nothing of my boss, upstairs, who will not let that happen.”

2115 EST
The Metropolitan Club,
Washington, D.C.

“Sorry to be late. They kept you waiting in the lobby? You really ought to be a member yourself, you know,” Sol Rubenstein prodded his protégé, as the two men sat down in a secluded corner of the second-floor drawing room. “Founded one hundred fifty years ago next year.”

“Are you kidding? Initiation fees, monthly dues. I don't make that kind of money anymore, Sol, I'm in the government. You joined when the club was almost new,” Rusty MacIntryre protested. “Besides, its stuffy and aristocratic, and I'm working class and democratic.”

“Well, it is just a block from my downtown office in the White House complex, and the meals aren't too bad here now. New chef.” Rubenstein settled into a commodious armchair. “And at the White House, all is not well. They were worried about the reelection anyway after Senator George flooded the mall with a million plus people last October protesting stem-cell research, evolution, and genetic engineering. Now, with the internet attacks Sunday and then the terrorist bombing in Arlington…Senator George is going to be able to play the security card. Scare people into voting for him the way Bush did in 2004.”

“Maybe there will be a nice, big crisis to unite the country behind the President. I keep expecting clear signs that China intends to move against Taiwan after the Independence Party got elected,” Rusty said, passing their drink order on a little card to the waiter.

“That was four months ago. So far, no retaliation. Maybe they think their economy would suffer too much from a showdown with Taiwan and us,” Rubenstein suggested.

“You're the China expert, Sol, but I doubt it.”

“No, you're probably right. They like to get all the pieces in place first. And we are one of the pieces. If they are going to do something militarily, scare Taiwan or even invade it, they will want us out of the picture first.” Rubenstein stopped as the waiter returned with his Armagnac and Rusty's Balvenie. “And that's not likely to happen. The President wants options from the Pentagon and is planning a speech Monday night.”

Rusty sniffed and inhaled the single-malt. “Atritting our comms in the Pacific by sending the commercial satellites off to Uranus fits the pattern of China trying to get us to back off, as does preoccupying us with terrorism against our technological base here at home. Its a form of deniable escalation dominance. It says we know how to get at things that you really value and we can do more unless you stay out of our way.”

Sol Rubenstein, Director of National Intelligence, swirled the brandy. “Armagnac is two centuries older than Cognac. Did you know that? China is two thousand years older than us as a national security bureaucracy. Did I ever tell you about my investigation into their industrial espionage here?”

“There is still a lot you haven't told me.” Rusty smiled and readied himself to hear another story that he knew could not be found in writing anywhere. It was priceless having Sol as a mentor.

“About seven years ago, I headed up an Intelligence Community team: NSA, FBI, DOD, Homeland—to quietly look into allegations from industry that China was engaged in massive economic espionage, stealing formulas, proprietary information, from U.S. companies. Of course, they were. But how they were doing it was what was most disturbing.” Rubenstein stopped and sighed as he recalled the case. “They had placed Chinese nationals in many of the companies. Smart guys who had graduate degrees from MIT, Stanford. They had also created U.S. companies that supplied parts for sensitive projects and learned all about the projects. Not so unusual. But then there were companies that they had penetrated where there were no Chinese nationals or front companies in the supply chain.”

“I never heard about this effort,” Rusty admitted. “So how had they gotten into the other companies' sanctum sanctorum?”

“Well, you weren't supposed to know about it. Sometimes—not often, but sometimes—we keep secrets. The Chinese had gotten into the other companies through the products that they were using in their computer networks. Things like computer firewalls, intrusion-detection systems, all sorts of gizmos I don't understand. But I understood this much: They all had parts made in China, sometimes the whole things were even assembled in China. And these gizmos had back doors, Trojan horses, put in their computer code and in the hardware. The U.S. manufacturers never even knew. In one case, they got into software being written in the U.S. by hacking into the U.S. company's research lab in Shanghai and then tunneling through the company's own network back into the U.S. headquarters.” Rubenstein gave MacIntyre a bemused look.

Rusty MacIntyre took another sip of the Balvenie and waited for the conclusion to his bedtime story.

“I figured out that it was their station chief here in Washington that was running most of the program, so I had him tailed, harassed by the FBI. The Chinese got the point and recalled him. FBI and DOD went around to the Defense contractors and cleaned things up as best they could. Checked on the supply-chain companies, the Chinese nationals with access to the plants, and the like.

“But we never uncovered the full extent of the back doors. There are probably a lot of back doors still out there in the big telcoms' switches and internet routers. They were also in the big electrical components and video-surveillance systems. The decision was made that we couldn't find them all, replace everything. Couldn't prevent them from reinstalling the Trojans. Big economic cost. Maybe some panic. So there may be a little of it still out there. There may be a lot.” Rubenstein's eyes were looking at the carved molding along the edge of the high ceiling.

“If I understood what you just said, Sol, Beijing could pull the plug on us anytime they want to?” Rusty asked, sitting up in his chair.

“Possibly.”

“Then why, if they are so deep into our networks, why don't they just let them keep running and then continue to steal our intellectual property and copy it? Why blow it up instead? I don't get it,” Rusty asked.

Rubenstein's eyes met Rusty's. “Maybe because some things are hard to copy and maybe they think we're getting too far out ahead of them again technologically. They can do knockoff jeans with a
J,
not knockoff genes with a
G.
Or because they are planning to finally solve their Taiwan problem and they want us down for the count while they do. Or because they are not a unitary actor any more than we are. Or because I am wrong. Never exclude that possibility, Mister Director of Analysis.”

Rusty laughed. “I never do, but it's such a low probability.” He polished off the Balvenie. “If I were the President, thinking about my options with China, I would want to have heard your bedtime story.”

Other books

Shock of War by Larry Bond
Wet Dreamz by Bobbi Romans
Forever Innocent by Deanna Roy
To Win Her Trust by Mackenzie Crowne
Blueprint for Love (Choc Lit) by Gyland, Henriette
Captivity by Ann Herendeen
Letters and Papers From Prison by Dietrich Bonhoeffer