Read The Director: A Novel Online

Authors: David Ignatius

The Director: A Novel

BOOK: The Director: A Novel
8.5Mb size Format: txt, pdf, ePub
ads

DAVID IGNATIUS

THE DIRECTOR

A NOVEL

W. W. NORTON & COMPANY

NEW YORK LONDON

It takes something more than intelligence to act intelligently.


FYODOR DOSTOYEVSKY
,
CRIME AND PUNISHMENT

THE DIRECTOR

Graham Weber first encountered James Morris at Caesar’s Palace Hotel in Las Vegas. Weber was watching the controlled chaos of the Palace casino just beyond the lobby. This was the gambling proletariat: The heavy hitters were deeper in the hotel at the Forum casino or in private rooms. Weber studied the people at the tables with the curiosity of a successful businessman who didn’t like to gamble except on a sure thing. A younger man approached Weber from behind, tapped him on the shoulder, showed him his government identification and offered to carry his bag.

Weber was just under six feet, wearing an azure-blue sports jacket over a pair of tan slacks. He had the blond hair, ruddy cheeks and good health of a man who in his youth might have been a high school football quarterback, or an assistant golf pro. His eyes were an aqua blue that seemed to sparkle from reflected light in the same way as water in the sunlight. Weber was in fact a businessman in the communications industry, closing in on his first $500 million, when he met Morris. He had come to town to give a speech on Internet privacy to a convention of computer hackers.

“I’d turn off your cell phones, sir,” said Morris. “Take the batteries out, too, if you want to be safe.” He had led Weber out of the crowded din of the casino, back toward the fountain by the reception desk, whose perpetual cascade covered their conversation.

Morris was tall and thin, with close-cut brown hair and a pair of glasses that floated on his long nose in a way that resembled the cartoon character Michael Doonesbury. He was wearing a black T-shirt that read
AREA 51 WAITING AREA
, under a gray linen jacket. He worked for the Central Intelligence Agency, as director of its Information Operations Center. He had been assigned by his bosses to escort Weber, who served as a member of the President’s Intelligence Advisory Board.

“Why turn off the phones?” asked Weber. “I need to communicate with my office while I’m here.”

“Because they’ll get pounded,” said Morris. “This is a convention of hackers. These people come here to steal stuff. Take a look.”

Morris gestured to the crowd swirling through the lobby, and it was true, they didn’t look like the normal Vegas visitors. Many were wearing cargo shorts and T-shirts; some had Mohawk haircuts; others had gelled their hair to the stiffness of porcupine quills. They were cut and pierced and tattooed across every inch of flesh.

“I have a BlackBerry and an iPhone,” Weber protested, “straight to AT&T and Verizon. The messages are encrypted. The phones are password-protected.”

“They’re wide open, Mr. Weber. People have set up bogus Wi-Fi and cellular access points all over Las Vegas this week. Your phone may think it’s connecting with Verizon, but it could be a spoof. And on the passwords and encryption, I’m sorry, but forget it.”

Weber looked at his earnest, bespectacled guide and nodded assent. He opened the back of his BlackBerry and withdrew the battery. He looked quizzically at the iPhone with its nonremovable power source. Morris reached into his pack and handed him a small black bag with a Velcro top.

“Put the iPhone in this,” Morris said. “It’s a signal-blocking pouch. It prevents your phone from talking to any friendly or unfriendly networks.”

“Handy,” said Weber appreciatively. He inserted his phone in the pouch.

“You want to know how vulnerable you are, Mr. Weber? I’ll show you later at the Rio. What you see there will frighten you, I promise.”

“That’s why I came,” said Weber.

An hour later, after Weber had unpacked his bag and made some business calls on the hotel phone back home to Seattle, the two men were in a taxi taking the short ride from Caesar’s across I-15 to the Rio, which was hosting the main events of the convention. Morris led the way. He’d changed into a black hoodie. On the way in, he got nods from occasional passersby. Weber wondered whether these were other intelligence officers trolling for talent, or agents inside the hacker world, or perhaps just kindred spirits.

They stopped to register at a VIP booth just outside the main convention area. Weber felt uncomfortable, watching the Mohawks and bullet heads walk past. Their T-shirts advertised their passion for undoing the ordered world:
HACKITO ERGO SUM
, read one.
HACK THE CLOUD
, boasted another.
CARNAL KNOWLEDGE OF DEATH
, warned a third.

A convention organizer handed Weber his entry badge. It was an odd-shaped device, with plastic representations of Egyptian gods and mummies below an electronic pod with a circuit board packed with chips and transmitters. There was space for three AAA electric batteries on the back. Weber began to insert the batteries he had been given as part of his registration kit.

“Don’t turn it on,” said Morris. “It’s a mini-computer that will connect to the mesh network. It can track wherever you go here. It may have a camera and microphone. Leave it off. You’re a speaker. You don’t need the badge turned on. I’ll get you through if there’s any hassle.”

Weber put the odd-shaped device, unwired, around his neck and passed through the entry portal, to respectful nods from the gatekeepers toward his guide.

“I take it you’ve been here before,” Weber said, joining the stream of the crowd entering the convention space.

“I’ve been coming to DEF CON for ten years,” said Morris, leaning toward Weber and speaking quietly. “It’s my favorite honeypot.”

“You recruit here?” asked Weber.

“I’ve hired some of my best people off the floor.” He pointed to an overweight, pimple-faced young man in baggy cargo shorts and sandals, and a Goth girl shrouded in black who was sucking on a lollypop. “These people may not look like much, but when they write code, it’s poetry.”

Weber nodded to Morris as if to say
, I get it.
This was why he had accepted the invitation to speak at the hacker convention. As a member of the Intelligence Advisory Board, he wanted to see the future of intelligence. He had asked the board’s director if the intelligence community could suggest a smart young tech specialist who knew the scene. They had assigned him James Morris, who had already earned a reputation at the CIA’s Information Operations Center for his technical prowess.

“Come on, sir, I want to show you something scary,” said Morris, leading the older man down a long, black-walled corridor to a crowded area at the center of the convention space. They moved through a knot of people who had dressed as if for a Halloween party; eventually they came upon a jumbo screen framed by cardboard cartoon cutouts of sheep standing in trench coats and sunglasses. On the screen was a scroll of names and numbers.

“What the hell is this?” asked Weber.

“It’s called the Wall of Sheep.” Morris pointed to the information scrolling above them in a continuous thread. “Those are the log-in names and passwords of people whose communications are being intercepted, right now, in real time.”

Weber shook his head. His hand went to the cell phones in his pocket.

“It’s that easy?” he asked.

“This is slow. You should see what I can do with my machines at the agency.”

Morris guided Weber through some of the other exhibits. They wandered into an area called Lockpick Village, which was devoted to cracking physical locks on doors, windows, safes and anything else that could be “locked.” They strolled past booths where vendors offered specialized computer gear, cheap circuit boards, T-shirts, beer. In another room, teams were arrayed at different tables playing a specialized version of Capture the Flag, in which they competed to break into each other’s servers and protect their own from attack.

Morris handed Weber a program listing the lectures going on in various rooms. It was a school for mischief: Hacking Bluetooth connections on phones. Hacking RFID tags on cargo containers. Building your own drone. Controlling automobiles remotely through their electronic systems. Hacking routers. Installing backdoors in hardware and software. Breaking the “secure” architecture of cloud computing. Manipulating unrandom “random-number” generators and unreliable computer clocks. Breaking wireless encryption keys. The list of lecture sessions went on for pages.

“This is dangerous stuff,” said Weber. “Can anyone attend this convention?”

“Look around. You’ll see Chinese, Russians, Germans, Israelis. Basically, they let you in if you pay the cash registration fee. There’s no point in trying to keep people out physically. They’d just get the information on the Net. This way, at least we know who’s here.”

“And they’re all trying to get inside our pants?”

“Yes, sir. And vice versa, in theory.”

Weber nodded. It was indeed the ultimate honey trap. “Is the agency keeping up with this?” he asked.

“Sort of,” said Morris. “The agency moves like an elephant.”

“What about Jankowski? He’s the director. He should be all over this crowd.”

Morris pulled Weber aside and spoke in his ear.

“Director Jankowski is just trying to keep his head above water. The FBI is looking at his bank accounts.”

Weber pulled back in surprise. “How do you know about that?”

“I just know,” said Morris. “People say Jankowski won’t last.”

It was true, what Morris had said. The Intelligence Advisory Board had been briefed on the preliminary investigation several weeks before. It was one of the most closely held secrets in the government, and here was Morris whispering it in his ear.

“The agency needs a new director, sir,” Morris said quietly. “Everyone knows that.”

Weber was silent for a moment. He felt like he was getting pitched, which made him uneasy, but he liked the younger man’s intelligence and intensity.

“The CIA needs a lot more than a new boss,” said Weber. “It needs to enter the twenty-first century. Listen to my speech this afternoon, if you want to know what I think.”

Morris nodded. “I reserved a front-row seat.”

They wandered for another half hour, looking at exhibits, and then it was time for Weber to go to the Green Room and get ready for his talk. Morris left him at the door and proposed that they meet up afterward and see more of DEF CON.

Weber delivered his speech in a theater that sat several hundred. It was packed with young people, row after row of black T-shirts and hoodies. He took off his Italian sports jacket before he began speaking and rolled up his shirtsleeves. His corporate communications staff had written a speech titled “Stakeholders in Internet Freedom,” with an accompanying PowerPoint presentation, but Weber junked it. Instead, he gave what he liked to call his “American dream” speech about how security and liberty could coexist. He had delivered versions of it before, for different audiences, but never one quite like this.

The room quieted. Weber hadn’t been sure what to expect. He had visions of a mosh pit at a Megadeth concert. But they were hushed and respectful.

Weber used his own company as a case study. When he began twenty-five years ago, he reminded the kids in the audience, the Internet browser didn’t exist and most of what people describe as IT hadn’t been invented yet. But it was obvious that people were going to communicate more, and that the government would make a mistake only if it tried to limit or control communications . . . or spy on what people were saying to each other. But thank goodness, the government had been smart back then. It had let technology morph and multiply in a million ways that nobody could have predicted. Weber had expanded his business by doing the obvious, no-brain thing, which was to build some of the pipe through which the communications would travel, whatever they might be—buy spectrum and bandwidth, and let other people decide how to fill it.

And then the government got stupid, after September 11, 2001, Weber said. Intelligence officials got nervous and decided that the open information space was dangerous and needed to be controlled. It wasn’t the government’s fault; the whole country was frightened. But in its ferocious self-protection, it had built a surveillance colossus that struggled just to keep track of the dangerous people. The surveillance was too big and bureaucratic. And it began to eat up the free space that the new technology had created.

BOOK: The Director: A Novel
8.5Mb size Format: txt, pdf, ePub
ads

Other books

John Racham by Dark Planet
Demon Forged by Meljean Brook
Tough Guys Don't Dance by Norman Mailer
Shadows of Doubt by Corcoran, Mell
Beautiful Strangers by Glenna Maynard
Julia Justiss by Wicked Wager
Edge (Gentry Boys #7) by Cora Brent