No Strings Attached: A Lexi Carmichael Mystery, Book Eight (5 page)

Chapter Ten

Slash moved to the side and insisted I enter first. I strode into the room, looking around curiously.

Six men sat around a large, polished mahogany table. A large smart board was lit up, but nothing was displayed. No women in the room other than myself. Not that I was surprised.

All of the men had laptops open in front of them. One man was typing while two others huddled at the same laptop looking at something on the screen. Everyone glanced up at me. An older man with a shock of gray hair rose from the head of the table and came to greet us. He looked to be in his mid-fifties and wore his white shirt rolled up his forearms. A sports jacket was draped on the back of his chair. When he shook my hand, his grip was firm and swift.

“Hello. I’m Grant Durham, Director of IAD. I’m glad to have the opportunity to finally meet you, Ms. Carmichael. I’ve heard quite a bit about you.”

“Well, you can’t believe
everything
you hear,” I joked. To my relief, he smiled.

Grant shook Slash’s hand, too. While neither man said anything, Grant patted Slash on the back in a gesture of familiarity. “Have a seat both of you, please, and let’s get started.” He motioned toward two empty seats adjacent to him.

Slash pulled out my chair and I sat while Grant returned to his seat at the head of the table.

Grant closed his laptop and slid it aside. “Welcome to our war room, Ms. Carmichael. Everyone here is aware of who you are and what happened to you yesterday. Let’s do quick introductions around the table so you will know us. Gentlemen, please introduce yourself to the young lady.”

The man next to him nodded at me. “Good morning. I’m Trevor McMasters, Deputy Director of Operations, IAD. Nice to finally meet you. Your reputation precedes you.”

He didn’t smile when he said it, so I had no idea if that were good or bad. A young Asian man seated next to me went next. “I’m Charlie Hsu, Head of ISS.”

ISS stood for Information Systems Security. It would be Charlie’s job to oversee the installation and implementation of security software to prevent cyberattacks, as well as respond to successful attacks with appropriate countermeasures.

“Hey, Charlie,” I said, and he nodded.

A middle-aged man with black hair sitting next to me held out a hand. “I’m Sam Nelson, Vulnerability Analyst.”

“Hey, Sam. I’ll be interested to hear your analysis of the hack.”

He grinned. “Happy to provide it.”

The introductions continued around the table. Marek Krupka from the Office of Security Investigations was next. A handsome African-American man named Shawn Moore, the Lead Facility Security Officer, or FSO, rounded out our group.

Slash didn’t introduce himself.

When the introductions were finished, Grant leaned forward on the table, folding his hands on top of his laptop. “So, Ms. Carmichael, can you walk us through exactly what happened?”

I figured they’d already heard the short version from Slash, so I reviewed the entire chain of events, providing as much level of detail as I could. Several of the men jotted notes as I spoke.

“So, you had no prior knowledge that this exchange was going to happen?” Sam, the vulnerabilities guy, asked me.

“Nope. I was just in the wrong place, right time.”

“You never saw either of these individuals before?” Shawn asked.

“Never. They might have been conference-goers or they could have used the busy spot as cover to pass off the hack. But we’d never met and I don’t recall either one being in my seminar either.”

“We’ve already pulled the attendance records for HACK CON,” Grant said. “We’re running them now.”

Marek, the guy from the OSI, tapped his pencil on the table, studied me intently. “So, how did you know it was a hack?”

“I didn’t at first. I examined the code and even followed it a little way on my laptop. It didn’t take me long to figure out where it was headed. Taken in context, I had a dangerous virtual trail toward the NSA and a lot of money in cash. It all pointed in one direction.”

“So you just decided to stop it?” Sam asked. He looked surprised.

“Well, I tried. Obviously, she didn’t buy it. She knew I’d gotten a look at the code, so she tried to kill me.”

Slash tensed beside me and I resisted the urge to reassure him with a pat on the arm.

“Why didn’t you keep the code?” Grant asked.

“By the time I’d realized what it was, it was too late. She was already there and had snatched it from me.”

Shawn tapped something on his keyboard and a picture appeared on the overhead screen. “We’ve retrieved security footage from the hotel. There is no hotel surveillance footage in the bar, but the hotel does have security cameras on several of the hotel entrances. Our team has reviewed the past twelve hours of footage so far. At this point, we’ve only found the time of arrival and departure of the young man who gave you the money.”

A grainy picture appeared on the screen. Shawn tapped a few more keys and the footage magnified. Sure enough it was the guy with the T-shirt who had handed off the money and code. The oversize sunglasses and cap obscured his face, but the T-shirt was unmistakable.

“That’s him,” I said.

“Are you sure?” Grant asked.

“I’m sure. He seemed young, nervous, inexperienced. I think he really was just a courier. And a bad one, at that.”

“It’s not enough for the facial recognition software,” Slash mused.

I glanced down the table at Shawn. “Did you get any footage of the woman?”

He adjusted something on his screen. “We’re not sure. We need you to look at the possibilities. Can you go through the footage with us?”

“Sure.”

We spent the next fifty minutes reviewing the video from the hotel entrance stopping on females who generally fit her profile. None were a match.

I leaned back in my chair. “She’s not there.”

Trevor rolled a pen back and forth between his palms. “So, how did she get in and out of the hotel?”

Shawn shook a head. “Either she wore a disguise or she must have known about the cameras. My guess is that since she was able to follow Ms. Carmichael so quickly after they met, she deliberately chose an entrance without a camera. Which meant she was paying attention to security. That smacks of a professional.”

“A hacker who does wet work?” Charlie asked. “Really?”

Trevor’s gaze swiveled to Slash before Grant cleared his throat. “We can’t assume her dual abilities are coincidental. It’s unusual, but a thread to pull.”

Shawn glanced at me. “Did you get a look at her when you were in your car, Ms. Carmichael?”

“I did, which is why I can say with one hundred percent certainty that the woman in the car who was trying to kill me is the same one I met in the bar.”

“Then we have to assume she’s a pro and trained in methods other than hacking,” Grant said. “She did her homework in advance and didn’t leave anything to chance.”

“Did you lift her fingerprints from the car?” Charlie asked.

“We got nothing,” Shawn answered.

“She was wearing gloves,” I said. “I saw them when she pulled up alongside of me and shot at me.”

Marek made notes on his paper and then rubbed his forehead, his pen still between his fingers. “Ms. Carmichael, would you be willing to work with an FBI forensic artist to try to recreate this woman’s face?”

“Of course.”

The room fell silent and all eyes went to Grant. He exhaled a deep breath, running a hand through his hair. “Okay, no point in delaying it any further. I’ve got more bad news. We’ve been doing some hard digging these past twelve hours. I wanted to be sure that the IAD hack was an isolated incident. I’m sorry to report it wasn’t. We found another intrusion of similar style.”

Slash tensed. “Where?”

I winced inwardly on his behalf. I hated that all of this,
any
of this, was happening on his watch.

“SIGINT.”

SIGINT is the NSA’s Signals Intelligence, which involves collecting foreign intelligence from countries’ communications and information systems. There was absolutely no freaking way the system could have been penetrated, along with IAD, without high-ranking insider help. This mole was way more serious than I had envisioned, and I had envisioned something pretty serious.

I inhaled sharply. “So, I only intercepted one hack.”

“Yes.” Grant pushed his pad of paper away. At the moment he looked a lot older than the fifty-plus years I’d pegged him for. “There may be even more. We can’t remain complacent thinking we’ve found them all. We’ve mobilized a few additional teams and are searching for more.”

Charlie tapped some keys on the laptop. I couldn’t tell what he was doing. “The good news is that the hacks are similar in style. Our insider either wasn’t comfortable with mixing it up or it was too dangerous and time-consuming to make them all different.”

“He, or she, only needed one of the hackers to get through,” Slash murmured. “If one hacker failed, there would be another trail to the door.”

We all digested that along with the sickening thought that there could be a lot more hacks occurring undetected at this very moment.

Grant inclined his head. “So, does anyone care to speculate on any theories as to who ordered the hack and who responded, in terms of the insider?”

“The woman in the bar who met and subsequently chased Ms. Carmichael was Asian with a slight accent.” Trevor crossed his arms, rested them on the table. “I think we have to put the Chinese on the table.”

Whether it was intentional or not, several people glanced at Charlie.

He whistled and held up his hands in a time-out motion. “Whoa. Let’s not start racial profiling here. My grandparents were from Taiwan. None of us harbor any love for the communists. I’ve passed every single security clearance with flying colors. If you don’t believe that, you can put me first for another round of lie detector tests. I’ve got nothing to hide.”

It seemed totally unfair that Charlie was being singled out because of his heritage. Apparently Slash didn’t like the direction this conversation was taking either.

“We have no proof the woman in the bar and chasing Lexi was Chinese,” he said. “If we do put the Chinese on the table, it has to be because of our capture of Jiang Quon and...” He let his sentence trail off without finishing.

“And what?” Marek asked.

Slash exchanged a glance with Grant and Trevor, but no one answered Marek’s question.

I narrowed my eyes. “Look, if you want our help, you’re going to have to fill us in. Otherwise, we’re hamstrung.”

Trevor looked up and he, Grant and Slash seemed to come to an unspoken agreement.

“IAD has been working on a counteroffensive against the Chinese, led by Slash.” Grant dipped his head in Slash’s direction. “We’ve been assisted by Jiang Quon, who has been, ah, cooperating with us.”

“Quon’s alive?” I asked in surprise. I’d had a personal run-in with Quon just a few weeks earlier when he’d tried to kidnap me in an attempt to lure Slash to him. Some torture involving me had occurred, but that was another story. In the end, we’d nabbed him. The last time I’d seen Quon, Slash had been dragging him off a plane for a “professional discussion,” which I didn’t think involved tea and crumpets.

“Yes. He’s in CIA custody and providing us with valuable intelligence,” Grant replied.

I didn’t know how or
why
Quon was cooperating and figured they wouldn’t tell me if I asked. Not that I really wanted to know.

“Okay, then I’ll ask the painful question.” Grant took a moment to assess each of us. Perhaps he thought he could elicit a guilty confession or determine guilt by evasion using the sheer power of his eye contact. As he went around the table, the room remained silent. After a moment he asked, “Any theories as to who among us is helping the hackers?”

The silence was deafening. Several of the men shifted uneasily in their chairs, but no one offered a theory. Slash sat motionless. His jaw was tight, his eyes angry. Someone had penetrated his domain and he didn’t like it one bit. Not that I liked it much either.

As the silence stretched on, I tried to take the tension down a notch. “It might be easier to determine who the insider is and why, if we figure out the reason IAD and SIGINT personnel databases were two of the targets.”

“Maybe the hacker was looking for someone in the department to blackmail,” Sam offered.

“Like they need
more
names after the Office of Personnel Management hack,” Charlie grumbled.

Millions of Americans who applied for a security clearance or had been interviewed in the process of a security investigation had their security information stolen in a massive hack that had been traced back to the Chinese.

“They could be fishing,” I offered. “Even if they can’t trace your counteroffensive back to this department, they’ve got to know it’s being run by IAD. It’s just a simple leap of logic. But what they intend to do with the personnel data is potentially alarming.”

“This isn’t making any sense.” Trevor referred to his notes and then shook his head in defeat. “If they know who or what they want, why the complicated hacks? I’m just playing devil’s advocate here. If you’ve got someone on the inside at this level, why not memorize simple data like that and pass it on without lifting a finger. These are hacks with a purpose.”

“A landing point?” Sam suggested. “A jumping spot to something else?”

“No.” Slash’s voice was hard and clipped. “We haven’t been able to find any evidence the hack served as a jumping point. The personnel databases were the intended targets. We need to figure out why.”

“I believe that the most pressing matter at the moment is
who
we are looking for within our own ranks.” Grant’s gray eyebrows met together in a frown. Someone in the company had betrayed him and everyone else working here, and it was sure to be someone he’d trusted. I knew firsthand how much that kind of betrayal could hurt.

“The first-pass analysis of the code indicates it could only have been written from someone among our ranks here in IAD,” he continued. “That means we have a mole among us. Therefore, unless I personally authorize it, there will be no vacations or absences for you, or anyone in your departments, without clearance from me first. We start drilling now.”

Other books

Octopus by Roland C. Anderson
Bounty Guns by Short, Luke;
Leave It to Chance by Sherri Sand
Cold Sight by Parrish, Leslie


readsbookonline.com Copyright 2016 - 2024