Byte Saddam by Baley Montag - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

 

Part Two

 

September 17, 10:30 A.M. PST

The Warehouse in Carlsbad, California

Germ and Rabbit have been working for a few hours getting the rest of the attack servers set up. Razer, Blaster, Spinx, Lulu, and Lucy had started to settle in and get ready for a day of research. Tonya was looking over a series of maps that showed seaports, highways, and pipelines. Brandon was getting ready for the conference call.

The phone rings and Blaster answers, “Yes, we are ready.”

The group assembles for the conference call as Blaster puts Brenda and Sharon on the speakerphone. Everyone says good morning.

“Let’s start by getting a run down on some of the things Brenda and Sharon have found,” Razer says.

“I want to cover some basic facts first,” Sharon says. “Iraq's economy is dominated by oil, which has provided about 95% of foreign exchange earnings. Foreign-owned companies controlled the industry in the early 1970s, but the government nationalized all of their holdings in the middle 1970s. The Iraq National Oil Company and the Northern Petroleum Organization now control oil production. Refineries are situated in Baghdad, Basra, al-Hadithah, Khanaqin, Kirkuk, and Qayyarah, and by the late 1980s they were producing about of 740 million barrels of petroleum and 131 billion cubic feet of natural gas per year.”

“In the 1980s, economic problems mounted because of massive expenditures in the eight-year war with Iran,” Sharon continues. “During the war Iran damaged oil export facilities. As a result Iraq borrowed heavily and rescheduled debt payments. Iraq’s economic losses from the war are estimated to be over $100 billion. After the eight-year war oil exports increased with the construction of new pipelines and restoration of damaged facilities. The seizure of Kuwait in August 1990, and subsequent damage from military conflict with the international coalition drastically hurt economic activities. Implementation of the UN's oil-for-food program in December 1996 has helped to improve living conditions for average Iraqi citizens.”

“Under the program Iraq was allowed to export limited amounts of oil in exchange for food, medicine, and some infrastructure spare parts,” Sharon continues. “In December 1999, the UN Security Council authorized Iraq to export as much oil as required to meet humanitarian needs. Oil exports are now at 75% of the prewar level. Food imports have increased significantly, while medical supplies and health care services are steadily improving.”

“The UN authorized Iraqi export of oil to Jordan as an exception to the general embargo on exports,” Sharon continues. “Iraq uses these revenues to buy Jordanian goods and services and to settle outstanding debts with Jordan. In August 1998, Iraq and Jordan signed an agreement to construct a pipeline to pump Iraqi crude to the Jordanian refinery at Zarqa instead of transporting the oil via truck. Jordan pays Iraq a maximum of $13.50 per barrel.

In addition to oil exports to Jordan, there have been reports that Iraq has smuggled large amounts of crude oil and products via a number of routes,” Sharon continues. “These include Turkey via truck, to India and Pakistan along the Gulf coast from Jebel Ali, to Iran across the Fao Peninsula with barges, and to Dubai with the use of small tankers sailing from Umm Qasr. Press reports have estimated that illegal shipments may have yielded Iraq $700 million a year in revenues.”

“This has all resulted in a per capita purchasing power parity of about $2,500 for the average Iraq household,” Sharon concludes.

“I have some basic economic, energy, and communications statistics,” Brenda begins. “Annual electricity production in the country is about 30 billion kWh of which 98% comes from fossil fuel. Iraq still owes about $150 billion in foreign debt. The major trading partners are China, Egypt, France, Russia, Switzerland, and Vietnam. There are about 675,000 telephone lines, limited mobile cellular service, and reconstitution of damaged telecommunication facilities that began after the Gulf war is almost completed. There are two Intelsat earth stations (one Atlantic cean and one Indian Ocean), one Intersputnik (Atlantic Ocean region), and one Arabsat. There are coaxial cable and microwave radio relays to Jordan, Syria, and Turkey. We can only identify one legitimate Internet service provider. There are very few people in Iraq that have Internet access. However, two major universities do have rather good access.”

“We believe there are about 15 operational AM stations and about a dozen television stations,” Brenda continues. “There are about five million radios and 2 million televisions in the country. The port facilities at Umm Qasr, Khawr az Zubayr, and Al Basrah have limited capabilities.”

“There are a few more specifics about electricity,” Brenda continues. “About 90% of Iraq's power grid was destroyed during the Gulf War. The 9,000 megawatts capacity of December 1990 was reduced to about 340 megawatts by March 1991. About 85% of Iraq's twenty power stations were damaged or destroyed in the Gulf War. In early 1991, transmission and distribution infrastructure also was destroyed, including the ten substations serving Baghdad and about 30% of the country's 400-kilovolt-transmission network. In early 1992, Iraq claimed that it had restarted 75% of the national grid. Iraq's Electricity Commission said in September 1999 that six gas-fired power plants with a total capacity of 220 MW were being imported from China.”

“That just about sums up a basic overview,” Sharon says. “Blaster has done some work on trading partners and arms buying which would fit in well at this point.”

“Thanks Sharon,” Blaster begins. “The relationship with Jordan is a key element in Iraq’s ability to buy arms. Jordan does not police its borders or track what goes in and out of its free-trade zones. Jordanian businessmen and government officials who live off the discounted oil are making small fortunes. In addition to the $300 million in unregulated oil, Iraq directs all of the UN oil-for-food contracts through Jordan. The money gives Iraq incredible leverage with Jordan.”

“Syria is in a similar situation,” Blaster continues. “Last year about $1 billion of oil flowed through a repaired Iraq/Syria pipeline, all of it outside UN control. In direct opposition to the UN, at least 25 countries are doing active business with Iraq there are several countries and companies, mostly in Eastern Europe that are now supplying Iraq with missile technology and sophisticated weaponry.”

“Much of the contraband entering Iraq flows through the free-trade zone in Aqaba and there are several trading companies that serve as brokers,” Blaster continues. “Many intelligence sources have confirmed that Huawei Technologies, a communications and networking company in China, has helped Iraq outfit its air defenses with fiber optic equipment. There are many large U.S. technology companies that have licensing or joint development agreements with Huawei. This ultimately results in Iraq getting some of the latest communications technology. Huawei's sales rocketed to $1.5 billion in 1999, to $2.6 billion in 2000, and $5 billion in 2001. Growth began in the mid-1990s, when American technology companies started making deals and Iraq started spending money.”

“I can elaborate on Internet access,” Germ says. “I can trace about 9,000 access accounts which is about three times the number of any published figures I have seen. This, however, leaves us with virtually nothing to hit. We might find out what is going on in the universities by spidering the IP addresses. Short of that we have nothing in Iraq.”

“We may be able to dig into the university computers and find connections or information about the defense infrastructure that would be useful,” Rabbit adds.

“Any comments Lucy?” Brandon asks.

“We need to find out if Iraq is up to any cyber terrorism plots,” Lucy replies. “My guess is that most of the talent is in universities, so Rabbit has a good strategy.”

“Any comments Lulu?” Brandon asks.

“Based on my experience we need to find out if Iraq, or a related party is collecting software or systems knowledge which they may be able to use in the future,” Lulu adds.

“Spinx do you have any comments?” Brandon asks.

“We need to identify, analyze, and monitor port movements in Iraq as well as the flow through countries,” Spinx replies.

“Please wrap it up at a high level Tonya,” Brandon requests.

“Several points,” Tonya begins. “What Spinx, Rabbit, Lucy, and Lulu suggest are on the must do list. However, if we are going to disrupt we need to focus in two major areas. First, the supply chain and what we can do to slow down the influx of arms and technology. Second, how we can disrupt the flow of money and perhaps even cause tension or conflict between Iraq, the brokers, and the bankers.”

“Given Tonya’s conclusions what are your assignments?” Brandon asks.

“On our end we will collect whatever information we can about the suppliers, brokers, and bankers,” Brenda replies.

“I concur,” Sharon replies.

“I am on ports,” Spinx says.

“I am with Spinx for a few days,” Germ says.

“I am doing universities,” Rabbit says.

“I want to dig into where government officials are putting their money,” Razer replies.

“I will work on connections with terrorist groups,” Lucy says.

“I am working with Lucy,” Tonya says.

“I am going to look into piracy,” Lulu replies.

“What are out timelines?” Brandon asks.

“Lets work for 48 hours and confer at that point unless there is something essential to discuss,” Razer suggests.

“Any further comments?” Brandon asks.

There were none and the teleconference ends.

 

September 17, 6:30 P.M. EST

Brenda Packston’s Georgetown apartment

Brenda and Sharon are eating dinner and discussing the events of the day.

“It is only going to take about a week to collect all of the data we will need to start the campaign,” Sharon says. “What will we be doing after that?”

“I am not sure if there is anything on the table,” Brenda says. “That is unless we can create something.”

“The professor keeps referring to a person he has worked with that wrote Information Warfare: How to survive cyber attacks,” Sharon says. “I have been reading the book which outlines the PH2 attack scenario.”

“I have read it several times,” Brenda replies. “Perhaps we are thinking of the same thing at this point?”

“One of the cyber terrorists in that scenario kept using porn ploys to trap and embarrass government officials and business leaders,” Sharon says. “What if we thought of a similar thing to draw in some people from our target countries?”

“I like the idea,” Brenda says. “Lets think it through and run it by the team.”

“It would give us a chance to get further involved,” Sharon says. “Did you make copies of the FBI sex tapes of you and the professor?”

“Several copies of each,” Brenda replies. “And we have the Sex Life of High-tech Tonya which we could use or modify.”

“Do you still have the professor’s digital camera?” Sharon asks.

Brenda smiles, “Yes.”

 

September 19, 10:30 A.M. PST

The Warehouse in Carlsbad, California

The team is assembled for a teleconference with Brenda and Sharon. The phone rings. Blaster answers, “Yes, we are ready. You are going on the speaker phone.”

“Again let’s start by getting a report from Brenda and Sharon on the trading partners, brokers, and bankers,” Razer says.

“We have compiled a list of known companies, brokers, and banks that are in Iraq’s supply chain,” Sharon reports. “We are working on getting specific account numbers in the banks. We can fax all of that to you when we get done here.”

“I have the ports mapped out,” Spinx reports. “Unfortunately most of them are not very automated. However, they do have security systems that we can probably hack in order to add to the confusion and tension levels, if that is helpful.”

“I have looked into the security systems and they should be easy hits,” Germ adds.

“There are two major universities,” Rabbit reports. “They are easy hits, we can go in and collect as many documents as possible as well as user names, email addresses, passwords and perhaps some personnel and student files but I doubt much of the later is online.”

“I have found considerable information on the government officials, with the help of Lucy’s access to CIA computers,” Razer reports. “We have traced some travel patterns and some information on bank accounts.”

“The connections with terrorist groups are almost unlimited,” Lucy reports. “Including those that were involved in ExopaTerra.”

“We have concluded, at this point, that Saddam’s focus has not really shifted to cyberwar,” Tonya adds. “But he certainly is bent on killing people and his first choice of weapons is long-range mass destruction technology.”

“I looked over all of the material from ExopaTerra,” Lulu reports. “We know that the stolen software went to the PRC and we know that the PRC has a strong trading relationship with Iraq. We also know that Iraq is acquiring lots of computers but we have not traced back any specific software licensees. This could well mean that Iraq is relying on stolen software to run systems while keeping costs down.”

‘”Which is sort of where I come in,” Blaster reports. “I think we can set up a variety of scams to dupe Iraq into buying more stolen software. We can bug the software with Trojans and back doors.”

“We think there may be other web traps we might be able to help with,” Sharon says. “We are working on some ideas.”

Brandon laughs. “Okay lets have an attack plan in place Monday.”

“I would like to go ahead and hit the universities this weekend,” Rabbit says. “That may provide information to help with the attack plan.”

“Sounds fine to me,” Brandon replies. “You have all done well.”

The teleconference ends.

“Blaster, Tonya, could we talk for a few minutes?” Brandon asks.

“You are concerned about Brenda and Sharon working on the web traps for the Iraq hit right?” Tonya asks.

“Yes,” Brandon says.

“The two of you are seasoned at this,” Brandon contends. “They know nothing about it.”

“We can teach them,” Blaster adds. “But we may need to bring them here for a while during the thick of things.”

“They need to start somewhere,” Tonya continues. “They are better off getting their training from us than trying it on their own.”

“You are my very best advisors,” Brandon says. “Give me both the downside and the upside on this.”

“Easy,” Blaster says. “You are going to have two women here that you had long-standing romantic relationships with and I think that scares you.”

“There are some legal issues,” Tonya adds. “Since they are with the FBI it is probably not appropriate for them to be involved unless there is an order from above that they do it.”

“Upside?” Brandon asks.

“They are both bright and motivated,” Blaster says. “We need to expand the team permanently, and I would just as soon start with somebody we know.”

“They can also readily access a lot of information that we can use,” Tonya adds.

“What about the actual cyber sting process?” Brandon asks. “Do you think they have what it takes for that?”

“Yes,” Blaster says.

“I agree,” Tonya says. “I think you are being protective of them.”

“You are probably right,” Brandon confesses. “I also know we need to make sure we protect our cover on this.”

“You are right,” Tonya says. “And you should be concerned about that, it is part of your job.”

“You are becoming more humanistic with age professor,” Blaster teases. “But it will make you a better leader in the long run.”

“I have something to add to this conversation,” Razer says stepping into the circle. “Just because you were told that you are being protective is not an effort to put you on the spot about your relationship with Brenda and Sharon. You have been protective of each and every one of us at one time or another. You made sure we were trained. You helped us gain our skills and our knowledge.”

“You also helped us develop our nerve and courage in these matters,” Blaster says. “If you had not done that over the years we could not have handled ExopaTerra as well as we did. And if not for us the world would be in far worse shape today than it is.”

“What they say is true,” Tonya says.

“You have a lot of faith in us,” Razer continues. “You prove that everyday and on this project you are almost letting us handle it on our own.”

“She is right,” Blaster says. “We all have noticed. It is as if you are preparing us to be without you. Are you?”

“Yes,” Brandon says. “But not because I plan on leaving. If something happens to me I want you to be capable of carrying on the work and I want your reputations to stand on their own, not under my shadow.”

“You are becoming a humanist,” Tonya says. “I think I like it.”

“You think you like it?” Brandon asks.

“Jury is out big boy. Let’s see if there are any negative side effects,” Tonya replies.

“Let’s go get some lunch,” Spinx says from across the room. “And lighten up professor.”

Tonya, Blaster, and Razer laugh and tease Brandon as they walk to the house for lunch.

 

September 19, 1:00 P.M. PST

The house of Brandon’s team in Carlsbad, California

The happily reunited and mission-focused group convened at the table for lunch. It had been a busy week of research and reconnection for those who had been out of town. They had settled into the house but still used the loft in the warehouse for selected activities especially the testing of the new P34.

“I am going to start hitting the universities later today,” Rabbit says. “I think Lulu should help me on that.”

“I agree,” Blaster says. “I want her to work with all of us on various parts of this project so we can round out her skills. I also want Spinx to work with you on it as well.”

“Great!” Spinx replies. “I want to learn how to hack.”

“Lulu you can also help work on some of the banking research on Monday,” Razer adds.

“Thank you all,” Lulu says. “I am anxious to get started.”

“I am going to spend some more time looking into the security systems at the ports and warehouses we have identified,” Germ says. “Lucy would you like to work on that with me for a while?”

“Affirmative,” Lucy readily agreed.

As lunch came to an end Germ, Rabbit, Lucy, Lulu, and Spinx returned to the warehouse to work for a while. Blaster, Razer, Tonya, and Brandon cleaned up from lunch and then went to sit on the porch.

“I have a few things on my mind,” Brandon says. “I want to discuss some organizational issues.”

Blaster, Razer, and Tonya all nod and wait for him to start.

“I like what you are doing with training,” Brandon says. “Blaster should take the lead role in the process but I need all of you to make sure that Lucy, Lulu, Spinx, Brenda, and Sharon get as much exposure on this project as possible.”

“I also like the way the team process is working,” Brandon says. “Razer, I want you to run this one. Blaster and Tonya will certainly help. As projects unfold in the future I want Blaster and Razer to rotate lead roles.”

“Are you going to retire?” Blaster teases.

“No not at all,” Brandon says. “But it is time for us to do these things. But I do think I will need to go to D.C. more often if we are going to keep the funding coming in.”

“Oh, so you are going to become a bureaucrat?” Tonya teases. “And what do you want me to do?”

“Take my place,” Brandon says calmly.

“I can’t do that,” Tonya says. “Nobody can.”

“I am not asking you to replace me,” Brandon says. “I will always be around. But I think you can move into the role of master strategist. I also think that the entire team will benefit from you being in that role.”

“I agree with Brandon,” Razer says. “You will always have our support Tonya.”

“I also agree,” Blaster says. “Tonya there are things in your head that I want to know.”

“It may take me a while to adjust to this,” Tonya says. “But I do see your points.”

“I am also going to invite Erbschloe to join us,” Brandon continues. “He established much of the groundwork for contemporary information warfare in his book.”

“He is very good,” Tonya adds. “I have met him several times. I always thought he would end up in a leadership role in the information warfare establishment.”

“He is totally intolerant of bureaucrats and politicians,” Brandon explains. “He won’t go near anything that remotely looks or feels like an establishment. Plus, the Republicans can’t stand him because he doesn’t tolerate their bullshit.”

“Does that mean that he is going to come here?” Razer asks.

“I hope so,” Brandon replies. “He was living and working in Carlsbad when we first met. I think I can talk him into returning.”

“What would his role be?” Blaster asks.

“He is a great mentor,” Brandon continues. “He is also an extraordinary futurist. In 2002 he wrote a book that established ten principles of socially responsible information technology management. If organizations would follow these principles the world would be a better place.”

“Would he live with us?” Razer asks.

“No, he likes to live alone and we can get him an apartment down the street,” Brandon explains. “I also hope that he will spend sometime in D.C. with me because he does have excellent relationships with the NSF and NIST.”

“It sounds like you do have some expansion efforts in mind” Tonya says. “I need to tell you that I do not want to be in the public eye just in case somebody recognizes me.”

“I agree and you will not be,” Brandon replies. “You know we want you here and we will do whatever is necessary to protect you. One of the reasons why we need to get everybody trained is that we are not going to expand the team that handles cyber threats or projects like the Iraq situation. We are secure now and I want to keep it that way.”

“So it sounds like you may be interested in pursuing other interests,” Blaster says.

“You are right,” Brandon replies. “I am not sure what at this point but I certainly want to broaden my scope of activity. I also want to do some paintings for the house.”

“Anything else?” Razer asks.

“I am going to take a nap,” Brandon replies.

 

September 19, 4:30 P.M. PST

The Warehouse in Carlsbad, California

Germ, Rabbit, Lucy, Lulu, and Spinx had successfully penetrated the university systems and moved hundreds of documents to the attack server in France. They also collected all of the email addresses of the users and all of the email addresses from each user’s address book along with server configurations, passwords, and other network information.

“This went well,” Germ says. “We have everything we are going to get from these systems for now.”

“I have cataloged all of the users and the email addresses from their address books,” Lucy reported. “This will all be useful later.”

“I think we have the specs on most of the security systems at this point,” Rabbit reports.

“I have all of that data cataloged and cross referenced,” Spinx adds. “We can hit anytime.”

“We have also finished up the port list,” Lulu adds. “There are 23 locations that material moves through on the way to Iraq.”

“That gives us 23 opportunities to stop it or divert it,” Lucy says. “If we can’t do it remotely maybe we will have an operative do it physically.”

“We could also put bugs on the some of the big stuff,” Rabbit says. “Then we would be able to trace where it ends up.”

“Good idea,” Lucy says.

“Speaking of diversions,” Spinx says. “I think we deserve a break.”

The five of them retire to the loft for the rest of the night.

 

September 19, 5:00 P.M. PST

The house of Brandon’s team in Carlsbad, California

Blaster, Razer, and Tonya spent the afternoon chatting on the porch. Brandon had been sleeping for several hours.

“Anyone hungry?” Blaster asks.

“I could use a snack,” Tonya replies. “But I am not up for a big dinner.”

“I agree,” Razer adds. “I am going to put together a platter and we can just stay right here.”

“I am going to open another bottle of wine,” Blaster says.

“I will get clean glasses,” Tonya says. “I have a feeling that GRLL&S won’t be back tonight.”

“It also looks like the professor is down for the count,” Blaster says. “He has really looked tired this week.”

“He is tired,” Tonya says. “But I can tell that he is happy.”

“We all are,” Razer says as she emerges from the house with a tray of fruit and cheese.”

“It looks like it is the three of us then,” Blaster says as she pours the wine.

“Then lets toast,” Tonya says. “To happiness.”

“To happiness,” Razer and Blaster repeat.

“It is great to have you back Tonya,” Blaster says.

“Did Brandon know that you and I were in communication during the last few years?” Tonya asks.

“He probably suspected,” Blaster says. “But you know he does not interfere with us. Sometimes we call him “Mr. I Have No Questions” just to tease him.”

“He is good about it,” Razer says. “I have never known anyone that can be so uncurious.”

 

September 19, 9:00 P.M. EST

Brenda Packston’s Georgetown apartment

Brenda and Sharon were relaxing after their busy week.

“How do you feel about tomorrow,” Brenda asks.

“I am a little nervous about my mom coming to visit,” Sharon confesses. “Maybe more than a little nervous.”

“It will be fine,” Brenda assures her. “I was also nervous about telling my mother about us. But it worked out.”

“Your mother is wonderful,” Sharon replies. “She treats me great and always makes me feel good when she is around.”

“I told my mother about my relationship in college,” Brenda reveals. “She took it well but never really got to know my girlfriend. She is definitely putting out extra effort with you.”

“I wonder why?” Sharon asks.

“Because I told her that we want to get married,” Brenda confesses. “My mom thinks marriage is wonderful.”

“I need to not think about tomorrow any more tonight,” Sharon says. “It has been on my mind all week.”

“Then my dear,” Brenda says as she does her devilish smile. “I am going to give you something else to think about.”

 

September 19, 7:00 P.M. PST

The house of Brandon’s team in Carlsbad, California

Blaster, Razer, and Tonya had moved from the porch into the living room. They had lit candles all around the large rooms on the first level. The house was quiet. They were all cuddled up next to each other on the over-sized sofa, stroking each other’s hair.

“I love you both,” Tonya says softly as she kisses Blaster then Razer. “I think it is time we went to bed.”

The three women walked quietly through the house blowing out the candles then went upstairs to spend the night together.

 

September 20, 1:00 P.M. EST

Brenda Packston’s Georgetown apartment

Brenda and Sharon had just returned from picking up Sharon’s mother at the airport. They had prepared lunch and were waiting for Brenda’s mother to come and join them.

As they sat on the sofa Sharon’s mother asks, “Are you lovers?”

Brenda sat silently waiting for Sharon to respond.

“Yes we are lovers,” Sharon replies not knowing what to expect. “We are also in love.”

“I thought so,” Sharon’s mother says. “You have been so happy for the last several months and that has made me less concerned about you.”

“I did not want to tell you about this over the phone mom,” Sharon says. “I wanted to be with you when I told you.”

“You worry too much my daughter,” Sharon’s mother says, “You always have. But I always knew that you would end up in love with a woman. The important part is to be in love with somebody who is in love with you.”

“I am in love with Sharon,” Brenda says feeling that she had been given permission to speak.

“That is exactly what I wanted to h