Выбрать главу

A distant sound caught his ear. It was a steady whop-whop-whop. The sound of air being whipped into submission.

Every helicopter had a distinct sound, determined by size, weight, and blade configuration. He didn’t know the sound of many, but he knew the sound of the Rescue Hawk.

Between compressions, Scott looked up to what he imagined could have been a scene from Apocalypse Now. Two Rescue Hawks were bearing down on his position. The HH-60H Rescue Hawk was developed from the SH-60B Sea Hawk. Its primary mission was combat search and rescue. It carried AGM-114 Hellfire missiles and its heavy-caliber machine guns were sure to be manned by left- and right-facing door gunners.

A pair of AV-8B jets circled in from a wide arc, each moving in the opposite direction, and the roar of their engines soon became the only thing he could hear.

Fast boats were on the water too. These he didn’t recognize until they were closer. They were Marine Corp camouflaged, not SEAL gray, and he’d seen them only a few times before. They were CCM Mk1’s, Combatant Craft Mark 1’s. He’d been told they were like floating Bradley Fighting Vehicles that could race in at 40 knots. Each had four mounted and manned heavy-caliber machine guns topside in addition to many below-decks gun windows.

One of the Rescue Hawks hovered almost directly overhead. Two two-man rescue teams began repelling down. “Marine Rescue,” one of the team members shouted as he touched down on the deck.

“Scott Evers of the Sea Shepherd,” Scott said. “Three wounded. Sucking chest wound here, stopped breathing. Needs a re-breather. Two forward in urgent need of assistance.”

One of the rescuers took over the compressions. Scott moved back, took a few steady breathes. He tried to stand, but found it nearly impossible. Someone at his elbow steadied him as the world went black.

Chapter 6

Bluffdale, Utah
Afternoon, Previous Day

Outside it was a scorching 82 degrees and that was oddly hot for the mountains of Utah, even if it was the height of summer. Dave Gilbert powered down the window of his black BMW X5 as he pulled up to the security checkpoint outside Camp Williams. The Harman Kardon sound system was playing Slow Cruel Hands of Time, a beautiful acoustic performance by Band of Horses, one of his favorite groups.

After showing his ID to the guard at the gate and getting waved through, he cut across the camp’s six square miles of flatland and made for the more mountainous area at the back. He was headed for the National Cybersecurity Initiative Data Center, aka the DC.

Entry into the DC perimeter was secured as well. He stopped at the second checkpoint and flashed his NSA contractor badge.

“Afternoon, Mitch,” he said as the guard on duty waved him through the checkpoint.

Although Camp Williams was an army garrison, most of those on duty here were from the Utah National Guard. Dave liked that since he’d served in the Guard years ago. Plus, the guardsmen were more relaxed than the soldiers he occasionally encountered.

The area around the DC had been used as an airfield previously, but there was little left from those days. Now the area was largely occupied by the massive data halls, multistoried buildings that housed the high-speed computers and enterprise data storage equipment used for mass global surveillance. There were also various administration and support buildings.

His destination was the administration building where he did most of his work as a senior data mining and analysis specialist. He preferred the admin building to the data halls. Mostly because the admin building was usually a comfortable 72 degrees, rather than the cooler 68 degrees of the data halls.

Before he could get into the administration building, he had to pass through a third security checkpoint, which largely amounted to him touching his NSA contractor badge to a card reader while a guard made sure the reader light turned green and not red.

His workspace was on the third floor, all the way on the far side of the building. He made a sharp right to the stairs, walked up to the third floor, and then hurried along the main corridor to the 3C suites where he worked.

When Dave logged into the main system, he was an hour and 45 minutes early for his shift, but he had promised to prep the query engine updates for the swing shift analytics team and so he immediately started work on setting up the precursors. Following the mandatory revisions checklist, he validated the backups of the existing query structures, notified users the systems would be going down at the previously announced outage time, and then accessed the new code in the version control subsystem.

Before taking the system offline, he entered a simple query using the native query language: BASE X: MEDSEA -24H SS:* & 2>1 TEST.LOG. Aside from the final part that displayed the result totals to his screen and also stuffed the full results in a log file for later comparison, the query was a standard one. After serving in the National Guard, he’d been a crypto-analyst at NSA headquarters in Ft. Meade. His last assignment had been the Mediterranean desk and the query was one he’d used often to check live activity levels.

As soon as he pressed Enter, the query ran and the * ensured it was applied to all NSA surveillance systems. Soon encapsulated summaries for the past 24 hours from the Mediterranean region were being logged. The rapidly updating report totals told him most of the summaries were coming from PRISM, the super secret surveillance program that allowed the NSA to monitor all Internet communications.

Although this was all work he usually enjoyed, his thoughts wandered. The other reason he’d come in early was to review the results from his latest D-Wave tests. The latest version of the D-Wave was decidedly different from its predecessors, though still a 10-foot high black box containing a cylindrical cooling system wrapped around a niobium computer chip chilled to about as close to absolute zero as mankind could get. There were only three of the latest generation of the multimillion-dollar chips in existence, and one of those was sitting in its massive black box inside his testing room on loan from In-Q-Tel, the high-tech investment arm of the CIA.

Quantum computing was still so radical and strange that even some of the most advanced engineers in the world were still trying to figure out what it was for and how to use it. As one of the few people with access to the exotic technology, he was working to create optimized algorithms that allowed anyone to tap into quantum computing’s unparalleled potential for solving the world’s problems. At times, it seemed he was tapping into the very fabric of reality in ways no one had ever previously thought possible.

Chapter 7

Mediterranean Sea
Early Morning, Tuesday, 19 June

To the east, the first faint light of morning was consuming the darkness. On the deck, the crew hurried about their tasks. Hidden from view, a powerfully built woman with bright blue eyes watched with the intensity of a leopard waiting to pounce on its prey. Her gaze was sharp. Her traditional robes covered her black scuba suit. Her hijab covered her close-cropped blond hair and was up around her face so that only her stunning blue eyes showed.

Though many prepared themselves for the mission, everything was quiet and calm. It was the kind of reassuring tranquility that steeled her heart to her task.

She watched as the men checked their weapons and she watched for her target, knowing the target was somewhere below decks. The target was the one complication. The one kink in an otherwise flawless plan. A kink she’d soon eliminate.

Still in the shadows, she crossed to the port side of the boat where a dozen strongboxes and crates were piled high. She opened one of the boxes and retrieved its contents — in this case, the instrument of her target’s demise.