Долгий '68. Ричард Вайнен

Читать онлайн.
Название Долгий '68
Автор произведения Ричард Вайнен
Жанр Исторические приключения
Серия
Издательство Исторические приключения
Год выпуска 2018
isbn 9785001394020



Скачать книгу

thanks.” Reluctantly, he tossed the covers off and stood up, stretching. Kim allowed herself to admire him. Too bad he wasn’t brighter, she thought wryly. He was Italian, handsome, kind, and she had no doubt he’d be a good father. And she could look at him for hours. Trouble was most women could, and he’d age well. She suspected he would be married many times as the years went by.

      Just a gut feeling.

      He put on his jeans and wandered over to put his arms around Kim. He kissed her neck. “Thanks for a great evening. You know I’m crazy about you.”

      She patted his hands, allowed the kiss. “Yeah, yeah, Spinuzzi.”

      Against her neck, he asked quietly, “Did you have a good time, Kim?”

      It was unexpectedly vulnerable. Kim cursed inwardly. One of these days, she was going to have to remember that men were not as tough as they wanted women to think they were.

      She turned and kissed him. “Always, Marc. I enjoy your company, and you’re a great guy. We’re just not couple material and you know it.”

      He squeezed her shoulder and nodded. “You’re right, you’re right. Go take your shower and I’ll call you in a few days.”

      “Thanks.”

      After a hot shower, Kim made a peanut butter sandwich and a cup of hot chocolate and carried them into her study.

      “Alone at last,” she breathed, tugging her thick hair into a knot at the nape of her neck. She settled her cup and slid her chair up to the computer. Code rolled relentlessly through the back of her brain. Insistent, incoherent. Strings of garbled letters, Arabic and English, back and forth. She squeezed her eyes shut and let go of a sigh.

      As a code breaker for the National Security Agency, Kim was trying to decrypt a group of e-mails suspected to have originated with a terrorist network called Q’rajn. The NSA had intercepted dozens of missives over the past few weeks, and the flurry had turned into a blizzard of e-mails the past three days. Kim, along with her partner, Scott Shepherd, had been working for weeks nonstop to find the key. With the increased activity, there was increasing dread.

      Something nagged her tonight, a sense of something glimpsed out of the corner of her eye, something visible only in peripheral vision. She wanted another look at the code, to see if that jarred anything loose.

      Her study was a plain room with open desks and two computers. The blinds were drawn. It was quiet so late. Her neighbors were largely young professionals like herself, with jobs in the local “alphabet agencies”—CIA, NSA, FBI—or the military installations in and around Washington, D.C., and Baltimore.

      While she waited for the computers to boot, Kim ate her sandwich and admired the view of her kitchen from the office chair. A large jade plant stood on the windowsill, and on the wall behind the table was an enormous red-and-black Navajo blanket. It had been a gift from her mentor and reminded her of the time she’d spent at the Athena Academy for the Advancement of Women in Arizona. Athena educated girls ages ten to eighteen, at a state-of-the-art facility where girls trained in academics, martial arts, languages and other leadership skills.

      Kim was proud of her little condo. Few women in her traditional Italian family lived on their own, even when they were twenty-five, as Kim was. Even fewer lived outside the enclave in Baltimore known as Little Italy. Not one of them had purchased real estate, not on her own.

      It was one of the first goals Kim had made and met. The modern, two-bedroom condo was not particularly notable, though she loved the big windows and the master bedroom loft, but it was all hers. All modern convenience and post-turn-of-the-century architecture, which she’d decorated in a bright, coral-and-turquoise Southwestern theme. Some locals thought it was kitschy—so “last year,” as one friend had said—but for Kim, it was a reminder of the things she’d learned in the harsh and beautiful world of the desert. So much of who she was came from those days outside of Phoenix.

      As she waited for her computer to load various programs and go through the virus checks, she switched on the radio that sat on the corner of her desk. The dial was tuned to a world music station that played a variety of Latin, African and European selections. The switches helped keep her awake.

      Usually.

      When the computers were up and running, she clicked on the icons to download e-mail on both machines.

      Kim had three e-mail addresses—one for personal mail on her home computer, one for NSA-related material, which had a dedicated line the government paid for.

      A third address was used strictly to receive e-mail from a top-secret, outside agency, called Oracle. It was located on her personal machine, to avoid any cross-contamination from work.

      On the work computer, she dialed into the government network, where she would be able to explore the files connected to the current case. It was sometimes laborious signing in, but tonight the computer whizzed through the screens, the layers and layers of security designed to thwart hackers.

      Most of them, anyway. No system was entirely safe, no matter what the government wanted to believe. They did their best. It was a fairly tight system, and whenever a weakness was discovered, computer security experts were on the spot to fix it.

      On her home computer, the personal e-mails sorted into one folder. Twenty-seven, which was a lot for her in one day. She frowned. She’d check them in a minute, but first she switched IDs and asked the computer to fetch her Oracle e-mails. Maybe they’d have something to help crack this code.

      Oracle was a special computer system developed to track information gathered from FBI, CIA, NSA and military databases, to be then cross-checked and matched. Created in the days before Homeland Security, it had been developed to help avoid disasters like Pearl Harbor and the 1993 Trade Center bombing, events that might have been prevented had key information been shared between agencies.

      Kim had been recruited through AA.gov, a Web site connecting Athena Academy grads and students. She assumed Oracle was run by someone within the school network, and she knew there were a handful of operatives in key organizations—such as Kim and her work with the NSA—but all were protected by a cloak of anonymity. No one knew the agents. No one outside of Oracle knew it existed. It worked beyond the map of security in the U.S. government.

      After Homeland Security had been created, Oracle had theoretically become obsolete.

      Theoretically.

      In fact, Oracle had not disbanded because it provided a fail-safe for the other organizations. Although she didn’t know the particulars, she knew Oracle agents were able to get a fix on problems and provide evidence to thwart troublesome activities before the agencies involved were able to act. It was not infallible any more than any other device, but it helped prevent information from slipping between the cracks.

      The folder for Oracle mail was labeled simply Delphi. It only received e-mail sporadically, and always from the same place. Tonight, it showed one new message.

      Tonight, Kim fervently hoped for some information about Q-group, and she clicked on the folder. The e-mail read:

      To: [email protected]

      From: [email protected]

      Subject: q’s

      1. Intelligence reports Q’rajn definitely tied to Berzhaan. CIA has tracked operatives overseas. FBI reports activity within the United States, links to Berzhaan terrorist community.

      2. Two names emerging in connection with current activities: Fathi bin Amin Mansour and Hafiz abu Malik Abd-Humam, both natives of Berzhaan. -Mansour is prodigiously intelligent. Advanced degrees from Oxford in chemical engineering and European history. Mother and two brothers killed in guerilla raids by the Kemini rebels four years ago, for which he holds the West responsible. He is connected to several bombings. His whereabouts are unknown. See attached photograph, taken in London, 2001.

      -Abd-Humam is an associate of Mansour’s father, a professor without overt terrorist ties. Appears to be a devoted family man, religious but not overtly