The Bear and the Dragon

Chapter 14
(dot)com
It was a sleepless night for Nomuri. Would she do it? Would she do what she was told? Would she tell a security officer about it, and then about him? Might she be caught with the CD-ROM going into work and questioned about it? If so, a casual inspection would show it to be a music CD, Bill Conti’s musical score for Rocky—a poorly marked knockoff of an American intellectual property that was quite common in the PRC. But a more careful examination would have revealed that the first—outermost—data line on the metallic surface told the computer CD-ROM reader to skip to a certain place where the content was not music, but binary code, and very efficient binary code at that.
The CD-ROM didn’t contain a virus per se, because a virus circulates mainly across computer networks, entering a computer surreptitiously the way a disease organism enters a living host (hence the term virus). But this one came in the front door, and on being read by the CD-ROM reader, a single prompt came up on the screen, and Ming, after a quick look-around in her office, moved her mouse to put the pointer on the prompt, clicked the INSTALL command, and everything immediately disappeared. The program thus implanted searched her hard drive at nearly the speed of light, categorizing every file and setting up its own index, then compressing it into a small file that hid in plain sight, as it were, identified by any disk-sorting program with a wholly innocent name that referred to a function carried out by another program entirely. Thus only a very careful and directed search by a skilled computer operator could even detect that something was even there. Exactly what the program did could only be determined by a one-by-zero reading of the program itself, something difficult to accomplish at best. It would be like trying to find what was wrong with a single leaf on a single tree in a vast forest where all the trees and all the leaves looked pretty much alike, except that this one leaf was smaller and humbler than most. CIA and NSA could no longer attract the best programmers in America. There was just too much money in the consumer electronics industry for government to compete effectively in that marketplace. But you could still hire them, and the work that came out was just as good. And if you paid them enough—strangely, you could pay lots more to a contractor than to an employee—they wouldn’t talk to anyone about it. And besides, they never really knew what it was all about anyway, did they?
In this case, there was an additional level of complexity that went back over sixty years. When the Germans had overrun the Netherlands in 1940, they’d created a strange situation. In Holland the Germans had found both the most cooperative of their conquered nations and the most fiercely resistant. More Dutchmen per capita had joined the Germans than any other nationality—enough to form their own SS division, SS Nordland. At the same time, the Dutch resistance became the most effective in Europe, and one of their number was a brilliant mathematician/engineer working for the national telephone company. In the second decade of the twentieth century, the telephone had reached a developmental roadblock. When you lifted a phone, you were immediately connected with an operator to whom you gave the destination you were trying to call, and she then physically moved a plug into the proper hole. This system had been workable when only a few telephones were in use, but the appliance had rapidly proved too useful for limited applications. The solution to the problem, remarkably enough, had come from a mortician in the American South. Vexed by the fact that the local operator in his town referred the bereaved to a competing undertaker, he had invented the stepping switch, which enabled people to reach their own phone destinations merely by turning a rotary dial. That system served the world well, but also required the development of a whole body of new mathematical knowledge called “complexity theory,” which was systematized by the American company AT&T in the 1930s.
Ten years later, merely by adding additional digits to be dialed, the Dutch engineer in the resistance had applied complexity theory to covert operations by creating theoretical pathways through the switching gear, thus enabling resistance fighters to call others without knowing whom they called, or even the actual telephone numbers they were calling.
This bit of electronic skullduggery had first been noticed by an officer for the British Special Operations Executive, the SOE, and, finding it very clever indeed, he’d discussed it over a beer with an American colleague in a London pub. The American OSS officer, like most of the men Wild Bill Donovan had chosen, was an attorney by profession, and in his case, a very thorough one, who wrote everything down and forwarded it up the line. The report on the Dutch engineer had made its way to the office of Colonel William Friedman, then America’s foremost code-breaker. Though not himself a hardware expert, Friedman had known something useful when he saw it, and he knew there would be an after-the-war, during which his agency—later reborn as the National Security Agency—would still be busy cracking other countries’ codes and ciphers and producing codes and ciphers itself. The ability to develop covert communications links through a relatively simple mathematical trick had seemed a gift from God’s own hand.
In the 1940s and ’50s, NSA had been able to hire American’s finest mathematicians, and one of the tasks assigned them had been to work with AT&T to create a universal telephone operating system that could be used covertly by American intelligence officers. Back then, AT&T was the only real rival NSA had had in the hiring of skilled mathematicians, and beyond that, AT&T had always been a prime contractor for just about every executive agency of the government. By 1955, it was done, and for a surprisingly modest fee AT&T provided the entire world with a model for telephone systems that most of the world adopted—the modest cost was explained by the desire of AT&T to make its systems compatible with every other country’s to ease international communications. With the 1970s had come push-button phones, which directed calls electronically by frequency-controlled codes even easier for electronic systems to use, and infinitely easier to maintain than the former electro-mechanical stepping switches that had made the mortician hugely rich. They also proved even easier for AT&T to rig for NSA. The operating systems first given the world’s telephone companies by AT&T’s Parsippany, New Jersey, research laboratory had been upgraded yearly at least, giving further improvements to the efficiency of the world’s phone systems—so much so that scarcely any telephone system in the world didn’t use it. And tucked into that operating system were six lines of binary code whose operational concept traced back to the Nazi occupation of Holland.
Ming finished the installation and ejected the disk, discarding it into her waste can. The easy way to dispose of secret material was to have your adversary do it, through the front door, not the back one.
Nothing really happened for some hours, while Ming did her usual office tasks and Nomuri visited three commercial businesses to sell his high-powered desktop computers. All that changed at 7:45 P.M.
By this time, Ming was at her own home. Nomuri would get a night off; Ming had to do some things with her room-mate to avoid too much suspicion—watching local television, chatting with her friend, and thinking about her lover, while the whole reason for the wispy smiles on her face played out entirely outside her consciousness. Strangely, it never occurred to her that her roomie had it all figured out in an instant, and was merely polite enough not to broach the subject.
Her NEC desktop computer had long since gone into auto-sleep mode, leaving the monitor screen dark and blank, and the indicator light in the lower right position of the plastic frame amber instead of the green that went with real activity. The software she’d installed earlier in the day had been custom-designed for the NEC machines, which like all such machines had proprietary source-code unique to the brand. The source-code, however, was known to the National Security Agency.
Immediately upon installation, the Ghost program—as it had been christened at Fort Meade, Maryland—had buried itself in a special niche in the NEC’s operating system, the newest version of Microsoft Windows. The niche had been created by a Microsoft employee whose favorite uncle had died over North Vietnam while flying an F-105 fighter-bomber, and who did his patriotic work entirely without the knowledge of his parent company. It also dovetailed exactly with the NEC code, with the effect of making it virtually invisible even to a line-by-line inspection of all the code within the machine by an expert software engineer.
The Ghost had gone immediately to work, creating a directory that sorted the documents on Ming’s computer first by date of creation/modification, and then by file type. Some files, like the operating system, it ignored. It similarly ignored the NEC-created transcription program that converted Roman characters, actually the English phonemes of the spoken Mandarin language, into the corresponding ideographs, but the Ghost did not ignore the graphic-text files that resulted from that program. Those it copied, along with telephone indexes and every other text file on the five-gigabyte hard drive. This entire procedure took the machine, guided by the Ghost, seventeen-point-one-four seconds, leaving a large file that sat by itself.
The machine did nothing for a second and a half, then new activity started. The NEC desktop machines had built-in high-speed modems. The Ghost activated these, but also turned off their internal mini-speakers so that no evidence of the transmission would be heard by anyone. (Leaving the speakers on was a primary security measure. The flashing lights that told of their activity were hidden because the modem was inside the box for this model.) The computer then dialed (this term had somehow survived the demise of rotary dials on telephones) a twelve-digit number rather than the usual seven used by the Beijing telephone system. The additional five digits sent the seeker-signal on a round-robin adventure through the hardware of the central switching computer, and it came out in the place designated two weeks before by the engineers at Fort Meade, who, of course, never had an idea what this was all for, or where it would happen, or who might be involved. The number that rang—actually there wasn’t a mechanical or electronic ringer of any sort—was the dedicated modem line that exited the wall by Chester Nomuri’s desk and ended in the back of his very high-end laptop—which was not an NEC, because here, as with most computer applications, the best was still American.
Nomuri was also watching TV at the moment, though in his case it was the CNN international news, so that he could know what was going on at home. After that he’d switch to a Japanese satellite channel, because it was part of his cover. A samurai show he liked was on tonight, in theme and simplicity rather like the Westerns that had polluted American TV in the 1950s. Though an educated man and a professional intelligence officer, Nomuri liked mindless entertainment as much as anyone else. The beep made him turn his head. Though his computer had software similar to that running in Ming’s office, he’d allowed the aural prompt to tell him that something was coming in, and a three-key code lit up his screen to show exactly what it was and where it was coming from.
Yes! the CIA officer exulted, his right fist slamming into his open left hand hard enough to sting. Yes. He had his agent in f*cking place, and here was the take from Operation SORGE. A bar at the top of the screen showed that the data was coming it at a rate of 57,000 bits per second. That was pretty fast. Now, just hope that the local commie phone system didn’t develop a bad connection somewhere between Ming’s office and the switching center, and from the switching center to his flat, Chester thought. Shouldn’t be much of a problem. The outbound leg from Ming’s office would be first-rate, tasked as it was to the service of the Party nobility. And from the switching center to his place would be okay, because he’d gotten numerous messages that way, most of them from NEC in Tokyo to congratulate him on exceeding his sales quota already.
Yeah, well, Chet, you are pretty good at making a sale, aren’t you? he asked himself on the way to the kitchen. He figured he owed himself a drink for this bit of performance. On returning, he saw that the download wasn’t finished yet.
Damn. How much shit is she sending me? Then he realized that the text files he was getting were actually graphics files, because Ming’s computer didn’t store ideographs as letters, but rather as the pictures that they actually were. That made the files memory-intensive. Exactly how memory-intensive they were, he saw forty minutes later when the download ended.
At the far end of the electronic chain, the Ghost program appeared to shut itself down, but in fact it slept rather as a dog did, one ear always cocked up, and always aware of the time of day. On finishing the transmission, the Ghost made a notation on its inside index of the files. It had sent everything up until this day. From now on, it would only send new ones—which would make for much shorter and faster transmissions—but only in the evening, and only after ninety-five minutes of total inactivity on the computer, and only when it was outwardly in auto-sleep mode. Tradecraft and caution had been programmed in.
“F*ck,” Nomuri breathed on seeing the size of the download. In pictures this could be the porno shots of damned near every hooker in Hong Kong. But his job was only half done. He lit up a program of his own and selected the “Preferences” folder that controlled it. Already checked was the box for autoencryption. Virtually everything on his computer was encrypted anyway, which was easily explainable as trade and business secrets—Japanese companies are renowned for the secrecy of their operations—but with some files more encrypted than others. The ones that arrived from the Ghost got the most robust scrambling, from a mathematically derived transcription system, fully 512 bits in the key, plus an additional random element which Nomuri could not duplicate. That was in addition to his numeric password, 51240, the street number of his first “score” in East LA. Then it was time to transmit his take.
This program was a close cousin to the Ghost he’d given Ming. But this one dialed the local Internet Service Provider, or ISP, and sent off a lengthy e-mail to a destination called [email protected]. The “brownienet” was putatively a network established for bakeries and bakers, professional and amateur, who liked to swap recipes, often posting photos of their creations for people to download, which explained the occasional large file transferred. Photographs are notoriously rapacious in their demands for bytes and disk space.
In fact, Mary Patricia Foley had posted her own highly satisfactory recipe for French apple pie, along with a photo her elder son had taken with his Apple electronic camera. Doing so hadn’t been so much a case of establishing a good cover as womanly pride in her own abilities as a cook, after spending an hour one night looking over the recipes others had put on this bulletin board. She’d tried one from a woman in Michigan a few weeks previously and found it okay, but not great. In coming weeks she wanted to try some of the bread recipes, which did look promising.
It was morning when Nomuri uploaded his e-mail to Pat’s Bakery, an entirely real and legitimate business three blocks from the statehouse in Madison, Wisconsin, as a matter of fact, owned by a former CIA officer in the Science and Technology Directorate, now retired and a grandmother who was, however, too young for knitting. She’d created this Internet domain, paying the nominal fee and then forgetting about it, just as she’d forgotten nearly everything she’d ever done at Langley.
“You’ve got mail,” the computer said when MP switched on her Internet mail service, which used the new Pony Express e-mail program. She keyed the download command and saw the originator was cgoodjadecastle.com. The username was from Gunsmoke. Marshal Dillon’s crippled sidekick had been named Chester Good.
DOWNLOADING, the prompt-box on the screen said. It also gave an estimate for how long the download would take. 47 MINUTES ... !
“Son of a bitch,” the DDO breathed, and lifted her phone. She pressed a button, waiting a second for the right voice to answer. “Ed, better come see this ...”
“Okay, honey, give me a minute.”
The Director of Central Intelligence came in, holding his morning mug of coffee, to see his wife of twenty-three years leaning back, away from her computer screen. Rarely in that time had Mary Pat ever backed away from anything. It just wasn’t her nature.
“From our Japanese friend?” Ed asked his wife.
“So it would seem,” MP replied.
“How much stuff is this?”
“Looks like a lot. I suppose Chester is pretty good in the sack.”
“Who trained him?”
“Whoever it was, we need to get his ass down to The Farm and pass all that knowledge along. For that matter,” she added, with a changed voice and an upward look to catch her husband’s eye, “maybe you could audit the course, honey-bunny.”
“Is that a complaint?”
“There’s always room for improvement—and, okay, yes, I need to drop fifteen pounds, too,” she added, to cut the DCI off before he could reply in kind. He hated when she did that. But not now. Now his hand touched her face quite tenderly, as the prompt screen said another thirty-four minutes to complete the download.
“Who’s the guy at Fort Meade who put the Ghost programs together?”
“They contracted a game place—a guy at a game company, I guess,” Mrs. Foley corrected herself. “They paid him four hundred fifty big ones for the job.” Which was more than the Director of Central Intelligence and the Deputy Director (Operations) made together, what with the federal pay caps, which didn’t allow any federal employee to make more than a member of Congress—and they feared raising their own salaries, lest they offend the voters.
“Call me when you have it downloaded, baby.”
“Who’s the best guy we have for China?”
“Joshua Sears, Ph.D., from U-Cal Berkley, runs the China desk in the DI. But the guy at NSA is better for linguistic nuances, they say. His name’s Victor Wang,” the DCI said.
“Can we trust him?” MP asked. Distrust of ethnic Chinese in the American national-security apparatus had reached a considerable level.
“Shit, I don’t know. You know, we have to trust somebody, and Wang’s been on the box twice a year for the last eight years. The ChiComms can’t compromise every Chinese-American we have, you know. This Wang guy’s third-generation American, was an officer in the Air Force—ELINT guy, evidently worked out of Wright-Patterson—and just made super-grade at NSA. Tom Porter says he’s very good.”
“Okay, well, let me see what all this is, then we’ll have Sears check it out, and then, maybe, if we have to, we’ll talk to this Wang guy. Remember, Eddie, at the end of this is an officer named Nomuri and a foreign national who has two eyes—”
Her husband cut her off with a wave. “And two ears. Yeah, baby, I know. We’ve been there. We’ve done that. And we both have the T-shirts to prove it.” And he was about as likely to forget that as his wife was. Keeping your agents alive was as important to an intelligence agency as capital preservation was to an investor.
Mary Pat ignored her computer for twenty minutes, and instead went over routine message traffic hand-carried up from MERCURY down in the basement of the Old Headquarters Building. That was not especially easy, but necessary nonetheless, because CIA’s Clandestine Service was running agents and operations all over the world—or trying to, Mary Pat corrected herself. It was her job to rebuild the Directorate of Operations, to restore the human-intelligence—HUMINT—capability largely destroyed in the late 1970s, and only slowly being rebuilt. That was no small task, even for an expert in the field. But Chester Nomuri was one of her pets. She’d spotted him at The Farm some years before and seen in him the talent, the gift, and the motivation. For him espionage was as much a vocation as the priesthood, something important to his country, and fun, as much fun as dropping a fifty-footer at Augusta was for Jack Nicklaus. Toss in his brains and street sense, and, Mary Pat had thought at the time, she had a winner there. Now Nomuri was evidently living up to her expectations. Big time. For the first time, CIA had an agent-in-place inside the ChiComm Politburo, and that was about as good as it got. Perhaps even the Russians didn’t have one of those, though you could never be sure, and you could lose a lot of money betting against the Russian intelligence services.
“File’s done,” the computer’s electronic voice finally said. That occasioned a turn in her swivel chair. The DDO first of all backed up her newly downloaded file to a second hard drive, and then to a “toaster” disk, so called because the disk went in and out of the drive box like a slice of bread. With that done, she typed in her decryption code, 51240. She had no idea why Nomuri had specified that number, but knowing was not necessary, just so long as nobody else knew either. After typing in the five digits and hitting RETURN, the file icons changed. They were already aligned in list form, and MP selected the oldest. A page full of Chinese ideographs came up. With that bit of information, MP lifted her office phone and punched the button for her secretary. “Dr. Joshua Sears, DI, Chinese Section. Please ask him to come see me right away.”
That took six endless minutes. It took rather a lot to make Mary Patricia Kaminsky Foley shiver, but this was one such occasion. The image on her screen looked like something one might get from inking the feet of several drunken roosters, then making them loiter on a piece of white paper, but within the imagery were words and thoughts. Secret words and hidden thoughts. On her screen was the ability to read the minds of adversaries. It was the sort of thing that could win the World Series of Poker in Las Vegas, but infinitely more important. It was the sort of thing that had won wars and altered history from the expected path determined by the most important of players, and in that was the value of espionage, the whole point of having an intelligence community, because the fates of nations really did ride on such things—
—and therefore, the fates of nations rode on Chet Nomuri’s schwantz and how well he used it, Mrs. Foley reflected. What a crazy f*cking world it was. How the hell could an historian ever get that right? How did you communicate the importance of seducing some nameless secretary, an underling, a modern-day peasant who merely transcribed the thoughts of the important, but in being compromised made those thoughts available to others, and in doing so, altered the course of history as surely as turning the rudder changed the course of a mighty ship. For Mary Pat, Deputy Director (Operations) of the Central Intelligence Agency, it was a moment of fulfillment to place alongside the birth of her children. Her entire raison d’être lay in black-and-white ideographs on her computer monitor—and she couldn’t read the f*cking things. She had the language skills to teach Russian literature at Moscow State University, but all she knew of Chinese was chop suey and moo goo gai pan.
“Mrs. Foley?” A head appeared at her door. “I’m Josh Sears.” He was fifty, tall, losing his hair, most of it gray. Brown eyes. He hit the cafeteria line downstairs a little too hard, the DDO thought.
“Please come in, Dr. Sears. I need you to translate some things for me.”
“Sure,” he replied, picking a seat and relaxing into it. He watched the DDO take some pages off her laser printer and hand them across.
“Okay, it says the date is last March twenty-first, and the place is Beijing—hmph, the Council of Ministers Building, eh? Minister Fang is talking to Minister Zhang.” Sears ran his eyes down the page. “Mrs. Foley, this is hot stuff. They’re talking about the possibilities of Iran—no, the old UIR—taking over the entire Persian Gulf oil fields, and what effect it would have on China. Zhang appears to be optimistic, but guarded. Fang is skeptical ... oh, this is an aide-memoir, isn’t it? It’s Fang’s notes from a private conversation with Zhang.”
“The names mean anything to you?”
“Both are Ministers Without Portfolio. They’re both full Politburo members without direct ministerial duties. That means they’re both trusted by the chairman, the PRC premier, Xu Kun Piao. They go back thirty years plus, well into the time of Mao and Chou. As you know, the Chinese are really into lengthy relationships. They develop—well, not friendships as we understand them, but associations. It’s a comfort-level thing, really. Like at a card table. You know what the other guy’s mannerisms and capabilities are, and that makes for a long, comfortable game. Maybe you won’t win big, but you won’t lose your shirt either.”
“No, they don’t gamble, do they?”
“This document demonstrates that. As we suspected, the PRC backed the Ayatollah Daryaei in his play, but they never allowed their support to be public. From skimming this, it appears that this Zhang guy is the one who ramrodded this—and the play the Japanese made. We’ve been trying to build a book on this Zhang guy—and Fang as well—without a whole lot of success. What do I need to know about this?” he asked, holding the page up.
“It’s code word,” MP replied. By federal statute, “top secret” was as high as it went, but in reality there were more secret things than that, called “special-access programs,” which were designated by their controlling code words. “This one’s called SORGE.” She didn’t have to say that he could not discuss this information with anyone, and that even dreaming in bed about it was forbidden. Nor did she have to say that in SORGE was Sears’s path to a raise and much greater personal importance within the CIA’s pantheon of bureaucrats.
“Okay.” Sears nodded. “What can you tell me?”
“What we have here is a digest of conversations between Fang and Zhang, and probably other ministers as well. We’ve found a way to crash into their documents storage. We believe the documents are genuine,” MP concluded. Sears would know that he was being misled on sources and methods, but that was to be expected. As a senior member of the DI—the Directorate of Intelligence—it was his job to evaluate information provided to him by various sources, in this case the DO. If he got bad information, his evaluation would be bad as well, but what Mrs. Foley had just told him was that he would not be held at fault for bad information. But he’d also question the authenticity of the documents in an internal memo or two, just to cover his own ass, of course.

“Okay, ma’am. In that case, what we have here is pure nitroglycerine. We’ve suspected this, but here’s confirmation. It means that President Ryan did the right thing when he granted diplomatic recognition to Taiwan. The PRC had it coming. They conspired to wage aggressive war, and since we got involved, you can say that they conspired against us. Twice, I bet. We’ll see if another of these documents refers to the Japanese adventure. You’ll recall that the Japanese industrialists implicated this Zhang guy by name. That’s not a hundred percent, but if it’s confirmed by this, then it’s almost something you could take before a judge. Mrs. Foley, this is some source we have here.”
“Evaluation?”
“It feels right,” the analyst said, reading over the page again. “It sounds like conversation. I mean, it’s unguarded, not official diplomatic-speak or even inside-minister-speak. So, it sounds like what it purports to be, the notes of a private, informal policy discussion between two senior colleagues.”
“Any way to cross-check it?” MP asked next.
An immediate shake of the head. “No. We don’t know much about either one of these guys. Zhang, well, we have the evaluation from Secretary Adier—you know, from the shuttle diplomacy after the Airbus shoot-down, which pretty well confirms what that Yamata guy told the Japanese police and our FBI guys about how the Chinese nudged them into the conflict with us, and what for. The PRC looks on eastern Siberia with covetous eyes,” Sears reminded her, showing his knowledge of the PRC policies and objectives. “For Fang Gan, we have photos of him sipping mao-tai at receptions in his Mao jacket and smiling benignly, like they all do. We know he’s tight with Xu, there are stories that he likes to play with the office help—but a lot of them do that—and that’s about it.”
It was good of Sears not to remind her that playing with the office help wasn’t a character defect limited to China.
“So, what do we think about them?”
“Fang and Zhang? Well, both are Ministers Without Portfolio. So, they’re utility infielders, maybe even assistant coaches. Premier Xu trusts their judgment. They get to sit in at the Politburo as full voting members. They get to hear everything and cast votes on everything. They influence policy not so much by making it as shaping it. Every minister knows them. These two know all the others. They’ve both been around a long time. Both are well into their sixties or seventies, but people over there don’t mellow with age like they do in America. Both will be ideologically sound, meaning they’re both probably solid communists. That implies a certain ruthlessness, and you can add to that their age. At seventy-five, death starts being a very real thing. You don’t know how much time you have left, and these guys don’t believe in an afterlife. So, whatever goals they have, they have to address pretty quick at that age, don’t they?”
“Marxism doesn’t mix well with humanity, does it?”
Sears shook his head. “Not hardly, and toss in a culture that places a much lower value on human life than ours does.”
“Okay. Good brief. Here,” she said, handing over ten printed pages. “I want a written evaluation after lunch. Whatever you might be working on now, SORGE is more important.”
That meant a “seventh-floor tasking” to Dr. Sears. He’d be working directly for the Directors. Well, he had a private office already, and a computer that wasn’t hooked into any telephone lines, even a local area network, as many of the CIA’s ’puters were. Sears tucked the papers into a coat pocket and departed, leaving Mary Pat to look out her floor-to-ceiling windows and contemplate her next move. Really it was Ed’s call, but things like this were decided collegially, especially when the DCI was your husband. This time she’d wander over to see him.
The DCI’s office is long and relatively narrow, with the director’s office near the door, well away from the sitting area. Mary Pat took the easy chair across from the desk.
“How good is it?” Ed asked, knowing the reason for her visit.
“Calling this SORGE was unusually prescient for us. It’s at least that good.”
Since Richard Sorge dispatches from Tokyo to Moscow might have saved the Soviet Union in 1941, that got Ed Foley’s eyes to widen some. “Who looked at it?”
“Sears. He seems pretty smart, by the way. I’ve never really talked to him before.”
“Harry likes him,” Ed noted, referring to Harry Hall, the current Deputy Director (Intelligence), who was in Europe at the moment. “Okay, so he says it looks pretty good, eh?”
A serious nod. “Oh, yeah, Eddie.”
“Take it to see Jack?” They could not not take this to the President, could they?
“Tomorrow, maybe?”
“Works for me.” Just about any government employee can find space in his or her day for a drive to the White House. “Eddie, how far can this one spread?”
“Good question. Jack, of course. Maybe the Vice President. I like the guy,” the DCI said, “but usually the veep doesn’t get into stuff like this. SecState, SecDef, both are maybes. Ben Goodley, again a maybe. Mary, you know the problem with this.”
It was the oldest and most frequent problem with really valuable high-level intelligence information. If you spread it too far, you ran the risk of compromising the information—which also meant getting the source killed—and that killed the goose laying the golden eggs. On the other hand, if you didn’t make some use of the information, then you might as well not have the eggs anyway. Drawing the line was the most delicate operation in the field of intelligence, and you never knew where the right place was to draw it. You also had to worry about methods of spreading it around. If you sent it encrypted from one place to another, what if the bad guys had cracked your encryption system? NSA swore that its systems, especially TAPDANCE, could not be broken, but the Germans had thought ENIGMA crack-proof, too.
Almost as dangerous was giving the information, even by hand, to a senior government official. The bastards talked too much. They lived by talking. They lived by leaking. They lived by showing people how important they were, and importance in D.C. meant knowing what other people didn’t know. Information was the coin of the realm in this part of America. The good news here was that President Ryan understood about that. He’d been CIA, as high as Deputy Director, and so he knew about the value of security. The same was probably true of Vice President Jackson, former naval aviator. He’d probably seen lives lost because of bad intelligence. Scott Adler was a diplomat, and he probably knew as well. Tony Bretano, the well-regarded SecDef, worked closely with CIA, as all Secretaries of Defense had to do, and he could probably be trusted as well. Ben Goodley was the President’s National Security Advisor, and thus couldn’t easily be excluded. So, what did that total up to? Two in Beijing. At Langley, the DCI, DDCI, DDI, and DDO, plus Sears from inside the DI. That made seven. Then the President, Vice President, SecState, SecDef, and Ben Goodley. That made twelve. And twelve was plenty for the moment, especially in a town where the saying went, If two people know it, it’s not a secret. But the entire reason for having CIA was this sort of information.
“Pick a name for the source,” Foley instructed his wife.
“SONGBIRD will do for now.” It was a sentimental thing for MP, naming agents for birds. It dated back to CARDINAL.
“Fair enough. Let me see the translations you get, okay?”
“You bet, honey-bunny.” Mary Pat leaned over her husband’s desk to deliver a kiss, before heading back to her own office.
On arriving there, MP checked her computer for the SORGE file. She’d have to change that, MP realized. Even the name of this special-access compartment would be classified top secret or higher. Then she did a page count, making a note on a paper pad next to the screen.
ALL 1,349 PAGES OF RECIPES RECEIVED, she wrote as a reply to [email protected]. WILL LOOK THE RECIPES OVER. THANKS A BUNCH. MARY. She hit the RETURN key, and off the letter went, through the electronic maze called the Internet. One thousand, three hundred and forty-nine pages, the DDO thought. It would keep the analysts busy for quite a while. Inside the Old Headquarters Building, analysts would see bits and pieces of SORGE material, covered under other transitory code names randomly chosen by a computer in the basement, but only Sears would know the whole story—and, in fact, he didn’t even know that, did he? What he knew might—probably would—be enough to get this Ming woman killed, once the MSS realized who’d had access to the information. They could do some things in Washington to protect her, but not much.

Nomuri rose early in his Beijing apartment, and the second thing he did was to log on to check his e-mail. There it was, number seven in the list, one from [email protected]. He selected the decryption system and typed in the key ... so, the pages had all been received. That was good. Nomuri dragged the message he’d dispatched to the “wipe-info” bin, where Norton Utilities not only deleted the file, but also five times electronically scrubbed the disk segments where they’d briefly resided, so that the files could never be recovered by any attempt, no matter how skilled. Next he eliminated the record of having sent any e-mail to brownienet. Now there was no record whatever of his having done anything, unless his telephone line was tapped, which he didn’t really suspect. And even then the data was scrambled, fully encrypted, and thus not recoverable. No, the only dangers in the operation now attached to Ming. His part of it, being the spymaster, was protected by the method in which her desktop computer called him, and from now on those messages would be sent out to brownienet automatically, and erased the same way, in a matter of seconds. It would take a very clever counterintelligence operation to hurt Nomuri now.




Tom Clancy's books