State of Fear

"Interrogation times?" Evans said.

 

"Yes. We were hoping we'd be able to identify at least one of the three men in Antarctica, since we have good photographs of all three. And we know the photographs are accurate because people on the base saw them. But, I'm afraid we're out of luck."

 

Sanjong explained that they had transmitted photos of Brewster and the two graduate students to several databases in Washington, where pattern-recognition computers checked them against individuals with known criminal records. Sometimes you got lucky, and the computer found a match. But this time, no match had come back.

 

"It's been several hours, so I think we're out of luck."

 

"As we expected," Kenner said.

 

"Yes," Sanjong said. "As we expected."

 

"Because these guys don't have criminal records?" Evans said.

 

"No. They very well may."

 

"Then why didn't you get a match?"

 

"Because this is a netwar," Kenner said. "And at the moment, we are losing it."

 

 

 

 

 

TO LOS ANGELES

 

 

FRIDAY, OCTOBER 8

 

3:27 P. M.

 

In media accounts, Kenner explained, the Environmental Liberation Front was usually characterized as a loose association of eco-terrorists, operating in small groups on their own initiative, and employing relatively unsophisticated means to create havoc--starting fires, trashing SUVs in car lots, and so on.

 

The truth was quite different. Only one member of ELF had ever been apprehended--a twenty-nine-year-old graduate student at the University of California at Santa Cruz. He was caught sabotaging an oil rig in El Segundo, California. He denied any association with the group, and insisted he was acting alone.

 

But what troubled authorities was the fact that he was wearing an appliance on his forehead that changed the shape of his skull and made his eyebrows jut out prominently. He was also wearing false ears. It wasn't much of a disguise. But it was troubling, because it suggested that he knew quite a lot about the pattern-matching programs used by the government.

 

Those programs were tuned to look past changes in facial hair--wigs, beards, and mustaches--since that was the most common method of disguise. They were also designed to compensate for changes in age, such as increased heaviness in the face, drooping features, receding hairlines.

 

But ears didn't change. The shape of the forehead didn't change. So the programs were therefore weighted to rely on the configuration of ears, and the shape of the forehead. Changing these parts of the face would result in a "no-match" outcome on a computer.

 

The guy from Santa Cruz knew that. He knew security cameras would photograph him when he got near the rig. So he changed his appearance in a way that would prevent identification by computer.

 

Similarly, the three extremists at Weddell clearly had formidable backing to carry out their high-tech terrorist act. It took months of planning. Costs were high. And they obviously had in-depth support to obtain academic credentials, university stencils on their shipping boxes, shell companies for their Antarctic shipments, false websites, and dozens of other details necessary for the undertaking. There was nothing unsophisticated about their plan or the way they had executed it.

 

"And they would have succeeded," Kenner said, "except for that list George Morton obtained shortly before his death."

 

All of which suggested that if ELF was once a loose association of amateurs, it was no longer. Now it was a highly organized network--one that employed so many channels of communication among its members (e-mail, cell phones, radio, text messaging) that the network as a whole eluded detection. The governments of the world had long worried about how to deal with such networks, and the "netwars" that would result from trying to fight them.

 

"For a long time, the concept of a netwar was theoretical," Kenner said. "There were studies coming out of RAND, but nobody in the military was really focusing on it. The notion of a networked enemy, or terrorists, or even criminals was too amorphous to bother with."

 

But it was the amorphous quality of the network--fluid, rapidly evolving--that made it so difficult to combat. You couldn't infiltrate it. You couldn't listen in on it, except by accident. You couldn't locate it geographically because it wasn't in any one place. In truth, the network represented a radically new kind of opponent, and one that required radically new techniques to combat it.

 

"The military just didn't get it," Kenner said. "But like it or not, we're in a netwar right now."

 

"And how do you fight a netwar?" Evans said.

 

"The only way to oppose a network is with another network. You expand your listening posts. You decrypt around the clock. You employ techniques of networked deception and entrapment."