Cyber Attack Read online

Page 2


  The reader gets an inside look at the morning security briefings in the White House Situation Room. Katie O’Shea becomes a respected rising star within the intelligence community while solidifying her role as a conduit for information to John Morgan.

  John Morgan continues to act as a world power broker. He manipulates geopolitical events for the financial gain of his wealthy associates, The Boston Brahmin. He carefully orchestrates the rise to national prominence of his daughter, Senator Abigail Morgan.

  As a direct descendant of the Founding Fathers, Morgan is sickened to watch America descend into collapse. Morgan believes the country can return to its former greatness. He recognizes drastic measures may be required. He envisions a reset of sorts, but what that entails is yet to be determined.

  Throughout The Loyal Nine, the Zero Day Gamers, make a name for themselves in the hacktivist community as their skills and capabilities escalate from cyber vandalism to cyber ransom to cyber terror. Professor Lau and his talented graduate assistants create ingenious methods of cyber intrusion. At times, they question the morality of their activities. But the ransoms they extract from their victims are too lucrative to turn away.

  The end game, the mission statement of the Zero Day Gamers, is succinct:

  One man’s gain is another man’s loss; who gains and who loses is determined by who pays.

  But who else loses in their deadly game? Cyber Attack begins …

  PART ONE

  Chapter 1

  May 8, 2016

  3:07 p.m.

  American Airlines Flight 129

  33,000 Feet

  Near St. Louis, Missouri

  “Good afternoon from the flight deck. This is Captain Randy Gray, and it is my honor to pilot our American Airlines Boeing 757 into Washington Dulles this afternoon. We have reached our cruising altitude of thirty-three thousand feet, after averting the initial turbulence caused by the area of weather north of the Dallas–Fort Worth metro area. With a little help from a tailwind, we should arrive on time at Washington Dulles International by two o’clock local time,” said Gray. “I will be turning off the Fasten Seat Belt signs to allow you free access to our newly enhanced cabin. Our flight attendants will begin cabin service shortly. As always, we thank you for flying American Airlines.”

  Gray began his career as a pilot in 1989 with Command Airways, a small regional carrier based in upstate New York. Initially checked out on the ATR 42, a Czech-made plane, Gray continued his training and became a highly respected pilot within the American Airlines ranks. The flight to Washington Dulles was routine. He shared the cockpit with First Officer William Applegate and his longtime friend Stacy Bird, a Frontier Air captain riding in the jump seat to D.C. after a hunting trip in West Texas.

  “Bill, Stacy and I would like to say hello to a friend in first class. Would you mind taking over for a bit?” asked Gray.

  Applegate had flown right seat with Gray in the past and had earned Gray’s confidence.

  “Absolutely, fellows, go ahead. She’s flyin’ herself anyway,” said Applegate.

  Gray and Bird unbuckled their harnesses and took a quick glance at the controls to confirm everything was in order. He and Bird slipped into the galley through the secured cockpit door, which automatically locked behind them.

  “Hi, guys,” said Karen Mosely, the chief flight attendant. “May I get you boys anything?”

  “I don’t think so, Karen, but thanks,” said Gray. “We’re gonna holler at 3B for a minute before we descend into Dulles.”

  Captains Gray and Bird strolled down the aisle behind her to greet a former Air Force buddy—when the aircraft took a sudden lurch upward. Gray grabbed the headrests of the seats on both sides of the aisle and ducked to look out the windows for a cause—clear blue skies. The plane quickly corrected, steadying for a moment before nosing downward into a steep descent. Gasps and screams erupted throughout the cabin.

  “Is your FO okay?” asked Bird.

  Gray knew what he meant by this question. Since the mysterious disappearance of Malaysia Flight 370 and the deliberate crash of Germanwings Flight 9525, every pilot looked at the members of their crew with a different set of eyes. He locked eyes with Bird, both of them sharing the same thought. If they’d hit turbulence, why didn’t Applegate activate the Fasten Seat Belt signs?

  “Back to the cockpit,” he said, edging brusquely by Captain Bird.

  Gray reached the intercom console next to the cockpit access door and pressed the pound key, praying for Applegate to respond.

  Chapter 2

  May 8, 2016

  3:07 p.m.

  The Hack House

  Binney Street

  East Cambridge, Massachusetts

  Andrew Lau stared intently at the iMac monitor array as Leonid Malvalaha deftly navigated the mouse. Malvalaha and Lau’s other longtime graduate assistant, Anna Fakhri, had continued in their new endeavor, despite the potential risk of criminal prosecution.

  Through the process of pen testing, Lau identified zero-day vulnerabilities in a computer network and took advantage of the security holes before the network’s IT department could find a solution. Once the vulnerability window was identified, the zero-day attack inserted malware into the system. The Game, as Lau called it, required the attacked entity to pay a ransom in exchange for a patch to their security. Prior to today, their hacks didn’t directly risk lives, though their February hack on behalf of the Las Vegas service employees union resulted in many unforeseen deaths. They were more selective in their project after Las Vegas, until now.

  “Malvalaha, run us through the hack,” said Lau, patting his trusted associate on the shoulder as he walked by.

  Lau’s core group consisted of Malvalaha, Fakhri and newcomer Herm Walthaus, who had proven himself by creating a cascading blackout of the Las Vegas power grid—no small feat. In a way, this was a team of misfits—although talented ones. They came from diverse backgrounds but shared a common goal of advancing their personal wealth.

  “We’re monitoring American Airlines Flight 129, which departed Dallas around forty-five minutes ago,” stated Malvalaha.

  His desk resembled the cockpit of a sophisticated aircraft, with six flat-panel monitors at his disposal. He pointed to the screen that displayed FlightAware, an online tool providing up-to-the-second statistics on any airline flight.

  “Flight 129 is currently over St. Louis and has adjusted its flight path directly to Washington Dulles airport. The aircraft is a Boeing 757-200, flying at approximately four hundred eighty knots, or five hundred and fifty miles per hour. Altitude thirty-three thousand feet.”

  “Tell us what your research has shown,” said Lau.

  Fakhri addressed her former professor, now hacking partner. “Since 9/11, there have been conspiracy theories surrounding the commandeering of the four aircraft by the terrorists,” said Fakhri. “One such theory is the aircraft was part of a false-flag attack initiated by the government. As the theory goes, based upon 2001 technology, NORAD—the North American Aerospace Defense Command—took control of the planes and purposefully crashed them into the World Trade Center and the Pentagon. The most prevalent reason cited for the false-flag operation is that the government wanted to justify initiating a war in the Middle East.”

  “For our purposes, we’re not interested in the false-flag theories,” said Malvalaha. “We focused on the concept of the remote takeover of a commercial aircraft. The technology exists, and it has, in fact, been used by the military in the past. Today, we will hack the aircraft via the flight management system, and make ourselves known.”

  “My father is a pilot for the 757-200 airframe,” said Walthaus. “We always had sophisticated flight simulators in our home growing up, and naturally they provided more entertainment for me than a PlayStation. I’ve never physically flown an aircraft, but I am an expert on the flight sim.”

  “I thought the FAA disproved the theories surrounding remote access of the onboard computers,” said Lau.
r />   “True to an extent,” said Fakhri. “A security consultant from Germany claimed to have hacked an aircraft using an Android telephone application. Later, one of his peers accessed the aircraft’s network by connecting through the in-flight entertainment system. He then used a modified version of Vortex software to compromise the cockpit’s system.”

  “When pressed for a response, the FAA was selective in its choice of words,” said Malvalaha. “They equivocated using the phrases described technique and using the technology the consultant has claimed.”

  Lau laughed after this statement.

  “The government has a lot of experience with misdirection,” said Lau. “Our most sophisticated operations were panned as impossible by the experts and their friends in the media—even after we successfully accomplished them!”

  “When researching this online, we discovered that American Airlines and Boeing launched a Bug Bounty program, offering a million free air-miles to the good guys—the white-hat hackers,” said Walthaus. “These ethical and conscientious hackers shared their findings online. We took their findings as a starting point and found the vulnerability window we were looking for.”

  “Continue,” said Lau.

  If Lau could publish his work, he would surely win the Carnegie Foundation award as Professor of the Year. Then again, he might be teaching second-grade math to his fellow inmates.

  “We’re going to use the government’s safeguard technology against them in two steps,” said Malvalaha.

  Lau turned his Red Sox cap backward—an unconscious signal that it was time to go to work.

  “First, we access the Boeing Uninterruptible Autopilot system,” said Fakhri. “The patent for the system was granted to Boeing in 2006, as a method of taking control of a commercial aircraft away from the pilot or flight crew in the event of a hijacking. The uninterruptible autopilot can be initiated by the pilots via onboard sensors or remotely through government satellite links.”

  “As far as the public knows, no Boeing aircraft has been retrofitted to include this technology, although rumors abound to the contrary,” said Walthaus. “After the disappearance of Malaysia Flight 370, the Prime Minister of Malaysia claimed Boeing or certain government agencies utilized the uninterruptible autopilot to down the aircraft. I’m sure he alluded to the CIA.”

  “An online search supported his theory,” said Fakhri. “We researched the rules issued by the FAA on the Federal Register website and found a Special Condition granted to Boeing for the Model 777 aircraft, allowing the installation of the uninterruptible autopilot software.”

  “But we’re tracking a 757,” said Lau.

  “Yes, we are,” said Walthaus. “The FAA, in its action, authorized Boeing to conduct tests of the new system in six of its 757 aircraft, plus the system was initially designed for the 757. We researched all of the top contractors who work under Boeing’s Defense division. Typically, new technology ends up in the hands of our Defense Department.”

  “We found the company hired to install the system—Alion Science and Technology,” said Fakhri. “Their technology solutions sector manager, Robert Hurt, gave a presentation at a Raytheon trade show last year, which was published online. After some digging, we have the details on the six 757 aircraft participating in the program.”

  “American Airlines Flight 129 is one of them,” said Malvalaha.

  Chapter 3

  May 8, 2016

  3:12 p.m.

  American Airlines Flight 129

  33,000 Feet

  Near Evansville, Indiana

  Gray exhaled deeply when the green light on the keypad illuminated. He and Bird quickly entered the cockpit and slammed the door shut.

  “What the hell is going on, Bill!” exclaimed Gray as he climbed into his seat and strapped in. Bird positioned himself in the jump seat. Gray quickly examined the onboard computer monitor and activated the Fasten Seat Belt sign.

  “Talk to me, Billy!”

  “The controls are unresponsive,” muttered Applegate. “We are in a rapid descent, and the controls will not respond to any of my commands.”

  “You have to call a Mayday, Randy,” said Bird.

  Gray looked at the altitude control indicator. They were in a descent, but not an insurmountable one—yet. The altimeter read twenty-four thousand feet.

  “Billy, are you with me?” asked Gray.

  Applegate barely muttered a response.

  “Billy, why don’t you trade seats with Captain Bird,” said Gray. “You need a break, and Stacy is an experienced captain. Come on now, let Stacy swap with you.”

  Applegate slowly removed his seat harness and traded seats with Bird, who immediately leaned across the center console.

  “Should I escort him off the flight deck?” asked Bird.

  “He’s just shook up,” said Gray. “Call in the Mayday, and let me figure this out.”

  Bird’s attempt to access the onboard computer proved fruitless. The keyboard was unresponsive.

  “We’re one hundred miles east of St. Louis,” said Gray. “Try SDF. Wait, not Louisville. We’ll need Indianapolis Center.”

  “Mayday, Mayday, Mayday, Indianapolis Center. American Airlines one-two-niner heavy declaring an emergency,” said Bird. “I say again. Mayday, Mayday, Mayday, Indianapolis ZID. American Airlines one-two-niner heavy declaring an emergency.”

  “American one-two-niner, this is Indianapolis Center. We copy your Mayday,” said a representative of the Indianapolis Air Route Traffic Control Center. The primary responsibility of Indianapolis Center was to monitor and separate flights within the seventy-three thousand square miles it covered in the Midwest. Today, a new task presented itself. “What is the nature of your emergency?”

  “Indianapolis Center, onboard controls are unresponsive. We are under power and in a steady descent now passing twenty-two thousand feet,” said Bird. “All other flight deck functions appear normal.”

  “Roger, American one-two-niner. All stations. All stations. Indianapolis Center. Mayday situation in progress. Stop transmitting. Repeat. Mayday situation in progress. Stop all transmissions.”

  Gray sat back in the pilot’s seat and looked around the Orbiter flight deck, searching for clues—and answers. Nothing made sense. The entire console appeared normal. The monitors functioned properly, displaying their current flight parameters; however, the keyboard for the onboard computer continued to be unresponsive.

  “We’re leveling off,” said Bird, pointing at the altitude control indicator. “Son of a bitch, we’re holding steady at twenty K. I’ve never seen anything like this.”

  Neither had Gray.

  “American one-two-niner, this is Indianapolis Center. Boeing technical team is en route, and Homeland Security has been notified.”

  “Roger, Indianapolis Center,” said Bird. “Be advised, altitude has leveled off at twenty thousand feet. Steady on original course.”

  “American one-two-niner. Indianapolis Center. Roger.”

  “Homeland Security?” asked Bird.

  Gray understood the gravity of their situation. If he couldn’t demonstrate positive control of the aircraft, it would not be allowed to reach Washington.

  Chapter 4

  May 8, 2016

  3:13 p.m.

  The Hack House

  Binney Street

  East Cambridge, Massachusetts

  “Now that we’ve entered the plane’s Wi-Fi system, it’s necessary to hack through the firewall of the aircraft communications addressing and reporting system, or ACARS,” said Malvalaha. “This will give us access to the plane’s onboard computer system and the uploaded flight management system data.”

  Lau watched intently as his protégé navigated through the plane’s servers.

  “You’re in!” exclaimed Walthaus. “My turn, Leo.”

  Malvalaha relinquished his chair to Walthaus, whose only experience with an airplane was playing on his father’s computer as a teen.

  “The aircraft is flyin
g on autopilot,” said Fakhri. “That’s good. Right about now, the pilots are relaxed and completely unaware of our presence.”

  “First, I will initiate the uninterruptible autopilot system, which will prevent the flight crew from interfering with us,” said Walthaus. “These controls are considered fly-by-wire, which have replaced the conventional manual controls of the aircraft with an electronic interface. The yokes that control the aircraft may provide certain inputs into a flight-control system, but with the uninterruptible autopilot system initiated, the crew can flail around all they want, and their actions will not be recognized.

  “First, we’ll adjust the altitude to twenty-six thousand feet—just to let them know we’re flying their plane,” he continued. “Watch here.”

  Walthaus pointed to FlightAware, and Lau turned his attention to the screen. When Walthaus refreshed the screen, the airspeed had declined, along with the aircraft’s altitude.

  “Whoa!” exclaimed Walthaus. “Sorry about that! It’s hard to adjust the controls using a mouse and its cursor. I just took the plane into a dive and probably scared the shit out of everybody on board. Let me level this off at twenty thousand feet.”

  “Is that too low?” asked Lau.

  “No, eighteen thousand feet is considered the upper end of an air traffic’s transitional level, where the most activity takes place,” said Walthaus. “We’ll maintain this altitude and course for a few minutes, to give everyone on board an opportunity to catch their breath. Then we’ll climb back to thirty-three thousand feet.”

  Ordinarily, the Zero Day Gamers had a profit motive. The hijack by hacking of the American Airlines flight was a test. Today, they would determine whether the hack could be achieved, in addition to gauging the government’s response.

 

    Geostorm The Collapse: A Post Apocalyptic EMP Survival Thriller (The Geostorm Series Book 3) Read onlineGeostorm The Collapse: A Post Apocalyptic EMP Survival Thriller (The Geostorm Series Book 3)Doomsday Apocalypse Read onlineDoomsday ApocalypseNuclear Winter Desolation: Post Apocalyptic Survival Thriller (Nuclear Winter Series Book 5) Read onlineNuclear Winter Desolation: Post Apocalyptic Survival Thriller (Nuclear Winter Series Book 5)Economic Collapse (Prepping for Tomorrow Book 2) Read onlineEconomic Collapse (Prepping for Tomorrow Book 2)Nuclear Winter Armageddon Read onlineNuclear Winter ArmageddonNuclear Winter Devil Storm Read onlineNuclear Winter Devil StormVirus Hunters 3: A Medical Thriller Read onlineVirus Hunters 3: A Medical ThrillerDoomsday Civil War: A Post-Apocalyptic Survival Thriller (The Doomsday Series Book 5) Read onlineDoomsday Civil War: A Post-Apocalyptic Survival Thriller (The Doomsday Series Book 5)Asteroid Destruction Read onlineAsteroid DestructionGeostorm the Shift Read onlineGeostorm the ShiftAsteroid Discovery Read onlineAsteroid DiscoveryVirus Hunters 2: A Medical Thriller Read onlineVirus Hunters 2: A Medical ThrillerGeostorm The Shift: A Post-Apocalyptic EMP Survival Thriller (The Geostorm Series Book 1) Read onlineGeostorm The Shift: A Post-Apocalyptic EMP Survival Thriller (The Geostorm Series Book 1)Asteroid Diversion Read onlineAsteroid DiversionNuclear Winter Devil Storm: Post Apocalyptic Survival Thriller (Nuclear Winter Series Book 4) Read onlineNuclear Winter Devil Storm: Post Apocalyptic Survival Thriller (Nuclear Winter Series Book 4)Geostorm The Pulse: A Post Apocalyptic EMP Survival Thriller (The Geostorm Series Book 2) Read onlineGeostorm The Pulse: A Post Apocalyptic EMP Survival Thriller (The Geostorm Series Book 2)Yellowstone: Survival: A Post-Apocalyptic Survival Thriller (The Yellowstone Series Book 4) Read onlineYellowstone: Survival: A Post-Apocalyptic Survival Thriller (The Yellowstone Series Book 4)Nuclear Winter First Strike: Post-Apocalyptic Survival Thriller Read onlineNuclear Winter First Strike: Post-Apocalyptic Survival ThrillerNuclear Winter Whiteout Read onlineNuclear Winter WhiteoutDoomsday Anarchy Read onlineDoomsday AnarchyPandemic: Level 6: A Post Apocalyptic Medical Thriller Fiction Series (The Pandemic Series Book 3) Read onlinePandemic: Level 6: A Post Apocalyptic Medical Thriller Fiction Series (The Pandemic Series Book 3)Martial Law Read onlineMartial LawOdessa Reborn: A Terrorism Thriller (Gunner Fox Book 4) Read onlineOdessa Reborn: A Terrorism Thriller (Gunner Fox Book 4)New Madrid Earthquake Read onlineNew Madrid EarthquakeBeyond Borders: Post Apocalyptic EMP Survival Fiction (The Lone Star Series Book 2) Read onlineBeyond Borders: Post Apocalyptic EMP Survival Fiction (The Lone Star Series Book 2)The Blackout Series (Book 3): Turning Point Read onlineThe Blackout Series (Book 3): Turning PointPatriot's Farewell: A Political Thriller Fiction Series (Boston Brahmin Political Thrillers Book 7) Read onlinePatriot's Farewell: A Political Thriller Fiction Series (Boston Brahmin Political Thrillers Book 7)Lines in the Sand_Post Apocalyptic EMP Survival Fiction Read onlineLines in the Sand_Post Apocalyptic EMP Survival FictionThe Mechanics: A Post-Apocalyptic Fiction Series Read onlineThe Mechanics: A Post-Apocalyptic Fiction SeriesThe Loyal Nine Read onlineThe Loyal NineAxis of Evil Read onlineAxis of EvilAxis of Evil: Post Apocalyptic EMP Survival Fiction (The Lone Star Series Book 1) Read onlineAxis of Evil: Post Apocalyptic EMP Survival Fiction (The Lone Star Series Book 1)Lines in the Sand: Post Apocalyptic EMP Survival Fiction (The Lone Star Series Book 3) Read onlineLines in the Sand: Post Apocalyptic EMP Survival Fiction (The Lone Star Series Book 3)Odessa Strikes Read onlineOdessa StrikesThe Blackout Series (Book 4): Shiloh Ranch Read onlineThe Blackout Series (Book 4): Shiloh RanchHornet's Nest: A Post Apocalyptic EMP Survival Fiction Series (The Blackout Series Book 5) Read onlineHornet's Nest: A Post Apocalyptic EMP Survival Fiction Series (The Blackout Series Book 5)Yellowstone: Fallout: A Post-Apocalyptic Survival Thriller (The Yellowstone Series Book 3) Read onlineYellowstone: Fallout: A Post-Apocalyptic Survival Thriller (The Yellowstone Series Book 3)Electromagnetic Pulse Read onlineElectromagnetic PulseTexas Strong: Post Apocalyptic EMP Survival Fiction (The Lone Star Series Book 4) Read onlineTexas Strong: Post Apocalyptic EMP Survival Fiction (The Lone Star Series Book 4)Fifth Column_Post Apocalyptic EMP Survival Fiction Read onlineFifth Column_Post Apocalyptic EMP Survival FictionPatriot's Farewell Read onlinePatriot's FarewellTexas Strong_Post Apocalyptic EMP Survival Fiction Read onlineTexas Strong_Post Apocalyptic EMP Survival FictionPandemic: The Innocents: A Post-Apocalyptic Medical Thriller Fiction Series (The Pandemic Series Book 2) Read onlinePandemic: The Innocents: A Post-Apocalyptic Medical Thriller Fiction Series (The Pandemic Series Book 2)Shiloh Ranch: A Post Apocalyptic EMP Survival Fiction Series (The Blackout Series Book 4) Read onlineShiloh Ranch: A Post Apocalyptic EMP Survival Fiction Series (The Blackout Series Book 4)Cyber Attack Read onlineCyber AttackBeyond Borders Read onlineBeyond BordersChoose Freedom: A Post-Apocalyptic Fiction Series (The Boston Brahmin Book 6) Read onlineChoose Freedom: A Post-Apocalyptic Fiction Series (The Boston Brahmin Book 6)False Flag Read onlineFalse FlagTurning Point: A Post Apocalyptic EMP Survival Fiction Series (The Blackout Series Book 3) Read onlineTurning Point: A Post Apocalyptic EMP Survival Fiction Series (The Blackout Series Book 3)Nuclear Winter First Strike Read onlineNuclear Winter First StrikePandemic: Beginnings: A Post-Apocalyptic Medical Thriller Fiction Series (The Pandemic Series Book 1) Read onlinePandemic: Beginnings: A Post-Apocalyptic Medical Thriller Fiction Series (The Pandemic Series Book 1)Devil's Homecoming: A Post Apocalyptic EMP Survival Fiction Series (The Blackout Series Book 6) Read onlineDevil's Homecoming: A Post Apocalyptic EMP Survival Fiction Series (The Blackout Series Book 6)The Blackout Series (Book 6): Devil's Homecoming Read onlineThe Blackout Series (Book 6): Devil's HomecomingYellowstone: Inferno: A Post-Apocalyptic Survival Thriller (The Yellowstone Series Book 2) Read onlineYellowstone: Inferno: A Post-Apocalyptic Survival Thriller (The Yellowstone Series Book 2)Fifth Column: Post Apocalyptic EMP Survival Fiction (The Lone Star Series Book 5) Read onlineFifth Column: Post Apocalyptic EMP Survival Fiction (The Lone Star Series Book 5)Yellowstone: Hellfire: A Post-Apocalyptic Survival Thriller (The Yellowstone Series Book 1) Read onlineYellowstone: Hellfire: A Post-Apocalyptic Survival Thriller (The Yellowstone Series Book 1)The Blackout Series (Book 2): Zero Hour Read onlineThe Blackout Series (Book 2): Zero HourSuicide Six: Post Apocalyptic EMP Survival Fiction (The Lone Star Series Book 6) Read onlineSuicide Six: Post Apocalyptic EMP Survival Fiction (The Lone Star Series Book 6)Suicide Six_Post Apocalyptic EMP Survival Fiction Read onlineSuicide Six_Post Apocalyptic EMP Survival FictionZero Hour: A Post-Apocalyptic EMP Survival Fiction Series (The Blackout Series Book 2) Read onlineZero Hour: A Post-Apocalyptic EMP Survival Fiction Series (The Blackout Series Book 2)Beyond Borders_Post Apocalyptic EMP Survival Fiction Read onlineBeyond Borders_Post Apocalyptic EMP Survival FictionPandemic: Quietus: A Post-Apocalyptic Dystopian Fiction Series (The Pandemic Series Book 4) Read onlinePandemic: Quietus: A Post-Apocalyptic Dystopian Fiction Series (The Pandemic Series Book 4)36 Hours: A Post-Apocalyptic EMP Survival Fiction Series Read online36 Hours: A Post-Apocalyptic EMP Survival Fiction SeriesCyber Warfare Read onlineCyber Warfare