The President Is Missing(71)



“To avoid…what?” asks Richter. “Do we have a sense of the possible harm? We can all speculate. We can all conjure up nightmare scenarios. What does the boy say?”

It’s a good segue, one of the principal reasons I’ve asked the German chancellor here today.

I turn to Alex, standing in the far corner of the living room. “Alex, bring Augie up here,” I say. “You all should hear this for yourselves.”





Chapter

59



Augie stands before the world leaders present in the living room, fatigued and frazzled, wearing ill-fitting clothes we found for him after a shower, overwhelmed in every way by the events of the last twelve hours. Yet this young man seems not even slightly fazed by the company he is keeping. They are men and women of tremendous accomplishments, with incredible power at their fingertips, but in this arena, he is the teacher, and we are the pupils.

“One of the great ironies of the modern age,” he begins, “is that the advancements of mankind can make us more powerful and yet more vulnerable at the same time. The greater the power, the greater the vulnerability. You think, rightly so, that you are at the apex of your power, that you can do more things than ever before. But I see you at the peak of your vulnerability.

“The reason is reliance. Our society has become completely reliant on technology. The Internet of Things—you are familiar with the concept?”

“More or less,” I say. “The connection of devices to the Internet.”

“Yes, essentially. And not just laptop computers and smartphones. Anything with a power switch. Washing machines, coffeemakers, DVRs, digital cameras, thermostats, machine components, jet engines—the list of things, large and small, is almost endless. Two years ago, there were fifteen billion devices connected to the Internet. Two years from now? I have read estimates that the number will be fifty billion. I have heard one hundred billion. The layperson can hardly turn on a television anymore without seeing a commercial about the latest smart device and how it will do something you never would have thought possible twenty years ago. It will order flowers for you. It will let you see someone standing outside the front door of your home while you are at work. It will tell you if there is road construction up ahead and a faster route to your destination.”

“And all that connectivity makes us more vulnerable to malware and spyware,” I say. “We understand that. But I’m not so concerned, right at the moment, about whether Siri will tell me the weather in Buenos Aires or whether some foreign nation is spying on me through my toaster.”

Augie moves about the room, as if lecturing on a large stage to an audience of thousands. “No, no—but I have digressed. More to the point, nearly every sophisticated form of automation, nearly every transaction in the modern world, relies on the Internet. Let me say it like this: we depend on the power grid for electricity, do we not?”

“Of course.”

“And without electricity? It would be chaos. Why?” He looks at each of us, awaiting an answer.

“Because there’s no substitute for electricity,” I say. “Not really.”

He points at me. “Correct. Because we are so reliant on something that has no substitute.”

“And the same is now true of the Internet,” says Noya, as much to herself as to anyone else.

Augie bows slightly. “Most assuredly, Madam Prime Minister. A whole host of functions that were once performed without the Internet now can only be performed with the Internet. There is no fallback. Not anymore. And you are correct—the world will not collapse if we cannot ask our smartphones what the capital of Indonesia is. The world will not collapse if our microwave ovens stop heating up our breakfast burritos or if our DVRs stop working.”

Augie paces a bit, looking down, hands in his pockets, every bit the professor in midlecture.

“But what if everything stopped working?” he says.

The room goes silent. Chancellor Richter, raising a cup of coffee to his lips, freezes midstream. Noya looks like she’s holding her breath.

Dark Ages, I think to myself.

“But the Internet is not as vulnerable as you are saying,” says Dieter Kohl, who may not be Augie’s equal on these matters but is far more knowledgeable than any of the elected officials in the room. “A server may become compromised, slowing or even blocking traffic, but then another one is used. The traffic routes are dynamic.”

“But what if every route were compromised?” Augie asks.

Kohl works that over, his mouth pursed as if about to speak, suspended in that position. He closes his eyes and shakes his head. “How would…that be possible?”

“It would be possible with time, patience, and skill,” says Augie. “If the virus was not detected when it infiltrated the server. And if it stayed dormant after infiltration.”

“How did you infiltrate the servers? Phishing attacks?”

Augie makes a face, as if insulted. “On occasion. But primarily, no. Primarily we used misdirection. DDoS attacks, corruption of the BGP tables.”

“Augie,” I say.

“Oh, yes, I apologize. Speak English, you said. Very well. A DDoS attack is a distributed denial-of-service attack. A flood attack, essentially, on the network of servers that convert the URL addresses we type into our browsers into IP numbers that Internet routers use.”

James Patterson & Bi's Books