The President Is Missing(73)



“What you’re telling us,” says Chancellor Richter, his voice shaky, “is that you’re going to steal the Internet from America.”

Augie looks at Richter, then at me.

“Yes, but that’s just the beginning,” I say. “Augie, tell them what the virus will do.”





Chapter

60



The virus is essentially what you call a wiper virus,” says Augie. “As the name suggests, a wiper attack erases—wipes out—all software on a device. Your laptop computers will be useful only as doorstops, your routers as paperweights. The servers will be erased. You will have no Internet service, that is surely true, but your devices will not work, either.”

Dark Ages.

Augie picks an apple out of the fruit bowl and tosses it in his hand. “Most viruses and attack codes are designed to infiltrate surreptitiously and steal data,” he explains. “Think of a burglar who sneaks in through a window and tiptoes quietly through a house. He wants to get in and out without detection. And if the theft is ever detected, it’s too late.

“Wiper attacks, on the other hand, are noisy. They want you to know what they’re doing. There’s no reason to hide. Because they want something from you. They are, essentially—well, not essentially—they are actually holding the contents of your device hostage. Pay the ransom or say good-bye to all your files. Of course, they have no particular desire to delete all your data. They just want your money.”

He opens his hand. “Well, our virus is a silent wiper attack. We have entered quietly and infiltrated to the maximum extent possible. But we do not want ransom. We want to delete all your files.”

“And backup files are no help,” says Dieter Kohl, shaking his head. “Because you have infected them as well.”

“Of course. The virus has been uploaded onto the backup files by the very act of backing up the systems on a routine basis.”

“They’re time bombs,” I say. “They’ve been hiding inside devices waiting for the moment they’re called into action.”

“Yes.”

“And that day is today.”

We look around the room at one another. I’ve had a couple of hours to digest this, having had all this explained to me by Augie on Marine One. I was probably wearing the same holy-shit expression on that helicopter that all of them are wearing right now.

“So you appreciate the consequences,” says Augie. “Fifty years ago, you had typewriters and carbon paper. Now you only have computers. Fifty years ago—in most cases, ten or fifteen years ago—you didn’t rely on connectivity to run so many of your operations. But now you do. It is the only way you operate. Take it away, and there is no fallback.”

The room is quiet. Augie looks down at his shoes, maybe out of respect for the grieving, or maybe out of apology. What he is describing is something that he had a big hand in creating.

“Give us an idea of…” Noya Baram rubs her temples.

“Oh, well.” Augie begins to stroll around again. “The examples are limitless. Small examples: elevators stop working. Grocery-store scanners. Train and bus passes. Televisions. Phones. Radios. Traffic lights. Credit-card scanners. Home alarm systems. Laptop computers will lose all their software, all files, everything erased. Your computer will be nothing but a keyboard and a blank screen.

“Electricity would be severely compromised. Which means refrigerators. In some cases, heat. Water—well, we have already seen the effect on water-purification plants. Clean water in America will quickly become a scarcity.

“That means health problems on a massive scale. Who will care for the sick? Hospitals? Will they have the necessary resources to treat you? Surgical operations these days are highly computerized. And they will not have access to any of your prior medical records online.

“For that matter, will they treat you at all? Do you have health insurance? Says who? A card in your pocket? They won’t be able to look you up and confirm it. Nor will they be able to seek reimbursement from the insurer. And even if they could get in contact with the insurance company, the insurance company won’t know whether you’re its customer. Does it have handwritten lists of its policyholders? No. It’s all on computers. Computers that have been erased. Will the hospitals work for free?

“No websites, of course. No e-commerce. Conveyor belts. Sophisticated machinery inside manufacturing plants. Payroll records.

“Planes will be grounded. Even trains may not operate in most places. Cars, at least any built since, oh, 2010 or so, will be affected.

“Legal records. Welfare records. Law enforcement databases. The ability of local police to identify criminals, to coordinate with other states and the federal government through databases—no more.

“Bank records. You think you have ten thousand dollars in your savings account? Fifty thousand dollars in a retirement account? You think you have a pension that allows you to receive a fixed payment every month?” He shakes his head. “Not if computer files and their backups are erased. Do banks have a large wad of cash, wrapped in a rubber band with your name on it, sitting in a vault somewhere? Of course not. It’s all data.”

“Mother of God,” says Chancellor Richter, wiping his face with a handkerchief.

“Surely,” Augie continues, “banks were some of the first companies to realize their vulnerability and to segregate some of their records onto separate systems. But we had already infected them. That was the first industry we targeted. So their segregated networks are just as compromised.

James Patterson & Bi's Books