leaving this room until we have a plan for moving forward. I need all of you working togetherâÂevery agency, every organization, from this moment, is going to make this their top priority. What weâre talking about here is escalation. This is terrorism of a kind we havenât seen before and weâre not going to let it get out of control. The world needs to know we wonât allow this to happen again. First things first, though. We need to know whoâs responsible.â He turned and looked at one of the civiliansâÂone Chapel didnât recognize. âCIA. What groups do we think are even capable of something like this? Hijacking a PredatorâÂcould al-ÂQaeda do that? IS? The Khorasan Group?â
The civilian grimaced. âTheyâve never done anything like it before. They stick to low-Âtech methods, mostly. But we canât rule them out. A Predator is like any other machine. Itâs designed to accept input from a remote user and it doesnât care who that user is as long as theyâre broadcasting on the right frequency, with the right encryption. Itâs not smart enough to ask why itâs being told to do something.â
âBut our encryption is the best in the world,â the SecDef insisted. Norton looked to another man halfway across the room. âNSA. Am I wrong in believing that?â
âNo,â the NSA director replied, though he looked a little dubious. âOur stuff should be uncrackable. But we canât rule out the possibility that some very smart hacker in, say, Indonesia or Taiwan discovered a new exploit or just got lucky orâÂâ
Norton shook his head. âIâm hearing a lot of qualifiers. A lot of âwe canât rule this out.â I want real answers. Have we picked up any chatter about this? Anybody talking about planning an operation with a Predator drone, anyone discussing a cargo container full of radioactive waste?â
âNothing,â the NSA man said. âThe terror groups have been quiet lately. Most of what we hear is about money problems and recruiting. Nothing like this.â
âAt least thatâs definite,â Norton replied. âOkay. Letâs hear from the military. Who did this Predator belong to?â
âThat would be us,â an air force general said. âIt was one of our fleet. Iâve taken the liberty of tracking it through the system, and I can have a document on your desk tomorrow showing every individual whoâs ever flown it, maintained it, or inspected it. I can tell you right now that itâs been sitting in a hangar for the last year, under armed guard the whole time. It hadnât been modified or repaired for nine months. Nobody physically altered it.â
âWhat was it doing in the air?â
The general looked like he very much wanted to shrug. But he must have known this wasnât the time to admit he didnât know something. âIt was signed out last night, by official e-Âmail. Fueled up and launched just after midnight, eastern time.â
âBy whom? Who signed it out?â Norton demanded.
âThe CIA,â the general replied.
That started some real shouting. ÂPeople visibly moved away from the CIA director, who kept waving his hands in the air demanding quiet, insisting he had a response.
âI guarantee you we did not sign out that drone,â he shouted over the babble. âWhatever paperwork the air force got was a forgery. Drone operations have to cross my desk, and I saw nothing like this. Whoever these terrorists are, they have access to CIA watermarks, thatâs all, they haveâÂâ
âSir,â a navy admiral said, raising his voice, âif we canât figure out who it was, why donât we just hit them allâÂpunitive raids, keep up the pressure until one of the terrorist groups cracksâÂâ
âThatâs going to kill our reputation
Elizabeth Amelia Barrington