Page 76 of Protecting You
“In case he was recording your work.”
“I’m sure he was.” There were few cars on the road at this hour. She settled into the middle lane and set the cruise control. “Not just with a laptop camera, which I wasn’t supposed to know was on. I’m sure Charles was recording my every keystroke as well.”
“Do you think he can follow the breadcrumbs?”
“Maybe. Or someone else can.”
“Could you find them again? And if so?—?”
“Of course, and much faster than I did today. I figured Charles had no idea what I was doing, despite watching me all afternoon. I wasted a lot of time just poking around here and there.”
“So we just have to figure out what SJSS is?—”
“I know what it is.”
“You do? I figured you didn’t have any opportunity to look it up with him breathing down your neck all day.”
“It’s just a guess, but when Charles was explaining why he wanted me to dig into the code, he mentioned drones and how the company used them to provide overwatch. And then, right before Benson came at us?—”
“I heard it too. A drone. That’s how they found us.”
“Maybe they’re practicing controlling them or something. If I had to guess, I’d say SJSS manufactures drones, and I’d bet they manufacture them for the US military.”
“A defense contractor.”
“Exactly.”
“And you found not one buttwoexploits?” He sounded incredulous.
“Inexcusable. I don’t know who designed the software, but they should be fired.”
“And probably tried for treason.” By Callan’s serious tone, it wasn’t hyperbole.
“Meaning?”
“Why SJSS? How did Ghazi know the vulnerability was there?”
She considered the questions. “You’re saying you think someone left them there on purpose?”
“Seems logical. There are thousands of defense contractors. Sure, they don’t all manufacture drones, but I know more than one does. I think someone at SJSS left a couple of open doors. Maybe Ghazi paid the person to do it. Maybe he or she did it and then sold the information to the highest bidder. Either way, I’m betting someone made a big chunk of change.”
It would be easy, really. As long as the programmer didn’t tell the buyer where the vulnerabilities were, he could claim ignorance and incompetence, which were bad, but notgo-to-prison-for-treasonbad.
Whoever used those vulnerabilities would have to find them, and the finding of them would leave a trace, lending credence to the programmer’s claims.
Brilliant.
“The question is,” Callan said, “does SJSS design and build surveillance drones, or armed drones?”
“That’s above my pay grade.” But she had a guess.
She didn’t know much about weapons technology, but like anyone who watched the news, she’d seen the damage a drone strike could do.
Drones had been used to take out enemies for years. But alwaysover there.
What would happen if those drones were deployed in the US? Against American citizens?
Nobody would be safe.