Stephen Coonts' Deep Black

Stephen Coonts' Deep Black

Stephen Coonts' Deep Black

Stephen Coonts' Deep Black

eBook

$9.99 

Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

In Stephen Coonts' Deep Black, cowritten with Jim DeFelice, a spy plane gathering data on a new Russian weapon is blown out of the sky by a mysterious MiG. Is it an accident or the start of the next world war? One U.S. agency has what it takes to find out-the National Security Agency and its covert operations team: Deep Black.

Working for the NSA, ex-Marine sniper Charlie Dean is dispatched to Russia, hooking up with former Delta Force trooper Lia DeFrancesca to find out what happened to the plane. The Deep Black team stumbles across an even more alarming secret-a plot to assassinate the Russian president and overthrow the democratic government by force. The coup could have dire consequences for Russia and the world. With no clearance from the government it's called on to protect, the National Security Agency goes to war. But before Lia and Dean can unravel the conspiracy, they learn that one of the spy plane's passengers-an NSA techie-survived the crash. Critical information could fall into enemy hands. And that enemy is playing to the death.


Product Details

ISBN-13: 9781429954730
Publisher: St. Martin's Publishing Group
Publication date: 12/21/2010
Series: Deep Black , #1
Sold by: Macmillan
Format: eBook
Pages: 368
Sales rank: 151,155
File size: 571 KB

About the Author

About The Author

Stephen Coonts is the author of the bestselling Deep Black, Jake Grafton, Tommy Carmellini, and Saucers series, among many others. His first novel, Flight of the Intruder, spent over six months on The New York Times bestseller list. Coonts served eight years in the Navy, including two cruises on the USS Enterprise during the last years of the Vietnam War.

Best known for American Sniper, Jim DeFelice is the author of over a dozen New York Times bestsellers and a host of other books. His standalone novels include Leopard’s Kill and The Helios Conspiracy, and he has collaborated with other bestselling authors including Richard Marcinko and Larry Bond.


STEPHEN COONTS is the New York Times bestselling author of more than thirty novels that have been translated and published around the world. His books include The Disciple, The Assassin, and the Deep Black and Saucers series, among many other bestsellers. A former naval aviator and Vietnam combat veteran, he is a graduate of West Virginia University and the University of Colorado School of Law. He lives in Colorado.
JIM DeFELICE is the co-author of Chris Kyle’s #1 New York Times bestseller American Sniper and many other New York Times bestsellers.

Date of Birth:

July 19, 1946

Place of Birth:

Morgantown, West Virginia

Education:

B.A., West Virginia University, 1968; J.D., University of Colorado, 1979

Read an Excerpt

Stephen Coonts' Deep Black


By Stephen Coonts, Jim DeFelice

St. Martin's Press

Copyright © 2003 Stephen Coonts
All rights reserved.
ISBN: 978-1-4299-5473-0


CHAPTER 1

Taxiing on the ramp at Novosibirsk in southwestern Siberia, Dashik Flight R7 looked like any other tired Russian jet, weighed down by creditors as well as metal fatigue. Anyone glancing at the exterior of the Ilyushin IL-62 as it bumped toward the runway would easily see that the craft was preparing for its last miles. Aeroflot's faded paint scheme was still visible on the fuselage though the Russian airline hadn't operated or even owned the craft for nearly a decade and a half. Shiny metal patches lined the lower wing and fuselage where repairs had been made, and there was a rather conspicuous dent next to the forward door on the right side of the plane. Though converted from passenger to cargo service aeons ago, the plane retained its windows. About half had been painted over halfheartedly; the rest were still clear, though a third of these were blocked by shades, most stuck at odd angles. A close inspection of the four Soloviev D-30K engines below the tail would reveal that they had recently been serviced, but that was clearly an anomaly — the tires on the landing gear had less tread than the average Hot Wheels car.

According to the details of the flight records filed with the authorities, the onetime airliner was now used primarily to fly parts west of the Ural Mountains. Tonight its manifest showed three crates of oil pumps and related machinery were aboard. They were bound for Vokuta, from which they would be trucked to their final destination, about thirty miles farther east. The crates had been duly inspected, though as usual the inspector had been somewhat more interested in the unofficial (though definitely mandatory) fee for his services than in the crates themselves.

Perhaps because of the weather, the inspection had been conducted in the airport cargo handling area before the plane was loaded. Had the inspector ventured into the aircraft itself, he would have found nothing unusual, except for the sophisticated glass wall of flight instruments lining the cockpit. Such improvements were out of place in an aged and obviously worthless craft, though since the inspector knew little about airplanes it was doubtful he would have drawn any such conclusion. Nor would he have been surprised to find that the door on the compartment aft of the flight deck could not be opened. Such doors and compartments were the rule rather than the exception. On discovering the door, his next step would have been to elicit an additional fee for overlooking it.

Dashik R7's locked compartment held neither mafiya cash nor drugs, as the inspector would have guessed. Instead, a small fold-down seat and a long metal counter dominated the space; on the countertop were two large video screens, stacked one atop the other. They looked as if they had been taken from a home theater setup, but in fact the thick bundle of fiber-optic cables extruding from the sides was attached to a computer system whose parallel processing CPUs and flash-SRAM memory lined the full floor of the cargo bay. This computer system had no keyboard, accepting its commands through a special headset that could be used by only one person in the world. The beaked band at the top of the headset included sensors that analyzed both the operator's voice and retinas; it would only communicate with the computer if they matched the configuration hard-wired into the computer's circuits.

By no coincidence at all, the man the headset had been designed for sat in the locked compartment, waiting patiently as Dashik R7 gunned its finely tuned and subtly modified Solovievs a touch more aggressively than a casual observer might have expected. For the first thirty yards down the runway it might properly be described as lumbering; from that point on, however, it moved with the efficiency of a well-tuned military jet, leaping rather than faltering into the sky.

Stephan Moyshik — more accurately known as Stephen Martin, though only to his ultimate employer — breathed slowly and deeply as the plane took off, willing his consciousness to remain locked in the Zen meditation exercise he had practiced for months. The Dramamine he had taken a half hour ago calmed his stomach, but there was no cure for the claustrophobic feel of the small compartment, nor the sensation of helplessness that crept across his shoulders as the Ilyushin climbed. Martin knew that his anxiety would pass; it always did. But knowing such a thing could not completely erase his fear. When Martin had come to Russia at the start of the Wave Three missions three months before, he felt mildly agitated at takeoff and landing. Now his heart pounded and sweat poured from every part of his skin, his breath the erratic cacophony of a dozen pneumatic drills firing at once. Ironically, he was himself a pilot, though not qualified on multiengined craft.

Martin spent the first twenty-seven minutes after takeoff tonight in high panic. Two large blades, one black, one white, twisted in the middle of his chest, their dagger points entwined around his heart.

Twenty-eight minutes after takeoff, a low tone sounded in his headset. Martin took a long breath, then reached his fingers to adjust the mouthpiece. His fingers trembled so badly that he had a great deal of difficulty setting it in place.

Yet once it was there, the panic ebbed. "Readying startup," he told the pilot over the interphone.

"Roger that. We are fifteen minutes from Alpha."

Martin looked up at the blank screens for a moment, then reached to the counter and placed his hand on a highly polished rectangle at the right. The sensors below read his fingerprints; red dots appeared in the middle of the screens.

"Command: System activate. Diagnostics One," said Martin.

The computer did not acknowledge directly. Instead, a pink light flickered at the center of both screens, and then their dark surfaces flared with a barrage of color. A mosaic of different shades — actually a diagnostic screen for the video components — materialized in mirror images, one atop the other. Martin settled his hands into his lap, thumbs together over his thighs. The computer spent the next five minutes testing itself and the discrete-burst communication system it used to communicate with the outside world. When that was done, it turned its diagnostics to the intricate grid embedded in its wings, fine-tuning the induction device so that it could pick up the presence of a discarded compass magnet at 50,000 feet.

The computer had to get considerably closer to the ground to pick up the magnetic patterns on a spinning disk drive — 15,000 feet, though they would fly at 12,000 to give themselves a margin for error.

"Alpha in zero nine," said the pilot just as the tests were complete.

"Yes," said Martin, his eyes focused on the pattern of colored dots on the top screen. The computer could easily filter very strong magnetic fields as Dashik R7 passed over them; the great difficulty was dealing with subtle sources. For some reason, discarded telephones presented the greatest difficulty; all of Martin's tweaks — delivered as voice commands and prods on the touch-sensitive screens — barely screened 50 percent of the devices from their net. Given that they had a limited capacity to transmit the data to the collection satellites above, and the fact that they had to fly without arousing suspicion, every mistaken capture was costly. On their last flight, Martin had recorded the data of a fax machine apparently belonging to a dentist; he suspected that colleagues would now refer to him as "the Periodontist" in derision.

Martin pointed to a magenta cluster at the right-hand side of the screen and made a circular motion with his index finger. The cluster zoomed into a white-lined box with a black legend at the edge — a twenty-megabyte hard drive, probably belonging to a laptop. Had they been transmitting, a tap in the middle of the cluster would have uploaded all of the magnetic patterns into the capture satellite above; from there it would have been beamed back to the U.S. for analysis. Within twelve or fifteen hours, depending on the shift, the contents of the drive would be available for detailed inspection.

Satisfied that he had the gear tuned as well as he could, Martin ordered the computer to display a sitrep map on the lower screen. The map, using GPS input and an extensive map library updated by daily satellite input, showed Dashik R7's position on a simulated 3-D image as it approached the Iachin commercial complex, the small R and R facility west of Kargasok operated by Voyska PVO that was tonight's target. Martin was neither privy to the intercept nor briefed on the precise significance of his target, but he would have been dull indeed not to know what the high-tech NSA sniffer was looking for. The Russians had lately been trying to perfect their long-range laser technology, creating a weapon that could conceivably replace conventional antiair and perhaps antisatellite missiles. Two complexes containing laser directors — the units that actually emitted the high-energy beam — either were being constructed or had been constructed east of the Urals. Not only had Martin seen them on the satellite images included in the flight briefs, but also their instructions included strict language to avoid those areas. The facility they were targeting was located about halfway between them; he assumed that the computers were connected by dedicated fiber-optic cable to the facilities and contained information about the tests. (Had the connection been more conventional, it could have been penetrated by easier means.)

The sitrep showed Dashik R7 over a wasteland about two minutes from the stretched elliptical cone where information could be swept into the net. Martin raised his head from the screen, a wave of relief flooding over him. It was downhill from here, just a matter of punching buttons.

"Shit," said the copilot over the interphone. "Company."

"Bogey at twenty thousand feet, coming right over us," explained the pilot, his voice considerably calmer than the copilot's. "MiG-29 radar active. No identifier."

Martin ignored them, concentrating on the top video screen. He pointed to a bright red cluster in the left-hand quadrant. This belonged to a rather large disk array a few miles from their target area. It had the sort of profile he'd seen from units used by banks for financial records, but since their briefing hadn't identified any large computer systems here — and the sitrep showed they were still over a largely unpopulated area — Martin decided it was worth starting the show a little early.

"Command: Transmit. Command: Configuration Normal One."

The computer gave him a low tone to confirm that it had complied.

The copilot drowned it out. "That son of a bitch is targeting us!"

"Keep your diaper clean," said the pilot. "He's only going to hit us for a bribe. He's alone. He's obviously a pirate. Hail him. Tell him we'll agree to terms. His squadron probably ran out of whore money — or jet fuel."

"Nothing on the radio. He thinks we don't know he's here."

"Hail him."

Martin once more tried to ignore the conversation. Air pirates were rarely encountered by Dashik since they freely paid the protection fees in advance, but there were always new groups muscling in. Legitimate PVO units obtained quite a bit of "supplemental funding" through their Air Security fees; occasional freelancers got in the act for a few weeks or as long as they could get away with it. The agreement to make a certain credit card payment to a specific account upon landing generally precluded being diverted; if that didn't work, naming a specific PVO general as their protector inevitably got the pirate to break off. Russia's chaos had grown considerably over the past few months; the country's economy, never strong, was once more teetering. Part of the problem had to do with an increase in military expenditures to develop new weapons and deal with insurgencies in the southern parts of the country, but Martin thought the country would have been far better off putting the money into things such as housing or even subsidizing agriculture.

Not that anyone would have been interested in his opinion.

The red clusters on the video screen pulsated as their contents were transmitted. A white dialogue box opened to their right, the computer sniffing a significant sequence. A run of hexadecimals shot across the screen; Martin tapped them to stop the flow of numbers, then pointed below the box.

"Command: Open Delphic Fox translator. Access: Compare."

The computers took the intercepted sequence and examined them for signifiers that were used in the current Russian military telemetry and data storage. As smart as they were, Dashik's onboard computers did not have the capacity — or time — to translate the information, let alone hunt for cipher keys or do anything to "break" an encryption. But that wasn't the point. By identifying the way the information was organized, the system helped operators decide what to capture. Its significance was determined elsewhere.

Fox Blue, Variation 13, declared the computer.

Martin had no idea what Fox Blue, Variation 13, was, only that it was on his list to capture. He directed the system to concentrate all of its energy on tapping the source rather than continuing to scan for others. He debated asking the satellite image library for a close-up of the target building, which looked like a small shed on the bottom screen. But the library wasn't kept onboard, and requesting the information from SpyNet and having it beamed back down would narrow the transmit flow.

An overflow error appeared — clearly this was a very large storage system; the plane's equipment couldn't keep up with the data it was stealing.

"Slow to minimum speed," Martin told the pilot. "We may have to circle back on this one. This is something interesting."

"Impossible. Hold on —"

In the next second, Martin felt his stomach leave his body. The aircraft plummeted, twisting in the air on its left wing. As it slammed back in the opposite direction, the seat belt nearly severed his body. The computer sounded a high tone that meant it was losing its ability to reap magnetic signatures; the signal grew sharp and then was replaced by a hum — they were no longer collecting.

The copilot shouted so loudly Martin could hear him through the bulkhead.

"Missiles! Missiles! Jesus!"

The next thing Martin heard was a deep, low rattle that traveled through the floor and up into his seat. He felt cold grip his shoulders but had enough presence of mind to issue a command to the computer.

"Command: Contingency D. Authorization Alpha Moyshik Moyshik. Destruct. Cleo —"

Cleo was not part of command sequence; it was the name of his six-year-old daughter, whom he'd lost to his wife after their divorce five years ago. It was also the last word he spoke before a second missile struck Dashik R7 — aka NSA Wave Three Magnetic Data Gatherer Asset 1 — and ignited the fuel tank in the right wing. In the next second, the aircraft flared into a bright meteor in the dark Siberian night.

CHAPTER 2

William Rubens pushed his hands slowly out from his sides as the two men in black ninja uniforms approached. Palms upward, he looked a little like an angel supplicating heaven; he waited patiently while one of them took a small device from his belt and waved it over Rubens' body. About the size and shape of a flashlight, the device scanned Rubens' clothes for circuits that might be used to defeat the next array of sensors, which were positioned in a narrow archway a few feet away. Satisfied that he carried nothing electronic, not even a watch, the ninjas nodded, and Rubens stepped forward through the detector.

The fact that Rubens had led the team that developed both the archway and the circuitry detectors did not exempt him from a thorough check, nor did the fact that, as the head of National Security Agency's Combined Service Direct Operations Division — called simply Desk Three — Rubens was the number two man at the agency. If anything, it made the men work harder. The ninjas, as part of the NSA's Security Division, ultimately worked for him. Anyone leaving Black Chamber — the massive multilevel subbasement facility bureaucratically known as Headquarters/Operations Building National Security Operational Control Center Secure Ultra Command, or OPS 2/B Level Black — was subject to a mandatory search. Had Rubens not been searched, these ninjas would have been summarily fired — after serving a one-year sentence in the NSA detention center for dereliction of duty.


(Continues...)

Excerpted from Stephen Coonts' Deep Black by Stephen Coonts, Jim DeFelice. Copyright © 2003 Stephen Coonts. Excerpted by permission of St. Martin's Press.
All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

From the B&N Reads Blog

Customer Reviews