White Smoke Over the Vatican Read online
Page 2
“Pace yourself, Mr. Secretary-General,” General Soleimani quickly curbed Nasrallah’s outburst. “We of the Quds Force have a green light from the Supreme Leader to execute a widespread operation to locate Nimer and bring him here. Though we must act urgently before, Allah forbid, Dr. el-Haladi starts sharing our secrets and yours with the Israeli enemy, I conclude from everything you have just told me that we do not have enough data to execute a successful operation. Nimer’s capture by the Israelis is a strategic threat to you, but to us as well.”
“I believe in the loyalty of the Hezbollah warriors and their ability to execute the sacred mission we place in their hands,” Nasrallah declared.
“That’s good, I’ll add your men to our team already collecting intel using cyber and Big Data technology,” General Soleimani agreed. “We will choose a scientist from our research branch, and he will oversee all technological aspects of the operation to bring Nimer home. He is a young scientist who worked with Nimer and was exposed to most of the issues Nimer had handled. I’m sure he will live up to the faith we place in him.”
“What about the sister Jamila and the son Hassan?” Hezbollah’s head of intelligence dared to ask. “They haven’t been privy to national secrets like Nimer, but they are still involved. Nimer will not leave unless he knows they are safe.
“Indeed, we must consider this issue as we plan, but they are of little importance compared to Nimer’s quick removal from enemy hands.”
Nasrallah only nodded when General Soleimani declared the operation to be of superior importance to Iran, and the Quds Force’s commitment to do anything in its power to ensure its success.
Chapter 3
Pete’s café in Palo Alto, California, was busy like it was every morning, with young people taking a break from their technological rat race working at the Silicon Valley startups. The café served as a meeting spot for both students and lecturers who attended nearby Stanford.
“It’s so good to be here after my hectic time in Israel,” Noam savored the moment at the café, sitting by ‘their’ window overlooking the campus.
“Yes, here I feel as though I’m back home…”
The waitress greeted them with a pristine smile, remembering them. Soon she returned with two cups of fragrant Colombian coffee and slices of cake. Dan and Noam had just recently come back from Israel, easing back into their routine; Noam with her academic life, while Dan reassumed the reins of the new family company ‘New Future’, in the Valley. It was a technologically rich company founded by Yehuda Avni, who had left it for his son. Dan had changed the company’s name at the Pentagon’s demand, due to security concerns. He was happy to be back at full steam, implementing new ideas that were waiting for nothing more than his opinion before they could be applied.
“Did you get approval to start the post-doc program you applied for? You told me it had to with behavioral psychology in your PhD, but where are you taking it?”
“I thought to take a more practical approach…” Noam replied hesitantly. “I want to base it on what I’ve learned from the actions you and Dad carried out in Israel and Lebanon. You eventually succeeded in forcing Nimer to contact us and agree to come to Israel.”
“I still don’t understand, Noam,” Dan insisted. “That operation had hundreds of actions and events, both open and hidden struggles. What have you chosen to focus on?”
“You’re right. You could say I chose to stay with the human-personal aspect, which I think we should always consider, along with the technological components which I haven’t discounted. Hats off to you scientists for your use of cyber, IOT, and developing Big Data algorithms that overcome the endless piles of online data. In the field of Hazard Identification and Assessment, we need, for instance, to understand and identify the truly dangerous people. We can achieve this by performing an analysis based on behavioral models, and perhaps by analyzing the facial expressions of those marked as potential terrorists.
“Of course, I haven’t forgotten the assistance you received from the professional staff throughout the operation to locate Nimer. The miniature drones, the IOT systems, and of course the new Big Data analysis algorithms contributed significantly. Without them, we wouldn’t have reached these results so quickly. It’s essential that we protect these ‘technological gems’,” Noam complimented him.
“Indeed, we have great staff, and can only dare scrape the technological front that’s been moving forward at breakneck speed. I thought to add civilian activity that would be central from time to time and enter the field of analytic forecasting. In that case, I think it would be wise to rely on aspects we are familiar with in AI and advanced treatment of Big Data. I’m optimistic about the possibility of giving business companies tools that will allow them to predict the future.”
“The important question, as I see it, is how you can prove to your clients that these tools work. It will be challenging to find a language that bridges future technologies and what companies currently know. The more these technologies progress, the more important it is that you have a dialogue with them.”
“I think that in the current market, those who survive will be those who create the new technological leap. Of course, it would be wise to prepare to impress clients, and convince them that the next leap I’ve found is in Quantum Computing…”
“What is that, exactly? I remember something in quantum theory that has to do with nuclear physics. Is that it?”
“Yes, and not really. In fact, focusing on quantum computing has to do with handling the whole world’s digital data capacity, soon to reach forty-seven billion gigabytes…”
“I still don’t understand what that has to do with quantum theory.”
“Hang on, I’ll get to that. The challenge is the huge data capacity that can’t be handled without smart analysis tools. We need maximal data storage, real-time data analysis, and quick value extraction. All these, Noam, can’t be done with current computers, not even with our generation’s supercomputers. A more advanced platform will probably have to be based on computers operating in a completely different capacity. I think that quantum computing alone will answer this need. Whoever develops this solution will attract companies and organizations in different sectors. From governmental facilities to banks, all the way to leading high-tech companies. In addition, there’s a subfield of data analysis currently gaining momentum in the world of marketing. It allows businesses to predict probable scenarios based on identifying patterns in past data. They employ statistical tools, AI algorithms, data mining and machine learning to build qualitative prediction models. Companies and organizations already collect insane amounts of data, from the client’s personal information to their web-browsing habits to their purchase history. Analytical prediction would allow the conversion of this rich data pool into insights, better decisions and improving business success.”
“It’s pretty confusing,” Noam sighed. “And you still haven’t explained quantum computing, and why you find it so important. And what is a quantum computer, anyways, and how will it change the world?”
“Fasten your seatbelt and prepare to soar into the future. The processor used in current computers is comprised of electronic bits that have two value representations: zero or one. On the other hand, the quantum computer bit, known as ‘qubit’, uses a basic principle from quantum mechanics known as ‘Superposition’. Here, a particle can move from point A to B, and be at all possible routes between the two points at the same time. In addition, this computer needs the ability to entangle every qubit pair. This is an action in which the two qubits are entangled, interacting, and adjusting to one another. We can’t achieve the same in a regular computer system. It’s hard to technically execute even in a quantum system, especially when two qubits are physically distant from one another. The quantum computer can also elevate complex computing abilities that even the most advanced supercomputers struggle to perform. The speed of those computer
s’ processors will make current supercomputers seem like simple calculators.”
“Wow! You blew my mind. How do you plan to enter a market that must already have advanced research, and compete against corporations such as Google, Intel, Facebook and IBM?”
“That’s a correct and pretty critical question. There might be a place for us too. It’s still hard to predict what technology will be developed and built upon the quantum computer itself. Each option proposed these days has both pros and cons. One of the options, for instance, is based on an old tool that has proven itself in the past: the silicon chip. The processing speed of those computers, when quantum technology is applied, will make current supercomputers seem almost dated. That would be an entry ticket for us; it would incorporate AI and data processing in a way that would let us play with the big boys.”
Chapter 4
Dr. Gerald Deutsch, head of the SRI – the Stanford Research Institute – returned to his position after a mysterious mission in the Middle East. This wasn’t the first time Deutsch had met Israelis. Dr. Gideon Ben Ari had arrived at the SRI during his sabbatical, and in that year Gideon and Deutsch had both grappled with the long arm of the Iranian Quds Force. As a result, Dr. Deutsch was summoned by intelligence forces, the CIA, the NSA, and the Mossad. The collaboration between Gideon, his men and Deutsch, in their battle against Iranian terror and Hezbollah, was a success story. From what little could be exposed, there was knowledge of an extensive international battle against terror, stretching from Paris to Singapore.
Without delving into the confidential details of the complex system he belonged to, Deutsch told his men that he had decided to use his acquired experience in the fascinating confrontation aimed at capturing Dr. Nimer el-Haladi, mastermind of the Iranians’ technological terror. Deutsch explained that he had intended to encourage SRI researchers to participate in research that would rely on their experience acquired in the campaign against Iran and North Korea. This was, as Deutsch elaborated, a field in which algorithms were applied, developed by Dan Avni and a team of young Israeli researchers for novel development of protection against cyber-attacks, and handling new tools that could address Big Data.
***
“Thank you, Dan, for finding time to have a meeting here at the Institute. I know how important it is for us all to restart our operation in the organization, after our considerable absence.”
“I never would have imagined skipping a meeting with you, Deutsch. I’d like to share some ideas with you later, and ask your advice regarding the future. But first, I would like to hear what you have to say. Please, tell me how can I assist you?”
“Look, Dan, even though I didn’t participate in the after-action reviews following the capture and transportation of Nimer el-Haladi to Israel, I still have immense respect for the way you handled the technological challenges. I have been thinking quite a lot recently about how we can apply the accomplishments you and your young research team achieved. The Institute already knows about my intentions. I would mostly like to employ excellent doctoral candidates – pursuing their studies here – who would focus on campaigns against terror organizations. Thus far, we have many gains in this field.”
“Thank you for the tempting offer, Deutsch, but I’m not sure I can find time to supervise students. I’d like to tell you what I considered marking as the center of my civilian activity, while integrating the finest of the newest technologies.”
“That’s quite interesting, Dan. I’m all ears.”
“By the end of next year, as those who work with Big Data know, the world’s digital data capacity will have reached forty-four trillion gigabytes. That capacity is enormous and cannot be handled without smart data analysis tools, optimal storage, and real-time analysis. Furthermore, as you must know, it is vital that we have access to fast data extraction tools. Though advanced data storage systems and data analysis platforms have already been developed around the world, I’m thinking of taking an extra step and developing an advanced platform for managing high-capacity data.”
“Who is your target audience? Who will your customers be?”
“The customers, in my opinion, would be only marketing firms, as well as banks and companies that require solutions for handling immense data pools. The analytic capabilities of the system I have in mind would allow, for instance, performing an analysis of online browsers and their buying behavior patterns.”
“Isn’t that a little too heavy for your small company?”
“We’ve built a couple of prototypes so far for academia and technological corporations. It seems that at this point they can only present the ability to process giant mounds of data. The idea, which I think is feasible, is to build a prototype for a quantum computer at our company. It would be a model developed with an innovative approach, implementing theoretical as well as technical knowledge, which our company specializes in. It would function as a super-fast calculation tool able to grapple with the mounds of data that Big Data algorithms struggle to handle.”
“You must explain how we can implement the lessons learned during our campaign against the IRGC, and the cyber-attacks developed for them by North Korea.”
“We used to have several intelligence sources that assisted us in our attempts to track the enemy’s patterns. We’ve received data from the media, which has become rife with data; and we’ve received ongoing intelligence from the miniature drones, referred to as ‘wasps’. This data has allowed us to closely track enemy forces. Obviously we integrated an array of components from the Internet of Things that has flooded our data pools. In addition to the analysis of these findings, we should take into account that the enemy will have learned and implemented a considerable amount of information regarding the technologies we’ve used. This requires fresh young minds who think outside the box.”
“And you plan to complete the theoretical parts of these lessons based on work by our university and Institute researchers?”
“Yes, Deutsch, the contribution of the research to the technical part of quantum computer development at our company seems like a promising and crucial combination…”
“Then can I consider this a positive answer to the student supervision program?”
“In principle, Deutsch, it is a positive answer. But I suggest treading lightly and starting off with one or two students, so I can gauge the time necessary for it.”
“Wonderful, Dan. You’ve made me happy!”
***
“Something’s bothering you,” Noam declared when Dan stepped into the house after a long workday.
“I’ve presented my idea for actions in the commercial-civilian field to Deutsch. I explained how we plan to rely on what we learned from our campaign against the IRGC and North Korean technological-strategic assistance.”
“And Deutsch didn’t seem to like it?”
“He actually did. He asked questions, but mostly strived to convince me to partake in the doctorate student supervision program at the SRI. He asked me to supervise students, young doctoral candidates, and their research as they implement our lessons from the war on terror.”
“Doesn’t it clash with your other new projects? And how does that sit with the element of secrecy? When will you find time for the activities you’re supposed to do?”
“That’s the thing, dear. He managed to make me agree when he emphasized the contribution of academic research to our developments in the field of software at ‘New Future’. I agreed to try, on the condition that we start with one or two students.”
“And you’re not sure about it? It might affect the new strategy plan?”
“Yes, on the one hand I couldn’t refuse Deutsch, a friend who has contributed so much to our war on terror. On the other hand, I’m not sure our little company can handle all our technological aspirations alone. I talked about the quantum computer, but I didn’t go into its contribution to all the new fields that would demand it
s capabilities. I didn’t mention the facial recognition systems, even though they could be used for more than security. It could be a vital component in your post-doc plan. I didn’t want to involve Deutsch before talking to you. Here’s yet another topic that could cost us quite a lot of time and energy.”
“I agree that we have to tread lightly, Dan, but incorporating bright doctoral students’ brains, and your integration into the academic research path, seem like the right things to do. I completely support you!” Noam concluded, and stood up to hug her husband.
Chapter 5
When Gideon arrived at Nahari’s office, he immediately noticed that something had changed. Their plan to visit Jenin was important, but it seemed Nahari had other plans, and the maps and photographs were clearly not of the Palestinian National Authority. Gideon wondered whether Nahari was trying to persuade him to take on another project.
“Anything new? Threats we haven’t heard of?” Gideon inquired.
“Listen,” Nahari replied with uncharacteristic enthusiasm, “We received an unusual request from the Vatican a couple of days ago, regarding a possible assassination attempt on the Pope. The Vatican’s security force, the Swiss Guard, is concerned about intel they recently received from Argentina – home of Cardinal Jorge Mario Bergoglio, later elected as Pope Francis. The head of their guard claims the threats include smart technological tools as well as cyber-attacks.”
“I remember at least one failed assassination attempt on the Pope,” Gideon remarked. “Why did they come to us? Can’t the Italian security array protect the Pope with their Carabinieri units? Isn’t it their duty?”
“Perhaps the Vatican doesn’t trust the secrecy of the Italian security system. We’ll find out during our first meeting in Vatican City,” Nahari’s assistant interrupted. “I was in contact with the head of the Swiss Guard, and he has more details that will help us decide how to move forward.”