Read Infinite Exposure Online

Authors: Roland Hughes

Infinite Exposure (2 page)

BOOK: Infinite Exposure
6.32Mb size Format: txt, pdf, ePub
ads

“Others would prefer for us to execute all of you,” spoke the man.

The forcing, struggling, indeed, even time, seemed to stop after he spoke those words. Nedim now knew the way out of this.
He might still die, but it would not be for weeks or months. He might even avoid prison.

“All of who?” responded Nedim. He did not want to appear to be a drowning man clutching at any reed to stay alive. He didn't
even care about the fist that found his skull almost as soon as he asked the question. There was a way out of this, but he
had to play the game to the bitter end to be given it.

The man tapped the pile of print outs in the folder and said, “All of them. Not one of them is to be left alive when we are
finished.”

Nedim began to shiver. He told himself it was the cold stone of the floor taking its toll on his feet and the chill of the
room taking its toll on his bare legs, but he knew it was a lie. The reality of what was about to happen was sinking in. For
him to stay alive, these men would have to kill all of those he had worked with, all of those who had known he worked with
the others, and every person any of them had trained or spoken with. He seriously doubted the men in this room had that kind
of capacity. In reality, they would arrest or kill some portion of the current list, then go off to other things. At that
point, he would be dead. Either these men would kill him, or one they had let live would complete the task. It was an odd
feeling to be perfectly healthy and know he had less than two years to live, an even odder feeling than knowing he would die
in only a couple of hours if he refused. Perhaps it was the waiting. The thought of going to bed every night wondering which
side was going to kill him while he slept.

This was all so simple when it started. The cleric had arranged for a computer that was envied by all, even the rich students,
to be delivered to him at the university. At first, all he had to do was study hard and graduate. Once out in the working
world, all he had to do was to send a few emails back and forth. Some of them simply snapshots. None of them were pornography
of any kind. Perhaps that was where it all went wrong. Had they used porn to embed their messages, really good porn, nobody
would have noticed there was anything embedded in the messages. They could have even set up a porn Web site and made money
to fund the cause while transmitting messages around. Sad that he would never get to suggest that to his cell.

The man was still staring at Nedim. He might not have even blinked since the staring contest started a while ago. Nedim couldn't
be certain of much at this point.

“Just how do you propose to find them?” asked Nedim.

“You will lead us to them,” was the man's response.

“I know not where they are or what they look like,” responded Nedim. It was a lie. He knew where some of them were and what
some of them looked like, but not enough of them to keep himself alive.

“Still, you will lead us to them,” responded the man. “We can have no further conversation about this without a signed confession.
You have a choice to make now. Sign the confession and lead us to them, or we execute you in a few minutes when prayer is
over.”

“You will kill me as soon as I sign.”

“No. At least not until we are done. Then it will depend upon how well you cooperated and how many of these people,” he paused
to tap the print outs, “we have killed. The confession is to be placed on file along with your picture and the other evidence.
Should you try to run, hide, or stop helping us track down these individuals, the information will be handed over to every
news agency in the world along with a statement promising 200,000 euros for your return, dead or alive.”

Something was odd about that last statement, but Nedim didn't have time to think it through. The man went right on.

“So. Die now, or risk dying later. Make your decision.”

“My hand has no feeling,” responded Nedim. They both looked at the hand by the pen. It was white, and the wrist was purple.
A motion of some kind from the man caused the brute to release his wrist. A thousand needles rushed out to the ends of his
fingers, but he could not bring his other hand around to comfort it. In an act of pure agony, both emotionally and physically,
Nedim signed the confession.

Once the confession had been signed, the bag, which Nedim had not seen enter the room, was put back on his head. He was forced
to stand and his hands were cuffed. He assumed they were going to execute him now, despite what they had said. The feeling
in his hand was still reminding him of his betrayal. In truth, he was at peace about dying now. A public execution would make
the news quickly and his brothers would be able to flee to safety.

The long walk up and down sets of stairs occurred again. Nedim didn't bother to count. In truth, he didn't begin to panic
until they shoved him into a vehicle. His knees hit what felt like seats in front of him, so he assumed he was in the back.
They didn't need a car to get him to the mosque courtyard for execution! He had heard the call to prayer in the room. It couldn't
be more than a few blocks! “No!” he shouted. “The mosque is close! I heard the call to prayer!”

He heard the brutes, now on either side of him in the vehicle, begin to laugh and hold him in place. “Relax,” said the voice
of the man. “We are going to take your picture.”

“Why couldn't you just do that here?” Nedim asked.

“The camera and fingerprinting equipment are at another location,” the man responded.

When the engine started, Nedim could tell from the quiet and the air conditioning that this was a car. The seats felt like
leather on his legs, not cheap vinyl or cloth. It must be one of those dark Mercedes he had seen secret police and diplomats
riding around in. The smell inside was not the smell of the city he was used to, nor of sweat and fear. It smelled clean and
new.

They drove for what seemed like quite a while. Many turns, stops, speedy stretches and slow crawls. There was no way to tell
how far they had driven, or which direction they had ended up going.

Finally, the engine was turned off at a stop. Nedim was roughly pulled from the back of the car. He walked into a building,
down a flight of stairs, and had his bag taken off inside of another windowless stone room. There was a big white sheet hanging
on one wall, some lights shining on it, and a mounted camera facing it. Along another wall was a table with an ink pad and
some forms. Beside all of this was a computer with a printer. The computer had a cable running over to the camera.

This room came equipped with two new people. Both of them were white, but both looked strikingly different. He judged their
age to be in the late 20s to early 30s range. Nedim was taken over in front of the sheet and made to face forward. A series
of front and side photos were taken, then he was dragged over to the table.

While Nedim's handcuffs were being removed, he noticed something odd about this place. Silence. There were no noises coming
from other parts of the building. No conversations. No mechanical devices. No sounds of people outside.
This place mu
st be very isolated,
he thought.

The fingerprinting proceeded while the printer spat out his photograph on a page with all his personal information. The print
out finished about the time his last finger impression was being taken. The camera man placed it into a folder he handed to
the man in the suit. “We own ya now mate,” he said when he looked at Nedim.

He's British!
A voice screamed in Nedim's head, or perhaps he screamed it, he couldn't be certain. The man who had been taking Nedim's
fingerprints said, “That we do,” in the thickest German accent Nedim had ever heard as he handed the form over to the man
in the suit.

He's German!
Screamed the same voice Nedim had heard only moments ago. That explains the euros! This was very bad indeed. Not only had
he been captured, but he had been captured by people who weren't even on the list to be killed yet.

A Brit working with clandestine Pakistani operatives was a very bad sign. A German working with all of them was a very bad
sign indeed! It was obvious to Nedim the men in this room were not under the control of anyone government. Perhaps there was
no government controlling them at all.

Nedim had heard stories about freelance operators like this from the days when bin Laden was throwing the Russians out of
Afghanistan. They did what they pleased, always seemed to have limitless stores of weapons and funding. Sometimes they would
go into a village and kill everyone there, then leave a few dead Russian soldiers and some Russian weapons for the news reporters
to find. These types of men didn't fight for a cause, they fought for money and the thrill of the kill.

When Nedim's mind came back to the room he realized all of the men were laughing at him. Even the man in the suit.

Slither of Snake

Once the men had finished laughing at him, the bag and car routine were repeated. All of this time he had not been offered
water or allowed to go to the bathroom. Even in this luxury ride, the bumps were starting to be excruciating. His bladder
was nearly beyond its capacity. It would have been much worse had he not gone back to bed after relieving himself just before
the security forces came crashing through his front door.

This time, when the car finally stopped, and the bag was removed, he realized he was in front of his own home. There were
two new men waiting for him outside of the door. He noticed the door was shut and it looked like it had been replaced. The
men were dressed in common clothing. One of them opened the door for him. Everybody went inside.

Pointing to one of the new men, the man in the suit said, “This is your cousin Umar from Saudi.” Pointing to the other new
man he said, “This is your friend Ramesh from university. This is how you will refer to them both in public and private. One
of them will be with you at all times. You can see that your computer has been returned to you. We have a complete image of
the hard drive. You will explain the code contained in each message you transfer and translate it for these men. They will
report back to me. You and I will not meet again unless your life is about to end.”

With that the suit and the two brutes left. Once inside of the car, the brute behind the wheel uttered, “We are just going
to let him continue?”

“We have installed a Trojan horse on his computer. Each mail message he sends will contain this Trojan. When a user opens
the mail message it will create a connection to a server we have running. There it will send the IP address of the connecting
machine and various other pieces of data from it. We have a database of every IP address from every known university, library
and Internet café. It will be a slow process, but we will get them all.”

The driver pulled away from the house and started the return to headquarters. From the back seat, the man in the suit continued,
“What do you know about these men we intend to kill?”

“They are terrorists who will bring the wrath of all nations down upon us. If they are allowed to continue, neither we nor
our country will survive,” responded the driver.

“Is that all you know?”

“It is enough.”

“It is enough to want them dead, it is not enough to make it happen. These men are creatures of habit. While they may implement
variations of a theme, they will not cease a pattern they perceive to be working.”

“Do you think Nedim is the only email relay in this network?”

Silence.

“He is one of many. We know this, but until now, had not cracked it. Now we have a crack. Yes, he will lead us to the cells
he communicates with and we will take them out after observing them, but that is not the real benefit. The real benefit will
be the other relays he leads us to. This is a many-headed beast. Taking down a few cells responsible for one terrible bombing
may make great headlines, but it will not kill the beast. To do that, you need one massive move that cuts off many heads at
once. This will cause the beast to go into panic and bleed to death. We will pump this well until it runs dry, then we will
decide what to do with the head of Nedim.”

****

Back at his home Nedim finally got to answer his most urgent call, put on some clothes and confront his keepers. One of the
men, he could not remember if it was his cousin or his friend, informed him it was time to check his email. He resigned himself
to doing just that. The men produced a small recording device and began taking notes in college thesis-type notebooks. At
least that would lend credibility to the university friend story, if he could ever remember which was which.

There were only five emails waiting for him, yet getting through the first four took over an hour. He went through the explanation
on routing. Each group wishing to receive information would send him a baseline photo. Phrases in the text that came with
it would tell him who should receive the image. They also told the receivers what information the sender was looking for.
Every operative in the field had access to the same editing software which would distribute the response they typed as a seemingly
random set of bit errors in the image. The response itself would be short and use phrases the operatives were told to use.

No translations were ever written down. Each person gathering intelligence had to memorize this handful of phrases. These
were along the same lines as the phrases they had been using in open phone calls and emails in the past — before they figured
out intelligence agencies were listening in. Now they hid the information inside of the images. You had to capture the base
image before you could even hope to find the message to decode.

When distributing base images, they were not sent all at once. Over the course of the week Nedim would distribute the image
to everyone who should receive it. Some would have messages embedded in them and be sent to decoys. The decoy messages would
be scattered in the distribution so that any agency intercepting a “new” photo could not be certain it was a base photo unless
someone had already been significantly compromised. Decoy messages were sent to some suspected of being compromised as well.
In short, a base image used to go out to somewhere between 20 and 400 email addresses.

“Used to?” asked one of the men.

“I came up with a better way. Now when a new image comes in I encrypt a phrase in it, then only send it out to four or five
decoys along with the list. The decoys get a different phrase. Even if any of them are intercepted, they still cannot be used
for decoding. All of the operatives know the phrase and remove it from the image prior to using it as a base image.”

“What is the phrase?”

“God is Great.”

“And the decoy phrase?”

“Whatever I feel like typing from the Holy Quran.”

Both men were shocked to learn the software was a simple piece of Open Source software originally done as a proof for some
thesis work, then continued by a community looking to transfer sensitive data cheaply and securely over the Internet. While
it had originally focused on transferring financial data, clinical trial research and the like, this group had co-opted it
for their own sensitive data.

Two of the messages contained images with coded phrases in them. Once he had translated them, Nedim emailed them onto the
original sender of the image.

One of the men asked Nedim how he knew where to send the responses because they had seen no indication in the message or the
brief look they had gotten on his computer.

“Simple. One sender always uses images of birds, another beach scenes, another fish, etc. It has never been difficult to keep
track of the destination because of this.”

The third message was interesting. It contained one phrase and an FTP address. Nedim pasted the FTP address into his browser
and began a binary download of the ZIP file. After downloading the file, Nedim sent the original email onto its destination.

When an attempt to unzip the file was made, it prompted for a password. The file name had been the letter “T” followed by
a series of digits and dashes with a “.zip” extension. The phrase had been “Great View.”

Both men wanted to know how Nedim had known the password. “It was obvious,” he responded. The digits in the file name were
the longitude and latitude for somewhere in Chicago. All of the world heard about the great view from the Sears Sky Deck when
“The World's Tallest Building” was built.

At first, the files contained in this compressed file appeared to be nothing more than tourist snapshots. An odd number of
them seemed to be focusing on the lake view, but all views seemed to be represented. When spread out, they would give you
a full 360 degree view from the Sky Deck. This was followed by some shots which seemed to come from some air tour out over
the lake. Odd vacation to be sure, but nothing incriminating.

Then they came to the spreadsheets. One contained detailed information about guard numbers and rotations for building security.
Another contained information about police patrols and force size.

Following the spreadsheets were PDF files containing the original construction blueprints for the building. These showed the
type of steel, quantity and placement of it. They showed the location and weight of the counter-balance units. A detailed
discussion was also included from some architectural magazine story about how the smaller towers supported the main tower
in those great Chicago winds.

Just to be complete there were also photos of the parking garage entrance, the various levels and even some of the supports
running through those levels. One picture even went so far as to have a tape measure held up to the support pillar for size.

This was obviously a completed recon effort. All information had been gathered and delivered for those who make strike decisions.
It was left up to the leaders to decide if, how, and when to strike the target. They had Nedim make a copy of the entire directory
where he had decompressed the file.

Both men were so floored by the scope and magnitude of what was going on they almost forgot to look at the last email. It
seemed innocuous enough. It looked like a form letter from a technical support company. It was announcing they had closed
his ticket number and instructed him to re-open it if he had any further concerns on this issue. At the end was a fax number
if he needed to fax any screen prints or service contract information to the technical support. It was signed “John.”

After what they had just seen, both men had a hard time believing this was a routine business email. Nedim showed them the
email he had sent technical support regarding an issue where his computer was locking up and their response about downloading
a new set of drivers. This seemed to satisfy both men. Oddly enough, they both understood that Windows was an unstable operating
system.

With that complete and the CD in the men's hands, Nedim announced it was time for him to go to work. He actually was a software
analyst by trade and he worked for an off-shoring company, which meant he worked nights a few days per week so he could participate
in conference calls with the U.S. clients. Nedim had no qualms about taking money from infidels before killing them.

Once dressed and with lunch packed, the man who was supposed to be his friend from the university announced he would be walking
with him to work. The other man would be delivering the information they had gathered to their superiors. During the walk
to work, Nedim said, “I suppose you are also monitoring my work email?” There was no response from the other man. Of course
there wouldn't be.

The very first thing Nedim did after sitting down at his desk and logging in was to hand write a note.

John,

Infidels at my door. Stay clear.

Ned

He then immediately faxed the note to the number from the technical support email and tossed the note into the shred bin.

John's real name was Kaliel. Nedim had met him at university and talked with him at the mosque. John now worked for a technical
support company in India, another off-shore operation that required its people to use an American name when dealing with U.S.
customers. John had been sent to America on an H1-B Visa for a few years. John worked with the very same team that assembled
the information on the Sears Tower. The email was to let Nedim know that John was back home. He was to fax once he had pulled
down the file and forwarded it on. One of the other team members, also working in the U.S. on H1-B Visa, had been tasked with
assembling the file and posting it in a blind FTP location on the Web. To keep cells isolated, each operative only knew where
to put a message, not where it actually ended up.

John had been the first to see the brilliance of Nedim's email relay system. He had also been the one to convince Nedim to
embed the messages inside of images for security. The leaders of al-Qaeda had simply smiled and nodded when he informed them
of this plan. They were used to hiding in caves, making videos, and communicating by satellite phone. It was only after September
11, 2001, when every phone was monitored, that suddenly his relay system was pressed into service. The leaders learned about
the compromised phones when several of the training camps they had been talking with were bombed. Their location could have
only been discovered by triangulating the signals.

Nedim knew the relay network John handled was even larger than his own. Today's most important recruits weren't from the impoverished
parts of the Muslim world. They were the technology students, training for jobs that would put them in the belly of the beast,
able to walk freely, and assemble files like the one Nedim had downloaded today.

The infidels were only too happy to bring them over by the plane load paying their employers U.S. $30 per hour. The workers
got only $10 of that, some only got $10 per day. It was more than most of them had ever made and well below the prevailing
U.S. Wage. The new recruits were good Muslims, one and all. They were only too happy to send the bulk of that money home to
help the cause. While the big donations still came from within Syria, Iran, and Saudi Arabia, both cash and intelligence were
coming via these new recruits. Some of them would even be martyrs eventually.

Both John and Nedim had tried to convince the al-Qaeda leaders to start their own off-shoring companies in India and Pakistan.
Keep them looking legitimate to the outside world and they would generate tens of millions of dollars for the cause annually.
Each man knew the margins being made by off-shore companies. Those companies were able to obtain visas in quantity, usually
with the help of their clients. Instead of getting half of some wages, they would get most of all wages even if the employee
didn't support the cause.

Some of the people John had been working with got themselves into projects for the financial districts. These members developed
a system of moving large amounts of money around in untraceable manners. The infidels may find a few accounts here and there,
but they could not possibly find them all. Al-Qaeda now had accounts in all countries and all currencies. There was nowhere
they could not finance an operation. The only problem was getting suicide bombers into America, but thankfully, corporate
greed solved that problem. The martyrs only had to learn enough English to work a help desk. Not only were the martyrs being
paid to come into the country and kill Americans, they were putting Americans out of jobs from day one. God is Great.

BOOK: Infinite Exposure
6.32Mb size Format: txt, pdf, ePub
ads

Other books

Ashes to Ashes by Lillian Stewart Carl
Be Mine by Kleve, Sharon
Sinful Magic by Jennifer Lyon
The Defiant One by Danelle Harmon
The Secret Ingredient by Stewart Lewis
Ángeles y Demonios by Dan Brown