Read Line of Control Online

Authors: Tom Clancy,Steve Pieczenik,Jeff Rovin

Tags: #Pakistan, #Crisis Management in Government - United States, #Action & Adventure, #Intrigue, #Fiction - Espionage, #India, #Fiction, #Suspense, #Espionage, #Adventure Stories, #War & Military, #Military, #Government investigators - United States, #National Crisis Management Centre (Imaginary place), #Crisis Management in Government, #Thriller

Line of Control (10 page)

BOOK: Line of Control
5.43Mb size Format: txt, pdf, ePub
ads
    These numbers, frequencies, and encryption codes were then run through programs. They were compared with those of known terrorists or foreign agents. If there were any possible "watchdogs or impediments" in the region, as mission planners referred to them, these scans helped to find and identify them. The last thing American intelligence chiefs wanted was to have undercover operatives photographed or their methods observed by foreign governments. Not only could that information be sold to a third party, but the United States never knew which friendly governments might one day be intelligence targets.
    "Think Iran," Colonel August reminded them whenever they went on a joint mission with allies.
    Honda had brought along a Striker laptop. The computer was equipped with a wireless, high-speed modem to download data Stoll was still collecting. Honda would memorize any relevant data. When Striker reached India, the computer would be left on the transport and returned to the base. Colonel August would keep his laptop to download data.
    Where they were going, the less Corporal Honda had to carry the happier he would be.
    As the new intelligence was dumped into Honda's computer, an audio prompt pinged. It was alerting him to an anomaly that Stoll's program had picked up at Op-Center.
    Honda accessed the flagged data.
    The Bellhop program on the air force's "Sanctity" satellite continually scanned the cell phones and radios that used police bands. Op-Center and the other U. S. intelligence agencies had these numbers for their own communications with foreign offices. It was a simple matter to hack the computers and look for other incoming calls.
    The Bellhop had picked up a series of point-to-point calls made on a police-registered cell phone. It was coded "field phone" in the Bellhop lexicon. Most of the calls were placed over a five-month period from Kargil to the district police headquarters in Jammu, coded "home phone."
    During that time there was only one call to that field phone from the home phone. Stoll's program, which integrated Op-Center intel with NRO data, indicated that the call was placed less than one second before the Kashmir-focused Cluster Star3 satellite recorded an explosion in a bazaar in Srinagar.
    "Damn," Honda muttered.
    Honda wondered if Colonel August or General Rodgers had been informed about a possible terrorist attack. The fact that a police cell phone made a call to the site an instant before the explosion could be a coincidence. Perhaps someone was phoning a security guard. On the other hand there might be a connection between the two. Honda unbuckled himself from the uncomfortable seat and went forward to inform his commanding officers. He had to walk slowly, carefully, to keep from being bucked against his teammates by the aircraft's movements in the turbulent air.
    August and Rodgers were huddled together over the general's laptop when he arrived.
    "Excuse me, sirs," Honda said. He had to shout to be heard over the screaming engines.
    August looked up.
    "What have you got, Corporal?" Honda told the two officers about the explosion. August informed Honda that they were just reading an e-mail from Bob Herbert about the blast. It provided what few details anyone had about the attack. Then Honda informed his superiors about the phone calls. That seemed to grab General Rodgers's interest.
    "There were two calls a day for five months, always at the same time,"
    Honda said.
    "Like a routine check-in," Rodgers said.
    "Exactly, sir," Honda replied.
    "Except for today. There was just one call and it was made to the field phone. It was placed a moment before the explosion that took out the temple."
    Rodgers sat back.
    "Corporal, would you go through the data file and see if this calling pattern is repeated, probably from field phones with different code numbers? Outgoing calls to one home phone and one or none coming back?"
    "Yes, sir," Honda replied.
    Honda crouched on the cold, rumbling floor and raised one knee. He put the laptop upon it. He was not sure what the officers were looking for exactly and it was not his place to ask. He input the code number of the home phone and asked for a Bellhop search. Colonel August's hunch was correct.
    He told them that in addition to this series there were seven weeks of calls from another field phone in Kargil.
    They were made twice a day at the same times. Before that there were six weeks of calls from another field phone, also two times daily.
    Thirteen weeks was as far back as these Bellhop records went.
    "New Delhi must have had civilian agents tracking a terrorist cell,"
    Rodgers said.
    "How do you know that?" August asked.
    "The calls may just have been field ops reporting in."
    "I don't think so," Rodgers told him.
    "First of all, only one of the calls on Corporal Honda's list was made from the home phone to the field phone."
    "That was the one made at the time of the explosion," August said.
    "Correct," Rodgers replied.
    "That would suggest the officers in charge of the recon did not want field phones ringing at inopportune moments."
    "I'll buy that," August said.
    "There's more than that, though." Rodgers said.
    "When Pakistan was knocked out of Kargil in 1999, the Indian Special Frontier Force knew that enemy cells would be left behind.
    They couldn't hunt them down with soldiers. The locals would have known if strangers were moving through a village. And if the locals knew it members of the cell would have known it. So the SFF recruited a shitload of locals to serve in their Civilian Network Operatives unit." The general tapped his laptop.
    "It's all here in the intelligence overview.
    But they couldn't give the recruits normal militia radios because, that close to Pakistan, those channels are routinely monitored by ELINT personnel. So the SFF gave their recruits cell phones. The agents call the regional office and complain about break-ins, missing children, stolen livestock, that sort of thing. What they're really doing is using coded messages to keep the SFF informed about suspected terrorist movements and activities."
    "All right," August said.
    "But what makes you think the calls on this list aren't just routine field reports?"
    "Because CNO personnel don't make routine field reports," Rodgers said.
    "They only report when they have something to say. There's less chance of them being overheard that way. I'm willing to bet that there are terrorist strikes to coincide with the termination of each of those series of calls. A target was hit, the cell moved on, the calls stopped being placed."
    "Perhaps," August said.
    "But that doesn't explain the call to the temple right before the blast." "Actually, it might," Rodgers told him.
    "I don't follow," August said.
    Rodgers looked up at Honda.
    "Corporal, would you please get the TAC-SAT?"
    "Yes, sir."
    Rodgers turned back to August.
    "I'm going to ask Bob Herbert to check on the dates of terrorist strikes in the region," he said.
    "I want to see if reports from field phones stopped coming in after terrorist strikes. I also want Bob to look into something else." "What's that?" August asked.
    Honda closed his laptop and stood. He lingered long enough to hear Rodgers's reply.
    "I want to know what kind of detonator caps the SFF uses for counterterrorist strikes," the general replied.
    "Why?" August asked.
    "Because the Mossad, the Iraqi Ala mn al-Khas, Abu Nidal's group, and the Spanish Grapo have all used PDEs on occasion," Rodgers said.
    "Phone-detonated explosives."
CHAPTER THIRTEEN.
    
    Srinagar, Kashmir Wednesday, 6:59 p. m.
    It was nearly dark when Ron Friday returned to the bazaar.
    Though he was curious to see how the authorities here were handling the investigation he was more interested in what he might be able to find out about the attack. His life might depend on that information.
    The rain had stopped and there was a cold wind rolling off the mountains. Friday was glad he had worn a baseball cap and a windbreaker, though the drop in temperature was not the reason he had put them on.
    Even from his room he could hear helicopters circling the area. When Friday arrived he found that the two police choppers were hovering low, less than two hundred feet up. In addition to looking for survivors, the noise echoing loudly through the square helped to keep onlookers from staying too long. But that was not the only reason the choppers were there. Friday guessed that they were also maintaining a low altitude to photograph the crowd in case the terrorist was still in the area. The cockpits were probably equipped with GRRs-geometric reconstructive recorders. These were digital cameras that could take photographs shot at an angle and reconfigure the geometry so they became accurate frontal images. Interpol and most national security agencies had a "face-print" file consisting of mug shots and police sketches of known and suspected terrorists. Like fingerprints, face-print photographs could be run through a computer and compared to images on file. The computer superimposed the likenesses. If the features were at least a 70 percent match, that was considered sufficient to go after the individual for interrogation.
    Friday had worn the baseball cap because he did not want to be face-printed by the chopper. He did not know which governments might have his likeness on file or for what reason.
    He certainly did not want to give them a picture with which to start a file.
    The blast sights had been roped off with red tape. Spotlights on ten-foot-tall tripods had been erected around the perimeters.
    Physically, the main market area reminded Friday of a gymnasium after a dance. The event was over, the place eerily lifeless, and the residue of activity was everywhere.
    Only here, instead of punch there were bloodstains. Instead of crepe there were shredded awnings. And instead of empty seats there were abandoned carts. Some of the vendors had taken their carts away, leaving dust-free spots on the ground in the shape of the stall. In the sharp light they resembled the black shadows of trees and people that had been burned on the walls of Hiroshima and Nagasaki by nuclear fire.
    Other carts had been simply abandoned. Perhaps the owners had not been there when the blast occurred and the hired help did not want to stick around. Maybe some of the sellers had been injured or killed.
    Militiamen from the regular army were stationed around the perimeters.
    They were carrying MP5K submachine guns, very visible in the bright lights. Police were patrolling the square carrying their distinctive 455 Webley revolvers.
    Apart from discouraging looters-which did not really require exposed firearms-there was only one reason to haul out artillery after a strike. It was a means of restoring wounded pride and reassuring the public that the people in charge were still a potent force. It was all so sadly predictable.
    Reporters were allowed to make their news broadcasts or take their pictures and then were asked to leave. An officer explained to a crew from CNN that it would be more difficult to watch for looters if a crowd gathered.
    Or maybe they just did not want cameras recording their own thefts, Friday thought. He was willing to bet that many of the goods that had been left behind would be gone by morning.
    A few people had come to the marketplace just to stare.
    Whatever they expected to see-broken bodies, the spectacle of destruction, news being made-it did not appear to fulfill them. Most left looking deflated. Bomb sites, combat zones, and car wrecks often did that to people. They were drawn to it and then repulsed. Maybe they were disappointed by a sudden awareness of their own bloodthirstiness.
    Some people came with flowers, which they laid on the ground beneath the tape. Others just left behind prayers for dead friends, relatives, or strangers.
    At the destroyed police station and temple, building inspectors were moving through surrounding structures to determine whether they had been weakened or damaged in the blasts. Friday recognized them by their white hard hats and palm-sized echo meters These devices emitted either single or multidirectional sound waves that could be adjusted to the composition of an object, from stone to concrete to wood. If the sound waves encountered anything that was inconsistent with the makeup of the material-which typically meant a breach-an alarm would sound and the officials would examine the site further.
    Apart from the engineers there were the usual police recovery units and medical personnel working at all three sites.
    But Friday was surprised by one thing. Typically, terrorist attacks in India were investigated by the district police and the National Security Guard. The NSG was established in 1986 to act as a counterterrorist force. The so-called Black Cat Commandos handled situations ranging from in-progress hijackings and kidnappings to forensic activities at bomb sites. However, there was not a single black-uniformed NSG operative here. These sites were under the control of the brown-uniformed Special Frontier Force. Friday had never been to any bomb sites in Srinagar.
    Maybe this was the way responsibility for antiterrorist investigations had been parceled out, with the SFF getting the region nearest the line of control.
    Friday was motioned along by one of the police officers.
    He would not be able to get into the rubble himself. But he could still come up with some sound ideas about how the attack was made. As he walked toward the place where the bus had exploded, Friday used his cell phone to call Samantha Mandor at the NSA's photo archives. He asked her to search the AP, UPI, Reuters, and other digital photograph files for pictures of sites struck by terrorists in Kashmir. He also wanted her to pull together any analysis files that were attached to the photographs.
BOOK: Line of Control
5.43Mb size Format: txt, pdf, ePub
ads

Other books

Mob Star by Gene Mustain
Piers Morgan by Emily Herbert
Invisible by Ginny L. Yttrup
World and Town by Gish Jen
Girl Jacked by Christopher Greyson
Tales from a Not-So-Fabulous Life by Rachel Renée Russell
Counterfeit Son by Elaine Marie Alphin
Escape! by Bova, Ben