Read The Cloud Collector Online

Authors: Brian Freemantle

The Cloud Collector

BOOK: The Cloud Collector
13.53Mb size Format: txt, pdf, ePub
ads

 

Begin Reading

Table of Contents

About the Author

Copyright Page

 

Thank you for buying this

St. Martin's Press ebook.

 

To receive special offers, bonus content,

and info on new releases and other great reads,

sign up for our newsletters.

 

Or visit us online at

us.macmillan.com/newslettersignup

 

For email updates on the author, click
here
.

 

 

The author and publisher have provided this e-book to you for your personal use only. You may not make this e-book publicly available in any way.
Copyright infringement is against the law. If you believe the copy of this e-book you are reading infringes on the author's copyright, please notify the publisher at:
us.macmillanusa.com/piracy
.

 

 

For Camille Colon, my über-fan and friend

 

The mystery of how he [Osama bin Laden] kept in touch with his followers was at least partly solved yesterday by U.S. intelligence officials … to send an e-mail bin Laden would type a message on his computer, copy it to a flash drive and hand it to a courier who would then drive miles to a distant Internet café. The courier would then send the e-mail from the café, making it all but untraceable.

—Report of a CIA briefing on how Osama bin Laden controlled Al Qaeda from his Abbottabad, Pakistan, lair,
London Times,
May 13, 2011

 

 

I think it's a violation of human rights.… It [the use of drones] means you assassinate people without bringing charges, without finding them guilty, and in the process inadvertently causing collateral damage, that is the killing of completely innocent people who might be in the neighborhood.

—Former U.S. president Jimmy Carter,
London Times
interview, July 4, 2012

 

1

The forensically enhanced clarity from such a neglected CCTV was remarkable. Closing the blinds of the CIA's Langley viewing room into semi-darkness helped. The original TV camera on the wall of the single-storey winos' bar had been ten yards from the assassination, which was another advantage. The target car, a bumper-crumpled, windscreen-cracked Ford with a red offside front wing that didn't match the rest of the faded blue paintwork, came surreally into the silent picture from the left of the screen. It wasn't hurrying, slowed further by vehicles haphazardly parked on either side of the street: it was still too early for traffic restrictions or people. The front passenger had his window down, arm on the sill. The wristwatch was a heavy mix of dials, control knobs, and numerals that would have glowed in the dark or been legible underwater.

The Ford driver found a tight space just before the telephone stand and put another dent in the bumper shunting into it. The passenger rolled his window up, but didn't get out. Neither did the driver or the scarcely visible third man in the rear. All three were heavily bearded. No-one appeared to be talking. A time counter had been superimposed on the screen: it registered six and a half minutes past five before the two men in the front got out and walked, still not talking, to the telephone. Neither attempted to get inside the hood. The driver rested his arm against the telephone ledge to keep his watch in front of him. Like the other man's, it had a lot of dials and knobs. Both men physically reacted to what must have been the incoming ring. One man grabbed the receiver, crowded beneath the hood by the other, preventing either from becoming aware of the ambush until the man they'd left in the Ford emerged from its rear, waving and obviously shouting. By that time the three who'd come from an unobtrusively parked fawn Toyota were close enough to fire point-blank. They did so precisely, bringing both men down with body hits and finishing off with single head shots. The other Ford passenger was running, and one of the hit squad broke away in pursuit but almost at once accepted that the intervening distance was too great and gave up, walking casually back to the other two bent over the bodies, rifling through their pockets. They straightened, laughing, as the returning man reached them. All three walked unhurriedly back to the Toyota and drove off in the direction of the Capitol, obediently halting at a red stoplight just visible to the CCTV.

*   *   *

‘So how does it work?' demanded Charles Johnston, the newly appointed CIA director of covert operations.

Jack Irvine knew that having gotten this close he couldn't afford any mistakes. He could not give this unknown man the slightest excuse to cancel, question even, the operation on which he'd worked so hard for so long to the exclusion of girlfriends, any other social life, even his belovedly restored but now neglected '92 Volkswagen. His operation—
his
, no-one else's—had to be preserved, and he'd do everything and anything to ensure that it was. The Anacostia video provided the proof that it worked.

As the cliché went, pictures were worth a thousand words and words were what Irvine intended to limit. Neither Johnston nor the other two men with him needed to know the full details of what he'd achieved as a National Security Agency highflier roaming way beyond Iran's official Halal Web site to discover its use of unrestricted, anonymous cyberspace darknets.

Irvine said, ‘It's anti-terrorism, using the Internet—Facebook and chat rooms—as the jihadists use them: how bin Laden himself used them. And Al Qaeda and every other militant Islamist, anarchist, and would-be terrorist is still using them.' It had echoed impressively when he'd mentally rehearsed it. Spoken aloud, it hadn't sounded quite so good; neither had the hesitation in his voice.

‘How?' demanded Johnston. He was a large, heavy-featured man of self-protective conformity whose suits were always grey, shirts always white, and ties always plain. At that moment those heavy features were expressionless, betraying nothing.

‘Taking terror to terrorists: we hack into their traffic, manipulate it.…' Irvine, who despite the abandoned jogging routine was an athletically slim man suited to jeans, T-shirts, and loafers, gestured towards the now-blank screen. ‘Atrocity-planning terrorists killing other atrocity-planning terrorists with no collateral damage: no dead, innocent civilians and children caught up in a Reaper drone attack; no accusations against our military. All are identified by the NSA from overseas intercepts leading us to individual groups within the United States. Proof of intended terrorist attack is never obtained from illegal phone, computer, or radio wiretapping or hacking in this country.' Irvine again indicated the screen. ‘That's not our first success. If we can't create an internal war, we alert Homeland Security or other enforcement agencies overseas.' He was covering all the obvious objections, Irvine knew, disappointed there was virtually no reaction from the covert-operations director.

‘So that's how it's different from the NSA's Prism Project and the Brits' Tempura programme of 2012 that got us so much heat. We hunt, don't wait?'

‘Exactly!' agreed Irvine, acknowledging that Johnston had tried to prepare himself. Irvine was sure there was still no danger of his being found out.

‘And what we've just seen is the result of an already-sanctioned feasibility trial?' pressed Johnston, ever cautious.

‘Officially designated Operation Cyber Shepherd,' confirmed Irvine. ‘I've already established a NSA team at Fort Meade; they're waiting to be briefed.'

Johnston jerked his head in the direction of the dead screen. ‘What about the guy that got away?'

‘Ismail al Aswamy, an Iranian in the U.S. on an expired student visa.' Irvine looked sideways at James Bradley, the operation's CIA supervisor, who continued studiously to ignore him. ‘Jim assured me Aswamy's ours whenever we want to take him. For the moment we're ready to follow wherever he leads us.'

‘What's the body count so far?'

‘The two you just saw taken out brings those eliminated here to a total of five. The other three were in Boston. Anti-terrorist police in Rome, Italy, have a group we've identified under surveillance. We've given the UK a lead in a town there called Bradford; no playback yet.'

*   *   *

Three and a half thousand miles away, in the Thames-side headquarters of MI5, its diminutive Director-General was even more curious at a lack of results.

His critics saw David Monkton's reluctance to delegate as the man's most obvious failing, while his matching number of supporters judged it his major attribute. In an organization as large and as complex as Britain's counter-intelligence service, delegation was operationally imperative. Monkton, whose life was tightly structured on self-imposed rules, evolved an equally reluctant compromise. He insisted upon daily, not weekly, updates on priority-designated cases from his divisional directors and carried out unannounced, unpredictable spot checks upon what he considered inadequate briefings.

This practise would uncover the nightmare scenario feared by every Western intelligence agency since 9/11 and 7/7.

 

2

David Monkton conducted the meeting not from his inherited desk, which he knew to be too large for someone of his stature, but by moving around the river-view suite, sometimes, such as now, out of his visitor's sight. Re-emerging, the MI5 Director-General went to a much-smaller side table upon which he'd spread the dossier retrieved earlier. Without looking back to Jeremy Dodson, his operations director, Monkton said, ‘Why didn't this intrigue you as much as it intrigues me? As it
should
have properly intrigued you!'

Dodson, who'd actually consulted reference books for the diagnosis, decided Monkton's behavior was a classic example of a Napoléon complex, the insignificantly small man's constant need to bully. ‘The police are adamant there's no link whatsoever between what came from America and the murder.'

‘Which police? Special Branch? Scotland Yard's anti-terrorist division? Who?'

‘A combination,' avoided Dodson uncomfortably. He shouldn't have left himself so exposed.

Monkton collected the file and finally returned to his over-sized desk, leaning forward over it and smoothing into place his immaculately trimmed toothbrush moustache that didn't need smoothing. ‘I don't understand that answer, as I don't understand too many other things. Let's go back to the very beginning, to when we got the alert from the National Security Agency.'

The operations director breathed in heavily, only just preventing it from becoming a sigh. ‘Fort Meade picked up some low-level Pakistani chatter and followed it to Germany. It included the name Roger Bennett with an indication that he was British, and so they passed it on to the Government Communications Headquarters at Cheltenham.'

‘Who, quite properly, following established procedure, passed it on to us, which in practise means you. So tell me, what did you do? That's what I really want to know.'

BOOK: The Cloud Collector
13.53Mb size Format: txt, pdf, ePub
ads

Other books

Unexpectedly You by Josephs, Mia, Janes, Riley
Hitler's Last Secretary by Traudl Junge
El loco by Gibran Khalil Gibran
The Bachelor Pact by Rita Herron
The Great Bridge by David McCullough