Vektor (2 page)

Read Vektor Online

Authors: Steven Konkoly

BOOK: Vektor
6.3Mb size Format: txt, pdf, ePub

***

Anatoly Reznikov peered through the shades of his front window at the vanishing shape of Karl Berg, the enigmatic CIA agent that had miraculously rescued him from a quick death at the hands of his former masters. The past week had been confusing, hazy, and punctuated by severe fluctuations in his mental state. He’d spent most of the time feeling utterly helpless, certain that he would be brutally interrogated and discarded. His pessimistic side had taken full control of his emotions, which didn’t surprise him. He’d tried to drink himself to death in Stockholm, and failing that had put a gun to his head to finish the job. And that had just been the beginning of a two-day roller coaster ride through Hell, marked by repeated cardiac arrests, torture and beatings while strapped helplessly to a bed.

Only a sheer miracle could explain his sudden moment of clarity on the jet ride back to the United States. It had probably just been a natural fluke. A random release of chemicals, possibly dopamine, to relax his anxiety long enough for him to wrestle control of his mind. Maybe the sight and smell of Karl Berg sipping scotch had triggered it. It didn’t matter. Within the short span of time it took for Karl Berg to walk down the business jet’s aisle, he had formulated a plan that was guaranteed to set him free.

Earning a transfer to this facility was just the first step in a plan so perfect that he considered the possibility that it had been his fate all along to fall into Berg’s lap. Now that his mind had cleared enough to see the bigger picture, he couldn’t think of a better scenario. He’d been despondent about Al Qaeda’s betrayal and his subsequent failure to recover more of the virus canisters, but this new turn of events would take his original scheme to the next level. He just needed to place a single phone call to activate part two of his plan.

He hadn’t lied to Berg. On the contrary, he had told the agent everything, except the part about how he had successfully stolen samples of every weaponized virus and bacteria created at Vektor. He hadn’t been dismissed from Vektor for attempting to steal viral encephalitis samples. By that point, he had already stolen samples of everything he had seen in the bioweapons division. He had been fired for trying to access a section of the laboratory off limits to everyone except for three scientists. Rumors started circulating that the small group had created something nobody had seen before. He took the bait and attempted to sneak into the lab.

At that point, security features at Vektor relied more on humans than technology, and large sums of money helped him circumvent most of the security surrounding the isolated laboratory cell. Or so he had thought. Seconds from crossing the point of no return, he was warned off by the only security guard not infiltrated by FSB agents. Without stepping foot in the off-limits section, they couldn’t shoot him on the spot like they had planned. Instead, FSB agents backed off and allowed him to continue to work at the lab, under close supervision.

A week later, he received an offer to lead a lab group at their sister institute in Kazakhstan. He knew it was a setup, and the rest was history. He’d barely escaped with his life and bioweapons samples worth millions of dollars. Fate had given him one more chance and he didn’t intend to waste it. One call to some very nefarious “friends,” and he could take leave of this place, free to sell his weapons to the highest bidder.

And the icing on the cake? Berg’s people would target Vektor’s bioweapons division and key personnel. He’d finally avenge his parents’ murder at the hands of Russian security forces. Revenge was sweet, especially when it required no effort on his part.

 

Chapter 2

9:15 PM

Viggbyholm, Sweden

Mihail Osin stared at the glowing windows of 14 Värtavägen and considered his options. Interior lights had greeted them upon their silent arrival at the edge of the property’s thick evergreen screen, but he hadn’t detected any movement inside the one-story house. Still, he couldn’t ignore the possibility that someone had remained in the house. Even snagging one of the safe house’s “keepers” could put them back on the path to finding Reznikov. Unfortunately, his own experience with the use of foreign safe houses didn’t leave him optimistic. Reznikov’s abduction had occurred over two weeks ago, which was an eternity to keep a high-value target in such an exposed, but well-concealed location.

The CIA had made a wise choice with this house. The neighborhood was surprisingly rustic and eerily quiet for a suburb less than fifteen kilometers from the center of Stockholm. Close enough to the city for quick access, yet isolated enough to ensure natural privacy. Judging by the amount of time it took the Russian Foreign Intelligence Service to uncover the location, the CIA had gone to great lengths to bury this place in the open. Hidden in plain sight.

His team of four operatives had been deposited on the street behind the safe house a few minutes before dusk, their van joining a rented Volvo sedan parked at a church less than two minutes away. The two-man team in the Volvo had conducted the initial reconnaissance of the neighborhood, quickly determining that street parking was either prohibited or discouraged in the residential areas of Viggbyholm. They hadn’t seen a single car parked on any of the nearby streets. Parking one of their vans on the street for any length of time or lingering nearby would invite disaster. Sitting in a church parking lot after dark probably wasn’t the best idea either, but it was the only non-residential parking zone with quick access to the safe house.

Mihail shifted his knees and removed a hand-sized black electronic device from the open nylon backpack next to him. The device had two stubby antennas and a muted orange LCD screen. He examined the screen, which cast a barely detectable glow on his face. The multi-channel, wireless radio frequency (RF) detector showed a few faint wireless signals in the 2400-2480 MHz range, which was typical for commercial home wireless routers. He was more interested in anything using the 800-1000 MHz frequency range, specifically the sub-ranges most commonly used by wireless motion sensors. Anything lower than 800 MHz would similarly pique his attention.

The RF detector had passively collected data since their arrival twenty minutes earlier, twice detecting a short frequency burst at 910 MHz, which was one of the most common frequencies associated with the local GSM-900 cellular network. The short transmissions resembled what he’d expect to see when a cell phone registers to a local cell tower. At this point, he felt satisfied that neither the yard nor the house was protected by motion detectors. He stood up and signaled for the team to move forward, placing the detector in the pack before slipping it over his shoulders. He disengaged the safety on his PP2000 submachine gun and stepped into the backyard.

Three of the four Spetsnaz operatives converged on the back door from different points in the yard, while the fourth slid along the right side of the house, looking for the power line connection. Mihail listened intently near one of the illuminated windows, but heard nothing beyond the distant hum of a car motor. He decided that they would try to pick the lock and deadbolt, instead of forcing the door open. He desperately wanted to avoid making noise in this neighborhood. If the house was unoccupied, he wanted time to inspect it for anything useful. While one of his operatives worked the locks with a small tool kit, he listened underneath a different window. The house was still. By the time he returned less than one minute later, the two locks had been opened.

He lowered his PN21K night vision monocular into place over his right eye and spoke softly into the microphone attached to his headgear. Two seconds later, the house went dark. On cue with the sudden darkness, the lead member of his team shouldered the door with enough force to dislodge any chain lock barring their entrance. The door opened unhindered, and his team slipped inside. Mihail followed the second man through the door, scanning the darkness with his goggles. Once the two doorways leading out of the kitchen had been secured, he whispered orders for the team to go silent and listen. Roughly two minutes later, he raised his night vision goggles and ordered the fourth operative to return electrical power to the house.

When the lights reenergized, they could plainly see what the rough green images cast by their night vision had indicated. The house had been cleared of everything, “sanitized” all the way down to the toilet paper rolls. He recalled the fourth member of his team to the house, and they spent the next five minutes checking closets, opening drawers and prying at wallpaper in a futile attempt to find anything. Each operative returned to the kitchen cradling his submachine gun and quickly shaking his head. Nothing. He opened his backpack and scanned the radio frequency detector. He found a strong reading at 1621 MHz, which had started a few minutes ago. This was an L-band frequency used for satellite communications. Someone knew they were here, and would very likely receive a video feed of their foray through the house.

He signaled for the team to evacuate the structure and contacted the van once they were outside. On their way to the front of the house, he ordered the power to be permanently cut. Once the power line had been cut, he checked the RF detector again and saw that the device hidden in the house continued to transmit, indicating an independent power source. He thought he had committed an error restoring power while they were inside, but it wouldn’t have mattered. His big mistake tonight had been assuming that they might find anything useful in the CIA safe house. Now the CIA knew for certain that they hadn’t lost interest in Anatoly Reznikov.

As they waited for the van in the shadows, Mihail pulled out his encrypted cell phone and placed a call to SVR headquarters. It was time to exercise the least desirable option on the table. As he had anticipated, their night had just begun.

 

Chapter 3

1:26 PM

CIA Headquarters

McLean, Virginia

Karl Berg reviewed the last few slides from the PowerPoint presentation he would present to Thomas Manning. He had been awake much of the night putting together the first draft of his urgent appeal for the CIA to take action against Vektor Laboratory’s bioweapons department. With Reznikov’s inside information, they could send General Sanderson’s Russian Group to destroy the facility and eliminate key personnel involved in the program. Reznikov felt confident that a small, properly equipped, elite force could successfully execute the mission, given the right tactical intelligence, which he could provide.

Audra Bauer had joined him for part of the morning, helping him to modify most of the slides he had hastily cobbled together. She had already spoken at length with Manning about the threat posed by Vektor Labs. Israeli intelligence assets had repeatedly warned them about the Iranians’ continued efforts to secure research positions within Vektor, despite Israel’s best efforts to dissuade Iranian scientists from studying abroad. Iranian scientists died from sudden natural causes at a startlingly higher rate than their counterparts in other nations. A scientific career in the fields of biology, chemistry, or physics currently ranked as one of the most hazardous occupations in Iran.

The Israelis expressed little doubt that the Iranians intended to steal bioweapons samples from the lab or collaborate with Russian scientists associated with the program. Recent grumblings from Wiljam Minkowitz, their Mossad liaison, left Manning and Bauer with the distinct impression that Israel was no longer satisfied with the CIA’s backseat approach to curbing Iran’s unquenchable thirst for weapons of mass destruction. Manning had already dodged three meeting requests from the Mossad liaison since the president had appeared on national television to explain the domestic terrorist attack on the nation’s water supply. They all knew what Minkowitz would say:
It’s time for the U.S. to step up to the plate and take care of the problem.

Berg’s job today wouldn’t be to convince Manning of the necessity of targeting Vektor. Manning was already primed to take their efforts to the next level. Berg’s presentation was designed to convince Manning that they could win the director’s approval, which would ultimately impact their chances of winning over the president. Without the president’s approval, Berg would have to make some difficult choices. Drop the topic entirely, or take the operation “off the books.”

He didn’t think an unsanctioned black op would be feasible in this situation. Novosibirsk was the third largest city in Russia, nearly two hundred miles beyond the Kazakhstan border. Getting Sanderson’s team to the target wasn’t the problem. Evading the massive military and police response from the Novosibirsk Oblast would be impossible without significant, targeted intervention.

The feasibility of this operation depended upon White House support, which shouldn’t be entirely difficult to win given the fact that a weaponized virus from Vektor Labs had nearly decapitated the U.S. government.

Berg’s STE (Secure Terminal Equipment) desk set rang, indicating a call from the operations watch center. He picked up the handset, which triggered the automatic negotiation of cryptographic protocols within the removable Fortezza Crypto Card inserted into his phone. Unique identifiers built into the card’s cryptographic processor verified that Karl Berg was on one end of the call and that the operations watch center was on the other. STE technology represented a major improvement over the STU-III system, where the cryptographic processor was built into the phone and provided no unique identification procedures. With the STE system, Karl Berg could insert his card into any STE phone and conduct a secure, encrypted conversation.

“Karl Berg,” he answered.

“Good afternoon, Mr. Berg. I have a Flash Alert data package designated for your eyes only. How do you want me to proceed?”

“You can send it through my secure feed. I don’t have time to review the package in the ops center,” Berg said.

Other books

As the World Ends by Lanouette, Marian
Big Girls Do Cry by Carl Weber
Wildflower Wedding by LuAnn McLane
Fire and Ice by Lacey Savage
All Work and No Play by Julie Cohen