Read The Cloud Collector Online
Authors: Brian Freemantle
The simple, as always self-honest, answer was that she couldn't. Monkton hadn't called back and there'd been no update from Irvine at Fort Meade. The only addition to the evening TV news announcement of the Senate enquiry, which she already knew about, was of a promised CIA statement the following day about Abu al Hurr's death. Leaving Sally with the choice between an empty evening at her Watergate service apartment or an umpteenth re-examination of the GCHQ and Fort Meade downloads on her Langley computer. She chose Langley for its secure telephone link to Irvine. Who would already have used it to call her if there'd been any breakthrough. They were now relying on GCHQ to provide it, from whatever elseâwhatever newâGCHQ intercepted. Irvine could be right, of course: there was no proof they
had
anything new. It was a surmise, from the British withdrawal, which was a result of career fears. There could after all be something among all the mathematical hieroglyphs she was looking at. Careful, Sally warned herself. If there were, she'd already accepted it wasn't she who'd have the eureka moment. How close, though, could GCHQ conceivably be? She could gaugeâor at least make a calculated guess from what she had in front of herâthat directly hidden in every intercepted Vevak Facebook post was the partial transliteration.
Sally closed her split screen to concentrate entirely upon the British cache, remembering as she did so that it was GCHQ who'd snared both Kermani and Smartman. With that came the further recognition that Kermani was the only interception whose domain address was in the name of a known Persian historical figure, the shah assassin Mirza Kermani. Was using the revolutionary's name significant? Or was she trying too hard?
There had been three encoded Kermani messages. The first according to date and for which GCHQ had sought American help had transliterated from the original Arabic into twenty-four Roman letters and numerals. NineâAANBLEEYEâwere potential decryption. Still encoded were WIQQFDNCMLN59NM. She knew from the time she'd spent at Irvine's side that single letters were rarely if ever repeated in translation after their first use, and that some single letters represented a block. Some letters and figures were meaningless decoys. Digital dots and separations could also have letter significance. Until at least half were decoded, it was usually impossible to separate a string into comprehensible words. After thirty minutes she gave up trying to make sense out of the first block of nine. Kermani's second message ran to forty-two letters, numbers, and digital characters. There were ten hopeful decodesâICEOUFLUISâand thirty-two failures.
With eye-blurring concentration Sally worked for a further two hours through every English-collected message from Kermani, running over into Smartman, Anis, and Swordbearer exchanges shared with Fort Meade, before finally abandoning the effort, acknowledging the pointlessness. She briefly considered telephoning Irvine's direct Fort Meade line but abandoned that idea, too, grateful to finally get to her Guest Quarters apartment, too tired to bother with food.
At exactly 3:00 a.m. by her illuminated bedside clock, Sally came abruptly and fully awake, the awareness complete in her mind. She couldn't be right. It had to be an aberration, a fatigue-induced hallucination that she could check unbeknownst to anyone when she got to Langley in the morning.
She lay open-eyed in the darkness for another fifteen minutes, isolating it again and again and becoming surer every time that she was remembering correctly, before throwing off the bedcovering. It
was
the morning. Why was she waiting?
Â
It took just fifteen minutes for Sally to confirm she hadn't been hallucinating and only another ten for her to assess the significance of her realization. Four a.m. in Washington, DC, was 9:00 a.m. in London. David Monkton answered his direct line on its first ring.
âI know the British target and believe I can confirm the American through it. We'll know for sure when we run some numbers through Fort Meade's computers.'
âWhere are they?' monotoned Monkton.
âThe RAF base at Waddington, Lincolnshire, and a USAF base somewhere here.'
âFrom Waddington drones are flown against Al Qaeda IS and the Taliban in Afghanistan and in Pakistan.'
âAs well as in Yemen and Somalia,' expanded Sally.
âWhat makes you so sure?'
âThe first intercepted Vevak message in the Kermani group, the one for which GCHQ asked for NSA's help,' listed Sally. âWaddington's post code, LN5 9NA, was hidden in the encryption.'
âIs that all?' pressed Monkton.
It was impossible to discern the doubt, but Sally guessed it was there. Not hiding her irritation she said, âI think complete postal coordinates in an encoded Iranian intelligence communication for a British air base from which drone attacks are mounted against Al Qaeda IS and Taliban targets justifies a security alert!' She was breathless, jagged voiced, when she finished.
âSo do I,' punctured Monkton in three words.
Shit, he'd off-balanced her again, Sally acknowledged. âAnd would be doubly justified when we uncover the zip code.'
âIt's your four thirty in the morning,' Monkton unnecessarily pointed out. âYou're surely not proposing to wait until Fort Meade wakes up to run your zip-code search when GCHQ is fully operational right now!'
Sally smiled in anticipation of her recovery. âNo, I'm not proposing that! I'm sure about Waddingtonâand glad you agree with meâand believed alerting you was my first priority. The Fort Meade unit
is
awake: they're working a twenty-four-hour rota. With their technology they'll do in minutes a search that would physically take me hours and still risk a mistake or an oversight. If there's a match, GCHQ get the complete package, which keeps to our agreement, and if there isn't, they get what's applicable to them, to England, without wasting their time.'
âLogically argued,' conceded Monkton after a pause. âNext question: When?'
âWe don't have that, not yet. But we can be in place, ready, ahead of any attack. We're not expecting it to be a long wait, are we?'
âNot if the indicators are right. Youâand Meadeâhave got an hour.'
âThank you.'
âAnd well done. Once again.'
*Â Â Â *Â Â Â *
Sally recognized the drawl but couldn't remember the name, which wasn't offered in return when she identified herself. He said he'd wake Irvine, but Sally suggested he run the check first: she could be wrong.
âYou got the zip?'
âTwo, off the Internet: 89018 and 89070,' offered Sally. âTry 070 first: I'm guessing it's base-dedicated.'
âGive me your number.'
It was Irvine who called back. âWe located both: 070 in the third Kermani post, 018 in Swordbearer's first. It's definitely Creech Air Force Base at Indian Springs, Nevada. And you should take up clairvoyance as a profession.'
âI'll think about it as a career change,' dismissed Sally.
âWho else knows?'
âMonkton. But he'll leave you to tell GCHQ when I tell him it's definite.'
âI'm on my way down.'
âI'll be here.'
âAnd congratulations.'
Which was the word Monkton used when she called him back, twenty minutes short of his deadline. So why, she wondered, wasn't she feeling more satisfied? It didn't improve even when she made a connection they could follow to get the date for the attacks.
*Â Â Â *Â Â Â *
âBradley fell over himself for a breakfast meeting, so I came down myself; so it made sense to carry on personally,' said Ben Hardy. He'd taken a chance arriving at Pennsylvania Avenue unannounced, but so far it looked as if he'd pulled it off.
âAbsolutely,' agreed the FBI director.
âHe's one hell of an angry guy.'
âWhat's he got to say?'
âEverything and anything you want to know about Operation Cyber Shepherd, I guess,' exaggerated Hardy.
âLet's hear it!'
âDevised by Irvineâfirst name Jackâwhom you know from Homeland meetings. Comes with heavy baggage. Father was the U.S. ambassador to Lebanon who almost caused a Middle East war trying single-handedly to get Hezbollah, Fatah, Hamas, and Israel all tucked up in the same bedâ'
âAnd skewed a presidential election here because the Jewish vote didn't go to the incumbent's second term re-election,' broke in Bowyer, remembering.
âThe link continues, after a fashion. Irvine's a computer geek. Worked in Israel with Conrad Graham perfecting the sabotage of Iran's nuclear development.'
âHow's Cyber Shepherd work?'
âIt hits terrorists before they hit their intended targets: simply takes them out.'
âNow there's a lot to think about,' mused Bowyer.
*Â Â Â *Â Â Â *
âYou spoken to Graham?' demanded Irvine before he entered her office, ignoring his own. He'd jogged from the parking lot and was breathing heavily.
âTried to, when he didn't contact me,' said Sally, who'd known Graham would have been aware from the omnipresent internal security of her nocturnal return. âHe's unavailable until mid-morning, which is a bonus. I've got an idea of how to find out when they'll hit.'
âHow?'
â[email protected]. Isn't that where he'll be, but where you couldn't find him: hacked into a military base?'
Irvine shook his head in bemused realization. âShit, yes! He's got a botnet in a computer somewhere there.' In his excitement Irvine pulled up from the only other chair to lean over the desk towards Sally. âThat's it! We're gonna get him!'
âNo, we're not, not that easy. We'll only get one shot. One mistakeâthe vaguest hint that we're looking, know where to lookâand we'll lose him, lose everyone: those in England, others elsewhere,
and
the Hydarnes access.'
Irvine eased back into his chair, the euphoria gone. âThe concealment will be good, the best. We know it will.'
âThe best. But you've got to be better because you've got to do a lot more than just find it. When you doâand get past all the obstaclesâcan you hack into him: put a botnet inside a botnet to see everything that passes between Smartman and Hydarnes without their knowing you're there?'
âYes.'
Almost too quick, worried Sally, and wished she hadn't. âHave you done it before?'
âYes.'
âThen we can stop it all, like we did before.'
âWhat can go wrong!' clichéd Irvine, confidence returning.
âThat one mistake.'
*Â Â Â *Â Â Â *
The objections were immediate and predictable. With Irvine listeningâand promptingâfrom her side, Sally openly spoke to Monkton from her monitored CIA line, wanting to prepare the overhearing Conrad Graham for the inevitable disagreement to follow. For the first time she consciously welcomed Monkton's unnerving silence for the uninterrupted opportunity it hopefully provided to persuade the man that for them to get the attack date, there should be no immediate response beyond the Internet search for Smartman.
âIt's a virtual certainty that Smartman is embedded somewhere within the Creech IT system, reading everything. He might even be an airman serving
on
the base. So there can't be any abrupt and visible military buildup of men or equipment,' Sally warned. âAbsolutely paramount, no electronic communication containing any referenceâthe slightest indicationâto what we know. Every communication has to be handwritten on non-electric equipment and hand-couriered. Both GCHQ and NSA have established beyond doubt that domains have been shared on at least two darknet sites. Jack, who's with me, has already advised GCHQ to sweep Waddington's entire IT systems for a duplicate of what we're sure is a Smartman botnet at Creech. Technically GCHQ can get into Smartman's hack and read his traffic. That's how we'll get the date.'
For the first time ever betraying an emotionâincredulityâMonkton said, âYou're guessing, an absolute and utter guess, that Smartman has hacked into a Creech IT system! You're proposing, on the basis of that absolute and utter guess, that Americaâand we, here in the UKâdo nothing in the hope that, first, you're right; secondly, that Irvine's unit will find the intrusion; thirdly, that they'll be able to invade it without being detected and finally get a date for the attack. And only then, according to your reasoning, do we do something about trying to protect ourselves!'
âNo!' denied Sally desperately. âI don't know the geography around Waddington from here. There must be a base, facilities of some sort, close enough covertly to move in personnel and equipment with helicopter support to bring defence in within minutes.'
âYou're proposing a variation of Sellafield all over again,' accused Monkton. âBut at Sellafield we had our defence
inside,
waiting, as well as outside.'
âSo far al Aswamy, Al Qaeda, Iran, whoever the hell all these people are, have lost in everything they've attempted. But still won,' fought back Sally. âThey haven't caused any real damage or physical harm, but they've still generated global hysteria. Here's their cherry on the cake: hitting the two places from which they've been hit and thousands killed. This is their pièce de résistance. We can't just prevent it. We've got to get al Aswamy and all the other jihadists and publicly arraign themâpublicly show they've failed and can only posture.'
There was a silence now Sally didn't welcome. Monkton said, âYour reasoning is skewed, Sally. And all this is academic anyway. I promise I'll put your thinking forward, but it isn't our decision, is it? We elect people who know better than us to decide things like this.'
âThat argument didn't work at all, did it?' sympathized Irvine at the end of the exchange.
Neither did Irvine's when he tried to make the same, now rehearsed pitch to the already-rehearsed Conrad Graham, whose rejections were familiar to both. âAnd now this operation can at last be properly organized,' completed Graham. âPending the findings of the congressional enquiry, the president's appointed me acting CIA director. I'm already operational. And very much in charge of Operation Cyber Shepherd.'