by Leslie Wolfe
“OK, adding it,” Alex said, then added “India politics” to the list. “Sam, you’re more experienced in things like this; what’s your theory?”
“I have a theory, and it’s not fully fleshed out, but it has to do with terrorism. When I see a heart attack here, a car crash there, arranging a black-market heart transplant in the middle of the modern US medical system, that spells power and money to me. Huge power, lots and lots of money. That’s why I’m thinking a terrorist organization, not sure who, but an organization nevertheless, that wants to take the election hostage somehow, maybe in the biggest blackmail in the history of our country. Maybe the biggest concentrated terror attack in history. Something like that,” Sam said.
Alex looked at him, puzzled, a frown developing on her forehead.
“Can you please give us more details?” Tom asked.
“If the UNSUB organization gains access to the single nationwide event that puts the majority of all adults in a certain place within a certain time frame, I’d say that’s a power play of immense magnitude and potential. By ‘gaining access’ I mean a lot of things could happen. They could threaten: detonate a few warning charges here and there, make public threats, and cause terror to prevent Americans from voting. They could ask for billions of dollars to allow the voting process to happen peacefully. They could defraud the voting process; although it’s hard to say why they’d care, unless there’s an American political connection involved somehow. Has some politician outsourced the committing of electoral fraud? That’d be something, wouldn’t it?”
They were all staring at Sam in disbelief. Alex felt a wave of anger rising in her throat, choking her. Motherfuckers! She made an effort to regain her calm, analytical demeanor.
“We should have started with you,” Alex said. “Wow...that’s a lot to think about. Why do you say organization? Can’t a single individual hold the power and the money necessary to make this happen?”
“Not really. From what I am seeing,” Sam replied thoughtfully, “this plan is not only large and complex but also elegant. It plays like a symphony, not like a single-instrument tune.”
“How do you mean?” Alex asked.
“A single individual wouldn’t have had the capacity, mentally and operationally, to lead and execute such a complex plan. A single individual could have created the plan, that’s true, but he’d need an organization to execute this plan. The facts we know don’t seem to be that many, but the precision of execution leads me to believe there are many people behind this plan, deploying and executing surveillance on multiple targets, drawing conclusions, making things happen. That’s why I said symphony.”
Sam rubbed the back of his neck, thinking hard. “Here’s another thought for you. We don’t know anything about the money. How the money flows, where it comes from, and how. Getting a black-market heart transplant arranged, that’s north of a million dollars, considering it was done in a legitimate clinic, not someone’s back room.”
“Yep, we don’t know much about the money, that’s true,” Alex said and wrote “Money trail” under Unknown. “Any other thoughts, ideas, scenarios?”
No one offered; they were tapped out.
“I think we’re out of any new ideas, especially after Sam’s input,” Steve said. “The one thing circling in my mind now is that we might have underestimated the complexity of this case, and by complexity, I also mean danger. If we’re about to uncover a conspiracy of this magnitude we are facing extreme danger and we should proceed, if we still want to, with extreme caution.”
“Oh, we’re still proceeding, if you’d like my opinion,” Alex said. “Let’s figure out how. I’ll finish the timeline and the categorization this afternoon and see if any new ideas pop up.” She took a couple of gulps from her coffee mug. The coffee had turned cold. She went toward the coffee maker and programmed it to brew a new serving on top of her cold coffee leftovers.
Sam popped a cold Coke from the mini fridge, drinking it with large gulps.
“What are you planning to do?” Tom asked. He stood and started pacing a little, not having much room to do his traditional back and forth. “How would you like to approach this?”
Steve also stood and, grabbing a bottle of water from the small table, went near the window and leaned against the wall. Lou fidgeted, tapping his foot quietly against the floor, but remained seated. Brian was the only one maintaining his relaxed pose, probably because he was used to sitting through very long business meetings. They were ready for a break; the work session had been intense and bothersome.
“I’d approach it the usual way, thinking Robert could get me hired on his team. He does have two openings. Getting me aboard will probably take longer than usual because we don’t have DCBI as a client, so there’s no senior leadership support for our case. I would have to go through channels and act like any other employee. No fast tracking will happen here. Robert, who most likely is also under complete surveillance in both home and office, has to play this very carefully. We have to get this phase started.” She took a sip of fresh coffee. “I’d have to move to DC,” she said, a little concern seeping into her voice.
Steve caught on to that and looked straight at her. She smiled and made a quick reassuring gesture. She would be fine, she’d have to be, no matter how scary it felt to think she’d be on her own in a strange new city and most likely under surveillance all the time, just like the rest of Robert’s team had been. That ups the ante a little bit, she thought, and if I make a mistake or voice the wrong opinion, I won’t even know what hit me. But damn if I’ll let them win this, no fucking way I’m backing down now.
“We can follow three things.” She turned and wrote them on the whiteboard. “Tech, heart, and money. It’s what we have. We have the two technology contracts, hardware to Taiwan and software to India. We’ll follow those as soon as I’m inside DCBI. Until then, we can get started on the heart and the money used to pay for the transplant.”
“It’s a plan,” Tom said. “Brian, what are your next steps?”
“I’ll work on the equipment, encryption devices, decoders, locators, anything I can think of, and maybe Sam can help with a few ideas. I will also give Alex a crash course in strategic sourcing, vendor engagement, quality assurance for outsourced contracts, and all that good stuff.”
“So we’re still a go?” Sam asked.
Alex looked at Tom. He nodded almost imperceptibly.
“Hell, yeah,” she responded.
...37
...Tuesday, January 26, 2:19PM Local Time (UTC+1:00 hours)
...Zur Roten Buche Corporate Center
...Zürich, Switzerland
Ahmad Babak Javadi was about to lose every bit of temper he had left. These handymen were idiots. The task couldn’t have been easier, and they were fucking it up. All they had to do was put four holes in the wall, drive screws through them, and hang the damn sign. Centered, level, at the right height.
He let himself drop into a huge leather armchair, one of the two in his office reception area. As soon as he hit the red, sumptuous leather, he let a long sigh escape.
“Did you measure from the sides? It’s to the left, not in the middle of the wall,” Javadi said, his thick Iranian accent enhanced by frustration.
“Ja, ja, we did,” one of the nitwits replied.
“Like hell you did,” Javadi said, getting up. He took off his charcoal suit jacket and grabbed the measuring tape. He had to do everything himself it seemed.
Until now, everything had gone quite nicely, according to plan, and with minimal difficulty. He had leased a nice, secluded home for himself, only a few minutes away, yet buried in the hills just off Triemlihalde. Yes, he had the rattling of passing trains bothering him every now and then, but he had the privacy of the thick forest in return. The office space wasn’t that bad either, and he was almost done setting things up.
Javadi was used to getting things done his way, precisely his way, when he wanted, how he wanted. Sitting on a considerable f
ortune invested in a diversified portfolio of household names like eBay, Google, AT&T, and General Electric, he was used to the utmost deference. In his palatial home in Tehran, worthy of the Eram Garden, this measure of ineptitude would have never happened. Now there were six holes in the wall, two of them visible to the left of the sign. He would have to make them cover the holes and repaint the wall and have it ready before the next morning, when his first appointment was scheduled to arrive.
But the damn thing was finally hanging on the wall where it was supposed to, and it looked quite nice. That was if the eye of the beholder chose to ignore the two ugly holes that were soon to be covered and focus on the brushed metal letters spelling out elegantly “Eastern Africa Development Fund.”
...38
...Wednesday, January 27, 1:47PM PST (UTC-8:00 hours)
...Tom Isaac’s Residence
...Laguna Beach, California
Tom’s home office, once elegant, open, and tastefully decorated with items that were chosen to fit together harmoniously, had been dubbed the war room. How very appropriate, Alex thought, entering the semi-disorganized work area and setting up her laptop on the improvised conference table. The corkboard on the wall now showed images and sticky notes with names, events, and concepts pinned up and tied together with colorful knitting yarn, color-coded by meaning. Green yarn symbolized a verified, proven connection between two people or events. Blue signified a suspected and plausible connection. There was red yarn available; it was going to be used for unexpected, surprising connections—if they were going to find any. Red had not been used yet.
The night before she had torn everything down and rebuilt it to incorporate a timeline. It worked better like this, made more sense. They might call this system the Crazy Wall, but it was very helpful. She was going to miss it in DC.
“Admiring your handiwork, huh?” Brian asked, walking through the door with his arms full. He deposited everything he was carrying on the table, and then went straight for the coffee machine.
“Hey, Brian. Yeah, I am,” Alex responded. “I was wondering if there’s a connection between the hardware vendor and the software vendor, between India and Taiwan, somewhere in the background somehow. Maybe they’re owned by the same investors? I think we need some yellow yarn, for untested hypotheses and wild hunches.”
“Maybe Lou can dig a little and test your hunch.”
“Yeah, I’ll ask him,” she said, grabbing her coffee mug and going for a refill. “What do you have for me?”
“Lots and lots of toys, you’ll see.” He sat down and grabbed a boxy device, about the size of a laptop, only a little thicker. “Since you’ll be heading into some travel, specifically to Taiwan and India, I wanted to make sure that you can communicate freely with us, regardless of time and location. These devices will also ensure you maintain the confidentiality of all communication, because you won’t have to go through your hotel’s Wi-Fi, or through the vendor’s network.”
Alex took the device from Brian, examining it closely.
“Ah, a satellite link,” she said, connecting it to the laptop. “I always wanted to try one of these.”
“Go ahead, play with it. It’s the Inmarsat BGAN terminal from Globalcom. It will give you voice, data, and a WLAN access point to hook up your laptop. It’s not very fast, but it will give you data and voice access from anywhere. The data transfer fees are ridiculously large, but feel free to use it as you need.”
“Yep, it’s slow, but it gets the job done, excellent. What’s next?”
Brian grabbed a black object that resembled a phone with a thimble-sized antenna, entirely black and without a screen or keypad.
“For when you can’t use the Inmarsat terminal, we have something else. Let me have your cell phone, please,” Brain asked. “If you attach this device to your cell it turns it into a satellite phone. You attach it to this case first,” he said, picking another object from the pile, one that looked like a typical cell phone holder, “then you attach the sat phone device.”
“Really? Sweet deal,” Alex said, grinning widely.
“It’s called the Thuraya SatSleeve. Once connected to your iPhone, it will instantly give you access via satellite, while using your own number, wherever you are. You can make and receive calls and text messages. The antenna extends like this,” he demonstrated. “But the product is sensitive enough to alert you of incoming calls or messages even if the antenna is not extended.”
He picked up two smaller devices.
“These are for voice and data encryption: one’s for your laptop, the other for your cell. Additionally, we will all have an encryption app installed on our phones, and we will start using that encryption software immediately. If you recall, we’re running the risk of getting our communications intercepted very soon. This is how it works. You install the Encrypher app, and it will add an option to your phone dial screen. If you touch this small circle before dialing, the app will look for its counterpart on the recipient’s phone and encrypt the call. The encryption will kick in within the first three seconds of the call, so it’s fairly fast. When the encryption goes active, both call parties will hear a quiet beep.”
“Excellent,” Alex said. “I was wondering how we were going to manage communications.”
“Also, when you get to either place, you should buy a cellular data access token and subscription. Don’t go through anyone else’s Wi-Fi with your data transmissions, not even your hotel. You never know who’s watching.”
“Yeah, I can see why. Cellular data transfers via tokens are actually the safest wireless data transfers available when you travel outside your firewalled home network. They have their own number that doesn’t appear anywhere, in any records, so it’s fairly hard to even know they exist, not to mention intercept.”
“Correct. To the average surveillance team it will appear as if you’re not connected to the Internet. If they’re watching your screen, they’ll figure it out though and start looking for a signal to intercept. Be careful.”
“What if the surveillance team is better than average?”
“We’re getting there,” Brian said, picking up the last remaining item on the table. “This is a bug sweeper, a countersurveillance tool of very high performance. It will detect any active surveillance or tracking devices, such as hidden cameras, mics, GPS trackers, essentially anything that transmits any signal from your location, wired or wireless.”
“What did I miss?” Steve asked, barging through the door.
“A bucket load of gizmos,” Alex said. “Nothing else.”
Steve grabbed a seat across the table.
“Don’t stop because of me. I’m here for the next part,” he said.
“We’ll get to that shortly. Just finishing up with the devices,” Brian answered. “OK, so back to countersurveillance.”
Alex was listening, fascinated. She had never had the opportunity to learn about these things other than from movies and books.
“The first instinct, when we find a bug, is to rip it apart and flush it down the toilet,” Brian continued.
“Totally.” She laughed.
“Yeah, but what does that do? That informs whoever’s listening that you know you’re being bugged, which will increase their level of attention, and, most likely, the caliber of surveillance they’re deploying. They’ll bring bigger, better, more sophisticated tools that you might not be able to uncover that easily. So what do you do when you find surveillance gear in your space?”
“Nothing?” Alex ventured a guess.
“Not really, no. You start feeding them what you want them to know. Behave as normally as possible, and use the blind spots in their surveillance to do the things you don’t want them to know about or see.”
“It doesn’t sound that easy,” Alex said.
“It isn’t,” Brian confirmed. “Sam will show you how to do this. He’ll bug one of the rooms here and walk you through how to handle bug sweeping, because you can’t really show up on their cameras
with a bug sweeper in your hand, either.”
“Oh, OK, that’s a good idea. But how am I going to carry all this stuff with me and not have anyone see it? They could search my room when I’m out, go through my luggage.”
“Correct. That’s why you’ll be carrying it all with you in your laptop bag. It’s gonna be heavy, I know,” Brian said in response to Alex’s raised eyebrows. “You’ll also have to get into the habit of never letting it out of your sight. If anyone picks up on that just tell them you don’t carry a purse and that all your personal stuff’s in there, and they’ll back off. Remember, you’ll have to take the bag with you everywhere you go. Restroom, dinner, meetings, everywhere.”
She looked in disbelief at the pile of hardware on the table. Maybe, if carefully organized in the bag, they could all fit. The Inmarsat terminal was the issue. The rest were small enough not to pose problems.
“In case of emergency, if you absolutely have to leave the bag behind, take this with you, in a pocket or something,” Brian said, pointing at the SatSleeve. “Make sure you can call us anytime; that’s the number one priority.”
“Thank you. For all of it.” She gestured toward the pile of devices.
“One more thing,” Brian said, “do you have the ‘Find My iPhone’ app installed on your cell?”
“Yes, I do, why?”
“I’ll need your Apple ID and password,” Brian said. “Using that app and your Apple credentials, we’ll be able to see where you are,” he continued, causing Alex to raise her eyebrows in disbelief. “Great app to track your stolen or misplaced phone, but also the greatest stalker tool ever invented. Yes, we will be stalking you, a lot.”