Take the Fourth

Home > Other > Take the Fourth > Page 19
Take the Fourth Page 19

by Jeffrey Walton


  Over that same period of time, both Jorja and Greg had dissipating fears of being caught. They theorized that maybe either A) no one knew that the secret was out or B) that maybe they were watching for reactions and if proven favorable, bring them into the inner sanctum, into god’s realm. It didn’t matter to either of them for they still could only trust one another and they had to play the waiting game.

  And wait they did. In the meantime Jorja’s bloodline was starting to show. She was part of the world’s biggest spy organization and slowly she was being drawn into the seductive powers that God himself held. Greg was learning about the day to day operations—the how’s. He found the data stream supporting the location data. That was a difficult task because it didn’t come through the normal channels. It was backdoored by the NSA from Schriever Air Force Base in Colorado and hardwired directly into the database. Schriever AFB is known for its men and women of the 2nd Space Operations Squadron who operate the world’s only global utility simply referred to as GPS. Here coordinates obtained from Schiever AFB were downloaded into the database along with a series of digits. Greg’s initial conclusion was spot on; that these sets of digits were the serial numbers of whatever was within the body. These serial numbers were cross referenced with the Immune Information Systems with lot numbers of the vaccines and tax ID’s, then placed into the file Jorja and Greg first stumbled upon. He also found a replicating database, mirroring any data within seconds of the original entries but one of his more important finds was a GUI—a graphical user interface into the system. It was written so any internet browser could connect to this database in a point and click fashion. It was pretty slick even by Greg’s standards. One could prompt for a tax ID and a satellite image appeared on the screen or one could click on a location and find all the tax ID’s within a certain radius and this could be done for both date and time. Clicking on a tax ID linked directly to any data known to be stored for that person, almost to the “t” of what Scott Norwood’s thesis envisioned. This program was powerful yet simple in form thus leading Greg to wonder who the programmer of this functionality might be; yet another missing piece to the puzzle.

  Certain experiments were done by the duo. They wandered in the streets to look for blind spots. They rode subway cars, entered various building including the CIA headquarters, and in all but a very few, they were tracked and recorded, and yes, even underground. The signals were being broadcasted to anything that listened… and it seem almost everything listened from cell phones to radios and everything in between, all thanks to a few bills brought to the floor and passed based on the emergency broadcast system and some little known FCC regulations. Looking within the FCC two more PS members were identified—in the yearbook their hands were behind their backs so no rings were spotted—they were both electrical engineers who furthered their careers at MIT and are now big-wigs within this governmental establishment.

  It seemed there were many players but only a select few had keys to the car and were able to take it out for a joy ride. The car itself had low miles on it. It seemed only every now and then was it being used and it was used to further the career of the big man himself, like in the case of the Holiday Mall Massacre, oh, how the President was praised by his swift actions that day. So the big mystery was exactly when was this thing going to become fully operational and to what extent was it going to play in everybody’s life?

  Jorja and Greg’s most difficult task at hand was not putting up the façade of their daily grind, no, actually it was the task of not becoming drawn to the dark side. They had this power at their finger tips, they despised it, hated it, yet were intrigued and fascinated, they could very well see the benefit, the greater good of the people. Criminals squelched almost where they stood, no more lying about your whereabouts on such and such a date; tap in the name, social security, and date and presto, scene of the crime. But all-in-all they promised each other they’d never use it… . except in the back of each of their minds they said only if they needed it.

  Their next difficult task was to look for the so-called mole within the very walls of their place of business. They tried to find a past connection between Whitaker and the Director of the CIA, nothing was found. The director was a goody-two-shoe who worked his way up the ranks quite honestly. They tried the same thing with the next in line and nothing, yet someone had to prerequisite that machine and it should have been Jorja

  “So what are we going to do Jorja?”

  “Nothing we can do until we expose the person within the Intelligence Community.”

  “What if there is no one to expose.”

  “Impossible, it’s not like the president walks into the Virginia site and says, please hook this up.”

  “True but it could just as well be you.”

  “Me? I was the one who found it.”

  “Exactly, you are the one who found it because you knew right where it was, you also have the authority to order the machine and get it connected to our network, plus you had that handy dandy little program, and then there is the fact we are both still alive.”

  “You have a point but why would I want you to get involved?”

  “Trust, face it Jorja, you trust me.”

  “Yes I do but trust is a two way street and right now it seems you don’t trust me… I too can point the finger at you, you found plenty of hacks to get us into the system, you have the expertise to hide a server on our network, your skills are just as plausible as mine.”

  “Damn it Jorja, I trust you… in fact I… . I…”

  “I what?”

  “Well… . I care about you,” he very much wanted to say that he loved her, “and I have to trust you. I know you are not involved… really I do… I’m just fucking paranoid anymore… these past few months have been driving me insane, they have me second guessing everything I do, where I go, who I see… every part of my life has changed… and not for the better I can assure you that.”

  “Whether you trust me or not we are in this together.”

  “I know, I know… but… . but… . let me ask you this… . then how the hell do you act so calmly knowing these people, whoever the fuck they are, know your every move?”

  “Because I know their every move as well… . and so do you… . so far all the players we have uncovered are in this system, probably because of their first experiments, anyway… . for the most part I tend to believe at this stage of the game we know more about them than they do about us… assuming you played your cards right and covered our tracks… we have the upper hand and I intend to keep it that way.”

  “Okay my dear… I will never second guess you again… so we go back to the cat and mouse game… we need some cheese.”

  “A big piece.”

  . . .

  Chapter 31

  The day of the shootings at the mall proved to be a quintessential turning point in the fight against terrorism. It took only a mere half of day to pinpoint all of the assailants, much to the chagrin of evil doers worldwide. Yes, that day placed second thoughts in the mind on many would be terrorists. It was that day that every arm of American law enforcement seemed to be under one umbrella. It was the FBI, the CIA, Homeland Security, the NSA, local and state police, and a few black ops that no one knows about, that on that day, the day of carnage, worked as if they were all tentacles of the same octopus. They communicated effortlessly, efficiently—teamwork at its finest. They worked together, they exchanged data together, they analyzed together, they solved together and together they didn’t do a damn thing to abolish this perception. Smoke and mirrors, duct tape, chewing gum, lies upon lies, who knows what else was holding this mirage together; in reality the togetherness was just a veneer, a pipe dream, brought on by Homeland Security. Homeland Security was supposed to be the glue, the middle man, the collaborating partner in the fight against terrorism—holding a warehouse of information and communication protocols for everybody’s use but behind the scenes there was discombobulation. Agencies were still very protective with
the data they gathered and the data they shared but somehow, somewhere, and at some point in time, the pivotal data in this case was placed on the databases of Homeland Security and acted upon, thus providing a perception of alertness and justification—remember perception is ninety percent of the battle.

  It was a phone call that started the chain of events that day, a phone call placed by Scott Norwood.

  “Listen, obviously you’ve heard the news about the mall and that two assailants were taken out, I’ve just talked with the President, he gave the nod, I need as much information within the hour so it can be fed to the proper channels,” a click was the next thing heard.”

  With that, an IP address was dial up on his monitor, a login and password entered, and just like that he had access to a database the world would never see; the very notion of its existence would shatter the world and consume the government’s infrastructure, never to be trusted again. He had very few facts to go on: he knew the location, the approximate time, and that two assailants were killed, everything else was sketchy at best. The first order of business would be to gather the complete lists—the before list and the after list. The before list was a list of tax identification numbers a.k.a. social security numbers (everybody in the U.S. had one—it was the law) that were within a five hundred meter perimeter of the mall just before the shootings occurred. The time of the shootings were approximately 2:15 p.m., so the reference time would be 2:10 p.m. since each pass of a satellite receptor was a five minute interval. Oh how times have changed thanks to technology. In the old days the intervals first started out as every twenty-four hours, then twelve, eight, and so on and so forth, to the present day of just every five minutes. Tomorrow it will be every minute and the next it will be instantaneous but until then five minutes will have to do. He then needed a reference ending time and chose 2:20 p.m. The next key information is the approximate latitude and longitude of the shootings easily obtained from any satellite photo or even Google Maps for that matter. Time and place are entered into the prompts of the custom program and in a flash there is a list of 34,302 people who have been identified within the proximity of the shootings that were alive at 2:10 p.m.—the before list. Next he entered the same criteria except changing the time to his ending reference and the information is much different. This is the after list—27,443 social security numbers within the original radius; a difference of almost seven thousand people. A quick analysis yields a mass exodus just after the shootings and rightfully so. Since the NID’s need pumping blood to maintain communication, cross referencing the seven thousand people difference with those still transmitting at 2:20 p.m. yields sixty-two individuals who are no longer transmitting. At 2:25 the number jumps to sixty-four, then to sixty-five five minutes later but when all is said and done—hours later, the number is seventy-eight—the exact confirmed death toll of the Holiday Mall Massacre. Now out of the sixty-two, two of them are the assailants and a further breakdown of the data confirms there are two different shooting locations: location A—the one with twenty-six people no longer transmitting and location B—the one where thirty-six people are no longer transmitting. Now this is where multi-tasking takes place, while at his computer he overhears the television and two different reports confirm that two gunman were brought down outside of Macy’s. Checking the exact location of Macy’s, he also confirms that group “A” now contains the two dead gunmen—his reference set just got smaller, only twenty-six people . . Again listening to news reports, the two gunmen appeared to be in their late teens to early twenties and Caucasian, the reference set grows smaller yet again. Crosschecking yields only six victims in that range, two of which are the gunmen. With six social security numbers at hand and on the computer screen in front of him, further investigating is mere child’s play. Of the six people, two are from Wayne, Pennsylvania, one from Philadelphia, one is from a little town in New Jersey, and the other two are from Ohio, he now fully concentrates on the pairs of men. The Ohio men yield some fascinating results in the database. As of five o’clock this morning they were staying in the Holiday Inn right across from the mall. Further data mining tells us they were staying there for the past month and appeared to be working at the mall for the past month as well. Just like Interpol in Europe, the United States requires each hotel’s database to be online with the Federal Bureau of Investigation and Homeland Security, which can also be accessed by the CIA or DNI. Crosschecking the hotel’s database proves they were using aliases for there were no matches based on their social security numbers, however the hotel’s database provided the credit card numbers for all persons whose stay was greater than twenty-one days. There were four rooms booked and three of them were to the same credit card number. Using a credit card for three rooms, using aliases with fake ID’s upon checking, working at the mall, one plus one plus one certainly adds up to a fishy three. Without a doubt in his mind the names of the gunman were found; two of them at least, from Ohio. On a hunch he inputs more search parameters into the program—out of the filtered list of seven thousand who were now missing from the scene within a ten minute window of the crimes, just how many were from Ohio and in the age range of sixteen to twenty-five? Again in a flash, the programs spits out only five social security numbers up on his screen. So where were these five as of five o’clock this morning? One was in Valley Forge staying at a residential address, the other was in Atlantic City at the Trump Plaza, one was staying at the exact Holiday Inn as the others—bingo again, and the last two staying at a Comfort Inn just up the street from the mall. Checking the Comfort Inn’s database, and guess what—aliases again. Three more gunmen have been found. A wee bit more checking finds that the five cold blooded killers lived within a twenty-five mile radius of one another just outside of Cincinnati, Ohio. They were Michael Romberger age 18, Matthew Gieger age 21, Steven Tyler (no relation to Aerosmith’s lead singer) age 18, Gene Lynner age 18, and Brian O’Neil age 19.

  The search took fourteen minutes. The time was now 2:46 p.m. Three of the gunmen are MIA but not for long. Inputting the three remaining social security numbers into the computer and the results are the coordinates and a big “Gotcha!!!” The three social security numbers are just outside Downingtown, on the Pennsylvania Turnpike, at a service station. The three numbers will now have a marker placed on them and the program will begin updating their coordinates every five minutes—they will be tracked and with nowhere to run.

  “Just how much more information should be obtained,” he asked himself? “Another forty-five minutes worth,” was the answer. So let’s build a timeline. 2:45 p.m. three gunmen at a service station on the PA turnpike. 2:15 three gunmen are in a parking lot outside the mall, two are dead. 1:30 p.m.

  From 1:30 p.m. back to at least 10:45 p.m. the following day, the five gunmen were in their various hotel rooms. Going back a month, they can be seen going to and from the mall and the hotel; all of them working different stores but all in close proximity to the shooting sites. The timeline doesn’t vary much but there are the occasional trips outside their realm. For instance, on December 15th all five ventured to a movie theater, based on the time and the theater’s database, they watched the latest slasher flick by Wes Craven. Rifling through all sales receipts for the show time proved they paid cash unless they used another alias and credit card. On December 8th all five again went out, this time to Chi Chi’s, a local Mexican eatery. Linking the database from the theater on the 15th and Chi Chi’s on the 8th, there is a credit card match—a one Mr. William Parker. Upon closer examination of the restaurant’s bill and matching it with the credit card receipt, one can see five entrees were ordered, three appetizers, two sodas, and six beers (looks like there might be some pretty good fake ID’s in the mix as well, for only one was of legal age in the state of Pennsylvania and Chi Chi’s always, always cards being on probation and one more violation from closing). Coincidence is plausible until the card also has one transaction for five tickets to a Wes Craven film on December 15th. This credit card is flagged for a
ll expenses in the past year along with the cards used at the hotels. Back to the timeline. Right before Thanksgiving, actually the Monday before and before the busy holiday season when stores need the most help, they are located on the Pennsylvania Turnpike heading east but the five are not together—separate cars. At noon the cars are two hours apart but at nine o’clock, three hours earlier, the cars were within one hundred feet of one another. Strange, why the lag time all of a sudden? Car problems maybe? More digging is required. A little before 7 a.m. Monday morning they entered the PA Turnpike—somewhere between 6:45 a.m. and 6:50 a.m. At that point in time the turnpike’s computer has roughly six hundred cars entering the exchange so cross check with the credit cards that were already flagged and lo and behold there are two rental cars; one for a grey Chrysler Neon, the other for a red Dodge Daytona. Now it is a matter of querying the Avis data banks and the license plates are obtained. The license-plates are matched to the picture database the turnpike stores and within thirty seconds the software spits out sixteen images, eight of each car. Smile, you’re on candid camera. Clear as a bell too. There are great pictures of the Neon, the driver, and two passengers. Same holds true for the Daytona—again the driver and two passengers are clear as the day the planes hit the towers on 9/11.

 

‹ Prev