In The Cloud Collector, acclaimed spy novelist Brian Freemantle turns his expert's eye to the frontlines of today's war on terror: the cryptic world of cyber warfare.
When Western intelligence services recognize that a global jihadist attack has been initiated, the United States and the United Kingdom---its primary targets---lead a desperate counteroffensive. Sally Hanning, a brilliant British MI5 agent, is assigned to assist the CIA task force. She must help them hunt down the enemy mastermind along an intricately disguised online trail. To do so, she entails the services of Jack Irvine, a guilt-burdened NSA code-cracker, using enticements both personal and professional.
Though they foil the terrorists' plans, the mastermind seems to elude the MI5 and the CIA every time. And as Sally and Jack prepare to head off a major, potentially devastating attack, they realize that the plot is far more sinister than they had ever thought possible.
Release date:
November 3, 2015
Publisher:
St. Martin's Publishing Group
Print pages:
352
* BingeBooks earns revenue from qualifying purchases as an Amazon Associate as well as from other retail partners.
The forensically enhanced clarity from such a neglected CCTV was remarkable. Closing the blinds of the CIA’s Langley viewing room into semi-darkness helped. The original TV camera on the wall of the single-storey winos’ bar had been ten yards from the assassination, which was another advantage. The target car, a bumper-crumpled, windscreen-cracked Ford with a red offside front wing that didn’t match the rest of the faded blue paintwork, came surreally into the silent picture from the left of the screen. It wasn’t hurrying, slowed further by vehicles haphazardly parked on either side of the street: it was still too early for traffic restrictions or people. The front passenger had his window down, arm on the sill. The wristwatch was a heavy mix of dials, control knobs, and numerals that would have glowed in the dark or been legible underwater.
The Ford driver found a tight space just before the telephone stand and put another dent in the bumper shunting into it. The passenger rolled his window up, but didn’t get out. Neither did the driver or the scarcely visible third man in the rear. All three were heavily bearded. No-one appeared to be talking. A time counter had been superimposed on the screen: it registered six and a half minutes past five before the two men in the front got out and walked, still not talking, to the telephone. Neither attempted to get inside the hood. The driver rested his arm against the telephone ledge to keep his watch in front of him. Like the other man’s, it had a lot of dials and knobs. Both men physically reacted to what must have been the incoming ring. One man grabbed the receiver, crowded beneath the hood by the other, preventing either from becoming aware of the ambush until the man they’d left in the Ford emerged from its rear, waving and obviously shouting. By that time the three who’d come from an unobtrusively parked fawn Toyota were close enough to fire point-blank. They did so precisely, bringing both men down with body hits and finishing off with single head shots. The other Ford passenger was running, and one of the hit squad broke away in pursuit but almost at once accepted that the intervening distance was too great and gave up, walking casually back to the other two bent over the bodies, rifling through their pockets. They straightened, laughing, as the returning man reached them. All three walked unhurriedly back to the Toyota and drove off in the direction of the Capitol, obediently halting at a red stoplight just visible to the CCTV.
* * *
‘So how does it work?’ demanded Charles Johnston, the newly appointed CIA director of covert operations.
Jack Irvine knew that having gotten this close he couldn’t afford any mistakes. He could not give this unknown man the slightest excuse to cancel, question even, the operation on which he’d worked so hard for so long to the exclusion of girlfriends, any other social life, even his belovedly restored but now neglected ’92 Volkswagen. His operation—his, no-one else’s—had to be preserved, and he’d do everything and anything to ensure that it was. The Anacostia video provided the proof that it worked.
As the cliché went, pictures were worth a thousand words and words were what Irvine intended to limit. Neither Johnston nor the other two men with him needed to know the full details of what he’d achieved as a National Security Agency highflier roaming way beyond Iran’s official Halal Web site to discover its use of unrestricted, anonymous cyberspace darknets.
Irvine said, ‘It’s anti-terrorism, using the Internet—Facebook and chat rooms—as the jihadists use them: how bin Laden himself used them. And Al Qaeda and every other militant Islamist, anarchist, and would-be terrorist is still using them.’ It had echoed impressively when he’d mentally rehearsed it. Spoken aloud, it hadn’t sounded quite so good; neither had the hesitation in his voice.
‘How?’ demanded Johnston. He was a large, heavy-featured man of self-protective conformity whose suits were always grey, shirts always white, and ties always plain. At that moment those heavy features were expressionless, betraying nothing.
‘Taking terror to terrorists: we hack into their traffic, manipulate it.…’ Irvine, who despite the abandoned jogging routine was an athletically slim man suited to jeans, T-shirts, and loafers, gestured towards the now-blank screen. ‘Atrocity-planning terrorists killing other atrocity-planning terrorists with no collateral damage: no dead, innocent civilians and children caught up in a Reaper drone attack; no accusations against our military. All are identified by the NSA from overseas intercepts leading us to individual groups within the United States. Proof of intended terrorist attack is never obtained from illegal phone, computer, or radio wiretapping or hacking in this country.’ Irvine again indicated the screen. ‘That’s not our first success. If we can’t create an internal war, we alert Homeland Security or other enforcement agencies overseas.’ He was covering all the obvious objections, Irvine knew, disappointed there was virtually no reaction from the covert-operations director.
‘So that’s how it’s different from the NSA’s Prism Project and the Brits’ Tempura programme of 2012 that got us so much heat. We hunt, don’t wait?’
‘Exactly!’ agreed Irvine, acknowledging that Johnston had tried to prepare himself. Irvine was sure there was still no danger of his being found out.
‘And what we’ve just seen is the result of an already-sanctioned feasibility trial?’ pressed Johnston, ever cautious.
‘Officially designated Operation Cyber Shepherd,’ confirmed Irvine. ‘I’ve already established a NSA team at Fort Meade; they’re waiting to be briefed.’
Johnston jerked his head in the direction of the dead screen. ‘What about the guy that got away?’
‘Ismail al Aswamy, an Iranian in the U.S. on an expired student visa.’ Irvine looked sideways at James Bradley, the operation’s CIA supervisor, who continued studiously to ignore him. ‘Jim assured me Aswamy’s ours whenever we want to take him. For the moment we’re ready to follow wherever he leads us.’
‘What’s the body count so far?’
‘The two you just saw taken out brings those eliminated here to a total of five. The other three were in Boston. Anti-terrorist police in Rome, Italy, have a group we’ve identified under surveillance. We’ve given the UK a lead in a town there called Bradford; no playback yet.’
* * *
Three and a half thousand miles away, in the Thames-side headquarters of MI5, its diminutive Director-General was even more curious at a lack of results.
His critics saw David Monkton’s reluctance to delegate as the man’s most obvious failing, while his matching number of supporters judged it his major attribute. In an organization as large and as complex as Britain’s counter-intelligence service, delegation was operationally imperative. Monkton, whose life was tightly structured on self-imposed rules, evolved an equally reluctant compromise. He insisted upon daily, not weekly, updates on priority-designated cases from his divisional directors and carried out unannounced, unpredictable spot checks upon what he considered inadequate briefings.
This practise would uncover the nightmare scenario feared by every Western intelligence agency since 9/11 and 7/7.