“Neither. The time and place for each meeting was set at the preceding one.”

“What happened if you needed to get in contact with them? For instance, to change the time of a meeting or something like that?”

“I had a number to call.”

“What was the number?”

“I couldn’t possibly remember.”

“Who answered if you called the number?”

“I don’t know. I never used it.”

“Next question. Who did you hand everything over to?”

“How do you mean?”

“When Falldin’s term came to an end. Who took your place?”

“I don’t know.”

“Did you write a report?”

“No. Everything was classified. I couldn’t even take notes.”

“And you never briefed your successor?”

“No.”

“So what happened?”

“Well… Falldin left office, and Ola Ullsten came in. I was told that we would have to wait until after the next election. Then Falldin was re-elected and our meetings were resumed. Then came the election in 1985. The Social Democrats won, and I assume that Palme appointed somebody to take over from me. I transferred to the foreign ministry and became a diplomat. I was posted to Egypt, and then to India.”

Blomkvist went on asking questions for another few minutes, but he was sure that he already had everything Janeryd could tell him. Three names.

Fredrik Clinton.

Hans von Rottinger.

And Evert Gullberg – the man who had shot Zalachenko.

The Zalachenko club.

He thanked Janeryd for the meeting and walked the short distance along Lange Voorhout to Hotel des Indes, from where he took a taxi to Centraal. It was not until he was in the taxi that he reached into his jacket pocket and stopped the tape recorder.

Berger looked up and scanned the half-empty newsroom beyond the glass cage. Holm was off that day. She saw no-one who showed any interest in her, either openly or covertly. Nor did she have reason to think that anyone on the editorial staff wished her ill.

The email had arrived a minute before. The sender was [email protected]›. Why Aftonbladet? The address was another fake.

Today’s message contained no text. There was only a jpeg that she opened in Photoshop.

The image was pornographic: a naked woman with exceptionally large breasts, a dog collar around her neck. She was on all fours and being mounted from the rear.

The woman’s face had been replaced with Berger’s. It was not a skilled collage, but probably that was not the point. The picture was from her old byline at Millennium and could be downloaded off the Net.

At the bottom of the picture was one word, written with the spray function in Photoshop.

Whore.

This was the ninth anonymous message she had received containing the word “whore,” sent apparently by someone at a well-known media outlet in Sweden. She had a cyber-stalker on her hands.

The telephone tapping was a more difficult task than the computer monitoring. Trinity had no trouble locating the cable to Prosecutor Ekstrom’s home telephone. The problem was that Ekstrom seldom or never used it for work-related calls. Trinity did not even consider trying to bug Ekstrom’s work telephone at police H.Q. on Kungsholmen. That would have required extensive access to the Swedish cable network, which he did not have.

But Trinity and Bob the Dog devoted the best part of a week to identifying and separating out Ekstrom’s mobile from the background noise of about 200,000 other mobile telephones within a kilometre of police headquarters.

They used a technique called Random Frequency Tracking System. The technique was not uncommon. It had been developed by the U.S. National Security Agency, and was built into an unknown number of satellites that performed pinpoint monitoring of capitals around the world as well as flashpoints of special interest.

The N.S.A. had enormous resources and used a vast network in order to capture a large number of mobile conversations in a certain region simultaneously. Each individual call was separated and processed digitally by computers programmed to react to certain words, such as terrorist or Kalashnikov. If such a word occurred, the computer automatically sent an alarm, which meant that some operator would go in manually and listen to the conversation to decide whether it was of interest or not.

It was a more complex problem to identify a specific mobile telephone. Each mobile has its own unique signature – a fingerprint – in the form of the telephone number. With exceptionally sensitive equipment the N.S.A. could focus on a specific area to separate out and monitor mobile calls. The technique was simple but not 100 per cent effective. Outgoing calls were particularly hard to identify. Incoming calls were simpler because they were preceded by the fingerprint that would enable the telephone in question to receive the signal.

The difference between Trinity and the N.S.A. attempting to eavesdrop could be measured in economic terms. The N.S.A. had an annual budget of several billion U.S. dollars, close to twelve thousand fulltime agents, and access to cutting-edge technology in I.T. and telecommunications. Trinity had a van with thirty kilos of electronic equipment, much of which was home-made stuff that Bob the Dog had set up. Through its global satellite monitoring the N.S.A. could home in highly sensitive antennae on a specific building anywhere in the world. Trinity had an antenna constructed by Bob the Dog which had an effective range of about five hundred metres.

The relatively limited technology to which Trinity had access meant that he had to park his van on Bergsgatan or one of the nearby streets and laboriously calibrate the equipment until he had identified the fingerprint that represented Ekstrom’s mobile number. Since he did not know Swedish, he had to relay the conversations via another mobile back home to Plague, who did the actual eavesdropping.

For five days Plague, who was looking more and more hollow-eyed, listened in vain to a vast number of calls to and from police headquarters and the surrounding buildings. He had heard fragments of ongoing investigations, uncovered planned lovers’ trysts, and taped hours and hours of conversations of no interest whatsoever. Late on the evening of the fifth day, Trinity sent a signal which a digital display instantly identified as Ekstrom’s mobile number. Plague locked the parabolic antenna on to the exact frequency.

The technology of R.F.T.S. worked primarily on incoming calls to Ekstrom. Trinity’s parabolic antenna captured the search for Ekstrom’s mobile number as it was sent through the ether.

Because Trinity could record the calls from Ekstrom, he also got voiceprints that Plague could process.

Plague ran Ekstrom’s digitized voice through a program called V.P.R.S., Voiceprint Recognition System. He specified a dozen commonly occurring words, such as “O.K.” or “Salander”. When he had five separate examples of a word, he charted it with respect to the time it took to speak the word, what tone of voice and frequency range it had, whether the end of the word went up or down, and a dozen other markers. The result was a graph. In this way Plague could also monitor outgoing calls from Ekstrom. His parabolic antenna would be permanently listening out for a call containing Ekstrom’s characteristic graph curve for one of a dozen commonly occurring words. The technology was not perfect, but roughly half of all the calls that Ekstrom made on his mobile from anywhere near police headquarters were monitored and recorded.

The system had an obvious weakness. As soon as Ekstrom left police headquarters, it was no longer possible to monitor his mobile, unless Trinity knew where he was and could park his van in the immediate vicinity.

Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату