would be followed by a major terrorist attack. But neither the FBI nor the CIA, nor any of the other numerous organisations that fell under the umbrella of Homeland Security, was willing to use the name that Warren Scifford’s BSC Unit had given to such a potential attack:
They didn’t dare to call it anything yet.
The problem was that no one knew what or who would be the target of any such attack. The intelligence was extensive, in terms of the amount of reports, tips, and theories, and speculation was overwhelming. But the information was fragmented, confusing and to a large extent contradictory.
It could be an Islamist conspiracy.
It
It
The reports indicated that the authorities had a full overview of all other potential criminals, attackers and relevant terrorist groups – to the extent that anyone could ever have a full overview. And as far as twisted, fanatical American citizens were concerned, they were always a latent threat, as the bomber Timothy McVeigh had shown when the Gulf veteran killed 168 people in Oklahoma City in 1995. The problem was that there were no indications of abnormal activity in any of the many ultra-reactionary groups in the US. They were still under comprehensive surveillance, even post-9/11, when most of the attention was now focused in another direction. There was nothing to indicate that extreme animal-rights or environmental activists had taken the step from illegal, bothersome protests to real terrorist attacks. There were fanatical religious groups all over the States, but as a rule they were really only a threat to themselves. And there was nothing extraordinary to report from their ranks either.
And kidnapping an American president from a hotel room in Norway was light years away from what any known American group would have the ability to orchestrate.
It had to be an Islamist conspiracy.
Warren straightened his glasses.
The tangible angst in the report was fascinating. In all his thirty years in the FBI, Warren Scifford had never read a professional analysis that was so permeated by impending catastrophe. It was as if the truth had finally dawned on the entire Homeland Security system: someone had managed the impossible. The unthinkable. Someone had stolen the American commander-in-chief, and it was hard to imagine that those responsible had any limits as to what they might do.
The fear was focused on an attack targeting various unidentified installations on American soil. It was based on a number of reports and events, but the reports were insubstantial and the events ambiguous.
The most worrying and confusing factor was all the tips.
The American authorities were constantly receiving such communications, and more often than not there was no substance to them. House-owners who wished unpleasant visits from uniformed police on their neighbours could come up with the most fantastic claims about what was going on on the other side of the fence. Suspicious visits, strange sounds at night, abnormal behaviour and something that could only be dynamite in the garage. Or maybe even a bomb. Property sharks found it both convenient and effective to get help from the FBI in evicting troublesome tenants. There were no limits to what people claimed they had seen. Arabs going in and out at all times of day and night, conversations in foreign languages and the transport of boxes that contained God only knows what. Even teenagers might decide to report a classmate as a terrorist, simply because the guy had shown disrespect in trying it on with a girl he should have kept his hands off.
This time the tips seemed more like warnings.
The FBI’s field offices had received an unusual number of anonymous messages in the past few days. Some were phoned in, others came in emails. But the content was exactly the same, and they all claimed basically that something was going to happen, something that would make 9/11 pale into insignificance. Most of them said that the US was a weak nation that couldn’t even look after its president. They only had themselves to blame for leaving their ranks open. This time the attack would not be targeted on a specific area. This time the whole of the US would suffer, in the same way the US had caused suffering throughout the world.
It was payback time.
The most alarming thing was that the phone calls could not be traced.
It was incomprehensible.
The many organisations associated with Homeland Security had a technological advantage that they thought was absolute, and that made it possible to trace any phone call to or from American soil. Generally it took no more than a minute to identify a sender’s PC. In the shadow of the wide-ranging powers of attorney that George W. Bush had passed since 2001, the National Security Agency had gained what they believed to be almost total control of telephonic and electronic communication. The organisation saw no problem in the fact that they exceeded these powers of attorney in their efforts to be effective. They had a job to do. They had to ensure national security. The few who had the opportunity to discover these transgressions and the possibility to do anything about them chose to turn a blind eye.
The enemy was powerful and dangerous.
The US had to be protected at all costs.
These sinister messages, however, could not be traced. Not to the right place, at all events. The cutting-edge technology found the sender’s IP address or telephone number almost instantly, but when they were then investigated, the information appeared to be wrong. One call, where a deep man’s voice accused the American authorities of being arrogant and warned them not to harass decent citizens who had done nothing wrong other than having a Palestinian father, had apparently been made from the telephone of a seventy-year-old lady in Lake Placid, New York. At the time that one of the FBI’s offices in Manhattan received the call, the frail old woman was having a tea party with four equally charming friends. None of them had touched the phone and a log from the local telephone company showed the widow was telling the truth: no one had used the phone at that time.
The tea had cooled. Warren took a sip. He glasses steamed up for a moment, as if someone had breathed on them.
He turned to the more technical section of the report. He couldn’t understand much of it, and wasn’t particularly interested in the details. He wanted to read the conclusion, which he found on page 173: it was entirely possible to manipulate addressees in the way that had been done.
Slightly unnecessary conclusion, Warren said to himself. They’ve already documented more than a hundred and thirty cases of the phenomenon.
He adjusted one of the pillows behind his head to make it more comfortable.
Manipulation of this sort required substantial resources.
Yeah, yeah, he thought. No one ever thought it was the work of a poor man.
And presumably a telecommunications satellite. Or access to capacity on one. Rented or stolen.
A satellite? A bloody spaceship?
Warren was starting to feel cold; fifteen degrees was obviously not warm enough. He got up again to reset the switch in the box on the wall. This time he turned it to twenty degrees and then climbed back into bed and continued reading.
Satellites of this type were located in stationary orbits about forty thousand kilometres from the surface of the earth. Since all the telephone calls and electronic messages were linked to phones and computers on the east coast of the States, the actions were compatible with the use of an Arabic satellite.
An Arabic satellite would not be able to penetrate further into the country than that.
But it could reach the east coast.
Tracking, Warren thought impatiently and leafed quickly through the pages. With all the billions of dollars and powers of attorney and technology that we have, what about the tracking and reconstruction of the phone calls and messages?
Warren Scifford was a profiler.
He respected technique. In the course of his work tracking down serial killers and sadistic, sexually motivated murderers, he had over the years developed a deep respect for forensic pathologists and their magic, using chemistry, physics, electronics and technology. On occasion, he even sneaked a peak at an episode of
But this was beyond him. He could set up a PC and learn a few codes, but generally he was happy to let others look after the technology.
His area of competence was the soul.