Read The Kill List Online

Authors: Frederick Forsyth

Tags: #Thrillers, #Fiction, #Suspense, #General

The Kill List (14 page)

BOOK: The Kill List
6.54Mb size Format: txt, pdf, ePub
ads

The latter was extremely welcome. He would have to bury it, of course, under the earthen floor of his cabin, and then cover the patch with plywood sheeting. A small but state-of-the-art transceiver. It would take messages from Israel and hold them for thirty minutes, while they were transcribed or memorized. Then it would self-erase.

And it would send messages from Opal to the Office, which, spoken “in clear,” would be compressed into a single “squirt” so short that any listener would need ultra-technology to catch the tenth-of-a-second burst and record it. In Tel Aviv, the burst would be extended back into normal speech.

And there was the briefing. The warehouse, the need to know who lived in it, if they ever left it and, if so, where did they go? A description of any vehicle used by any inhabitant or regular visitor to the warehouse. And if any visitor lived away from the warehouse, a complete description of that residence and its exact location.

Opal did not need to know, and Benny could only presume, but there would be an American drone up there somewhere; a Predator, or Global Hawk, or perhaps the new Sentinel, turning slowly, hour after hour, looking down, seeing everything. But in the tangle of Kismayo’s streets, the watchers could still lose one vehicle among hundreds unless that vehicle was precisely described to the last detail.

With another hug, they parted. The inflatable, manned by four armed commandos, slipped away to the sea. Opal refueled his motorcycle and headed south to his cabin to bury his transceiver and the battery, energized by the sun via a photovoltaic cell.

Benny was lifted back off the sea by a rope ladder dangled from the helicopter. When he was gone, the commandos settled for another day of hard exercises, swimming and fishing to stave off the boredom. They might not be needed again, but in case they were, they had to stay.

Benny was dropped at Nairobi airport and took flight for Europe and thence Israel. Opal scoured the streets around the warehouse and found a room to rent. From a crack in its warped shutters, he could survey the single, double-gated entrance.

He would have to continue with his job as a tally clerk or arouse suspicion. And he had to eat and sleep. Between these, he would stake out the warehouse as best he could. He hoped something would happen.

Far away in London, the Tracker was doing his best to make something happen.

• • •

T
he installers of the security system at the house in Pelham Crescent were sufficiently confident of their skill and renown that they announced who they were. Pinned to the outside wall underneath the eaves was a tasteful plaque announcing “This property is protected by Daedalus Security Systems.” It was discreetly photographed from the leafy park at the center of the crescent of houses.

Daedalus, mused the Tracker when he saw the picture, was the Greek engineer who designed a not very secure pair of wings for his son, who fell into the sea and died when the wax melted. But he also constructed a maze of fiendish ingenuity for King Minos of Crete. No doubt the modern Daedalus was trying to evoke the skill of the builder of a puzzle system that no one could break.

He turned out to be Steve Bamping, who had founded and still ran his own company, which was very upmarket and serviced a wealthy client list with antiburglar protection. With the permission of the director of G Branch of MI5, Firth and the Tracker went to see him. His first reaction to what they wished was of flat refusal.

Firth did the talking until the Tracker produced a sheaf of photos and laid them on Mr. Bamping’s desk in two rows. There were eleven of them. The head of Daedalus Security stared at them uncomprehending. Each was of a dead man, on a morgue slab, eyes closed.

“Who are these?” he asked.

“Dead men,” said the Tracker. “Seven Americans and four British. All harmless citizens doing their best for their countries. All murdered in cold blood by Jihadist assassins inspired and impelled by a preacher on the Internet.”

“Mr. Dardari? Surely not.”

“No. The Preacher launches his hate campaign out of the Middle East. We have pretty much proof his London-based helper is your client. That is what has brought me across the Atlantic.”

Steve Bamping continued to stare at the eleven dead faces.

“Good God,” he muttered. “So what do you want?”

Firth told him.

“Is this authorized?”

“At the cabinet level,” said Firth. “And, no, I do not have the Home Secretary’s signature on a piece of paper to say so. But if you wish to talk with the director general of MI5, I can give you his direct-line number.”

Bamping shook his head. He had already seen Firth’s personal identification as an officer of 5’s anti-terrorist division.

“Not one word of this gets out,” he said.

“Not from either of us,” said Firth. “Under any circumstances whatsoever.”

The system installed at Pelham Crescent was from the Gold Menu. Every door and every window was fitted with invisible-ray-based alarms linked to the central computer. But the owner himself would enter only by the front door when the system was activated.

The front door appeared normal, with a Bramah lock operable with a key. When the door opened with the alarm system on, a bleeper would begin to sound. It would not alert anyone for thirty seconds. Then it would shut off but trigger a silent alarm at the Daedalus emergency center. They would alert the police and send their own van.

But to confuse any prospective burglar who might wish to chance his luck, the bleeper would sound from a cupboard in one direction, while the computer was in a completely different direction. The householder would have thirty seconds to go to the right cupboard, reveal the computer and punch a six-digit code into the illuminated panel. That gave millions of computations. Only someone knowing the right one could stop the bleeper in less than thirty seconds and prevent activation.

If he made a mistake and the thirty seconds elapsed, there was a phone, and a four-figure call would put him through to the center. He would then have to recite his personal, memorized pin number to cancel the alarm. One wrong number would tell the center he was under duress, and despite the courtesy of the response, the “Armed intruder on premises” procedure would be followed.

There were two further precautions. Invisible rays across reception rooms and stairwells would trigger silent alarms if broken, but their turn-off switch was very small and tucked away behind the computer. Even with a pistol pointed at his head, the threatened householder did not need to deactivate the ray beams.

Finally, a hidden camera behind a pin-sized hole covered the entire hall and was never switched off. From any point in the world, Mr. Dardari could dial a phone number that would stream his own hallway onto his iPhone.

But, as Mr. Bamping later explained to his client with extreme apologies, even high-technology systems occasionally malfunction. When a false alarm was registered while Mr. Dardari was in London but not at home, he had to be summoned and was not pleased. The Daedalus team was apologetic, the Metropolitan Police very courteous. He was mollified, and agreed a technician should put the minor fault right.

He let them in, saw them start in the computer cupboard, became bored and went into the sitting room to mix himself a cocktail.

When the two technicians, both from MI5’s computer specialist office, reported to him, he put down his drink and agreed with lofty amusement to a test run. He went out, then let himself in. The bleeper sounded. He went to the cupboard and silenced it. To make sure, he stood in the hall and dialed his own spy camera. On his screen he saw himself and the two technicians in the middle of his hall. He thanked them and they left. Two days later, he also left, but for a week in Karachi.

The trouble with computer-based systems is that the computer controls everything. If the computer “goes rogue,” it is not only useless, it collaborates with the enemy.

When they came, the MI5 team did not use the hoary device of the gas company truck or the telephone van. Neighbors might know the man next door had gone for a while. They came at two in the morning in dead silence, dark clothes and rubber shoes. Even the streetlights failed for a few minutes. They were through the door in seconds, and not a light went on up and down the crescent.

The leading man quickly deactivated the alarm, reached behind the box and killed the infrared rays. A few more taps on the computer panel and it told the camera to freeze on a shot of the hall entirely empty and the camera obeyed. Mr. Dardari could phone in from the Punjab and he would see an empty hall. In fact, he was still airborne.

There were four this time and they worked fast. Tiny microphones and cameras were installed in the three most important rooms: sitting, dining and study. When they were done, it was still pitch-black outside. A voice in the earpiece of the team leader confirmed that the street was empty, and they left unseen.

The only remaining problem was the Pakistani businessman’s personal computer. It had gone with him. But he was back in six days, and two days after that he went out for a black-tie dinner. The third visit was the shortest of all. The computer was on his desk.

The hard drive was removed and inserted into a drive duplicator known by the technicians as the box. Mr. Dardari’s hard disk went into one side of the box and a blank into the other. It took forty-four minutes for the entire database to be sucked out and “imaged” into the duplicate, then put back without leaving any trace. So much for the past.

A USB stick, or universal serial bus, or memory stick, was inserted and the computer turned on. Then the malware was fed in, instructing the computer to, in future, monitor every keystroke pressed, and the same for every e-mail coming in. This data would then be passed to the Security Service’s own listening computer, which would log every time the Pakistani used his computer. And he would not notice a thing.

The Tracker was happily prepared to concede that the MI5 people were good. He knew that the stolen material would also go to a doughnut-shaped building outside the Gloucestershire town of Cheltenham, home of the Government Communications HQ, the British equivalent of Fort Meade. There cryptographers would study the back file to see if it was in clear or in code. If the latter, the code would have to be broken. Between them, the two bodies of aces should be able to lay the Pakistani’s life bare.

But there was something else he wanted, and his hosts had no objection. It was that both the harvest of past transmissions and all future keystrokes be passed to a young man hunched over his machine in a half-dark attic in Centerville. He had special instructions that needed to go to only Ariel.

The first information was very quick. There was not the slightest doubt Mustafa Dardari was in constant contact with the computer at the canning warehouse in Kismayo, Somalia. He was exchanging information and warnings with the Troll and he was the personal cyberrepresentative of the Preacher.

Meanwhile, the code breakers were seeking to discover exactly what he had said and what the Troll had said to him.

• • •

A
gent Opal kept watch on the warehouse for a week before his sleep-deprived vigil was rewarded. It was evening when the gate swung open. What emerged was not an empty delivery truck but a pickup truck, old and battered, with a cab and an open back. This is the standard vehicle for both halves of Somalia, north and south. When the back is fitted with half a dozen clan fighters clustered around a machine gun, it is called a technical. The one that passed down the street into which Opal was peering at through his crack was empty, and with just a driver at the wheel.

The man was the Troll, but Opal could not know that. He just had his handler’s orders: If anything leaves, except produce trucks, follow it. He left his rented room, unchained his trail bike and followed.

It was a long, brutal drive, through the night and into the dawn. The first part he knew already. The coast road led northeast, along the shoreline, past the dry wadi and the clump of casuarinas where he had met Benny and on toward Mogadishu. It was midmorning, and even his spare tank was almost empty when the pickup turned into the shoreside town of Marka.

Like Kismayo, Marka had been a rock-solid al-Shabaab stronghold until 2012, when federal forces, with huge backup from African Union Mission in Somalia (AMISOM) troops, had retaken it from the Jihadists. But 2013 had seen a reversal. The fanatics had come storming back and in bloody fighting clawed back both towns and the land between.

Dizzy with fatigue, Opal followed the pickup until it stopped. There was a gate guarding some kind of a courtyard. The driver of the pickup hooted. A small trap opened in the timber gate and half a face looked out. Then the gate began to swing open.

Opal dismounted, crouching behind his machine, pretending to attend to the front tire, peering through the spokes. The driver seemed to be known, for there were greetings, and he rolled inside. The gate began to close. Before it sealed off Opal’s view, he saw a compound, with a central yard and three low-built off-white houses with shuttered windows.

It looked like one of a thousand compounds that make up Marka, a sprawling complex of low white cubes between the ocher hills and the sandy shore, with the glittering blue ocean beyond. Only the minarets of the mosques reached higher than the houses.

Opal went a few littered alleys farther on, found a pool of shade against the rising heat, pulled his
shamagh
over his head and slept. When he woke, he patrolled the town until he found a man with a barrel of petroleum and a hand pump. This time, there were no dollars; too dangerous. He could have been denounced to the
mutawa
, the religious police, with their hate-filled eyes and canes. He paid in a sheaf of shillings.

He motored again through the cool of the night. He arrived in time for his shift at the fish market. Only in the afternoon could he compose a short verbal message, dig up his canvas-wrapped transceiver, hook it to the newly charged battery and hit the send button. The message was received at the Office north of Tel Aviv and, by agreement, passed on to TOSA in Virginia.

BOOK: The Kill List
6.54Mb size Format: txt, pdf, ePub
ads

Other books

Sunshine Picklelime by Pamela Ferguson
The Templar Inheritance by Mario Reading
Mother and Son by Ivy Compton-Burnett
Final del juego by Julio Cortázar
A Shift in the Water by Eddy, Patricia D.
Vampire in Denial by Mayer, Dale
Willie's Redneck Time Machine by John Luke Robertson
Resilient (2) by Nikki Mathis Thompson
59 - The Haunted School by R.L. Stine - (ebook by Undead)
Catechism Of Hate by Gav Thorpe