Haggai Harmon - The Chameleon Conspiracy
Здесь есть возможность читать онлайн «Haggai Harmon - The Chameleon Conspiracy» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: Триллер, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.
- Название:The Chameleon Conspiracy
- Автор:
- Жанр:
- Год:неизвестен
- ISBN:нет данных
- Рейтинг книги:5 / 5. Голосов: 1
-
Избранное:Добавить в избранное
- Отзывы:
-
Ваша оценка:
- 100
- 1
- 2
- 3
- 4
- 5
The Chameleon Conspiracy: краткое содержание, описание и аннотация
Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The Chameleon Conspiracy»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.
The Chameleon Conspiracy — читать онлайн бесплатно полную книгу (весь текст) целиком
Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The Chameleon Conspiracy», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.
Интервал:
Закладка:
“If you think NSA will tell you that they hacked into an Iranian government database and downloaded the personnel file of Farhadi, then good luck with this one. NSA didn’t even confirm its own existence until a few years ago. You know what people used to say that NSA stood for- no such agency. If you believe that they’ll tell us about their means and methods of gathering specific information, then there’s a bridge in Brooklyn I want to sell you.”
I was certain that NSA did talk about it with someone outside its walls of secrecy. Namely, the FISA-Foreign Intelligence Surveillance Act-court, while they were seeking a court order approving the use of “electronic surveillance” against foreign powers or their agents. I did have a hunch how NSA broke into the Iranian computers. Before the Islamic Revolution, some Iranian government agencies had used tailor-made software written by American companies. They’d left a trap door to allow them to service the computers from a remote location. Now, that concealed method of access could be used to hack into the computer without leaving a trace.
“Dan, there’s no need to be sarcastic. We need to generate a report that is acceptable to both of us. Therefore, before I put my name on any such report I want to make sure I can live with the facts it describes. What good will our recommendations do, if some guy with average common sense can punch a hole in the tower of facts we’re building?”
“Fine with me,” I said. “Other than the prints, we have no facts, only a bunch of leads and pieces of information. The case isn’t over. We aren’t writing an autopsy report. We’re summing up a case that has just gotten closer to breaking than at any time during the past twenty years. The report will set the path to go forward, not to bury a corpse.”
“And it has characteristics of national security, rather than just catching a successful serial thief,” she added. She’d finally jumped on the wagon of enthusiasm I had been single-handedly pushing uphill.
“By the way,” I said. “We’ve got some indication that there’s at least one sleeper agent in the U.S. other than the Chameleon.”
“What indication?”
“Loretta Otis. She was murdered a few days after she reported to a rabbi in Sydney that Goldman was in fact Ward. The rabbi confronted the Chameleon, asking for his explanation. When no satisfactory responses came, the rabbi refused to marry the Chameleon. Now, knowing that his new identity as Goldman was in jeopardy, the Chameleon sealed Loretta Otis’s fate. The Chameleon was still in Australia when Otis was killed. That means he must have arranged for her elimination in the U.S., either by calling Iran or directly calling another member of Department 81 in the U.S.”
“So he’s probably in trouble in Australia for that, and for the fraud.”
“The Australian Federal Police is looking for him as well.” “OK. I think we should spend some time in making recommendations concerning our next move.”
“We’ve a plenary meeting with the other working groups in a week. Do you think Casey set up Monday as our deadline to submit our report so that he could use our paper during the plenary meeting?” I asked.
“I think he’s doing the same with the other groups-asking them for their reports. Since Bauer is acting as liaison, not as a decision maker, I think the real evaluation and decision making will be done at Langley.”
“In Tel Aviv as well,” I added. “One working group consists of Mossad guys.”
Nicole yawned and stretched. “Right. Well, let’s adjourn until the morning. I’m exhausted.”
I looked at my watch. It was one thirty A.M. Based on my past experience, the bigger the operation, the shorter the time that management would give us to finish it. But at least because there were a few of us, we could always find someone to blame for any failure.
In the morning, it took four hours of debating and document review to write our report. The room was the worse for wear: empty beer cans, three half-empty bags of potato chips-a quarter of the chips on the floor and the rest in my stomach, giving me heartburn.
“Let’s clean up the mess,” said Nicole. “We can’t have cleaners here.” We spent the next hour sweeping the floor and removing garbage, not before making sure we didn’t accidentally throw away any pieces of paper. Nicole went to the communication room and returned twenty minutes later.
“There has been a change of plans. There’s a meeting in another safe apartment in northern Paris in two days. We should send our report immediately.”
On the day of the meeting, we took Nicole’s car from a nearby parking garage and drove to the outskirts of Paris, to a leafy residential area. More out of habit than as a result of any suspicion, I routinely checked our backs to make sure we had no unwanted company. I wondered whether there was any security backup. There was too much activity around our safe apartment, and if any of the visitors was unknowingly compromised to the opposition, they’d contaminate us as well. Opposition? I wondered who our opposition would be, here. There were too many contenders for the title. I decided to raise the issue with Casey. I was uncomfortable. We were too visible.
When we entered the meeting room, a large one with high ceilings, there were several other people already waiting. I recognized Casey, Arnold Kyle, and Benny. Four other men and one woman looked unfamiliar. In the center of the room was a big nineteenth-century-style dining table. We sat around it. I counted the participants. We were ten in all.
Arnold started. “The work of all the teams ended sooner than expected. That’s a good sign. We’re here today to review the various options following the recent developments in the Chameleon case, which now seems more than ever to be connected to Iran’s terror financing.”
“Chameleon?” I muttered to Benny, who sat next to me. “Since when is he using that name?”
“Dan, you’re a lawyer. You know as well as anyone that you haven’t secured trademark protection for that name,” he said, grinning.
“The purpose of this meeting is to explore whether a recommendation should be made to our respective governments to take additional measures. But before we begin, Jack Randolph, our security officer, will say a few words.”
A man in his late fifties with a shaven head and dressed in a blue blazer addressed us. “Good intelligence is the best weapon in the battle against international terrorism. However, gathering intelligence about the identities, intentions, capabilities, and vulnerabilities of terrorists is extremely difficult. On top of that, we’ve realized that leaks of intelligence and law-enforcement information, some due to negligence and carelessness, but some intentionally stolen-or worse, secretly and illegally transferred- have endangered sources, alienated friendly nations, and inhibited their cooperation, thereby jeopardizing the U.S. government’s ability to obtain further information. Therefore, I insist that each and every one of you understand the gravity of this issue. Particular security measures are undertaken concerning this meeting and the operation planned. Please respect these limitations, and protect all information received and treat it as top secret. I’ll go over the security instructions before the conclusion of this session. Thank you.”
Kyle proceeded to provide us with a brief history of the battle against terror financing. Then we went into specific cases, and finally, when I was about to lose interest, he discussed our case, mostly using the report Nicole and I had submitted earlier. “This report is an early-stage operational road map. I say early stage, because there’s a lot of work to be done here. For starters, I need your input on two points: risk/benefit analysis of such an operation, and whether, how, and where to enter Iran-and once entered, the ways and means of achieving our ultimate goals.”
Читать дальшеИнтервал:
Закладка:
Похожие книги на «The Chameleon Conspiracy»
Представляем Вашему вниманию похожие книги на «The Chameleon Conspiracy» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.
Обсуждение, отзывы о книге «The Chameleon Conspiracy» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.