Umar, the man playing the cousin from Saudi Arabia, returned to headquarters. He set down his notes and quickly loaded the CD into a laptop computer for his superiors to see. They were both impressed and skeptical that such a find could be nabbed on the first day. The laptop was handed over to another team for further analysis while Umar went through his notes to his superiors and the rest of the team. He explained the meanings of phrases as Nedim had explained them. There were many questions, it took hours.

After a short break, they regrouped and Umar began explaining how the baseline images were distributed. He told them about the Open Source software used to embed messages in them and how all baseline images now had “God is Great” embedded in them before being distributed. The corrupted decoy messages brought up quite a bit of discussion. When asked how they kept track of which images to use, he informed them that each cell communicator chose a specific family of images, beach scenes, birds, fish, etc. This segregation ensured they never needed to keep a list of what went where.

Skeptics in the room could take no more. They decided to put these theories to a test. A snooping program had been installed on Nedim’s email account for months. They all gathered around a computer while the British photographer downloaded the software and copied two sets of images to the local hard drive. In one directory he put all of the copies of one picture Nedim had sent, in another directory he placed all of that same image Nedim had received. Thirty-eight messages had gone out, but only two had come back.

“First we try this on an image sent to someone who didn’t return it,” said the Brit.

He entered the commands to remove “God is Great” from the image, then the difference between this baseline and one of the received images. Garbage appeared.

“See, he lied to you,” said someone in the back.

“No,” said the Brit. “This one was a decoy. Next we try an image sent to an email address that returned it.”

He went through the steps to create the new baseline image. When the difference was run against the responding message, out popped the message.

Went fishing today.
Cans and bottles counted.
Worm box ignored.

“Went fishing where?” asked someone.

“We can ask,” responded Umar.

“No,” said the man in the suit. “Simply observe and report. This was a status report. They will send email again. When Nedim responds to them, we will know their location. We will watch them for a while, then round up the entire cell.”

“And bring them here?” came the question from somewhere in the room.

“Depending on the country and who makes the arrest, they will go to our new interrogation facility,” responded the German.

“Where is that?” asked one of the brutes.

“That information is on a need-to-know basis and you do not need to know,” snapped the man in the suit. He also made a mental note not to let the muscle part of this operation stand around while evidence was being sorted through. Operations like this needed brutes, but they could be damned inconvenient when thinking was going on. As a general rule, they always tried to absorb more information than their tiny brains could hold. This over-absorption had a tendency to result in leakage. Operations like this could not function when leakage happened.

 
***********************
You are reading a special promotional version of “Infinite Exposure” containing only the first 18 chapters. This is the first book of the “Earth That Was” trilogy. You can obtain the entire trilogy in EPUB form from here:


<Previous Part Next Part>