Of course there were several files of blueprints, and one file containing Web links. Special events and traffic flows are always important when you are targeting a bridge. Especially when the bridge had defied attack before. This bridge was the Golden Gate Bridge. All of the files were copied onto a CD produced by his “friends.”
The final message was a new baseline file. Nedim showed them how to decode the text to know who was supposed to receive it. Then came the question they weren’t supposed to ask. “How do you choose the decoys?”
“Some will be email addresses from a spam list I acquired, others will be addresses he has communicated with before,” he responded. There were only five recipients for this base image, so Nedim chose seven decoys to round it out at a dozen.
“Do the decoys know they are decoys?” asked his cousin.
“Not the ones from the spam list,” replied Nedim.
“But the others?”
“Every person receiving this is a good Muslim. They know the Holy Quran.”
Each base image came with a passage from the Quran that would seem to apply to it when read by the casual reader. The spam list Nedim had obtained was a list of members from various Islamic and Muslim organizations around the world. Some had ties to al-Qaeda, and some did not. They all had, at one time or another, subscribed to a “word of the day” or “prayer of the day” sort of service as many of the infidels did. They would assume this was something sent out by the service and ponder it.
What the men hadn’t noticed, because they were too busy writing notes, was that Nedim changed a word in the phrase when sending to decoys. Any member receiving the image and finding a word out of place in the passage would simply ignore it. The rest would save the image as a new base image. Any communication they needed to send to this leader would use this new image. Any new instructions coming to them would use this new base image.
One thing the men did write down was the file name containing email addresses Nedim used for decoys. When they reported next time they would be able to speed up progress immensely on this investigation.
Finally, after a very long day, Nedim went to bed. One more sunrise, and another day closer to death, he thought.
Back at headquarters Nedim’s “cousin” was enthusiastically briefing the rest of the team on what they had learned. He turned over the file CD containing the information on the Golden Gate Bridge and informed them of the file name Nedim used to pull some of his decoy names from.
In all honesty, he thought this would speed up the investigation. Then he heard the man in the suit say, “This is exactly what I was hoping to avoid. Not only do they hide among the population, now they implicate every Muslim devout enough to have a daily prayer emailed to them.”
“They are determined to turn this into a war against all Muslims,” said Hans. They believe that once this gets spun into a war against all Muslims, all Muslims will rally to their cause rather than die at the hands of the infidels.
“But we know he bought this list,” responded Nedim’s “cousin.” “We also don’t know who on that list joined simply to hide in the forest,” replied the man in the suit. “The list itself is of no use to us. We will have to look at each image to find out what it contains and build our tree from there.” Along one wall of the office was now a large marker board. They used a wet erase board rather than the more common dry erase board so information couldn’t accidentally be erased. In the center of it was Nedim. Above him was the beginning of an inverted hierarchy chart and below him the more common image of a regular hierarchy chart. Only a couple of other names had been filled in. These were the names of people arrested whose computer email traced back to Nedim. Each of their email accounts had the forwarding option set and was now forwarding email to people on the team. Nobody wanted al-Qaeda to find out an operative had been compromised by a full-mailbox bounce.
When it came to the members of the team based locally, only Hans and the man in the suit knew where the other people listed on that board were. They were the first occupants of the first camp built by Hans’ party members. Nothing of interest had been learned by their interrogation thus far, but it was early. Hans knew the interrogators held out hope of squeezing more from them by the simple fact nobody in Hans’ party had told him the second camp had been put into use.
***********************
You are reading a special promotional version of “Infinite Exposure” containing only the first 18 chapters. This is the first book of the “Earth That Was” trilogy. You can obtain the entire trilogy in EPUB form from here:
[…] <Previous Part Next Part> […]