The Kill List (4 page)

Read The Kill List Online

Authors: Frederick Forsyth

Tags: #Thrillers, #Fiction, #Suspense, #General

BOOK: The Kill List
9.87Mb size Format: txt, pdf, ePub

The word “private” is justified because it is the personal instrument of the President and of no other. It can conduct covert war without seeking any sanction from Congress; its multibillion-dollar budget is acquired without ever disturbing the Appropriations Committee, and it can kill you without ruffling the even tenor of the Attorney General’s office. It is all top secret.

The first transformer of J-SOC was Defense Secretary Donald Rumsfeld. This ruthless Washington insider was resentful of the power and privileges of the CIA. Under its charter, the Agency needed to be answerable only to the President, not Congress. With its SAD units, it could conduct covert and lethal operations abroad on the Director’s say-so. That was power, real power, and Secretary Rumsfeld was determined to have it. But the Pentagon is very much subject to Congress and its limitless capacity for interference.

Rumsfeld needed a weapon outside congressional oversight if he was ever to rival George Tenet, Director of the CIA. A completely transformed J-SOC became that weapon.

With the agreement of President George W. Bush, J-SOC expanded and expanded, in size, budget and powers. It absorbed all the Special Forces of the state. They included Team 6 of the SEALs (who would later kill Osama bin Laden); the Delta Force, or D boys, drawn from the Green Berets; the 75th Ranger Regiment; the Air Force’s Special Ops Aviation Regiment (the Night Stalkers’ long-range helicopters) and others. It also gobbled up TOSA.

In the summer of 2003, while Iraq was still blazing from end to end and few were looking elsewhere, two things happened that completed the reinvention of J-SOC. A new commander was appointed, in the person of General Stanley McChrystal. If anyone thought J-SOC would continue to play a largely domestic Homeland role, that was the end of that. And in September 2003, Secretary Rumsfeld secured the President’s agreement and signed the EXORD.

The Executive Order was an eighty-page document, and within its pages, buried deep, was something like a huge Presidential Finding, the highest decree in America, but without specific terms. The EXORD virtually said do what you want.

About that time, a limping Ranger colonel named Dale Curtis was finishing his one-year, post-injury paid sabbatical and convalescence. He had mastered the prosthetic on his left stump with such skill that the limp was virtually undetectable. But the 75th Ranger Regiment was not for men on prosthetics. His career appeared over.

But like the SEALs, a Ranger does not leave another Ranger in the lurch. Gen. McChrystal was also a Ranger, from the 75th, and he heard of Col. Curtis. He had just taken command of the entire J-SOC and that included TOSA, whose commander was retiring. The post of commanding officer did not have a field-action posting. It could be a desk job. It was a very short meeting, and Col. Curtis jumped at the chance.

There is an old saying in the covert world that if you want to keep something secret, do not try to hide it because some reptile from the press will sniff it out. Give it a harmless name and a thoroughly boring job description. TOSA stands for Technical Operations Support Activity.

Not even “Agency” or “Administration” or “Authority.” A support activity could mean changing the lightbulbs or eliminating tiresome Third World politicians. In this case it is more likely to mean the second.

TOSA existed long before 9/11. It hunted down, among others, the Colombian cocaine lord Pablo Escobar. That is what it does. It is the manhunter arm called upon when everyone else is baffled. It has only two hundred and fifty staff and lives in a compound in northern Virginia disguised as a toxic-chemical research facility. No one visits.

To keep it even more secret, it keeps changing its name. It has been simply the Activity, but also Grantor Shadow, Centra Spike, Torn Victor, Cemetery Wind and Gray Fox. The last title was liked enough to be retained only as the code name of the commander. Upon his appointment, Col. Dale Curtis vanished and became Gray Fox. Later, it became Intelligence Support Activity, but when the word “Intelligence” began to attract attention, it changed again—to TOSA.

Gray Fox had held his post for six years when, in 2009, his chief manhunter retired, took a headful of really top secrets and went off to a log cabin in Montana to hunt steelhead trout. Col. Curtis could hunt only from behind a desk, but a computer and every access code in the U.S. defense machine is quite a head start. After a week, a face came up on the screen that jolted him. Lt. Col. Christopher “Kit” Carson—the man who had carried him out of the Shah-i-Kot.

He checked the career list. Combat soldier, scholar, Arabist, linguist, manhunter. He reached for his desk phone.

Kit Carson did not want to leave the Corps for the second time, but for the second time the argument was fought and won over his head.

A week later, he walked into the office of Gray Fox in the low-rise office block in the center of a woods in northern Virginia. He noted the man who limped as he walked to greet him, the cane propped in the corner, the 75th Ranger tabs.

“Remember me?” said the colonel. Kit Carson thought back to the freezing winds, the boulders beneath the combat boots, the gut-tearing weight on his back, the let-me-die-here-and-now exhaustion.

“Been a long time,” he said.

“I know you don’t want to leave the Corps,” said Gray Fox, “but I need you. By the by, inside this building we use only first names. For the rest, Lt. Col. Carson has ceased to exist. For the entire world outside this complex, you are simply the Tracker.”

• • •

O
ver the years the Tracker was alone or instrumental in tracing half a dozen of his country’s most wanted enemies. Baitullah Mehsud, Pakistani Taliban, dispatched by a drone strike in a farmhouse, South Waziristan, 2009; Abu al-Yazid, al-Qaeda founder, financier of 9/11, taken out by another drone strike in Pakistan 2010.

It was he, with others, who first identified al-Kuwaiti as bin Laden’s personal emissary. Spy drones tracked his last long drive across Pakistan until, amazingly, he turned not toward the mountains but the other way, to identify a compound in Abbottabad.

There was the Yemeni/American Anwar al-Awlaki, who preached online in English. He was found because he invited fellow American Samir Khan, editor of the Jihadist magazine
Inspire
, to join him in northern Yemen. And al-Quso, traced to his home in South Yemen. Another drone launched a Hellfire missile through the bedroom window as he slept.

The buds were coming on the trees this April when Gray Fox came in with a Presidential Finding brought from the Oval Office by courier that morning.

“Another online orator, Tracker. But weird. No name, no face. Totally elusive. He’s all yours. Anything you want, just ask for it. The PF covers every requirement.” He limped out.

There was a file, but it was slim. The man had gone on air with his first online sermon two years earlier, shortly after the first cyberpreacher had died with five companions by the side of a track in North Yemen, September 30, 2011. While Awlaki, who had been born and raised in New Mexico, had a distinct American accent, the Preacher sounded more British.

Two language laboratories had had a go at trying to trace the voice to a point of origin. There is one at Fort Meade, Maryland, headquarters of the vast National Security Agency. These are the listeners who can pluck any snatch of conversation by cell phone, landline, faxed letter, e-mail or radio out of space anywhere in the world. But they also do translations from a thousand languages and dialects and they do code breaking.

The other belongs to the Army, at Fort Huachuca, Arizona. They had both come up with much the same. The nearest guess was a Pakistani born into a cultured and educated family. There were clipped word endings in the Preacher’s tone that smacked of the colonial British. But there was a problem.

Unlike Awlaki, who spoke barefaced, staring into the camera, the newcomer never revealed his face. He wore a traditional Arab
shamagh
but pulled the trailing end up across the face and tucked it in at the other side. Only the blazing eyes could be seen. The fabric, said the file, might distort the voice, making derivation even more of a guess. The computer code-named Echelon, the identifier of accents worldwide, refused to be categoric on a source of that voice.

Tracker issued the usual all-stations, all-services appeal for even a sliver of information. This appeal would go to twenty overseas intelligence services involved in the fight against Jihadism. Starting with the British. Especially the Brits. They once ran Pakistan and still had good contacts there. Their Secret Intelligence Service was big in Islamabad and hand in glove with the even bigger CIA machine. They would all get his message.

His second move was to summon up the entire library of the Preacher’s online sermons on the Jihadi website. There would be hours and hours of listening to the sermons the Preacher had been pumping into cyberspace for nearly two years.

The Preacher’s message was simple, which could have been why it was so successful in achieving radical conversions to the cause of his own ultra-Jihadism. To be a good Muslim, he told the camera, one had to truly and deeply love Allah, may His name be praised, and His prophet Muhammad, may he rest in peace. Mere words alone were not enough. The True Believer would feel an impulse to turn his love into action.

That action could only be to punish those who made war on Allah and His people, the worldwide Muslim
umma
. And chief among these were the Great Satan, the U.S., and the Little Satan, the United Kingdom. Punishment for what they had done, and were daily doing, was their decreed portion, and bringing that punishment a divine charge.

The Preacher called upon his viewers and listeners to avoid confiding in others, even those who professed to think alike. For even at the mosque there would be traitors prepared to denounce the True Believer for the
kuffar
’s (the unbeliever’s) gold.

So the True Believer should convert to True Islam in the privacy of his own mind and confide in no one. He should pray alone and listen only to the Preacher who would show the True Way. That way would involve each convert striking one blow against the infidel.

He warned against the devising of complicated plots involving many strange chemicals and many accomplices, for someone would notice the buying or storing of the components of a bomb, or one of the conspirators would betray. The prisons of the infidel were peopled by brothers who had been overheard, watched, spied upon or betrayed by those they thought they could trust.

The message of the Preacher was as simple as it was deadly. Each True Believer should identify one notable
kuffar
in the society in which he found himself and send him to hell, while he himself, blessed by Allah, would die fulfilled in the certain knowledge that he was going to paradise eternal.

It was an extension of Awlaki’s “Just do it” philosophy, but better put, more persuasive. His recipe for ultra-simplicity made it easier to decide and act in isolation. And it was clear from the rising number of out-of-nowhere killings in both target countries that even if his message resounded with only a fraction of one percent of young Muslims, that was still an army of thousands.

The Tracker checked for responses from every U.S. agency and their British equivalents, but no one had ever heard reference to any Preacher in the Muslim lands. The title had been given him by the West, for lack of anything else to call him. But clearly he had come from somewhere, lived somewhere, broadcast from somewhere and had a name.

The answers, he came to believe, were in cyberspace. But there were computer experts of near-genius level up at Fort Meade who had been defeated. Whoever was sending the sermons out into cyberspace was keeping them untraceable and untrackable by causing them to appear to emanate from origin after origin, but then to whizz round and round the world, settling on a hundred possible source locations—but all of them false.

• • •

T
he Tracker refused to bring anyone, however security cleared, to his hideaway in the forest. The secrecy fetish that motivated the entire unit had gotten to him. He also disliked going to other offices within the Washington sprawl, if he could avoid it. He preferred to be seen only by the person he wanted to talk to. He knew he was getting a reputation for being unconventional, but he preferred roadhouses. Faceless and anonymous, both cafeteria and customers. He met the cyberace from Fort Meade at such a roadhouse on the Baltimore road.

Both men sat and stirred their undrinkable coffee. They knew each other from previous investigations. The man the Tracker sat with was reputed to be the best computer detective in the National Security Agency, which is no small reputation.

“So why can’t you find him?” asked the Tracker.

The man from the NSA scowled at his coffee and shook his head as the waitress hovered expectantly, carafe poised for a refill. She drifted away. Anyone glancing into the booth would have seen two middle-aged men, one fit and muscled, the other with the pallor of offices without windows and running to fat.

“Because he’s freaking clever,” he said at last. He hated to be eluded.

“Tell me,” said the Tracker. “Layman’s language, if you can.”

“He probably records his sermons on a digital camcorder or laptop PC. Nothing weird about that. He transmits on a website called
Hejira
. That was the flight of Muhammad from Mecca to Medina.”

The Tracker kept a straight face. He did not need explanations about Islam.

“Can you trace
Hejira
?”

“No need. It’s just a vehicle. He bought it from an obscure little company in Delhi that is now out of business. When he has a new sermon to transmit worldwide, he sends it on
Hejira
, but he keeps the exact geolocation secret by causing it to emanate from origin after origin, whizzing round and round the world, bouncing it off a hundred other computers whose owners are certainly completely ignorant of the role they are playing. Eventually, the sermon could have come from anywhere.”

Other books

Red by Kait Nolan
The Executioner by Suzanne Steele
Out of the Dragon's Mouth by Joyce Burns Zeiss
Beneath a Spring Moon by Becca Jameson, Lynn Tyler, Nulli Para Ora, Elle Rush
The Wedding Gift by Cara Connelly
Her Cyborg by Nellie C. Lind
Crash Into You by Katie McGarry