Read Triple Identity Online

Authors: Haggai Carmon

Triple Identity (24 page)

BOOK: Triple Identity
9.85Mb size Format: txt, pdf, ePub
ads

The place had a big living room with a wide glass door leading to a balcony. There were three black leather sofas and a dining table with six chairs. Although the apartment was fully furnished, I could tell no one lived there. There were no flowers, photographs, books, souvenirs, or other personal items that would have transformed an apartment into a home. Benny, Shimon, and Tom were already present. Jeff arrived a few moments after me.

“OK, we're all here so let's begin,” said Eric. “We all had homework, so let's see some interim findings. Who wants to start?”

Benny turned to Shimon and nudged him. “Go on.”

Shimon grinned and went to the center of the room, where an easel was standing. He unfolded a roll of paper he was holding and put it on the easel. A large color photograph of the bank building displayed amazing clarity and detail.

Shimon stood next to the easel. “The building has three entrances.” He pointed to the main business entrance in front. “This is where the public enters during business hours. There is a side entrance for employees, which is mostly used when the main entrance is closed and at all times for the employees working on the second and third floors. I assume it's a shorter way out. It is also convenient to the elevator.”

Shimon removed the photograph and put up a second photograph taken from the rear of the building. He pointed to an entry shown at the bottom of the photograph. “The third entrance to the building is at the back and is mainly used by the superintendent of the building, by technical support staff, and for delivery of supplies and, very likely, cash and securities. A small truck can go up to the door.

“The bank building has three floors above ground. The main business floor is on the street level, the management uses the second floor, and the third floor is used for filing and storage. The building also has a small basement, mostly occupied by one big walk-in vault. There are no safe-deposit boxes for rent to customers. Metal bars protect the windows on the street level. These windows are also protected by an obsolete alarm system, the type that reacts to broken glass or vibration. I don't know yet whether that alarm system is connected to any central monitoring system in the building or elsewhere.

“The main entrance door is a heavy double door, probably made of metal sheets plated with a thin layer of copper. The lock is not a problem. However, use of the main entrance is ruled out because the bank is situated on a street that is active most hours of the day, and any forced entry from the front entrance is likely to be detected. The door used by the employees is also facing the street, though it doesn't look like a part of the bank building and may attract less attention.”

A true professional, I thought in appreciation.

“Look at the back door,” Shimon continued, pointing his finger at it. “I think it's the most suitable for a silent entry, if we opt to use a door. You'll soon see that there are other options. I did not detect any alarm systems in the hallway of either the side entry or the back entry; however, the doors themselves are protected with a rather primitive and outdated
alarm system that should not cause us too much concern. I did not risk entering the second and third floors at this time.”

We listened attentively. Eric was taking notes. Benny, reading our collective thoughts asked, “So, how do we get in?”

“At this time, our best way in is through the roof,” said Shimon, pointing to the photograph. “See here, there is a tree in the backyard that extends all the way to the roof of the bank. I could climb that tree, pass onto the roof, and lower myself to a third-floor window, and from there go through the bank corridor and down the stairs to the second floor. But I'm not done with my end of the EEI, so let's not lock ourselves into that option. I'm still working on other possibilities.”

Shimon paused, as if he were waiting for approval. He then turned to me. “Dan, you were there so you'll have to draw me a floor chart showing me where Guttmacher's office is.”

“I shouldn't have a problem doing that. Besides, I think we are getting the floor plan from the city's building department. It's a public record available to anyone; you go and pull out in a central hall of archives the volume needed from a flat metal drawer, pay a small fee, and make a photocopy.”

Shimon paused, waiting for comments, and when none were made he added, “Then there's the final question: Where is the file?”

“I have the answer to that one. I went back to the bank and discovered a small vault hidden in Guttmacher's office. My guess is that's where we'll find the file.”

“And how did you arrive at that guess?” asked Benny.

“A case of a lost coat,” I said, and then gave them the details, including a description of the vault.

Shimon smiled, and Eric turned to him.

“Could you do the entry?”

“I think so, if I'm given the word. I'll need support staff, backup force, security arrangements, and some equipment.”

“If we are convinced that the file is in the vault, we still need to make a decision how to open that vault,” said Benny.

“What do you mean?” asked Eric.

“We'll have to decide whether to detonate the vault's lock and leave the
scene with the door blown away or try to open it and take out the file without being noticed. Once we have the file do we remove it and leave or make copies then and there, returning the file to the vault? If the latter option is taken it increases the chances that the entire operation will remain unnoticed, but it also increases the level of danger because copying will take time. From Israel's perspective minimizing risks is very important. If something goes wrong, I don't think my government wants to be connected to a bank break-in in Europe, even if the goal is important.”

I knew what Benny was referring to. In fact, I'd wanted to say just that when Benny interrupted me. Covert operations, by definition, always had to have a built-in deniability factor. If the operation was exposed, the original operational plan must contain several levels of deniability to minimize the likelihood of positively linking the operation with the Mossad. Even when Israel releases the results of covert operations, the sources and methods utilized remain classified to protect sensitive assets.

All the Mossad's operations outside Israel are secretive and denied by the Israeli government. But there are denials and there are
denials
. When the Mossad kills a terrorist in his bedroom somewhere in Europe or North Africa, although Israel denies any connection Israeli officials leak the story to a foreign newspaper. This is how Israel kills two birds with one stone. The government denies any involvement so that there will be no protests by the foreign country whose sovereignty was violated by Israel. But the message is clear that Israel will pursue terrorists anywhere and under any circumstances. Then there are denials that are meant to distance Israel from any covert missions outside its borders. There are no leaks of operational details and in fact Israeli agents outside Israel spread “distracters” or “blowbacks,” false information aimed at sending investigators on a wild-goose chase. That happens in “black operations,” when Israel will stand to lose if it is connected to the operation. In the cost-benefit equation, the damage outweighs the projected gain from the exposure.

Benny continued as if he'd heard my silent explanation. “I believe that, although stealing the Iranian's nuclear materials purchasing list is important, Israel would not like to be implicated. So,” concluded Benny, “if you want my recommendation for an Israeli participation in the operation, I'd
suggest that the break-in be silent, the vault secretly opened, and the file copied and returned.”

Eric sounded disturbed. “Opening a vault without explosives needs special equipment and additional professionals. It could take me up to two weeks to bring them over and orient them, and we may not have that time. Time could be of the essence; the file may be removed if we sit on our asses and wait for others to do our job.”

You could cut the tension with a knife. It was clear that Benny was controlling the meeting. He was far more senior in the Mossad than Eric was in the CIA; he was also older and more experienced. I sensed that Eric was torn by his urge to tell Benny to play second fiddle or get lost and his knowledge that he couldn't do it without Benny, at least not as fast. I also suspected that Eric had a contingency plan if the operation was exposed and people were caught. He could always spin the media to put the blame on the Mossad.

“I need to add something,” I said. “There could be a solution to the problem, but I'll wait for my turn.” I looked at Eric.

“There's no need to wait. Go ahead and give us what you've got.”

I poured myself a beer and began. “Earlier, I told you that I located a vault hidden in Guttmacher's office. I'm pretty confident that the Iranian–DeLouise transaction file is kept there, because I vividly remember hearing metal clicking when Guttmacher went from the conference room into his adjoining office to bring the file. It definitely sounded like a vault being opened. I suggest you check the audio; it must have picked that up. Now, here is the part that you still don't know: I have a snapshot of a woman who touched the lock of the vault today. I don't know anything else about her, but I think she could easily be traced.”

“How did you get that?” asked Eric with surprise.

I told them about the UV powder and the UV lightbulb.

“You son of a gun,” said Benny, “you remembered that trick? I think you and I were on the same team that rehearsed it ages ago.”

“You're right,” I said, “I remembered. I also used the powder to dust my hotel room. I had visitors today while I was away.”

“The Iranians?” asked Tom.

“Possibly. They told me in the meeting with Guttmacher that they'd be watching me.”

“Is your room clean?” asked Lovejoy.

“Yes, I sanitized everything. There's nothing in my luggage other than clothing. Everything else is in the hotel's central vault or at the consulate. They didn't remove anything, and all my stuff checked benign. But they may have planted some devices in my room or my luggage: audio, video, the works. I also noticed someone scrutinizing my car outside my hotel.”

“OK,” said Eric, “we all stay away from Dan. He's contaminated. He cannot be seen with any of us until further notice. Dan will continue living in the hotel, but communication with him is limited to calls from pay phones to our special secured line.”

“I'm excluded from the quarantine,” said Benny. “I'm a foreigner, nothing links me to Israel or to our meeting today, and I'm leaving tomorrow through another European country.”

“Avoiding me may not be necessary,” I said. “I have other plans. I traced Ariel's footprints and they lead to Moscow. I'm going there.”

“What do you mean?” asked Eric. “She got away?”

“I don't know yet,” I added, and told them about the airline reservations under Ariel's name.

“So you don't know if she actually made the flight?” asked Jeff, opening his mouth for the first time.

“No, I don't,” I conceded. “And furthermore, I don't even know if the person traveling is in fact Ariel Peled. I simply haven't had the opportunity to work on it; I've only just learned this information. I was planning to call the Cosmos Hotel in Moscow to see if she checked in.”

Eric went to the telephone, dialed a number, exchanged a few terse sentences, and hung up. “The office will do it for us.”

“Since I have become a security burden, you won't mind my Moscow plans. I think you'll survive without me for two or three days.”

“We'll talk about it later,” said Eric, reassuming his control over the meeting.

“So what are your conclusions? Is the bank job doable?” asked Benny.

Eric thought for a minute. “We transcribed the recording transmitted
from the pen Dan left on Guttmacher's desk. The metal clicking suggests a vault. I'm fairly convinced that Dan is right. The file could be in the vault. I also suspect that Guttmacher may have plans that he has neglected to reveal to his Iranian clients.”

We waited for Eric to continue. Only Tom and Jeff sat back. It seemed as if they already knew what Eric was about to say.

“Guttmacher is somehow connected to the Latinos. We don't know how. We don't know if he's in bed with them or in competition with them. There were some angry exchanges on the phone between Guttmacher and someone. They spoke English, but Guttmacher paused twice to shout at his secretary to look up a word in the dictionary. In both instances it was a Spanish word. We know that as late as yesterday the file was in his vault because we heard him order a woman named Gertrude to bring the file out and we heard the vault click from a close distance.”

“So then,” I interrupted, “the woman in the photograph is likely the very same Gertrude.”

Eric gave me the look reserved for teachers showing displeasure toward a failing student. “We know that. There are several other pieces of information we obtained from the transcription. One is that Guttmacher planned to go to Moscow soon. The second is that he's probably blackmailing DiMarco to split some of the commissions the Iranians are paying. Guttmacher threatened DiMarco that unless he agreed, he'd simply be bypassed.”

“Is that all?” I was hoping my contribution to the operation would bring me closer to my original objective. While it was very exciting to participate in planning the operation against the Iranians, my main assignment was to locate and retrieve the missing ninety million dollars. The spy stuff was nice, but it was no longer my game.

“No,” said Eric, “we have plenty more, but it's being transcribed now. However, Guttmacher doesn't spend much time in his office. There is no question that he's a serious money launderer. I wouldn't be surprised if most of his business is built on dirty money.”

“OK,” said Benny, “I need Avi, my logistics guy, to confer with yours. I'll attach his findings to my EEI report.”

“Did you get the building plans?”

“Yes, I did,” said Jeff from his corner seat. “It was built in 1936 and no modifications have been made since. We are preparing the floor charts on three different small plastic sheets that glow in the dark. So Shimon, or anyone else, could read them. But I need Dan to go over the plan of Guttmacher's floor, in case they made changes that do not need a building permit.”

BOOK: Triple Identity
9.85Mb size Format: txt, pdf, ePub
ads

Other books

Dodgers by Bill Beverly
First Times: Megan by Natalie Deschain
Forever Santa by Leeanna Morgan
The Cherbourg Jewels by Jenni Wiltz
Tipperary by Frank Delaney
Nine Coaches Waiting by Mary Stewart
Arkwright by Allen Steele
Options Are Good by Jerry D. Young