asked Drake.
âJordanian, with a valid green card. Says he was only trying to give a bright young man a chance. Our interrogators donât think heâs guilty of anything beyond hiring an illegal.â
Nick tore his eyes free of the photo and looked up at her. âSo youâve got nothing.â
âI didnât say that. We have his apartment. Even better, we have his laptop, which he tossed into a Dumpster behind his building. That rookie you gave such a hard time yesterday ran down the garbage truck and saved it.â
âIâll buy the kid a soda.â
âCute. The NSA decoded e-mails on the computer and traced them to a known source.â CJ opened another file that covered the other three. In this picture, straight lines connected four names to a central square that read
Grendel
.
Ethan Quinn pushed off the back wall and scrutinized the chart. âSo weâre looking at a cell?â
âNot really. Grendel is not a cell or a network. Itâs an NSA code name for a set of IP addresses.â CJ gestured to the four names. âThese represent four plots that were uncovered over the last six months, all of them in Europe.â She pointed to each name in sequence. âThis one planned to bomb a train in Germany. This one, a Russian in Budapest, attempted to sell rocket-propelled grenades to a known al-Qaeda buyer. This one was a subway bomber in the UK, and this one an Algerian radical buying explosives in France.â She turned and faced the group. âNone of the four were working together, but the NSA pulled similar IP addresses from e-mails on each of their computers.â
âIf they have the IP addresses, then they have a physical location,â said Drake, starting to boil. âThe NSA could have rolled this Grendel up and stopped the Washington attack before it happened.â
CJ held out her hands to calm him down. âEasy, tiger. The NSA has a location, a building in northern Budapest, but Grendel is not a ringleader or an umbrella organization. The IP addresses indicate Grendel is a hacker, providing a secure communications network for hire. Chances are, whoever sent the DC bomber had never used him before.â
âCan we read Grendelâs mail?â asked Nick.
âNot yet.â CJ tapped the digital wall, and the Grendel chart shrank back into the tray, leaving the previous three pictures up on the screen. âThe NSA hasnât cracked the outgoing or incoming paths to the IPs. If they could, theyâd have a simultaneous wiretap on every terrorist that uses the network. Theyâve had their long-haired geniuses working on it night and day for months.â
Nick nodded. âThatâs why they left Grendel in the wind, but tapping the network isnât the goal anymore, is it?â
âNo.â Walker stood up from his chair. âThe DC attack is a game changer. The president doesnât care about using Grendel as an intelligence source. He wants the mastermind behind the DC bombing, and that means capturing both Grendel and his hardware.â
Nick cringed at the mention of the president. He hadnât met this one and he didnât want to, particularly under these circumstances. âDoes the White House know about my picture?â
âAs soon as I saw it, I classified it Special Access Required,â said CJ. âThat wonât keep it out of political hands forever, but it will delay things until we can get a handle on the situation.â
The colonel stepped out from behind his desk and stood next to CJ, silhouetted in front of Nickâs picture. âWe need to understand how you became a target. Is there anything else that connects you to this attack?â
Nick stared up at the two of them a moment longer. Then he pushed himself up from the leather chair and pulled his phone from his pocket. âYes, sir. There is.â
â
âA telephone chess game?â asked Walker when Nick