time while she waited for the desk assignment. She reminded the operations director that the leads to be immediately followed to the Cologne conduit were in the NSAâs initial communiqué and dictated every relevant detail to trace a passport in Roger Bennettâs name from the incompetently maintained Bradford crime file.
âThis is going to take time,â said Dodson.
âTimeâs what we havenât got,â warned Sally, wondering if she was going to have anything to substantiate the exaggeration of connecting Bennettâs death with a terrorist threat at the end of the GCHQ examination.
*Â Â Â *Â Â Â *
Independent of each other Irvine and Singleton followed the same algorithm search that had partially defeated Barker, both double-checking their effort after their partial failure. Irvine decreed an assessment session. Marian provided fresh coffee.
âLetâs start from absolute basics,â said Irvine. âItâs obviously algebraic.â
âEncrypted by someone or some group whoâd know a search for its algorithm would be the first move if it were intercepted,â agreed Barker.
Singleton sighed. âDo we really have to be that basic! Itâs an intelligence-generated encryption, from our equivalent in Iran. So theyâll be good, the best Tehran can find. Theyâve been hit, here, but they donât know how or by whom, except that Anacostia looks gang-related, not an attack by law enforcement: thatâs our advantage. They wouldnât expect our level of expertise. But theyâll still have put a lot of professional effort into protecting their traffic with cutouts and double or treble encryptions. We know from the partial Anacostia interception that theyâre going ahead with whatever attack theyâre planning. How many English letters can we reasonably get so far from the original Arabic?â
âThree,â at once replied Marian, whoâd maintained the tentative, insufficient deciphering.
âBut theyâre not positives,â protested Barker. âThey appear to work in some sections but not in others.â
âMulti-algorithms,â declared Irvine. âThe letter-to-number or symbol transference is limited, changing at intervals, either fixed or irregular.â
âI agree,â said Singleton.
âItâs Facebook, not Twitter,â Marian pointed out. âEven without being able to read it, Iâd say from the length that itâs attack instructions.â
âI havenât forgotten the urgency,â said Irvine, recognizing the direction of the discussion.
âAkramâs not going to be able to contribute at this stage,â predicted Singleton.
âYouâre right,â confirmed the tightly bearded man, entering the room after an hour at the random-number generator. âIâve got some numbers for alphabetical substitution, but they fit in some parts but not in others.â
James Bradley answered his phone on its first ring.
âWeâve got a problem,â announced Irvine.
âSerious?â
âIt could be.â
*Â Â Â *Â Â Â *
Sally Hanningâs concern deepened far more quickly than either she or Jeremy Dodson anticipated. Forty-five minutes after her short-tempered exchange with MI5 headquarters in London, the GCHQ official she only knew as John returned to her temporarily assigned office to announce that nothing remotely resembling a coded message had been deleted from the hard drive of Roger Bennettâs computer.
âWhich is why itâs been so quick,â said the man. âWhat has been deleted is inconsequential. Seems to have gambled a bit: dog- and horse-racing tips, stuff like that.â
âYouâve kept it all?â
âOf course. Weâre running printouts right now, assuming youâd want to go through them.â
âI do,â said Sally at once. She was sure she hadnât
S. Ravynheart, S.A. Archer
Stephen G. Michaud, Roy Hazelwood