Выбрать главу

As the new intelligence was dumped into Honda's computer, an audio prompt pinged. It was alerting him to an anomaly that Stoll's program had picked up at Op-Center. Honda accessed the flagged data.

The Bellhop program on the air force's "Sanctity" satellite continually scanned the cell phones and radios that used police bands. Op-Center and the other U.S. intelligence agencies had these numbers for their own communications with foreign offices. It was a simple matter to hack the computers and look for other incoming calls.

The Bellhop had picked up a series of point-to-point calls made on a police-registered cell phone. It was coded "field phone" in the Bellhop lexicon. Most of the calls were placed over a five-month period from Kargil to the district police headquarters in Jammu, coded "home phone." During that time there was only one call to that field phone from the home phone. Stoll's program, which integrated Op-Center intel with NRO data, indicated that the call was placed less than one second before the Kashmir-focused ClusterStar3 satellite recorded an explosion in a bazaar in Srinagar.

"Damn," Honda muttered.

Honda wondered if Colonel August or General Rodgers had been informed about a possible terrorist attack. The fact that a police cell phone made a call to the site an instant before the explosion could be a coincidence. Perhaps someone was phoning a security guard. On the other hand there might be a connection between the two. Honda unbuckled himself from the uncomfortable seat and went forward to inform his commanding officers. He had to walk slowly, carefully, to keep from being bucked against his teammates by the aircraft's movements in the turbulent air.

August and Rodgers were huddled together over the general's laptop when he arrived.

"Excuse me, sirs," Honda said. He had to shout to be heard over the screaming engines.

August looked up. "What have you got, Corporal?"

Honda told the two officers about the explosion. August informed Honda that they were just reading an e-mail from Bob Herbert about the blast. It provided what few details anyone had about the attack. Then Honda informed his superiors about the phone calls. That seemed to grab General Rodgers's interest.

"There were two calls a day for five months, always at the same time," Honda said.

"Like a routine check-in," Rodgers said.

"Exactly, sir," Honda replied. "Except for today. There was just one call and it was made to the field phone. It was placed a moment before the explosion that took out the temple."

Rodgers sat back. "Corporal, would you go through the data file and see if this calling pattern is repeated, probably from field phones with different code numbers? Outgoing calls to one home phone and one or none coming back?"

"Yes, sir," Honda replied.

Honda crouched on the cold, rumbling floor and raised one knee. He put the laptop upon it. He was not sure what the officers were looking for exactly and it was not his place to ask. He input the code number of the home phone and asked for a Bellhop search. Colonel August's hunch was correct. He told them that in addition to this series there were seven weeks of calls from another field phone in Kargil. They were made twice a day at the same times. Before that there were six weeks of calls from another field phone, also two times daily. Thirteen weeks was as far back as these Bellhop records went.

"New Delhi must have had civilian agents tracking a terrorist cell," Rodgers said.

"How do you know that?" August asked. "The calls may just have been field ops reporting in."

"I don't think so," Rodgers told him. "First of all, only one of the calls on Corporal Honda's list was made from the home phone to the field phone."

"That was the one made at the time of the explosion," August said.

"Correct," Rodgers replied. "That would suggest the officers in charge of the recon did not want field phones ringing at inopportune moments."

"I'll buy that," August said.

"There's more than that, though," Rodgers said. "When Pakistan was knocked out of Kargil in 1999, the Indian Special Frontier Force knew that enemy cells would be left behind. They couldn't hunt them down with soldiers. The locals would have known if strangers were moving through a village. And if the locals knew it members of the cell would have known it. So the SFF recruited a shitload of locals to serve in their Civilian Network Operatives unit." The general tapped his laptop. "It's all here in the intelligence overview. But they couldn't give the recruits normal militia radios because, that close to Pakistan, those channels are routinely monitored by ELINT personnel. So the SFF gave their recruits cell phones. The agents call the regional office and complain about break-ins, missing children, stolen livestock, that sort of thing. What they're really doing is using coded messages to keep the SFF informed about suspected terrorist movements and activities."

"All right," August said. "But what makes you think the calls on this list aren't just routine field reports?"

"Because CNO personnel don't make routine field reports," Rodgers said. "They only report when they have something to say. There's less chance of them being overheard that way. I'm willing to bet that there are terrorist strikes to coincide with the termination of each of those series of calls. A target was hit, the cell moved on, the calls stopped being placed."

"Perhaps," August said. "But that doesn't explain the call to the temple right before the blast."

"Actually, it might," Rodgers told him.

"I don't follow," August said.

Rodgers looked up at Honda. "Corporal, would you please get the TAC-SAT?"

"Yes, sir."

Rodgers turned back to August. "I'm going to ask Bob Herbert to check on the dates of terrorist strikes in the region," he said. "I want to see if reports from field phones stopped coming in after terrorist strikes. I also want Bob to look into something else."

"What's that?" August asked.

Honda closed his laptop and stood. He lingered long enough to hear Rodgers's reply.

"I want to know what kind of detonator caps the SFF uses for counterterrorist strikes," the general replied.

"Why?" August asked.

"Because the Mossad, the Iraqi Al Amn al-Khas, Abu Nidal's group, and the Spanish Grapo have all used PDEs on occasion," Rodgers said. "Phone-detonated explosives."

THIRTEEN

Srinagar, Kashmir
Wednesday, 6:59 P.M.

It was nearly dark when Ron Friday returned to the bazaar. Though he was curious to see how the authorities here were handling the investigation he was more interested in what he might be able to find out about the attack. His life might depend on that information.

The rain had stopped and there was a cold wind rolling off the mountains. Friday was glad he had worn a baseball cap and a windbreaker, though the drop in temperature was not the reason he had put them on. Even from his room he could hear helicopters circling the area. When Friday arrived he found that the two police choppers were hovering low, less than two hundred feet up. In addition to looking for survivors, the noise echoing loudly through the square helped to keep onlookers from staying too long. But that was not the only reason the choppers were there. Friday guessed that they were also maintaining a low altitude to photograph the crowd in case the terrorist was still in the area. The cockpits were probably equipped with GRRs — geometric reconstructive recorders. These were digital cameras that could take photographs shot at an angle and reconfigure the geometry so they became accurate frontal images. Interpol and most national security agencies had a "face-print" file consisting of mug shots and police sketches of known and suspected terrorists. Like fingerprints, face-print photographs could be run through a computer and compared to images on file. The computer superimposed the likenesses. If the features were at least a 70 percent match, that was considered sufficient to go after the individual for interrogation.