The Atlantis Gene (The Origin Mystery, #1)

“Then who were—”

“Actors. Mostly field agents who had worked as analysts before, anyone who could fake it. We had to. Some of the analysts already knew the approximate number of Clocktower cells and the actors provided an operational benefit: they could facilitate the 3-day-lie-detection, ask pointed questions, elicit responses, get reactions.”

“Unbelievable… How could we be so deeply compromised?”

“That’s one of the questions we have to answer. There’s more. Not all the cells are like Jakarta Station. The vast majority are little more than listening posts; they manage a small group of case officers and send Central the HUMINT and SIGINT they collect. A compromised listening post is bad, it means whoever this global enemy is, they have been using those cells to collect intel and maybe even send us bogus data.”

“We could be essentially blind,” Josh said.

“That’s right. Our best case scenario was that this enemy had co-opted our intelligence gathering in preparation for a massive attack. We now know that that’s only half of it. Several of the major cells are also compromised. These are cells similar to Jakarta station, with intelligence gathering and significant covert ops forces. We are one of 20 major cells. These cells are the last line of defense, the thin red line that separates the world from whatever this enemy is planning.”

“How many are compromised?”

“We don’t know. But three major cells have already fallen — Karachi, Cape Town, and Mar del Plata have all reported that the cell’s own special forces swept through their HQ, killing most of the analysts and the Station Chiefs. There have been no communications from them for hours. Satellite surveillance over Argentina confirms the destruction of the Mar del Plata HQ. The Cape Town insurgents were assisted by outside forces. As we speak, firefights are on-going in Seol, Dehli, Dhaka, and Lahore. Those stations may hold, but we should assume they will be lost as well. Right now our own special ops forces could be preparing to take over Jakarta Station, or it could be happening this second, outside this room, but I doubt that.”

“Why?”

“I believe they’ll wait for you to return. Given what you know, you’re a liability. Whenever they attack, you’ll be at the top of the target list. The morning briefing would be the ideal time for a strike; they’re probably waiting for that.”

Josh felt his mouth go dry. “That’s why you grabbed me off the elevator.” He thought for a moment. “So what now, you want me to identify the threats on the staff before the briefing? We initiate a preemptive attack?”

“No. That was the original plan, but we’re past that now. We have to assume Jakarta Station will fall. If we’re compromised as badly as the other major cells, it’s only a matter of time. We have to look at the big picture and try to unravel our enemy’s end game. We have to assume that one or more cells will survive and that they will be able to use anything we learn. If not, maybe one of the national agencies. But there’s still one question you haven’t asked, a very important one.”

Josh thought for a second. “Why now? And why start with the analysts? Why didn’t you clean the field operatives first?”

“Very good.” David flipped open a folder. “Seven days ago, I was contacted by an anonymous source who said two things:

1) there was an imminent terrorist attack — on a scale we’ve never seen before

2) that Clocktower had been compromised.

He included a list of 60 analysts that he claimed were compromised. We shadowed them for a few days and confirmed them making dead-drops and unauthorized communications. It checked out. He said there might be more. The rest you know: the other station chiefs and I organized the analyst conference. We interrogated and quarantined the compromised analysts, replacing them with actors at the conference. Whoever the source is, he either didn’t know about the field agents or didn’t disclose it for his own reasons. The source refused to meet, and I received no other communications from him. We proceeded with the conference and after… the purge. The source was radio-silent. Then, late last night, as the analyst conference was wrapping up, he contacted me again. He said he wanted to deliver the other half of the intel he promised, details of a massive attack code-named Toba Protocol. We were supposed to meet this morning at Manggarai Station, but he didn’t show. Someone with a bomb did. But I think he wanted to be there. A kid gave me a newspaper with this message right after the attack.” David pushed a page across the table.

________________________



Toba Protocol is real.



4+12+47 = 4/5; Jones

7+22+47 = 3/8; Anderson

10+4+47 = 5/4; Ames

________________________


“Some kind of code,” Josh said.

“Yes, it was surprising. The other messages were straight-forward. But now it started to make sense.”