“Oh, God.” Clarke started to hyperventilate. “You think I have something to do with the drone attacks? Hold it, hold it. I’ve got nothing—nothing—to do with those attacks. We were hired by M and R to help mold public opinion in support of the drone appropriation. That’s all I know. That’s it—”
“Who at M and R?”
“I could give you names, but they’re just lawyers. They’re all just lawyers. I’m telling you, they’re all half out of their minds with fear that they’re going to be the next one hit by a missile—they’re sending their kids to suburban schools like this is the London Blitz or something. We were paid to sell drones to the public, but frankly it makes sense—we’re under attack. Why wouldn’t we want to launch drones in our own defense as quickly as possible?”
The man moved closer, rolling the knife in his palm with frightening skill. “Time’s up.”
“Wait! Wait!” Clarke held up his hands defensively. “Rita Morehouse. Jack Allenby, Aaron Nichols, uh, Uma Verazzi.”
“Those are your handlers at M and R?”
Clarke nodded, suddenly sweating and trembling. “Yes. Please don’t kill me. I promise I won’t warn them. I swear it.”
“Well, you’re not someone I’d want watching my back. I didn’t even have to cut you.” The man deftly grabbed Clarke’s silk tie and, with a single frictionless motion, cut it clean away, leaving an orphaned double-Windsor.
Clarke recoiled, trembling and clenching his eyes shut as he held up his hands defensively. “Please! I promise you. I swear it.”
After a few moments he opened his eyes warily, but the man appeared to be gone. Clarke lowered his arms to see his office door open and himself alone. He let out a deep sigh, just now realizing he’d forgotten to breathe. He leaned back against his desk and tried to collect his thoughts.
The first thing he did was edge toward his office door. He then leapt forward and closed, then locked it. He peered through the glass at an angle to see if anyone was outside. The man seemed to be gone.
Clarke reached into his jacket and produced his iPhone. A moment later he was listening. Even though it was one in the morning, it only took one ring to pick up. It never occurred to him to wonder why. “Marta! Some SAD-SOG asshole just threatened me at knifepoint in my own goddamned office.”
“He said he was SOG?”
Clarke took a deep, calming breath. “No, but he sure as hell knew who we are. He said he’d been attacked three times by drones, and he was coming for somebody’s head. He was definitely black ops and wanted the names of my contacts at M and R.”
“Who did you give up?”
“Some mergers-and-acquisitions people. The first names that came to mind. . . .”
* * *
In a panel van half a mile away, Mordecai Evans, Linda McKinney, and Foxy sat listening to the conversation as they watched the voice patterns on a laptop monitor. The voice of Mr. Clarke was filled with anxiety.
“. . . I need protection, Marta. This guy walked in here like it was a public restroom. This wasn’t some amateur. I don’t know how he got past security.”
“Calm down, Henry. If they wanted you dead, you’d be dead.”
Evans was busy clattering at a laptop linked to an almost Soviet-looking stack of ruggedized radio receivers dotted with antennas. “I’ve got her IMEI and IMSI. Looks like a company phone—no name—but I place her near the Georgetown waterfront. Stationary, so she’s probably at home. I’ll use the control link to direction-find her when we’re close.”
Clarke’s voice pleaded in the background. “. . . this is no joke, he literally cut the tie off my neck.”
“It will be handled. Just go home. Get some rest.”
McKinney watched Evans working.
Evans answered a question she was only thinking. “Multichannel digital receiver.”
“I didn’t know it was this easy to intercept cell phone conversations.”
“Well, it is. It’s called meaconing.” He pointed. “Wireless phone systems consist of base stations spread around town. When you turn on your phone it searches for the base station with the strongest signal and establishes a control link—down which it sends information about the phone’s identity. The first thing I do is jam the target phone’s existing control link. That forces it to scan for a new base station—which I mimic by providing a stronger signal. Basically I become his cell tower, and that gives me a control link to his phone. I can then listen in and see the identities of any phone he communicates with. The control link is completely separate from the connection that people use to talk on the phone. That means I can remotely program a target phone to turn on even if it’s off. I can activate the microphone when he’s not on a call—use it as a bugging device. And lots of other things. Even if they’re using civilian encryption, it won’t help. Most encryption is done at the base station . . . and of course, I’m now his base station.”