Выбрать главу

It was a perplexing game the Iranians were playing. A delay in U.S. troop withdrawal seemed contrary to Tehran’s interests-or at least those visible from Washington.

Kealty leaned back in his chair and steepled his fingers. “So, Admiral, since you’re not willing to talk about intentions, I’m going to do it for you,” Kealty said. “The Iranians are saber rattling. Testing our resolve. We ignore them, keep to the drawdown plan, and give them a message of our own.”

“Such as?” Admiral Netters said.

“Another carrier group.”

A message. Another mission without a goal. While it was true enough that carrier groups were all about projection of power, the concept was analogous to basic firearm safety: Never point a gun at anything you don’t intend to shoot. In this case, Kealty just wanted to wave the gun around.

“What assets do we have available?” Kealty demanded.

Before Netters could answer, Kilborn said, “The Stennis-”

Netters interrupted. “Sir, we’re stretched thin as it is. Stennis group was just relieved on station ten days ago. It’s long overdue for a-”

“Goddamn it, Admiral, I’m getting tired of hearing about what we can’t do, is that understood?”

“Yes, Mr. President, but you need to understand the-”

“No, I don’t. That’s what you’re paid to do, Admiral. Get it done, and get me the plan, or I’ll find someone who will.”

Tariq walked into the living room, where the Emir was reading, and picked up the television remote control. “Something you should see.” He turned on the TV and changed the channel to a cable news station. The pretty blond-haired, blue-eyed anchor was in mid-sentence.

“-again, a Pentagon spokesperson just confirmed an earlier BBC report of an Iranian Army exercise being conducted on its border with Iraq. While the Pentagon admitted the government in Tehran failed to announce the exercise, it went on to say such events are not uncommon, citing a similar movement of troops and equipment in early 2008…”

Tariq muted the television.

“Strange bedfellows,” the Emir murmured.

“Pardon?”

While Tehran had been generally unsupportive of the URC’s cause, neither had it been a hindrance, knowing well that one never knew where interests might intersect. In this case, the Iranian Ministry of Intelligence and National Security, or VEVAK, had in recent years turned its attention to how a postoccupation Iraq might look. Though well represented by several militias and bolstered by both Hezbollah and Pasdaran aid, the Iraqi Shia population was still a minority, and therefore vulnerable to Sunni persecution, an imbalance of power that Tehran despised and the URC was only too happy to exploit. Even as the United States had begun banging the drum for war in 2002, the Emir had conducted his own cost-benefit analysis and developed a strategy to further the URC’s aim. The fact that the strategy was obliquely based on the American economic model was something that would likely never occur to Washington.

The United States would eventually leave, or at least decrease its presence to a nominal level, at which time Iran would begin its play for domination in Iraq, a feat it couldn’t hope to accomplish without an advantage over the Sunni majority. In this, Iran had a need. It was a customer-in-the-making.

The URC’s involvement in Iraq had begun in August of 2003 with an influx of men, matériel, and expertise, all of which were freely offered to Sunni extremist groups. Based on a mutual hatred of the U.S. occupiers, resources were shared and goals intertwined, and by 2006 the URC held sway over great portions of Baghdad and most of the Sunni Triangle. This was the good or service for which Tehran was willing to pay.

As Mary Pat Foley and the NCTC well knew and Jack Ryan Jr. had recently realized, information availability in the digital age could be as much a hindrance to intelligence work as it could be a blessing. Computers can categorize, collate, and disseminate massive amounts of information, but the human mind can absorb and use only so much of it. The application of information is the pivot on which decisions-good, bad, and neutral-are made, a fact that engineers, game wardens, casinos, and hundreds of other seemingly unrelated disciplines had long ago recognized. Who does what, and where and when do they do it? To a city planner, a list of intersections prone to traffic gridlock was virtually useless; a dynamic map on which he or she could see hot spots and trends, invaluable. Sadly, as was too often the case, the U.S. government was playing catch-up in the fields of Data Visualization and information architecture, having to outsource such services to private cyber-savvy firms while the federal bureaucracy threw millions of dollars and lost time at the issue.

For Jack and Gavin Biery, the project they eventually dubbed PLOWSHARE began as a technical challenge: how to take the flood of open-source information on the Internet and beat it into something useful-a sword with which they could pare down the overload. The slightly overwrought metaphor notwithstanding, they made rapid progress, starting with a software program designed to gather obituaries from the eastern seaboard and map them according to various groupings: age, location, cause of death, vocation, etc. Many of the patterns that emerged were predictable-such as elderly deaths clustered around retirement homes-but some were not, such as the recent raising of the drinking age in one state preceding more young-adult deaths on highways leading to a nearby state with a lower drinking age. This, too, was somewhat predictable, they admitted, but seeing the clusters on the map was the proverbial picture that paints a thousand words.

The other surprise was the depth and scope of open-source information. The truly useful data, while not inaccessible, were tucked away deep within local, state, and federal government websites, available to anyone with enough patience and technological literacy to find it. Second and Third World countries, the ones in which most terrorist incidents took place, were the easiest prey, often failing to close the gap between online record-keeping and online database security. Otherwise confidential information such as arrest reports and investigatory case files were stored in unsecured servers without so much as a firewall or password between them and government website portals.

And such was the case with Libya. Within four hours of getting the go-ahead from Hendley, Jack and Gavin had PLOWSHARE chewing on gigabytes of data from both open-source and government databases. Two hours after that, PLOWSHARE regurgitated the information onto Gavin’s hacked copy of Google Earth Pro. Jack called Hendley, Granger, Rounds, and the Caruso brothers into the dimmed conference room. The PLOWSHARE-ENHANCED satellite view of tripoli was overlaid with crisscrossing multicolored lines, clusters, and squares. Jack stood by the LCD screen with remote in hand; Biery sat in the back against the wall, his laptop open on his legs.

“Looks like a Jackson Pollock painting,” Brian observed. “You trying to give us a seizure, Jack?”

“Bear with me,” Jack replied, then touched a button on the remote. The “data tracery,” as he and Gavin had come to call it, disappeared. Jack gave the group a five-minute primer on PLOWSHARE, then touched the remote again. The image zoomed in on the Tripoli airport, which was now overlaid with what looked like the head of a flower, its center a stigma divided into colored pie slices, its petals squared off and of various lengths.

“The stigma represents average arrival volume per day. Mornings are busiest; afternoons the slowest. The petals represent average number of special searches conducted at airport checkpoints. As you can see, there’s a spike in the mornings, from seven to ten, and a drop-off the closer you move toward noon. Translation: Thursdays between ten-thirty and noon are the best times to try to sneak something through the screeners.”