“More likely a combined effort,” said Nicole.
“Right. But what ever it is, in some points it matches perfectly with the other sources we have.”
“Such as the existence of Department 81,” agreed Nicole. “I tend to give the NSA/FBI report a much higher degree of credibility,” I said.
“Why, because it’s one of our own?” Her blue eyes were full of skepticism. “Don’t fall into that pit. Always question the value and credibility of information.” She sounded like some of my instructors at the Mossad Academy, although she was by far more attractive.
“No,” I said. “Because of the fingerprint match. Remember, I lifted a set of prints from the Chameleon’s cup next to his hospital bed.” When I saw Nicole’s brows rise again, I quickly added, “I know I’m not a qualified lab technician and might accidentally have contaminated the evidence. But apparently I didn’t, because these prints matched the prints the Australian police later obtained independently. Now comes a U.S. intelligence agency, and, through means they don’t tell us, it obtains another set of prints that match the two previous sets of prints. You can’t get better than that.”
“I agree,” said Nicole. “Provided NSA got it from some files in Iran. If we can make a case for that, then I’m convinced.”
“If you think NSA will tell you that they hacked into an Iranian government database and downloaded the personnel file of Farhadi, then good luck with this one. NSA didn’t even confirm its own existence until a few years ago. You know what people used to say that NSA stood for—no such agency. If you believe that they’ll tell us about their means and methods of gathering specific information, then there’s a bridge in Brooklyn I want to sell you.”
I was certain that NSA did talk about it with someone outside its walls of secrecy. Namely, the FISA—Foreign Intelligence Surveillance Act—court, while they were seeking a court order approving the use of “electronic surveillance” against foreign powers or their agents. I did have a hunch how NSA broke into the Iranian computers. Before the Islamic Revolution, some Iranian government agencies had used tailor-made software written by American companies. They’d left a trap door to allow them to service the computers from a remote location. Now, that concealed method of access could be used to hack into the computer without leaving a trace.
“Dan, there’s no need to be sarcastic. We need to generate a report that is acceptable to both of us. Therefore, before I put my name on any such report I want to make sure I can live with the facts it describes. What good will our recommendations do, if some guy with average common sense can punch a hole in the tower of facts we’re building?”
“Fine with me,” I said. “Other than the prints, we have no facts, only a bunch of leads and pieces of information. The case isn’t over. We aren’t writing an autopsy report. We’re summing up a case that has just gotten closer to breaking than at any time during the past twenty years. The report will set the path to go forward, not to bury a corpse.”
“And it has characteristics of national security, rather than just catching a successful serial thief,” she added. She’d finally jumped on the wagon of enthusiasm I had been single-handedly pushing uphill.
“By the way,” I said. “We’ve got some indication that there’s at least one sleeper agent in the U.S. other than the Chameleon.”
“What indication?”
“Loretta Otis. She was murdered a few days after she reported to a rabbi in Sydney that Goldman was in fact Ward. The rabbi confronted the Chameleon, asking for his explanation. When no satisfactory responses came, the rabbi refused to marry the Chameleon. Now, knowing that his new identity as Goldman was in jeopardy, the Chameleon sealed Loretta Otis’s fate. The Chameleon was still in Australia when Otis was killed. That means he must have arranged for her elimination in the U.S., either by calling Iran or directly calling another member of Department 81 in the U.S.”
“So he’s probably in trouble in Australia for that, and for the fraud.”
“The Australian Federal Police is looking for him as well.” “OK. I think we should spend some time in making recommendations concerning our next move.”
“We’ve a plenary meeting with the other working groups in a week. Do you think Casey set up Monday as our deadline to submit our report so that he could use our paper during the plenary meeting?” I asked.
“I think he’s doing the same with the other groups—asking them for their reports. Since Bauer is acting as liaison, not as a decision maker, I think the real evaluation and decision making will be done at Langley.”
“In Tel Aviv as well,” I added. “One working group consists of Mossad guys.”
Nicole yawned and stretched. “Right. Well, let’s adjourn until the morning. I’m exhausted.”
I looked at my watch. It was one thirty A.M. Based on my past experience, the bigger the operation, the shorter the time that management would give us to finish it. But at least because there were a few of us, we could always find someone to blame for any failure.
In the morning, it took four hours of debating and document review to write our report. The room was the worse for wear: empty beer cans, three half-empty bags of potato chips—a quarter of the chips on the floor and the rest in my stomach, giving me heartburn.
“Let’s clean up the mess,” said Nicole. “We can’t have cleaners here.” We spent the next hour sweeping the floor and removing garbage, not before making sure we didn’t accidentally throw away any pieces of paper. Nicole went to the communication room and returned twenty minutes later.
“There has been a change of plans. There’s a meeting in another safe apartment in northern Paris in two days. We should send our report immediately.”
On the day of the meeting, we took Nicole’s car from a nearby parking garage and drove to the outskirts of Paris, to a leafy residential area. More out of habit than as a result of any suspicion, I routinely checked our backs to make sure we had no unwanted company. I wondered whether there was any security backup. There was too much activity around our safe apartment, and if any of the visitors was unknowingly compromised to the opposition, they’d contaminate us as well. Opposition? I wondered who our opposition would be, here. There were too many contenders for the title. I decided to raise the issue with Casey. I was uncomfortable. We were too visible.
When we entered the meeting room, a large one with high ceilings, there were several other people already waiting. I recognized Casey, Arnold Kyle, and Benny. Four other men and one woman looked unfamiliar. In the center of the room was a big nineteenth-century-style dining table. We sat around it. I counted the participants. We were ten in all.
Arnold started. “The work of all the teams ended sooner than expected. That’s a good sign. We’re here today to review the various options following the recent developments in the Chameleon case, which now seems more than ever to be connected to Iran’s terror financing.”
“Chameleon?” I muttered to Benny, who sat next to me. “Since when is he using that name?”
“Dan, you’re a lawyer. You know as well as anyone that you haven’t secured trademark protection for that name,” he said, grinning.
“The purpose of this meeting is to explore whether a recommendation should be made to our respective governments to take additional measures. But before we begin, Jack Randolph, our security officer, will say a few words.”
A man in his late fifties with a shaven head and dressed in a blue blazer addressed us. “Good intelligence is the best weapon in the battle against international terrorism. However, gathering intelligence about the identities, intentions, capabilities, and vulnerabilities of terrorists is extremely difficult. On top of that, we’ve realized that leaks of intelligence and law-enforcement information, some due to negligence and carelessness, but some intentionally stolen—or worse, secretly and illegally transferred— have endangered sources, alienated friendly nations, and inhibited their cooperation, thereby jeopardizing the U.S. government’s ability to obtain further inform
ation. Therefore, I insist that each and every one of you understand the gravity of this issue. Particular security measures are undertaken concerning this meeting and the operation planned. Please respect these limitations, and protect all information received and treat it as top secret. I’ll go over the security instructions before the conclusion of this session. Thank you.”
Kyle proceeded to provide us with a brief history of the battle against terror financing. Then we went into specific cases, and finally, when I was about to lose interest, he discussed our case, mostly using the report Nicole and I had submitted earlier. “This report is an early-stage operational road map. I say early stage, because there’s a lot of work to be done here. For starters, I need your input on two points: risk/benefit analysis of such an operation, and whether, how, and where to enter Iran—and once entered, the ways and means of achieving our ultimate goals.”
He paused. “We’re here to look at operational aspects. Any suggestions?”
“Dan, any ideas?” nudged Benny.
I spoke up. “If we want to crack the mystery of Atashbon or Department 81—if they are in fact separate entities—we just can’t exclusively rely on ELINT/SIGINT. We must have HUMINT. We need someone with a pulse, an informer, or for one of us to get it independently.”
“Not that I disagree with you,” said Kyle, “but look at the results that NSA has brought. It’s all ELINT based. They’ve just been intercepting electronic transmissions.”
“Sure, but did they tell us where the Chameleon is? Did they tell us whether there are other sleeper cells in the U.S.? They just brought us the ladder. Now we need a person to climb it,” I said. “We must have the human touch to bring in the smoking gun. If we can do it by remote control, then I’m all for it. But if we can’t—and I do believe that to be the case here—then we should do the job ourselves, even if that means penetration into Iran.” I was sounding more decisive than I actually was. I hoped I wasn’t going too far.
“You do realize that such a mission could get you killed,” said Bob Holliday. It was more of a statement than a question. “Is it worth it just to get even with someone who stole money?”
Though I was initially surprised, I realized with a quick flash of eye contact that he was handing me the ball to score. Maybe working for this guy wasn’t going to be so stiff after all.
“It started as a case of stolen money,” I said. “No longer. This is a case that concerns U.S. national security. For the first time we’ve got evidence to suggest that there could be Iranian sleeper cells in the U.S. If the suspicion is established as fact, do you think their hibernation will continue forever? We tentatively concluded that the Chameleon was assigned by his controllers to steal money. We know from the physical description of the other perpetrators of the banking fraud in the U.S. that there are probably other members of Department 81 in the U.S., because they didn’t look like the Chameleon. Do we know, in case there are additional sleeper cells in the U.S., what their missions are? Do we even know that they were in fact asleep during the past twenty years? Maybe some of the unsolved mysteries during those two decades were connected to one or more of them. Remember, the U.S. is called the Great Satan by the Iranian ayatollahs, while Israel is the Small Satan. The Iranian message is, don’t play with Satan—kill him.”
“So you’re suggesting we get the still-missing information regarding their identity directly in Iran,” said Arnold.
I nodded. “Yes. But I want to make clear that my support for the recommendation for penetration is contingent upon identifying and finding a potential source, or a plan that could provide us with the necessary information or be a conduit to others who could give us that. I’m not suggesting we enter first and then start looking around. I hope you give me credit for not being that unprofessional and careless. We suggested a preliminary plan in our team’s report.”
“Have you also done a risk assessment?” asked Casey.
“No. I was asked to deal with finding the Chameleon. Another team made the assessment. But since you asked, I agree that there are significant risks involved in penetration, even under our proposed plan, and I understand them. If caught, whoever goes there has little or no chance of walking away from it alive. But a more accurate risk assessment must be made once a plan is in place. And we don’t have an approved plan yet.”
I took a deep breath. “But if there’s a good plan, I’m willing to volunteer to be a singleton for that mission.” I knew that I’d fare better as a lone wolf in an operation designed for a single operative. During my military service I’d realized that many would volunteer for a mission until it was time to go. But not here; I was willing.
Benny, who sat next to me, said quietly in Hebrew, “Dan, you’re crazy.”
Everyone else just silently stared at me. We continued discussing various options for three more hours until Kyle said, looking at his watch, “OK, I think we’ve accomplished something today. I ask for your summary operational suggestions by the end of the week. I’m going back to the U.S., and we’ll review the options there. Benny, any suggestions?”
“Not at this time,” said Benny. “I need to talk to the director of the Mossad before we continue. In general, I’ve got his blessing, but when concrete plans are drawn that assume our participation, we must revisit the entire matter.”
When everyone was about to leave, Kyle asked Bob, Benny, Casey, Nicole, and me to stay behind.
“Let’s talk shop,” he said. “For the kind of detail I want to get into, we don’t need the whole assembly. Under what guise do you think an entry into Iran could succeed?”
“There are two ways,” I said. “The legal and the illegal. Well, both are illegal. What I call legal is an entry through the international airport of Tehran, with a cover story.”
“And the illegal entry?”
“Through one of the extremely long borders Iran has with its seven neighbors. Preferably penetration through Turkey, or from Turkmenistan.”
“If penetration isn’t through the international airport, whoever we send has to be physically fit,” said Nicole. “I’m sure you’re aware of the distances, the heights, the lack of transportation, and the rivalry between various factions living in these areas that don’t particularly like snooping strangers, regardless of their nationality.”
“I know that. We submitted a general plan, which may or may not be plausible,” I said. “But just two comments in that regard. One, we don’t have to dwell on that now, because it’s not our mandate to determine means of penetration. The operation departments of the CIA and Mossad are better qualified to recommend that. Also, the Mossad has an excellent long-term relationship with the Kurds, as we heard from Benny in Giverny, so maybe we could have a route here. But for the sake of our mock war game, and as suggested in our plan, let’s assume entry through Tehran’s airport. It has a lot of advantages.”
“Such as what?” asked Bob.
“Such as support for the legend. Let’s say, for example, that our men enter Iran posing as representatives of European companies selling pharmaceuticals to Iranian drug importers. Would their cover story make sense if they’re stopped en route from the Turkish border on the back of a mule, or in a beat-up bus that travels twelve hours, seated among peasants carrying their goats? On top of these problems we must bear in mind that the border areas in the north are infested with informers and part-time spies in numbers greater than those operating in Berlin during the Cold War.”
“I realize that illegal border crossing severely limits the options for a plausible legend,” agreed Kyle.
“OK. That leaves a ‘lawful’ entry as a preferred option. Next, let’s talk about a legend, just for the sake of our discussion, to see if we aren’t too optimistic in the evaluation of risks,” I said.
“Your report suggested several options, including posing as a European businessman. Why?” asked Bob.
“Because they’re preferred as business partners by the Iranians. The idea can fly, provided we can show r
eal links on both sides. A real company in Europe that upon inquiry will confirm that our men actually work for it, and an Iranian company that will confirm prior business contacts and scheduled meetings to discuss some business—can we show that?”
“Based on our problem in Iran regarding lack of human assets, the answer is probably no,” said Kyle. “So we can’t build a legend that will require bidirectional verifiable contacts.”
“Or,” I said, “we build the relationship from scratch with a genuine Iranian company seeking to do business with Europe. But that will take time, since a relationship with an Iranian company that has little past and no track record could be suspicious if you scratch the surface.”
“How about another option we suggested?” said Nicole. “An in de pen dent German TV production company does a Roots-style program and sends a crew to Tehran, together with a European whose father, or rather grandfather, was born in Tehran and later emigrated. Now the son or the grandson looks for the roots of his heritage.”
“I guess you suggested a German company on purpose,” said Benny.
“Right, because of all the European countries, the Germans have a history of good relationships with the Iranians.”
Kyle intervened. “OK, we can work later on these aspects. Let’s assume our men are in Tehran. Then what? How do they find traces of Farhadi and his comrades twenty years after the fact?” He looked at Nicole.
Nicole said, “Ask Dan, I think he’s locked on one option.” “Dan?”
“We suspect that there could be additional graduates of the American School in Tehran who are members of Department 81. That’s the single most identifying common denominator. So why go far? Other than the security services of Iran, nobody knows of that connection. Also, they don’t know what we suspect. Twenty years went by, and we didn’t catch any of them. There are several groups in the U.S., and maybe elsewhere, of former students of the school who like to communicate and reminisce. Why don’t we build a legend around that?”
The Chameleon Conspiracy Page 18