monitoring him in my own time back at Meade; tried to follow his communication routes, which started to go through cutouts, although too often still unencrypted. His using the anonymous darknet chat rooms didnât surprise me. Facebook did. It took me a year to hack into all Hamidâs cutoutsâas well as Hamidâs shared darknet accountâto be able to follow the traffic both ways, although not quite as long to realize that Hydarnes, his shared Tehran account, is that of a covert-operations division of Vezarat-e Ettelaâat va Amniat Keshvar.â Irvine paused, preparing his denouement. âWe have our own Trojan horse deep inside, totally without Tehranâs knowledge or suspicion.â
Singleton interrupted disbelievingly, âYou got us inside Iranâs espionage service!â
âAn active subversive operational unit of Vevak,â qualified Irvine, using the acronym. âFrom that one discovery and the botnets we installed from the address-book links, weâve established that theyâre heavily using Facebook when they leave their darknet concealment to get into the West.â The hesitation was again intentional, for effect. âAnd it hasnât stopped with social networks. Through darknets Iâve got into chat rooms. I think weâve got a handle on at least two, maybe three, darknets regularly visited by Al Qaeda groups in Arabia, Yemen, Pakistan, the Maghreb, Europe, and here.â
âAll that has emerged from social networks!â questioned Marian Lowell, an angular-bodied woman whose blue-dyed hair was lacquered into a protective helmet and who always wore business suits. Todayâs was brown check, with a belted jacket.
âA lot of it,â confirmed Irvine. âDonât forget we didnât then fully appreciate how social networks would be used to avoid censorship and security controls in the Maghreb revolutions of 2011. Then it was to publicize regime change. Think of the opposite. What better concealment can any sort of terrorist group have than to be among millions upon millions of social-network users, until now hidden from us, too, despite our worldwide signals intelligence-sharing with Australia, New Zealand, Canada, and the UK and our bilateral exchange agreement with the UK. Itâs the equivalent of double, even triple encryption with double, even triple anonymity.â
There was a contemplative silence. Singleton stirred as if to speak, but before he could, Barker said, âOkay, so weâre ahead of the game. We can alert counter-intelligence to prevent the attacks before theyâre mounted. Thatâs our job; whatâs different with what youâre doing?â
From anyone else Irvine would have considered the question sarcastic, but not from Barker, a soft-voiced, gentle-mannered man confronting a regretted teenage addiction to hot dogs, hamburgers, and molasses-soaked waffles with a self-devised white-fish, nut, and herbal-drink diet that contributed nothing to any weight loss but substantially to discomforting flatulence.
Irvine breathed deeply, preparing himself. âWeâre not stopping when we identify a planned attack. We hack into the plannersâ computers, add or remove or alter their messagesâsometimes leaking to rival groups, intruding Shia or Sunni hatredâto turn one against the other.â He paused. âSo far two groups have destroyed each other instead of innocent Americans ⦠innocent civilians anywhere.â
There was utter silence for several moments. Then Singleton said, âI want to know a lot more than that.â
âYou picked up a private Facebook message to Boston six months ago that originated from Syria,â reminded Irvine. âI got a botnet into the Boston recipientâs laptop. He was a Syrian immigrant. The CIA found an Al Qaeda suicide video in his apartment when they made a quick in-and-out intrusion. Heâd formed up with two