Online Read Free Novel
  • Home
  • Romance & Love
  • Fantasy
  • Science Fiction
  • Mystery & Detective
  • Thrillers & Crime
  • Actions & Adventure
  • History & Fiction
  • Horror
  • Western
  • Humor

    To Iceland, With Love


    Prev Next

    

      To Iceland,

      With Love

      I. C. Springman

      Copyright © 2012 I. C. Springman

      DEDICATION

      To the far-seeing and courageous People of Iceland

      and to Indignados everywhere.

      For DLW, SVP, and RWR

      First, last, and always…

      CONTENTS

      BEFORE - Burning Down the House

      1 Once in a Lifetime

      2 Road to Nowhere

      3 Brand New Day

      4 Nobody Told Me

      5 Hasta Siempre

      6 Closing Time

      7 Smoke Gets in Your Eyes

      8 My Old School

      9 Sloop John B

      10 Stay Visible

      11 We Both Go Down Together

      12 Calamity Song

      13 How To Be a Millionaire

      14 Strange Times

      15 Last Train

      16 Cold Wind Blowing

      17 I Travel

      18 Life During Wartime

      19 2 + 2 = 5

      20 When Two Worlds Collide

      21 Good Night, Bad Morning

      22 Blindsided

      23 Poker Face

      24 Bridge Burning

      25 High and Dry

      26 The Kids Don’t Stand a Chance

      27 While All the Vultures Feed

      28 Janie’s Got a Gun

      29 Seven Nation Army

      30 Turncoat

      31 (We’re Never Going to Survive Unless We Get A Little More) Crazy

      32 Raise Your Glass

      33 Never Say Die

      34 Bad Girlfriend

      35 Endgame

      36 Blow It Up

      37 Shut Up and Drive

      38 Dead End Street

      39 End of the World as We Know It

      AFTER - Army of Me

      BEFORE – Burning Down the House

      December 2008. A darkened conference room in McClean, Virginia. Above a semi-circle of motionless heads belonging to anonymous U.S. intelligence honchos, a Power Point presentation was in progress. The words “Operation Ghost Dance: Background” monopolized a wall-sized flat-screen TV.

      Over an intercom, a dry and disembodied voice recounted the relevant facts. “On 15 September 2008, the U.S. Department of the Treasury suffered a significant information system breach. Sensitive data was compromised, much of it relating to the evolving global financial crisis.”

      The screen displayed side-by-side mug shots of a man and a woman – our heroes-to-be, John and Jane Doe.

      “Subsequent investigation back-traced the perpetrator across the web with inconclusive results. However, further data analysis and mapping revealed a disturbing fact: two contract employees of two separate tier-one agencies –“

      Here a house flashed on the screen – a two-story 1930’s traditional in an affluent New York City bedroom community, say Scarsdale or New Rochelle. White clapboard siding and black shutters. Nice landscaping.

      “—lived at the physical address associated with one of the so-called ‘bounce points’ or intermediate computers implicated in the breach. Expedited inquiry confirmed intelligence community security guidelines were violated as follows--”

      The screen filled with the words “Personal Conduct – Failure to Disclose.”

      “Both employees failed to disclose the potentially compromising nature of their relationship, which could be expected to have consequences for sensitive compartmented information. While their marriage of approximately six years duration was known –“

      Close-up of wedding photo. A tuxedoed John and a radiant white-gowned Jane locked in a passionate post-ceremony embrace.

      “—neither agency was properly briefed as to spousal vocation, raising fundamental questions of judgment, lack of candor, reliability, and trust.”

      The screen filled with the words “Psychological Considerations – Failure to Report.”

      “Both employees failed to report that they entered marital counseling a brief time ago, nor did they seek the services of agency-certified therapists as required.”

      The words “Financial Considerations – Debt-to-Income Ratio” took center screen.

      “Both employees moved from direct tier-one employment to contract status circa 2005, possibly lured by the prospect of higher private sector earnings. In 2007, the Continuous Competitiveness model implemented by the Department of Homeland Security reduced net income service-wide.”

      The screen now showed a graph with a green income line trending down and an orange debt line trending up, with a red arrow measuring the 125% gap in between.

      “Apparently, the couple failed to adjust in a timely manner. When these issues came to light, their debt-to-income ratio exceeded agency standards by a considerable margin.

      The screen flipped again, displaying the words “Handling Protected Information – Risk Management Violations.”

      “Though all branches of the U.S. Intelligence community have a common mission and set of interests, segmentation of information is an accepted operational necessity. The potential for breach of client confidentiality, negligent disclosure of proprietary knowledge, or other unauthorized release of sensitive protected information is greatly magnified by personal relationships.”

      A photo from Pearl Harbor, with battleship sinking amid smoke and flames, fleetingly illustrated the moderator’s point.

      “Basic risk assessment and management practices required that both employees notify supervisors of close daily contact with intelligence agents responsible to another chain of command. This did not occur.”

      The words “Information Technology Systems – Illegal or Unauthorized Use” appeared. The moderator took a sip of water, which went down the wrong way. He coughed. His bored audience shifted impatiently. He went on.

      “Illegal or unauthorized entry into any information technology system; illegal or unauthorized modification, destruction, manipulation, or denial of access to information, software, firmware, or hardware in an information technology system; downloading, storing, or transmitting information on or to any unauthorized software, hardware, or information technology system is strictly prohibited.”

      The accompanying cartoon of a spy in a fake Groucho Marx nose, kneeling beside a filing cabinet and transferring files marked ‘TOP SECRET’ and ‘CONFIDENTIAL’ into a briefcase, seemed to aggravate the audience even further. There were vague mutterings. The moderator pressed doggedly forward.

      “Data accessed in the 15 September Treasury breach was routed through a device physically located in the couple’s residence. No satisfactory explanation for this eventuality has emerged nor has the couple volunteered exculpatory information.”

      The screen filled with one very large word: “COMPLICATIONS.” The mutterings ceased. The moderator cleared his throat.

      “Network forensics tie the 15 September breach to prior and subsequent incursions of equal or greater sensitivity at the Departments of Defense and State, SWIFT interbank transfer system, and the World Bank. The potential for harm to national security, key allies, and global stability cannot be overstated.”

      Another split-screen now displayed John and Jane in full battle rattle in separate combat situations.

      “Employees are National Clandestine Service Paramilitary Operations Officers – Delta Force and Special Activities Division.”

      A new electricity filled the air. Several of the bigwigs sat forward in their seats. The word “TIMELINE” flashed up, and as the moderator spoke, a series of dates appeared.

      “On 25 September a Joint DIA/CIA task force was formed: Operation Ghost Dance. As of 28 September, Test One commenced. Blanket surveillance was initiated and empl
    oyees (hereafter ‘targets’) were separately assigned the same mission –

      Briefly, a wanted poster displayed, the picture of a wide-eyed and wooly-headed young man with a bulls-eye superimposed over his guileless face.

      “—a decoy assassination. Both failed, a notable anomaly given their combined career kill rates of above 97.5%. Both claimed failure was due to ‘circumstances beyond their control.’ On 30 September, Test Two commenced. Targets were assigned to assassinate each other. It was expected they would a) confess or b) flee. The assignment deadline passed without result—“

      The screen exhibited a picture of John and Jane’s lovely house engulfed in flames and surrounded by a SWAT team.

      “—at which point a SWAT team was dispatched to the targets’ place of residence with orders to apprehend and detain. Targets resisted with deadly force. Residence caught fire, several assets were liquidated, and targets fled in a neighbor’s minivan.”

      Photo of a minivan pursued by multiple cars and SUVs, guns blazing in both directions. Background collisions and rollovers of both civilian and pursuit vehicles added to the sense of mayhem.

      “A high-speed chase ensued, during which several agency vehicles were totaled and several more assets liquidated.”

      Photo of a convention center advertising a Home and Garden Expo. It was night, the parking lot deserted.

      “Targets were eventually cornered after hours at a Home and Garden Show.”

      Photo of absolute carnage. A convention center packed with vendor booths dedicated to fencing, siding, flooring, kitchen and bath products, home furnishings, lawn care, and DIY projects riddled with bullet holes and festooned with lifeless bodies.

      “A gun battle resulted in the loss of an additional sixteen assets, giving us a final score of: targets - two dozen dead, home team - zero. And the targets escaped.


    Prev Next
Online Read Free Novel Copyright 2016 - 2025