Get PJ Media on your Apple

Unexamined Premises

Devlin’s Revenge

June 7th, 2013 - 10:40 am
YouTube Preview Image

Why is anyone surprised by the NSA’s data-mining program? I’ve been writing about it for several years now, in my trio of “Devlin” novels: Hostile IntentEarly Warning, and Shock Warning, which have just been picked up for e-book publication in the UK, I’m pleased to report. The books have found their audience, especially among members of the military and the intelligence community, in part thanks to my main character — a cipher working for the secretive branch of the NSA called the Central Security Service and known only by his code name, “Devlin,” who gets called into action in the most dire of circumstances — and in part because they accurately reflect the strange and lonely wilderness of mirrors in which people like Devlin live and operate.

My goal has been to illustrate and dramatize in fictional form various nightmare scenarios that keep our counter-terrorism officials awake at night. In the first book, Hostile Intent, it was a Beslan-style attack on a school in the Midwest, followed by an abortive attempt to launch an EMP device on both coasts; luckily, our man Devlin foiled both plots. Here’s a bit on the CSS and what it does:

“Under the authority of National Security Decision Memorandum 5100.20, signed by President Nixon on 23 December, 1971, and amended by President G. H. W. Bush on June 24, 1991,” said Gen. Seelye, “the Sec Def and I believe that you should provisionally authorize a Central Security Service operation to terminate the ongoing incident in Edwardsville.”

“Terminate, how, General?”

“With extreme, exemplary prejudice, sir,” replied Seelye.

President Tyler vaguely remembered the CSS, a special division of the National Security Agency that not one American in a million had even heard of, much less understood its function.  The CSS had been created originally under the Nixon Administration as the “fourth branch” of the armed services, to complement the Army, the Air Force and the Navy/Marines in the burgeoning field of electronic intelligence and combat.  But the traditional-minded put up the predictable bureaucratic fuss, and the CSS was quietly folded in the NSA, authorized to work with each of the individual service branches in capturing and decoding enemy SIGINT. So when, for example, a Navy submarine tapped an undersea Soviet communications cable, or one of the Air Force’s many electronic surveillance overflights picked up hostile transmissions, they were relayed to the CSS for evaluation and, if necessary, action.

But the CSS chafed at being a bystander and, using the “No Such Agency” cloak of anonymity, quickly moved into the void, coordinating covert strikes on Soviet assets with the utmost plausible deniability — “accidents” were amazingly common — and establishing its own presence as a service to be reckoned with.  Still, resistance from the uniformed services, kept it in the shadows of its birth, where it lurked now — the incognito, but highly effective, muscle arm of the NSA.

4-hostile-intent

In the second book, Early Warning, there’s a rip-roaring terrorist assault on Times Square patterned after the real world Bombay attacks of 2008 — and which I wrote well before the actual Times Square bombing attempt; it’s not easy staying ahead of the curve — all part of the triology’s meta-plot involving a shadowy Hungarian-born billionaire named Emanuel Skorzeny with a pronounced animus against the West. (Any resemblance to any person, living or dead, is entirely coincidental.) With the entire island sealed off, Devlin infiltrates Manhattan via a disused Hudson River tunnel, teams up with members of the NYPD’s counter-terrorism unit, and sorts out the bad guys.

Comments are closed.

All Comments   (6)
All Comments   (6)
Sort: Newest Oldest Top Rated
Who will investigate the government leaks to David Axelrod’s pals at the Chicago Tribune?

http://illinoispaytoplay.com/2013/06/08/who-will-investigate-the-government-leaks-to-david-axelrods-pals-at-the-chicago-tribune/
44 weeks ago
44 weeks ago Link To Comment
Great timing for your infomercial!
44 weeks ago
44 weeks ago Link To Comment
See also Brad Thor's "Blacklist" which although like Mr. Walsh's works fictional is based on fact, describes the NSA as having the capability of recording every telephone conversation and e-mail in the US. Data mining with power tools.
44 weeks ago
44 weeks ago Link To Comment
IF the ultimate goal of the powers to be is total control, then it is a short leap to do so, as long as corporate powers cooperate, one way or another. And between keeping them in your pocket, plus various threats it is pretty much a done deal.

A police stay is on its way and this is where all the NSA intrusion is heading - http://adinakutnicki.com/2013/06/07/america-police-state-in-the-making-the-muzzling-of-citizen-journalistsbloggers-nsa-spying-on-millions-too-what-say-you-commentary-by-adina-kutnicki/

Americans are in for a whirlwind of pain. Obama Inc is a danger to the entire west.

Adina Kutnicki, Israel http://adinakutnicki.com/about/
44 weeks ago
44 weeks ago Link To Comment
Apparently the head of Google aided the Obama campaign in data mining. He and the group formed still function and still help the Dems.
45 weeks ago
45 weeks ago Link To Comment
It's probably a good idea to keep in mind the very sophisticated datamining operation ran by the Obama campaign that allowed them to delivery personalized phone calls to low information voters - he won an election that by all historic standards should have been a bloodbath.
45 weeks ago
45 weeks ago Link To Comment
View All