Get PJ Media on your Apple

Unexamined Premises

Devlin’s Revenge

June 7th, 2013 - 10:40 am
YouTube Preview Image

Why is anyone surprised by the NSA’s data-mining program? I’ve been writing about it for several years now, in my trio of “Devlin” novels: Hostile IntentEarly Warning, and Shock Warning, which have just been picked up for e-book publication in the UK, I’m pleased to report. The books have found their audience, especially among members of the military and the intelligence community, in part thanks to my main character — a cipher working for the secretive branch of the NSA called the Central Security Service and known only by his code name, “Devlin,” who gets called into action in the most dire of circumstances — and in part because they accurately reflect the strange and lonely wilderness of mirrors in which people like Devlin live and operate.

My goal has been to illustrate and dramatize in fictional form various nightmare scenarios that keep our counter-terrorism officials awake at night. In the first book, Hostile Intent, it was a Beslan-style attack on a school in the Midwest, followed by an abortive attempt to launch an EMP device on both coasts; luckily, our man Devlin foiled both plots. Here’s a bit on the CSS and what it does:

“Under the authority of National Security Decision Memorandum 5100.20, signed by President Nixon on 23 December, 1971, and amended by President G. H. W. Bush on June 24, 1991,” said Gen. Seelye, “the Sec Def and I believe that you should provisionally authorize a Central Security Service operation to terminate the ongoing incident in Edwardsville.”

“Terminate, how, General?”

“With extreme, exemplary prejudice, sir,” replied Seelye.

President Tyler vaguely remembered the CSS, a special division of the National Security Agency that not one American in a million had even heard of, much less understood its function.  The CSS had been created originally under the Nixon Administration as the “fourth branch” of the armed services, to complement the Army, the Air Force and the Navy/Marines in the burgeoning field of electronic intelligence and combat.  But the traditional-minded put up the predictable bureaucratic fuss, and the CSS was quietly folded in the NSA, authorized to work with each of the individual service branches in capturing and decoding enemy SIGINT. So when, for example, a Navy submarine tapped an undersea Soviet communications cable, or one of the Air Force’s many electronic surveillance overflights picked up hostile transmissions, they were relayed to the CSS for evaluation and, if necessary, action.

But the CSS chafed at being a bystander and, using the “No Such Agency” cloak of anonymity, quickly moved into the void, coordinating covert strikes on Soviet assets with the utmost plausible deniability — “accidents” were amazingly common — and establishing its own presence as a service to be reckoned with.  Still, resistance from the uniformed services, kept it in the shadows of its birth, where it lurked now — the incognito, but highly effective, muscle arm of the NSA.

4-hostile-intent

In the second book, Early Warning, there’s a rip-roaring terrorist assault on Times Square patterned after the real world Bombay attacks of 2008 — and which I wrote well before the actual Times Square bombing attempt; it’s not easy staying ahead of the curve — all part of the triology’s meta-plot involving a shadowy Hungarian-born billionaire named Emanuel Skorzeny with a pronounced animus against the West. (Any resemblance to any person, living or dead, is entirely coincidental.) With the entire island sealed off, Devlin infiltrates Manhattan via a disused Hudson River tunnel, teams up with members of the NYPD’s counter-terrorism unit, and sorts out the bad guys.

Comments are closed.