“What about electronic intercepts? Phones, emails, digital stuff?”
“That’s where it gets tricky. Electronic surveillance tech has come a long way. Standard encryption won’t cut it against what they’re throwing at us.”
“What will?”
“I can check out their specific capabilities and develop targeted responses. My background makes me the right guy to assess electronic threats.”
His background. Pavel keeps dropping hints about specialized knowledge without explaining how he learned to beat federal intelligence operations.
“I know how these agencies work, what they can do, and how to shut them down.”
I walk to the window and look down at the street. Three vehicles are parked in perfect positions to watch my building’s entrances. None of them were there yesterday.
“How many teams do you think we’re dealing with?”
“Six minimum, maybe twelve, depending on their setup. They’re rotating people to stay invisible, but the equipment gives them away.”
“Federal agents?”
“Or contractors working for federal agencies. For our purposes, who they are doesn’t matter.”
Pavel joins me at the window and points at a white van across the street. “Long-range audio. Probably picks up conversations through these windows. The sedan next to it has camera gear that documents everyone who comes and goes.”
“Motherfuckers.”
“They’re good, but not invisible. I can get detailed intel on their capabilities.”
“How?”
“Personal recon. I’ll check out their positions, test their awareness, and figure out what equipment they’re running.”
“Sounds risky.”
“Less risky than operating blind. If they spot me, they’ll think I’m just another contractor doing routine security checks.”
“And if they figure out that you’re more than a contractor?”
“They won’t. I know how to blend in.”
Pavel’s confidence bugs me more than his expertise. He talks about surveilling federal agents like this is a standard consulting service, not something that could get him arrested or killed.
“When would you do this recon?”
“Tonight. Surveillance teams work differently after hours, and I can move around without attracting attention.”
“What kind of intel do you expect to get?”
He shrugs and replies, “Everything we need to design effective countermeasures.”
I pour another glass and consider his proposal. Pavel’s eagerness to investigate federal surveillance seems off for a security consultant, but his expertise has been solid. If government agents are building a case against my organization, I need to know what they’re capable of.
“Do it. But I want regular check-ins during your little spy mission.”
“Secure comms only. Regular phones and devices are compromised.” Pavel opens his briefcase and pulls out two devices that look like souped-up radios. “Military-grade encrypted communication. Frequency-hopping tech prevents intercepts.”
Again with the specialized equipment ready to go. Either Pavel keeps an impressive inventory of spy gear, or he’s got access to resources most contractors don’t.
“You just carry military communication gear in your consulting kit?”