Scorpion's Vengeance, 'Back on the Case'

Updated on December 29, 2018
lawrence01 profile image

Action adventure stories are my favourite, I love reading them, and recently I discovered I love writing them!

Searching for it?

The team are back to searching for the mole.
The team are back to searching for the mole. | Source

From the Author

Well, Christmas is over, and the new year is almost upon us, I was hoping to have the story totally finished by now, but although I'm almost there, we didn't quite make the 'finishing line' in the time frame I thought I would.

Still, I'm not discouraged as the story has come a long way, and unlike the first two where I had the rough draft worked out in my head before writing began, this one I've more or less come up with as the story unfolded here, and that's growth to be proud of!

The Story so far

'Scorpion 1' is a special elite team made up of ex SAS special forces soldiers and an MI6 operative who've worked together for three missions so far.

Mission 1, "Sting of the Scorpion" the first was a daring 'do or die' rescue mission inside Iran where they had to rescue another MI6 operative who had vital information on the workings of the world's drug lords, they could not let the information fall into the wrong hands.

Mission 2 "Scorpion's Reach" was what happened when the team was 'stood down' to recuperate from wounds and the need to let things 'cool down' after the chaos they caused in Iran, while on holiday in New Zealand two of the members (Joey and Sandy) are in the wrong place at the right time, they stumble across an 'accident' that isn't. That leads them back into the web of deceit and corruption of the Drug dealers, they also find out that MI6 has been betrayed by 'one of their own'

Mission 3, "Scorpion's Vengeance" MI6 has a mole and Scorpion Team has an account to settle with that mole, they were 'sold down the river' by the mole, and they're back hunting the person down.

The Drug dealers haven't been taking this 'lying down' and want the money that MI6 has stolen from them back, they'll do anything to get the money back, including bringing the British government to its knees if they have to, and anyone in the way is in their 'crosshairs'

That's just a recap of the stories so far, there are hubs here for those who haven't come across the stories, and fuller versions of two of the books are on Amazon, (third to follow as soon as I finish and edit) but as it's been a few weeks since I posted an episode I thought I'd put out a quick recap.

When we left the story, two cops investigating two separate incidents had just compared notes and realised that their two things were linked, which explained why both of them were being slowly 'shut down'.

But someone else doesn't want them stopped!

Read on, and let's see where things go.

Piece by piece

Piece by piece, but are some still missing?
Piece by piece, but are some still missing? | Source

"Who did this?"

Serkov's office was at the back of one of his nightclubs, he had three of them in London, all set up the same way, identical ‘offices’ in each one.

They had the latest gadgets in them, but all hidden away behind facades that looked like they came straight out of the Hermitage in his hometown, St Petersburg.

The clubs were the ‘in place’ in London, anyone wanting to be ‘seen’ went there, especially, Alex’s place as it was called in Knightsbridge, but that one was for ‘A’ listers only.

But they were only a front for where his real money was made, a way of ‘greasing the wheels’ to get things done, and moving ‘product’ without too many questions, after all, the ‘A’ list wasn’t just movie stars.

He’d accessed the security feed from Sasha’s building, saw the footage and cussed.

“Show me face” he screamed at the monitor as it showed the abduction for the fifth time, he was going through it almost frame by frame, and getting nothing. Not even the ‘doctor’ was turning to the camera, it was as if they knew they were being filmed, the movements seemed natural, but if they were, then he should have had a picture from at least one he could check against his facial recognition software, but nothing, he threw the pencil he’d been holding at the monitor screen, shoved his chair back forcibly and stood up. Ten paces and he wrenched open the ornate Oak door, it flew back hitting the stopper with a thud.

“SERGEI” he bellowed into the next room, the unfortunate man he was shouting to was nearly deafened as he was only five steps away, “Have you found anything yet?” It was more a command than a question.

“Niet” the unfortunate replied in Russian, “I been in contact with all our people going to Hospitals, none find anything” he was nervous, Alexei wasn’t the kind of boss you wanted to annoy, even if it wasn’t your fault.

“Agh” Serkov wheeled round, grabbing the door handle he slammed it shut so hard that the doorframe shook, he went back to the desk and slumped back down into the chair.

There was a half-full bottle of Russian Vodka on the desk, as the owner, he didn’t need to hide it, he was tempted, but today he needed a clear head, something was going down, he just didn’t know what?

‘Rule nothing out’ he remembered that from his days with the FSB or the ‘renamed’ KGB from the old days of the Soviet Union. it's the first thing they teach, ‘when the crap happens, rule nothing out, and eliminate the possibilities starting with the easiest’


Honey-traps and the 'A' list

He’d sent men to every hospital in London, they had security guards there, but they ‘don’t get paid enough’ to tangle with Serkov’s thugs, as long as his men weren’t causing trouble, they were left alone, but none had found Gromatski, and that was worrying.

“Who gains from this?” was the next question.

Gromatski had been kidnapped, that he was sure of, the question was why? and who gained by it. Every name he thought up just didn't make sense, they all had too much to lose, it just didn’t make any sense.

“If I find the bastard,” he said to himself, “I kill them” he sat back in his office chair. He stopped to think things through. Too many things had gone wrong, first, the money going missing from accounts, bosses wanting answers and getting nowhere. Then an old ‘friend’ as he liked to think of them, caught years ago by the FSB in a ‘honey trap’ finally decided to earn his keep and came through with information, but this time “for a price”.

The ‘honey trap’ is one of the oldest and most effective ways spies, and criminals use, but for Serkov, it wasn’t about money, sure they’d made billions, but for them, it was about control! Controlling the supply often meant you needed to control those trying to hinder the supply, paying off those you needed to, and using ‘other means’ was the way to go about it. The ‘honey trap’ is one very effective way, all you need is a girl willing to sell her soul and a camera, and often the girl doesn’t have to be a willing partner, one trapped in poverty lured by the promise of bright lights and freedom in the West is enough.

That was the promise, the reality was little more than slavery, and he was good at that business.

The girls were attractive, that meant men would pay for a night with them. Some, those not rich or powerful got an hour or so, but those with influence, they got what they wanted, and he got photos or recordings ‘for future use’ and it was amazing how compliant people became when it became known you had these things, those who didn’t, well that’s where Gromatski came in, and he was good.

That was the issue, Gromatski knew too much! He knew who was on the ‘payroll’ and who knew to turn a blind eye. Whoever took him could cripple Serkov’s operation overnight, he had to be found, and fast!


This one brought down a government (London 1963)

See the rest of the story.

'Package delivered'

“Package delivered” Jacko’s voice came over the phone, “we’re on our way back”.

“Cheers for that” Sandy responded back, they were trying to make things sound more conversational, more like what friends would sound like than what they really were, “when you get back I should have some updates for you” she clicked the phone off.

Joey was in the other room making a cup of tea, “Mum’s cure for all ills” he’d told Sandy a couple of times already, and that was just that day, she could tell he was stressed, but trying not to show it, they all were, but they weren’t the kind to buckle under pressure, “When the going gets tough” she’d heard him say, “the tough get going” was a creed they all lived by.

“Here you are” he brought a steaming mug of tea in, “Milk, no sugar” he assured her, “though without the sweet stuff, it tastes horrible!” he wrinkled his nose slightly.

“Thank you” she replied with a smile, “But I’m sweet enough” he didn’t dare argue with that comment, it just wasn’t safe.

“Whatcha got?” he asked looking at the phone she had in front of her, it was connected to one of her devices, one he had only the vaguest idea what it did.

“I’m cloning the phone first” she replied matter of factly, “ that way even if we screw things up, we’ve got a backup with all the settings in place, and I can play with the clone first, just in case there’s encryption software on there.”

“How long ya reckon?” Joey asked as he put the tea down in front of her, he headed back to the kitchen, a few seconds later he reappeared with a plate of chocolate biscuits.

“About ten minutes” she replied, “that’s if we’ve got everything right.”

Cloning the phone only took a couple of minutes, setting everything else up took the rest of the time. She’d used the laptop to run the cloning programme, as soon as it was finished she disconnected the original phone, turned it off and put into a Ziploc bag.


A 'Slave device'

The laptop had software to override Gromatski’s device, effectively turning it into a ‘slave’ that would do anything it was ordered to, the software told the phone to copy all its files onto the hard drive of the new device, and it gave access to all the passwords, nothing was secure.

“Is it password protected?” Joey stared at the screen as Sandy worked.

“With this software” she tapped the laptop, “It won’t matter, we go round the passwords, not through them” she clicked the mouse, a fresh screen came up, the message on the screen said that ‘Poseidon’ the decryption software was ready to run.

Sandy hit a few keys, it didn’t matter which one she hit, the password was already programmed in, she just ‘executed’ the command to open the files. Within seconds the computer had dismantled the security software of the phone, they were ready to begin

“How long is this going to take?” Joey asked, he sat down beside her and looked at the screen, he was genuinely interested in learning the process, but couldn’t help a mischievous dig at her.

“Patience is a virtue you know!” Sandy replied back smiling, “it’ll take as long as it takes” she tapped a few more keys, “we won’t get the phone conversations, but we’ll have a good idea who called, and hopefully by matching it to the contact list in the phone we’ll get some idea of who was talking to whom, as for the rest, we can give them to Sir Mike to make a decision on whether he wants to listen in to their conversations”

One thing that the phone companies never tell their clients is that every phone conversation is actually recorded! It’s usually deleted within a few hours of the recording taking place, but for an experienced operator, it’s very easy to get them back from the servers they were recorded on.

Every conversation is recorded by the servers the company uses, and not just one, but every server in the chain the conversation goes along gets a full copy, that means the server that the first phone connects to, then the servers at each junction on the way (the exchange, then the relay stations, then the satellites and finally the server of the phone receiving the call, and finally the destination phone itself). When the servers get full, all that happens is an electronic marker that ‘tells’ the server where the conversation is gets removed so that the space can be used to record a fresh conversation, but the first one is still there, and all it takes is someone with the right equipment to go looking for it, and it will be found, the question is always time, who has the time to go sifting through all the data necessary?

Normally that’s where GCHQ in Britain would come in, or the NSA in the United States, their computers can sort through the information they need to within seconds, and they do it on a regular basis looking for terrorists.

Sandy had a list of phone numbers, some of whom she knew who they were, others she didn’t, they got the priority.


"How's your Russian?"

It took a while, but things started to come together. Serkhov’s number was the one called the most, there were a few calls from Sasha, all to be expected, but there were a few weren’t in the contact lists.

“Burners?” Joey pointed at the list she’d made, the ones they couldn't identify.

“Maybe” she replied, “I should still be able to get a location though, getting the record of the conversation might take a while, and tip our ‘friend’ off, but we can if we need to”

“If there's a chance of tipping that swine off” Joey almost spat the words out, “then don’t go there”

“No intention of” Sandy replied defensively frustrated that it seemed Joey thought she would, “I just meant it's there as an option if we need it”

“Duly noted” Joey was seemingly oblivious to her frustration, she was about to say something when a light started flashing in the screen, it was an alarm wired to the house security system.

“Someone just opened the front gate” she said as she tapped the keyboard, the screen came alive with the view from one of the outside cameras, Joey reached for the Browning in his shoulder holster, checking that the safety was in he cocked the weapon and went towards the front door, he propped himself up, back against the wall, both hands gripping the gun.

“It’s okay” Sandy didn't shout, but was loud enough for Joey to hear in the lobby, “It's Jacko and Mac” he relaxed slightly, but not much, they still didn't want to give anything away, especially not how many they were at the house, he waited for one of them to open the door.

It was Jacko came through the door first, he didn’t even glance in Joey’s direction. He went straight in, Mac was right behind him, he took one last look down the street, then closed the door. Making sure the door was closed he turned to Joey, “Ya can stand down now”

“What have we got?” Jacko fired the question off in Sandy’s general direction. He headed for the kitchen knowing that like all good soldiers Joey would have a kettle boiling, he wasn’t disappointed.

The kettle was just over half full, and still hot from the drinks Joey had made, he reached into the cupboard above the bench the kettle was on, took out two cups, plopped two teabags from the jar next to the kettle into them, two sugars in each cup, a splash of milk, then add the water and they had ‘NATO standard’ as soldiers liked to call a steaming cup of hot sweet tea.

“How's your Russian?” Sandy asked with a smile on her face, she knew full well none of them spoke it. She swivelled the computer screen so that they could see what was there, “I'm into Gromatski’s texts, this one was from a number I've traced to Serkov, and before you ask” she saw he was about to ask something, she would lay money on knowing the question, “it's got Cyrillic script, from a Russian, doesn't take a rocket scientist to figure out its in Russian, that and I used Google translate!”

They all chuckled, “you DID ask!” Sandy was laughing, “It just seemed the obvious thing to try, not perfect, but good enough”

“What's that?” Jacko pointed to a piece of text on the screen, it looked strange, it had numbers in the midst, “looks like an”

“An address” Sandy replied, “and if he wasn’t on his way to some unpleasant place, it would sign his death warrant, its the address we picked the hacker up from.”

“And you say,” Mac asked, “this text came from Serkov?”

“Along with the time we said we'd be picking him up, ” she replied, “they were expecting a soft target, you should see the texts after, he may work for Serkov, but he ‘lets fly’ with his opinion” she turned back to the screen, “by the way, heard from Smithy at the O.P?”

An ‘O.P.’ is a military term for an observation post, a concealed hiding place snipers use to watch the enemy and report back what's going on. Smithy had insisted they needed to set one up across from Serkov's nightclub, “sound tactical move” he'd said, no one had argued. “He took the nifty fifty that Joey commandeered from the idiot lookout” Mac went on, “Just in case something happens”

Right at that moment, their phones buzzed, a message was coming in, it was from Smithy, it simply said, “Serkov on the move, am following” Jacko looked up at Mac, “Time to roll,” he turned to Sandy and carried on, “send us what we need, the rest, you know what to do with.”


That's all for now folks

Sorry folks, but we have to stop there for now. I know, it was just getting interesting! we'll I'll see if I can put the next episode out fairly soon, we are getting near to the end, but there are a few twists along the way.

Bye for now, and Happy New Year to all

Lawrence

Questions & Answers

    Comments

      0 of 8192 characters used
      Post Comment
      • lawrence01 profile imageAUTHOR

        Lawrence Hebb 

        5 months ago from Hamilton, New Zealand

        Eric

        Joey was just being careful. All i can say is if you know anyone at Netflix get them to give ne a call!

        Glad you enjoyed it.

        Happy new year

        Lawrence

      • Ericdierker profile image

        Eric Dierker 

        5 months ago from Spring Valley, CA. U.S.A.

        Sandy and Joey -- what a pair. You make them so real. "nifty fifty" I like it. I liked the scene of Jacko and Mac coming through the gate and door. I can't visualize the Browning though.

        Yes this is a TV series in my head. A whole week until the next episode? Get this on Netflix so I can binge watch.

      • lawrence01 profile imageAUTHOR

        Lawrence Hebb 

        5 months ago from Hamilton, New Zealand

        Bill

        Thank you for the compliments, to be honest, I have no idea how to do it, or even if I get it right, I just know that I can only write in 'short spurts' so whatever I'm writing about I have to finish or I'll forget what it was I was writing about.

        Does that make sense? Maybe you can use it as a question on one of your mailbags.

        Blessings for the year to you and Bev.

        Lawrence

      • lawrence01 profile imageAUTHOR

        Lawrence Hebb 

        5 months ago from Hamilton, New Zealand

        Bill

        I wish it was the only one I missed! Still, I'm happy with the overall result.

        Blessings to you and your family.

        Lawrence

      • billybuc profile image

        Bill Holland 

        5 months ago from Olympia, WA

        Do you know how many writers will never have your ability to pace a story and keep it moving smoothly? You can't teach that to someone; only gifted writers can do it.

        Happy New Year, my friend!

      • lifegate profile image

        William Kovacic 

        5 months ago from Pleasant Gap, PA

        Happy New Year, my friend! If that's the only deadline you missed, Lawrence, you did quite well. Pinpoint was supposed to be done in October, and I'm only halfway there with the new year approaching. wishing you the best in the coming year!

      working

      This website uses cookies

      As a user in the EEA, your approval is needed on a few things. To provide a better website experience, letterpile.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

      For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://letterpile.com/privacy-policy#gdpr

      Show Details
      Necessary
      HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
      LoginThis is necessary to sign in to the HubPages Service.
      Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
      AkismetThis is used to detect comment spam. (Privacy Policy)
      HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
      HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
      Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
      CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
      Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
      Features
      Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
      Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
      Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
      Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
      Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
      VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
      PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
      Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
      MavenThis supports the Maven widget and search functionality. (Privacy Policy)
      Marketing
      Google AdSenseThis is an ad network. (Privacy Policy)
      Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
      Index ExchangeThis is an ad network. (Privacy Policy)
      SovrnThis is an ad network. (Privacy Policy)
      Facebook AdsThis is an ad network. (Privacy Policy)
      Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
      AppNexusThis is an ad network. (Privacy Policy)
      OpenxThis is an ad network. (Privacy Policy)
      Rubicon ProjectThis is an ad network. (Privacy Policy)
      TripleLiftThis is an ad network. (Privacy Policy)
      Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
      Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
      Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
      Statistics
      Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
      ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
      Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
      ClickscoThis is a data management platform studying reader behavior (Privacy Policy)