
Assassin’s Revenge–A David Slaton Novel
Chapter 27: Twenty-Seven
by Larsen, WardThe chapter opens with Slaton, a Mossad operative, and Mordechai, an IAEA official, dining together after a series of harrowing events. Slaton, still reeling from attempted assassinations and interrogations, barely notices his meal, while Mordechai eats voraciously. Their conversation quickly turns to Mordechai’s suspicions about El-Masri, a colleague at the IAEA, whom he believes is involved in illicit activities. Mordechai reveals he attempted to hack El-Masri’s secure laptop using a known vulnerability but failed, potentially alerting El-Masri to the breach. This failure may have triggered the recent attacks on Slaton and Mordechai.
Mordechai explains that El-Masri’s laptop had an additional firewall, thwarting his efforts. Worse, Mordechai suspects El-Masri retaliated by hacking his own computer, intercepting a message Mordechai had sent to Slaton for help. The altered message lured Slaton into a trap, suggesting El-Masri or his allies knew intimate details about Slaton’s past and family. Slaton questions how El-Masri could have uncovered such classified information, leading both men to speculate about possible collaborators, ranging from state intelligence services to terrorist groups.
The discussion shifts to El-Masri’s current whereabouts—Pakistan’s PARR-II reactor, where he is overseeing the extraction of highly enriched uranium (HEU). Mordechai explains that Pakistan’s nuclear weapons facilities are off-limits to IAEA oversight, but PARR-II is monitored as a research reactor. Slaton deduces that El-Masri’s trip aligns with his suspected pattern of diverting nuclear materials. Mordechai estimates El-Masri will return to Vienna soon, setting the stage for a potential confrontation.
As the chapter concludes, Mordechai proposes teaming up with Slaton to investigate El-Masri further. Slaton, initially reluctant, weighs the pros and cons of collaboration. While working alone offers greater control, partnering with Mordechai could provide valuable resources. The chapter ends on a suspenseful note, with Slaton sipping his coffee, leaving his decision unresolved but hinting at a possible alliance to uncover El-Masri’s schemes.
FAQs
1. What was Mordechai’s initial suspicion about El-Masri, and what steps did he take to investigate further?
Answer:
Mordechai suspected El-Masri of wrongdoing but lacked concrete evidence. During an audit, he found circumstantial evidence that raised his suspicions. To gather more definitive proof, he decided to hack into El-Masri’s secured work computer, exploiting a known weakness in the IAEA’s internal encryption software that he was aware of due to his oversight role in information security. However, his attempt was thwarted by a secondary firewall on El-Masri’s device, potentially alerting El-Masri to the breach attempt. This risky move may have escalated the situation, leading to the subsequent events.2. How does the chapter illustrate the tension between Slaton and Mordechai’s current predicament and their mundane surroundings?
Answer:
The chapter juxtaposes the life-threatening dangers Slaton has recently faced—assassination attempts, abduction, and interrogation—with the ordinary setting of a restaurant where he and Mordechai dine. While Slaton is too preoccupied with his unsettled life to enjoy the meal, Mordechai eats heartily, indifferent to the culinary experience. This contrast highlights how their extreme circumstances render them disconnected from normalcy. The roast lamb and gnocchi become trivial compared to their urgent discussion about El-Masri’s potential betrayal and the looming threat, emphasizing the dissonance between their reality and the peaceful restaurant ambiance.3. What possible explanations does Slaton consider for how El-Masri (or his associates) might have uncovered his identity and family details?
Answer:
Slaton theorizes that El-Masri, upon detecting Mordechai’s hacking attempt, may have reversed the breach to access Mordechai’s communications. Since Mordechai had tried to contact Slaton for help, El-Masri could have intercepted the message. However, Slaton questions how El-Masri would have known his Mossad background, specialty, and family details, suggesting El-Masri likely had help from a knowledgeable group—possibly a state intelligence service (like Egypt’s Mukhabarat), a terrorist organization, or another hostile entity. The mention of “Polaris Venture” in Mordechai’s message might have also triggered further investigation by El-Masri’s allies.4. Why is El-Masri’s current location significant, and what does it imply about his potential activities?
Answer:
El-Masri is in Pakistan, overseeing a HEU (highly enriched uranium) extraction at the PARR-II research reactor. This is significant because it mirrors previous operations where nuclear material was diverted under the guise of legitimate IAEA oversight. Slaton immediately connects this to another possible theft scheme, suggesting El-Masri could be repeating the same illicit activity—stealing weapons-grade material during the downblending process. The fact that Pakistan restricts access to its weapons facilities but allows IAEA monitoring of PARR-II makes it an ideal target for such an operation, heightening suspicions about El-Masri’s intentions.5. How does Slaton weigh the pros and cons of partnering with Mordechai, and what does this reveal about his operational mindset?
Answer:
Slaton prefers working alone but considers collaborating with Mordechai due to the latter’s insider knowledge and research capabilities. He recognizes the benefits of shared intelligence but also acknowledges the risks: increased security vulnerabilities and the need to trust Mordechai. This deliberation reveals Slaton’s pragmatic and cautious approach—he values efficiency and resources but prioritizes operational security. His hesitation reflects his experience as a former Mossad operative, where trust is earned, and partnerships are carefully evaluated for potential compromises. The chapter ends on this unresolved note, leaving his decision pending.
Quotes
1. “Any appreciation for the tastes or textures of the meal was lost on Slaton—and so it would remain until his life was righted.”
This opening line sets the tone for the chapter, illustrating Slaton’s state of mind after surviving assassination attempts and interrogations. It underscores how trauma overshadows even basic human experiences like eating.
2. “I suppose you could say I repeated my previous great mistake—I hacked into El-Masri’s work computer.”
Mordechai’s admission reveals his desperation to uncover evidence against El-Masri, while also showing his recurring pattern of risky behavior. This action sets in motion the chapter’s central conflict about compromised cybersecurity and its consequences.
3. “If El-Masri really is stealing weapons-grade material, he’s not doing it alone… It could be anybody from a state intelligence service to a terror group.”
This quote captures the chapter’s pivotal turning point where Slaton and Mordechai realize the potential scale of the conspiracy. It expands the threat beyond one individual to potentially dangerous international actors.
4. “To include Mordechai meant trusting him, at least to a point. It would present twice the security headache. But also twice the research capacity.”
This internal monologue reveals Slaton’s crucial decision-making process about collaboration. It perfectly encapsulates the tension between operational security and investigative efficiency that drives the chapter’s conclusion.