Ficool

Chapter 2 - 2: File: Revenant

Raymond Reddington did not waste words when he arrived at the FBI Task Force. He never had to. He simply placed a thin folder on the table and let the paper speak.

Harold Cooper flipped it open. The envelope inside was stamped with Reddington's neat, understated script: BLACKLIST — #5. CODENAME: REVENANT.

Cooper's eyebrows lifted when he skimmed the first page. "He put him at five?" he said softly, more to himself than to anyone.

Reddington's voice was velvet and ice. "Numbers are arbitrary, Harold. Placement is strategic. His work has rippled. I want him stopped."

Ressler leaned forward. "What's the rundown?"

Reddington tapped the sheet once. "Five confirmed — four of them high-value renders. A logistics broker in Georgetown. A mid-level contractor who handled NATO shipments. Two security consultants tied to offshore accounts. Another case with a framed ledger removed from a museum." He paused, watching faces. "Pattern: clean removals, no footage of the perpetrator, low forensic dust, payouts delivered through channels that do not exist on a map."

Liz studied the sheet. "No signature, no forensics to tie? Just bodies and missing assets."

"Precisely," Reddington said. "He is not sloppy. He is not theatrical. He is a professional who commodifies absence. When he chooses the ledger in a case, he sends a message: someone in your supply chain is compromised and a line should be drawn."

Cooper folded his hands. "You want us to find him."

"I want you to arrest him," Reddington said simply. "For the ledger he took from the Armitage Gallery and everything it points to. That ledger is not a curiosity. It shows the skeleton of an operation that will cost lives if left alone."

Ressler tapped a pen on the table. "Any idea how he's being hired?"

Reddington's half-smile tightened. "He does not use couriers. He accepts commissions. He leaves bodies. The payments arrive like ghosts."

Aram, who had been silent until then, swiveled in his chair and peered at the files through wire-rimmed glasses. His hands found his laptop, fingers already wanting pavement on keys. "We start with the victims. Their networks, their last known communications, their financials. We move outward. If he's been sloppy enough to leave a ledger, he might have made a mistake."

Reddington shook his head. "Mistakes are how men get themselves catalogued. Revenant does not make mistakes."

Liz looked at Cooper. "Ressler, Aram — we can pull security footage from the gallery, get background on every guest. Someone will have noticed something odd, even if they couldn't place it."

Ressler's jaw tightened. "We can't ignore Reddington's involvement. If he's put this person on the list, the man is a node we need to understand quickly."

Cooper rubbed his temple. "Aram, I want every open source trace on these victims. Forensics will re-examine the scenes. Ressler and Keen, you'll re-interview guests. Reddington — you'll be here if we have questions."

Reddington inclined his head. "Of course. I am not an arresting officer, Harold. I am a man who catalogues opportunity."

The team dispersed into the work of cataloguing and cross-referencing. The Task Force ran like a practiced machine; yet what they were trying to catch smelled different — not a man with patterns you could predict, but a ghost that manipulated absence.

It didn't take long for Aram to find a thread that was not in the folder.

He came back to the table with the quiet intensity of someone who had seen a line of code and realized it was a shape he didn't know how to fold. "Guys," he said, and everyone leaned in.

"What is it?" Liz asked.

Aram moved the laptop around so everyone could see. On his screen, a front page: a clean, sterile interface that promised anonymity and escrowed payments for discrete services. There were no logos. No names. No standard certificate authority seals. It was, on the surface, nothing at all.

"This is the portal someone used to transact the kills," Aram said. "The clients upload a contract, place funds in escrow, and instructions are distributed to a pseudo-anonymous operator. It routes through a chain of intermediaries. That part is normal. We've seen similar markets. What's not normal — what's impossible — is the backend."

Ressler frowned. "Impossible how?"

Aram tapped the keys and brought up a schematic of the site's traffic model. The lines were jagged, almost evasive. "It's not hosted in a single location. It doesn't rely on standard data centers. It behaves like a distributed mesh that spans nodes that appear and vanish on demand. The payment rail mixes transactions through multiple mixers, but not the same mixers anyone in the dark net uses. They host their own mixers, then route through outward-looking services that destroy logs on flush. The command distribution is ephemeral — it's signed with keys that rotate faster than our hash tables can keep up with."

Liz blinked. "English, Aram. That's a sentence."

Aram exhaled. "It's custom. Whoever built this didn't stitch together existing tools. They wrote a protocol that looks like other things in the dark net — it smells familiar — but it's one step beyond. It uses obfuscation that rewrites endpoint handlers on the fly. If you try to trace a packet back, you get a false origin that persists long enough to mislead before it disappears. It's… a self-sanitizing network."

Ressler's voice went flat. "So we can't trace the server."

"No," Aram said. "We can't even be sure a 'server' in the conventional sense exists. The architecture suggests the site uses chained, temporary VM instances spun up in rented cycles from third parties using prepaid anonymous accounts. Those instances source from legitimate cloud providers but are created and destroyed within minutes. And the payment escrow? It's managed through a multi-party escrow system where each party only holds a single piece of the key, and the keys expire. Even if we could access one node, it would be useless without the rest, which vanish."

Cooper rubbed his forehead. "You're saying it's beyond our capability."

Aram hedged. "Beyond routine tracing. It's not magic, but it was designed by someone—or some group—with skills our current adversaries don't have. It's the sort of thing you invent when you want to be untraceable by everyone who's currently tracing things. Whoever built it understands op-sec, distributed systems, and cryptography at a level that makes standard forensics look quaint."

Reddington listened without moving. "And that's the extent of your analysis?"

Aram met his eyes, not intimidated. "There are traces. Obscured breadcrumbs. But they are time-limited and context-dependent. If we don't capture one in the act and grab a live node, it's like trying to photograph fog."

Liz's voice was hard. "So he takes bodies, leaves ledgers, and his hire-site vanishes behind a wall we can't breach. Great."

Ressler closed his eyes for a moment. "We need a new approach," he said slowly. "Not just digital digging. We need someone to run the human ground. Informants, money trails, unusual transfers, private couriers. Somebody's building and maintaining a system like that — who benefits from removing men like Broderick? Who would order that ledger gone?"

Cooper nodded. "Ressler, Keen: follow the victims' last known dealings. Aram, keep digging the site. If you can map even one of those temporary nodes while it's live, we might get a trace. In the meantime, forensic will re-open the scenes. Reddington… any more context?"

Reddington folded his hands. "I don't do legwork for you, Harold. I provide data. I name problems. Your team will find him if they want to badly enough. I can suggest leverage points. Contacts to ask discreetly. But I will not be your courier."

Aram glanced back at his screen. "There's one more thing." He pulled up a capture: a string of code obfuscation that cycled like a living thing. "The code sometimes inserts deliberate false flags. It will mimic API calls from well-known vendors so that standard intrusion detection will chase the wrong ghost. It's a noise-creation layer."

Liz rubbed her temples. "So it's noisy on purpose to hide the real noise."

"Exactly." Aram smacked the desk lightly. "It's elegant. It's frustrating. And it came from someone who built it to be unfollowable."

Reddington smiled then, a small, patient thing. "You know what this means, Harold. A sophisticated ghost. Not merely a killer, but an architect. Find the architect, and you take the network. Find Revenant — you take an assassin."

Cooper stood. "We'll do what we can. Resources, man-hours, a dedicated trace unit on this site. Aram, I want a live monitoring protocol on any traffic you can capture and a way to lock a node the moment it spins up. If you can't do it, tell me what you need."

Aram looked up, tired and lit by the glow of the laptop. "Give me time and network resources that don't get audited every hour. If this is custom, I need to be able to build a mirror system, and watch it in real-time. Then we might catch it."

Reddler rose. "And if he's caught?"

Reddington tapped the folder, as if the paper itself was a scalpel. "You'll have a man who kills for money. You'll have someone who can reach into supply chains and clean them. You will also have a name: Revenant. Use it carefully. It will force people's hands."

The meeting broke. Phones lit. Agents dispersed. The clock over the table ticked in human time, and somewhere beyond the walls, a ghost walked between rain and marble, unaware that a man named Reddington had given him a name in a ledger.

Aram stayed behind a moment, fingers already moving to write scripts. He needed time and quiet and a way to catch a ghost that didn't want to be caught. He would tell Cooper what he needed. He would also tell himself what he feared: accountants and coders can trace numbers and match fingerprints. They cannot always trace a system designed never to be traced.

And Revenant — wherever he worked and for whatever price he charged — continued to keep his promise. No pictures. No handlers. Only bodies. And a site that vanished when anyone tried to follow it.

More Chapters