CHAPTER 39 — "NOISE AND SIGNAL"
"Learning to crack a code is harder than pulling a trigger. The first requires time, silence, and humility. The second… just an instant."
— Dylan Travers, SIGINT training notebook, August 2015
Langley, Virginia — August 11, 2015 | 7:18 AM | Operations Directorate Office
The morning in Langley began with the same rhythm as always: analysts hurrying by with reports under their arms, operators in jeans and plain caps heading to restricted areas, the bitter smell of institutional coffee filling the air.
Dylan Travers, however, stood still. Motionless. Facing Kaitlyn Meade's desk, a simple sheet of paper between his fingers.
She stared at him over her glasses.
— "Are you sure about this?"
— "I am."
She crossed her arms.
"Wouldn't you prefer a week in Fairfax? A little pool time? A barbecue with Mandy? Maybe the world could manage without you for seven days."
Dylan offered a slight smile.
"Pool time doesn't teach you how to decipher encrypted microwave traffic between Zabaykalsk and Lhasa. And… I feel like I'm behind schedule."
"Behind schedule?"
"The game has changed, Kaitlyn. They're not hiding weapons anymore. They're hiding data packets. Sleeper cells being activated by QR codes, shortwave transmission via pirate radio, data synchronization via dead Wi-Fi… I need to keep up."
Kaitlyn took a deep breath.
"You're already one of the most skilled operators we have. But if you really want to enter the digital labyrinth… I'll need Bryon's authorization."
She picked up the phone.
Minutes later, Bryon entered the room, Deputy Director of Operations, dark suit, his usual restrained look. "You want to train SIGINT at the NSA?" he asked bluntly.
"Yes, sir. Tactical course and refresher course in active interception. Field application of SIGINT. Guerrilla digital counterintelligence."
Bryon stared at him for a few seconds.
Then he said:
"Approved. But on one condition."
"What?"
"Bring back a manual. We'll need to clone you."
Dylan smiled.
Fort Meade, Maryland — August 14 | 8:37 AM | NSA Main Entrance
The National Security Agency complex at Fort Meade wasn't as impressive as the CIA's. No beautiful architecture or marble corridors. It was concrete, satellite dishes, triple fences, and sensors that could even read heartbeats.
Dylan went through screening with a temporary dark red badge reserved for agents with cross-passage. A CIA operative training in the house of the "mathematicians." He was greeted by Lauren Hauser, a civilian, chief tactical SIGINT analyst at the NSA, hair tied back, rectangular glasses, objective posture.
— "Dylan Travers. The legend. He's seen more combat than all of us walking together."
— "And you've seen more encrypted traffic than the entire North Korea."
She smiled.
— "You want to learn. I like that. But there's no CQB here. Here there are sentences, packets, pingbacks, and signal redundancy. Here you get beaten by silence."
Dylan nodded.
— "Learning to read silence saved my life."
Lesson 1 – Fundamentals of Advanced Interception - August 14 | 10:04 AM | Room 2.31-B – NSA Training Division
Dylan sat next to two young military analysts and an NCS officer on technical sabbatical.
On the screen:
"Eavesdropping Frameworks"
– Passive vs. Active Traffic
– Identification of cryptographic pulses
– Burst frequency variations in hostile zones
Lauren lectured clearly.
— "What you need to understand, especially you, Dylan, is that today a terrorist can send attack coordinates in a corrupted 64kb image via Bluetooth to a cell phone in an airport bathroom. And if we don't catch that… it becomes an obituary."
Dylan wrote down each item. At the end of the class, he asked:
— "Have you ever intercepted a clear transmission with activation commands?"
— "Yes. Ten days ago. A three-word code transmitted by amateur radio in Somalia. It activated a group of four men to attack an AMISOM base."
Dylan murmured, more to himself:
— "Three words… and four lives."
Lauren listened. And replied:
— "That's why we're here."
Lesson 2 – Cross-analysis and triangulation of mobile signals - August 15th | 9:20 AM
"Field operators like you need to act fast. So we're going to teach you how to use our portable triangulation system. Just pick up three identical pulses within a 7-second interval. You run to the signal as if you were chasing an invisible sniper."
During the practical lesson, Dylan learned how to use the "GHOSTBOX," a backpack-sized receiver capable of triangulating hidden 3G signals in less than 60 seconds.
— "Imagine you're in a market in Marawi, Philippines. You receive a signal transmitting encrypted text at 1800MHz. How do you act?"
Dylan replied, accurately:
— "I isolate the origin, reduce manual triangulation with a local map, use two approach routes to avoid revealing the pattern, and catch the sender before the next packet leaves."
Lauren nodded.
— "It seems we have a natural affinity between us."
Lesson 3 – Steganography Cryptography - August 16 | 2:03 PM
Dylan was studying a case where a terrorist cell hid activation commands in Spotify audio files, using algorithms that slightly altered frequencies to translate numbers.
The instructor, Nathan Krol, an NSA veteran, showed a common, banal pop song.
— "Now, run it through the spectrogram… look at this point here."
Letters and numbers appeared: alpha-three-delta-7-zero-four
— "This triggered an attack in Jakarta last month. A song. The operator was listening on headphones. The cell phone was the receiver. The man became a weapon just by listening to a playlist."
Dylan leaned back.
— "This changes everything."
August 19 | Last Day – Practical Simulation Session
Dylan was placed in a room with three intercepted signals from a fictional hotel in Prague.
His objective: identify the sender, decipher the code, and locate the extraction point.
Two of the young analysts took 42 minutes.
Dylan took 27.
Lauren watched him through the camera.
— "He thinks like an operator. But he listens like an analyst."
Fort Meade – Exit Corridor - August 19th | 5:44 PM
Lauren walked with Dylan to the exit.
— "You're going back to Langley now, but I wanted to tell you… The people here were impressed. They said it's like seeing a 'hybrid operator' in action."
— "Hybrid?"
— "You kill, infiltrate, extract… and now you listen to the enemy before they breathe."
Dylan shook her hand.
— "Thank you. For showing me that war can also be won with patience."
Langley – August 20th | Kaitlyn's Office
— "The NSA report says you've mastered more than expected. You're at the top of the list of operators with tactical SIGINT proficiency."
— "I didn't do this to break records. I did it to remain useful."
She smiled.
— "You're more than useful. Now… you're also undetectable."
He nodded.
And left.
But in his gaze there was something new: silence as a tool.
Not just to hide but to win.
CHAPTER 40 — "LISTENING TO THE ENEMY"
"In the modern field, winning isn't about shouting the loudest. It's about hearing what nobody else has heard. And acting before they realize they're already dead."
— Dylan Travers, classified mission report, September 2015
Langley, Virginia — August 28, 2015 | 6:09 AM | Room 3-C – Directorate of Operations
The digital display on the wall showed a 3D map of Bulgaria, focused on Sofia, the capital. Green lines, fiber optic routes, and civilian internet hubs were marked like artificial veins running beneath the city floor.
Kaitlyn Meade stared at the screen with a sober expression. Beside her were Joe McNamara of Lioness and two analysts from the Counter Terrorism Center (CTC).
Dylan Travers stood, arms crossed, absorbing the information. Still unshaven, eyes attentive.
Kaitlyn began:
"Three weeks ago, the NSA identified unusual data traffic leaving Sofia in short, low-frequency pulses, with packets encrypted via corrupted JPEG images. Pure steganography."
Joe added:
"The packets are coming from a front office, registered as a cybersecurity company, but the IP address belongs to a server cluster that, in 2014, was linked to Al-Nusra's funding network."
Dylan leaned forward.
"How is this going undetected?"
The NSA analyst replied:
"They fragment the images, split them across multiple proxies, and synchronize the transmission with peaks in civilian traffic. It's like trying to hear a whisper in the middle of a stadium during a goal."
Kaitlyn stared at him:
"We want you to go to Sofia. With your newfound SIGINT proficiency, your mission will be: infiltrate, install a passive listening device, and capture the complete signal at the source." Joe finished:
"If possible, identify the operator and tell us if he's alone. If it's an advanced node in a larger network… we have a bigger problem."
Dylan nodded.
"No local support?"
"Negative," Kaitlyn replied. "No Bulgarian authorities involved. You'll be operating under cover as a European consultant for InterSec, the agency's shell company. Legal entry. Illegal action."
Dylan picked up the folder. He read it for 30 seconds. Then he spoke:
"I need a Ghostbox kit, two proximity keyloggers, and a passive burst receiver."
"You'll have it."
She paused.
"Dylan. This is new to you. Digital. Cold. No weapons."
"Every weapon starts with a frequency."
And he left the room.
Sofia, Bulgaria — September 2 | 6:26 PM | Krali Marko Business Center – Fourth Floor
The elevator ascended silently. Dylan, in a dark gray suit, leather briefcase, neatly trimmed beard, and light glasses, was reading a fake document about digital security compliance. His name tag read: Daniel Torres, infrastructure consultant.
Before him, the door to "Cloud Sentinel Systems," the facade of the server cluster.
A polite, red-haired receptionist. Strong air conditioning. Cheap coffee in the corner of the room.
"Who do I have a meeting with?" Dylan asked, now speaking English with a slightly pronounced Spanish accent.
"With Mr. Orlov. He's already waiting for you."
Orlov was the right type: generic European appearance, erect posture, teeth too good for a man who claimed to be from Moldova. Dylan knew: MSS or some Russian substructure behind it.
During the conversation, Dylan used one of the proximity keyloggers: a chip the size of a shirt button, attached to his watch ring. In 12 minutes, he captured 1390 keystrokes on the computer keyboard to the left of the desk.
On his way out, he greeted everyone. He smiled.
And walked to the downstairs bathroom.
There, alone, he removed the toilet flush cap. He attached a small, modified GHOSTBOX receiver, aligned with the building's power system.
Signal captured.
Bursts identified.
Transmission confirmed.
03:22h | Sheraton Sofia Hotel – Room 814
Dylan set up the portable mini-lab.
On the laptop screen, the signal stream was visible: JPG images with slightly altered pixel patterns, uploaded to obscure "experimental art" blogs on the Deep Web.
He ran an NSA decoder.
Sequence revealed:
"🗝️ alpha-b4c-199g-echo
🗝️ Target location: Qamishli, Syria
🗝️ Operation window: September 9-13
🗝️ Activation code: VELVET_FALCON"
Dylan froze.
VELVET FALCON was an old codename from when Dylan was still in DEVGRU. A name linked to joint operations between Al-Qaeda and former GRU agents.
He picked up the secure phone.
— "Langley. This is Travers. Priority message. We have a digital leak on European soil confirming the activation of an operational network in Syrian territory."
Kaitlyn replied, tense.
— "Do you have the complete package?"
— "I have the active wiretap. Code, location, and window. Recommendation: cut the Sofia node immediately."
— "Do it."
September 4th | 1:14 AM | Return to Cloud Sentinel
Dylan entered through the side entrance. No badge. No permission.
The GHOSTBOX had already sent the packets. But now it was time to silence the source.
He used the maintenance entrance. Three Minutes to the server room.
There, in the dark room, he heard voices. Orlov and another man with an Arabic accent, Syrian.
Dylan hid behind a rack.
— "Operation VELVET FALCON will be activated from Turkey. The Americans don't know."
— "They always know. But never in time."
Tack. Tap.
Two shots with a suppressed pistol. Targets eliminated.
Dylan didn't hesitate.
He grabbed the two cell phones, the portable hard drives, and activated the PULSE protocol: it corrupted the main servers with an electromagnetic overload signal. The digital structure was silenced.
September 6th | Langley – Kaitlyn's Room
— "The cluster was destroyed. Complete copy of the logs sent. Confirmed: ongoing terrorist operation using civilian steganography."
— "We'll activate the Air Force in Qamishli."
— "And the bodies?"
— "They disappeared. Bulgarian authorities called it an electrical explosion. The Russian embassy said they were two 'expatriate technicians'."
— "And they believed that?"
— "Of course not. But nobody will say that."
Kaitlyn leaned back.
— "And you? How did you feel?"
— "Like I heard the enemy before the first shot."
She nodded.
— "Congratulations, Dylan. You became a sensor. And an executor."
September 7 | At home – Fairfax, Virginia
Mandy was on the sofa. She read the mission brief.
— "You learned all this at the NSA in a week?"
Dylan laughed.
— "Not all of it. But enough to make me even more dangerous."
She sat down next to him. She rested her head on his shoulder.
— "And quieter too."
He smiled.
— "Silence now… is the sharpest weapon I have."
And there, in the peace of home, Dylan no longer heard the crackling of gunshots or cries for help.
Only the sound of invisible waves being deciphered.
NEW CHAPTERS ON MY PATREON, MORE + 10 CHAPTERS
NEW FANFIC PUBLISHED: The Rookie: Harry Potter exclusive on my Patreon
[email protected]/SHADOWGHOST07
DO NOT subscribe to my Patreon through the iOS/Apple Store. Not only will they charge you 30% more, but they will also hold the funds for 75 days before releasing them to me, which is very detrimental to me. If you're reading this on an iPhone, please contribute via browser/PC
