Ficool

Chapter 31 - Chapter 32: THE UNTRACEABLE CALLS

Chapter 32: THE UNTRACEABLE CALLS

Monday, December 5, 2011, 9:00 AM — CTC Operations Center, CIA Langley

The intercept hit the CTC at 8:47 AM and by 9:00 the operations floor was at full surge for the second time in ten days.

Brody's vehicle. A second device — not his personal phone, not the family line, a third instrument with no registered account, no carrier attribution, a ghost in the cellular network pinging towers along his commute route with the disciplined brevity of someone trained in operational communications security. Four calls in the past seventy-two hours. Duration: seventeen seconds, twenty-three seconds, twelve seconds, thirty-one seconds. All encrypted. All to the same unregistered endpoint.

Carrie had the intercept data projected on the operations room's main screen before most of the staff had cleared the security checkpoint.

"Brody is running a burner phone from his vehicle. Four calls in three days to an encrypted endpoint. The call pattern is consistent with handler-asset check-in protocols — short duration, predictable intervals, no content variation in signal structure."

Estes stood at the back of the room with his arms crossed and the expression of a man whose political calculations were colliding with operational reality. Brody was now Congressman-elect Brody — the same man VP Walden had been parading through security briefings and fundraisers, the same man the Republican Party was positioning as a veterans' champion, the same man whose arrest would generate a media firestorm that would consume the CIA's political capital for a decade.

"The evidence is circumstantial," Estes said. His voice carried the measured calm of institutional authority deployed as a weapon against inconvenient intelligence. "A second phone in a vehicle doesn't prove operational contact. It could be an affair. A private line for family matters. A financial arrangement he's keeping off the books."

Carrie's jaw tightened. I recognized the specific tension from the first morning she'd arrived at the CTC, arguing with Estes about surveillance authorization — the same frustration, compressed by two months of accumulated evidence that the man across the room refused to process because processing it meant acting on it.

"Four calls. Encrypted. To the same endpoint. On a device he purchased with cash at a prepaid kiosk in Tysons Corner." Carrie's voice was controlled but the frequency was rising, each data point delivered with the deliberate weight of someone building a case for an audience that had already decided not to listen. "This is not an affair. This is operational communication."

Saul sat between them. The mediator position — the chair he occupied when institutional politics and operational intelligence occupied the same room and needed a translator. His reading glasses were off. His hands were folded on the table. The five-second pause was already in progress.

"Continue the analysis," Saul said. "Trace the endpoint. Map the call pattern against Brody's schedule and known Nazir operational timelines. We don't act until we know who's on the other end."

Estes accepted this with the visible relief of a man who'd been given permission to delay a decision he didn't want to make. Carrie accepted it with the visible frustration of a woman who knew that delay was the thing the enemy was counting on.

I sat at the analytical support station and took notes with a pen that was steady and a mind that was running parallel tracks of analysis at a speed the room couldn't match.

In the show, Brody's burner phone calls were discovered closer to the climax — approximately December 10 to 12, a few days before the bunker sequence. This timeline has pushed the discovery forward by five to seven days, because the investigation I helped accelerate generated more surveillance attention, which caught the phone earlier. The meta-knowledge predicted the event but not the timing.

Which means Brody has eight days to adjust instead of three. Eight days to detect the increased surveillance, change his communication protocol, alert his handler, modify the operational plan.

I needed the bathroom.

The third-floor restroom was empty at 9:20 AM. I locked the stall, sat on the closed lid, and engaged PRO Level 1.

[Shadow Archive Protocol: Pattern Recognition Overdrive — Level 1 engaged. Duration limit: 8 minutes (compressed for operational urgency). Cognitive cost: monitoring.]

The pattern recognition expanded across the available data. Brody's call timing plotted against his political schedule: every call occurred during a vehicle transit between campaign events, the specific window when Brody was alone in his car with no family, no staff, no surveillance cameras. The operational discipline was military-grade — the same tradecraft protocols that Marine counter-intelligence training instilled, adapted for covert communication.

But the discovery changed the calculation. If Brody detected the CIA's awareness of his second device — through increased surveillance pressure, through the institutional behavior changes that accompanied active investigation, through the simple instinct of a man who'd spent eight years learning to sense when he was being watched — he had two options.

Abort. Shut down the operation, destroy the device, revert to passive mode. Unlikely — Nazir's operational architecture didn't have a pause button, and Walker's sniper preparation indicated a timeline that was running regardless of Brody's comfort level.

Adapt. Change the communication method, accelerate the operational calendar, compress the remaining steps into a shorter window that gave the CIA less time to intervene. Ghost-Brody's Detailed-tier prediction supported this: "He'll become more careful, not less committed."

The compressed timeline is my butterfly. By making the investigation better, I made it faster. By making it faster, I made the discovery earlier. By making the discovery earlier, I gave Brody more time to adapt. The show's pacing — discovery close to the climax, leaving Brody no time to adjust — was accidentally optimal. My acceleration created a gap that Brody can exploit.

Six minutes of PRO. The headache was building — a two climbing toward three. I disengaged, flushed for plausibility, washed my hands, and returned to the operations floor with an analytical assessment forming in the architecture of my thought.

[Shadow Archive Protocol: PRO Level 1 — Session complete. Duration: 6 minutes. Assessment: compressed timeline creates adaptation window for subject. Brody will become more cautious but not less committed. Ingham Assessment delivery must accelerate. CA adjustment: 19→20.]

The afternoon was institutional paralysis. Estes blocked direct action. Carrie pushed for escalation. Saul calibrated the middle ground — continued investigation without operational intervention, the institutional equivalent of observing a fire and debating whether to call the department.

I worked the endpoint analysis at my station, tracing the encrypted phone's signal path through the cellular infrastructure. Conventional work. The encryption defeated content analysis, but the metadata — tower pings, timing, duration — told its own story. The endpoint was bouncing through three relay nodes, each one in a different country, the signal laundered through infrastructure designed to prevent attribution.

Professional. This isn't Brody's work — this is handler-level operational security. Someone set up this communication chain for him, and that someone has access to encryption tools and relay networks that a Marine sergeant wouldn't know how to configure. The handler is active. The coordination layer is intact.

Max appeared at my station at 4:00 PM with a printout. The cell tower triangulation data, refined to a tighter geographic estimate.

"The relay nodes route through Turkey, Pakistan, and a VPN termination in— are you ready for this? — Langley, Virginia."

I looked at the printout. The VPN endpoint was inside the D.C. metropolitan area, the signal terminating at a server farm eight miles from CIA headquarters. Not inside the Agency — the commercial server farm that half the government's contract work ran through, the same infrastructure that hosted everything from congressional email to defense contractor databases.

"The handler is local," I said.

"Or someone is making it look that way." Max set the printout down. "Either way, the operational architecture is more sophisticated than a single turned POW running a burner phone from his car."

Nazir's network is deeper than the show depicted. Or the show simplified it for television, and the real version has infrastructure layers that eight seasons of dramatized intelligence work couldn't represent in sixty-minute episodes.

The Ingham Assessment on my classified terminal needed revision. The coordination architecture section — Ghost-Saul's insight about the trigger mechanism — required the relay node data. The endpoint analysis changed the document's threat profile from "radicalized individual with explosive capability" to "coordinated multi-vector operation with handler infrastructure and communication security exceeding the asset's individual capacity."

Eight days. The Assessment has to reach Saul's desk in four — by December 9 at the latest, giving the institution six days to act before the briefing. The compressed timeline from the accelerated discovery means I've lost the three days of margin I'd planned.

Estes passed through the operations floor at 5:30 on his way to a meeting that existed primarily to avoid making a decision about the meeting he'd just left. His eyes moved across the analytical stations without pausing. From his position in the hierarchy, the names at those desks were interchangeable — warm bodies processing data, the institutional machinery that produced the intelligence products his office consumed and occasionally acted on.

I watched him walk past and the meta-knowledge supplied the rest of his story without effort — David Estes, who would stand in the Langley memorial garden in thirteen months while a bomb turned the building behind him into a crater and two hundred eighteen people into statistics. A man who couldn't see the threat at his own table because the threat wore a suit and shook hands at fundraisers and called itself patriotism.

I can't save him. Not yet. Season 2 is thirteen months away. But if the Assessment works — if the December 15 operation is interdicted, if Brody is stopped, if the network is disrupted — then the chain of events that leads to the Langley bombing might break before it reaches Estes' memorial garden.

Everything starts here. Eight days. Four to deliver the Assessment. Six for Saul to act. Zero margin for the bipolar disorder or the institutional paralysis or the butterflies that keep shifting the ground under the timeline I memorized from a television show that exists in a world where I'm dead.

The calendar on my desk showed eight squares. I counted them with my eyes and felt Ghost-Brody stir at the periphery of awareness — Detailed-tier, the construct's presence more persistent now, the psychological weight of a man who'd confirmed his intent to kill and was spending his remaining days touching photographs of his children.

To supporting Me in Pateron.

with exclusive access to more chapters (based on tiers more chapters for each tiers) on my Patreon, you get more chapters if you ask for more (in few days), plus new fanfic every week! Your support starting at just $6/month helps me keep crafting the stories you love across epic universes.

By joining, you're not just getting more chapters—you're helping me bring new worlds, twists, and adventures to life. Every pledge makes a huge difference!

Join now at patreon.com/TheFinex5 and start reading today!

More Chapters