Chapter 27: THE DOSSIER SEARCH
Falls Church, Virginia — Week 11, Saturday, 10:15 AM
The storage unit's lock accepted Alfred's touch and delivered the combination before his conscious mind could wonder if the enforcers had changed it.
They hadn't. The door rolled up on the same climate-controlled space — filing cabinets, workbench, the empty locker where the SIGs and cash had been stored before Alfred relocated them. The dehumidifier hummed in its corner. The air smelled like cold metal and old paper.
Alfred closed the door behind him and began searching.
The first filing cabinet — operational records, maintenance logs — held nothing about enforcement. He'd skimmed it during his initial visit and confirmed the contents: relay station schedules, equipment inventories, the bureaucratic infrastructure of a network that maintained itself with meticulous German efficiency across decades of rotating personnel.
The second cabinet — CIA personnel dossiers — he'd already mined for Greer and Singer and the OBSERVATION CANDIDATES folder. But he'd only opened the first three drawers. The fourth drawer was deeper, filed behind a set of dividers labeled INTERNAL OPERATIONS.
Alfred pulled the dividers. Behind them, wedged between a personnel evaluation from 1987 and a relay maintenance report from 2003, a slim folder. The cover was stamped in faded red ink:
SYSTEM ENFORCEMENT PROTOCOL — CLASSIFICATION: RESTRICTED — DISTRIBUTION: TIER 3+ CLEARANCE ONLY
Tier 3. I'm Tier 0. I'm reading a document I'm not cleared to read from a filing system maintained by an organization I don't understand for purposes I can't verify.
Open it.
He opened it.
The document was twelve pages. Typed on the same equipment as the Georgetown IRREGULAR card and the relay protocol instructions — dot-matrix text, slightly uneven alignment, the physical output of a printer that had been decommissioned before the Berlin Wall fell. The pages were yellowed but legible, protected by the climate-controlled environment of the storage unit.
Page one was a preamble. Alfred read it standing, the folder braced on the workbench, his reading glasses — Hatfield's prescription, slightly wrong for Alfred's eyes, producing a faint headache when used for extended close work — perched on his nose.
ENFORCEMENT PROTOCOL: PURPOSE AND SCOPE
The Ghost Protocol Intelligence System maintains an internal security apparatus tasked with the monitoring, assessment, and if necessary containment of anomalous system connections designated IRREGULAR. Irregulars represent unplanned integrations — consciousness events that activate dormant system architecture without institutional authorization. Their operational utility is unpredictable. Their loyalty is unverifiable. Their potential for system compromise is significant.
This protocol governs the enforcement apparatus's authority, capabilities, and escalation procedures for managing Irregular Assets across all operational theaters.
Alfred turned the page.
ENFORCER DESIGNATION AND CAPABILITY
System enforcers are recruited from the general asset pool at Tier 3 minimum. Enforcement selection requires demonstrated operational composure, confirmed system loyalty (NTR above threshold), and willingness to engage with anomalous targets whose capabilities may include perception masking, social network manipulation, and unpredictable analytical enhancement.
Enforcer capabilities include but are not limited to:
— System-equivalent abilities at Tier 3+ baseline — Trained immunity to Reaper's Cloak perception masking at all target tiers — Enhanced Social Deduction Network resistance (counter-read protocols) — Access to suppression technology capable of dampening system abilities within a localized area (estimated effective radius: 50 meters) — Authority to initiate direct contact, surveillance, asset evaluation, and if authorized by network command, containment operations
They can see through the Cloak. The realization landed in Alfred's chest like a stone dropping into deep water. The ripples spread outward — every Cloak activation, every moment of perceptual absence he'd used to move unseen through Langley's corridors and Georgetown's towpaths and the parking lot twelve hours ago, had been potentially visible to anyone operating at Tier 3 or above with enforcer training.
The parking lot. The car. I walked up to an enforcer surveillance vehicle under a Cloak that an enforcer can see through, and the amber device was scanning my signature the entire time, and if an enforcer was monitoring the feed — live or recorded — they watched a Tier 0 Irregular approach their vehicle with the confidence of a man who thought he was invisible.
Which means they know I know about them. Or they will, when they review the recording.
He read on. Pages three through seven described the investigation cycle:
PHASE 1: PASSIVE MONITORING Duration: Variable (weeks to months). The enforcer apparatus monitors Irregular Anomaly Signature accumulation through passive detection instruments deployed in the Irregular's operational area. No direct contact. No interference with Irregular operations. Purpose: baseline assessment of system usage patterns, operational temperament, and threat/asset potential.
PHASE 2: ACTIVE INVESTIGATION Duration: Variable (days to weeks). Triggered when AS accumulation exceeds passive threshold OR when Irregular operational activity demonstrates elevated risk/reward profile. Active investigation includes: enhanced surveillance, social network mapping, operational pattern analysis, and deployment of proximity detection instruments. Direct observation of the Irregular may occur but without initiating contact.
PHASE 3: DIRECT CONTACT Duration: Single event. Triggered when investigation produces sufficient assessment data for classification decision. Direct contact may take the form of: overt approach, covert signal, dead-drop communication, or institutional intermediary. Purpose: inform the Irregular of their classification status and deliver network terms.
PHASE 4: RESOLUTION Outcomes: (a) Integration — Irregular accepted into network asset pool at assessed tier. (b) Monitoring — Irregular placed under indefinite surveillance with restricted system access. (c) Containment — Irregular's system connection suppressed through technological intervention. (d) Termination — Reserved for Irregulars assessed as active threats to network integrity. Requires network command authorization.
Alfred set the folder down. His hands were steady but his jaw ached — he'd been clenching it since page three, the tension accumulating in the masseter muscle like a fuse burning toward something explosive.
Phase 1: Passive monitoring. That's where this started — the OBSERVATION CANDIDATES folder, the Georgetown dead drop, the system's initial guidance. The enforcers were watching from a distance, letting the system evaluate me through my own actions.
Phase 2: Active investigation. The woman in the corridor. The car in the parking lot. The amber device scanning my signature. I've crossed from passive to active. Something I did — the relay transmissions, the DGSE operation, the Paris intervention, the Dead Drop access — generated enough signal to escalate the investigation.
Phase 3: Direct contact. Coming. The question is when and in what form — overt approach, covert signal, or institutional intermediary.
Phase 4: Resolution. Integration, monitoring, containment, or termination. Four outcomes. Two survivable. One tolerable. One final.
He turned to the remaining pages. Pages eight through twelve were more technical — suppression technology specifications, AS decay rates, enforcer communication protocols. The suppression technology description confirmed his hypothesis about the amber device:
PASSIVE DETECTION INSTRUMENT (PDI-7) Function: Localized Anomaly Signature measurement within 50-meter radius. Passive scanning — does not emit detectable signal. Records AS levels at 1-second intervals. Amber indicator light confirms active status. Data stored locally, uploaded via encrypted relay at scheduled intervals.
Uploaded via encrypted relay at scheduled intervals. Not real-time monitoring. Scheduled uploads. The amber device recorded data and transmitted it later — which meant the enforcer didn't necessarily see Alfred's parking lot approach in real time. They'd see it when the device uploaded. The window between recording and review was unknown but non-zero.
I have time. Not much. But some. The enforcer will review the PDI data and see a signature spike consistent with a Tier 0 Irregular approaching the vehicle under an active Cloak. They'll know I'm aware of the surveillance. They'll know I investigated. And they'll know the Cloak held for ten seconds at intentional activation, which tells them something about my development trajectory.
But they don't know I found this file. They don't know I understand the investigation cycle. They don't know I can see the board they're playing on.
Knowledge is the only currency that appreciates. And right now, I'm holding cards the enforcers don't know I have.
He photographed every page with the air-gapped laptop's camera. Twelve images, stored locally, no wireless transmission possible. Then he replaced the folder in the fourth drawer of the second cabinet, behind the same dividers, in the same position. If the enforcers inspected the storage unit — and they might, if they were tracking his Dead Drop access patterns — the folder needed to look undisturbed.
The rest of the archive he left untouched. The temptation to search further — for enforcer personnel files, for more detailed capability assessments, for the names and faces of the people hunting him — was strong. But every minute in the storage unit was a minute of exposure, and the PDI's fifty-meter detection radius meant that if an enforcer had positioned a second device near Falls Church, Alfred's presence here was being recorded.
He locked the unit. Walked to the Honda. Drove home under the speed limit, hands at ten and two, eyes checking mirrors at intervals that balanced counter-surveillance awareness with the appearance of a man running Saturday errands.
---
Arlington — 2:00 PM
The apartment received him the way it always did. Silent. The dead man's furniture absorbing another layer of an intelligence operation it was never designed to contain.
Alfred sat at the kitchen table — the same table where he'd spread refugee maps and encoded cipher transmissions and built intelligence packages with blood on his fingers — and opened the air-gapped laptop. The twelve photographs of the Enforcement Protocol filled the screen in a grid.
He read them again. Slower this time. Making notes on a legal pad — physical, disposable, burnable.
What I know now:
1. Enforcers exist. Tier 3+ operatives with system abilities, Cloak immunity, and suppression technology. 2. I am under active investigation (Phase 2). The woman in the corridor and the car in the parking lot are consistent with enhanced surveillance and proximity detection deployment. 3. The PDI device records locally and uploads on schedule — not real-time. I have a window before the parking lot data is reviewed. 4. The investigation cycle progresses to direct contact (Phase 3), then resolution. Resolution outcomes range from integration to termination. 5. My Anomaly Signature has been accumulating for ten weeks. Every system ability use — guidance, SDN reads, Cloak, system-assist, Dead Drop access — has generated signal. The Paris prevention operation, the relay transmissions, the achievement unlocks — all signature-heavy activities that likely triggered the Phase 2 escalation.
What I need to do:
1. Reduce system ability use immediately. Every activation generates signature the enforcers detect. Minimum footprint. Analytical work through real skill, not system enhancement. 2. Do not change daily routine. Deviation signals awareness. Drive the same route. Badge in at the same time. Drink coffee from the same mug. Be the same invisible analyst the enforcers expect to observe. 3. Prepare for Phase 3 — direct contact. The protocol describes four forms: overt approach, covert signal, dead-drop communication, or institutional intermediary. I need to be ready for any of them. 4. Continue the Suleiman investigation through legitimate analytical channels. The endgame is approaching — bioweapon plot, hospital confrontation — and my meta-knowledge, degraded as it is, still provides broad-stroke guidance for events the enforcers don't care about. Their concern is me. Suleiman is mine.
He tore the legal pad page free. Read it once more. Then held it over the kitchen sink and touched Hatfield's lighter to the corner. The paper burned clean — orange flame, gray ash, the smell of scorched cellulose that had become familiar from weeks of OTP page destruction.
The ash went down the drain. The lighter went back in the drawer. Alfred washed his hands — twice, the habit of a man who'd been handling intelligence materials that weren't supposed to exist — and dried them on a towel that smelled like fabric softener.
The satellite phone was under the floorboard. Charged. Ready. But every transmission generated signature, and signature was the currency that bought enforcer attention. The phone would stay silent until the cost-benefit calculation justified the risk.
The three burner phones were in the desk drawer. Same calculation. Same conclusion.
The SIGs were in the closet. Behind the tax returns. Above the shortwave receiver. Beside the printed screenshot of a woman whose face the cameras never caught.
The show never depicted enforcers. The show never depicted the GPIS. The show was a story about Jack Ryan and Suleiman and the space between heroism and terrorism. The system — and everything that comes with it, the Dead Drops and the achievements and the abilities and the enforcement apparatus — is a layer of reality that the television writers never imagined and that I am navigating without a script.
For the first time since arriving in this body, I am genuinely alone in the story. No meta-knowledge covers what comes next. No episode guide tells me how the enforcer investigation ends. No streaming service holds the answer to the question of whether Alfred Hatfield — the Irregular, the anomaly, the man who woke up behind a dead man's eyes and built an intelligence operation from a parking garage in Georgetown — will be integrated, monitored, contained, or terminated.
The answer depends on what I do next. And what I do next depends on a calculation I've been making since the first skull-pressure pulse in a bathroom stall at Langley: Is the knowledge I carry worth the cost of carrying it?
The skull pressure pulsed. Once. Low. The cold edge that had been present since the parking lot — the enforcer's ambient signal, the system's alarm bell, the frequency of being watched by something that could see through walls and Cloaks and the carefully maintained performance of an unremarkable life — held steady beneath the pulse.
Alfred closed the laptop. Set it on the desk. Walked to the closet. Looked at the screenshot of the woman, pinned beside the SIGs, above the receiver.
Who are you? Tier 3 minimum. Cloak-immune. Counter-read trained. Armed with suppression technology and the authority to contain or terminate based on network command.
And what do you see when you look at me? A desk analyst with ten weeks of experience, Tier 0 abilities, and a closet full of weapons he's never fired?
Or something else? Something the system flagged as worth investing in — Dead Drops and achievements and cognitive acceleration — despite the enforcer attention that investment would inevitably attract?
The system knew the enforcers would come. The system gave me tools anyway. The system is either testing whether I can survive the enforcement apparatus — in which case survival is the advancement condition — or the system is playing a game against its own security protocols using me as a piece.
Either way, the game is in motion. And pieces that stop moving get taken off the board.
He closed the closet door. Walked to the kitchen. Opened the freezer — behind the ice trays, behind the vacuum-sealed currency, the frozen peas he'd bought to fulfill Helen's request sat in their bag, slightly frosted, the green of them muted by ice crystals.
He cooked them. Ate them standing at the counter with a fork, directly from the pot, because plating food on a dead man's dishes for a dinner eaten alone in a surveilled apartment felt like a concession to normalcy he couldn't afford.
The peas were overcooked again. He ate every one.
Monday would bring Langley. The Suleiman investigation. Ryan's financial tracking. Greer's whiteboard. The combined analytical picture due on Greer's desk by Friday. And underneath all of it, like a bass note beneath a melody, the cold pressure at the base of Alfred's skull marking the presence of an enforcement apparatus that had parked outside his window and would park there again.
The bioweapon component — Suleiman's Ebola plot, the show's Episode Six escalation — was approaching on the compressed timeline. Matice's team had intercepted a shipment at a Turkish border crossing that, according to Alfred's degraded meta-knowledge, shouldn't have been intercepted for another week. The timeline was running ahead. The endgame was accelerating. And Alfred was caught between two investigations — one he was conducting and one being conducted on him — with a system that armed both sides and a body that wasn't originally his and a mind that was running out of script.
He washed the pot. Set it on the rack. The kitchen was clean. The apartment was dark. The skull pressure held its cold edge like a blade pressed flat against skin — present, unmistakable, and waiting for the moment when pressure became contact.
To supporting Me in Pateron.
with exclusive access to more chapters (based on tiers more chapters for each tiers) on my Patreon, you get more chapters if you ask for more (in few days), plus new fanfic every week! Your support starting at just $6/month helps me keep crafting the stories you love across epic universes.
By joining, you're not just getting more chapters—you're helping me bring new worlds, twists, and adventures to life. Every pledge makes a huge difference!
Join now at patreon.com/TheFinex5 and start reading today!
