"We need communication intercepts," Sarah says, pulling up her signals intelligence databases. "Cross-reference these financial transactions with communication patterns. See if message timing correlates with Committee operational decisions."
The financial documentation would go to Delaney also. She’s the former FBI agent, now with Echo Ridge, who was methodically building prosecutable cases against Committee leadership. Every transaction, every communication, every piece of evidence carefully documented for the day those charges would stick.
"I have field intelligence on Committee activities over recent months." I open my files, operational reports I compiled during my time embedded in Webb's network and intelligence I've gathered since returning. "We can map when they demonstrated knowledge they shouldn't have, work backward to potential intelligence sources."
Victoria's eyes narrow slightly, assessing. She knows what that intelligence cost, knows I spent years in deep cover without extraction protocols or backup, living among people who would have killed me if they'd discovered the truth. She knows Sarah was left behind when I disappeared into that darkness.
"Three-way analysis." Victoria's tone is matter-of-fact, business-like. "My financial records, your signals intelligence, Ghost's operational data. We find the pattern, we find the source."
Sarah nods once, pulling up communication logs and building query parameters that will search for correlations across massive datasets. "Agreed. Let's start with the timeline. Victoria, pull up the first transaction that shows this pattern."
They work together with the kind of seamless coordination that tells me this isn't their first collaborative analysis. Sarah and Victoria have built a working relationship, mutual respect between two women who operate at the highest levels of intelligence work and don't waste time on posturing or territorial bullshit.
Sarah's eyes track across data streams, her fingers flying over her tablet with absolute certainty. She's brilliant and she knows it, never second-guessing her analysis because she's earned the right to trust her instincts. It's one of the things I fell for in DC—that confidence, that sharp intelligence that cut through operational noise and found signal where others saw only static. Working at Echo Ridge has honed her skills to an even finer edge.
I watch her build query parameters with the same methodical precision she used to apply to Committee financial networks. The way she layers data, cross-references timestamps, identifies anomalies that would take most analysts hours to spot. She does it in minutes, her mind processing information at a speed that still impresses me even after everything that's happened between us.
Victoria notices too. I catch the slight nod of approval when Sarah identifies a correlation between financial transactions and communication metadata that neither of us had spotted.Professional recognition from someone who doesn't give it easily.
"Financial transaction here." Victoria highlights the data. "Small transfer, offshore account registered to a shell company we've been tracking as Committee-adjacent. Transaction date corresponds with..."
"Committee operational decision to increase surveillance on federal intelligence contacts." I pull up the corresponding report from my files. "Webb's technical team identified several potential intelligence sources connected to Echo Ridge external network. This transaction date is days before they started surveillance."
Sarah's already cross-referencing with her signals data, building timelines that show communication patterns across multiple channels. "I have signals intercept from the same timeframe. Encrypted communication between some of Victoria's network contacts. Content is secured but timing suggests intelligence exchange."
"Not intentional." Victoria's voice is cold but certain. "I don't think these contacts know they're feeding fragments to Committee-adjacent channels. They think they're having routine professional communications with other intelligence brokers."
"But the Committee's harvesting the fragments." Sarah pulls up another layer of data, showing how small pieces of information from multiple sources could be assembled into a larger operational picture. "Multiple small exposures across different channels, none individually compromising but collectively building intelligence on Echo Ridge tempo, mission parameters, general operational patterns. It's methodical and patient, assembling mosaic intelligence from fragments that individually seem innocuous—Webb's signature approach to intelligence gathering."
"Who are the weak links?" Kane's question is direct and operational.
Victoria brings up several profiles. Intelligence brokers who work her network, all with access to information about Echo Ridge through their connections to federal intelligence, private security contractors, and international intelligence services.
Sarah studies each profile with the same clinical focus she's been using since I walked back into her life. Locked down, no emotional tells, just pure analytical precision.
"Pattern analysis suggests the compromise is unintentional," she says, already building a communication map that shows how information could flow between these contacts without any of them realizing they were feeding intelligence to Committee-adjacent channels. "They're not selling to the Committee deliberately. They're talking to each other through channels the Committee has compromised."
"Surveillance confirms it." I pull up intercepts from my time embedded with Webb's technical team. "The Committee has signals intelligence on multiple communication channels used by independent intelligence brokers. They're harvesting metadata and content from routine professional communications, assembling fragments into actionable intelligence."
Victoria's jaw tightens, fury carefully controlled but visible in the set of her shoulders and the steel in her eyes. "My network contacts are being exploited without their knowledge. The Committee's using their communications as intelligence gathering without them ever knowing they're compromised."
"Can we shut down the channels?" Kane's been following the exchange closely, his mind already working through solutions.
"Not without alerting the Committee that we know about the compromise." Sarah's response is immediate and certain. "If we shut down the channels, Webb's team will know we've identifiedtheir intelligence gathering operation. They'll shift tactics, find new sources. We lose visibility into their methods."
"Then we use it." My words cut through the analysis, hard and ruthless. "We know how the Committee's harvesting intelligence. We control what information flows through those channels. Feed them fragments that build the operational picture we want them to see."
Sarah's eyes meet mine for the first time since we started this analysis. Brief, sharp, and electric with the kind of connection that used to exist between us when we were building cases together in DC, when she still looked at me like I was someone she could trust instead of someone who abandoned her.
For a heartbeat, everything else falls away. Kane, Victoria, the safe house, the mission—all of it disappears into the background. There's just her eyes on mine, that razor-sharp analytical mind already working through tactical implications and strategic variables. I can see the exact moment she reaches the same conclusion I did, see the acknowledgment flash across her expression before she locks it down again.
We always thought in parallel. Built strategies together with the kind of synchronization that only comes from truly understanding how someone's mind works. Years and silence and betrayal haven't changed that fundamental compatibility, and the recognition of it cuts deeper than any of her controlled fury.
She breaks eye contact first, looking away like the connection burned.
"Controlled deception." Her voice is steady, business-like, but there's recognition beneath it. Acknowledgment that the idea has merit. "We identify which fragments the Committee values most, ensure those fragments continue flowing through compromised channels but with strategic modifications that mislead their operational assessment."
"Risky." Victoria's assessment is cold and calculated. "If they detect the deception, they'll know we're onto their intelligence gathering operation."