Once the last analyst exits and we're alone with Harper reviewing notes at the far end of the table, I stand and move to where Sarah's unplugging her presentation equipment.
"Your analysis on the Bucharest shell companies." I keep my voice low. "You linked them to known Committee directors through what, corporate registry cross-referencing?"
She doesn't look up from coiling cables. "Among other methods."
"Other methods being?"
"Traffic analysis, travel patterns, financial transfers." Now she meets my gaze. "Standard intelligence correlation."
"Nothing about your work is standard."
Color rises in her face. I shouldn't find that as satisfying as I do.
Harper clears his throat from across the room. "Hawthorne, you need Sarah's contact information for coordination, I can arrange secure channels."
"Appreciate it." I don't break eye contact with Sarah. "We'll need regular updates on Committee communication patterns. My next operation deploys soon."
"Where?" Sarah asks, then catches herself. "Never mind. Classified."
"Balkans. That part isn't classified." I take the cable she's holding, our fingers brushing in the exchange. "The rest is."
She draws a sharp breath despite trying to hide it.
Harper's gathering his materials, clearly ready to leave. "I'll set up the secure coordination protocols. Sarah, copy Hawthorne on your latest Istanbul analysis."
"Yes, sir."
We wait until Harper exits. Silence stretches between us, heavy with everything neither of us is saying. It's been weeks since our coffee conversation, since hours passed like minutes while we talked about everything and nothing.
"Dinner," I say. "Tomorrow night."
Sarah blinks. "That's not intelligence coordination."
"No. It's not."
"We work for different agencies. Fraternization policies?—"
"Only apply to direct reporting relationships. You don't report to me. I don't report to you." I step closer, watching her swallow hard. "Dinner, Sarah. Yes or no."
She should say no. Smart analysts don't get involved with field operatives. Our worlds don't mix, the risk calculation doesn't make sense, and I deploy into hostile territory soon where anything could happen.
"Yes," she says quietly.
Dinner becomes dinners, and before long we're stealing evenings between her briefings and my operational prep. We meet at quiet restaurants far from Fort Meade and Langley, places where classified work stays locked in secure facilities and we can pretend we're just two people who enjoy each other's company.
We're not pretending, though.
Sarah talks about signal analysis the way other people talk about art, finding beauty in patterns and meaning in data streams that look like noise to anyone else. She lights up when she describes breakthrough moments, when weeks of tracking finally reveal the hidden structure underneath. I could listen to her explain encryption protocols for hours and never get bored.
I tell her about operations I can actually discuss, the ones that made it into sanitized after-action reports—the hostage rescue in Mogadishu, the asset extraction from Tehran, the counterterrorism operations across the Balkans that relied on intelligence exactly like what she provides.
"Your Istanbul analysis," I say over Thai food in a restaurant near Annapolis. "That op I ran recently. Your intercept patterns identified the Committee's safe house network. We extracted trafficking victims and seized enough evidence to indict their regional directors."
Sarah goes still, fork halfway to her mouth. "You didn't tell me that."
"Couldn't. Operational security." I meet her gaze across the table. "But you should know, that intelligence changed everything for those victims."
Sarah sets down her fork slowly. "And you were the one who got them out."