Copyright © 2025 by Christie Winter

All rights reserved.

No portion of this book may be reproduced in any form without written permission from the publisher or author, except as permitted by U.S. copyright law.

BLACK PHOENIX

Chapter 2: Sarah's Intel

The trick was never the code. It was knowing what the enemy valued most, the system’s illusion of control, and kicking the knees out at just the right angle.

Sarah Connors’s world was seven screens wide and not an inch deeper than the concrete bunker she’d tricked out with plastic folding tables and a mad-scientist’s tangle of power strips. The place had been a derelict copy shop before she’d taken over, a storefront on a dead-end street in the city’s “reclamation zone,” where even the meter readers showed up in pairs. She hadn’t bothered with décor; the faded sign still advertised one-cent faxes and same-day passport photos, though the only light that made it through the windows now came from phosphorescent strips of duct tape that crisscrossed the glass.

Inside, every surface was hijacked by hardware. Laptops gutted and rebuilt for silent operation. Repurposed baby monitors, signal relays, a hacked Roomba forever stuck in a circle of its own existential dread. Even the Keurig brewed with stolen power, a single-serve caffeine drip that kept Sarah moving at exactly the speed she needed.

She leaned in, close enough to taste the ozone off the nearest monitor, which spat line after line of decrypted agency chatter in perfect blue and white. Her right hand was on the keyboard, left on a thermal coffee mug that might’ve doubled as a hand warmer in any other life. No distractions. No music, not even in her head; it had all been cauterized away by months of running operational triage for a fugitive she should’ve had the sense to hate.

If the news had a name for Jack Rourke, she’d learned, it was always the same, renegade, traitor, ghost. The headlines had a rhythm by now. But Sarah didn’t give a shit about the headlines. She hunted signatures.

This was her real job: feeding one fire while putting out another, staying just ahead of the pattern recognition engines she herself had written in a better life, when she’d still believed the intelligence community was fixable. She’d bought herself time with every dead drop and redirect, but she knew the knives were getting closer. She could feel it in the jittery microsecond lag every time she punched an unfamiliar key.

She pulled up the priority one file, fresh in from her backchannel scrape of Interpol’s inner sanctum. This was the one Jack needed, if he was going to have a tomorrow. She started with the meta: document fingerprints, access logs, the invisible residue left behind by every digital touch. Her eye tracked the patterns without thinking, just letting the algorithm in her head fill the empty space between:

Three attack vectors, three cities, three perfectly synced timestamps.

The same hash signature on the source documents as the “Jack Rourke” identity flag from six months ago, back when his life had only been moderately in the toilet.

Two zero-day exploits she recognized as Phoenix product, because she’d written part of the kernel that made them possible, before she’d quit and deleted her credentials, which in retrospect was a kindergarten move.

The feeds lined up, just like she expected. Too clean, too coordinated. Even the interpolated “random” elements, the camera angles, the cash transfer shells, had that subtle whiff of corporate overreach.

She cross-compared with the U.S. and NATO files, scraping from memory caches and internal mirrors that never should have survived the last data wipe. The exact same evidence chain popped up, only the file extensions and the headers changed. Identical to the byte, like some bored clerk had just copy-pasted the global database and hit “find and replace” on the jurisdiction tags.

It was, she thought, the laziest high-level frame-up she’d ever seen. Which meant the people behind it didn’t think anyone would look this close.

Sarah cracked her knuckles and paged through the rest, just to be sure. The nodes on her master map pulsed red in perfect sequence, as if someone had run a string of Christmas lights through every Western intelligence database on the planet. If the system ever figured out it was being watched by one of its own, well, Sarah didn’t want to stick around for that particular knock on the door.

She opened the comms program, triple-blind and air-gapped from the rest of the operation, then fed her findings into a compressed data package. The cursor hovered over the “send” command for half a second too long.

It would be the last warning she could give Jack. After this, she’d have to break every mirror, torch every fallback, and pray her own name wasn’t on the next day’s most-wanted. She’d kept her distance for months, kept it professional, all the while expecting to one day see him as the bullet-pointed casualty in a classified memo. But if they were willing to falsify evidence on this scale, even Jack’s stubbornness wouldn't be enough to keep him ahead of the sweep for long.

She plugged in the mic, pressed the record button. “Rourke, it’s Connors. The evidence chain is dirty, identical digital signatures across multiple jurisdictions. All flagged data originates from the same high-clearance vector. This is not an external op. Someone inside is running a global play. Do not trust local assets. Do not use any regular channels. I’ll route details through burn line beta. Get off grid.”

She reviewed it once, added an encryption layer that was more for her own peace of mind than actual protection, and routed the packet through six bounces on three continents. Last stop was a public Wi-Fi node in Warsaw that she’d seeded months ago with an always-on relay. It would reach Jack, if he was still alive and checking his dead drops.

She killed the mic, listened to the electric silence. Her own heartbeat, impossibly loud in her ears.

Sarah sipped the now-cold coffee, letting the chemical bite wake her up again. There was no going back after this. She’d spent too long hoping that there was some other solution, some way to fix the machine from the inside. But the machine just didn’t seem to want fixing. It wanted to eat everything left of Jack, and her, and of anyone else who refused to stay in the box they’d been assigned.

She keyed in the wipe sequence for her temp cache. If anyone traced her now, they’d only find the ghost of a ghost, a few cycles of old RAM and a million broken pointers to nowhere.

She looked up at the glass, at the dead street beyond. It was always either night or just before dawn in this part of the city. The monitors backlit her in blue, painted her shadow sharp against the peeling paint. At that moment, she didn’t look like an analyst, or a hacker, or even a human being. She looked like part of the system she’d helped build, now cannibalizing itself byte by byte.

She let herself laugh, just once, a dry, almost soundless thing. The system hated uncertainty. And if Jack Rourke had ever been anything, it was that. She started the next attack, fingers moving faster now. There would be no more sleep. Not until the war was won, or at least until she’d given him a real shot at not dying. The blue glow of the monitors never dimmed.

~~**~~

Sarah’s safehouse had never truly been home, and she wouldn’t have trusted it even if it had. Everything in the space was designed for utility and impermanence. Blackout curtains duct-taped along the frames, a layer of spray-foam between her and the outside world, every vent covered with magnetic mesh. Two exits, one straight, one crawlspace, both visible from her seat at the command desk. On the rare chance she slept, she did so with a go-bag as a pillow, passport and cash bundle pressed to her ribs.

She sat now, cross-legged, shoulders hunched, screen-light pulsing across her skin in pale waves. The office chair’s foam was long gone, replaced with a dish towel that never quite stayed in place. Her fingers had the white, bloodless look of someone who’d skipped dinner and maybe breakfast before it. None of it mattered; she was alive on a circuit she hadn’t felt since her first year out of school, back when the thrill of tearing into protected systems was enough to keep her going for days.

She stared at the top monitor, biting her lip as her tool suite finished its final prep cycle. If she made one wrong keystroke, triggered the wrong alert, Phoenix would blackhole her access and then, if she was lucky, just erase her from every legal database in the world. If she was less lucky, she’d wake to a chemical fire in the air shaft or the stutter of ceramic slugs through the cheap drywall.

Sarah braced, and launched the breach.

There were three layers of defense, just like she’d predicted: first, a network sandbox meant to stall the amateur. Then a decentralized honeypot, harvesting keystroke signatures, looking for the telltale patterns of known hostile operators. Last was the real wall, an AI-driven counter-intrusion suite that mapped out not just her moves, but the thinking behind them, an adversarial algorithm designed to extrapolate user intent. A ghost analyst in the system, learning from her as she learned it.

She’d written software like this, back in the past. But the Phoenix code was heavier, more brutal, less interested in containment and more in destruction. It lashed out, flooding her with recursive data loops and logic bombs, each wave testing for a fumble, a crash, a digital breadcrumb that would feed back her location.

Sarah smiled without humor. They wanted to play, and she’d come to win.

She cut her signal through three disposable proxies, each time forging a new session ID, each time sacrificing a piece of the preloaded malware she’d grown from scratch. When the counter-AI flagged her as “hostile anomaly,” she funneled it a poisoned trail of metrics, staged user errors, deliberate dead-ends, leaving behind the forensic equivalent of a garden gnome army. Then, while the countermeasures were busy, she ducked sideways into the log management subsystem, found the crack she’d hoped for: the entire admin suite running off a three-generation-old OpenBSD kernel, probably because someone in Phoenix liked the optics of “retro invulnerable.”

She snorted, hands working faster. You could always count on egotism at the top.

The logs were compartmentalized, thousands of encrypted blocks, each tagged by operational code. She ran a script to shotgun them in parallel, watching the hashes pour in, then flagged anything with more than one cross-jurisdictional signature. The nodes on her map shifted from red to yellow, back to red, each color change meaning another layer had been stripped away, another second closer to detection.

It took hours. She ran on coffee and sheer willpower, cycling through threat sweeps and firewall bounces. Her eyes burned; her wrists ached from the endless repetition. The sun must have set and risen again, but inside the bunker it was always the same spectral blue.

Finally, just before the logs started self-pruning, Sarah caught it: a thread of operator metadata too specific to be accidental. “Auth: M_Hale” repeated in the kernel logs, deep in the guts of the ops system, always present in the highest-clearance events, the ones that coordinated the Istanbul, Berlin, Seoul hits. Each time, the logs tried to scrub themselves, but Hale’s signature lingered at the edge, a remnant in the transaction trail.

She whispered, “Son of a bitch,” and grinned, sharp and tired. Hale was supposed to be dead or disappeared; if he was operational, it meant the ghost at the center of Phoenix was still pulling the wires. She scraped the log blocks, copied them to a shielded drive, and started the next protocol, implanting a backdoor shell, disguised as a log-rotation script, that would let her tunnel in later if the need arose.

The moment she executed, a warning flare ignited on the monitor, Phoenix’s counter-AI finally sensing the intrusion. Sarah initiated her own kill-sequence, burning all session IDs, sweeping the drives for stray temp files, and physically yanking the uplink cable just as the system began its final sweep.

She sat back, breathing ragged, watching as her screens cascaded to black, then slowly rebooted. For now, she’d made it.

She leaned her head on her arms, fingers still twitching with the phantom impulse to type, to dig, to keep going. It wouldn’t last; they’d catch on, patch the hole, maybe send someone after her, maybe worse. But for the moment, she’d stolen a march on the bastards who’d tried to erase Jack, and her, and anyone else who’d seen too much.

“Damn it, Jack was right,” she muttered. She let herself savor the win for one heartbeat, then started copying the evidence to an offsite drive, already running scenarios in her mind for the next move.

The world outside remained dark and silent, but inside the bunker, Sarah’s pulse thudded with the memory of victory, and the knowledge that it would never, ever, be enough.

The first sign was subtle, a persistent lag on the bottom right monitor, a judder in the clock cycles that shouldn’t have existed on hardwired lines. Sarah noticed, even before the alert window forced itself into the foreground, that something was wrong. She reached for her coffee, but her hand was already moving for the panic stick, the matte-black USB designed for exactly this contingency.

The monitors flashed red, then white. Trace program detected. External vector, direction unknown. “Shit,” she whispered. The counter-AI had sprung the trap.

Instantly, her hands were alive, flying across the keys as if detached from her body. She launched the wipe sequence: first the RAM dump, then the full drive encryption, then the logic bomb for any forensic process that tried to reconstruct what she’d done in the last hour. The deadman protocol started a ten-minute countdown. She could do it in three if she didn’t panic.

The room’s temperature seemed to drop by five degrees, as if the system itself was sucking out the heat. Sarah heard her own pulse, a syncopated tick, louder than the fans roaring from the server tower.

She watched, helpless, as the trace program ate up her decoys, burning through each proxy and bounce. The Phoenix net was good. No, it was perfect. A sweep that mapped every pattern, every click, every byte she’d ever sent. She forced herself to breathe, to count: one second in, three out. Again. Again.

The monitor closest to the door flickered and displayed an overlay: “Local Trace: 90% Certainty.” That meant they were in the city. If they were close enough, the human element would be inbound, too. “Not today,” she said.

She reached for the hidden panel in her desk, popped the catch, and snatched out the go-bag. All the old tricks: burner phones, a cold wallet for crypto, at least three IDs that should buy her twenty-four hours before global tracking caught up. She scooped up the slimline laptop and started the backup upload to her offline mesh network, insurance, in case she didn’t make it out.

The screens glowed brighter, pushing back the darkness. For a moment, Sarah was illuminated, not just by the cold blue of the system, but by something older, a ruthless, bone-deep survival instinct. She yanked the cables, let the backup battery take over. With practiced hands, she slid the last of the flash drives into her pocket, checked her sidearm (a weight she’d never liked, but one she respected), and slipped on her battered coat.

She paused once at the door and looked back. The safehouse was just a pile of junk tech, broken chairs, empty wrappers. It looked nothing like the center of a digital insurgency. There was, she realized, a certain poetry in that. Then she left, locking the door behind her with a magnetic strip that would jam it for exactly twenty-six minutes, the average response time in this district.

Down the back stairs, into the alley. The city was colder than she remembered, or maybe her nerves had finally caught up to the rest of her. She walked briskly, head down, face half-shrouded by the hoodie’s edge. Past the bins, through the courtyard, out onto a street that had never noticed her and wouldn’t remember her now.

Behind her, in the bunker, the kill command detonated. Everything she’d built, erased in an instant. To the Phoenix operatives on her trail, she was just another anomaly, a ghost they’d almost caught, the story of her presence nothing more than a ripple in the noise.

Sarah walked until her legs burned, until she found a parking garage and a battered motorcycle she’d stashed months before. She slid on the helmet, wiped the visor, and keyed the ignition. The engine rumbled to life, a small act of defiance against the machines still hunting her.

As she pulled away, she let herself imagine Jack Rourke, somewhere in the guts of another dead city, reading the message she’d sent him. She hoped he’d understand what she’d risked, what she’d given up. That he’d see, in the forensics and the fractures, the signature she’d left just for him.

She twisted the throttle and vanished into the night. From now on, she was truly off the grid. She was a ghost, the same as him. And it felt like freedom.