Copyright © 2025 by Christie Winter

All rights reserved.

No portion of this book may be reproduced in any form without written permission from the publisher or author, except as permitted by U.S. copyright law.

THE ghost protocol

Chapter 15: The Phoenix Files

We drove until the road dissolved into mud and memory. Even the GPS in Carver’s burner phone gave up at kilometer seventeen, the blue arrow flickering in place like it was reconsidering whether to exist at all. She piloted the rusted-out Fiat off the track and into the low trees, killing the headlights for the last two hundred meters. The sky was half an hour from sunrise, the color of dirty milk.

“On foot from here,” she said, voice pitched just above a whisper. She pulled the mag from her sidearm, checked it for the tenth time, and stashed the weapon under the front seat. “Leave anything with a chip. Seriously, Jack.” I let the name hang. It still sounded like a bad joke coming from anyone but her. “You think they’re tracking us through ankle monitors and I.D. badges?”

“I think they can do better than that,” she said, and opened the door. “Old school only. If I catch you thinking about Bluetooth, I’ll crack your skull.”

There were places, still, where the Cold War had never ended. The entrance was disguised as a pump shed for a long-defunct irrigation system: half-collapsed, corrugated tin, a swarm of wire and ruined padlocks dangling from the handle. Carver made a show of scattering the locks, like a magician resetting for the next trick. She felt around the threshold, then knelt and reached under the door, her fingers probing along the seam until she found the catch.

“Most of these ex-Soviet safe sites had redundant redundancies,” she muttered, “but the people who used them didn’t have time for upgrades. Watch the step.”

She swung the door open, and for a second I thought we were walking into a coffin: total black, and the odor of old oil and something dead at the bottom of a pipe. She keyed a flashlight once, then twice, bouncing the beam off the roof before dropping it to the ground. The floor was wood, patched with steel, and halfway back was a trapdoor, the outline just visible through years of grit.

“Keep your weight low,” she whispered. “There are probably pressure sensors.”

The drop into the bunker was four meters of cold, then a metal ladder. Carver climbed first, lithe and silent, every movement measured like she was counting her own heartbeats. I followed, trying not to think about the possibility of a snap charge under the rung, or a ring of thermite ready to incinerate us if the wrong person typed in the wrong code.

The main room was smaller than I’d imagined, but dense, like a neutron star built from old computers and books. The walls were lined with steel shelving, floor to ceiling, filled with a menagerie of hardware: drives, servers, radios, and a bizarre taxidermy of last-century office equipment. A plywood board above the terminal bench held an armada of printouts, all cross-referenced in pen and highlighted with the steady hand of a mad archivist. But it was the red string, thick, triple-knotted, mapped in surgical loops across pins and thumbtacks, that set the tone. Each thread terminated in a printout, usually a face, sometimes a news clipping, sometimes a document so heavily redacted it looked like an inside-out barcode.

Carver dropped her bag by the bench and began the security ritual. I’d watched her do it twice before and never the same way twice. First, she unspooled a length of copper wire, running it from the door’s inside latch to a steel rod embedded in the floor. Next, a slow scan of the ceiling, checking the glue seams for anything that might’ve been added since her last visit. She used an ancient tri-field EM meter, the plastic casing yellowed and cracked, but the dial read sharp and true. It passed her sniff test. She set a black wedge under the hatch, closed it, and engaged a pair of deadbolts that looked hand-machined and ugly.

“You want coffee?” she said, already rifling through the shelves for a foil packet. “Or are you running too hot for that?”

“I’ll take the coffee,” I said. “But I’m more interested in your main event.” She gave me a side-eye. “That’s new. The old Jack would’ve spent the first hour doing inventory and prepping exit routes.”

“I don’t see any obvious threats in a fifteen-kilometer radius,” I said. “And if you’re right about Black Phoenix, we’ll be dead before the water boils anyway.” She laughed, a hollow, barking sound that was more cough than humor. “You always get charming when you’re scared.”

The espresso maker was a stovetop relic, and she operated it with the reverence of a person who needed every ritual intact before the real work began. When she poured, it was into a dented enamel cup, leaving a quarter inch for spill. I took it, hands steady.

She turned to the wall, stripped off her jacket, and began unlacing her boots. “If you’re not carrying, get comfortable. We’ll need both hands.”

The main workstation took up half the back wall. It was a Frankenstein’s monster of gear: a server rack on its side, a cinder block battery array, and a triple monitor setup, two of which were sandwiched in layers of anti-glare and anti-EM shielding. The centerpiece, though, was the keyboard: not a standard QWERTY, but a bespoke matrix of black keys, some double-stacked, others coded with color tape. I counted at least fifty extra function toggles.

She powered the array, and the room lit up in ghost blue. Fans whirred, the network blinked to life, and the far monitor spat out a scrolling waterfall of boot code, lines of gibberish tumbling past until it settled on a single, blinking prompt.

Carver ran her hands over the keyboard, not typing but palpating, like a pianist warming up with silent scales. Then she turned, walked to the floor safe in the corner, and knelt. The safe was set flush to the concrete, old-school mechanical, and the dial was polished to a mirror from years of use. She spun it once, then again, then another three times, her head cocked as if listening for a frequency nobody else could hear.

The safe opened with a sound like a beer can breaking seal. Inside, a single object: a heat-sealed plastic case, opaque except for a yellowed label written in the same block script as the wall notes.

BLACK PHOENIX: Ops 1946–2021. (ARCHIVE C)

She stared at it for a moment, hands on knees. For the first time, I noticed a tremor in her wrist. She let it ride, then stood, crossed back to the terminal, and sat down with the case resting between her elbows.

“You ready for this?” she said, not looking at me. “I want to see it in the clear,” I said. “No more summaries, no more speculation.” She snapped the case, slid out a battered SSD in a mylar sheath, and examined the edges for tamper. “Nobody’s touched this but me,” she said, voice flat. “I checked the hashes before you arrived. It’s clean.”

“Except for whatever’s inside,” I said.

She gave a half-shrug, then connected the drive to a gray brick of a laptop, one with no visible logos and at least half its ports soldered shut. It was air-gapped, nothing but a bare OS and a bootloader custom enough to have been written by someone who never wanted it to be read. She toggled the battery, and a cascade of command prompts lit up the screen.

Carver leaned in, fingers a blur. She ran a local decryption, then double-blinded the process with a rolling checksum. The tension in her spine was visible, every muscle at high alert, like she was doing field medicine with a bone saw instead of a terminal.

I watched the screens over her shoulder. The first window showed raw data, folder after folder with coded filenames and cryptic date stamps. The next ran a crosswalk of the new data against her own local archive, hunting for duplicates or signals in the noise. The last, a visual map: not the red string this time, but an actual graph, with nodes and timelines, rendering the slow accumulation of what Black Phoenix had wrought.

The first files she opened were pdf scans, declassified but dirty with CIA and KGB marginalia. TOP SECRET, PROJECT MISTRAL, 12 MARCH 1961. The document showed a table of projected Soviet leadership shifts, with annotations in pencil: “Execute per B-P line?” The next three were similar, all cross-referencing major historical events with what now looked like hand-written orders to shape, tilt, or outright rewrite the course of nations.

Carver’s lips barely moved, but I caught the mutters: “Fuck me, they really did it.” “Not just ops. These were signed off at the desk level.” “They weren’t even subtle, were they?”

She flipped to the next folder, this one labeled “LATAM: PRIMARY.” The files mapped to every South American coup I’d studied in post-grad, but the tone wasn’t intelligence, it was choreography. One document, dated ‘79, described “pre-emptive neutralization” of a left-wing candidate, an operation I’d been told was a matter of internal collapse. But here it was, with asset codenames and a Black Phoenix watermark so blunt it could have been a brand on cattle.

I felt the blood drain from my face. It wasn’t the events. It was the method, the language. I’d seen it before, a decade ago, when I was a wet-behind-the-ears counter intel drone and every training document was redacted to near uselessness. The mission summaries, the post-op cleanups, the little in-jokes in the footers. I started picking out the phrases, the structural DNA of my own career, staring back at me from an era that should have died with the Berlin Wall.

Carver’s typing slowed, then stopped. She turned, eyes dead and shining in the blue wash. “You okay?” “I used to write this shit,” I said, the words just barely making it out. She nodded, almost gentle. “They always cycle the best practices forward. Everything is just a copy of a copy.”

She hit the function key to pull up a full timeline. The Black Phoenix graph expanded, branching from tiny test runs in Eastern Bloc skirmishes to full-on command over twenty percent of global ops by the late ‘90s. The “official” record ended in 2005, but the after-action files and email caches kept going, evolving, mutating with each new generation of crisis.

Carver leaned back, her head creating a thunk against the cinder block. “They never really stopped. They just went private, then global.”

I turned away, hand pressed to my mouth, breathing slow and deliberate. I wanted to believe this was some elaborate deepfake, a forgery or psychological play. But the chain of evidence was unbroken, clean, and so terribly plausible. I could hear the echoes of my own voice in the sanitized post-mortems, the old jokes about how everything good in the Agency came with a bonus round of moral horror.

Carver let the silence linger, then went back to work. She was searching for something, eyes darting over the monitor, chasing a thread only she could see. “You want the full file?” she said, not quite a question. “Start with whatever shows how they ran the Protocol,” I said. “I need to know how deep it goes.”

She nodded, muttered something about "recursive deltas" and "encryption shifts," then unlocked a section of the archive labeled: GHOST DIR. It was a single compressed folder, 1.4 gigs, last modified three days before my own discharge from the Agency. She hit the decrypt, and a manifest populated:

GHOST_01: PROTOCOLS - INITIATION, BLACKOUT, PHASE-CHANGE

GHOST_02: FIELD OPS - TARGETS, CASEFILES, SUMMARIES

GHOST_03: COMMAND - OVERRIDES, EMAIL, CALL LOGS

GHOST_04: ERASURE - INCIDENT REPORTS, LOSS ACCOUNTS

She pulled the top file from ERASURE, eyes flicking over the contents. I recognized the names. I’d served with two of them, and been at the funeral for a third. Carver went cold, then turned. “These are all cover kills. Every last one of them.” She looked at me, the faintest apology in her face. “Jack, they have you on the list. Three different times.”

I scanned the summary. There it was: my own operational code, written in the dry, clinical prose of an office worker who’d never shot anyone or held a friend’s blood in his hands. I read the “posthumous review,” saw how the story had already been written for a future I hadn’t even lived yet.

“Who signed it?” I asked. She scrolled down, hands suddenly steady. “Same handler as before. Hale.” The name rang like a bell I’d been waiting to hear.

The room shrank. I remembered every time I’d done a debrief and wondered if I was being watched for errors, every time I’d cleaned a weapon and felt like the next round in the magazine was for me. Carver must have read it in my posture, because she spun the chair and faced me head-on.

“They want you dead,” she said, not cruel, just factual. “And if you don’t finish this, they’ll keep coming.” I nodded. The words caught in my throat, but I forced them out: “We burn the archive. We torch the network. But first, we take Hale off the board.” Carver gave a little smile, then set her jaw. “Let’s get to work.”

She punched a command, and the next layer of documents unfurled, a living anatomy of the machine that had made and tried to erase us. I watched the blue light flicker on the walls, watched the names and dates and faces string themselves together in a pattern so elegant it was almost art.

For the first time in months, I felt awake. I took my cup, now cold, and set it aside. Then I reached for the printout nearest the red string, and started reading. Because if there was one thing I was still good at, it was finding the weak point in someone else’s perfect system.

~~**~~

Carver always said history was just a codebase rewritten until nobody remembered the original bugs. Now, watching her string the next layer of data across the monitor, I believed her.

She nested the Cold War carnage in a parent directory, then called up the modern archive: BLACK PHOENIX: CONTINGENCY, v.4.7. The first files were clean and almost boring, post-2001 threat analyses and position papers written by guys who still thought memes could topple a government. Then the hook: tactical briefs from five continents, none with the language of analysis, all written as if the authors were already running the op.

“Look at the document headers,” Carver said, tapping the screen. “They went straight from plausible deniability to direct control. No more middlemen.” She scrolled down a tree of subfolders: SYRIA / TURKEY / HONG_KONG / BRAZIL / SUB-SAHARA. Each one filled with PDFs, chat logs, and what looked like GPS strings labeled to the sixth decimal. She opened the Syria node first.

“This is all from the first six months of the rebellion,” she said. “Watch what happens when I pull the signature overlay.”

The main monitor split, left side showing sanitized news reports, right side the raw Black Phoenix mission summaries. They mapped perfectly: every major escalation tracked to a ‘pinpoint event’ in the B-P file. The date stamps predated the public chaos by weeks. The same thing for Turkey, then for Hong Kong. I watched the progression: a spike in social media, followed by a clampdown, then three days later an ‘untraceable’ hack on the telecom grid, always sourced from a supposed independent collective.

“They orchestrated both the crisis and the response,” I said, voice so thin I barely heard it myself. Carver didn’t look away from the screen. “Have you ever had the sense your missions were following a script?” She paused the playback, finger on the timeline. “You ever wonder why the escalation always happened right after you sent in the first report?”

I remembered the old ops, the frustration when a simple monitoring job turned hot overnight, as if the world was trying to burn itself just to keep me busy. I’d rationalized it as bad luck, or else someone up the chain yanking my leash for their own amusement.

“Give me the Southeast Asia stuff,” I said. “That’s where it got personal.” Carver opened a tactical map: blue and red dots crawling over a relief map of the Mekong Delta. She zoomed in, and I caught my own heartbeat stutter.

“This was the mission,” I said, finger tracing the path on the screen. “The one where they told us we’d be backing up local forces, just a passive presence.” She found the matching op note, and read aloud: “B-P asset integration: Rourke, Jack. Objective: shepherd escalation to threshold, then offload responsibility to partner nation. High-value target seeded for later containment.”

The words were clinical, exact, but the tone was unmistakable: the same language I’d used in my own debriefs, copy-pasted from the old playbook and sharpened into something meaner. It wasn’t just oversight. It was intent.

Carver let it sit, then brought up the financials.

“You want to see how they bought their deniability?” She keyed in another passcode, then opened a spreadsheet that was less a budget than a virus: columns of shell corporations, offshore banks, and phantom trusts, all feeding money into the same black hole.

“The pattern’s clear,” she said. “Every destabilization effort is laundered through at least four cuts, but the origin always traces back to a node with Black Phoenix access. They built the apparatus in the nineties, but the real work started after 2008, using the crash to scoop up entire intelligence shops on the cheap.”

I watched her run the overlays, each one a blow to the gut. My jaw ached from clenching; I had to force my hand open from the desk, white marks left behind where I’d braced against the cold reality.

“These are real people,” I said, voice thick. “I ran into half of them at joint ops. Most are dead, or worse, vanished.” Carver snorted. “That’s how you know the pattern works. They learned to erase not just the assets, but the paperwork too.”

She highlighted a set of entries on the screen, each tagged with a unique digital signature. “See that code at the end? That’s an authentication key for Phoenix’s operational managers. Means every hit, every cutout, is sanctioned at the top.”

My stomach twisted. I scanned down the list, picking out mission codenames that once meant nothing more than another week of work: ORPHEUS, SAWBLADE, CINDER. Each one lined up with a global incident I’d heard about only through news clippings or black-market rumors. Each one followed by a neat row of names, field officers, informants, even a few “consultants” who’d been brought in and dumped when their usefulness ran out.

“You seeing the names?” I said, not expecting an answer. She nodded. “You’re not the only one on here, but you’re the only one still breathing.” The monitors gave my skin an unhealthy hue. I felt like I was watching my own autopsy, each file a scalpel slicing closer to the bone. I wanted to hit something, or break the fucking screens, but instead I leaned forward, jaw locked, forcing myself to take it all in.

“You think they’re watching us now?” I asked. Carver gave a dry smile. “No question. If this terminal ever hits a live line, we’re already dead.” I gritted my teeth. “Then let’s give them something to choke on.” She leaned in, her voice dropping. “There’s a third tier. Deep archive. It’s got the kill lists and the operation logs from after the public cut-out. We need a crypto key from the vault to unlock it.”

I turned, scanning the room. “Physical vault?” She nodded, eyes bright. “Behind the server rack. But it’s a two-key system. I have one, but the other’s on a biometric lock, old style. The kind they only used for command-level stuff.”

“So, whose print?” “Hale,” she said. “Always Hale.” I closed my eyes. The plan was suddenly clear, and so was the pain. “Once we get in, what then?” I asked. She set her jaw. “We copy it, then we burn the whole thing. Every last byte.” I felt the tension run out of my hands, replaced by a current that was cleaner, sharper.

“Let’s do it,” I said. Carver smiled, grim and real, and started packing the gear. For the first time in years, I knew exactly what I wanted: to take the pattern, and break it forever.

~~**~~

There were only two times I’d seen Carver lose her cool: once, when a wet team torched her research node in Rotterdam, and now, as she hovered her hands over the terminal, knuckles blanched and fingertips twitching against the plastic. She ran through the biometric attack protocols three times, each pass slower than the last, before finally looking at me.

“We can spoof the print, but the system expects live tissue,” she said. “Lucky for us, they used this reader in the old Lyon vaults. The override is a ten-second window for lag. We have one shot.”

She found the fragment in the cold files, a high-res scan of Hale’s hand from a debrief photo, rotated and filtered until the print pattern glowed yellow on black. She laser-printed it to a patch of hydrogel, then fitted the patch to her own thumb and tested it on the local sensor. The first try failed, but she gritted her teeth, heated it with a solder tip, and pressed again.

The vault beeped.

The last layer of the archive unzipped with a digital sigh, spilling folders across the screen. At the top, bold and mean: ASSET MANAGEMENT – FINAL.

Carver didn’t pause to savor the moment. She flicked open the folder, and a cascade of faces poured out in a scrolling grid: headshots, bios, status bars in bright orange or muted gray, and at the end of every line, a tag: “Erasure Complete” or “Protocol Pending.”

I watched as the names ran past, dozens I’d known, more I’d only heard in passing. Every “eliminated” operative had a three-page dossier, work history, summary of offenses, and a copy of the termination order. All signed, always by a proxy, but the hash at the bottom never changed. Black Phoenix. Even in death, they needed to keep it on brand.

Carver clicked through the files, speed-reading, muttering at the highlights. “Jesus, they killed half the Rome cluster just to patch a leak. Look… London, Berlin, the old SEATO guys, all gone within a week.” She scrolled faster. “They even recycled some of the bodies into cover stories. It’s recursive. They eat their own.”

I felt it coming before I saw it. My own name. ROURKE, JACK // STATUS: OPEN.

She opened the file. There was my old badge photo, clipped from a decade ago, then a thumbnail of my last active post, a grainy train station still. The summary was two lines:

Rourke, Jack. Loyalty drift noted post-2019.

Flagged for behavioral divergence; maintain operational monitoring until asset is no longer actionable.

At the bottom, a pre-populated death authorization. “Execute per GHOST PROTOCOL, page 11. Confirm upon recovery of all linked assets.”

Carver exhaled. “They wrote your obituary three years ago.” “Nice to have advance notice,” I said, but it tasted bitter. She dropped the window, then opened a new document labeled PHASE ZERO: GLOBAL CONTROL. This one wasn’t about people. It was about everything else.

The doc was a blueprint, twenty pages of densely packed technical and procedural jargon, describing how Ghost Protocol wasn’t the endgame, just a security layer. The real project was “Global Infofusion,” a living archive of every manipulation and erasure, wired into the world’s net and darkweb, using Ghost Protocol as the garbage collector.

It had a map of known “contested spheres”, regions where influence had to be reset, governments toppled, even entire economies wiped and rebuilt, all with the click of a button. There was a timeline: every major crisis of the last twenty years lined up with a “Phase Zero” event.

Carver read it all, slow and steady, her hand now trembling in the light of the screens. “It’s not just about you,” she said, voice flat. “They’re running the biggest simulation in history. Every dead agent is just an update to the model.”

I stood up. The bunker felt too small, air gone hot and chemical. I paced, blood roaring in my ears. “They’ll never stop,” I said. “Even if we dump this archive, they’ll just rewrite the story. Pretend it was a leak, blame the usual suspects.” She watched me, eyes sharp and a little wild. “Not if we do it right. Not if we flip the kill switch before they can patch.”

“How?”

She pointed to the wall, the red string map. “You see that? The only way to end a recursive system is to nuke it from the inside. We need to make them eat themselves.” I thought about it. All the old training, the reflex to survive, suddenly felt small and useless. This was bigger than any run-for-your-life scenario, bigger than any one person’s vengeance. I realized then that I didn’t care if I made it out. I just wanted to leave a hole the size of Black Phoenix in the world.

I looked at Carver. “We burn the world, then what?” She smiled, just a little. “We burn their world. Ours is already ash.” I walked back to the terminal, scrolled down to the bottom of my own file, and closed it. “This isn’t about ghosts anymore,” I said. “It’s about the ones who get left to sweep the ruins.”

We worked in silence, loading the archive onto as many drives as we could find. When Carver ran out of storage, she started uploading pieces to dead drops and panic boxes across the net, each packet was a warning to the next fool who thought the system could be trusted. In the end, there was nothing left to do but wait. The walls of the bunker felt colder, but I felt lighter, even as the gravity of what we’d uncovered dragged me forward.

I thought about the people who’d tried to warn me, the ones who’d vanished without ever seeing their names on a kill order. I wondered if they’d gone out with the same bitter satisfaction I felt now. Carver poured us each a shot of whatever passed for liquor in her bunker. She raised her cup.

“To the ones who didn’t blink,” she said. I raised mine, and we drank. Outside, the sun was almost up, but down here, time meant nothing. We were the new ghosts now, and it was our turn to haunt the machine.