Copyright © 2025 by Christie Winter
All rights reserved.
No portion of this book may be reproduced in any form without written permission from the publisher or author, except as permitted by U.S. copyright law.
THE ghost protocol
Chapter 2: The Analyst's Dilemma
The SDIA Analysis & Intelligence office at zero-dark-thirty felt like the inside of a high-end aquarium: glass, filtered blue light, and an endless cycling hum. No other humans in sight, not even the cleaning crew, just me and the server racks stacked like dominoes behind reinforced partitions. They put people like me on the third shift not because we were the best, but because they trusted us not to go insane alone in the sterile dark.
My station occupied a corner cell with sight lines on all three approach vectors, policy, security, and admin, like a frog in a science class vivarium. Above the console, a panoramic sheet of ballistic glass ran from ceiling to floor. Biometric locks on every door. Even the bathroom required a palm scan and secondary code, lest the agency's most valuable excretions fall into the wrong hands.
The only ambient sound was the brittle drone of T8 fluorescents fighting the soft whirr of cooling fans. Even the building's HVAC was tuned to be less noticeable than the silence it replaced.
I swiped into my workstation with gloved fingers, latex, size XS, powder-free; old habit from a year in Biohazard Forensics, and waited for the system to spin up. Five seconds, then the first screen blinked to life, blue on white:
// SDIA Analytical Mainframe - User: CONNORS, SARAH //
// SECURITY CLEARANCE: OMEGA BLACK //
// LAST LOGIN: 03:42:11 //
The greeting sequence ran through its paces, then loaded up the pending queue. Nine flagged files, six cross-checks, and a single top-priority notification set to interrupt all tasks. The header glowed red:
IMMEDIATE NEUTRALIZATION - GHOST PROTOCOL INITIATED
Someone, somewhere, had lit the fuse.
I exhaled, slow, feeling the latex snap at the webbing of my hand. This was supposed to be routine, flag, confirm, authorize, audit. But nothing about Ghost Protocol ever felt routine. They only triggered it for outliers: defectors, double agents, traitors too well-connected to be quietly disappeared. It wasn’t a kill order in the Jason Bourne sense. More like… deletion, industrial-grade. You set it loose, and it erased every trace of the subject across the digital spectrum: finances, biometrics, travel, social, even medical. Sometimes the body followed. Sometimes not.
The target this time was Jack Rourke.
His file was already open, details cascading in from a dozen linked databases. Mugshot: standard-issue government, washed-out eyes, military cut just outgrown. Service record: Distinguished Counterintelligence, decorated, flagged as "Priority Asset." Then the discharge, then a blacked-out chunk of text labeled “OPERATION: NIGHT MARKET,” and then, more recently, a steady trickle of flagged surveillance hits. Last known location: city subway, timestamped less than thirty minutes ago.
The whole thing felt like déjà vu, only the kind where you know you’re about to step on a landmine.
I reached for the keyboard. The latex on my fingers made the keys sound sticky. Below the monitor, a discreet biometrics pad waited for a thumbprint, agency logo etched in frosted blue. At the top right corner of the screen, a blinking “CONFIRM ACTION” dialog hovered, asking me if I wanted to proceed.
My job, my entire career, was predicated on being the kind of person who never hesitated at this juncture. And yet, there was something in the air, an ozone sting, like the moment before a summer lightning strike. A hesitation, subdermal, impossible to reason with.
I pressed my left hand flat to the desk, trying to stop the tremor. I bit down on my lower lip so hard I tasted blood, only registering the pain when it threatened to snap my focus entirely. The overhead camera in the northeast corner ticked as it followed my micro-movements, little red iris dilating to catch any deviation. Protocol said I was supposed to ignore it. Nobody did.
“Authenticate with biometrics to continue,” the dialog said, the letters marching across the screen in cold Helvetica. I hovered my gloved thumb over the pad. And waited.
For a second, the entire office was a vacuum, blue-lit and empty, all potential energy. The fluorescent hum seemed to pulse in time with my heartbeat. My eyes flicked back to the monitor, then to the camera. I wondered, briefly, who else was watching. Who else cared enough to burn the midnight oil on a file like this. I thought about the last time I’d seen Rourke’s name, before they scrubbed him from the active rolls. How a man could go from asset to threat in the space of a single bad week.
I thought about what it would mean to be erased. My hand hovered, latex creasing at the knuckle. All I had to do was push down. Finalize. Instead, I pulled my hand away, slow and careful, as if the very air might break. My fingers found the edge of the desk and held on.
The screen blinked. The kill order waited, patient as a guillotine. I sat there, in the glass cage, breathing in time with the machines, pretending that hesitating didn’t have a cost.
I sat there for a full thirty seconds, inventorying the cost of inaction. Then, with the kind of slow-motion inevitability reserved for car crashes and high-level betrayals, I pulled my hands to my lap and started digging.
If you ever want to know how someone really feels about their job, watch what they do when no one is looking. My micro-gestures: right leg bouncing under the desk, left thumb flicking a ridge in the latex glove, nostrils flaring at each new whiff of institutional antiseptic. But my eyes, my eyes never left the screen. I didn’t start with the flagged summary. I started with the backup. Always start with the backup.
A second workstation sat under my desk, networked off-books, used officially for “sandbox analysis” and unofficially for anything that needed plausible deniability. I booted it cold, let the VPN handshake bounce me through six nodes before coming back home. Then I cloned the Ghost Protocol request from my main terminal, pasted it into a fresh partition, and set the workstation’s onboard RAM to autowipe every ten minutes.
You’d be surprised how often government security depends on the enemy being lazy.
I parsed the kill order, byte by byte, reading through the metadata headers. Everything looked clean, until it didn’t. The originating directive was supposed to come from the Compliance Group, a toothless oversight committee that never met in person. But this order skipped them entirely, routed straight from the Director’s office. I checked the digital signature: M.Hale.
I didn’t know the man. But I knew the legend. Mason Hale was the type to keep secrets from himself, just to stay sharp. The more I scanned, the less sense it made. I cross-referenced the time stamp on the Ghost Protocol with the most recent activity flag on Rourke’s file. There was a gap, twenty-seven minutes, unaccounted for. In the world of digital security, that was a lifetime.
I dug deeper.
Rourke’s record was a rabbit warren of trauma. His unit’s ambush, classified as “Event Blackstart”, was one of the worst in the agency’s private history. Three men killed, one missing, and Rourke himself on the wrong end of a court-martial. The reports were almost comically over-redacted, but even through the black bars you could see the shape of something ugly: evidence buried, command failures laundered as “unavoidable incidents.” Rourke had tried to push back. He’d sent complaint after complaint, each one vanishing into the void.
Except they hadn’t. They’d just been diverted, funneled up and out, flagged with “CRITICAL - DO NOT DISTRIBUTE.”
I flipped through the mission logs, half-expecting them to start vanishing as I watched. The standard after-action report from the Dammstadt op was there, but in place of the usual five pages of bureaucratic nothing, there was a single paragraph:
OPERATION FAILURE. ALL ASSETS LOST.
FURTHER INQUIRY PROHIBITED.
I checked the attached list of personnel. Three names, all with a neat “KIA” next to them. Rourke’s was the only one marked “SURVIVED.” No reference to debrief. No chain-of-command investigation. Just… nothing. I started to sweat, a single bead gathering at my temple before the air conditioning made it dry.
None of this followed the agency’s standard playbook. We were supposed to be obsessed with redundancy, with records, with plausible deniability. Even our screw-ups were catalogued six different ways, so they could be cited at annual review. But this was a digital black hole.
I checked the file again. The timestamp on the Ghost Protocol request wasn’t just anomalous; it was after Rourke’s last recorded log-in to the agency’s mainframe. Not possible. He shouldn’t have had access. Not after they pulled his badge. Unless someone let him in.
I pulled up the access logs from the night. The mainframe showed a single unauthorized access at 01:42:11, flagged but never escalated. I scrolled through the error message, then parsed the back-end code. The IP was local. The login credentials belonged to a dead man. I swallowed, my throat suddenly raw. The name on the dead man’s badge was one of Rourke’s unit. The same man who’d supposedly bled out in the mud outside Dammstadt.
My hands started to shake for real this time. Not fear, not exactly. More like a sense that the rules of the game had been changed mid-play, and nobody told the players. I toggled back to the kill order, re-read the language with fresh eyes. It wasn’t just a deletion. It was a firebreak, a way to cauterize the wound before it spread. The kind of order you issue when you’re less worried about the traitor and more about what he knows.
Behind me, a faint click sounded at the biometric scanner on the office’s only door. I twisted around, trying to look casual as the security light blinked from red to green, then back again.
No one entered. Probably just a false read. Or a warning. I tabbed back to the secondary screen. My secure partition was set to self-delete in under three minutes. That was my window.
I scanned for any other discrepancies. That’s when I found the string of internal memos, all flagged “Director Eyes Only.” Most of them were just noise, but the third one down was different. It read:
RE: GHOST PROTOCOL - CASE FILE: ROURKE, JACK
From: Director Mason Hale
To: COG_SEC, SIA
Date: [REDACTED]
Proceed with maximum discretion. No outside notification.
Possible internal leak, contain it at source.
Disregard all standard audit procedures until further notice.
Below the signature line was a long, unbroken stretch of whitespace. Hidden text, maybe, or a blank meant to be filled by hand. In the margins, a single sentence: “Remember what happened to the last one.” I closed the memos. Stared into the blue wash of the monitor, letting my vision blur until all the lines merged into one.
The pieces fit, but they didn’t make a picture. Not yet. But if there was a leak, and the Director himself was running the clean-up… that meant someone was about to go looking for the next weak link… me.
I copied the core files onto a fresh drive, encrypted it with a key only I would know, and slipped it into the seam of my boot. My breath was coming too fast, fogging the inside of my mask. I shut down the workstations, wiped my prints from every surface, and pulled my blazer tight as I stepped out of the glass cell and into the liminal corridor of midnight agency.
Somewhere down the hall, a door opened and closed. I walked the opposite way, footsteps perfectly measured, posture immaculate. I had a name, a file, and twenty minutes before someone noticed the holes in the net. That would be enough.
I lasted ten minutes outside before I started talking to myself.
The agency parking garage was the only place on campus that wasn’t monitored by wall-to-wall biometric cams, though you had to know the blind spots and not linger near the glass-walled security booth. Concrete walls, paint flaking off the support pillars, the stench of chemical deicer and decades of burnt brake pads. Third shift, nobody else here but the security guy two levels up, hunched in his booth with an eyeline that stopped a full car length short of my spot.
I paced the perimeter, kept close to the shadows, eyes tracking the red hazard lights on the columns as if they were counting down to detonation. “Fucking protocol,” I muttered, hands deep in blazer pockets. “Fucking blacksite garbage.”
It didn’t help. If anything, vocalizing the words just made the guilt settle harder at the base of my skull. I was supposed to be the failsafe, the cleaner, the one who noticed when the process started to mutate into something else. That was why they promoted me. Why my mentor had picked me, all those years ago, out of a lineup of pliable Ivy League clones.
Now I was the deviation.
I paused by the stairwell and leaned back against the cold steel rail. My reflection in the polished metal looked wrong: jaw set too hard, eyes bright with the shine of someone about to confess. I pulled off one latex glove, then the other, flexing my fingers until the numbness subsided.
My thoughts looped in endless recursion: Authorize and keep your job. Don’t authorize and end up like Rourke. I remembered the mentor, eyes sharp and unwavering, voice as brittle as old acetate: “Never let the system make you complicit, Connors. It can’t forgive you.” I wondered what he’d say now.
A siren howled in the distance. Not close, not urgent. But I imagined it was for me anyway.
My phone buzzed, a calendar reminder, nothing more. But the vibration set off a fresh wave of adrenaline, heart jackhammering against my ribs. I checked the time. I’d already burned seven of my twenty minutes.
I made up my mind in the next three steps. If you’re going to do something irrevocable, do it on your own terms.
I walked back to the elevator, jammed the call button three times, and slipped into the cab as soon as the doors parted. The mirrored walls made it impossible not to see myself, so I stared at my shoes, gray and sensible, unblemished except for the wet from melted snow.
The ride up felt longer than it was. I imagined the building waking up, security systems spooling to life, a network of invisible sensors mapping my every micro-movement. I hummed a tune under my breath, just to fill the silence.
Back on my floor, I took the service corridor to avoid the main entrance and keyed into the office using my secondary badge. The room was exactly as I’d left it, the blue glow from my screens now joined by the orange threat-level LED at the corner of my monitor. A new alert. The clock was ticking.
I sat, hands poised above the keyboard, and started to work.
There’s a rhythm to building a back-channel that’s almost like prayer. You move slow, layering proxies like insulation, then test the walls for leaks, then repeat. I let my fingers do the thinking, typing strings of nonsense that only made sense if you’d been trained to see patterns in chaos.
I set up an encrypted relay: piggybacked on a nonprofit’s server in Bratislava, rerouted through two darknets, then back into the city grid via an orphaned government fiber line. I didn’t even need root access; I’d mapped the vulnerability last year, hoping I’d never need it.
Next, I built a burner out of the junk drawer in my desk: old SIM, recycled microcontroller, spare lithium cell. I soldered it together in less than three minutes, hands only shaking a little. Then came the hard part: wording the message so it didn’t immediately get flagged by the internal censors. I rehearsed three drafts in my head before settling on the fourth.
The text was simple:
Ghost Protocol activated. 48-hour window.
Safe zone coordinates follow. Agency movement schedule attached.
Verify identity with the phrase “Monarch butterflies migrate south.”
This is a one-time channel.
I typed it out, fingers steady despite the sweat pooling on my brow. I double-checked the code. Triple-checked. Then I loaded the encrypted package with the intel I’d pulled from the memos and access logs, and tacked on a GPS marker to a safehouse I knew Rourke would recognize.
My thumb hovered above SEND. In the blue glow of the screen, I saw my own face: slick with sweat, hairline in disarray, eyes wide and unblinking. The camera in the corner blinked its little red eye, recording everything.
I pressed SEND. The message vanished into the ether, no evidence left but a ghost of a ping and the faint chemical burn of adrenaline in my blood. I shut down the burner, yanked the battery, and crushed the SIM under the heel of my shoe. I wiped down every surface with a bleach wipe and sprayed the inside of the office with a can of air freshener, just in case.
I stared at my hands. They shook now, but it didn’t matter. The die was cast. I stood, slipped my blazer back on, and walked to the glass wall. The city outside looked pale and unreachable, all reflected lights and infinite regress. I counted the seconds, waiting for someone, anyone, to burst in and call me out. But the room stayed silent. After a minute, my pulse started to slow. I almost believed I’d gotten away with it.
Almost.
I watched the horizon, waiting for the morning shift to arrive, feeling the full weight of what I’d just done settle into my chest like a bomb waiting for detonation. It was a strange kind of peace.
After the adrenaline wore off, I did what every analyst in my position does: I erased myself from the timeline.
It was almost beautiful, how simple it was to make the logs lie. All you had to do was understand what your own IT security expected you to do wrong, and then do it one layer deeper. I wrote myself three fake coffee breaks. I inserted a plausible access attempt from a neighboring terminal. I set up a cron job to spike CPU usage at exactly 04:03, so if anyone checked, it would look like a resource glitch instead of a data exfil.
I redirected the security cam feeds for a seven-minute interval, just enough to create a “blind spot” but not so much that it would trigger an alert on its own. I left my main console open, screensaver running, then took a slow lap around the floor before returning.
For plausible deniability, I even visited the bathroom. Left my phone on the desk, badge in my pocket, hands washed twice before I stared into the mirror and rehearsed a single, neutral expression. I practiced my smile until I couldn’t tell if it was a smile or just bared teeth.
Back at my desk, I straightened my blazer, wiped a bead of sweat from my hairline, and forced my pulse under the magic threshold of “calm but engaged.” The first arrivals from the morning shift started to trickle in, coats damp with sleet, voices low and exhausted.
I let myself blend. Ten minutes later, a flash message scrolled across the bottom of my screen: “Director on site.” I felt the blood drain from my face, then rush back in a tidal wave of heat. I wiped my hands on my skirt, squared my shoulders, and pretended to be engrossed in the daily feeds.
He was exactly as they described him: tall, silver at the temples, posture that could snap steel. He moved down the hall like the threat was always in the next room, not behind him. His eyes locked onto mine for a split second as he passed, and in that instant, I felt the calculation happening behind them. The ledger of debts, risks, and leverage. The man had built his career on reading people like me, people who thought they could outmaneuver the system.
“Morning, Connors,” he said, voice smothered with honey and velvet. “Morning, sir,” I replied. I let the syllables roll out slow, even, just a trace of exhaustion. He smiled. Not at me, at the idea that I was exactly what I appeared to be. Then he was gone, striding toward the conference suite at the end of the corridor. I waited a full sixty seconds before I exhaled.
The rest of the shift passed in a trance. I flagged a few anomaly reports, cross-checked two more names, and filed a performance review for an analyst I’d never actually met. I built myself a wall of routine, so that when the inevitable audit came, I’d look like just another cog grinding away at the impossible.
At 09:00, I locked my screen and walked to the elevators. The city outside was still gray, sidewalks glazed with last night’s sleet, but I relished the burn of cold air on my face as soon as I stepped through the lobby doors.
My car was still parked in the same spot, dusted with a thin crust of road salt. I unlocked the driver’s side, tossed my bag onto the passenger seat, and slid behind the wheel. The first thing I did was check the back seat. Old habit, but not a bad one. The second thing I did was sit, keys in my lap, and stare at my own hands. They looked steadier than they felt.
I turned on the ignition. The engine coughed to life, radio blaring some inane weather update. I dialed it down to static, then turned it off entirely.
I reversed out of the garage, merged onto the city street, and watched the rearview mirror with the same intensity I’d once reserved for terrorist threat assessments. Every white sedan looked like a tail. Every jogger on the sidewalk is a potential spotter.
I didn’t go straight home. I never did.
I zigzagged through the city for twenty minutes, then cut across the river and circled a block before finally parking in front of my apartment. The street was empty except for a city truck and a neighbor shoveling their walk.
I killed the engine, then reached under the passenger seat. My fingers closed around the grip of a compact Sig Sauer, the metal cold and oddly comforting. I palmed it, then slid it into my coat pocket, just in case.
I walked to the door, keyed in my building code, and didn’t relax until I was in the sanctity of my own four walls, deadbolt thrown, privacy chain latched. I closed the blinds, unplugged every smart device, and sat on the edge of the sofa, staring at the message indicator on my private phone.
No new messages. Not yet. But I knew they would come. I leaned back, closed my eyes, and counted the number of seconds it would take for everything to fall apart. Somewhere out there, Jack Rourke was alive for forty-eight more hours. Maybe less.
And I had just painted a target on both our backs, with no hope of washing it off. It was almost funny. I laughed, once, short and loud, before swallowing it down and starting to plan.