Copyright © 2025 by Christie Winter

All rights reserved.

No portion of this book may be reproduced in any form without written permission from the publisher or author, except as permitted by U.S. copyright law.

THE ghost protocol

Chapter 21: Ellis' Choice

Some mornings in the Agency’s upper annex felt like judgment day: silent, white, and lit with the kind of cold that made your teeth ache. I started my shift at 0700, exactly seven minutes before protocol required, and spent the first three reorganizing the pens in my caddy until the blue gels outnumbered the black. You had to control what you could, in this job. The rest was chaos by design.

My desk, cube 24-A, was an altar to order. Three procedure manuals, Security, Confidentiality, and Protocol, were stacked left to right in order of publication. Badge clipped to my breast pocket, the photo still perfect. The desktop is set to a navy hex code so dark it reads as black unless you squinted. Two framed commendations on the wall, glass so polished you could cut a finger on the edge. I ran a thumbnail along the surface, felt the bite, and left a little oil smudge as a fingerprint. My one rebellion, for the day.

The morning’s docket was flagged red, the only case up for full internal review. I didn’t need to check the queue; it was always like this, before a cull. The digital folder blinked at the top of my secure intranet, the subject header blocky and severe: GHOST PROTOCOL / ASSET: ROURKE, J. / PRIORITY: TERMINATION / INTERNAL AFFAIRS LIAISON – ELLIS, M.

I double-clicked.

The window filled with the kind of bureaucratic necropsy I’d spent a career perfecting. Jack’s file was a living organism: rows of cross-linked incident reports, appendices in triplicate, six levels of supervisor sign-off. It was too much detail, and the first thing that flagged in my mind was the unnatural neatness. Every event had a witness, every action a timecode, each injury an EKG trace. At first glance, a masterpiece of documentation. But as I read, my left hand started to tremble.

First anomaly: Vienna. The After-Action logged Jack’s team as present at the breach site at 02:13:22, with visual confirmation from a street cam three blocks away. The attached still showed three men in black jackets, one with a limp. All plausible. But the time stamp on the raw feed, a detail no one in the chain was supposed to ever check, was off by five minutes. I felt it like a pebble in the shoe. Someone had deliberately overwritten the digital tag, then pasted the photo in at the new time.

Second: the Warsaw contact. A witness statement, supposedly from an asset wrangler named Marquez. The language was wrong, the syntax stripped of regional markers, as if run through a sanitizing algorithm before hitting the database. I did a shallow search, found no other matches for Marquez’s phraseology in any Agency traffic for the previous two years. The statement itself read more like a textbook than a lived event.

Third: The suppression order. Buried at the bottom of a personnel file, it was an unsigned memo referencing “Rourke’s ongoing liability to field integrity.” The text was perfect, the wording pure SDIA, but the document history had no previous drafts. All real memos had at least three versions, as managers squabbled over adjectives. This one had no genealogy. It was born full-formed, Athena from the head of some digital Zeus.

By now, the tremor had spread from my hand to my jaw. I clenched my teeth, tasted yesterday’s coffee and the copper tang of adrenaline. I scrolled to the final section. Internal Affairs Notes: Sarah Connors, Acting Case Supervisor.

I’d met Sarah only twice, both times at in-house debriefs, both times she’d been too precise, too careful. She was a bureaucrat’s bureaucrat, but her notes had a flavor of actual humanity under the jargon. Here, in a margin comment, she’d written:

Data inconsistencies in this log. Source identities may have been algorithmically homogenized. Recommend manual audit.

The next day, she’d been reassigned. No forwarding address. No active directory listing. Her name blinked once in the email log, one last midnight send to “self”, then was ghosted from the system.

For a second, I stared at my own name at the top of the file, and wondered if the system kept a shadow folder on me, too. Some other analyst, three cubes over, watching me click through the stages of my own elimination.

I adjusted my tie, which had somehow crept off-center by two millimeters, and forced myself to relax my shoulders. This was not my first cull, not even my tenth. But it was the first time I doubted the evidence as presented.

The auto-light above my desk flicked from cool white to interrogation amber, and I felt my pulse thump in my neck. A digital alert scrolled at the bottom of my screen:

SECURITY LEVEL GAMMA: ALL ACTIVITY MONITORED. SENSITIVE DATA ACCESS RESTRICTED TO AUTHORIZED PERSONNEL ONLY.

I hovered my cursor over the “Terminate Asset” button. It glowed, a sick blue.

Instead of clicking, I slid my chair back exactly one foot, stood, and paced the perimeter of my cubicle. I catalogued every flaw in the carpet tiles, every hairline crack in the ceiling paint. There were six, all radiating from the emergency sprinkler.

When I sat again, I found my hands damp. I reached for the bottle of hand sanitizer and realized I’d already emptied it earlier that week, the pump dry as a bone.

I typed a quick note to myself, just a string of digits, the old case number from the Vienna file, then started a full manual audit. There was no better way to commit career suicide, but the logic of it was a siren song.

I pulled the mission logs, the ones marked “PROTECTED – NO FORWARD.” There was a pattern, obvious now: every time Jack had gotten close to a live Phoenix operation, a data incident followed. Not always immediate, but always deliberate. Names redacted, locations fuzzed, evidence scrubbed with a digital bleach that left a distinct, agency-only signature. I recognized the signature, because in a prior life, I’d helped beta test the early version. It was supposed to be a tool for plausible deniability. Here, it was a murder weapon.

Jack was being set up for erasure, not because he was a liability, but because he was the last living person who could see the pattern. I felt a cold pride, then shame. The workflow script hit its first deadline and popped an even brighter prompt:

GHOST PROTOCOL ASSET TERMINATION AUTHORIZED – ROURKE, J. – PROCEED IMMEDIATELY.

I wiped my palms on my slacks, leaving two neat streaks that would annoy me for hours. The camera in the corner clicked to life, its iris widening as if it could sense my hesitation. I ran the numbers, again. There was only one outcome left to me that had any integrity at all.

My hand hovered over the keyboard. I looked at the blue-lit faces of the other cogs in their glass boxes, none of them looking back. Then I opened the Vienna folder and, in a move so out of character I almost laughed, I flagged it for “Forensic Review – Potential Data Breach.”

I knew what would happen next. I had at most four minutes before Security traced the flag back to me. Less, if they were on high alert. I straightened my tie. I re-aligned the pens in my caddy. I signed my name, in the neatest cursive, to the bottom of the audit request.

And then, before my resolve could wither, I reached for my badge and tore it from my lapel. The photo stared back at me: a man too clean, too careful, with the eyes of someone who still believed rules could save you from anything.

I dropped it on the desk. For the first time in a decade, I didn’t feel like a fraud. I left the cubicle with my head up. The camera followed me, unblinking. On the elevator, I met my reflection and gave it a smile, thin, dry, but real.

Ghost Protocol could have its cull. But I wasn’t going down without leaving a stain on the glass. The next move was mine.

~~**~~

When the first breach klaxon went off, the entire admin block shifted from normal paranoia to code orange. Every door locked, every terminal screen blinked to black, and the hush that followed was the kind you could only describe as predatory. I’d seen five of these drills in ten years; none had ever lasted more than seven minutes. This one felt different. I could tell by the way the custodial staff pressed flat against the glass, or how the perimeter guards unconsciously positioned their hands closer to the sidearms they’d never once had to unholster.

I sat in the open plan, dead center of the panic, watching the cube farm empty as supervisors called their teams to huddle at the exits. I made no move to join them. I kept my hands visible and my breathing shallow. As the seconds stretched, my palms prickled with the slow build of sweat, the skin between my shoulder blades suddenly alive with static.

Protocol for a breach was simple: all systems lockdown, all access logs rerouted to a single master node; oversight, not security, always wanted the raw data. What the rookies didn’t know was that, in the two minutes after lockdown, a window opened for Tier-2 access before the main relay was fully rerouted. It was meant to allow top users to flag errors or purge malware, but it also let you see the logs as they came in, unfiltered, before they were cleansed of the good stuff.

I’d learned about the gap from the IT rep, a guy named Hershey, who’d spent three months assigned to our wing before getting promoted to “special projects” and never seen again. He’d described it as a “birthday treat for anyone with a reason to care.” I hadn’t cared then. Now, it was all I had.

I logged in, bypassed the usual two-factor with my IA override code, and watched as the alert folder overflowed with incident reports. My heart jacked up a gear. In the list, a dozen assets had triggered proximity alarms in the last seventy-two hours. Four were dead, three “retired,” and the others flagged as noncompliant. I recognized the names: men and women from prior operations, all with connections to Jack, or to the Zurich and Vienna jobs.

I ignored the first hundred lines, looking for the real root: Ghost Protocol.

There it was, buried three layers deep, a sequence of termination orders, all within the last month, all tagged with a reference chain that looped back to Black Phoenix ops. I cross-tabbed the reports with internal personnel actions. Every single one of the erased had, in the three weeks prior, initiated a query on Phoenix activity. It was systematic. Even the redactions matched a unique pattern of character replacement in the digital logs that, to the untrained eye, looked like a compression artifact. To me, it was a signature. And the signature belonged to Mason Hale.

I found the motherlode in the Vienna packet, the one I’d flagged earlier. Forensic analysis, unsigned, but the meta-data was intact: the terminal used to rewrite the incident belonged to the Executive Suite, Office 7-B. Hale’s personal login, his encryption, his timestamp. In a rush of nausea, I realized the last kill order had been authorized directly from the Director’s office, with a note to “expedite and ensure non-survivability of record.”

I pulled the files, one by one. The drive I used was a blank I’d been issued for home backups, and I’d never once used it, too risky. Now, my fingers shook as I slotted it in and watched the status bar creep, pixel by pixel, across the screen. As I waited, I checked the live security cam feed for my quadrant. There was no one near my desk, but the black dome of the recorder in the corner seemed to lean in, narrowing its gaze.

My jaw locked, and I had to roll my neck to break the tension. I wiped my forehead with the back of my hand. The sweat there was cold, almost sticky, like the air in the morgue where they took failed assets for “post-exit processing.” The memory came sharp: the hum of refrigeration, the white slab, the techs in powder-blue gloves doing their best not to meet your eye.

A soft chime: download complete.

I yanked the drive, double-checked the copy. Everything was there. The files were dirty, some would need reconstructing, but the core evidence was intact. I dropped the drive into the inner pocket of my jacket, next to my credential badge. For a second, I considered leaving the badge on the desk, but the logic of survival won out. The badge might get me five more seconds in a chase.

I logged off, blanked the terminal, and did a quick scan of my area. Nothing amiss except the bead of sweat rolling down my temple. I watched it splatter onto the marble-patterned desktop, then traced the run with my finger.

The breach alarm finally cut out. The air rushed in, as if the building itself had been holding its breath. The main doors unlocked with a click, and the supervisors returned, herding the personnel back to their cubes like sheep after a false alarm. I joined the flow, my own movements slow and practiced, neither hurried nor lagging. My hands were steady now, but the skin felt too tight, as if my body were one size too small.

In the corridor, I spotted two plainclothes Security men heading for the elevator. Their jackets had the kind of crispness that said “shoot first, redact later.” I shifted my pace so I walked behind them, close enough to read the nervous tic in the taller one’s left hand. He was clenching and unclenching, knuckle white against the black sleeve.

At the glass double doors, I caught my reflection. Tie crooked. Hair a little mussed, like I’d been napping. My face was gray in the harsh light, older than I’d ever seen it. I fixed the tie, wiped the sweat from my brow, and offered myself the faintest nod.

When the guards vanished into the elevator, I peeled off, ducking into a side corridor near the old filing archives. It was a dead zone, built before they installed the full-spectrum surveillance net. Here, the air was hot, the bulbs orange, and the stink of dust and ozone masked the nervous sweat that still pooled at my back.

I slid down the wall until I was sitting, knees up, hands folded. For a moment, I just listened to the echo of my own pulse. I thought of the names in the logs. Jack. Sarah. The others, erased and expunged, their memories now just strings of metadata in a folder no one would ever see. But I’d seen it. I’d saved it. I’d crossed a line, and there was no un-crossing it.

Above, a distant PA system announced, “All-clear. Return to designated work areas. Security review in process.” I smiled, just a little. Let them review. In my jacket, the drive felt like a live grenade. The knowledge that I could, should, destroy it warred with the certainty that someone had to know the truth.

For the first time in my life, the rules felt like sand in my mouth. And I was hungry for something I couldn’t name. I stood, dusted off my pants, and walked back into the light. There was still work to do.

~~**~~

I chose the parking garage two miles from HQ for the meet. Anonymous, but not invisible, perfect for a conversation you never wanted to happen, but couldn’t risk not having. The upper levels were bathed in sodium glare, but B3 was a world of its own: hard cement, paint flaking from the numbered pillars, and the smell of spent antifreeze pooling in oil-black puddles along the ramps. I parked in a corner spot with open sight lines and waited.

Sarah showed up eleven minutes late, which was on time for anyone who knew her. She did a three-lap circuit, each pass in a different rental, and only stepped out after she’d idled beside my car long enough to confirm I wasn’t followed. Her shoes echoed on the concrete, sharp and rhythmic, and she stopped six feet from my window, letting the silence hang until I buzzed the passenger door.

“Cute,” she said, sliding in, not looking at me. “You know they sweep these decks every hour for loiterers.” “I’m not loitering. I’m waiting for a colleague.” She huffed, a sound with all the warmth of dry ice. “Let’s get this over with.” I thumbed the drive from my pocket and set it on the console, but left my hand covering it. “They’re going to erase Jack in the next forty-eight.”

Her lips pursed, a quick spike of anger she caught and crushed before it could register on her face. “You’ve been on the asset suppression beat for three months. Don’t pretend you just now grew a conscience.”

“I read the Vienna file. I know it’s faked. The timestamp, the chain of custody, it’s all wrong.” “So?” she snapped. “You flagged it for review. Protocol’s still going forward. Why care?”

A diesel engine somewhere overhead backfired, the noise bouncing off the slab and reminding both of us we were talking in the world’s best echo chamber. I waited for the reverberations to fade before answering.

“Because every one of these terminations has the same digital artifacts. The wipe routine isn’t just covering Jack. It’s eliminating anyone who saw the Phoenix activity. Even you.” Her fingers drummed once on the console, then folded. “If this is a pitch for whistleblower sainthood, you’re about six years late.”

I wanted to say I was sorry, but I couldn’t manage the words. Instead, I slid the drive over to her and watched her weigh it in her palm, thumb tracing the groove where I’d almost snapped it in half earlier.

She powered up her own laptop, air-gapped, shielded, the screen privacy filter making it invisible unless you sat dead on. She plugged in the drive, and for two minutes, she read in total silence.

I let my eyes scan the mirrors, every couple of seconds, just in case. There were no cameras down here; I’d checked on my arrival. But that didn’t mean someone wasn’t watching.

Finally, Sarah looked up. Her face was whiter now, the control brittle but holding. “You traced the rewrite to the Executive?”

“Hale’s terminal, seven-B. It’s his signature on the entire operation. Ghost Protocol isn’t about national security. It’s a mop for cleaning up Phoenix leaks.”

She shut the lid with a snap. “How do you know this isn’t another layer? You said it yourself, they eat traitors for breakfast.”

“If it is, they’re using both of us as bait. Either way, I’d rather die on my own terms.” She considered that, eyes drilling into me. For a second, I thought she’d spit in my face, or call in a hit right there. Instead, her posture shifted: tension still there, but not all of it aimed at me.

“Assume I believe you,” she said, finally. “What’s your plan?”

“Warn Jack. He’s off grid, but if we time the next tracker ping right, we can slip a message in through the old Warsaw comm node. He’ll know it’s me; he’ll know what to do.” She shook her head, disbelief and admiration tangled in the gesture. “He’s been your white whale since Istanbul. Why warn him now?”

I stared at the windshield, the grid of sodium lights bleeding in orange veins down the concrete pillars. “Because he was always right. The system isn’t salvageable. If he survives, maybe someone will remember we weren’t all just algorithms.”

The echo of a car alarm three levels up gave us both a pause, heads cocked, listening. Sarah checked her watch, then slipped the drive into her jacket. “I’ll ghost out on foot, check for tails, and forward your drop. You have thirty minutes before the first response team sweeps this sector.”

She popped the door, then stopped, half out of the car. “Why the change of heart, Mark? Really?” I let the truth bleed out, one word at a time. “Because I realized I’m not the hunter. I’m just another target. And if we don’t help each other, there won’t be anyone left who knows how to fix it.”

She nodded, a slow, surgical movement. Then she was gone, footsteps receding into the drone of the HVAC and the faint, insistent drip of condensation from above. I waited, counting out one hundred and twenty seconds, then fired the engine and rolled toward the exit.

My hands were still sweating, but my pulse was steady. For the first time in weeks, I felt alive. Above, the world kept moving, but down here, we’d started something that couldn’t be erased.

Not this time.

~~**~~

Agency HQ was quieter on Wednesdays, the glass lobbies echoing with the kind of nervous energy that only happened when a kill order was in progress. I flashed my badge at the checkpoint, ignored the guard’s too-long look, and rode the elevator to the fourth floor, hands jammed deep in my pockets. I rehearsed the story I’d settled on during the drive back, my mind running the dialogue as if prepping for a tribunal.

The moment I logged into my cube, my desk phone lit up with a blinking blue. “Deputy Director Vance requests your presence, Conference Room 12-B, immediately.” I’d never liked Vance. He had the bloodless, close-shave look of someone who counted calories for pleasure and considered small talk a hostile act. His shoes always shined like mirrors, and the last time I’d seen him, he’d smiled while reading a kill list.

The conference room was ice-cold, the kind of HVAC chill that made your breath visible. Vance was already seated, tablet in hand, a glass of water to his right, untouched. The window blinds were closed.

“Mark,” he said, not standing. “Sit.” I did, folding my hands on the tabletop with deliberate calm. Vance didn’t waste time. “We noticed some irregular log activity during the breach. Your credentials accessed two restricted folders outside your assigned casework.”

I shrugged, the motion practiced. “There was a conflict in the Vienna packet. I flagged it for Forensic Review, as protocol requires.” He tilted his head, eyes narrowing. “And yet, your access lasted four minutes and twenty-seven seconds longer than needed to file a single report. Care to explain?”

“I was cross-checking for other data anomalies. Best to be thorough, with a case this sensitive.” He steepled his fingers, the classic move from page one of the intimidation manual. “Director Hale is deeply invested in a swift resolution to the Rourke situation. Any delay could reflect poorly on all of us.”

The implied threat hung in the air. My heart kicked once, hard, but my face didn’t move. “I understand the urgency.”

“You’ve known Rourke the longest. You were field partners. Some here might question your objectivity.” I smiled, small and dry. “On the contrary. That’s why I’m the best man for the hunt. I know his escape patterns. He’s predictable, once you remove the variables.”

Vance leaned in, lowering his voice a fraction. “We can’t afford variables. You have seventy-two hours to close this. If you don’t, it escalates above my pay grade.” He slid a folder across the table. “These are the last five confirmed pings on the target. Your task is to correlate and isolate. I expect a progress report by tomorrow morning.”

I opened the folder. Every page was annotated, dog-eared, and color-coded. The evidence was overwhelming, but a third of the facts were wrong, deliberately wrong, I realized. Vance was setting a trap, not just for Jack, but for me. See if I’d notice. See if I’d report the discrepancy, or fall in line.

“I’ll get you results,” I said, voice flat and certain. Vance nodded, then laced his hands behind his head. “One more thing.”

I waited.

“If you encounter any… unexpected behavior on Rourke’s part, psychological breakdown, attempts at contact, whatever, you notify me first. Not the chain, not even the Director. Understood?” I lied with a smile. “Of course.” He studied me for three full seconds, then looked down at his tablet. Dismissed.

I stood, straightened my tie, and walked to the door. My back was slick with sweat under the dress shirt. The weight of the drive in my pocket was a live wire now, but I forced my steps to stay even, my breathing slow. Out in the hall, I ducked into the nearest washroom and splashed water on my face, checking the mirror for cracks in my composure.

There were a few, but nothing fatal. Not yet.

I returned to my desk, opened the folder, and set about fabricating a false trail, one that would buy Jack the time he needed, and send Vance chasing phantoms in the Midwest. It was an old trick, but it would work if I seeded it with just enough truth.

As I typed, I imagined the slow, tectonic shift of suspicion as the Agency began to close in on itself, second-guessing every report, every interaction. I could almost feel the building vibrate with the coming collapse.

At noon, I sent the first “update” to Vance, careful to CC the usual chain. I crafted my language to be unimpeachable: direct, colorless, and factual, the way they liked it. All the while, I plotted how to disappear once the trap was sprung.

The final act would be ugly. But after today, there was no going back. My career was dead. All that remained was how loud the body would hit the floor.

~~**~~

The art of disappearing was all in the prep. I’d rehearsed every move in my mind a hundred times: what to wipe, what to keep, who to trust with the residue. The next twelve hours would be the last I ever spent inside the Agency. All that mattered now was leaving a mess nobody could untangle until it was too late.

I started with digital. I logged into my IA admin shell and set three cascading privileges on the main server, timed to hit at intervals no human would spot unless they were already watching for trouble. The first pass would reroute camera feeds in sectors five, six, and ten, the ones with the least foot traffic but the best sight lines to the loading docks and the archive wing. The second would spike a false biometric, mine, on two interior doors at once, making it look like I’d gotten lazy and started doubling up on coffee runs. The third, most important, would ghost-delete every trace of my login for the next six hours, slotting my movements in among the thousands of routine queries the building generated on a normal Wednesday.

I checked the badge clock: 0913. The halls were already bustling with the last stragglers of the morning rush. I grabbed a stack of bland manila folders and walked the perimeter, stopping at every terminal in my sector to sign off on the day’s “compliance reminders.” The routine was so familiar nobody looked twice at me; I was just the auditor, the paperwork ghost.

At the north stairwell, I peeled off and ducked into the old archive annex, one of the few dead spots left in the building’s sensor grid. Here, I keyed into an offline laptop, slotted in the drive I’d loaded the night before, and prepped the evidence for exfil. The data, every kill order, every suppression log, every Phoenix wipe routine, got zipped, encrypted, and seeded out to five cloud accounts, each one registered with a synthetic identity and a bounce-back address I controlled. The redundancy was overkill, but I’d learned from Jack: always plan for the backup of the backup.

I left the laptop open, a script running to overwrite every sector of the disk when I triggered it remotely. The final fail-safe. Next was the message.

I used Sarah’s private drop, the one she’d set up for whistleblower leaks when she still believed the Agency could be reformed from the inside. It would ping her phone in whatever safehouse she’d holed up in, then bounce to Jack through the relay nodes they’d used in the Balkans years ago. It wasn’t elegant, but it was the only channel not poisoned by Director Hale’s net.

I kept the message short:

Ghost protocol is live. Do not return to HQ. I will burn the Phoenix files at 1800. Follow Sarah’s lead. -M.

I encrypted it, clicked send, and wiped the draft. Two seconds later, it was gone from every log except the rolling buffer I controlled. At my cube, I stripped the walls of every trace of myself: the commendations, the carefully aligned pens, the manuals, the sanitized badge. I left the badge dead center on the desk, face up. Next to it, I placed a sealed envelope with my real signature and a single line: “They’re not who you think they are.”

It was part confession, part middle finger. Someone would find it. Maybe it would matter.

I logged off for the last time, ran the purge script, and took one final look around the bullpen. Nobody even glanced my way as I passed through. That was the magic of a lifetime spent blending in, you could become invisible at will, as long as you never made yourself interesting.

Down the service corridor, I paused at the armory window. They expected everyone to check their service weapon at shift’s end, a last holdover from the days when half the building was ex-military. I considered leaving it behind, the gesture of surrender. But I kept it. There were still loose ends, and I’d rather decide my own ending than let Vance or Hale script it for me.

By the time I reached the lobby, the alarms were starting: soft at first, a warble in the background, then a full-throated klaxon. “Asset containment breach. All personnel remain at stations. Secure lockdown engaged.”

I walked into the chaos. Heads turned, some in panic, most in practiced indifference. I kept my pace steady, badge visible on the breast of my jacket, the manila folders clutched like a talisman. The guards at the front desk were too busy with the alarms to check my ID. I cleared the turnstiles and walked straight out into the morning, the sky too blue and the sun too bright for the shitshow I’d just set in motion.

At the parking lot, I thumbed the safety on my sidearm, loaded a fresh clip, and walked to my car. I could feel the eyes on me, invisible but real, as I slid behind the wheel and started the engine.

Before I pulled out, I typed one last message, routed through the burner phone I’d prepped the night before.

To: Rourke, J.

The hunter is now the hunted. Trust no one but Sarah. I’ll find you when it’s safe.

I tossed the phone on the seat, shifted into drive, and pulled away from the only home I’d ever known. In the rearview, the Agency loomed, glass and steel and secrets, but for the first time, I felt nothing for it. Not pride, not loyalty, not even hate. Only freedom, raw and wild, and a sense that if I survived the next twelve hours, I might finally have a shot at absolution.

Somewhere out there, Jack was running, and for once, I was rooting for the fugitive.