Chapter 35: Sarah's Mission
[Castle — November 21, 2007, 9:00 AM]
Beckman's briefing was routine. Standard operational cadence — new intelligence, new targets, the ongoing process of converting Tommy's captured data into actionable operations. The screen displayed financial architecture: shell companies, numbered accounts, the monetary circulatory system that kept Fulcrum's surviving cells funded and functional.
"The San Diego node," Beckman said. A section of the financial diagram highlighted in red. "Fulcrum's primary money laundering operation for the Pacific Southwest. Tommy's data identifies three accounts totaling eighteen million dollars, routed through a commercial real estate firm called Pacific Meridian Holdings."
The Library cross-referenced. Pacific Meridian appeared in the Intersect's financial intelligence database — flagged eighteen months ago, subsequently unflagged by someone with administrative access. The same pattern as Webb, Torres, and a dozen other Fulcrum assets whose flags had been systematically removed by compromised officials inside the intelligence community.
"The operation requires close-proximity infiltration of Pacific Meridian's main office," Beckman continued. "Their security is financial, not physical — the cover is legitimate enough that armed entry would trigger law enforcement response before we could secure the evidence. We need someone inside the building, accessing the servers, extracting the financial records before Fulcrum can relocate the funds."
Sarah straightened. The assignment profile was tailor-made for her — social engineering, close-quarters infiltration, the kind of operation she'd been running since Langston Graham recruited her out of her father's con artist stable. This was Sarah Walker's native terrain.
"Solo?" she asked.
"Solo. The cover requires a single operative. Pacific Meridian is hosting a hiring event tomorrow afternoon. You'll attend as a candidate, gain building access, and access the servers during the interview process."
"Understood, General."
The screen went dark. Sarah was already moving — pulling operational files, reviewing the building schematics, assembling her cover identity with the practiced efficiency of a woman who maintained a wardrobe of alternate selves the way other people maintained a wardrobe of shoes.
I sat at the briefing table and the Library screamed.
Not literally. Not a sound. A cascade of cross-references — pattern matches, probability flags, the accumulated weight of seven weeks of tracking Fulcrum operational behavior converging on a single conclusion that lit up my internal architecture like a circuit overloading.
The timing was wrong.
Tommy's data had been captured five days ago. The financial intelligence was genuine — the accounts, the shell companies, the Pacific Meridian connection. But the active node designation — the classification that Pacific Meridian was still operational, still processing Fulcrum funds, still worth infiltrating — came from the captured data itself. And Tommy's data had been compiled before his arrest. Before his cell was dismantled. Before the Fulcrum remnants had three days to reorganize.
In those three days, the remnants had done exactly what I'd predicted during the celebration — they'd reviewed Tommy's dossier, identified their vulnerabilities, and begun adapting. The question was: had they adapted passively, by shutting down compromised assets and retreating? Or actively, by converting compromised assets into traps?
Pacific Meridian was listed in Tommy's data as a live target. The remnants knew we had Tommy's data. They knew we'd prioritize financial infrastructure for disruption. And they knew — from Tommy's dossier — that Team Bartowski's intelligence pipeline made them remarkably efficient at converting captured data into operations.
If the remnants wanted to strike back, they'd leave Pacific Meridian active. Staff it with operatives instead of accountants. Wait for the team to send someone in.
Wait for Sarah.
The Library's probability assessment materialized: sixty-eight percent likelihood that Pacific Meridian had been converted from a financial operation to an ambush site within the past seventy-two hours.
Sixty-eight percent wasn't certainty. It wasn't even the seventy-one percent that had preceded the motel breach. But the motel breach had taught me what sixty-eight percent felt like when it turned out to be right.
I found Sarah in Castle's prep area, building her cover identity's wardrobe from a rack of civilian clothing the CIA maintained for exactly this purpose. She held a blazer against her torso, checking the fit in a mirror bolted to the wall.
"Don't go."
She didn't turn. "Excuse me?"
"The San Diego operation. Don't go. Or take backup — Casey, me, anyone. Something's wrong with this assignment."
Now she turned. The blazer dropped to the chair beside her. Her expression was the particular blend of professional offense and personal irritation that surfaced when someone questioned her operational judgment.
"Something's wrong with a standard infiltration of a financial target identified through confirmed intelligence?"
"The intelligence is five days old. Tommy's remnants have had seventy-two hours to adapt. They know we have Tommy's data. They know we'll target the financial infrastructure. Pacific Meridian is the most obvious target on the list — it's the highest-value node with the simplest infiltration profile. If they wanted to set a trap—"
"If they wanted to set a trap, this is where they'd put it." Sarah finished the sentence with the flat certainty of someone who'd already run the calculation and dismissed it. "I'm aware. I've been doing this since I was seventeen."
"Since your father taught you to run three-card monte on marks who outweighed you by a hundred pounds. I know." The words came out before I could filter them. Sarah's expression shifted — the mention of her father, again, from a man who shouldn't know those details. I course-corrected. "Your file mentions the recruitment background. The point is: you're good enough to handle normal threats. This isn't normal. The remnants have the Prophet dossier. They know how we operate. They'll be prepared for our methodology."
"They'll be prepared for your methodology," Sarah said. The emphasis was precise. Surgical. "The dossier profiles you, not me. My tradecraft isn't in Tommy's files because Tommy never analyzed me — he was focused on the leak. On you." She picked up the blazer. "I appreciate the concern. But I don't need you to protect me from my job."
"Sarah—"
"Don't." One word. The same sharp edge she'd deployed at the diner when I'd lied about the hand gesture. "You've been right about a lot of things. That doesn't make you right about everything. And it definitely doesn't give you the authority to override a Beckman-sanctioned operation because your gut says it's wrong."
She walked past me. Close enough that the Party Link stirred — the faint awareness of her consciousness, still sealed behind the glass wall, but the wall was thinner now. Thin enough that I could sense the emotion underneath: frustration. Not at the warning. At the way the warning had been delivered. From above. From a position of assumed authority over her safety.
The consulting instinct. The control issue the character bible had diagnosed months before this moment had arrived. Slade's crisis management background makes him want to fix everything. He struggles to let situations develop naturally, struggles to trust others to handle things without his intervention.
Sarah didn't need me to protect her. She needed me to trust her. And I'd just demonstrated, in front of a clothing rack in a CIA bunker, that the trust I offered had conditions attached.
She left Castle at eleven. Her rental car — a silver Mazda, nondescript, California plates — pulled out of the Buy More parking structure and headed south toward the I-5. San Diego was two hours away.
I stood at the Castle exit and watched her taillights disappear around the corner.
Sixty-eight percent. The Library held the number in my awareness like a stone in a shoe — ignorable if you were walking, unbearable if you stopped.
I didn't stop. I walked back into Castle, sat at the briefing console, and began pulling every piece of intelligence I had on Fulcrum's remnant operations in the San Diego area.
If Sarah was right, the mission was routine and I'd spent thirty seconds of social capital for nothing.
If she was wrong, I needed to be ready to move before the wrong became permanent.
Read the raw, unfiltered story as it unfolds. Your support makes this possible!
Find it all at patreon.com/Whatif0
Timeline Viewer ($6): Get 10 chapters of early access + 5 new chapters weekly.
Timeline Explorer ($9): Jump 15-20 chapters ahead of everyone.
Timeline Keeper ($15): Get Instant Access to chapters the moment I finish writing them. No more waiting.
we just added free chapters on unwrittenrealm.com — plus the whole novel is translated into 14 languages. read it in your language for free.
