Page 9 of Code Name: Atticus

Page List

Font Size:

Tank presented manufactured financial profiles. “Your cover identities have been carefully crafted to hit their sweet spot. Successful enough to be valuable, but with just enough fiscal pressure to be potentially corruptible. Atticus’ cybersecurity consulting firm is struggling with cash flow due to delayed government contracts. Bronwyn’s venture capital fund is facing investor pressure for higher returns.”

“Both scenarios create plausible motivation for considering alternative income sources,” Dragon noted. “The kind of motivation that makes people susceptible.”

“Walk me through their recruitment process,” I said.

A flowchart appeared on the screen. “Three-stage op. First, they identify marks through casual conversation and observation,” Tank began. “They’re watching both spouses—financial stress, marital tension, any sign that a couple might be vulnerable enough to agree together.”

“At some point, targets receive what appears to be a legitimate business offer—consulting opportunities, investment proposals, even jobs,” Alice continued. “But these initial contacts are actually sophisticated spear-phishing operations designed to gather specific personal and professional information.”

“Spear-phishing?” I echoed.

“Targeted digital attacks,” she clarified. “They send emails that appear to come from legitimate companies or government agencies, containing links or attachments that install monitoring software on the receivers’ devices. Once they’re in, they can read emails, monitor keystrokes, access file systems, and essentially spy on everything that takes place digitally.”

“The spear-phishing attacks serve multiple purposes,” Tank continued. “They gather intel about the target’s weaknesses and pressure points, along with their digital behavior patterns. This information is used to design customized pitches that are almost impossible to refuse.”

“Stage three is where they present the actual deal,” Dragon explained. “Armed with information from phishing, they create elaborate scenarios tailored to each situation. Maybe a family member suddenly needs expensive medical treatment, or a child’s college tuition becomes unaffordable, or a business opportunity requires immediate capital investment.”

“That’s exactly what my investigation indicated,” Brenna confirmed. “They need to observe these people in the flesh to identify the psychological pressure points that will be most effective during the recruitment phase.”

She shifted topics. “I’ve been coordinating with Treasury on the financial intelligence aspects. Kodiak, you’ll be the liaison with Emma Sinclair, correct?”

Kodiak glanced up at me. “Assistant Deputy Secretary Emma Sinclair will be coordinating with us on the money trail. She’s, uh, highly experienced in complex money laundering investigations.”

Tank coughed to cover what sounded suspiciously like chuckling. “How many coordination meetings have you had with her?”

“A couple,” he mumbled, suddenly finding his notes fascinating. “She’s very thorough.”

“I’m sure she is,” Alice said with barely concealed amusement.

“Moving on,” said Brenna. “Let’s address technical support protocols. Alice, you mentioned you’ve enhanced your surveillance capabilities for this op?”

Alice accessed the details. “Correct. You’ll have concealed recording devices, GPS tracking, and emergency communication through modified smartphones with direct channels to our command center.”

I raised an eyebrow. “Backup?”

“Kodiak will be coordinating from a mobile command post within five minutes of the venue,” Admiral responded. “Tank and Dragon will be monitoring financial transactions and digital communications in real-time. Alice and I will manage overall operational oversight and inter-agency coordination. Additional support will be here in the event we need it.”

“What’s their typical timeline for follow-up?”

Dragon’s eyes met mine. “Based on their established pattern, if they’re interested, you’ll receive contact within seventy-two hours.”

“Good,” Brenna said. “Now, let’s discuss the specific systems at risk.”

I leaned back in my chair. “Which specific systems are they after?”

Alice highlighted classified documents. “Advanced military algorithms for autonomous systems, satellite communication protocols, and radar detection technology. All cutting-edge developments that would give foreign adversaries significant advantages in potential conflicts.”

“Their access point?”

“Through compromised defense contractor employees,” Tank explained. “They recruit people with security clearances who have direct access to classified development projects.Usually, technical staff, project managers, or security personnel who can bypass normal safeguards.”

Dragon raised her head. “That’s why the phishing component is so crucial. Overall verification. No point in bringing someone in who isn’t as well connected as they pretend to be.”

“The operational security concerns are significant,” Brenna warned. “These people have been operating successfully for two years without detection. They’re skilled at identifying law enforcement operatives, federal agents, and anyone else who doesn’t belong in their world.”

Alice loaded the behavioral analysis charts. “They’re looking for social markers—how you handle money, what you drink, how you interact with service staff, the way you discuss business opportunities. Any deviation from the expected behavior will raise their hackles.”

“And if we slip up?” I asked.