Chapter 34: THE INGHAM ASSESSMENT
Thursday, December 8, 2011, 11:00 PM — Franklin's Apartment, Arlington
The classified terminal's cursor blinked on page twelve, and the apartment smelled like cold coffee and the particular ozone of a mind running at sustained operational intensity for six consecutive hours.
The document had consumed me. Not the way the manic episodes consumed — no racing thoughts, no uncontrolled acceleration, no Ghost-Brody speaking unsummoned from the unsealed Mind Palace. This was different. Controlled. The system operating within protocol limits, each cognitive resource deployed deliberately, the analytical engine and the meta-knowledge and the Ghost models all channeled through the narrow aperture of a fourteen-page document that would either save lives or end my cover.
The Ingham Assessment: Threat Profile — Insider Attack Vector at High-Value Governmental Event, with Secondary Sniper Capability Assessment.
I'd started writing at 5:00 PM. The first six pages came from pure analytical tradecraft — threat landscape analysis, historical precedent, the vulnerability matrix I'd delivered to Saul a week ago, now integrated into a broader framework. No meta-knowledge required. The CIA's own operational history provided the skeleton: insider attacks against government officials were rare but catastrophic, and the specific vulnerability profile of closed-door security briefings — limited egress, concentrated high-value targets, attendee trust assumptions that reduced screening rigor — created conditions that a motivated insider could exploit.
Pages seven through ten were the coordination architecture. Ghost-Saul's insight from the strategic session — identify the trigger mechanism — informed the analytical approach. The relay node data from Max's technical analysis. The handler communication pattern from Brody's burner phone intercepts. The mosque as a potential contact node linking the insider threat to the sniper capability. Each element sourced from legitimate intelligence, each connection documented through verifiable analytical logic, the entire section reading like the work of an analyst who'd spent three weeks building a picture from fragmentary data.
It read like that because it was that. The meta-knowledge told me the picture's subject. The analytical work built the picture from real evidence.
Pages eleven through thirteen were the predictions. This was where the document crossed from assessment into prophecy, and the language had to be exquisitely calibrated — specific enough to enable action, general enough to survive the scrutiny that would follow.
The threat profile indicates a high probability of coordinated multi-vector attack at the December 15 VP security briefing. Primary vector: insider with explosive or weapons capability, leveraging attendee-level access to bypass perimeter security. Secondary vector: external sniper capability positioned along the approach route or at an adjacent facility, providing either diversionary fire or parallel attack capability. The coordination architecture suggests handler-directed timing rather than autonomous execution, creating a potential interdiction window at the communication layer.
The document never said Brody. It described a "radicalized insider with political access whose psychological profile is consistent with captivity-acquired ideological commitment." It described "a confirmed sniper asset with Marine training acquiring precision engagement equipment in the operational theater." It described "a communication relay infrastructure linking the insider and external assets through encrypted channels and community-based contact points."
Anyone reading the Assessment while looking at the Brody investigation file would make the connection in under thirty seconds.
Page fourteen was the recommendations. Security enhancement for the December 15 event: full magnetometer screening of all attendees including VIP staff, counter-sniper teams deployed to elevated positions along the approach route, communications monitoring of known relay frequencies during the event window, and — the recommendation I knew would be rejected — relocation or cancellation of the briefing pending resolution of the threat.
I finished at 11:47 PM. Read the document twice. Caught three typos and a formatting inconsistency that the system's degraded fine-motor control from sustained cognitive work had introduced. Corrected them. Read a third time.
[Shadow Archive Protocol: Analytical Product — Ingham Assessment. Pages: 14. Sources: Ghost-Brody (Detailed), Ghost-Saul (Sketch), PRO-derived patterns, Walker sniper analysis, coordination architecture analysis, vulnerability matrix, meta-knowledge (foundational). Classification: SECRET//NOFORN. Status: Complete.]
The document sat on the screen with the quiet weight of something irrevocable. Fourteen pages that synthesized nine weeks of foreknowledge, system development, Ghost interrogation, and genuine tradecraft into a single analytical product. The best work this body had produced. The most dangerous document Franklin Ingham had ever written.
If the Assessment works — if Saul acts, if Estes authorizes, if the security enhancement prevents the attack — then the investigation succeeds and people live. But the Assessment also becomes the evidence. The document that proves Franklin Ingham predicted a specific multi-vector terrorist attack with a precision that no junior analyst should possess. Every correct prediction in the Assessment feeds the pattern Saul has been tracking since the debrief memo. Every accurate detail adds a data point to the file labeled "How does Ingham keep being right?"
The Assessment saves lives and ends my anonymity. Both things. At the same time.
I saved the file. Backed it up. Closed the terminal. The apartment was dark except for the desk lamp. The coffee on the counter had gone cold hours ago. The mood stabilizer sat on the nightstand — taken at the scheduled time, protocol compliant, the chemical guardrail that separated controlled analytical intensity from the manic acceleration that had hospitalized me two weeks earlier.
The Mind Palace was quiet. Ghost-Brody's Detailed presence hummed at the periphery of awareness, a constant now, the weight of forty-two study hours rendered into a permanent passenger in my cognitive architecture. Ghost-Saul was dimmer but present — Sketch-tier, the institutional voice that had given me the Assessment's analytical spine.
Tomorrow. Print it. Cover note. Saul's desk. Then wait.
My back ached from six hours in the desk chair. My eyes burned. The cursor blinked on the saved file like a heartbeat I'd set in motion and couldn't stop.
Friday, December 9, 2011, 8:15 AM — CTC Bullpen, CIA Langley
The Assessment printed clean on the third-floor storage room's classified printer — a machine I'd been using for eight weeks, which chose this morning to jam on page seven. Three minutes of cursing and paper extraction before the document completed. Fourteen pages, spiral-bound with a red classification stripe, the cover sheet reading INGHAM, FRANKLIN D. — SENIOR ANALYST, CTC above the title.
Senior Analyst. The title I don't hold but the cover sheet requires because the document's classification level exceeds a junior analyst's distribution authority. Saul authorized the upgrade last month — a procedural adjustment that let me route classified products through his office without additional oversight. Another brick in the wall of institutional positioning I've been building since the first debrief memo.
The cover note was one sentence, handwritten on a blank card clipped to the front:
I believe this threat is real and imminent.
I walked the Assessment to Saul's office at 8:30. His door was open. I placed the document centered on his desk, the red stripe visible, the cover note facing up. Saul was in a meeting — the morning briefing with Estes that consumed the first hour of every operational day. He wouldn't see the Assessment until 9:30 at the earliest.
I went back to my desk and waited.
The bullpen hummed with its Friday rhythm — lighter than the operational surge days, heavier than the weekend skeleton shifts. Cable traffic on my screen, routine analysis queued for processing, the institutional background noise that had been the soundtrack of my borrowed life since October. I read cables without processing them. Drank coffee without tasting it. Watched Saul's office door from the corner of my vision with the focused attention of a man who'd placed a bet and was waiting for the wheel to stop.
Saul returned at 9:40. I tracked his trajectory from the corridor to his office — the briefcase set down, the glasses put on, the routine sweep of his desk that would place the Assessment in his hands within thirty seconds.
Twelve seconds after sitting down, Saul picked up the document. The red stripe caught the light. His glasses lowered to reading position. The cover note received three seconds of attention. Then the first page opened.
I watched from my cubicle. Forty feet of institutional carpet between my desk and his office, the same distance that had separated me from Carrie on her first day, the same distance that measured the gap between the analyst who produced the intelligence and the man who would decide what to do with it.
Saul read. The reading glasses stayed on. His pen came out at page three — the first annotation, a mark in the margin I couldn't read from this distance but could interpret from nine weeks of behavioral observation: a vertical line, Saul's notation for "this is important." The pen appeared again at page six. Page nine. Page twelve.
Forty minutes. He read the entire document without standing, without reaching for the phone, without the interruption of any institutional demand. The Assessment received the full weight of Saul Berenson's analytical attention, and the analytical attention of a man who'd spent forty years reading intelligence products was a formidable thing to witness from forty feet away.
At 10:20, the reading glasses came off. The document closed. And Saul looked up — not at his desk, not at his phone, but directly at my cubicle, across forty feet of bullpen, with the precise targeting of a man who knew exactly who had written the document and wanted the author to know he'd been read.
The expression on his face was something I'd never seen. Not the measured wisdom of the mentor. Not the institutional patience of the division chief. Not even the growing suspicion that had been accumulating since the debrief memo. This was the face of a counterintelligence professional evaluating a source — cold, precise, the specific assessment of someone determining whether the intelligence in front of him was genius or something more dangerous.
My desk phone rang.
"My office. Now."
Saul's office door closed with the quiet precision of a man who managed noise levels the way he managed everything else — deliberately, with an awareness of what silence communicated.
The Assessment lay open on his desk. Page twelve — the recommendations section. His pen rested on the binding, the annotation marks visible now: four vertical lines and two circled passages. More markup than I'd seen on any document in nine weeks of watching Saul read.
"Sit down."
I sat.
"How long have you been working on this?"
"Three weeks. Since the VP briefing was confirmed on November twenty-eighth."
"Three weeks." Saul repeated the timeframe without inflection, testing its weight. "The threat landscape analysis draws from your weekly summaries. The coordination architecture uses the relay node data from the burner phone investigation. The sniper assessment incorporates your vulnerability matrix from last week. But the predictions—" He tapped page eleven. "The predictions go beyond what the assembled evidence supports."
Here it comes.
"The predictions are analytical extrapolations based on pattern analysis of the Nazir network's operational doctrine and the subject profile data accumulated over the investigation's duration."
"They're more than that." Saul's voice didn't change — same measured cadence, same institutional register. But the content had shifted from evaluation to interrogation. "The specificity of the multi-vector prediction, the coordination architecture detail, the timing analysis — these read like threat intelligence derived from a source, not analytical extrapolation from pattern data."
My tongue pressed against the roof of my mouth. The grounding technique. Heart rate: controlled. Breathing: regulated. The physiological management that had passed the polygraph holding the line against an interrogator significantly more dangerous than Torres.
"I've been studying this network for nine weeks. The patterns are in the data. The extrapolations follow from the patterns. If they read like source intelligence, that's because the analytical methodology has reached a depth where pattern recognition and source reporting converge."
Four seconds of silence. Saul's signature pause. But longer than usual — the silence extending past assessment into something deeper, the quiet of a man who'd heard the answer, found it insufficient, and was deciding whether to push.
"This document will save lives if the threat is real. It will end careers — yours and mine — if it isn't." He picked up the Assessment and stood. "I'm taking this to Estes."
"Sir."
"And Ingham—"
The door handle was in his hand. The assessment tucked under his arm like a weapon he'd decided to deploy.
"The next time we sit in this room, I'm going to ask you that question again. And the answer had better be the same."
He left. The door closed. I sat in the empty office for twelve seconds, counting heartbeats, feeling the weight of what I'd just placed into the institutional machinery of the Central Intelligence Agency.
Saul doesn't believe me. He believes the intelligence — the Assessment is too well-constructed to dismiss — but he doesn't believe the methodology. "Pattern recognition and source reporting converge" is the kind of answer that satisfies a room but not a man, and Saul Berenson is a man, not a room.
He'll deliver the Assessment to Estes. Estes will act on it, partially, because the political cost of ignoring a threat assessment and being wrong exceeds the political cost of overreacting and being right. The institution will move. The security will enhance. Lives will be saved or they won't.
And after December 15 — after the event, after the outcome, after the dust settles — Saul will sit across from me in this office and ask how I knew. And the answer I gave today will be the last time the methodology cover story holds.
I walked back to my desk through a bullpen that was already shifting — Saul's trajectory from his office to the executive wing tracked by a dozen peripheral gazes, the institutional antenna detecting the specific frequency of a division chief carrying a classified document toward the Deputy Director's office with the deliberate pace of a man delivering an ultimatum.
The Assessment was in the system. Irrevocable. Fourteen pages of intelligence that compressed nine weeks of foreknowledge, two Ghosts, a bipolar disorder, three lies, and one borrowed life into a document that predicted the future with the precision of someone who'd watched it happen on television.
To supporting Me in Pateron.
with exclusive access to more chapters (based on tiers more chapters for each tiers) on my Patreon, you get more chapters if you ask for more (in few days), plus new fanfic every week! Your support starting at just $6/month helps me keep crafting the stories you love across epic universes.
By joining, you're not just getting more chapters—you're helping me bring new worlds, twists, and adventures to life. Every pledge makes a huge difference!
Join now at patreon.com/TheFinex5 and start reading today!
