Chapter 17: The Bait
[Motel 6, North Hollywood — October 18, 2007, 11:00 PM]
The Fulcrum data was organized in twelve directories. Personnel. Operations. Finance. Communications. Infrastructure. Logistics. Research. Recruitment. Counter-Intelligence. Training. Assets. Archives.
I'd been reviewing it through the Mental Library for four days. Each directory cross-referenced against my meta-knowledge — the show's depiction of Fulcrum's organizational structure, filtered through ninety-one episodes of plot revelations and retrospective understanding. Most of the data aligned. Names I recognized from the show matched names in the files. Operations I remembered watching play out on screen appeared as planning documents, with timelines and resource allocations that confirmed the show's accuracy within a reasonable margin.
Most.
The Operations directory contained forty-seven planned actions, ranging from asset recruitment to infrastructure sabotage. Forty-six matched my meta-knowledge — either directly depicted in the show or consistent with Fulcrum's established operational patterns.
The forty-seventh did not.
Operation BLACKWATER. A planned raid on a pharmaceutical research facility in Pasadena, scheduled for November 3rd. The target: a biotech firm called MedVance Solutions. The objective: acquisition of research data on a classified government contract involving — the Library flagged this with a relevance alert — neural interface technology.
Neural interface. The Intersect's domain.
On the surface, it fit. Fulcrum was hunting the Intersect. A pharmaceutical company working on neural interfaces could be developing Intersect-adjacent technology. The raid was consistent with Fulcrum's established methodology — covert entry, targeted data theft, clean extraction.
Except MedVance Solutions didn't appear in any episode of the show. I'd watched all ninety-one. Rewatched my favorites dozens of times. The name, the location, the operation — none of it matched any plot point I remembered.
That alone wasn't disqualifying. The show couldn't depict every Fulcrum operation. Background events happened off-screen. But the specificity of the file bothered me. It was more detailed than the other forty-six. More polished. As if someone had taken extra care to make it look complete.
I closed my eyes. Queried the Library.
MedVance Solutions. Pasadena. Government contracts.
The search returned two results. One: a corporate registration filing from the California Secretary of State. MedVance had been incorporated six months ago. Short history. Limited footprint. Two: a single mention in a Defense Department procurement database — a Phase I SBIR grant for "advanced neural mapping applications."
Real company. Real contract. But the timeline was wrong. Six months was not enough history to attract Fulcrum's attention at this level of operational investment. Fulcrum targeted established entities — firms with years of research data, deep government relationships, exploitable security gaps. MedVance was a startup. A nothing.
Unless it was bait.
The thought hit with the cold precision of a Library search result. Not emotion. Analysis.
Someone had planted this file. Someone who understood that an intelligence source with access to Fulcrum's operational data would review the planned operations, prioritize targets, and direct intervention forces accordingly. If the source acted on Operation BLACKWATER — sent a team to MedVance, disrupted the raid, exposed the operation — the planter would know two things: first, that the leak had access to Fulcrum's data center files specifically. Second, that the leak's information source could not distinguish planted intelligence from genuine intelligence.
Tommy Delgado. The pattern analyst. The man who didn't hunt with guns but with dossiers. Who'd been assembling a profile of the intelligence leak since the conference bombing. Who'd noticed that Fulcrum operations were failing at a rate inconsistent with standard counter-intelligence penetration.
Tommy had seeded the data center. Let it be raided. Planted a false operation among the real ones. And was now waiting to see if the opposition would take the bait.
I sat on the motel bed, the Library's analytical frameworks running hot, and forced myself to think through the implications.
If I flagged BLACKWATER to Sarah as a real operation, and she moved to disrupt it, Tommy would know the leak had accessed the data center files. He'd narrow his suspect pool. He'd look closer at the timeline — the Intersect theft, the conference, the cascade of operational failures — and the pattern would point to one conclusion: someone with deep, impossible knowledge of Fulcrum's internal operations was feeding intelligence to the CIA.
If I ignored BLACKWATER entirely — said nothing, flagged nothing — Tommy would also learn something. Because forty-six operations would be disrupted and one would proceed unimpeded. The one he'd planted. The negative space would speak as loudly as the action.
A trap with no clean exit. The bait was poisoned in both directions.
I rubbed my temples. The Library search had pushed my processing to its limits — four days of continuous data analysis, cross-referencing hundreds of files against five seasons of memorized television. My head throbbed. The dull pressure behind my eyes that signaled mental fatigue — the Library's version of overuse strain. I needed sleep. I needed to stop thinking for six consecutive hours and let the neural pathways cool.
Instead, I thought harder.
The solution wasn't to take the bait or refuse it. The solution was to provide Sarah with a target list that excluded BLACKWATER entirely — not as a suspicious omission, but as a natural limitation of the source material. I'd been deliberately degrading my intelligence quality since the Koreatown extraction failure. Sarah already believed my sources were drying up. If I presented a partial picture of the Fulcrum data — real targets, real operations, with gaps that looked like the product of incomplete intelligence rather than deliberate omission — BLACKWATER would simply fall through the cracks. Not flagged. Not ignored. Just... missed.
Tommy would see forty-six operations disrupted and one that wasn't flagged because the source never identified it. He'd have to decide: was BLACKWATER missed because the source's access was limited? Or was it missed because the source recognized the trap?
Ambiguity. The only currency that mattered in counter-intelligence.
I compiled the target list. Excluded BLACKWATER. Introduced two additional gaps — real operations I could afford to sacrifice — to create a pattern of incompleteness that looked organic rather than strategic.
The headache pounded behind my eyes. Four days of Library overuse. Four days of living inside a mental architecture that wasn't designed for marathon sessions. I needed food. I needed rest. I needed to stop treating the Library like an infinite resource and start respecting its limits.
The vending machine in the motel corridor dispensed a bag of pretzels and a Gatorade. Neither qualified as nutrition, but both qualified as present, which was the only standard that mattered at midnight in a North Hollywood motel room.
I ate the pretzels. Drank the Gatorade. Filed BLACKWATER under TOMMY — TRAP — DO NOT ENGAGE in the Library and closed the session.
Somewhere in Echo Park, Tommy Delgado was waiting for results. He'd get them. Just not the ones he expected.
---
[Fulcrum Safe House — Echo Park — October 20, 2007, 8:00 PM]
[TOMMY DELGADO]
The results came in pieces, the way they always did. Intercepts. Surveillance reports. The quiet, meticulous accumulation of data points that separated competent analysis from guesswork.
Tommy sat at his desk — a real desk this time, not the improvised analysis board he'd been using — and reviewed the operational status reports from the past week. Six planned operations. Six failures. Two agents arrested. One safehouse burned. Three operations disrupted before they'd reached execution phase.
And BLACKWATER: untouched.
He'd expected one of two outcomes. Either the opposition would move on BLACKWATER — confirming their access to the data center files — or they'd ignore it conspicuously, confirming they could distinguish planted intelligence from real intelligence. Both outcomes gave him actionable data.
What he got was neither. BLACKWATER sat among forty-six disrupted operations like a tooth that hadn't been pulled. Not acted upon. Not conspicuously avoided. Just... present. One of several operations that hadn't been flagged, in a pattern of incomplete disruption that looked like a source with deteriorating access.
Tommy frowned. Pulled the operational map closer. Examined the distribution of disrupted versus undisrupted operations.
The undisrupted ones — four total, including BLACKWATER — shared no obvious pattern. Different categories. Different timelines. Different geographic zones. If the opposition's source was losing access, the degradation was random.
Or it was designed to look random.
Tommy opened a new file on his laptop. Labeled it: ASSET PROFILE — REVISION 3. The first two revisions had been broad — a leak with deep access, probably internal, probably operating through a CIA channel. This revision would be narrower.
He typed: Source demonstrates capacity to distinguish genuine intelligence from planted intelligence. This suggests either (a) independent verification capability, or (b) prior knowledge of Fulcrum operations sufficient to identify inconsistencies.
He paused. Reread the sentence. Option (b) implied something impossible — a source who knew Fulcrum's operations before they were planned. Precognition. Absurd.
Unless.
Tommy deleted option (b). Replaced it with: (b) access to a comprehensive intelligence database that includes Fulcrum operational data not present in the data center files.
The Intersect. The database stolen by Bryce Larkin. A database that, by definition, contained everything the CIA and NSA knew about Fulcrum — including operational patterns, agent identities, and planning methodologies. Someone with Intersect access wouldn't need the data center files to know which operations were real. They'd already have the underlying intelligence.
Tommy sat back. The desk lamp threw his shadow long against the wall.
The opposition's leak wasn't just informed. The leak had the Intersect. Or access to someone who did.
He added a line to the profile: Assess probability that the leak is connected to the Intersect theft. Priority: HIGH.
The dead man's photograph still hung on the analysis board across the room. Grainy. Inconclusive. But the shape was there.
Tommy picked up his phone. Dialed a number he used only for priority communications.
"It's Delgado. I need everything we have on the Intersect recipient. The CIA's new asset. The one in Burbank."
Read the raw, unfiltered story as it unfolds. Your support makes this possible!
Find it all at patreon.com/Whatif0
Timeline Viewer ($6): Get 10 chapters of early access + 5 new chapters weekly.
Timeline Explorer ($9): Jump 15-20 chapters ahead of everyone.
Timeline Keeper ($15): Get Instant Access to chapters the moment I finish writing them. No more waiting.
