Part Twelve: Prague Protocol

The city was cloaked in winter fog, its Gothic spires piercing the sky like jagged teeth. Emma, Jake, and Tess moved through the narrow alleys of Old Town, blending with the tourists and late-night wanderers. Beneath their coats: encrypted comms, silenced pistols, and a mission that could fracture the intelligence world.

Their target: a decommissioned Soviet-era listening post buried beneath a defunct metro station—codename: Node Zero. According to the Harrowgate files, it was the original command hub. And someone had reactivated it.

Jake scanned the street with a thermal monocle. “Two heat signatures at the entrance. Armed. Not local.”

“Mercs?” Emma asked.

“Or worse,” Tess muttered. “Contracted ghosts. Ex-agency, no loyalties.”

They moved fast. Tess created a diversion with a timed car alarm, while Emma and Jake slipped through a maintenance hatch. The tunnel beneath was damp, echoing with the distant rumble of trains. Faded Cyrillic signs pointed toward forgotten platforms.

As they descended, the air grew colder. The silence thicker.

Then—movement.

A figure stepped from the shadows. Female. Late 30s. Tactical gear. She raised her hands slowly.

“I’m not your enemy,” she said in perfect English. “I’m Asset K-12. Harrowgate.”

Emma didn’t lower her weapon. “Then prove it.”

The woman reached into her coat and tossed over a data chip. “Encrypted logs. Someone’s been rewriting the Harrowgate directive. Turning assets into weapons. I refused. They marked me for deletion.”

Jake plugged the chip into his portable decryptor. His eyes widened. “She’s telling the truth. Someone’s issuing kill orders to loyal agents. They’re purging the network.”

Tess stepped forward. “Who’s behind it?”

K-12 hesitated. “They call him Orpheus. No face. No origin. Just a voice on the network. But he’s already activated the failsafe.”

Emma’s voice was ice. “What failsafe?”

K-12 looked at her grimly. “If Node Zero isn’t shut down in the next six hours, Harrowgate will go fully autonomous. No oversight. No control. Just algorithms deciding who lives and who dies.”

A low rumble echoed through the tunnel. Lights flickered.

Jake looked up. “They know we’re here.”

Emma chambered a round. “Then let’s finish this.

Leave a comment

About

Welcome to In the heart of London – Surveillance at a glance…

I often find myself chatting with people outside the industry who think covert operations are all about excitement and adventure. While they might have that “cool factor,” the truth is that they aren’t really fun or glamorous. They’re more about strategy and achieving specific goals, and they can be costly, risky, and a bit of a hassle. That said, anyone in this field ends up with some pretty interesting—and sometimes hilarious—stories over the years. Let me share just a little taste of those experiences!

In the heart of London – Surveillance at a glance… including Operation Byzantium, refers to monitoring conducted in a way that ensures the subject remains unaware they are being observed. It is categorised into two types: directed surveillance and intrusive surveillance.

Search