Part Twenty-One: The Mole Inside

Location: MI5 Internal Archives, Sub-Level 6
Objective: Use decrypted data from the London Bridge operation to identify and isolate a mole operating inside MI5’s infrastructure division.

The biometric drive had taken hours to decrypt—but what it revealed was damning. Buried within server access logs was a pattern: repeated authentication spikes from inside Thames House, all routed through a supposedly dormant terminal.

Jake stared at the screen. “This isn’t just ghost traffic. Someone’s logging into systems they shouldn’t even know exist.”

Emma cross-referenced the terminal ID with personnel rosters. Only six people had clearance. One name appeared in every trace.

Agent Malcolm Krell.

Infrastructure Liaison. Quiet. Reliable. Unremarkable.

Tess frowned. “Krell was assigned to Larkspur before it went dark. He filed the last operational report. And it was sanitized.”

Jake pulled up his personnel file. “His background checks out. But there’s a note buried in his onboarding record—‘Remote rotation via Recommendation Protocol.’”

REEF’s voice buzzed over the comm. “That’s Eidolon’s infiltrator tag. They hijacked the protocol years ago. Krell wasn’t vetted. He was planted.”

Emma stood. “Then he’s our mole.”

🕶️ The Intercept

The team moved fast.

Sable tracked Krell to a transit stop near Moorgate—his routine was rigid, like clockwork. Emma tailed him to a coffee shop, posing as a casual commuter. Tess stood by in the surveillance van, monitoring comms.

Jake whispered in her earpiece. “He’s communicating. Shortwave. No phone, no data trail.”

Emma approached his table. “Malcolm Krell?”

He looked up. Pale. Calm. “Do I know you?”

She flashed a badge. “You’re going to.”

💥 The Revelation

In MI5’s interrogation room, Krell barely flinched.

“I’m just a courier,” he said. “A conduit. Eidolon doesn’t recruit agents. It activates them.”

Jake leaned in. “You fed them the layout of Larkspur. You stripped our protocols. Why?”

Krell stared into the two-way glass. “Because oversight is obsolete. We’re all just delaying the inevitable.”

Emma watched his eyes—void of fear, but not of purpose.

Tess whispered, “He’s not corrupted. He’s converted.”

Jake turned to Emma. “That means there could be more.”

Emma nodded slowly. “We need a purge. And we start at the top.”

Leave a comment

About

Welcome to In the heart of London – Surveillance at a glance…

I often find myself chatting with people outside the industry who think covert operations are all about excitement and adventure. While they might have that “cool factor,” the truth is that they aren’t really fun or glamorous. They’re more about strategy and achieving specific goals, and they can be costly, risky, and a bit of a hassle. That said, anyone in this field ends up with some pretty interesting—and sometimes hilarious—stories over the years. Let me share just a little taste of those experiences!

In the heart of London – Surveillance at a glance… including Operation Byzantium, refers to monitoring conducted in a way that ensures the subject remains unaware they are being observed. It is categorised into two types: directed surveillance and intrusive surveillance.

Search