Part Twenty-Four: The Third Watch

Location: London, England
Mission Type: Covert internal surveillance
Objective: Follow Tess Monroe through a routine intelligence rotation. Intel suggests she may be leaking sensitive documents—but motive, method, and allegiance are unclear.

🕵️ The Setup

Emma and Jake didn’t want the assignment.

Not because it was hard—because it was Tess.

They’d bled together through the Reykjavík breach, dodged bullets at Gesundbrunnen, and cracked Spectre at MI6. But now they were being handed a quiet file marked Observation Protocol. Internal. Off-book. No backup.

Holloway’s voice in the briefing room was cold: “She’s moving data. Multiple extracts from ghosted archives, all routed through biometric overrides only she has. No authorization. No explanation.”

Emma frowned. “Then why not confront her?”

“Because,” Holloway replied, “if she’s what she claims… we’ll need to prove it without tipping her off.”

Jake leaned back. “And if she isn’t?”

“Then you may already be compromised.”

🎯 Day One — The Watch Begins

Tess exited Thames House at 04:19. No comms. No personal device. Just a coat and a coin-sized hardcase clipped to her belt.

Jake trailed from a distance using facial anonymization software threaded into a tourist’s AR glasses. Emma followed on foot, blending through early commuters.

She took the Northern Line to Angel. Transferred to Overground. Then walked the final stretch to a nondescript antique shop on Newington Green.

Jake’s voice crackled: “Security on the rear door. Iris scanner. That’s a data vault behind a Georgian façade.”

Emma peered through a rain-streaked pane as Tess handed off the hardcase to a tall man with a limp and a diplomat’s wristwatch. No handshake. No conversation.

Just silence. Then Tess left.

📁 The Leak

Back at the safehouse, Emma and Jake decrypted the micro footage. The hardcase carried two documents.

  1. A redacted Project MIRAGE schematic—the behavioral conditioning algorithm from their Spectre discovery.
  2. An internal memo from MI5’s own counterintel director—suggesting he’d buried Eidolon-related anomalies for over a year.

Jake stared at the screen. “She’s not selling us out. She’s building a case.”

Emma’s voice was quiet. “She’s trying to expose the rot. But doing it outside the system.”

🧠 The Confrontation

That evening, Emma found Tess at King’s Cross, standing beneath the old departure boards. She approached slowly.

“You knew we were watching.”

Tess didn’t deny it.

“You were supposed to.”

Jake joined them, eyes unreadable. “You leaked restricted documents. Hard proof of suppressed corruption. Why not tell us?”

Tess exhaled. “Because telling you would’ve made you part of it. And if this went wrong—I needed you clean.”

Emma’s pulse raced. “So what now?”

Tess turned, scanning the terminal for tails. “Now we burn the facade. Together.”

She handed Emma a drive.

Contents: A full roster of MI6 personnel flagged by Spectre. Fifty-seven names. Seven activated. Three in active field operations.

Jake whispered, “This changes everything.”

Leave a comment

About

Welcome to In the heart of London – Surveillance at a glance…

I often find myself chatting with people outside the industry who think covert operations are all about excitement and adventure. While they might have that “cool factor,” the truth is that they aren’t really fun or glamorous. They’re more about strategy and achieving specific goals, and they can be costly, risky, and a bit of a hassle. That said, anyone in this field ends up with some pretty interesting—and sometimes hilarious—stories over the years. Let me share just a little taste of those experiences!

In the heart of London – Surveillance at a glance… including Operation Byzantium, refers to monitoring conducted in a way that ensures the subject remains unaware they are being observed. It is categorised into two types: directed surveillance and intrusive surveillance.

Search