Operation Soft Strike – Chapter 12

The immediate fallout from Alistair’s arrest was a hurricane of internal crisis. Emma and Jake, while hailed as heroes for saving the building and securing the most dangerous intelligence asset in decades, were immediately thrust into the agonising process of damage assessment and trust rebuilding.

The Internal Fallout: Operation Clean Slate

The first major task was to initiate Operation Clean Slate, an unprecedented, top-to-bottom security audit. The agency was wounded, its foundation of trust shattered. The immediate leadership void was filled by the Director General herself, who placed immense responsibility on Emma and Jake—the only two agents who understood the full scope of Alistair’s betrayal.

1. Identifying the Compromised Assets

The priority was to isolate the damage caused by “The Rook.”

Vulnerability Assessment: Jake had to use the decrypted SVR files to identify every single MI5 operational plan, asset list, and agent profile Alistair had access to over the last two decades. The sheer volume of compromised information was staggering. They had to assume every European counter-terrorism operation Alistair had handled was either a failure or had been guided by the SVR’s interests.

The “Nightingale” List Clean-up: Emma personally oversaw the swift, quiet removal and reassignment of the twenty-two agents on The Curator’s recruitment list. This was a painful process of professional exile for agents like Peter Vance, who were victims of Alistair’s targeting strategy, even if they hadn’t technically committed treason. The agency had to protect itself, even from the vulnerable.

2. The Trust Deficit and The Lie

The most difficult task was managing the human fallout. How do you tell hundreds of loyal agents that their trusted handler was a mole? Alistair’s position meant he had groomed, trained, and promoted numerous mid-level managers.

The Narrative: The Director General decided the full, decades-long truth of Alistair being “The Rook” could not be immediately revealed. The damage to allied intelligence relations and public trust would be irreparable. The official, internal narrative was that Alistair was a recent financial compromise—driven to treason by debt, exploited by The Curator.

The Cost: This lie, while necessary for operational stability, was a bitter pill for Emma and Jake. They knew the depth of the betrayal, and they understood that the systemic rot would remain hidden, forcing them to operate within an organisation that was actively suppressing the true scope of the SVR’s achievements.

The International Repercussions

The arrest sent shockwaves through the “Five Eyes” intelligence community (UK, US, Canada, Australia, New Zealand). Emma and Jake found themselves in endless, highly restricted briefings, often dealing with visibly angry and distrustful counterparts from the CIA and Mossad, whose assets and methods were almost certainly compromised by Alistair.

CIA Friction: The American liaison was particularly hostile, demanding a full accounting of every mission Alistair had been involved in. Emma and Jake had to navigate this distrust, sharing the necessary intelligence (The Curator’s files) while carefully shielding the institutional lie about the depth of Alistair’s tenure.

Rebuilding Operations: Their primary external task became convincing allies that British intelligence was not terminally compromised. This meant offering immediate, high-value intelligence gains. Using the data from Ryan and The Curator, Emma and Jake directed targeted, simultaneous raids against lower-level SVR sleeper cells across Europe, demonstrating that the cancer had been isolated and removed.

The New Normal: Jake and Emma, Co-Leaders

The pressure cooker of the investigation cemented Emma and Jake’s professional partnership into an unbreakable tactical and emotional bond. They were the only two who shared the entire truth of the SVR’s long game.

The Director General, recognising their unparalleled insight and operational success, promoted them to a newly formed, highly autonomous division: The Internal Threat Assessment Unit (ITAU).

Jake’s Role: Head of Digital Vulnerability and Forensics. His task was to rebuild MI5’s technological defences from the ground up, assuming that any system Alistair had overseen was flawed.

Emma’s Role: Head of Human and Strategic Vulnerability. Her task was to vet every promotion, transfer, and high-level appointment, looking for the human weaknesses—the debt, the disillusionment, the “Nightingale” criteria—that Alistair had so expertly exploited.

Their offices were no longer cramped surveillance posts, but austere, heavily protected command rooms deep within the building. The work was less glamorous—no more car chases or rooftop snipers—but far more vital: rebuilding the integrity of the institution they nearly died protecting.

One evening, staring at a schematic of the secure server room they had saved, Emma sighed. “The Alchemist and The Curator attacked us from the outside. Alistair was already inside.”

Jake, reviewing a list of security upgrades, agreed. “We fought shadows, but we missed the mirror. Now we have to teach everyone how to look at the reflection.”

Their reward was not rest, but the permanent, heavy burden of being the only two people who truly understood how close the enemy had come to winning. The new war was not on the streets of London, but within the silent, guarded hallways of MI5 itself.

Leave a comment

About

Welcome to In the heart of London – Surveillance at a glance…

I often find myself chatting with people outside the industry who think covert operations are all about excitement and adventure. While they might have that “cool factor,” the truth is that they aren’t really fun or glamorous. They’re more about strategy and achieving specific goals, and they can be costly, risky, and a bit of a hassle. That said, anyone in this field ends up with some pretty interesting—and sometimes hilarious—stories over the years. Let me share just a little taste of those experiences!

In the heart of London – Surveillance at a glance… including Operation Byzantium, refers to monitoring conducted in a way that ensures the subject remains unaware they are being observed. It is categorised into two types: directed surveillance and intrusive surveillance.

Search