Page 12 of One Knight Stand

Wally raised his hand. “GPS trackers?”

Professor Allard nodded. “Absolutely. Trackers today are minuscule, and most are powered by batteries and have cellular transmitters. Some are magnetic, making them easy to conceal on a vehicle or any other magnetic surface. Others are adhesive. Some are designed to be hardwired directly into electronics. Regardless, these trackers use cellular data, which means you don’t have to be physically following your targets. You’ll need only to install the app or software onto your laptop to ensure you are able to translate the data and keep tabs on location. These trackers are so common, you can order them online. Be aware, however, that tracking and recording conversations require government and/or legal approval for domestic use. Of course, if you’re in the field, you can presume it’s approved.”

I leaned over and whispered to Wally, “It’s super cool that we can keep tabs on whoever we want from behind the comfort of our keyboard.”

“Once the tracker is placed properly on the target,” Wally whispered back. “If it’s a person, that’s not going to be easy.”

“It’s all part of the job,” I murmured. “I bet we’ll practice how to attach it to people clandestinely. You know, lean in for a hug and, bam, it’s under their collar.”

“You’re not a hugger,” he said. “That’s not going to be easy for you.”

“Hey, I can hug if it’s in the name of national security.” I gave him my toughest look, and he covered his mouth laughing.

“Hollywood makes surveillance seem easy and exciting, but that couldn’t be further from the truth,” Professor Allard said, continuing her lecture. “Most of the time, surveillance is mind-numbingly boring. Anyway, there is a specific method to successful detection and surveillance strategy. First you determine the three main EEIs, which are short for essential elements of information. What do you need? What’s the nature of the information? And who has the information you need?”

We all typed on our laptops or tablets, or in Bo’s case, scribbled notes, as fast as we could while she spoke.

“One of these EEIs will be more important than others. That will be your CEI, or critical element of information. You have to determine if you can get that before you decide to proceed. Then, once you map out your EEIs, you must assess what you must do to acquire that information. This makes sure your efforts are aligned withwhyyou are doing the surveillance, and not just wasting your efforts on something that won’t advance your intelligence goals. Now, students, open Field Manual 4-1 in front of you, and turn to page thirteen, where we’ll dive right into EEIs.”

Wally, Bo, and I duly took notes until class finished. When we were dismissed, I put away my laptop in my backpack.

“There’s so much that goes into being an operative.” Wally heaved his heavy backpack onto his shoulder. “How are we supposed to remember it allandfight the bad guys at the same time?”

“I think the point is, we might not ever see the bad guys. They’re as anonymous as we are,” Bo said. “Professor Allard’s message is we have to fight back by being better organized and smarter, not necessarily bigger or stronger.”

Wally perked up at that. “Well, that sure does give a short guy like me some hope.”

“It should,” I said. “The landscape of espionage is changing, and we’re at the forefront. It’s kind of an exciting time.”

A dreamy smile crossed Wally’s face. “Man, I hope that means I’m going to be the new face of James Bond.”

I laughed. “I think that remains to be seen, 007.”

Chapter Eight

CANDACE KIM

Candace had become increasingly worried. Ethan Sinclair, aka the Hidden Avenger, had gone dark since the attempting kidnapping on his daughter. If he was having trust issues with the NSA, that had likely been the final straw.

She didn’t blame him, but she had to believe he wouldn’t go dark again after they’d been so close to bringing him in. She’d been making progress on a deal with the Department of Justice to give him immunity when the deal had abruptly fallen apart. She suspected internal sabotage, but who would do that and why? She’d begun delicately and quietly working to revive the deal but had made only modest progress so far. Someone was blocking her every turn.

She had to put herself into Ethan’s shoes and understand his perspective.

How would she react if she were him? If her family was threatened, she’d have to be convinced that the risk of coming in was lower than if she retreated. Regardless, given that no one knew who was behind the kidnapping attempt, she’d be very reluctant to trust anyone.

She understood, but she just couldn’t wait for him to reach out. She had to make him feel safe. But how, and where was he?

There had to be clues in their past conversations and communications, things he was trying to say without outright saying them. One thing was certain—he was afraid for his life and those of his family. She didn’t know why he’d disappeared fourteen years ago, but whatever the threat had been to him, apparently, it still existed.

That narrowed things a bit. There were only a few individuals at the NSA at that time who’d had any contact with Ethan Sinclair, and even fewer that were still around. Isaac Remington, his direct boss, was one of them. But what could Remington have been involved with that would frighten Sinclair to the point that he’d abandon his family and life? Why wouldn’t he have gone to the police or NSA leadership?

She felt like she was close to solving the puzzle but still had a few missing pieces. It would be worth going over Ethan’s previous communications again and digging a little more deeply regarding his work at the NSA. More background information on Isaac Remington would also be helpful, as well as knowing who else was around that had known Ethan fourteen years ago.

She was making a list when her desk phone rang.

Though the NSA was at the pinnacle of electronic technology, the desk phone was still part of the way they did business. In fact, she had several different-colored phones on her desk, reflecting the differing levels of security that could be communicated over them. It was far easier to secure a wired, isolated phone network than it was any sort of mobile network. Any mobile network—with the right skill, technology, and time—could be penetrated.

The phone ringing was red, so she knew the caller could talk with her at the highest security classification level.