The elevator dings, signaling our arrival.

We head straight to Dylan’s office and Parker closes the door behind us. There’s a man dressed in a sleek black suit already inside. He exudes an air of professionalism and expertise. He introduces himself as Lucas Blackwell. He hands us each a card indicating he’s a security expert specializing in counter-surveillance and the owner of Blackwell Security.

His compact briefcase sits open on Dylan’s desk, revealing an array of advanced bug-sweeping devices. His steady hands grasp a radio frequency (RF) detector, a sleek device equipped with a digital display and various controls. With focused determination, he initiates the scanning process, slowly sweeping the detector across the room. We all watch as he meticulously scans for any signs of hidden surveillance devices.

The RF detector emits soft beeps, and its digital display shows fluctuating signal strengths as it intercepts various frequencies. Lucas pays close attention to the screen, his eyes trained for any anomalies. He moves methodically. Every nook and cranny receiving careful scrutiny.

The three of us continue to watch intently, sensing the gravity of the situation. The silence is occasionally broken by Lucas adjusting the sensitivity settings or changing the scanning mode on the device. We hold our breath, hoping that no hidden devices will be discovered; however, we realize the importance of a thorough sweep.

Minutes turn into what feels like hours as Lucas meticulously covers the entire office from the bookshelves to the ceiling. He leaves no stone unturned. With every passing moment, the tension in the room mounts until finally, the RF detector remains quiet, devoid of any alarming signals.

Lucas turns off the detector, a sense of relief evident on his face. “Your office appears to be free from any covert surveillance devices,” he assures Dylan, breaking the silence. We collectively exhale, knowing that our privacy has been secured—at least for the time being.

“Now that we’re sure we won’t be overheard, we can speak freely,” Lucas says. “Parker has briefed me on the situation and I can assure you that my team and I will do everything possible to track down the person or persons behind these incidents.”

“Thank you, Lucas. I appreciate you coming in so quickly and handling this case personally. I’m sure Parker has informed you that no expense is to be spared. Nothing is more important than firstly, ensuring Jocelyn’s safety, and then catching the saboteur. Do you think the same person is responsible for both?”

“Dylan, I’m not sure yet but it seems likely. Parker indicated the sabotage escalated around the time Jocelyn started working here. Years of working in this business have taught me that true coincidences are rare.”

“Fair enough. What do you need from us?”

“My team has already started implementing new security measures. I’d like to go over them with you and answer any questions you may have. I’d then like you to walk me through everything that has happened so far, sparing no detail. And Jocelyn, since the threats have been directed at you, I’ll need your phone and laptop. We’ll be installing software to monitor the threats and hopefully track down the culprit.”

I hand over my cell phone and laptop. He takes them and puts them in his briefcase, then he pulls out another phone and hands it to me.

“Thanks. I’ll have your devices back to you by the end of the day. I’d like you to use them as normal—we don’t want the culprit to think we’re onto him or her—but use this burner phone for anyconfidentialcommunication. My number, as well as Dylan’s and Parker’s, have already been programmed in.”

I nod.

“Any questions so far?”

We shake our heads.

“Great, then let’s continue.”

He spends the next few hours going over his comprehensive security plan, telling us in minute detail his process of conducting threat assessments, physical security audits, and cybersecurity analysis. He explains how his team will conduct background checks on all employees, implement systems and protocols to detect and mitigate insider threats, and utilize surveillance techniques to identify and monitor suspicious activities and individuals.

By the time he’s done going over the plan, I’m dazed, overwhelmed, and feeling just a bit like my life has turned into a spy novel. However, I’m also reassured and feeling confident that we’ve got the right man for the job and soon this ordeal will be behind us.

We finally break for lunch, and I have a few minutes alone with Dylan.

“How are you holding up?” he asks.

“I’m okay. It’s a lot to take in, but I want to get this over with. I’m glad you hired Lucas.”

“Me too. It’s clear he knows his stuff.”

“Part of me does feel like I’ve walked into a spy novel. Maybe when this is over, we could do some role-playing. You’ll be James Bond, and I’ll be a gorgeous Bond girl.” I give him my best sultry look, hoping to lighten the mood.

“Ha! There’s an idea!” He laughs and then kisses me.

He kisses my neck, pulling me closer so I can feel his warmth against my skin. He presses his lips to mine again and then we slowly kiss, savoring the moment. We’re interrupted by the sound of a throat clearing behind us.

“Sorry to interrupt, but Detective Ashford is here to take your statements,” Parker says.

We look at each other wistfully but take our seats as Parker escorts the detective and Lucas into Dylan’s office. We had agreed earlier to have Lucas sit in so he could hear the details of the interview firsthand and facilitate cooperation with the police.

We spend the next few hours going over every painstaking detail of the threats against me and the suspected corporate espionage. Without any specific evidence, it’s unclear if the incidents involving the company constitute a crime, but Detective Ashford agrees with Lucas that the two are probably connected.