Page 59 of Falcon's Fury

Page List
Font Size:

"Delta complete. Money counting equipment and ledgers secured."

All teams execute successfully despite the unexpected lack of resistance. Too successfully, perhaps. The nagging feeling that we're being allowed to take exactly what someone wants us to find persists as we load servers into our transport vehicle.

"All teams extract to designated locations," I order as we finish loading. "Maintain communication blackout during transit except for emergency channel."

We depart as planned, seven minutes after breach, leaving behind a facility that offered too little resistance and too convenient evidence. The operation succeeded—but the ease of that success suggests complications yet to be revealed.

Three hours later, we've regrouped at our secondary location—an old hunting lodge owned through shell companies, off the grid and secure from electronic surveillance. Four teams report similar experiences: minimal resistance, evidence of hasty evacuation, and suspiciously accessible documentation.

"They knew we were coming," Vulture concludes as team leaders debrief around a makeshift war table. "Question is, how? And why leave anything for us to find?"

"Could be they left breadcrumbs," Ghost suggests. "Information they want us to have. Misdirection."

"Or they simply prioritized what to save and what to sacrifice," Osprey counters. "Didn't have time to clear everything."

I study the collected evidence spread across folding tables—financial records, client lists, shipping manifests. All valuable intelligence, yet something feels too convenient about these findings.

Ice Pick emerges from the room where he's been examining the servers we extracted. "Preliminary assessment: extensive encryption, enterprise-level security, but accessible architecture." He looks exhausted but excited by the technical challenge. "I can crack basic levels, but the deeper stuff will require specialized resources."

"What can you access now?" I ask.

"Personnel files, some operational data." He pulls out his laptop, showing a directory structure. "The financial transactions are triple-encrypted, but I found a partial client list that's readable."

He opens a spreadsheet that sends a chill through the room. Names, positions, payment amounts—a who's who of local and state officials on regular payroll from the Reapers. Police captains. Two judges, including Harrison who's stalling our federal warrants. Three state representatives.

"Jesus Christ," Vulture mutters, scanning the list. "Half the county's on their books."

"This explains how they've operated so openly for so long," I observe. "They own the system."

As disturbing as this revelation is, it creates an opportunity. With evidence of corruption this extensive, we can bypass local authorities completely, taking our case directly to federal jurisdiction where Hargrove has less influence.

"What about the trafficking connection?" Walker asks, reviewing the documents with a federal agent's eye for prosecutable evidence. "We need direct links to Hargrove, not just corrupt officials."

Ice Pick navigates to another directory. "There's a transaction database that cross-references with what appears to be inventory codes." His expression darkens as he translates the euphemisms. "The 'inventory' is people. Women, specifically, tracked with ID numbers that match entries in these ledgers."

He displays a spreadsheet showing transactions, dates, and coded client identifiers. "This system tracks every woman from acquisition through 'processing' and 'delivery' to final 'placement.' Hargrove Investments appears repeatedly as the financial clearinghouse."

Walker leans closer, professional intensity overriding any emotional reaction to the dehumanizing data. "This is promising, but we need to connect Hargrove himself, not just his company. Corporate liability shields can be impenetrable without personal involvement evidence."

"What about this?" I point to entries labeled "HW Direct Acquisitions" with significantly higher value figures.

Ice Pick clicks into the section, revealing a more heavily encrypted database. "This is beyond my current capabilities. Whatever's in here, they protected it much more carefully than the rest."

"Then that's what we focus on cracking," I decide. "If they guarded it this heavily, it's likely our smoking gun connecting Hargrove personally."

The debriefing continues, each team reporting findings and assessments. Despite the unexpected lack of resistance, we've acquired substantial evidence against the Reapers' operation and their corrupt allies. But the most crucial elements—direct links to Hargrove himself and the Kings of Purgatory—remain encrypted beyond our immediate capabilities.

As the meeting concludes, team leaders disperse to rest before morning transport back to the clubhouse. Walker takes copies of key documents for his federal contacts, promising updates on the official investigation within forty-eight hours.

I step outside, needing fresh air and space to process the night's events. The raid succeeded tactically but leaves strategic questions unanswered. Why was security so light? Why leave incriminating evidence so accessible? What aren't we seeing in this too-easy victory?

My phone vibrates with an encrypted message from the clubhouse: All quiet here. Evidence assessment update?

Cara's clinical phrasing doesn't disguise her concern. I begin typing a response when headlights appear on the access road—the supply truck bringing additional equipment for our temporary base. As it parks, I recognize Tessa behind the wheel and, unexpectedly, Cara in the passenger seat.

"Before you say anything," Tessa announces, climbing out, "this wasn't my idea. She's very persuasive when she wants to be."

Cara approaches more slowly, her expression a mixture of determination and apprehension. "The clubhouse received a warning," she explains without preamble. "Anonymous call saying the raids were expected. Thought you should know in person rather than over comms."