Sarah Walker: the Volkov chronicles | By : Irishdrgon Category: 1 through F > Chuck Views: 22587 -:- Recommendations : 0 -:- Currently Reading : 1 |
Disclaimer: I don’t own chuck nor do I make any money from Chuck. This is just a story and is not real. |
After the meeting, Sarah made her way down to the southeast corner of Volkov’s sprawling estate. It was the only place the surveillance cameras couldn’t cover.
She heard a rustling in the woods and pulled her side arm.
“Were you followed,” a voice asked.
“You know the answer to that,” Sarah said as she lowered her gun and Frost emerged from the darkness like a wraith.
She filled Frost in on the meeting with Volkov.
“Of course have will someone watch and make sure. You will have to prove your loyalty to him,” Frost said.
“I assume he has a file on me.”
“He knows all about you Sarah, and so do I. Alexi is one crazy, sadistic, paranoid son of a bitch, but he’s not stupid,” Frost interrupted.
“What’s on the laptop,” Sarah asked changing the subject.
“I don’t know, and he won’t tell me,” Frost said.
“But you can bet your ass he wants you to compromise yourself. It’s the only way he wins. You either compromise yourself or he kills you,” Frost said.
They were silent for a moment as Sarah grasped the gravity of the situation.
“Jesus. What do we do,” she said.
“I have an idea,” Frost replied.
Washington DC. Later that evening
Diane Beckman was a legendary workaholic therefore; it was no surprise that well past midnight she was still in her office reviewing files. Suddenly her computer beeped, indicating a waiting message on her encrypted server. She got up from her desk and walked across the room to her isolated work station, and punched in a series of commands.
The screen went blank except for a solitary message.
Request from SR-71: initiate communication.
Reply from 00-00: affirmative. Begin transmission.
Suddenly her screen was replaced by a dark haired Sarah walker.
Walker had been undercover attempting to infiltrate the Volkov organization and Beckman was her lone contact. She had staged Sarah’s arrest and escape, all on an effort to give the impression that Sarah had been turned.
“Welcome back Agent Walker,” Beckman said.
“Thank you for meeting me Ma’am, and for your confidence in this matter,” Sarah said.
“Yes Agent Walker. Have you been successful?”
“Yes Ma’am,” Sarah replied.
“Explain.”
“Well we got an opportunity. Volkov’s people contacted me.”
“Proceed.”
Sarah went on to explain that Matthew Hammond was a computer wunderkind that had suddenly attracted the interest of Volkov. Sarah explained Frost’s idea to create a fake mission around Hammond in order to steal some bogus computer files; when in actually Sarah would be working for Volkov to deliver the laptop.
“I’m not sure I like where this is going Agent Walker.”
“I understand ma’am but it’s the best chance we have had.”
Beckman was silent for what felt like an eternity before she spoke.
“Alright. Operation is a go.”
“Thank you ma’am.”
They went on to discuss the mission and Sarah insited that Chuck stay at castle, as she would not be able to operate if he were in harms way. Beckman agreed that the risk was too great to expose Chuck to Volkov. Casey would act as her onsite support, and Chuck would never know of her involvement, she would simply be an unkown agent they were supporting.
The next day Castle briefing
“Matthew Hammond is a high level target of oppurtuinty for the NSA,” Beckman said . The team was assembled in front of screen as she gave her briefing.
“Your mission is to support an agent who will infiltrate his house, and find and clone his computer. Hammond’s files are key to this investigation,” Beckman said.
“Excuse me ma’am, but wouldn’t it be easier to just hack in remotely,” Chuck asked.
“We tried that agent Bartowski, but it appears Hammond’s server is offline. No digital fingerprint has been located for it. Therefore we need to access it onsite.”
“I’ll do it,” Chuck began.
“No, your identity as the intersect excludes you from this task. Another agent, whose identity is classified, will penetrate Hammond’s apartment and put a remote transponder on his computer, once that is accomplished you will be able to hack the computer remotely from castle. Major Casey will be onsite support, once the device is planted, you will hack in.”
She waited for questions, then quickly shut the monitor off signaling the end of the meeting.
While AFF and its agents attempt to remove all illegal works from the site as quickly and thoroughly as possible, there is always the possibility that some submissions may be overlooked or dismissed in error. The AFF system includes a rigorous and complex abuse control system in order to prevent improper use of the AFF service, and we hope that its deployment indicates a good-faith effort to eliminate any illegal material on the site in a fair and unbiased manner. This abuse control system is run in accordance with the strict guidelines specified above.
All works displayed here, whether pictorial or literary, are the property of their owners and not Adult-FanFiction.org. Opinions stated in profiles of users may not reflect the opinions or views of Adult-FanFiction.org or any of its owners, agents, or related entities.
Website Domain ©2002-2017 by Apollo. PHP scripting, CSS style sheets, Database layout & Original artwork ©2005-2017 C. Kennington. Restructured Database & Forum skins ©2007-2017 J. Salva. Images, coding, and any other potentially liftable content may not be used without express written permission from their respective creator(s). Thank you for visiting!
Powered by Fiction Portal 2.0
Modifications © Manta2g, DemonGoddess
Site Owner - Apollo