everyone, while George had been the introspective genius easily forgotten. But they were both bloodhounds when it came to digital data analysis and server infiltration.
Within the first few weeks of working at the NSA, they had developed a kindred friendship and, when the opportunity arose to share a rental close to work, they had jumped on it. Five years had passed and they still didn’t regret that decision. It was convenient to live that close to the massive building complex, easily reached by car, bike, or foot. It was a good thing that they lived so close; between the two of them, they couldn’t seem to be able to keep a functioning alarm clock in the house, and had to scramble most mornings.
Another perk of sharing a house was that it gave them some freedom around the strict rule enforced by the NSA of not discussing any work outside of Crypto City, as employees fondly referred to the NSA complex. Since they worked together in the Computer Systems Security and Signals Analysis group on the same cases and were equally dedicated to the job, they often discussed their projects and enjoyed bouncing ideas off each other.
George and Trevor had different work schedules but their times in the office overlapped. While George usually arrived at daybreak and left around midafternoon, Trevor was on a nine-to-five stint, but most days he could be found working late into the night on complex or puzzling projects.
“Good. Nobody tried to run me down today,” Trevor replied with a smirk as he sat at his desk. He immediately turned his attention to his screen and initiated the iris identification process that authorized him to use his computer, and proceeded to open the queue with the latest logs generated by the many supercomputers, containing lists of flagged conversations to be screened by flesh-and-blood analysts like him.
“So, what do we have here?” he asked out loud, looking through the data scrolling up on his screen. He became fully engrossed in the transcripts from one of his latest taps and proceeded to analyze the incoming data, taking down the necessary information acquired from the log files that would be forwarded to the operative contact for each case.
Trevor’s general responsibilities were the same as any other employee’s, but his specialization in data tracking and analysis, server infiltration, and digital surveillance made him a priceless asset to the Agency. Working for the NSA was a dream job for anyone in his field—a dream that came with the added bonus of having access to tools nobody else had, and the highest technology on the planet.
The NSA, in addition to being responsible for most of the United States’ eavesdropping satellites, was also in charge of the American surveillance share of Echelon, the mother of all surveillance networks. Every word in every message within frequencies and channels picked up by the many antennas and satellites owned and operated on behalf of Echelon were automatically screened, sorted based on keywords—a list containing not only its parent agency’s chosen keywords, but also those provided by each of the five agencies which made up the UK–USA Security Agreement—and either discarded or redirected for further analysis. In addition to screening for words on the red-flag list, Echelon was also responsible for targeted surveillance, which made it possible for a known terrorist’s communication to be screened, potentially uncovering a plot or hideout.
Being part of a group that actually found clues and evidence which in turn put bad guys behind bars and saved lives made Trevor feel like a hero, even when it was accomplished from behind the shield of his computer screen. Secretly, he wished he was out in the field, but his highly specialized skills in finding those elusive digital clues marked him as a desk jockey, albeit a very competent and successful one. Most days, content to be the ghost behind the screens, he was happy to help several different US
Christiane Shoenhair, Liam McEvilly