Sam moved through the shadows of the server facility, the three green dots of his goggles cutting through the dark. He wasn't just playing a double agent anymore; he was hunting a digital ghost. He reached the central console, his fingers flying across the mechanical keyboard.
"Lambert, they’re biting," Sam whispered into his comms. "The file isn't the game. It’s a mirrored encryption key. Anyone who downloads it is unknowingly hosting a fragment of the JBA’s new communication server." Sam moved through the shadows of the server
The cursor hovered over the link: .
"Understood, Sam," Irving Lambert’s gravelly voice crackled back. "We need you to infiltrate the local server farm where that link is being hosted. If that 'free download' goes viral, the JBA will have a decentralized network we can’t touch. You have to delete the source file before the peer-to-peer seeding becomes unstoppable." "Lambert, they’re biting," Sam whispered into his comms
To a bored teenager in a dark bedroom, it was a shortcut to a weekend of stealth gaming. To Sam Fisher, watching the data packets move in real-time from a terminal inside a damp NSA sub-basement, it was a "Trojan Horse" designed by the JBA (John Brown's Army). Anyone who downloads it is unknowingly hosting a