The cursor hovered over the link: .
To a bored teenager in a dark bedroom, it was a shortcut to a weekend of stealth gaming. To Sam Fisher, watching the data packets move in real-time from a terminal inside a damp NSA sub-basement, it was a "Trojan Horse" designed by the JBA (John Brown's Army). The cursor hovered over the link:
"Understood, Sam," Irving Lambert’s gravelly voice crackled back. "We need you to infiltrate the local server farm where that link is being hosted. If that 'free download' goes viral, the JBA will have a decentralized network we can’t touch. You have to delete the source file before the peer-to-peer seeding becomes unstoppable." You have to delete the source file before
"Lambert, they’re biting," Sam whispered into his comms. "The file isn't the game. It’s a mirrored encryption key. Anyone who downloads it is unknowingly hosting a fragment of the JBA’s new communication server." The cursor hovered over the link: