In Geneva, Camellia and Alia huddled over Mary’s USB.
They cracked a partition marked ASH using a string of birthdates and ciphered names Mary had left behind in an old recipe book.
Inside was a single spreadsheet labeled:
“List of compromised humanitarian officers, agency execs, and covert moles — DO NOT PUBLISH.”
Names appeared.
A...