Page 46
Story: Chain Me
I've seen this pattern before. My fingers itch for a keyboard, for access to system logs that would confirm what my instincts are already telling me.
The cameras in the east wing went dark first, followed by the security panels and then the main grid. It's not the random cascade of a genuine power failure. It's deliberate. Orchestrated.
“Wait.” I plant my feet, forcing Erik to stop.
His expression hardens. “We don't have time for?—”
“This isn't random,” I say, meeting his gaze directly. “I've seen this signature before. It's a specific type of systems breach.”
Erik's eyes narrow, his jaw tensing as he processes my words. I watch the conflict play across his face—the professional soldier weighing my expertise against his training and protocols. His hand moves instinctively toward his weapon, but his eyes stay locked on mine, assessing, calculating.
“Explain,” he finally says, voice taut with restraint.
“The pattern of failure. The timing between systems going down. It's methodical.” I lower my voice. “Someone's creating a rolling blackout to mask their approach. They're using the Blackwater Protocol—it's a specialized infiltration technique.”
Something shifts in Erik's expression. The conflict doesn't disappear, but it transforms into something more complex. He's weighing my value as an asset against the risk of trusting me.
“How would you know that?” he asks, his voice dangerously quiet.
I take a deep breath and meet Erik's intense gaze. “I can help,” I say, fully aware of what I'm asking for—access to systems that have been forbidden to me since the moment I was brought here. “This is a sophisticated breach. I've seen it before.”
Erik's jaw tightens, the muscles there flexing as he weighs his options. I hold my breath as he considers my proposal—the security professional battling with the man who's shared his bed, his past, pieces of himself.
Long seconds pass before he nods sharply. “Security office. Now.”
Something shifts between us with those three words—a new level of trust neither of us expected. The air feels different, charged with something beyond the danger surrounding us.
“If you're playing me...” he starts, his voice low with warning.
I cut him off immediately. “I'm not. This is my expertise, Erik. Let me help you.” My words are firm and confident. This is my territory, not his.
He leads me through a series of corridors I've never been allowed to access before. When the security office door slides open, it feels like entering a forbidden temple—all the technology I've been denied for weeks laid out before me. Multiple screens line the walls, servers hum in the background, and most importantly, there's a keyboard at the main station.
My fingers hover over the keys, a moment of hesitation washing over me. This could be my chance—to send a message out, to alert someone, to escape. No one would understand these systems better than me.
But I look up at Erik and see the trust in his eyes that's cost him so much to give. The vulnerability beneath the soldier's exterior.
I begin typing, the familiar click of keys under my fingertips like coming home. “They're using a sophisticated multi-layer attack,” I explain, hands flying across the keyboard. “See how they've created cascading failures to mask the actual breach point? Classic misdirection.”
Erik stands to guard behind me. His presence is solid and reassuring. Somehow, his proximity makes me work faster, better—as if his confidence in me has unlocked something.
Then I see it—familiar strings of code scrolling across the diagnostic screen.
“This is impossible,” I whisper, fingers freezing over the keys.
“What is it?” Erik's voice is close to my ear, his breath warm on my neck.
“They're using a modified version of my encryption protocol—something I designed. Someone stole my work.” The realization hits me like a physical blow. My creation, my intellectual property, turned against us.
The violation feels personal, igniting determination that burns away any remaining hesitation. The person behind this attack has just made it personal.
The security office is barely large enough for a single person, let alone two. Erik stands behind me, so close I can feel the heat radiating from his body. The proximity makes it hard to focus on the code dancing across the screen, especially with the weight of what's happening around us.
I type furiously, following the digital footprints of whoever stole my work. Erik leans forward to examine the intrusion pattern, his broad chest pressing against my back. The solid wall of him should feel threatening, but instead, it grounds me.
“There,” he says, his voice low against my ear. His hand covers mine on the mouse, guiding the cursor to a suspicious sequence. “Is that what you meant?”
It surprises me that Erik identified the suspicious code, but all I can focus on is how my skin erupts in goosebumps at his touch. I nod, swallowing hard. “Yes. That's the signature. How did you identify it?” His hand lingers on mine a moment longer than necessary before withdrawing.
The cameras in the east wing went dark first, followed by the security panels and then the main grid. It's not the random cascade of a genuine power failure. It's deliberate. Orchestrated.
“Wait.” I plant my feet, forcing Erik to stop.
His expression hardens. “We don't have time for?—”
“This isn't random,” I say, meeting his gaze directly. “I've seen this signature before. It's a specific type of systems breach.”
Erik's eyes narrow, his jaw tensing as he processes my words. I watch the conflict play across his face—the professional soldier weighing my expertise against his training and protocols. His hand moves instinctively toward his weapon, but his eyes stay locked on mine, assessing, calculating.
“Explain,” he finally says, voice taut with restraint.
“The pattern of failure. The timing between systems going down. It's methodical.” I lower my voice. “Someone's creating a rolling blackout to mask their approach. They're using the Blackwater Protocol—it's a specialized infiltration technique.”
Something shifts in Erik's expression. The conflict doesn't disappear, but it transforms into something more complex. He's weighing my value as an asset against the risk of trusting me.
“How would you know that?” he asks, his voice dangerously quiet.
I take a deep breath and meet Erik's intense gaze. “I can help,” I say, fully aware of what I'm asking for—access to systems that have been forbidden to me since the moment I was brought here. “This is a sophisticated breach. I've seen it before.”
Erik's jaw tightens, the muscles there flexing as he weighs his options. I hold my breath as he considers my proposal—the security professional battling with the man who's shared his bed, his past, pieces of himself.
Long seconds pass before he nods sharply. “Security office. Now.”
Something shifts between us with those three words—a new level of trust neither of us expected. The air feels different, charged with something beyond the danger surrounding us.
“If you're playing me...” he starts, his voice low with warning.
I cut him off immediately. “I'm not. This is my expertise, Erik. Let me help you.” My words are firm and confident. This is my territory, not his.
He leads me through a series of corridors I've never been allowed to access before. When the security office door slides open, it feels like entering a forbidden temple—all the technology I've been denied for weeks laid out before me. Multiple screens line the walls, servers hum in the background, and most importantly, there's a keyboard at the main station.
My fingers hover over the keys, a moment of hesitation washing over me. This could be my chance—to send a message out, to alert someone, to escape. No one would understand these systems better than me.
But I look up at Erik and see the trust in his eyes that's cost him so much to give. The vulnerability beneath the soldier's exterior.
I begin typing, the familiar click of keys under my fingertips like coming home. “They're using a sophisticated multi-layer attack,” I explain, hands flying across the keyboard. “See how they've created cascading failures to mask the actual breach point? Classic misdirection.”
Erik stands to guard behind me. His presence is solid and reassuring. Somehow, his proximity makes me work faster, better—as if his confidence in me has unlocked something.
Then I see it—familiar strings of code scrolling across the diagnostic screen.
“This is impossible,” I whisper, fingers freezing over the keys.
“What is it?” Erik's voice is close to my ear, his breath warm on my neck.
“They're using a modified version of my encryption protocol—something I designed. Someone stole my work.” The realization hits me like a physical blow. My creation, my intellectual property, turned against us.
The violation feels personal, igniting determination that burns away any remaining hesitation. The person behind this attack has just made it personal.
The security office is barely large enough for a single person, let alone two. Erik stands behind me, so close I can feel the heat radiating from his body. The proximity makes it hard to focus on the code dancing across the screen, especially with the weight of what's happening around us.
I type furiously, following the digital footprints of whoever stole my work. Erik leans forward to examine the intrusion pattern, his broad chest pressing against my back. The solid wall of him should feel threatening, but instead, it grounds me.
“There,” he says, his voice low against my ear. His hand covers mine on the mouse, guiding the cursor to a suspicious sequence. “Is that what you meant?”
It surprises me that Erik identified the suspicious code, but all I can focus on is how my skin erupts in goosebumps at his touch. I nod, swallowing hard. “Yes. That's the signature. How did you identify it?” His hand lingers on mine a moment longer than necessary before withdrawing.
Table of Contents
- Page 1
- Page 2
- Page 3
- Page 4
- Page 5
- Page 6
- Page 7
- Page 8
- Page 9
- Page 10
- Page 11
- Page 12
- Page 13
- Page 14
- Page 15
- Page 16
- Page 17
- Page 18
- Page 19
- Page 20
- Page 21
- Page 22
- Page 23
- Page 24
- Page 25
- Page 26
- Page 27
- Page 28
- Page 29
- Page 30
- Page 31
- Page 32
- Page 33
- Page 34
- Page 35
- Page 36
- Page 37
- Page 38
- Page 39
- Page 40
- Page 41
- Page 42
- Page 43
- Page 44
- Page 45
- Page 46
- Page 47
- Page 48
- Page 49
- Page 50
- Page 51
- Page 52
- Page 53
- Page 54
- Page 55
- Page 56
- Page 57
- Page 58
- Page 59
- Page 60
- Page 61
- Page 62
- Page 63
- Page 64
- Page 65
- Page 66
- Page 67
- Page 68
- Page 69
- Page 70
- Page 71
- Page 72
- Page 73
- Page 74
- Page 75
- Page 76
- Page 77
- Page 78
- Page 79
- Page 80
- Page 81
- Page 82
- Page 83
- Page 84
- Page 85
- Page 86
- Page 87
- Page 88
- Page 89
- Page 90
- Page 91
- Page 92
- Page 93
- Page 94
- Page 95
- Page 96
- Page 97
- Page 98
- Page 99
- Page 100
- Page 101
- Page 102
- Page 103