Page 50
CHAPTER FORTY-NINE
Knight
The flash drive I brought back with me from Horizon Tech holds more than just virus code. I've spent hours combing through the data, finding breadcrumbs Victor left scattered throughout their systems. Patterns emerge in access logs, security protocols, network configurations.
Eva sleeps in my bed, exhausted from our escape. The name in my head feels natural now. I can’t pinpoint the moment when Glitch became Eva in my mind, but it has. Like so many other walls I've built, that defense has crumbled too.
I should be resting, but my mind can’t leave the data alone. Something about the way certain systems were targeted feels deliberate. More deliberate, I should say, because viruses are always designed with a reason in mind. But this one … it has additions to it that make no sense. It’s almost like they’re signposts, pointing me in a direction Victor wants me to go. And so, I follow it.
My screen fills with a flood of information—building schematics, personnel files, project documentation—everything meticulously organized, each piece part of a larger puzzle. The virus wasn’t just designed to cripple their infrastructure; that was only one part of the plan. The real goal was gathering data while the company was distracted combating the virus.
A new pattern catches my eye. Encrypted network traffic is splitting off from the rest, heading in a direction that doesn’t quite make sense. I trace it. It bounces between random servers, making it harder to pin down, but eventually, I track it to a new server location.
I open another tracker, running a quick check on the path. The data leads me to a building on the outskirts of the city. While my programs work to break into the system there, a new notification pops up. I’ve set up a trace to monitor any files linked to Michael Porter. And there it is. A few clicks bring up his employee access logs—showing that his credentials were used to access core systems during odd hours, in the weeks leading up to his disappearance.
"Son of a bitch." The curse emerges under my breath as I expand the data.
The access patterns don’t match standard intern protocols. Michael wasn’t just doing basic tech work; he was embedded deep in their systems. And his work—his coding style—matches the cruder implementation I found layered through Victor’s virus.
I trigger a few more commands, watching my programs bypass their first level of security. The screen flashes briefly, and then the system opens wider. The facility’s network traffic shows regular data bursts, encrypted with the same algorithm I found in the virus architecture. High-level security protocols, automated defenses, armed patrols. This isn’t standard corporate protection. And the surveillance—what I’m seeing through their own cameras—suggests they’re more interested in keeping people in than out.
My fingers move across the keyboard, digging deeper into the facility's systems. Power consumption, supply deliveries, guard rotations—everything points to a sophisticated containment operation.
The scale of what we're facing settles like lead in my stomach. This isn’t just about finding Eva’s brother anymore. It’s about discovering who has enough resources to hold Michael, forcing him to code something potentially catastrophic. And if they have him, they might have Victor too. And that means that this isn’t a petty game my mentor has set up to fuck with me, it’s something bigger.
A soft sound from the bedroom pulls my attention away from my screens, a quiet reminder of what happened between us earlier. The way she felt, how she looked at me, what happened after we made it out of Horizon Tech ... It shouldn’t be clouding my focus, but it is. I force myself to look back at the screen, trying to shake off the distraction. I need to stay sharp.
Each new piece of data that my programs unravel confirms the truth I’ve been avoiding. I can't handle this alone. Not with what's at stake. Not with the level of security I'm seeing. The facility's defenses are layered—physical barriers, electronic surveillance, armed response teams. And those things lead me to the conclusion that whatever is in there … it’s important enough for me to want access. But getting in will require more than just computer skills. It’ll need pretiming and multiple skill sets that I don’t have … but I know people who do.
Pulling my phone from my pocket, I check the screen. I don’t involve my brothers in my work. Just like they don’t involve me in theirs unless absolutely necessary. We respect each other's separate lives, separate businesses. Separate secrets. But this ...
When you’re faced with a facility that has military-grade security, an unknown number of hostile forces, and potentially at least one tech prisoner who may not be in any condition to help himself, you have to use what you have available.
For this, I need Bishop's ability to create perfect covers, and Rook's tactical expertise. The kind of coordinated infiltration that only comes from working as a team.
I dial Bishop's number before I can talk myself out of it. It connects on the second ring.
"Finally decided to update us?" Bishop's tone carries the sharp edge I deserve after my earlier dismissal.
"I need help." I don’t waste my time with small talk. "Both of you. It's about what happened at my apartment."
There’s a short pause, and then his voice shifts from irritated brother to businessman. "What kind of help?"
"The kind that requires your particular skills. And Rook's."
"How bad?"
"Military-grade facility. Armed patrols. At least twenty guards." I scan the schematics again. "I can't handle this alone."
"We'll be there in twenty."
When my phone buzzes nineteen minutes later, I initiate the elevator's descent. They exit the elevator with the kind of focused intensity that comes from years of handling dangerous situations.
"Before you look at anything," I say, leading them into my workspace, "you need to understand what we're dealing with. The explosion at my apartment was just the start. It's all connected to Victor Nash."
"Your old mentor?" Rook's eyebrows lift. "The one who died in prison?"
"Apparently he’s not as dead as I thought he was." I turn my screens so they can see the facility schematics. "He's been leaving me messages. Warnings about something happening at Horizon Tech. When we breached their systems earlier today, I found this facility. The security suggests they're holding something there. I’m pretty sure I know what’s in there, but I need to get inside to find out."
Bishop leans closer to study the layouts while Rook examines the patrol patterns with professional interest.
"Initial count shows at least twenty guards based on rotation patterns. Unknown number of other personnel." I switch to satellite imagery. "Three-minute gap in north sector coverage during shift changes."
"Getting credentials won't be simple." Bishop moves to examine the patrol routes more closely. "Place like this probably has biometric verification."
"Already working on bypassing their security protocols." I pull up another screen of data. "But the actual infiltration is going to need both of you."
"How long do we have?" Rook's question cuts straight to the core of the situation.
"Their systems show increasing activity levels. Whatever they're planning is close to completion. I think the virus that targeted me, and then Horizon Tech is just the start."
The sound of a door opening makes us all turn. Eva appears in the doorway, wearing one of my shirts, and freezes at the sight of my brothers. The fabric reaches mid-thigh, making her look both vulnerable and undeniably mine. The possessive thought catches me off guard, and I push it away.
Ignoring the curious looks from both of my brothers, I gesture her over to join us. "We found something."
She moves to study the screens, her body leaning toward mine, fitting against me like she belongs there.
"What am I looking at?"
"A facility outside the city." I highlight the security perimeter. "Based on access logs and network traffic, I think this might be where your brother is."
Her sharp intake of breath draws Bishop's attention. "Her brother?"
"Michael Porter. An intern at Horizon Tech who disappeared nine weeks ago." I bring up his file. "His credentials were used to access their systems after hours. The coding style in those logs matches parts of the virus."
"He can’t be there willingly. They must be forcing him, right?" Eva's voice carries equal parts hope and fear. "That's why he stopped answering my calls? Why he got so distant before ..."
"Maybe. And if they have him, they might have Victor too."
Rook straightens. "You think your mentor is being held there?"
"The virus carries his signature style, but there are elements that feel forced. Like someone else is directing the work." I bring up more data, more than aware they have no idea what they’re looking at. It looks like gibberish to them. To me, it looks like art. "Plus, the warnings he left were designed to lead us here."
"So, this is what? A rescue mission, or a sabotage operation?" Bishop's focus sharpens.
“Why not both?” I reply, my tone dry. "You think we’ve got the luxury of picking one?"
"Right. But to pull it off, we need to know exactly what we're dealing with." His eyes go back to the screen. "How sure are you about the guard rotations?”
"Data's fresh from their systems. Three eight-hour shifts, twenty minutes overlap during changeover." I scroll through more security logs. "But that’s just the obvious part. Based on power consumption and supply deliveries, there's more personnel inside."
Eva straightens beside me. "When do we go in?"
" We don't." Rook's emphasis on the word makes her stiffen. "This kind of operation requires?—"
"Her brother might be in there." The words emerge with more force than intended. "She’s not some bystander. She’s invested, and she’s not sitting this out."
Rook raises an eyebrow. Bishop looks like he’s about to argue, but I cut him off before he can.
“We don’t have time for bullshit arguments. Eva’s in. End of discussion.”
Table of Contents
- Page 1
- Page 2
- Page 3
- Page 4
- Page 5
- Page 6
- Page 7
- Page 8
- Page 9
- Page 10
- Page 11
- Page 12
- Page 13
- Page 14
- Page 15
- Page 16
- Page 17
- Page 18
- Page 19
- Page 20
- Page 21
- Page 22
- Page 23
- Page 24
- Page 25
- Page 26
- Page 27
- Page 28
- Page 29
- Page 30
- Page 31
- Page 32
- Page 33
- Page 34
- Page 35
- Page 36
- Page 37
- Page 38
- Page 39
- Page 40
- Page 41
- Page 42
- Page 43
- Page 44
- Page 45
- Page 46
- Page 47
- Page 48
- Page 49
- Page 50 (Reading here)
- Page 51
- Page 52
- Page 53
- Page 54
- Page 55
- Page 56
- Page 57
- Page 58
- Page 59
- Page 60
- Page 61
- Page 62
- Page 63
- Page 64
- Page 65
- Page 66
- Page 67
- Page 68
- Page 69
- Page 70
- Page 71
- Page 72
- Page 73
- Page 74