Chapter 13: The Digital Fog
Miller remained fixed in his observation position by the window, the cold surface of the pane barely separated from his skin by the thin layer of hotel glass. He watched the distant hospital, an immense collection of stone, steel, and light, waiting for Echo-One’s operational signature. The digital attack should be hitting the target network soon. He mentally tracked the two-hour window Echo-One had requested for the deep penetration and forced shutdown. The time was ticking away, allowing the chaos to align with the critical administrative shift change. That overlap enhanced the effect, guaranteeing maximum distraction.
The silence in the room was absolute, broken only by the almost imperceptible hiss of the motel’s aged climate control unit. It was the sound of necessary, controlled waiting, the sound of the world holding its breath before necessary action. The pre-dawn light was finally beginning to assert itself, pushing back the deep indigo of the night sky, making the hospital’s internal lights seem less intensely brilliant.
Miller focused on the administrative wing, the ground floor and the lower levels where accounting, billing, and IT departments would reside. That was where the initial, visible signs of the digital intrusion should manifest. He did not expect fire alarms or physical chaos. He expected the slow but undeniable evidence of systemic network failure.
He reviewed his current situation again, confirming the necessity of the pivot. The physical disguise kit, the meticulous preparation for the hospital break-in, now seemed ridiculously crude compared to the elegant solution Echo-One was deploying. The two shadows in the dark sedan two hundred yards away were still static, still focused on the motel entrance and the highway access road. They were watching for George Keller to move, expecting their quarry to be trapped by their observation. They were waiting for a physical confrontation, completely unaware the operation had already gone completely ethereal, shifting to a plane they could not observe from their sedan.
The second hour arrived, and the internal clock Miller kept running reached its zero point. He leaned in slightly, shifting his focus for micro-movements in the distant glass and steel structure. It happened not as a single dramatic event, but as a series of connected failures, subtle enough that anyone not keyed into its purpose might dismiss it as a municipal power fluctuation.
The internal lighting grid of the hospital flickered erratically.
It was not a complete shutdown, only a rapid, uneven pulse. Lights in the administrative sections first dimmed slightly, then flashed a few times, unevenly, as if the local circuit was struggling with a sudden overload or a severe brownout. The effect was immediate in the ground floor windows. A momentary blackout was followed by the lights snapping back to full intensity, only to immediately repeat the irregular flicker.
Miller watched the administrative lights, confirming the hit: the administrative wing, precisely where Echo-One had targeted the financial matrix. The IT systems were fighting the incoming breach, triggering power cycling and temporary system overloads.
The next moment confirmed the breadth of the penetration. A dramatic, localized darkening swallowed the lower administrative wing. It went completely dark, then the emergency backup lights kicked in, bathing the area in a sickly, jaundiced yellow light. That indicated the mandatory segregation of the network, forcing the administrative sector to isolate its systems from the hospital’s main, patient-critical systems. That was the core objective: administrative lockdown, total security diversion.
The final confirmation came from the exterior. The external security floodlights, massive banks of high-intensity illumination used to deter perimeter breaches, snapped on with aggressive brilliance. They were not normally active at this hour, not when the pre-dawn was already providing natural light. The sudden activation indicated that facility security had been systemically alerted to a major intrusion, forcing the physical security protocols to activate in response to the digital threat. The floodlights pointed outward, away from the front entrance, toward the delivery docks and the remote parking structures, exactly the areas where phantom hackers would logically be trying to enter to retrieve the stolen data. It was misdirection at its finest.
The administrative meltdown was localized, contained to the systems Miller needed to shut down, precisely as planned. This was the precise level of chaos he had ordered. It signaled a clear window of opportunity. The hospital’s physical and digital resources were now focused entirely on managing the perceived external financial data theft.
Miller rose from his chair, moving with the economical grace of a man who suddenly had a clear, defined objective. His planned physical infiltration route was now completely compromised by the outside surveillance, but the hospital itself offered an even more complex protection: self-inflicted confusion.
He briefly looked toward the duffel bag tucked beneath the coat rack, the kit containing the lock picks and the scrubs. He dismissed it with a slight shake of his head. The full kit was a liability; he needed speed, not equipment. He needed the appearance of a man who belonged, not a man prepared for a black-bag job.
Miller crossed the room and retrieved his second, smaller pack, the only one he was carrying. It was an essential, minimalist shoulder satchel, black nylon, containing four key items: a high-powered, miniaturized police scanner capable of scrubbing radio chatter, a small medical kit containing specialized sedatives, a fresh, disposable phone, and the key set of documents he intended to plant. This small pack was concealed easily beneath his windbreaker.
He checked his pocket for the room key and then for the small wad of cash. He looked around the room one last time, ensuring no trace of George Keller’s operational intentions remained. The bed was still mussed, but everything of importance was secured. Everything pointed to a man who had simply stepped out early.
He paused by the door, considering the two shadows in the sedan. Their operational posture was static, their expectation was that he would drive away or walk toward the hospital. They were not prepared for a sudden, casual exit directly past their observation point.
Miller opened the motel room door and stepped out into the chill pre-dawn air.
He did not walk towards the highway access road, which would signal flight, or toward the hospital, which would signal the originally assumed intention. Miller walked in the opposite direction, toward the motel’s small, unlit convenience store at the far end of the property. He moved with a measured, easy stride; the pace of a man who simply needed coffee or a newspaper before embarking on a long morning drive.
His heart rate was low, regulated. He was committed to the role of the uninvolved civilian, a persona he had to maintain until he reached the cover of the hospital grounds. He knew the federal agents could easily pull their car around to follow, but his trajectory was designed to inject immediate ambiguity into their observation. Why would their asset go to buy a newspaper if he was trying to break into the hospital?
As he walked, Miller kept his awareness on the sedan, never looking directly at it, allowing his peripheral vision to do the work. The dark non-local vehicle remained static. The two shadows in the front seat did not move. They were maintaining their disciplined stakeout, waiting for the anticipated high-risk action, and they would not break their cover for a simple trip to the convenience store. They had George Keller exactly where they wanted him. Watching.
Miller reached the convenience store, a low, brick structure that was barely lit by a single flickering neon sign. He did not go inside. He passed it, using the structure’s blind corner to break the line of sight from the sedan. He was now operating in a momentary pocket of tactical obscurity. The break of visibility was his cue.
He picked up his pace and immediately began moving toward the hospital access road, taking a path that followed the tree line and avoided the direct sightlines from the highway. Everything about his movement was now quick and professional, but still quiet, designed to cover the distance quickly while remaining unseen by the distant surveillance team. He was relying on the assumption that the federal agents were focused on the primary surveillance zone, the motel entrance and the highway, and that they would not anticipate a foot movement from the blind side of the property.
The hospital was less than a mile away, a structure that now glowed with an unsettling, urgent light. The flashing perimeter security lights created a strobing effect on the trees around him as he closed the distance. He could already hear the subtle, confused sounds of the city beginning to wake up, soon to be mixed with the amplified tones of institutional urgency.
Miller reached the perimeter of the Allegheny Regional Medical Center property, crossing a low, manicured lawn. He had rehearsed the approach mentally, knowing exactly where the security blind spots were. The security floodlights, while brilliant, created deep shadows for anyone moving low and fast. He used the tree line and the landscaping to keep himself obscured.
The first significant noise Miller encountered was the sound of a security guard shouting, muffled by distance, but clearly urgent. The guard was near the loading dock area, coordinating the physical response to the digital attack.
“Check the north perimeter! Davis says the remote backups are still showing an open port on the 4th floor!” the voice yelled, clearly frustrated.
The hospital was already consuming itself with technical panic. The IT lockdown had forced security to treat the digital threat as a physical one, diverting staff to check physical locations for signs of intrusion. Miller smiled faintly, feeling a grim satisfaction. Echo-One had delivered the chaos beautifully. The security staff was chasing a ghost that lived in the accounting server, not a former prisoner of war approaching the ICU.
Miller bypassed the main entrance, which was too exposed and too likely to be monitored by responding police vehicles or external security patrols. He headed instead for the secondary entrance typically used by hospital staff for early morning arrivals, an entrance positioned near the administrative wing that was currently under lockdown.
He arrived at a sliding glass door marked Authorized Personnel Only – Swipe Access Required. The door was functioning, but the system it operated on was compromised. As he watched, a young woman in an administrative uniform approached the door, swiped her card, and frowned when the light stayed red.
“Damn it, the whole system’s down,” she muttered, pulling on the handle.
Miller observed her. She tried her card again, then reached for a small silver box on the wall. She was entering a manual bypass code, a procedure that should be reserved for total system failure.
The door clicked, and the woman pulled it open, stepping quickly inside. She left the door slightly ajar, annoyed, not bothering to fully close it as she hurried off, presumably to deal with the chaos in her department.
Miller moved swiftly through the small opening she left. He was inside the hospital, unnoticed.
The interior of the hospital was not chaotic in a panic sense, but it was filled with palpable, administrative tension. Nurses and doctors moved with their standard, professional urgency, but the security and administrative staff moved with a frantic, uncoordinated energy. Walkie-talkies hissed constant, garbled technical chatter.
He was in an area marked Staff Lounge and administrative offices. The air was thick with the acidic smell of stale coffee and disinfectant. The administrative offices were in partial darkness, bathed only in the red glow of emergency lighting. Employees wandered around, clutching clipboards, unsure where to go since their computer systems were completely isolated. Many were standing by landline phones, waiting for instructions from IT.
Miller moved through the hallway, affecting the pace of a consultant or a senior, off-shift physician who was focused on a critical patient. He moved past a security guard who was staring intently at a dimmed monitor near a time clock. The guard glanced at Miller, but the lack of distinctive uniform meant Miller did not register as a high priority. The guard was focused on his malfunctioning security feed, not on assessing strange foot traffic.
Miller reached the stairwell, moving quickly upward toward the patient floors where he could regain his sense of navigation regarding the patient wards. The emergency lighting on the stairwell was more reliable, a steady orange glow. He climbed quickly, three flights at a time, until he reached the fifth floor, the ICU level.
Stepping out onto the fifth floor immediately reduced the administrative noise. This area operated on critical systems, and the IT breach had been programmed by Echo-One to avoid total failure here, allowing life-support to continue, but administrative communications were still fractured. The air here was colder, sterile, defined by the rhythmic pings and beeps of monitoring equipment.
Miller moved through the specialized, quiet corridors toward the intensive care unit. He noticed subtle changes in the usual ICU protocol. A nurse station was understaffed, and a security officer who should have been guarding the entrance to the wing was not in his normal position. The officer was down the hall, speaking urgently into his radio, his back turned to the main corridor, completely distracted by the ongoing crisis.
Miller used the diversion, slipping past the distracted guard and entering the ICU waiting area. This area was dark now, unoccupied by worried families, given the early hour. He paused to allow his eyes to adjust fully to the subdued lighting.
He needed to confirm Karl Neumann’s status and location before he could execute the identity neutralization phase. Neumann was likely in a specialized private room given his high-profile trauma and the neurosurgery involved.
Miller pulled out the miniature police scanner from his concealed pack. He kept it tucked close to his chest, minimizing the chance of its glow being seen. He quickly tuned it to the internal hospital maintenance frequency, a channel he knew was often used by administrative and security supervisors to communicate logistics during a system failure. The air was full of fragmented communications.
“Team Bravo, confirm external lockdown of patient records access! We can’t have these damn hackers accessing the internal patient files!” a voice snapped over the radio.
“Negative confirmation, Sarge. We’re working with hard copies only right now. The admin system is completely isolated. We’re moving to paper protocols until IT can clear the sector,” another voice responded, clearly overwhelmed.
Miller listened for any mention of the V.I.P. patient, searching for the name ‘Karl Neumann’ or any coded designation. He heard nothing. The current security focus was exclusively on the massive data breach and administrative chaos. The patient on the fifth floor was, for the moment, irrelevant as a security concern.
That obliviousness provided Miller with the ideal opening.
He moved silently past the main desk, keeping his shoulders low, using the medical carts as cover. He spotted the room assignment board, a magnetized white board that listed patient names and room numbers. It was covered with clipped folders, indicating the move to paper protocols.
Miller paused, scanning the names of the few occupants on the board. He wasn’t looking for a common German name like Karl Neumann, but for the assigned designation the hospital would use to preserve privacy.
Near the bottom of the list, scribbled in faint marker, was a name and a room number: “Patient K. Keller, Rm 507.”
Patient K. Keller. Miller realized the substitution immediately. The hospital, in its attempt to ensure privacy and confusion, had used Miller’s alias identification presented at the scene—George M. Keller—to create a placeholder profile for the unidentified trauma patient. Karl Neumann was now officially K. Keller in their internal records.
Miller noted the room number: 507. It was an isolation room at the furthest end of the wing.
He adjusted the lay of his windbreaker over the satchel, ensuring the contents were fully concealed. He began moving towards Room 507, maintaining the same smooth, purposeful stride that gave him the appearance of belonging.
As he walked, he passed two nurses clustered around a wall terminal, both of them staring at a frozen screen.
“I can’t print the status report on the Keller patient,” one nurse complained, tapping the screen in frustration. “The whole administrative server is still locked down.”
“Just do it by hand for the midnight log,” the second nurse sighed, sounding exhausted. “This mess is going to last all day. They’re saying it’s a massive breach, probably international.”
Miller continued moving. Confirmation was now absolute. The digital fog covered the physical approach completely.
Room 507 was at the end of the very quiet wing. A single, dedicated nurse was required to monitor the multiple lines and machines keeping the patient stable.
Miller slowed his pace just before reaching the room, pausing at a drink dispenser as if pondering a late-night cup of water. He observed the stationed nurse. She was a middle-aged woman, her expression drawn, focused intently on the patient's vitals displayed on the external monitor set into the wall beside the door. She was taking manual notes on a clipboard, meticulously recording the telemetry, circumventing the failed digital system.
Miller stepped away from the dispenser and approached the room, maintaining a relaxed, clinical expression. He was not wearing scrubs, but his clean clothing and calm demeanor implied a level of authority.
He made deliberate eye contact with the nurse, offering a quick, non-verbal acknowledgment of her presence, the kind of exchange common between mid-shift hospital personnel.
“Evening,” Miller said, keeping his voice low, almost a whisper, as suited the ICU environment.
The nurse looked up, surprised, but did not show alarm. She saw him as a professional peer, possibly a specialist.
“I’m sorry, sir, are you consulting?” she asked, her voice hushed.
“Just making a quick round,” Miller said, adopting the smooth, low-pitched rhythm of a physician who expects immediate access. “Just confirming status for a colleague. Patient Keller in 507. Vitals holding?”
The nurse quickly scanned her clipboard, completely distracted from her security duties by the professional inquiry.
“Vitals are stable, sir,” she confirmed, pointing to the monitor. “Still completely unresponsive, of course. The neuro team is waiting until morning to reassess the sedation level. We’re on hard line watch until recovery.”
Miller nodded, feigning critical understanding of the medical information. “Good. Just need a moment to confirm the integrity of the lines. I understand things are difficult with the network down.”
He gestured toward the door, subtly asserting control over the situation. The nurse, overwhelmed by the systemic chaos and focused on her demanding duties, stepped back a half-pace, allowing him to approach the door. She clearly assumed he was there to assist or confirm something critical, a specialist dispatched in the confusion.
Miller slipped quickly inside the room, barely breaking pace.
The door closed quietly behind him, cutting the sterile silence of the hallway. He was now alone with Karl Neumann.
The room was dark, save for the intense, flickering green and orange lights of the various machines. Neumann was lying still, utterly helpless, tubes and wires running to every part of his body. His face was pale and slack, marked by the deep exhaustion of severe trauma and medically induced rest. He was exactly where Miller had left him, a prisoner of his own body, dependent entirely on Miller’s system for his continued existence.
Miller looked at the former guard, the man who had been responsible for endless nights of brutal cold, hunger, and dread in the German P.O.W. camp. The man was now an object of immense, life-dependent care. The irony was so profound it was almost comical.
Miller moved to the bedside, his movements efficient and quiet. He ignored the machines, focusing on the patient. He was not there to harm Neumann but to execute an identity termination and secure the operational objective. Physical death was not required; digital death was sufficient.
He leaned in close to Neumann’s face, close to the oxygen mask. Miller spoke in a low, gravelly voice, a relic of the wartime past, knowing Neumann could not hear him through the sedation but needing to impose the finality of the process.
“Alpine-Tango is closing the loop, Sergeant,” Miller murmured. “You disappear now. For good.”
Miller pulled the documents from his satchel. They were official-looking hospital forms and a pre-aged, water-damaged set of foreign identity papers. The plan was to substitute the fabricated papers for Neumann’s personal effects currently held by the hospital security or administration. If those effects were compromised or destroyed during the chaos, he would plant the fabricated identity in place of where the records should be, creating a new, verifiable trail for the authorities to follow. That verification would lead them to a non-existent, fabricated death in an offshore medical jurisdiction.
He needed to locate where the hospital would store the personal effects of an unconscious, trauma patient. Based on previous operational planning, the hospital would have inventoried and secured the contents of Neumann’s wallet and clothing, usually in a dedicated storage locker attached to the administrative area to which K. Keller had been assigned. If the administrative system was in lockdown, the physical ledger would be the only record.
Miller scanned the room for any sign of a patient ledger or an inventory form. He found none. Everything indicated the central security and administrative lock-up was the location of the evidence.
He performed a quick, professional assessment of Neumann’s physical state, confirming the patient was adequately sedated and would be unresponsive for the next several hours. He needed to ensure no sudden spike in vitals or movement would alert the nurse, who was still diligently logging data just outside the room.
Miller turned and moved toward the room’s external waste receptacle. If Neumann’s old, tattered clothing had been immediately disposed of, or if any personal items were accidentally discarded, they needed to be removed or replaced. He opened the specialized waste bin for biological detritus. Nothing of significance.
His objective was not in this room. His objective was the evidence locker in the administrative section, which was currently in lockdown.
Miller returned to the door, placing his hand on the latch. He paused, ensuring his breathing was steady and that the nurse outside was still solely focused on her charts. The chaotic hum of the hospital’s struggle against the cyberattack was still persistent, a low, urgent drone that covered any minor sounds of his movement.
He stepped out of the room, pulling the door closed behind him. He maintained the same calm, consulting demeanor.
The nurse looked up, her relief evident at the continued stability of the patient.
“Everything checked out, sir?” she asked.
“Holding steady,” Miller confirmed, offering a non-committal, professional nod. “Tell the night supervisor I’ll have the full report by nine.”
He offered a smooth, confident lie that anchored his presence as authorized and then walked away from the ICU wing.
Miller’s objective was now clear: descend back into the chaos of the administrative level, locate the patient effects locker, and implant the fabricated identity documents. He would substitute the old war documents for the newly prepared set, creating the necessary digital ghost. The original documents, if any remained, would be destroyed later.
Miller retraced his steps to the stairwell, moving downward with increased speed. The administrative lockdown was still severely crippling the lower levels. This provided maximum tactical coverage.
He arrived on the administrative floor. The confusion had intensified. Security guards were now actively running, their walkie-talkie chatter laced with genuine alarm. The scale of the digital breach and the forced administrative isolation was having a profound effect on the hospital’s ability to manage its daily functions. The entire facility was beginning to choke on its own security measures.
Miller moved quickly towards the Security Office, the most likely location for the sequestered personal effects. The office was located deep within the darkened administrative wing. The emergency lights cast long, distorted shadows, giving the area a nightmarish, abandoned quality.
He reached the security checkpoint. The central physical guard station was completely unmanned. The two officers who should have been stationed there were clearly deployed elsewhere, running perimeter checks or assisting IT with the physical connection points they believed the hackers were exploiting. The monitors were all displaying “SYSTEM ERROR.” The only sound was the whirring of the disconnected fax machine.
Miller moved past the empty station and toward the secure storage room for patient effects. The door was steel, marked with a heavy electronic lock and a sequential key slot.
He pulled the specialized electronic sensor from his satchel, a sophisticated, professional tool that could bypass most contemporary magnetic card locks. The key slot, however, presented a different problem. He would need physical manipulation.
Miller paused, assessing the risk. He had left his lock-picking kit secured in the duffel bag back at the motel, considering it unnecessary for the digital pivot. That was a calculated error. He had exchanged physical certainty for speed.
He moved quickly to the empty security console. A large ring of keys was dangling from a hook next to the radio dock. It was the security master ring, carelessly left behind in the chaotic rush to secure the perimeter.
Miller took the ring, the weight satisfyingly solid in his hand. He was immersed in the operational error of the frantic staff. The digital fog had created total procedural collapse in the physical security system.
He quickly scanned the keys and selected the one marked ‘Admin Storage.’ He moved back to the secured room.
He inserted the key and turned it. The heavy lock mechanism clicked with a loud, mechanical sound that seemed magnified in the silence of the abandoned corridor. He withdrew the key and pulled the heavy steel door open, stepping into the darkness of the secure storage room.
The room smelled of old paper and sterilized plastic. It was a space designed for security and bureaucracy. Rows of heavy steel lockers lined the walls, each labeled with sequential numbers and a small slot for a patient file.
Miller moved quickly to the rows designated for the current trauma intake. He found the locker labeled “Intake: Trauma T-500 Series” and searched for the designation K. Keller.
He found it: A small steel locker, near the bottom, labeled with a handwritten tag: K. Keller, Rm 507. Secured per Sgt. F. Vance request.
The mention of Sergeant Vance, the detective from the police investigation, was a critical piece of information. Vance had clearly taken extra steps to secure the personal effects of the mysterious trauma patient, indicating continued police interest. That meant the material inside was considered evidence—precisely what Miller needed to neutralize. He could not simply destroy it; he had to replace it with a ghost.
Miller inserted the master key into the small locker lock. The small tumblers turned easily. He pulled the locker open.
Inside was a sealed, brown paper evidence bag and a thick patient binder.
Miller ripped the seal on the evidence bag. Inside, he found a sealed plastic pouch containing Karl Neumann’s minimal effects: a leather wallet, a few scattered German coins, and a small, frayed photograph of an older woman. The old, worn wallet was what he was looking for.
He carefully extracted the wallet, placing the evidence bag on the shelf beside him. He opened the wallet. It contained a few small bills, an expired European driver’s license, and several nondescript business cards. Crucially, the wallet did not contain any official wartime documents or anything linking Neumann explicitly to Stalag VII-A. Miller had destroyed the Kennkarte previously, and Neumann had clearly not carried anything else incriminating during his trip.
Miller pulled the license and the few personal items from the wallet. He replaced the true identity documents with the fabricated set he had brought: a completely new, fake passport for ‘Klaus Kellerman’ with a falsified death certificate printed on thin, watermarked paper from an obscure South American micro-nation. Kellerman was the identity shell Echo-One was simultaneously using to anchor the digital death narrative. Miller tucked the documents into the wallet, securing them precisely where the originals had been.
He took the original driver’s license and the German coins, placing them into his own satchel for later destruction. The substitution was complete. Neumann was now Klaus Kellerman, successfully killed off in a foreign country and requiring immediate legal termination in the U.S. hospital system to clear the paperwork.
Miller secured the wallet and the fake documents in the evidence bag, resealing the bag with a small adhesive strip he had peeled from his pack. He then focused on the patient binder. The administrative records would confirm the physical identity of the patient and create the link to the billing system that was currently under attack.
He opened the binder. Inside were the hardcopy intake forms, signed by the attending physician and the trauma nurses. All forms listed the patient as “K. Keller, Jane Doe,” with Miller’s civilian name George M. Keller listed as the reporting party.
Miller quickly inserted a single, thin sheet of aged, official-looking document between the intake forms. This document was a fabricated “Foreign Executor Statement” from an offshore legal firm, demanding that all administrative and billing data related to Klaus Kellerman (K. Keller) be immediately transferred to their legal jurisdiction and that all records be sealed pending the execution of the Kellerman estate. It created an immediate administrative and legal nightmare, playing directly into the financial breach narrative.
He closed the binder, returned it to the locker, and closed the steel door. He relocked the compartment, returning the master key ring to the hook on the security console.
Miller had successfully completed the second phase of his plan: the physical confirmation of Neumann’s status and the complete neutralization of the patient’s active identity. The police investigation would now find a trauma patient whose identity appeared to be Kellerman, tied up in a complicated international legal dispute, perfectly aligning with the catastrophic financial data breach currently consuming the hospital administration. Sergeant Vance’s secure evidence was now fundamentally altered, providing a new, convenient reality.
Miller turned and moved quickly out of the security area and back toward the administrative corridor. His objective was the outside, to be far from the hospital before the physical security response solidified and they began to manage the situation.
He moved toward the staff exit door he had used to enter. As he approached, he heard a new, distinct sound mixing with the technical chatter: the sound of sirens and external vehicles arriving at the front of the hospital. The police were arriving to manage the security crisis.
He was moving toward the hospital to implement the second phase of his plan: a physical confirmation of Neumann's status and evidence neutralization before the full lockdown took effect.
Comments (0)
No comments yet. Be the first to share your thoughts!