Chapter 1: aaa

The operations room had no windows, and the artificial light kept it in a perpetual state of late afternoon. Lena Voss had started her shift at 4:47 PM, according to the badge log she'd just filed, which meant she had about an hour before whoever came next would arrive to take over. Late October, and the building hummed with a particular energy she'd come to associate with older infrastructure. Something in the server rack beneath the floor gave out a faint vibration, a motor that needed oiling or replacing or both. The municipal infrastructure audit firm that employed her paid for efficiency. The hardware they'd installed five years ago suggested the building had seen better decades.

She scrolled through another batch of security logs. The work was routine enough to be almost meditative by now, which was the point. Lena hadn't wanted this job. She'd wanted the agency, the field, the sharp edges of real intelligence work. When the agency folded and reorganized and reorganized again until half the people who'd started with her had left, she'd found herself looking at options that didn't require security clearance. The firm hired plenty of former government analysts. The work was cleaner, the hours were fixed, and nobody called her at three in the morning asking if she wanted to go look at something in Eastern Europe.

The coffee beside her had gone cold sometime during the third log batch. She hadn't noticed. It tasted like metal when she finally remembered and took a sip, which probably explained the slight grimace. The shift had been quiet. A minor firewall flag on a sewage treatment plant's monitoring system that turned out to be a timestamp error. A port scan originating from a municipal water authority that was just someone's outdated backup script running at an unusual hour. Nothing worth escalating.

She was reaching for the coffee when the terminal on her left lit up.

The laptop was agency issue, a battered machine with a cracked screen that she'd pulled from a lost-and-found bin at the agency's final headquarters two years before it was supposed to be decommissioned. She'd kept it out of nostalgia or stubbornness or both. The protocol for disposing of government hardware was clear. She'd ignored it for a decade. The device sat on the desk behind her monitor, angled away from the workstation she used for the firm, like a pet that had been asked to stay in the other room.

A silent ping. No sound, just the small green indicator on the laptop's status bar. An incoming file transfer on a channel she hadn't opened in months. The channel itself was the interesting part. It had been routed through a relay server that went offline eleven months ago, and the encryption handshake had failed to complete until exactly this second.

Lena looked at the coffee, then at the laptop. She left the coffee alone and pulled the laptop toward her.

The file was small. Under a megabyte, according to the transfer log. She opened the connection handshake first, tracing the routing path. The relay server had been active when it closed, which meant someone had pinged it back to life. An unusual move for a dormant server, unless the whole point was to make someone notice.

She opened the payload.

The file was text-only, plain text with no encoding metadata. No ZIP layer. No encrypted header. No embedded images or scripts. Just characters. She expanded the view and the screen filled with a single three-letter string repeated over and over in a continuous block.

aaa

She scrolled down. The pattern repeated in the millions, a wall of identical triplets with nothing between them except the formatting of the text file itself. No line breaks, no spaces, and no variation whatsoever. The file was structured like something typed by a child learning to spell and then duplicated by a machine.

Except she was an analyst, and nothing was ever quite what it appeared to be. She checked the file properties. Creation timestamp: twelve minutes ago. File origin: the defunct relay server. The sender field was blank. The receiver field was blank. The transfer had gone through an anonymous path that had been cleaned on both ends after the handoff completed.

She ran a hash check. The file's digital signature produced a consistent result, which meant whoever had generated it had used a deterministic method, not a random one. The content was deliberate. Every instance of "aaa" occupied exactly the same byte position relative to the previous one, down to the decimal. This was engineered text, created by a process that repeated itself with mechanical precision.

Her analyst training took over. The pattern needed to be checked against known databases. Not against anything the firm maintained, which would have been pointless. Against the legacy indexing system she'd helped build for the agency. The system had been shut down and repurposed three years ago, but she still had the administrative tools stored on this laptop, old credentials that had never been revoked.

The query ran for forty seconds. The results populated across three panels on her screen.

The pattern appeared in her old access logs.

In her personal archived correspondence, archived at the agency's request before the facility closed, and now stored on a system she'd maintained for years with her own credentials. And in the public-facing infrastructure records of three major internet backbone providers, the kind of data she'd never had authorization to access during her entire tenure at the agency, and which should have been beyond the reach of anyone except a handful of people who operated in a layer of institutional power she'd never fully understood.

The file wasn't just sitting on her screen. It was sitting inside her history. Her old access logs showed it appearing in sequences that predated the file's creation timestamp, as if the data had been there before the transfer, written into the logs at a time before she'd received it.

She dug into the transport layer of the file itself. The application layer was clean, deliberately so, but beneath it, buried in the network handshake metadata, there was a signature block. A cryptographic fingerprint that the protocol had inherited from an older standard, one that had been deprecated and then quietly restored in a patch nobody outside the agency's infrastructure team would have noticed.

She'd seen this fingerprint before. She ran it against the records she kept locally, a private cache of agency technical documentation she'd backed up to her personal drives years ago. The match was exact. One hundred percent on the algorithm, the key length, the timestamp format.

Agent Dragan Miloš.

The dead man who'd written a letter she'd never sent back. The man she'd buried in a concrete-lined grave three days before the Zagreb crash killed him officially. He was listed as KIA. His body had been cremated. The death certificate was a formality that nobody in her chain of command had particularly wanted to deal with, and so the paperwork had moved fast. She'd signed off on a file that said Miloš was dead.

The file said he was sending her something.

She picked up her phone and dialed Marcus Thorne's private number. Marcus had been her handler when she was still in the field, a career intelligence officer with the sort of institutional memory that outlived the agencies he'd worked for. He'd retired to a property outside Edinburgh, though "retired" for people like Marcus usually meant working for a different organization with a different flag.

He answered on the second ring.

"Lena." His voice had the flat, distracted quality of someone in the middle of something. "You're calling from a number I don't have. Which one is this?"

"The one I'm calling from." She kept her voice even. The professional tone she'd maintained on the line for twenty years, even with Marcus. Even now, when the only thing on her screen was a cryptographic fingerprint that belonged to a man she'd buried. "I need you to look at something."

"Wait. What?"

"Did you ever hear the name Dragan Miloš?"

A pause. She could hear Marcus breathing through the line, the quiet intake of air before he'd chosen his next words.

"Lena, I don't know what you're talking about. You haven't ever been on a Zagreb operation. You were reassigned to logistics in September of '18, before the—"

"That's not how it happened."

"It is how it happened. I can check the personnel files if you'd like." His voice shifted, something softening into concern. "Lena, are you feeling all right? You sound—"

"The cryptographic signature is authentic. I verified it against—"

"Lena, listen to me. I'm worried about you. Marcus Thorne's voice carried the weight of institutional authority, which was part of his skill set. He could make a person feel small without raising his volume. "The firm reported an incident this morning. An employee showed up for a shift and smelled like you'd been out for a long night. They flagged your badge. I called them and cleared it, but I want you to go home and rest."

"I need to understand what's on my screen."

"You need to sleep. You're not yourself right now, Lena. Let me make you a drink. You need to take it easy."

The sound changed on the line. A wet, labored quality that came through the connection like something pressing against a barrier. Marcus's breathing had shifted to something that sounded like it was coming from a different body entirely. Or no body at all.

"Lena? Lena, are you there?" His voice was different. Softer. Almost familiar, as if the voice remembered a different context, a different room.

She pressed closer to the phone. "Marcus? Marcus, are you still there?"

Nothing. Then a click, and the line went dead.

She called back immediately. The connection established, rang twice, and returned a recorded message. This number is no longer in service. The recording had the smooth, practiced cadence of an automated system that had been installed recently and would expire within a week.

She sat with the laptop screen between her and the dead phone for a moment. Then she opened the file's metadata again. The server timestamps were precise, accurate to the millisecond. She cross-referenced them against the agency's internal casualty roll call, pulling the document from her personal backup. Miloš was listed as killed in action, October 14th of this year. The date on the file's transmission matched the date of his death. The body had been cremated in Zagreb, a fact that came from a transport manifest she'd personally verified.

But then she checked her own records. The version she'd filed for the agency's memorial archive. In that version, the transport manifest listed a second vehicle. Miloš had not died in the crash. He'd been evacuated by a black sedan that had arrived at the scene three minutes before the ambulance, and the manifest recorded his transfer to a facility whose name had been redacted. She'd thought the redaction meant the location was classified. It hadn't. It meant the location had been deleted entirely.

She called Marcus's number again. Nothing. She tried it a third time. A recorded message confirmed the number was out of service. She tried his office line, the one he'd given her years ago before he'd retired. A busy tone.

The file on her laptop wasn't static. The data stream shifted as she watched, the "aaa" pattern propagating from the relay server into a new address that had just appeared in her connection log. She'd never accessed this address. It didn't exist in any system she was authorized to query, and it wasn't listed in any routing table she'd ever seen. The "aaa" pattern was already moving into it, the same clean, relentless repetition, like a signal that had been designed to spread.

A timer appeared in the file's metadata.

23:00:00

Counting down.

She stared at the screen. The coffee beside her was cold, a film of something had formed on the surface. The operations room was empty. She could see it through the doorway to the corridor beyond, where the security light was off and nobody walked.

The timer wasn't an alert. It was a deadline.

Twenty-three hours. And she was already late, though she hadn't been aware she'd started behind. The pattern kept moving. She watched it cross into infrastructure she'd certified as clean, the three backbone providers, the municipal systems, the aging water authority that had flagged that port scan. The "aaa" string was already in their logs, buried among the routine data, and it was growing.

She should have hung up with Marcus. He was wrong about the Zagreb assignment, or he was hiding something, or he was dead himself. The wet sound on the line. The change in his breathing. That had been medical or mechanical or neither of those things. The recorded message about the number being out of service could have meant a lot of things, but the particular way it had been routed made her think of the relay server. The dead man's relay server.

She stared at the timer. 22:58:41. The data kept spreading, silent and precise, and the room was getting darker as the artificial light flickered once and caught up to the actual time outside the building, the time that had nothing to do with any of this.

Twenty-three hours. And every hour she lost was an hour she hadn't lost, though the distinction had stopped mattering sometime during the phone call.

Comments (0)

No comments yet. Be the first to share your thoughts!

Sign In

Please sign in to continue.