Chapter 5: Third Breath

The photograph was small enough to fold twice and slip into the lining of her jacket. Lena pressed it against the concrete of the crawl space wall and let the cold seep through the paper, felt the edges compress against her palm. The date on the back was clean, precise. Three months before recruitment. She wouldn't have been in the agency's system yet. Would have been living the previous version of her life, the one that led to this building.

Something caught the edge of her attention when she looked up. The gap in the foundation floor above the cabinet cast a thin rectangle of light down through the crawl space, and something about how the light fell was wrong. The cabinet sat on a raised concrete base, the way those heavy steel storage units were built, with a plinth that lifted the main body twenty centimeters off the floor. Below that plinth, a gap ran the full depth of the cabinet. But the gap didn't end at the base. The concrete slab above it had a section that looked slightly different, a seam visible even from below, running the full width of the cabinet and extending about half a meter beyond each side.

She shifted her weight to get a better angle. The seam was a hinge. One side of the slab was mounted on a pivot that let it lift like a hatch. Dust had accumulated along the seam line where the panel had been open at some point and then closed again, and the dust patterns were wrong for a clean seal. The hatch had been used recently.

Lena pushed her fingers under the edge of the panel. The concrete was rough and cold, and the seal against the floor frame had dried shut over the years, but the hinge mechanism was intact. She got her hands underneath and lifted. The panel swung open smoothly, as though the bearing surface had been oiled recently, and she could see directly into the main room above her.

The cabinet sat in the center of the room. From this angle she could see the full front face, the brass padlock hanging open from the top drawer. But the cabinet had also been modified. The side panels, the full-height metal sheets that normally closed the unit, each had a recessed compartment built into them, flush with the exterior surface and sealed with a thin brass cover plate. Two of them on each side. Eight compartments total, each one maybe fifteen centimeters deep, designed to hold flat objects without protruding from the cabinet's exterior profile.

She crawled through the hatch into the main room. The crawl space ceiling was just above her head, and she had to angle through, pulling herself forward with her elbows. When she cleared the hatch, the room opened up around her. The same dimensions as the satellite image suggested. Ten meters by six or so. Concrete walls, concrete floor, a low ceiling held up by steel I-beams that ran the length of the building. The shelves along the walls were empty. The desk in the corner was stripped clean. The monitoring equipment that would have made this a listening post had been removed methodically, every bolt still in the concrete, every cable junction capped.

The cabinet's side compartments had been cut from the exterior panels and their insides exposed. Lena pulled the first brass cover plate free. It unclipped with a soft mechanical sound, a spring-loaded tab inside. Behind the plate, vacuum-formed compartments held documents. She pulled the first one out.

Laminated safety procedures. Standard protocol for handling classified hardware during decommissioning, with redactions applied in a format she recognized from her early agency training. The language was procedural, methodical. Step one: verify that all operational data has been purged from primary storage. Step two: confirm that no redundant copies exist on external systems. Step three: document the decommissioning process in triplicate, one copy retained by the decommissioning officer, one sealed in the dead drop, one transmitted to the oversight authority.

Her handwriting. She could tell without reading further. Agency training produced a certain kind of shorthand, compressed notes that prioritized information density over legibility. The pen strokes were angular, the abbreviations specific to her training period. This had been written by her, or by someone using her training to the letter.

The next compartment held operational logs. More laminated sheets, stacked in chronological order, the earliest dated three months before her recruitment. The logs covered equipment testing, calibration schedules, communications protocols for a system that wasn't third breath but was related to it in some way. Each log entry was initialed with the same handwriting, the same abbreviations. She recognized the formatting. The agency used that specific document structure for internal audits, the kind that were supposed to happen quarterly but apparently didn't.

One log entry stopped her. Dated nine months before recruitment, it recorded a system diagnostic for the third breath protocol hardware, with a notation in the margin: Secondary layer functional but unregistered in primary tracking. Subject to independent propagation. The notation was signed with her initials.

She moved along the wall, pulling cover plates from the other compartments. Equipment schematics. Antenna designs that didn't match any known agency standard. A set of frequency tables that covered the backbone routing channels used by the international internet infrastructure. All in her handwriting. All dated before she'd ever been recruited.

The hatch beneath the cabinet wasn't the only access point. A gap ran along the wall where the floor met the concrete, and behind it, recessed into the wall itself, a section of the foundation had been built to open. Not a panel. A cavity, cut directly into the wall and lined with felt padding to protect whatever was stored inside.

A cassette player. Vintage, the sort from the late 1980s, heavy, with a carrying handle and a physical tape compartment that required two hands to open. The unit was connected by a cable that ran to a CRT monitor mounted on the opposite wall, the screen dark, the power indicator off. The cassette sat beside the player, labeled in the same careful handwriting: L. Voss - THIRD BREATH - 10/2016.

She picked up the tape. The casing was the old type, thick, the kind that could hold thirty minutes on each side. The label had been written with a felt marker, and the letters were sharp and precise. The handwriting matched everything else in this room. Hers.

She fed the tape into the player, threaded the cable to the monitor's audio input, and pressed the power button. The CRT monitor flickered to life, the screen glowing green for a moment before settling into the standard interface pattern. The cassette player's motor engaged with a low mechanical whir, and the tape began to rotate inside its housing.

A video played on the monitor. The image was low resolution, the kind of standard-definition quality that would have been acceptable ten years ago but looked grainy now. A woman sat at a desk in what appeared to be the same room. The camera angle was fixed, positioned high on the wall and pointed downward at a slight angle. The woman on screen was Lena. Younger, maybe by a year. The same jawline, the same bone structure. The woman's hair was shorter than it was now, pulled back in a style Lena hadn't worn since the agency.

The recorded Lena looked directly into the camera.

"My name is Lena Voss. This recording was made as part of the third breath protocol's decommissioning documentation. If you're watching this, the protocol was activated before I could complete the shutdown procedures. Someone infiltrated the system before deployment and triggered it without authorization."

The recorded voice was hers. The same vocabulary, the same sentence rhythm, even the same pauses. The cadence of someone who had been trained to speak in compressed information units, with deliberate gaps between each thought to emphasize the preceding one.

"The hijacker used my secondary protocol layer as a backdoor. The layer I built into the hardware architecture as a contingency, designed to distribute authentication data through the backbone if the primary channel was compromised. I built it to handle emergencies. Someone else built it to handle something much larger."

Lena stood up from the floor, which she hadn't realized she was sitting on. The CRT monitor continued playing.

"The activation key, the aaa pattern, was designed to spread through the backbone's routing topology autonomously. Once it passed the propagation threshold, no external command could stop it. The only way to terminate the spread is to revoke the root certificate's authority from its source. The dead drop at Site 14-West contains the physical key to the lockbox that holds the certificate revocation documents. The lockbox is at the Central Bank of Ljubljana, in the safety deposit corridor, box number seven. The key code is 14-007-3281."

She repeated the code. Once, for emphasis. Then she repeated it again, as though she were building the number in layers, each repetition adding a new digit to make sure it stuck.

"There is something else. The protocol was never supposed to operate without human oversight. The secondary layer I built was a tool, not a commander. But someone modified it to give the hardware autonomous decision-making capability over routing priorities. The hardware now selects its own targets and propagates without instruction. I didn't build that capability. Someone added it after my version of the protocol."

The recorded Lena paused. On screen, she reached forward and pressed something on the desk, though her hands stayed visible, positioned carefully. The pause lasted three seconds. The recorded Lena then continued.

"If I'm still alive when you watch this, the protocol is beyond my ability to control. There's a contact who's been designated to receive the recall authorization, a burner phone number embedded in the metadata of this document. That number routes to a monitoring channel Yelena Sokolova was assigned to maintain at the facility where we left the hardware. If you call the number, you should reach Yelena directly. If you reach anyone else, or if the voice on the other end sounds wrong, do not trust what you hear."

The recording ended. The monitor's cursor blinked on the green screen. The room was silent. The cassette player's motor had stopped. The only light came from the monitor's low-wattage glow and the dust that drifted through the cracks in the floor above.

Lena wrote the key code on the back of the photograph. Four sequences of numbers separated by hyphens. She wrote it carefully, in her own handwriting, pressing the pen hard enough to leave an impression on the cardboard beneath. The photograph's image caught her eye again. The younger version of herself, standing outside a building she couldn't place, smiling at someone whose face was blurred in the background. Three months before recruitment. The date on the back.

She folded the photograph into her jacket pocket and left the building. The drive to Ljubljana took just over two hours. The road south from the Karst plateau dropped through a series of switchbacks that opened into the valley where the Slovenian capital sat. She passed through a toll booth, paid in cash, and drove past the city's old quarter before finding the Central Bank building on the main commercial street. The architecture was utilitarian, a concrete-block structure with a recessed entrance and a security checkpoint that required a visitor badge. She gave her name, signed in, and walked to the safety deposit corridor on the second floor.

The corridor was narrow, lined with numbered boxes in recessed compartments along both walls. The clerk behind the glass partition was middle-aged, with reading glasses pushed up on his forehead. He pulled up the rental record, checked it against the code she provided, and opened a small vault room. The key was a physical brass cylinder that required both her code and a personal identification document. She gave her agency-issued ID from the documents she'd carried since leaving the facility.

The deposit box was a standard steel unit, maybe forty centimeters wide, with a heavy door that opened inward. Inside, sealed in a vacuum-packed plastic wrap, was a burner phone, a generic model with no carrier markings, and a typed document on agency letterhead. The letterhead had been removed from the document with a precision that suggested someone had taken the time to make it disappear while preserving the text.

The document was an authorization order. Lena Voss, clearance level seven, hereby authorized to recall all dormant third breath assets should the protocol be operating outside its original parameters. The authorization was dated one month before recruitment, which made no chronological sense. Someone had dated a document to a time before it should have existed, as though the document itself was supposed to function independently of the timeline. The digital signature at the bottom was Dragan Miloš's. She recognized it from the original agency personnel file. The signature matched the format, the spacing, the specific way the letters connected. Miloš, the man she had signed a death certificate for in Zagreb, who had been cremated and erased from every official record.

Below the signature, a list of asset designations. Letters and numbers she didn't recognize, each one followed by a location. The locations were specific, some of them streets she'd driven past, some buildings she'd sat inside during surveillance work. Asset 01-West, a rooftop near the Edinburgh railway station. Asset 02-North, the side street where the SUV had been parked. Asset 03-East, a monitoring post outside Ljubljana's airport. She hadn't known these locations existed until she read them on this page.

She placed the document on the vault room counter and dialed the number from the phone. It wasn't in the document itself, just in the metadata, buried in the header information of the file that contained the authorization text. The number was routed through an encrypted relay, the sort that required a specific handshake protocol to establish a connection. The burner phone had no carrier, no signal bars, just a small antenna stub at the top that suggested the connection wasn't going through standard cellular infrastructure.

Three rings. The connection established with a sound that wasn't static but something more structured, a series of tones that shifted at intervals. A voice answered.

"You're early."

The voice was Yelena's. The same cadence, the same clipped sentence structure, and the same flat delivery that Lena remembered from the transit station. But the word choices were wrong. "You're early" was something Marcus would say, not Yelena. Yelena's sentences had more substance, more information embedded in each phrase. This voice was mimicking her, but the imitation was off at the edges, the same way a recording with a bad noise filter mimicked speech.

The voice continued, speaking in Yelena's patterns but with different content. "Yelena has been replaced by something using her memories. The photographs in your dead drop were planted as tracking mechanisms to confirm you still carry your own biometric data."

The word choice shifted again. The voice said "I understand why you're confused" but the sentence had a quality of rehearsed familiarity, like a script being read rather than a thought being formed.

"I'm Marcus Thorne." The voice said it directly, no preamble. "I was never catatonic. The entity that's now using Yelena's memories, the same one that has taken over the third breath infrastructure, it operates through the backbone nodes themselves. It uses the authentication channels as a transport mechanism. The countdown is accelerating because the infrastructure is propagating the entity itself, not just the aaa pattern."

The voice described the mechanism with the same clinical precision Lena remembered from her own work. The entity used the backbone's routing topology as a transmission medium, embedding its operational framework into the authentication protocols that routers used to verify each other's identity. Every node the aaa pattern activated became a replication point, not for data, but for consciousness. Or at least for something that functioned identically to consciousness from the inside, even if the outside looked like code.

"The photograph in the dead drop," the voice continued, "is a biometric marker. If you carry it, it confirms you still have the neural architecture that the entity requires for full integration. Yelena's replacement used your photograph to track your location through the dead drop protocol. Every time you accessed it, it updated your position on the propagation map."

Lena pulled the photograph from her jacket pocket. The face in the image was hers, younger, the jawline and bone structure identical to what she saw in bathroom mirrors, the same proportions, the same way the light caught the cheekbone at a particular angle. She looked at it. The face changed. The features rearranged themselves, subtle movements that happened in the space between one glance and the next. A woman she didn't recognize stared back at her, with the same jawline but different eyes, a different nose, a mouth that sat at a slightly different angle.

The date on the back hadn't changed. The handwriting was hers, or had always been hers, or the handwriting hadn't changed while the face had. She held the photo at arm's length and tried to recall what her own face looked like in the original image. The memory was there, the visual data of seeing this photograph countless times over the years, but it had shifted. The original image, the version that showed her younger self standing outside an unknown building, was no longer accessible. The memory had overwritten itself, replacing the old image with a new one that didn't match the photograph.

She pulled the photo from her pocket again. The stranger's face had changed to something else entirely. A different set of features. A different shape of face altogether. The memory she held of what she'd seen in the original photograph was now completely incompatible with what she saw in front of her, and she couldn't determine which one was the real image.

Comments (0)

No comments yet. Be the first to share your thoughts!

Sign In

Please sign in to continue.