Cherreads

Chapter 5 - The First Thread

"Every pattern is a signature. Every signature is a confession." — A. Voss, operational notes

The processor dismantled Thorne's encryption in forty-two minutes.

I had built my estimate around my previous hardware's capabilities—three to five weeks for military-grade key derivation via distributed botnet. Julian's machine made my botnet look like a pocket calculator running arithmetic in the dark. I sat back and watched twenty-six months of financial crime unspool across the curved display in real time, and I felt the particular, clinical pleasure of seeing a complex system become transparent.

Thorne was skilled. He had layered his methodology—real companies in legitimate jurisdictions at the first tier, decentralized crypto tumblers at the second, phantom shell registrations in four different regulatory environments at the third. Each layer was designed to appear, to a standard forensic audit, as the outermost one. The embedded assumption was that anyone digging would stop when they found the first convincing wall.

But skilled and thorough are different things. Skilled people trust their architecture. Thorough people check it from the inside.

Thorne had a rhythm. It was slight—a seventeen-minute clustering bias in his transfer timestamps, consistent across all three years and all four jurisdictions. He transferred in the early morning, always within three minutes of a round hour, always in increments calibrated to fall below automatic reporting thresholds. The pattern was invisible at the transaction level. Visible the moment you mapped it temporally.

I traced the rhythm to its terminus. Not a bank account. An IP address, hardened, located in a routing environment consistent with Eastern European infrastructure. The packet sizes moving through it were wrong for financial data.

They were the sizes of large, compressed technical archives.

"Thorne," I said to the empty room, "you greedy, short-sighted man."

He wasn't just embezzling. He was selling.

I was halfway through writing a custom tunneling script when the quality of the room's silence changed.

I have lived in monitored spaces long enough that a certain part of my awareness runs as a background process—logging ambient sound, air movement, the particular electromagnetic texture of a room that is or isn't occupied. The process registered a change. I filed it without fully surfacing it. Kept typing.

Then I looked at the monitor bezel.

In the faint reflection of the dark border, the glass door behind me was open. A figure stood in the hallway, weight on one shoulder against the frame. Watching the back of my head. The way I moved my hands.

I had been aware of him, at some level, for some minutes. I did not know how many. That was the more unsettling piece of information.

"You type like a surgeon," Julian said. His voice came into the room the way sound moves through water—without apparent origin point. "Not like you're entering commands. Like you're making incisions."

I turned the chair. He was exactly where the reflection had placed him, arms crossed, watching me with the same undivided attention he gave everything. Not performing observation. Actually observing. There is a difference, and most people can't sustain the latter.

"Thorne isn't keeping the money," I said.

Julian's posture didn't change. But his eyes did—a small, precise shift that I had learned to read as the point at which his internal processing accelerated.

"The transfers route to an Eastern European IP hosting large encrypted archives," I continued. "The packet sizes are consistent with proprietary technical documentation. He's not building a retirement fund. He's moving product."

Julian walked to the desk. He looked at the temporal map I had built—thirty months of transfers arranged into a pattern that had no innocent explanation. He studied it in the same non-sequential way he had studied my partition map. Then he said, "The drone targeting algorithms. The automated threat-classification systems. He's been selling the R&D division's core output."

"To whom, I don't yet know. I was about to tunnel in when you arrived."

He looked at me then—not at the screen. The weight of his attention was a tangible thing, and I had been on the wrong side of enough observation to recognize when someone was cataloguing rather than simply looking.

"Then tunnel in," Julian said. He pushed off the desk. Moved toward the door. Paused without turning. "And Anya. The restricted partition I mentioned."

I waited.

"It's called OBSERVER_ZERO." He let the words sit in the air for a moment. "When you're ready to understand what you're looking at, come find me first. That's not a boundary. It's a context requirement."

He left.

I faced the screen. The tunneling script sat half-written. The cursor blinked its indifferent rhythm.

OBSERVER_ZERO.

I made a note in the margin of my working file and set it aside. For now.

More Chapters