WebNovels

Chapter 14 - Breaking Point (4)

The next morning, I woke to an uneasy stillness: no rain on the window, no distant hum of the marketplace. A message flashed on my tablet's lock screen—an urgent alert from the mesh network: Packet loss detected at three eastern nodes. My stomach twisted. I climbed out of bed, shoving aside yesterday's coffee-stained notes, and booted the terminal on my rooftop rig. The network map glowed with red blips where green should have pulsed steadily.

I sprang up the fire escape two rungs at a time, my heart racing. On the rooftop, I crouched before the terminal and ran diagnostics. The logs scrolled past: encrypted packets bounced off phantom IPs, signals stalled then vanished, connection retries spiked. It wasn't a simple outage—it was deliberate interference.

My mind flashed back to Mercer's parting words: "Don't disappoint us." Had Cedar Gate's legal team begun to investigate too aggressively? Or worse, had city IT detected irregular traffic patterns and moved to shut me down? Fear burned in my veins, but there was no time to hesitate. I launched a trace route on the offending nodes, watching each hop bring me closer to the source.

A sudden ping in the log made me freeze—one of the nodes was reporting an override command, masquerading as my own admin credentials. Heart pounding, I realized someone had breached my network and was injecting false controls. I tapped furiously to isolate the botched node, but before I could quarantine it, the signal spread to a neighboring repeater.

Panic threatened to overtake me, but I forced calm. I activated a manual lockdown: all non-essential nodes went offline, leaving only the central hub alive. Connection links snapped one by one, and the district's automated water reroutes and grain micro-transactions ground to a halt. The city would notice soon—empty pipes, stalled exchanges—but I had to stop the bleed.

I crouched in the dim glow of the terminal, fingers shaking, and scrawled a desperate note in the journal: "Emergency breach at Node 17C and 21B. Manual lockdown initiated. Need to trace intrusion source." Then I grabbed my satchel and raced down to ground level, determined to find the physical node that had been compromised first.

The alley toward the clinic's rooftop processor was slick with morning dew. I darted between crates and dumpsters, my breath ragged. The repeater sat inside a decommissioned boiler room door propped open for ventilation. I slipped inside, heart pounding against my ribs. The device's LED pulsed in alarm—flashing red where it should have been calm green.

I knelt and unplugged the cables, but as I did, a shadow detached from the darkness beyond the boiler tubes. Elena stepped forward, coat pulled tight, eyes glinting with regret.

"I'm sorry," she whispered. "I thought I could help—made some backdoor code to monitor traffic for anomalies. But someone hijacked it."

My breath caught. "Who?"

She shook her head, fingers trembling. "I don't know. I implemented the watchdog protocol you asked for, but the proxies were compromised—no one can touch them, not even me. Someone seeded the network with Trojan signals."

A cold knot formed in my gut. The betrayal wasn't from Mercer or Cedar Gate—it was inside my own defenses. My own code had been weaponized. I grabbed her shoulders. "Show me your logs," I demanded.

She led me to a dusty workbench piled with motherboards. I booted her portable rig and we pored over her annotations: injections at odd intervals, coded commands masked behind false error messages. The attacker had figured out the ghost-routing, fanning the data stream through secondary proxies until they could slip in malicious packets.

"We have to rebuild the encryption layers," I said, voice tight. "Stronger keys, rotating every minute. And rotate the proxy hosts—new IP pools from our offshore partners."

Elena's eyes shone with determination. "I can code it, but we need a clean node to upload from—none of these are trusted."

I nodded. "There's one left: the tenement's water controller feed. It's isolated from the mesh but linked to our master console. We'll push the patch through there."

We raced back to the rooftop, adrenaline sharpening each thought. I brought the terminal online in single-user mode, blocking external ports, then fed Elena's new encryption modules via a secure local upload. Her fingers flew over the keyboard as I monitored throughput and error checks. One by one, the red blips faded to green.

When the final node sprang back to life, routing clean traffic through fresh proxies, I let out a breath I hadn't realized I'd been holding. The network map pulsed steadily again, and automated reroutes resumed. A ping of relief coursed through me—my system had survived its first real assault.

Elena slumped against the parapet, exhaustion etched in her face. I handed her a flask of water. She drank deeply without speaking. Above us, the sky had cleared to pale blue, and distant church bells rang the hour.

Back inside my room, I updated the journal:

> Day 43:

• Security breach detected—Trojan injection in mesh nodes.

• Manual lockdown and emergency patch deployed.

• Encryption keys rotated; proxy hosts refreshed.

• Vulnerability: unauthorized access to code base.

• Next: audit all collaborative contributions; reinforce trust.

I set the journal aside and stared at the blank wall above my bed. Betrayal had a face now—someone with access to Elena's patch who turned it against us. Whoever it was, they knew our network intimately. It could be a Cedar Gate insider, a city official, or a rogue operator seeking profit. I didn't have answers, but I had resolve.

That afternoon, I met with a small coalition of trusted helpers: Luis, Marco, and a handful of neighbors who'd installed nodes. I explained what had happened in simple terms—no technobabble, just the core truth: our system was our lifeline, but it could be attacked from within. I taught them how to perform manual resets and listen for false commands. Their eyes widened as they grasped the stakes, but they nodded grimly. We were in this together.

As dusk fell, I returned to the rooftop, alone this time. The city lights blinked on, and the network map glowed beneath me like a constellation of hope. I closed my eyes and let the hum of restored connections wash over me. Yesterday's triumphs and today's perils blurred together into a single truth: power demanded vigilance, and mercy demanded humility.

I opened the journal one last time and scrawled my final note:

> The network is alive—but so are its enemies. Trust must be earned every day.

I shut the book, slid it under my pillow, and lay back, the night sky stretching above me. Tomorrow, I would hunt for the traitor in our midst, shore up our defenses, and push forward with the expansion plan. The Gray Phantom's revolution depended on more than code—it depended on unity. And united, we would endure whatever storms came next.

More Chapters