WebNovels

Chapter 3 - What the Data Knows

By the end of my first full week I had mapped the outer architecture of Calloway Industries and understood two things with certainty.

First: this was the most sophisticated private data infrastructure I had ever encountered. Not flashy — the sophistication was structural, conceptual, built by someone who understood how people look for things and had designed a system to resist that looking. One-way data valves. Nested encryption. A metadata architecture that functioned like a mirror — show the investigator what they expect to find so they stop looking for what's actually there.

Second: someone besides me was in this system.

I found the second intruder on Wednesday. Not dramatically — a ghost signature in the access logs, a data-touch so light it would read as system noise to anyone not specifically looking for it. But I was specifically looking for it because something in the Node 7 perimeter had been disturbed in the last seventy-two hours, and disturbances don't happen by themselves.

Someone with high-level access to this architecture had been in and out of the Node 7 perimeter at least three times in the past week. Someone who knew the system well enough to move through it without triggering standard monitoring.

I brought this to Marcus Vale.

He was Zion's right hand — ex-military, forty-something, a face like a door that had been closed many times and had the dents to show it. He had been polite to me in a watchful, reserved way — the politeness of someone reserving judgment until they had enough data. He listened to my finding with the attention of a man who has heard alarming things before and knows how to hear them without showing what he thinks.

"Walk me through it," he said.

I walked him through it. All of it. The ghost signature, the Node 7 disturbance, the pattern of access that suggested someone revisiting a location they'd been to before.

When I finished, his expression hadn't changed. But something in the room had. A slight atmospheric shift, the way pressure changes before weather.

"How long would it take you to trace the signature source?" he asked.

"With level-four access? Three days. Maybe two."

"You have level-four access as of this morning."

"I know," I said. "Zion told me." The first name arrived before I could stop it. I corrected: "Mr. Calloway."

Marcus looked at me. He'd caught the slip and filed it.

"Trace it," he said. "Tell no one except me and Mr. Calloway until you have something concrete. Not the infrastructure team. Not your firm."

"My firm?"

"Especially not your firm."

That was new territory for alarming. I sat with it a moment. "You're suggesting Aldridge is compromised."

"I'm asking you to be careful," he said, which wasn't the same as denying it.

I went back to my workspace and traced the ghost signature.

On Thursday afternoon I had enough to confirm the signature was human rather than automated — a real person making real decisions about what to access and when. On Friday morning I had the origin point: a device connected to Calloway's internal network from a terminal in the legal department.

On Friday at noon, walking to Zion's office with this finding, I almost collided with a woman in the corridor.

She was tall. Dark-haired. Late thirties, wearing ivory in a building where everyone wore black, which was either obliviousness or a statement. She looked at me with amber eyes that took in everything instantly, filed it, moved on.

"You must be Nova Reyes," she said, warm as sunlight and twice as deliberate. "I'm Elara Shaw. Old associate of Zion's. We overlap sometimes." She extended her hand. "I've heard remarkable things about your work."

I shook her hand. Her grip was precisely calibrated — firm without aggression. "I wasn't aware we'd be crossing paths," I said.

"We won't, really. I'm just here for a board consultation." She smiled. "Do look after yourself, Nova. This building takes some getting used to."

She moved past me down the corridor.

I stood there a moment, then went to Zion's office and knocked.

He was on a call. He saw me through the glass and held up one finger. I waited in the corridor and thought about how Elara Shaw had known my name, and how warm her voice was, and how the warmth felt like something put on that morning rather than something she was born with.

When he ended the call, I entered and closed the door.

"There's an intruder in your system," I said. "Human, accessing from a legal department terminal. And I just met Elara Shaw in the corridor, who knew my name and looks at people the way surveillance equipment does."

He went very still.

"How long has she been in the building?" he said.

"I don't know. She said board consultation."

He picked up his phone and texted Marcus without looking away from me. Then: "Show me the trace."

I showed him. He read the data with focused intensity, asking sharp questions about the access patterns, the timing, the specificity of what was accessed.

"She wasn't going for Node 7," I said. "She was in the perimeter. Measuring. Like she wanted to know if anything had changed."

"She knows someone is looking," he said quietly.

"She knows I'm looking," I said. "She came here to look at me."

He looked at me then — the full, direct look, the one that landed differently from other people's looking because there was no performance in it, no social lubrication. Just: seeing.

"Lock the Node 7 perimeter," he said. "Triple-layer. Anything that approaches it, I want to know within sixty seconds."

"Done. But you have to tell me something." I leaned across the desk slightly. "What is she to you? Actually."

A pause. "She was my partner," he said. "When the company was young. Before I understood what she was."

"And what is she?"

"Someone," he said, "who has been waiting six years for the right moment."

The sentence had the weight of something carried a long time and never set down.

"The right moment for what?" I asked.

He looked at me. "To take what she believes I owe her."

The ghost in the machine has a face and a warm handshake and knows my name. This is no longer a data audit.

More Chapters