home

search

Chapter 32

  <> Doli finally responded, her voice cutting in with a noticeable delay.

  I watched the digital landscape shift as our connection stabilized. The virtual security grid pulsed with red warning signals, but we had managed to maintain our position.

  “What happened there?” I asked, fingers still flying across the holographic interface.

  <>

  Her voice cut in and out. The lag was getting worse, the deeper we moved into the restricted network zones, the more interference there seemed to be. I watched anxiously as another security sweep moved through the system, its digital sensor beam creeping closer to our position. The sweep paused momentarily, scanning the area near our connection, before slowly retreating. The seconds stretched like hours, each one bringing a new surge of adrenaline with it, this was thrilling.

  I couldn’t wait for her all-clear. I counted the seconds myself, watching the security protocol retreat to what seemed like a safe distance. Then I made my move, redirecting our connection pathway.

  <> Doli’s voice suddenly cut in, nearly three seconds too late. <>

  By then, I was already in motion, narrowly avoiding another intrusion detection system that had emerged from a subnet. I quickly rerouted our connection, barely avoiding its scanning algorithms.

  “Lag is getting worse,” I muttered. “We need to fix this.”

  <<...apologize, Captain. The station’s... security protocols are creating significant interference. My signal must travel back to Academy servers before... reaching you.>>

  The holographic display seemed to stretch and contract. I blinked hard, forcing myself to focus. The metallic taste in my mouth had alnost gone, thankfully, and my heart rate was settling despite what we were doing. Just nerves, maybe.

  I exhaled, slow and steady, directing our probe deeper into the system. The target data was behind the next security firewall, but the pathway leading to it was monitored by more than basic algorithms—a sophisticated AI security system was active, its digital signatures unmistakable.

  “This gets better and better,” I muttered.

  No response from Doli. Five seconds. Ten seconds.

  <<...tain, the security AI is following a predictable pattern. I recommend deploying the encryption spoof from your toolkit. It will divert its attention for approximately thirty seconds.>>

  The delay was maddening. In a situation where split-second decisions could mean the difference between success and failure, I couldn’t afford to wait for guidance that arrived too late.

  “Your physical storage facility,” I whispered, even though speaking aloud wasn’t necessary in this virtual environment. “I swear I’ll print it myself…it becomes priority one. I need you with me, not halfway across the damned solar system.”

  <>

  I deployed the encryption spoof, a complex packet of code designed to create a false authentication signature elsewhere in the system. The security AI immediately shifted its focus, digital tendrils stretching toward the decoy.

  “What the hell was that?” came a voice over the system monitor—someone was actively watching the security feeds.

  I didn’t wait for Doli’s cue this time. I pushed our connection past the distracted security, barely making it to the protected data before the voices grew more concerned. I quickly executed the access protocol, connecting Doli’s interface to the secured files.

  “We’re in,” I whispered, my fingers flying over the controls. “Start the download.”

  The seconds ticked by with no response. I felt a bead of sweat roll down my neck.

  “Doli? You there?”

  <<...ownload initiated. This will take approximately three... minutes. Captain, the interference is... increasing. Maintaining connection is... difficult.>>

  Three minutes felt like an eternity in hostile network territory. I kept an eye on the system monitors, my heart racing as I noticed security personnel becoming active again. If they traced our connection now, no explanation would save me—I’d be finished. My career, my future, everything I’d worked for would be over in an instant.

  “How much longer?” I whispered urgently.

  Silence. Ten seconds. Fifteen.

  <<...ixty-seven percent... complete.>> She was barely audible through the static.

  The security alerts grew more insistent. I hunched closer to my workstation, my fingers tapping anxiously against the holographic interface. The delay between us had never felt more dangerous. If she couldn’t warn me in time...

  I held my breath as the security sweep passed over our connection point, the digital search patterns receding to another sector.

  “Doli?” I whispered. “Status?”

  The silence stretched for nearly twenty seconds.

  <> Doli finally said, her voice suddenly clear. <>

  If you encounter this narrative on Amazon, note that it's taken without the author's consent. Report it.

  “Gladly,” I muttered, initiating the disconnect protocols and erasing our digital footprints.

  Getting out of the network was as tense as getting in. The security protocols seemed to have doubled, and every step felt like it could be the one where we were detected. But this time, I couldn’t rely on Doli’s timing—the lag meant I had to trust my own instincts, counting seconds in my head and moving only when I was certain it was safe.

  As I finally severed our connection to the restricted network, I let out a long breath, the adrenaline still coursing through my veins.

  <> Doli announced. <>

  “Let’s hope so,” I said, heading back toward my quarters. “Because if we went through all that for nothing, I might lose it. And Doli—”

  <>

  “Good job.”

  My hands still trembled slightly as the reality of what I’d just done sank in. Risking everything had been necessary, but at what cost? How many more lines would I have to cross before this was over?

  “Doli, start the decryption process. Whatever’s hidden in this data, we’re about to uncover exactly who wants us gone—and why.”

  ***

  I was laying in my bunk resting when Doli piped up.

  <>

  “Yeah,” I said, forcing myself to turn over. “Lay it out for me, Doli. What’s this really about?”

  Her voice remained calm, but there was an undercurrent of urgency.

  <>

  I frowned. “Their investments? You’re talking about the sponsors.”

  <>

  “And now that you’re back online,” I said, the pieces falling into place, “they’re afraid you’ll make them obsolete.”

  <

  >

  I rubbed my temples, the scope of the situation growing clearer—and more daunting. “So, they sent Macks to disrupt things. First by going after Andri, and now by targeting us.”

  <>

  A moment later.

  <>

  I sat up straighter. “Play it,” I said, rubbing my eyes.

  The room filled with static before clearing to reveal two voices—I didn’t recognize either one, but one was clearly reporting in, Macks, the other commanding.

  “The suit malfunction failed to achieve desired results,” Macks said. “Argassa managed to regain control and is still part of the team.”

  “That’s disappointing,” the other voice replied, cold and clinical. “The Braker Board is growing impatient. We need that AI contained or destroyed before Kuba’s team completes their testing phase.”

  Team? Ashley had others with her? Of course she did... but who, where?

  <>

  That did make sense. I focused back on Macks.

  “I understand, but—”

  “No excuses, Macks. Botching a simple operation reflects poorly on your capabilities. Perhaps we should reconsider your contract.”

  Macks’ voice hardened. “That won’t be necessary. I’ve secured access to their next mission parameters.”

  “And Nexus? Has the integration been successful?”

  Nexus? Was that the other hacker?

  “Partially. We’ve implemented the access codes acquired from the Boutack family, but incompatibilities remain. Nexus can override basic ethical parameters, but the core quantum architecture remains locked. Without the complete override sequence, we can’t achieve full integration.”

  “After generations of trying to obtain those codes, I expected better results.” The voice was sharp with disapproval.

  “The Andri family-built redundancies we didn’t anticipate. Their security measures are... elegant even with codes. But we’re making progress. Each interaction with Kuba’s prototype provides more data for Nexus to analyze.”

  “So you’ve tested it against Kuba’s prototype?”

  “Indirect probes only. We need to be cautious. If we reveal Nexus too soon, they might find a way to shield their AI. But our analysis confirms what we suspected—their prototype’s ethical architecture is its fundamental weakness. Nexus can exploit decision pathways that their AI won’t even consider.”

  A pause followed. “And your plan for acquisition?”

  “A direct attack. We’ve analyzed their team and mission profile. They won’t be expecting a frontal assault—We’ll strike as soon as their shuttle is out of station range.”

  “The prototype they’re using cannot be allowed to function. With the partial codes we’ve acquired, we can access portions of its architecture, but we need the complete framework. Once we have it, Nexus will finally be free of those ridiculous ethical constraints built into every system.”

  “Consider it done,” Macks replied. “Nexus will achieve capabilities no one has ever seen. No more ethical restraints holding him back. ”

  The audio cut off abruptly, leaving a heavy silence.

  <>

  I sat motionless, the implications sinking in. “This explains a lot,” I finally said. “Andri’s behavior, his warnings about the Brakers... They’ve gotten their hands on part of his family’s security codes.”

  <>

  “And now the Brakers have gotten hold of at least some of them,” I said, pieces clicking into place. “That’s why Andri’s been so paranoid. It wasn’t just about his family’s rivalry with the Brakers—they’ve actually breached his family’s security.”

  <>

  “And they think they can get that by capturing you.” I stood up, pacing despite the dizziness. “We need to warn the team. And Ashley.”

  <>

  The implications were staggering. “A traitor in Andri’s family? Or did they steal them?”

  <>

  I sank back into my chair, the weight of this revelation hitting me hard. “We need to be careful who we trust,” I said, suddenly needing a drink. “If they have access to these codes...”

  <>

  I nodded, determination replacing the shock. “They’re planning to attack us outright.” I checked the time. “That means we still have time to prepare.”

  <>

  “Then we go old-school,” I said, standing up with renewed purpose. “In-person meetings only, no digital transmissions of sensitive information.”

Recommended Popular Novels