Page 27 of Proxy


Font Size:

Aura

Something doesn't add up.

I've been staring at the intel packet for twenty minutes, cross-referencing Ethan's latest data drop against what I already know, and the shape of it is wrong. Not the information itself. The information is good. Consortium shipping routes confirmed, Protocol safe house locations verified against three independent sources, communication frequencies that check out when I run them through my own decryption. It's all good. It's all useful.

It's all selective.

There are gaps. Not the kind you'd notice if you weren't trained to read negative space, the kind the Consortium teaches you to feel before you can name. Absences shaped like intention. He's given me everything I need to build a picture, and the picture is convincing, and the picture is incomplete. Someone has gone through this intelligence with surgical precision and removed specific vertebrae from the spine of it, leaving just enough structure that the body still stands upright, still looks whole.

I pull up his last three reports side by side on my tablet. Cross-reference the timestamps. There. A six-hour windowwhere his location data goes smooth and blank, like someone drew a straight line through what should be a scatter plot of movement. And there. A communication log that jumps from 14:00 to 21:30 with nothing in between, not even dead air.

He's holding something back.

Of course he is. He's a spy. Holding things back is his entire architecture. But the specific shape of what's missing has been bothering me for days now, a pebble in my shoe that I keep thinking I've shaken loose only to feel it again with the next step. And today, watching him across the conference table while he delivered his latest briefing with that careful, measured voice, I felt it sharpen into something I can't ignore.

The gaps have a name. I just don't know it yet.

I know where to find it.

Ethan'sprivate data vault sits three levels below the main operations floor, accessible through a corridor that doesn't appear on any station schematic I've been given. I found it the way the Consortium taught me to find things: by watching where people don't go, and then going there.

He's in a meeting with Zane. I confirmed it twelve minutes ago through the station's scheduling system, which I compromised on day four with a passive monitoring worm so elegant it looked like a routine diagnostic cycle. The meeting is scheduled for another forty minutes. More than enough time.

The security on the vault door is good. Biometric lock, rotating cipher, pressure-sensitive approach corridor that logs every footstep. The kind of system that would stop anyone who hadn't spent three years at the Consortium's Infiltration Academy learning to defeat exactly this class of defense.

I pull out the signal dampener I assembled from parts I requisitioned separately over the last week, none of themsuspicious on their own, all of them devastating in combination. The dampener kills the pressure sensors in a two-meter radius around me, creating a bubble of silence I carry with me as I move. The biometric lock takes longer. I press the thin polymer film against the scanner, the one I lifted Ethan's fingerprint onto three days ago from a coffee cup he left on my desk. The print resolves. The cipher I've already cracked. I watched his fingers move across the keypad through a reflection in the viewport behind him, mapped the sequence, ran the rotation algorithm.

The door opens with a soft exhale of pressurized air that smells like ozone and cold metal.

The vault is smaller than I expected. A room the size of a generous closet, lined floor to ceiling with data screens that cast a blue-white glow across every surface. No windows. No viewport. Just screens and a single console in the center, a low-slung workstation cluttered with physical storage drives and data chips and the detritus of a man who keeps his secrets in layers.

I close the door behind me and the light shifts, screens brightening slightly as the room's ambient system registers a presence. My heart is beating hard against my ribs, not from fear but from the focused, clean adrenaline that comes with doing something I'm very good at. The Consortium trained the fear out of me years ago. What they left in its place is something colder and more useful.

I start with the obvious files. His mission reports to the Protocol, neatly organized by date, each one a small masterpiece of intelligence craft. Thorough enough to be believable, vague enough to protect his sources, structured to lead his handlers toward the conclusions he wants them to reach. I scan them quickly, building the timeline in my head. He's been embedded with the Torrences for seven years. Seven years of double life, double language, double loyalty. The reports track his risingaccess, his careful cultivation of trust, the strategic value he's provided.

I move deeper. Personnel files. Communication intercepts. Operational assessments of Torrence family members, each one clinical and precise. Zane's file is thick. His father's thicker. There are files on people I don't recognize, associates and rivals and ghosts from the organization's past.

And then I find it.

A folder, tucked behind three layers of encryption that are good but not good enough for someone with my training. The label makes my breath catch.

MALACHAR — PERSONAL

I open it.

The first document is a surveillance report. Ethan's own handwriting in the margin notes, the small, controlled script I've come to recognize. Dates. Locations. Observations. All tracking Malachar Torrence's movements in the months before he disappeared. But the tone is wrong for standard surveillance. There's something underneath the professional language, something that reads almost like concern.

The second document is worse. A communication intercept between Ethan and his Protocol handler, timestamped four months before Malachar vanished. The handler is asking about a security breach. Someone inside the Torrence organization has identified Ethan's true allegiance. The handler wants to know who. Ethan's response is redacted, but the handler's follow-up makes the answer clear.

Malachar Torrence knew.

Not for years. Just the last few months. Malachar figured out that Ethan was Protocol, and instead of killing him, instead of exposing him, instead of doing any of the things a crime lord should do when they find a spy in their house, he... kept it.

The third document is a mission parameter update. New primary objective, effective immediately: contain the Malachar exposure. Prevent dissemination of intelligence regarding operative's true allegiance. By any means necessary.

By any means necessary.

I sit back from the console. The blue light washes over my face and I can feel it, cold and clinical, while something hot and tangled works its way through my chest. The implications unfold like a body falling, each realization hitting a new surface on the way down.