Routing nodes.
Proxy servers.
Encrypted relays.
Each step hidden behind another layer of obfuscation.
Professional work.
Military-grade network masking.
But the origin point still exists somewhere.
It always does.
The trace finally stops.
At a command node.
My heart starts racing.
Because I recognize the encryption architecture immediately.
It’s the same structure as the network itself.
Which means only one entity would have access to it.
I look up slowly.
“Boone…”
“Yeah?”
“It’s coming from inside the system.”
Adam frowns.
“The Architect’s network?”
“Yes.”
Russ lets out a low whistle.
“Well, that’s not good.”
Boone stares at the screen.
“You’re saying the system designed to respond to collapse…”
“…is causing it.”
“Yes.”
Another alert flashes.
Grid Failure Escalation — Idaho
The map lights up again.