Last Healer Standing

Chapter 69: Coordinates

Quick Verification

Please complete the check below to continue reading. This helps us protect our content.

Loading verification...

Dohyun arrived on day thirty-eight with the documentation case held differently. Not the single-handed carry that his standard visits employed — the briefcase grip, the leather handle between thumb and forefinger, the organizational apparatus transported with the casual precision of a man who carried institutional records the way a surgeon carried instruments. Today the case occupied both hands. Held against his midsection. The carry posture of a person transporting something whose contents demanded physical proximity and deliberate handling.

Conference Room 1. The analog channel. The institutional privacy that the evaluation wing's conference rooms provided for authorized visitor interactions.

Dohyun placed the case on the table. The latches opened with the quiet precision that maintained hardware produced. Inside, the tabbed architecture that Sora had come to recognize as the guild master's organizational methodology — the manila separators dividing the case's interior into categorized sections, each tab labeled in the precise handwriting that Dohyun's formal communication style translated to paper.

Today, a new tab. Blue. The color designation that Dohyun's system hadn't previously employed in Sora's presence.

"The archival management budget line," Dohyun said. The opening arriving without the standard preliminary assessment of the evaluation wing's operational status — the guild master's analytical priorities rearranged by the intelligence product that the blue tab contained. "My financial analysis team completed the trace."

"The twelve-person-equivalent budget for a three-person unit."

"The budget line terminates at a physical location." Dohyun withdrew a single sheet from the blue tab. Hand-drawn. Not printed. The analog channel's security protocol maintained even for cartographic information. A floor plan — simplified, rendered in the technical drawing style that architectural documentation employed, the lines clean, the proportions accurate, the spatial relationships between rooms and corridors depicted with the precision of someone who had either studied architectural plans or had access to someone who had.

"Association Administrative Complex. Building B. Sub-level 2. Records Annex 7." Dohyun's finger tracing the floor plan's highlighted section — a rectangular space at the sub-level's terminus, accessed through a corridor whose branching architecture created three security checkpoints between the sub-level's entrance and the annex's door. "The budget line's operational expenditures — personnel costs, equipment maintenance, environmental controls, data management infrastructure — all terminate at procurement accounts associated with this location."

"A records annex."

"The Association's administrative complex maintains nine sub-level records annexes. Annexes 1 through 6 store the standard institutional archive — evaluation records, operational histories, financial documentation, personnel files. Annex 8 stores the enforcement division's classified operational records. Annex 9 stores the regulatory compliance division's audit trail." Dohyun's delivery at the measured pace that intelligence briefings required — each piece of information placed in the sequence that built the analytical picture one element at a time. "Annex 7 does not appear in any publicly available administrative directory. Its existence is documented only in the facilities maintenance system's environmental control records — the HVAC routing, the power distribution, the fire suppression coverage. The facilities system shows that Annex 7 receives environmental services. The administrative directory doesn't acknowledge that the space exists."

"A records annex that the institution doesn't officially maintain."

"That the institution doesn't officially acknowledge. The maintenance is real — the environmental controls are active, the power draw is continuous, the fire suppression system's pressure checks are conducted on the standard quarterly schedule. The physical space exists and is maintained. The administrative infrastructure that would normally document the space's purpose, contents, and access authorization does not reference it."

The same pattern. The institutional architecture's visible surface denying what the institutional architecture's operational substrate confirmed. The records annex that drew power and consumed environmental resources while the administrative directory reported the space as nonexistent. The Architect's methodology — not hiding within the institution but embedded in the institution's own operational infrastructure, the parasitic presence sustained by the host's systems while the host's documentation denied the parasite's existence.

"The archival management budget funds the annex's operation," Sora said.

"The budget line's personnel costs match the staffing requirements for a research-grade records facility — secure document storage, environmental controls maintaining preservation-grade temperature and humidity, data management infrastructure with independent backup systems. The equipment maintenance expenditures include line items consistent with scanning equipment, analytical workstations, and biological containment hardware."

"Biological containment."

"The procurement records include quarterly purchases of mana-conductive containment media — the same specification as the storage units used in the Association's biological evidence archive. Approximately forty units per year for the past eight years."

Forty units per year. Eight years. Three hundred and twenty containment units purchased through the archival management budget and delivered to a records annex that the administrative directory didn't acknowledge. The basement laboratory beneath the evaluation wing held eleven-plus units — a fraction of the total procurement. The remaining units stored elsewhere, distributed across facilities that the budget line's operational infrastructure maintained.

"The annex's access records," Sora said.

"The sub-level's security system logs entry and exit through badge authentication. The badge logs for the sub-level are maintained by the enforcement division's security monitoring system." Dohyun paused. The pause that preceded the distinction between available intelligence and intelligence whose acquisition would exceed the current operational parameters. "My financial analysis team can trace budget lines. They cannot access the enforcement division's badge logs."

"Eunji."

"Park Eunji's research access credentials include the administrative complex's sub-level archive. Her authorized access extends to Annexes 1 through 6 — the standard institutional archive that her research division's data requirements routinely reference." Dohyun's tie adjustment. The single correction that stress indicators produced. "Annex 7's access authentication operates on a different system than Annexes 1 through 6. The badge readers at the three security checkpoints between the sub-level entrance and Annex 7 use an encrypted authentication protocol that the standard research access credentials don't satisfy."

"The encrypted protocol."

"The same encryption architecture that the director's office authorization system employs. The prefix structure that Eunji's structural analysis identified in the Calamity case authorization codes. Annex 7's access is controlled through the director's office authorization chain — the same truncated pathway that bypasses the standard institutional checkpoints."

The convergence. The director's office authorization chain controlling both the Calamity cases' institutional processing and the records annex's physical access. The same administrative infrastructure governing the documentation and the storage. The same pathway — whether exploited by the Architect's network or operated by the director's direct authority — managing both the procedural handling of Calamity-class subjects and the physical facility where the research on those subjects was maintained.

"The annex can't be accessed through Eunji's credentials."

"Not through the standard authentication." Dohyun withdrew a second sheet from the blue tab. A timeline — dates, events, correlated data points rendered in the sequential notation that his organizational methodology employed for temporal analysis. "However. The facilities maintenance system's records include a scheduled maintenance window — a bi-annual environmental control recalibration that requires temporary deactivation of the sub-level's security authentication while the HVAC system's pressure differentials are recalibrated across the annex's climate control zones."

"The security system goes down during maintenance."

"The badge authentication at the three checkpoints deactivates for the duration of the environmental recalibration. Standard institutional procedure — the maintenance protocol requires technicians to move freely between the sub-level's zones without badge delays. The deactivation window has averaged four hours and twelve minutes across the last six recalibration events."

"When is the next window."

"Three days. Day forty-one. The maintenance schedule is logged in the facilities system's public calendar — not classified, not restricted. The recalibration's timing is administrative, not security-sensitive. The institution doesn't consider the maintenance window a vulnerability because the institution doesn't acknowledge that Annex 7 contains anything requiring security beyond the standard archive's physical access controls."

Three days. A four-hour window during which the security checkpoints between the sub-level entrance and Annex 7 would be deactivated. Eunji's research credentials providing legitimate access to the sub-level's standard archive — Annexes 1 through 6 — and the deactivated checkpoints eliminating the encrypted authentication barrier between the standard archive and the unacknowledged annex.

The operational opportunity. The intelligence requirement: the annex's contents. The research data, the containment units, the documentation that the archival management budget had maintained for eight years in a space that the institutional directory refused to admit existed. The evidence that could confirm the Architect's network's institutional scope, the research program's history, the connection between the basement laboratory and the administrative infrastructure that funded it.

"The operational risk," Sora said.

"Significant." Dohyun's assessment delivered with the flat certainty that institutional analysis required. "Eunji's presence in the sub-level during the maintenance window is justifiable through her standard research access — she can legitimately be in Annexes 1 through 6 during that period. Her presence in Annex 7 cannot be justified through any authorized credential. If she's observed in the annex by maintenance personnel, security staff, or surveillance systems that the badge authentication's deactivation doesn't affect—"

"Surveillance systems."

"The badge authentication deactivates. The visual surveillance — corridor cameras, motion sensors, environmental monitoring — operates independently of the badge system. The cameras run on a separate power circuit. The motion sensors maintain continuous operation. Eunji's physical presence in Annex 7 would be recorded by the visual surveillance even if the badge system can't identify her."

"The cameras."

"The facilities maintenance protocol includes a visual surveillance calibration that coincides with the environmental recalibration. The camera system's recording buffers are purged during the calibration cycle — standard procedure to clear the storage that the maintenance period's high-traffic personnel movement would otherwise fill. The purge creates a gap in the recording archive."

"A gap."

"The gap correlates with the badge system's deactivation window. Approximately three hours and forty minutes of the four-hour twelve-minute window overlap with the camera system's buffer purge. During that overlap, the visual surveillance records but doesn't archive — the footage streams to monitors but isn't stored. Anyone physically present at the monitoring station would see the live feed. The archived record would show nothing."

"Is anyone physically present at the monitoring station during the maintenance window?"

"The facilities maintenance protocol reassigns the sub-level's monitoring station staff to assist with the environmental recalibration's physical components — moving equipment, adjusting ductwork access panels, the labor-intensive aspects of the HVAC recalibration. Standard institutional efficiency — utilizing available personnel for the maintenance task rather than maintaining monitoring during a period when the badge system's deactivation already compromises the security architecture."

The window. Three hours and forty minutes of deactivated badge authentication, unarchived visual surveillance, and reassigned monitoring personnel. A gap in the institutional security architecture created by the institution's own maintenance protocol — the operational vulnerability that the administrative efficiency produced and that the administrative design's assumption of internal security rendered invisible.

"Eunji would need to enter the sub-level during the overlap window, access Annex 7, document the contents, and exit before the maintenance concludes and the systems reactivate," Sora said.

"The timing is tight but feasible. Eunji's sub-level access is routine — her research division schedules regular archive visits. A visit scheduled during the maintenance window would appear normal in the administrative record. The deviation — moving from the standard annexes to Annex 7 — occurs during the surveillance gap."

"Eunji's assessment of the risk."

"I haven't briefed Eunji." Dohyun's hands flat on the documentation case. The organizational apparatus containing the intelligence that the blue tab designated. "I'm briefing you first. The operational decision requires your assessment because the intelligence requirement originates from your observations — the basement laboratory, the tissue samples, the operative's network. You understand what we're looking for. Eunji understands the institutional terrain. The decision to proceed requires both assessments."

The operational structure. The intelligence partnership's distributed architecture — Sora providing the analytical framework, Dohyun providing the institutional intelligence, Eunji providing the access capability. Each element necessary. None sufficient alone. The cooperative operation that the evaluation period's constraints required because the subject's confinement prevented direct action and the subject's allies operated under surveillance that limited their individual capabilities.

"What we're looking for," Sora said. The analytical framework organizing itself around the intelligence requirement that the annex's contents could satisfy. "Documentation. Research records. The historical data that the archival management budget has maintained for eight years. Specifically: any documentation connecting the annex's contents to the basement laboratory beneath this building, any records identifying the subjects whose tissue samples the annex contains, and any procedural documentation linking the annex's research program to the Calamity-class assessment process."

"The connection between the research infrastructure and the evaluation infrastructure."

"The connection between what they're studying and why they're studying it. The tissue samples in the basement laboratory are healer-class substrate. If the annex's containment units hold the same material — healer-class channel tissue collected over eight years through the procurement budget — the annex is a central repository for the same research program that the laboratory conducts. The documentation in the annex would contain what the laboratory doesn't: the research program's institutional history. Who authorized it. Who funded it. What the research objectives are."

"And whether the research predates the Architect's involvement or constitutes the Architect's primary operation."

"Whether the institution created the research program that the Architect exploited, or whether the Architect created the research program using the institution's resources."

The distinction. The same diagnostic ambiguity that had characterized every element of the investigation — the institutional structure and the parasitic presence occupying the same administrative space, the authorized operations and the unauthorized operations flowing through the same channels, the legitimate research and the compromised research sharing the same infrastructure. The annex's documentation could resolve the ambiguity by establishing the temporal relationship between the research program's origin and the Architect's network's operational history.

"Three days," Sora said.

"Three days." Dohyun closed the documentation case. The latches engaging. The blue tab's contents secured in the analog archive that the institutional surveillance couldn't access. "I'll brief Eunji tomorrow. The operational planning requires her input on the sub-level's physical layout, the annex corridors' configuration, and the time required to document the contents."

"Dohyun."

"Yes."

"The maintenance window's timing. The badge deactivation, the surveillance gap, the monitoring reassignment. All of this is logged in the facilities system's public calendar."

"The institutional procedure is documented. Publicly accessible within the administrative infrastructure."

"Accessible to anyone with administrative access."

The statement sitting in Conference Room 1. The implication: if the maintenance window's schedule was publicly accessible within the Association's administrative systems, it was accessible to the Architect's network. The operative who had conducted nocturnal scanner access with the technical sophistication to sanitize the primary logs while leaving the metadata layer intact would certainly have the capability to monitor the facilities system's maintenance calendar. The operational opportunity that Dohyun's financial analysis had identified was an opportunity that the operative's network could also identify — and anticipate.

"The risk assessment includes that variable," Dohyun said. "The maintenance window is a known institutional event. Its operational exploitation potential is apparent to any analytical framework that examines the sub-level's security architecture." The guild master's voice in the register that acknowledged risk without permitting risk to paralyze operational planning. "The alternative is inaction. The annex's contents remain uninvestigated. The research program's institutional history remains unknown. The operative's network continues to operate with information advantages that our inaction preserves."

"The alternative is also waiting. Gathering more intelligence before committing to an operation in a facility whose security we understand incompletely."

"Waiting has costs. Jihoon's data is in the operative's possession. The laboratory's research is accelerating. Dr. Park's revised formal objection is in the committee's administrative pipeline — when the committee deliberates, the institutional attention on your evaluation will intensify. The operational window that the current evaluation period's relative stability provides may not persist."

The calculus. Act now with incomplete intelligence and accept the risk of operational exposure, or wait for more complete intelligence while the operative's network's information advantage widened and the evaluation period's institutional dynamics shifted. The diagnostic dilemma that every triage situation presented — the patient's condition deteriorating while the diagnostic workup gathered data, the treatment decision balanced between premature intervention and delayed action.

"Brief Eunji," Sora said. "I want her assessment of the sub-level's physical environment. Her judgment on the operational feasibility."

"Understood."

Dohyun stood. The documentation case in both hands. The blue tab's intelligence secured in the analog architecture. The operational timeline set — three days to plan, one day to execute, the maintenance window providing the gap that the institutional security's own procedural design had created.

At the door, Dohyun paused. Not the combat-conditioned stop that Minho's reflexes produced. The deliberate pause of a man who had additional information to transmit and was selecting the moment for its delivery.

"The financial analysis team identified one additional data point." His voice quieter. The volume reduction that information of personal significance produced. "The archival management budget's personnel costs include a compensation line designated 'consultancy — archival specialization.' The consultancy payments have been disbursed monthly for six years. The recipient account is anonymized through the Association's standard third-party contractor framework."

"An anonymous consultant receiving monthly payments for six years."

"The payments' value is consistent with a senior researcher's compensation — above the standard contractor rate, below the institutional division head level. The payment recipient has been receiving Association funds through the archival management budget since the budget line's establishment, and the consultancy designation has never been audited because the archival management budget falls under the director's office administrative authority."

"Which bypasses the standard audit checkpoints."

"Which bypasses every checkpoint that would normally review a six-year anonymous consultancy payment for compliance with the Association's contractor disclosure requirements."

The Architect's financial signature. Or the institution's deliberate concealment of a consultant whose identity the director's office chose not to disclose. The same ambiguity. The same diagnostic uncertainty. The authorized and the unauthorized occupying the same administrative space.

"The annex's documentation may identify the consultant," Sora said.

"The annex's documentation may resolve several questions simultaneously." Dohyun's departure proceeding through the conference room door with the deliberate pace that operational planning's weight imposed on a man who understood the consequences of the operation he was proposing and who proposed it because the consequences of inaction exceeded the consequences of action in his institutional calculus.

The door closing. Conference Room 1. Sora alone with the afternoon light and the analytical framework that the briefing had constructed — the annex's physical location, the maintenance window's operational parameters, the financial trail that connected the unacknowledged records facility to the director's office authorization chain.

Three days.

---

Day thirty-nine. Night. 0130.

The zero-point state at fourteen meters. The laboratory observed.

The scanning surfaces still running. The automated protocols continuing their data acquisition on the positioned tissue samples. The visualization system dark. The laboratory empty of personnel.

But a change. The freshly collected tissue sample — the one whose metabolic indicators had placed its collection during Sora's four-day blind spot — had been moved. No longer positioned on the fourth scanning surface. Relocated to a containment unit in the stored collection's linear arrangement — integrated into the archived samples, its position in the row suggesting chronological filing. The newest addition to the collection.

And in its place on the fourth scanning surface: nothing. The platform empty. The restraint interface open. The scanning field active but unoccupied — the equipment ready to receive a new sample.

The laboratory prepared for the next collection. The scanning surface cleared. The containment infrastructure staged. The operative's research cycle rotating from analysis of the current sample to preparation for the next acquisition.

The next tissue sample. Collected from whom. From what source. Through what mechanism. The laboratory's procurement history spanning eight to ten years of healer-class substrate collection — the eleven-plus containment units in the stored archive representing individual specimens gathered over the research program's operational timeline. Each sample collected from an individual whose healer-class biology provided the channel substrate that the research program studied.

Individuals like Jihoon. Like the subjects whose anonymous identifiers populated the scanner's local storage. Like the healer-class awakened people whose biology contained the substrate that the Architect's research program had spent years accumulating and analyzing.

The fourth scanning surface waiting for its next specimen. The laboratory's automated systems running. The operative's network operating on a timeline that intersected with the evaluation period's remaining fifty-one days and with the annex maintenance window that would open in two days.

Sora held the fourteen-meter depth for thirty seconds. Released. The palatal tissue's rebuilt capillaries stable — the sustained compression producing no hemorrhagic indicators. The observation capability restored. The laboratory visible.

Visible, and waiting.

---

Day forty. Eunji.

Conference Room 1. 1400. The legal pad and the floor plan that Dohyun's briefing had produced — Eunji studying the hand-drawn cartography with the analytical focus that spatial problem-solving demanded.

"The sub-level's layout is consistent with what I know from my archive visits," Eunji said. The researcher's assessment delivered at the accelerated pace that operational planning's time constraints imposed on her normally methodical analytical delivery. "Annexes 1 through 6 are arranged along the main corridor. The corridor branches at a security checkpoint beyond Annex 6 — the checkpoint separates the standard archive from the restricted sections. Annexes 7 through 9 are beyond the branch point."

"You've been past the checkpoint."

"I've seen the checkpoint. I've never passed it. My research access terminates at Annex 6." Eunji's finger on the floor plan, tracing the corridor's branching architecture. "The checkpoint is the first of three between the main corridor and Annex 7. Each checkpoint has a badge reader, a motion sensor, and a visual surveillance camera. During normal operations, all three systems are active."

"During the maintenance window."

"The badge readers deactivate. The motion sensors continue operating but are reconfigured to maintenance mode — they detect movement but don't trigger security alerts, because the maintenance personnel's movement would generate continuous false positives. The cameras record but don't archive during the buffer purge window."

"The motion sensors in maintenance mode. Do they log entries?"

"Maintenance mode logs movement events without the personnel identification that badge correlation normally provides. The log records 'movement detected at checkpoint 2, 14:37' without 'movement by badge holder [name].' The logs are retained for the standard forty-eight-hour rolling retention period, then overwritten."

"Forty-eight hours of retained movement logs without identity correlation."

"Forty-eight hours during which the logs show that someone passed each checkpoint, but not who." Eunji's glasses adjusted. "If the maintenance window closes and the badge system reactivates before I've exited the restricted section, my badge authentication at the reactivated checkpoints would timestamp my location in the restricted corridor. That's the primary risk — the timing. I need to be back in the standard annexes before the systems reactivate."

"The time required to document Annex 7's contents."

"Depends on the contents. If it's a standard records facility — document storage, filing systems, physical archive — I can photograph and catalog the high-priority materials in approximately ninety minutes. If it's a research facility with active equipment, biological samples, and data systems, the documentation time increases significantly."

"Assume it's a research facility."

"Two to three hours. Minimum. The biological containment units need individual documentation — sample identification, storage parameters, any labeling that identifies the specimen source. The data systems need interface access — if the annex has workstations, I can review the file directories and photograph the metadata even if I can't extract the actual data files. The physical layout needs mapping for correlation with the procurement records."

"The overlap window is three hours forty minutes."

"Which leaves forty to a hundred minutes of margin, depending on the documentation's duration." Eunji set down the legal pad. The analytical assessment completing — the operational parameters mapped, the timing constraints calculated, the risk variables identified and weighted. "The margin is adequate for execution. Not for complications."

"Complications."

"Maintenance personnel completing the recalibration early. Monitoring station staff returning to their posts before the maintenance officially concludes. The visual surveillance's buffer purge cycling prematurely. An unrelated security event triggering a system reactivation outside the maintenance protocol's standard timeline."

"Or the operative's network anticipating the access and preparing a response."

Eunji's glasses adjusted. Twice. The double correction. "You think the maintenance window is compromised."

"I think the maintenance window is visible to anyone with access to the facilities system's public calendar. The operative's network has demonstrated administrative system access at the scanner terminal level. The facilities system is a less restricted administrative resource than the scanner's local storage."

"So the operative knows the maintenance window exists."

"The operative has known the maintenance window exists for as long as the facilities system has logged it. The question is whether the operative considers the window an operational concern — whether the annex's contents represent material that the operative's network would protect, or material that the operative's network considers expendable."

"If the annex is the operative's primary research repository, they'd protect it."

"If the annex is the operative's primary research repository."

The conditional hanging in Conference Room 1's institutional air. The analytical framework's core uncertainty — whether the annex that the archival management budget funded and that the director's office authorization chain controlled represented the Architect's network's central research operation or a secondary facility whose relationship to the primary operation the investigation hadn't yet determined.

"Dohyun's financial analysis indicates eight years of procurement and maintenance," Eunji said. "Three hundred-plus containment units. A six-year anonymous consultancy. The scale suggests a primary operation, not a secondary cache."

"The scale could also suggest a decoy. A facility maintained at the operational level that attracts investigative attention while the primary operation exists elsewhere."

"A research-grade decoy maintained for eight years at significant institutional cost." Eunji's skepticism expressed through the analytical assessment's implied improbability — the resource investment that a decoy would require weighed against the operational benefit of misdirecting an investigation that, until recently, hadn't existed.

"An institution that maintains a basement laboratory beneath an evaluation wing that the evaluation's own officer doesn't know about." Sora's counter-assessment delivered at the clinical register that matched Eunji's analytical tone. "An institution whose design assumptions create the vulnerabilities that the investigation exploits. The question isn't whether the cost is justified. The question is whether the architecture we're investigating was designed to be investigated — whether the trail we're following was laid for us to follow."

The conference room quiet. The two analytical frameworks — the researcher's data-driven assessment and the healer's clinical suspicion — occupying the same operational space without resolving into consensus. The diagnostic uncertainty that complex pathology produced when the available evidence supported multiple interpretations and the clinical consequences of each interpretation demanded different treatment plans.

"The operational decision," Eunji said.

"Proceed. But with modified parameters." Sora's hands on the table. The motionlessness preceding the tactical recommendation that the analytical framework had constructed. "Document the annex's contents as planned. But assume the documentation itself is the primary product, not the evidence. If the annex is genuine, the documentation provides the research program's institutional history. If the annex is a decoy, the documentation reveals what the operative wants us to believe — which is its own form of intelligence."

"Document the presentation regardless of whether the presentation is authentic."

"The diagnostic methodology applies to both scenarios. A patient who presents false symptoms reveals as much about their condition as a patient who presents genuine ones. The deception itself is data."

Eunji's expression shifting — the analytical architecture processing the clinical metaphor and mapping it onto the operational framework. The researcher's cognitive resources reallocating from the binary assessment of genuine-or-decoy to a broader evaluation of the information's diagnostic value regardless of its authenticity.

"Three days," Eunji said. "Day forty-one. I'll schedule a standard archive visit for Annexes 3 and 4 — the research division has a pending data request that justifies the sub-level access. The visit will coincide with the maintenance window's overlap period."

"The legal pad."

"The documentation will be analog. Photographs on a personal device that doesn't connect to the institutional network. Handwritten notation on the legal pad. Nothing that the digital surveillance infrastructure can intercept or correlate."

"And Eunji."

"Yes."

"If anything in the annex's physical environment doesn't match the expected configuration — if the space shows signs of recent modification, if the contents appear staged, if the layout feels designed to be documented rather than designed for research — you leave. Immediately. Before completing the documentation. The partial information is worth more than the comprehensive record if the comprehensive record is what the operative intended you to collect."

Eunji looked at Sora across the conference room table. The researcher's analytical focus meeting the healer's clinical assessment — the two frameworks that the partnership's operational structure had aligned now confronting the operational moment that the alignment had been building toward. The plan set. The timeline established. The parameters defined.

"Three days," Eunji repeated. The glasses adjusted. Once. The singular correction.

The conference room. Day forty. Fifty remaining.

The plan constructed on the analog channel's yellow paper. The operational window identified in the institutional architecture's own maintenance schedule. The risk assessed, the parameters set, the contingencies outlined in the clinical language that the partnership's vocabulary employed.

And underneath the plan — underneath the legal pad's blue ink and the floor plan's hand-drawn corridors and the operational timeline's calculated margins — the diagnostic uncertainty that Sora's clinical training refused to resolve prematurely. The trail that led to the annex. The trail's visibility. The question of whether the investigation was following evidence or being guided toward a destination that someone else had chosen.

Three days until the answer. Or three days until the next question.

Sora's hands motionless on the conference room table. The healer assessing the patient, and the patient presenting symptoms that could mean recovery or could mean the disease had learned to mimic health.