Skill Thief's Gambit

Chapter 86: Correction

Quick Verification

Please complete the check below to continue reading. This helps us protect our content.

Loading verification...

Saturday started with damage assessment.

He sat with Marcus on a call at 0700—Marcus on three hours of sleep, which wasn't enough for the kind of work they needed to do, but was better than the nothing from the previous two days.

"The verification hold is in Yeo's inquiry system as a procedural flag," Marcus said. "It doesn't affect the rest of the evidence chain. The other documentation we've submitted—the Maritime Police records, the Coast Guard welfare documentation, the link registry, the testimony from Baek's cooperation sessions—none of that is in question." A pause. "The only thing under verification hold is the single communication copy Baek provided yesterday."

"One document," Caden said.

"One document. The rest of the record stands." Marcus paused. "The good news is that Yeo flagged the inconsistency herself before formally accepting the document. Which means it never entered the evidence record. It's under review, not in."

He thought about that.

"Which means the evidence record is still clean," he said.

"Yes. The contaminated document never touched the clean record." Marcus paused. "The bad news is that someone will need to explain to Yeo why Baek's cooperation file contained a false document. That explanation becomes part of the inquiry's formal proceedings. It's not devastating—it's actually useful evidence of Chae's obstruction attempt—but it requires a formal submission and a verification session with Baek."

"Can Baek provide the verification."

"He'll have to. His counsel is already aware—I spoke to Na-young this morning and she'd already contacted Baek's team." A pause. "Baek didn't create the document. The metadata Marcus found points to Section 9's system. Baek received it the same way he would have received any other document in his operational files—through a normal administrative channel that Section 9 had access to because the coordination relationship between the two organizations involved shared file systems." A pause. "He's as surprised as we are. Or claims to be."

"Plausible."

"Kane thinks it's genuine. Baek's cooperation has been consistent. If he'd known the document was false, he wouldn't have provided it—it cost him the appearance of reliability in his cooperation agreement, which is the only thing protecting him right now."

"Chae used him without his knowledge," Caden said.

"She used the coordination infrastructure she'd helped build," Marcus said. "She still has access to Section 9's administrative file system through the people who haven't been identified yet. She created the document, pushed it through the system, and it ended up in Baek's files without any action required on his part."

"How many people in Section 9 are still in place and unidentified."

Marcus was quiet for a moment.

"I don't have a confident number," he said. "The registry identified six Section 9 members with resonance links. The inquiry has flagged three of them. The other three are still active." A pause. "Of those three, at least one has file system administrator access. That's the access that would have been needed to push a document through to Baek."

"One administrator with a link," Caden said. "And they created the document."

"And pushed it into the coordination file structure," Marcus confirmed. "Targeted specifically at what they expected us to request."

He sat with that for a moment.

"She's still running operations," he said. "Off-grid. Through the three unidentified link holders in Section 9."

"Yes," Marcus said.

"Then the immediate priority after the container is the three remaining Section 9 links." He paused. "Because as long as she has active assets inside Section 9's system, she can run this kind of operation indefinitely."

"That's the right priority," Marcus said. "But identifying the three requires access to Section 9's administrative records, which requires either Yeo's subpoena authority or—"

"Kane," Caden said.

"Kane," Marcus agreed.

---

Kane was already working on it.

*The three unidentified Section 9 link holders,* his message said. *I've been building a candidate list since this morning based on the file system access logs the Hunt has from our coordination relationship with Section 9. The administrator who pushed the document—I have six candidates.* A pause. *Three of them I can cross-reference against the link registry's establishment dates. If the registry shows a link established with one of these six, that narrows it.* Another pause. *I need you to send me the relevant registry entries for the establishment date windows I'm looking at. The Dealer's document.*

He sent the registry section to Kane.

Forty minutes.

*Two candidates remain after cross-reference,* Kane sent. *A junior intelligence analyst named Park So-yeon and a senior records coordinator named Oh Dong-jin.* A pause. *Oh Dong-jin has been with Section 9 for eleven years. He has administrative access to the full file coordination system. The link establishment date in the registry matches a joint Section 9-Hunt briefing session from three years ago.*

*Oh Dong-jin,* Caden sent.

*Yes. He's Chae's administrative access point.* A pause. *He's not a conscious asset. The link establishment at the briefing was physical contact—probably a handshake, possibly incidental. He's been feeding fragments through normal administrative work for three years and doesn't know it.* Another pause. *But three years of fragment access gives Chae a complete picture of Section 9's administrative operations. Including what files exist, where they're stored, what access protocols look like.* A long pause. *She built the false document using Oh's administrative knowledge of how genuine documents appear in Baek's coordination file system. She knew exactly what it needed to look like to be plausible.*

He thought about that.

*Can you remove Oh's administrative access without him knowing why,* he sent.

*I can submit a formal administrative audit request to Section 9 through the inquiry oversight process. As Hunt director, I have standing to request administrative security reviews for personnel in joint-operation roles.* A pause. *The request will cite routine security protocols, not the link. Oh won't know what triggered it.* Another pause. *It will reduce Chae's administrative access to Section 9's systems within forty-eight hours.*

*Do it,* Caden sent.

*It's already filed.*

---

By 1300, the damage assessment was done.

He sat with Vera and went through it.

"The evidence chain holds," he said. "The false document never entered the record. Yeo flagged it before accepting it. It's under verification as an obstruction attempt, which is actually useful to the inquiry." He paused. "The container hold is in place. Oh Dong-jin's administrative access is being removed." He paused. "The only lasting cost is—"

"She knows your reach," Vera said.

"She knows my reach." He nodded. "And she knows I know about Woo. Which means she and Woo are now both aware that the inquiry is building toward them."

"That changes their behavior."

"Yes."

"They'll be more careful."

"Probably more aggressive," he said. "People who know they're being built against stop waiting for you to get there and start trying to change the terms before you do."

She looked at him.

"So what's their move," she said.

He thought about it.

"They can't stop the inquiry through legal means—not anymore. Baek's cooperation is on record, the evidence chain is clean, Yeo's authority is established." He paused. "They can try to discredit the evidence. We've seen that with the false document. They can try to delay—buy time through procedural challenges. They can try to—" He paused.

"Relocate the problem," Vera said.

"Meaning."

"If the problem is the legal precedent that Yeo's inquiry establishes," she said, "the way to deal with that isn't to destroy the inquiry. It's to make sure the precedent doesn't travel. The legal record stays in Korea. The cases in Japan and Singapore don't have a Korean precedent to build on. The House's international strategy stalls."

He sat with that.

"She knows about the international scope," he said.

"If she's been receiving fragments from the right people, possibly yes." Vera paused. "Did the Dealer's three-page communication mention Japan?"

"Yes."

"In a document that traveled through relay three."

He thought about relay three.

"Relay three was confirmed clean by Marcus before the communication was sent," he said.

"Marcus confirmed it was clean at the time he checked," Vera said. "But the relay infrastructure—the physical relay points—those have histories. People touched them. Set them up. Maintained them." She paused. "I'm not saying relay three is compromised. I'm saying we should ask Marcus to re-verify."

He was already typing.

Marcus's response took eleven minutes.

*Relay three infrastructure. I've run the verification chain.* A pause. *The relay points are clean. I'm confident of that.* Another pause. *But Caden—the Dealer's communication traveled through three relay handoffs before it reached you. Relay three was clean. Was relay one?*

He looked at that.

*Run it,* he sent.

*Working on it now.*

---

Marcus came back at 1600.

*Relay one is clean. But I found something in the relay's traffic log that I didn't expect.* A pause. *There was a metadata echo at 0632 on Thursday morning—six minutes after the Dealer's communication went through. Not the content of the communication. Just its existence. That it traveled.* A pause. *Someone on the relay infrastructure knows the Dealer made contact with you on Thursday morning. Not what was said. That it happened.*

*Who,* Caden sent.

*I'm tracing the echo now. The metadata traveled through a different route than the communication itself—which means someone specifically set up a secondary monitoring layer on the relay handoffs.* A long pause. *Caden. The secondary monitoring layer doesn't look like Chae's infrastructure. It doesn't match the signature of any of the assets we've identified in the registry.*

*What does it look like.*

*I don't know yet.* A pause that stretched to five minutes. *It looks like someone who already knew about the relay infrastructure before we used it. Someone who was watching the relay before Thursday.*

He put the phone down.

He picked it up.

He sent to the Dealer's relay: *There's a secondary monitoring layer on relay one's handoff logs. Someone knew the relay was used Thursday. Not the content—the fact of contact.* A pause. *I need to know if you're aware of this and who the watcher is.*

He waited.

The Dealer's response came forty minutes later, through relay two.

*The watcher on relay one is ours. A separate verification layer we run on all primary relay handoffs. The purpose is to detect exactly the kind of monitoring you've found.* A pause. *The fact that you found it means your relay security awareness is at the level we need it to be at.* Another pause. *The relay is clean. The watcher is the House's.*

He read that.

He sent back: *You didn't tell me about the secondary monitoring layer.*

*No,* the Dealer replied. *We tell operatives about infrastructure on a need-to-know basis. The secondary monitoring layer is need-to-know for relay security officers, not for field operatives.* A pause. *Until now. You've reached the tier where you need to know.*

He put the phone down.

Another thing the Dealer had been watching for him. Another layer of infrastructure that had been running while he built his own.

He thought about tiers.

---

The afternoon passed in the quiet work of corrective measures.

Na-young filed the formal verification session request for Baek's cooperation through Yeo's inquiry. Kane filed the administrative audit on Oh Dong-jin through the Hunt oversight process. Marcus continued watching the container's manifest status—unchanged, still under hold.

At 1800, Marcus found something.

*In the process of verifying the relay infrastructure, I ran a separate check on something that's been bothering me,* he sent. *Deputy Minister Woo's personal communication records, which I don't have direct access to, but which I can partially reconstruct through the administrative records his Ministry-level assistant files—the scheduling logs, the meeting records, the institutional correspondence that's technically public under transparency rules.* A pause. *Woo had a meeting three days ago. A private meeting with no agenda notation in the transparency record. The meeting was held at a private dining establishment in Yongsan-gu.* A pause. *The other party at the meeting was not documented. But I cross-referenced the meeting with a traffic camera feed from the Yongsan-gu district that Marcus—* He paused. *That I accessed through a source I won't explain.* A pause. *Caden. The other party at Woo's private meeting was not Chae. It was someone I recognized from the financial records I've been building on the ECHO-PATTERN funding chain.*

*Send me the name,* Caden sent.

Three minutes.

Marcus sent a name he didn't recognize.

Then a title beneath it: *Chairman, National Strategic Intelligence Oversight Advisory Panel.*

He looked at that.

*That's not a Ministry-level position,* he sent.

*It's not a Ministry position at all,* Marcus replied. *The Advisory Panel is an extra-governmental body. Appointed by the Assembly speaker's office. No formal authority. Purely advisory.* A pause. *It's the kind of body that gets created to give senior political figures a formal role without actual institutional accountability.* Another pause. *Caden. I've been going through the Panel's membership records. The Panel was established six years ago. The Assembly speaker appointed six members.* A long pause. *Three of those members have resonance links in the registry.*

He sat completely still.

*Three out of six,* he sent.

*Three out of six members of an extra-governmental advisory panel that has informal influence over national intelligence oversight.* Marcus's pause stretched. *The Panel doesn't have formal authority. But it has informal influence. It meets with Intelligence Committee chairs. It provides "guidance" on oversight policy. It's the kind of body where the right four words at the right lunch table can delay an investigation for six months.* Another pause. *And three of its six members are in Chae's network.*

He thought about the Assembly speaker with a resonance link. About the two Yeo inquiry staff members with links. About one hundred and forty-seven names in a registry across eight years.

He thought about what the Dealer had called an architecture.

"Vera," he said.

She was in the doorway.

He showed her the message.

She read it.

She handed the phone back.

"The Advisory Panel," she said. "She didn't link them for intelligence gathering. She linked them for influence."

"Three members who receive fragments of every sensitive oversight conversation they're part of." He paused. "When the Advisory Panel gives guidance that happens to protect a Section 9 program—it looks like independent oversight. It's actually coordinated."

"Yes," Vera said.

"The Dealer doesn't know about this specific connection," he said. "I'm going to send it."

"Yes," she said.

He sent it.

The Dealer's reply came an hour later.

*This is new. We knew Chae had Advisory Panel contacts but not the scope. Three of six is significant—that's a working majority on any informal vote.* A pause. *Add it to the formal evidence package Na-young is building. This goes to Yeo.*

He sent it to Na-young.

She acknowledged in three minutes.

---

At 2200, he sat with Vera and Marcus's full day summary and thought about the shape of what Chae had built.

One hundred and forty-seven names. Eight years. Not random—every link was positioned to reach an institution she needed to influence or monitor. Journalists who reported on intelligence oversight. Officials who reviewed it. Advisory panel members who shaped the informal climate. Parliamentary staff who translated formal processes. Hunt personnel who coordinated with her division.

She'd built a web. Not for intelligence. For protection.

"She was never building intelligence capacity," he said. "She was building immunity."

Vera was quiet for a moment.

"Say more," she said.

"Every link in the registry serves a defensive function. She's not collecting intelligence to act on. She's collecting intelligence to know when she's threatened and to have assets positioned to deflect the threat." He paused. "The journalist—she knew when coverage was coming that could damage her. The Advisory Panel—she knew when oversight guidance was shifting. The Auditor's staff—she knew when the review timeline was moving." He paused. "She never built offense. She built a system that made her untouchable."

Vera looked at him.

"Until someone came from outside the system," she said.

He thought about that.

"I was outside it because I'm a skill thief," he said. "No resonance link access. Not a journalist, not an official, not in any position she'd have thought to monitor." He paused. "The Dealer sent a seven because the hand needed a card that wasn't in her deck."

Vera nodded once.

"Don't let her put you in her deck," she said.

He looked at her.

"The container," he said. "Tomorrow night."

"Yes," she said. "Tomorrow night."

He went to sleep thinking about a woman in a building somewhere in Seoul, off-grid, reading fragments from one hundred and forty-seven windows into a world she could see but not touch anymore.

And a container in Incheon port that she needed to move before Sunday's departure window.

And what she was going to try when she realized the hold wasn't lifting.