Morrison didn't knock. He walked into Adrian's quarters at 0847 carrying a briefcase and the particular expression of a man who'd run out of patience for other people's retreats.
"Sit down," Morrison said. He set the briefcase on the desk, pushed the phone asideâSarah's number, face-downâand opened it. "I need your analysis. Not your targeting recommendations. Not your minimum output. Your actual analysis. The operational situation has changed and I don't have anyone else who can tell me what I'm looking at."
Adrian was standing by the window. Forty-four percent reserves. The thread pulsing. The pull aching. Three days in Moscow spent avoiding everyone who could help him, the distance growing wider with every closed door and every terse radio exchange.
He looked at Morrison. The intelligence officer was standing with his hands on the open briefcase, his posture carrying the rigid urgency of someone who'd crossed a professional boundaryâentering without permission, making demands instead of requestsâbecause the situation demanded boundary-crossing and Morrison was, above all else, a man who served the situation.
"What changed?" Adrian asked.
Morrison pulled the work order from the briefcase. Placed it on the desk. Then the network map. Then a stack of financial recordsâbank transfers, shipping invoices, company registrations. The documents spread across the desk's surface like evidence at a crime scene, each piece connected to the others by lines that Morrison's intelligence team had drawn and that Adrian's analytical capability was needed to interpret.
"The presence is building second-generation devices. This work order specifies a frequency-resonance housing with four times the harmonic capacity of the Bohemian design. I need you to tell me what that means. Not approximately. Not 'target the intermediaries.' I need the full picture."
Adrian picked up the work order. Read the specifications. His void-adapted mind processed the engineering data the way it processed everythingâfast, precise, the analytical machinery of a consciousness that had spent a millennium solving problems in an environment where the wrong answer meant death.
The specifications described a housing unit designed to contain and direct void-energy emissions across a frequency band that was 4.2 times wider than the Bohemian bridge-device design. The housing's internal geometryâthe arrangement of resonance chambers, the positioning of emission ports, the material composition of the channeling surfacesâwas optimized for simultaneous multi-frequency output. Not sequential. Simultaneous.
Adrian set the work order down.
"The Bohemian devices operated on a single frequencyâthe bridge frequency. One connection per device. Three devices, three bridges, triangulated for gate construction. Each device could only create one bridge because its emission apparatus was tuned to one harmonic."
"And this?"
"This housing is designed for a multi-harmonic emission apparatus. Multiple resonance chambers, each tuned to a different frequency, all operating simultaneously through a shared crystal matrix." Adrian looked at Morrison. "The Bohemian devices were fishing lines. One hook, one target, one bridge. This is a net. A single device that can open connections on multiple frequencies at once."
"How many connections?"
"Based on the housing geometryâfour. Maybe five. The resonance chambers are arranged in a pentagonal configuration. Five chambers, five frequencies, five simultaneous bridges."
Morrison's hand tightened on the edge of the desk. The grip of a man absorbing information that was worse than he'd prepared for. "Five bridges from a single device. The Bohemian array needed three devices for three bridges."
"And the triangulation that the Bohemian array requiredâthree devices synchronized to create a gateâthis design doesn't need that. Five bridges from one device gives it internal triangulation. The device is self-contained. No array required. No three-site coordination. One device. One location. Five bridges."
Morrison processed this for three seconds. The analytical speed of an intelligence officer who dealt in implications rather than specifications. "The Bohemian operation required us to hit three sites simultaneously. If the presence deploys single-device unitsâ"
"You can't coordinate simultaneous strikes. Each device is independent. You'd need to find and destroy them individually, and each one is a complete system. No supply chain dependency between devices. No synchronization vulnerability. Distributed. Redundant."
The room was quiet. The Moscow morning pressed gray light through the window. The work order sat on the desk between themâa single page of engineering specifications that described a threat architecture fundamentally different from anything the Bohemian operation had been designed to counter.
"Show me the intermediaries," Adrian said.
Morrison spread the intelligence files. Three profiles. Two confirmed, one signals-intercept only.
The first: JĂŒrgen Haltz, forty-three, German national. Former electrical engineer, currently unemployed. Void-sensitivity rating: minimal. His connection to the deep-void presence registered on surveillance equipment as micro-fluctuations in ambient dimensional activityâbarely above noise floor. Haltz had been recruited by Helios Solutions eighteen months ago as a "technical consultant." His role: receiving dimensional engineering specifications through his marginal void connection and translating them into manufacturing drawings that normal engineers could execute. He didn't understand what he was building. He heard instructionsânot words, impressions, spatial relationships that his mind rendered as technical diagramsâand he drew what he heard.
The second: Min-seo Park, thirty-one, South Korean national. Office worker. Void-sensitivity: minimal. Same recruitment pattern. Different subsidiary. Same function: translation of dimensional instructions into physical specifications.
Both were low-level. Barely awakened. The kind of void-sensitivity that existed in perhaps one in ten thousand people worldwideâtoo weak to register on standard awakener detection systems, too strong to ignore the whispers that came from below the dimensional layers when the deep-void presence chose to speak.
"These are disposable," Adrian said. "The presence recruited them because they're available and compliant. Their void sensitivity is too weak for them to resist the instructions or understand their source. They do what they hear because they don't know enough to refuse." He set the profiles down. "Remove them and the presence finds others. There are thousands of marginal void-sensitives worldwide. Morrison's network can identify some. Not all. Not enough."
"Petrov's plan: hit the Romanian assembly facility and the intermediaries simultaneously. Remove the assembly capability and the translators. Force the presence to rebuild both."
"It buys time. Weeks. Maybe months. It doesn't solve the problem." Adrian was leaning over the desk now. The withdrawal that had contracted his engagement for three days was crackingâthe operational reality of a threat that required his full capacity pushing against the isolation reflex that the thread and the pull and the feeding had triggered. The threat was bigger than his retreat. "The new design means the presence is learning. Adapting. The Bohemian devices failed because they required three-site coordination and we exploited the synchronization vulnerability. The second-generation design eliminates the vulnerability. One device. Self-contained. The presence analyzed its own failure and engineered around it."
"In three days."
"It's been building bridges for thousands of years, Morrison. Helena foundâ" Adrian stopped. He hadn't been told about the ancient-site connection. Helena had found that in her analysis of Yuki's drawings, and Adrian had been avoiding Helena since the conversation he'd shut down. "The presence doesn't think on human timescales. The design changes weren't created in three days. They were waiting. The second-generation specifications are an evolution that the presence had already developed and was holding in reserve."
Morrison absorbed this. His expression didn't changeâthe trained neutrality of an intelligence officer who received escalating threat assessments with the same face he received weather reportsâbut his hands told a different story. Both were on the desk. Both were still. The forced stillness of a man who was controlling a physical response.
"Show me the financials," Adrian said.
Morrison pulled the financial records from the stack. Bank transfers. Shipping invoices. Corporate registrations. The paper trail of Helios Solutions' commercial network, mapped by Morrison's team over weeks of forensic accounting.
Adrian read them. Fast. The analytical patterns that a thousand years of survival had burned into his neurology processing the financial data the way they processed threat vectorsâlooking for structure, for repetition, for the patterns that human beings created unconsciously when they moved resources through systems.
He found it on the seventh page. A transfer. Small. Forty-two thousand euros, routed from a Cyprus-registered holding company to a materials supplier in Finland. The holding company was in Morrison's network mapâHelios subsidiary, financial intermediary, documented connection.
But the transfer was wrong. The routing didn't match the Helios pattern. Morrison's team had identified Helios's financial architectureâspecific banks, specific transfer protocols, specific timing patterns that reflected the operational habits of whoever managed the network's money. This transfer used different banks. Different routing. Different timing. The same Cyprus holding company, but a different financial hand on the controls.
Adrian pulled four more transfers. Same anomaly. Funds moving from the Cyprus company through channels that didn't match Helios's established patterns, into companies that Morrison's network map didn't include. A Finnish materials supplier. A Japanese engineering consultancy. A Chilean mining company. A British logistics firm.
Four companies. None of them in Morrison's fourteen-subsidiary map. None of them connected to Helios through the corporate ownership chains Morrison had traced. Connected only through moneyâflowing from the same Cyprus intermediary but through different channels, as if two separate operators were using the same banking node for different purposes.
"Morrison."
"What are you seeing?"
"A second network." Adrian arranged the transfers on the desk. Five documents. Five financial flows that didn't belong to the pattern Morrison had mapped. "The Cyprus holding company isn't just a Helios financial intermediary. It's shared infrastructure. Someone else is using it. Different routing protocols. Different target companies. Different financial patterns. But the same node."
Morrison leaned in. Read the transfers. His eyes tracked the routing numbers, the bank identifiers, the destination accountsâthe specific data points that his signals team had collected and that his analysis had attributed to Helios without checking for the possibility that two separate operations might share a financial intermediary.
"I assumed the Cyprus entity was single-purpose," Morrison said. The voice of a man identifying his own blind spot with the clinical honesty that professional intelligence work demanded. "One client. One network. I didn't look for a second user."
"Someone else is building void-energy devices. Not through the same intermediaries. Not with the same designs. Using a different distribution network that overlaps with Helios only at the financial layer." Adrian tapped the Finnish materials order. "This supplier doesn't sell anything that appears in the Bohemian device specifications. Different materials. Different industry. Whatever the second network is manufacturing, it isn't bridge devices."
"Then what?"
"I don't know. I'd need the second network's manufacturing specifications. The materials orders might tell us, if your team can pull the full purchase histories from these four companies."
Morrison was already reaching for his phone when it rang.
Not the Moscow relay. Not the secure satellite channel. The emergency lineâthe direct connection to Morrison's London signals team that was reserved for events classified as operational-integrity threats. The line that meant something had gone wrong at a level that required immediate response regardless of what else was happening.
Morrison answered. Listened. Twelve seconds. His face didn't change. Intelligence officers' faces never changed during incoming threat reportsâthe training was too deep, the discipline too ingrained. But his body changed. His weight shifted forward. His free hand found the edge of the desk and gripped it.
He hung up.
"The Czech BIS investigation," Morrison said. "It's broken containment."
Adrian straightened. The second-network analysis dropped in priority. Containment breaches were immediate.
"A Czech intelligence officerâBIS counterintelligence division, name Major TomĂĄĆĄ KovĂĄĆâhas filed a formal report through NATO's intelligence-sharing framework. The report references, and I'm quoting my signals team's intercept: 'anomalous dimensional activity consistent with unauthorized void-energy experimentation in the Ć umava protected area.'"
Adrian processed the language. "Anomalous dimensional activity" was a classified term. "Void-energy experimentation" was a classified term. The Czech domestic intelligence service had no authorized access to void-energy terminology. The BIS was a counterintelligence and security agency. Dimensional phenomena were handled by specialized awakener-defense units that reported through different channels.
"KovĂĄĆ has clearance he shouldn't have," Adrian said.
"KovĂĄĆ has clearance that someone gave him. The terminology in his report isn't BIS standard. It's not NATO standard. It's not any standard I recognize from any national intelligence framework I have access to." Morrison picked up the emergency phone again. Dialed. "The language is specific. Technical. Accurate. Whoever briefed KovĂĄĆ on void-energy terminology did so with full knowledge of what the Bohemian Forest devices were and what our operation was designed to accomplish."
"The Council."
Morrison held up a hand. Listening to his London team. Another twelve seconds. His grip on the desk tightened.
He set the phone down. Slowly. The controlled motion of a man placing a weapon on a table.
"KovĂĄĆ's report was filed through NATO's secure intelligence-sharing framework at 0743 this morning. At 0751âeight minutes laterâthe report was accessed by a user account registered to the Office of Strategic Oversight. OSO is the administrative cover for the Council of Nine's monitoring division. They have automated keyword alerts on the NATO framework. 'Void-energy' is one of the keywords."
The room was still. The financial documents on the desk. The work order. The intermediary profiles. The intelligence architecture of an operation that had been built on secrecy and was now bleeding information through channels Morrison couldn't control.
"The Council knows about the Bohemian Forest operation," Morrison said. "They know we hit the devices. They know we operated on Czech soil without authorization. And they know that Adrian Cross was involved, because KovĂĄĆ's report referencesâ" Morrison paused. Checked his notes. "â'a void-energy signature of unprecedented magnitude detected at the northern site.' That's Alpha. That's you."
Adrian sat on the bed. The thread pulsed. The pull ached. The operational picture that he'd been avoiding by retreating into solitude was now standing in his room in the form of a British intelligence officer with a briefcase full of evidence that the world was getting more dangerous faster than anyone had predicted.
A second manufacturing network. Building unknown devices for unknown purposes. The deep-void presence designing second-generation bridge equipment that eliminated the vulnerabilities of the first generation. And now the Council of Nineâthe secret rulers of the awakener world, the organization that had known about the Void for decades and had been managing the information through control and suppressionâaware that an unauthorized operation had destroyed void-energy devices in their backyard.
The plan to expose the Council's corruption wasn't a plan yet. It was a exposure. Not their corruption exposedâMorrison's operation exposed. The thing Adrian had been afraid ofâproximity to the operational reality, involvement with the people and institutions that made decisions about the Voidâwas happening regardless of his withdrawal. The distance he'd been maintaining hadn't protected anyone. It had just left him less prepared for the moment when the distance collapsed.
"What do the Council do now?" Adrian asked.
Morrison looked at him. The look of a man who'd been asking for Adrian's analytical engagement for three days and had finally gotten it, and who recognized that the engagement had arrived not because Adrian had chosen to re-engage but because the operational reality had burned through his defenses the way fire burns through paper.
"I don't know," Morrison said. "That's what I need you for."
Adrian didn't answer. The second-network files sat on the desk. The work order sat beside them. The phone with Sarah's number sat face-down beneath Morrison's briefcase. And somewhere in the NATO intelligence-sharing framework, a report with Adrian's void signature in it was being read by people whose motives Morrison couldn't predict and whose power Morrison couldn't match.
The plan had gone wrong. Not Adrian's planâhe hadn't had one. Morrison's plan. The plan to operate in secret, to destroy the presence's devices without detection, to manage the diplomatic fallout through cover stories and classified frameworks. The plan that assumed secrecy could be maintained in a world where a Czech intelligence officer had access to void-energy terminology he shouldn't have known and a Council of Nine had automated keyword alerts on NATO's most secure communication channels.
The Council was always three steps ahead. Morrison was discovering what that meant.