Michael’s voice comes out hoarse. "They approached me at Horizon Tech. Asked about my research into neural network vulnerabilities. My internship project focused on identifying weaknesses in automated security systems."
"What kind of weaknesses?"
"Ways the networks could be fooled into misclassifying threats. Like teaching a security system to see malicious code as normal traffic." Michael rubs his eyes. "I was trying to help Horizon Tech patch these vulnerabilities."
"My recruitment wasn't so subtle," Victor's tone is sharp with anger. "They found me in Buenos Aires. Ten years of stayingoff every radar, and they still managed to track me down. Professional team. Efficient extraction."
The kitchen door opens and Rook slips inside. "Streets are quiet. No signs of surveillance in the neighborhood."
"What did they want?" I lean forward, needing to understand what was worth taking my brother.
"From what I overheard during captivity, they're targeting competing tech companies," Victor explains. "They needed Michael's research combined with my expertise to create something that could breach corporate systems undetected."
"The guards weren't careful about what they said around us," Michael adds. "They talked about stealing research data, development plans. Anything they could sell to the highest bidder."
Knight's typing resumes. "Did you hear them mention specific targets?"
"Only that Horizon Tech was first." Michael's voice carries a weight of guilt. "They used my own research against them. Made me help build something that could exploit the very weaknesses I was trying to fix."
"They didn’t just use it—they tailored their approach,” Victor cuts in. “They knew exactly what you’d worked on. How long they studied you and your work. This wasn’t a coincidence. They chose you for this." He looks at Knight. “And you were the next target. I’m good at slipping into a company’s systems without being seen, but you’re better.”
Knight’s muttered response drips with sarcasm. "Oh, fantastic. A heist crew that does their homework. Just what we needed."
Bishop moves from his position by the window. "The facility we hit—was that their main base?"
"No." Victor shakes his head. "That was just where they kept us while we worked. The guards mentioned transferring data elsewhere, somewhere more secure. Their headquarters."
"Which means everything we need—their research, their target lists, their whole operation—is somewhere else." Knight’s focus intensifies as his fingers fly over the keyboard. "I’m analyzing traffic patterns from the facility. Looking for data transfers, supply movements, anything that could lead us to the main base."
Michael sways slightly in his chair, and I meet Bishop’s eyes. The slight nod he gives tells me Michael’s condition is as expected—exhaustion from forced work, not overt physical abuse. They needed him functional enough to code.
"The facility's power consumption spiked three months ago," Knight says. "Right when they first approached Michael. They were ramping up operations."
Victor leans closer to the screen. "Can you trace their data transfers? They masked their destinations, but there were regular movements."
"There’s always a pattern." Knight opens another window. "They’re bouncing traffic through multiple nodes, but … There." He highlights a segment of code. "Recognize that sequence?"
Victor nods grimly. "They’re using my own architecture against them. That’s my work, modified to hide their trails."
"Perfect." Knight’s tone is dry. "Now you get to help me use it to burn their operation to the ground."
"When we locate it," Bishop says, "we need to do it properly. No half-assed quickly thrown together plan."
"I'm seeing concentrated traffic in this sector." Knight brings up a map. "Industrial zone, minimal civilian presence. Perfect for their kind of setup."
I watch as they work, each of them bringing something critical to the hunt. Rook’s tactical expertise merges seamlesslywith Knight’s technical skills and Victor’s knowledge of the system. Even Michael, fighting exhaustion, manages to add details about how they exploited his research.
"Their data transfers follow a specific schedule," Knight says after several minutes of intense focus. "Every six hours, large packets of encrypted information move through these nodes."
"Recent activity suggests they're preparing to move," Victor adds. "They won't risk keeping their operation in one place now that we've compromised one of their facilities."
"Which means we need a location now." Bishop checks his phone. "Before they go dark."
Rook pushes off from the wall. "I'll start gathering supplies. We hit them with everything this time."
Michael's head droops forward, then snaps up as he jerks himself awake. When he tries to stand, his legs buckle. I catch his arm, steadying him before he falls.
"I'll help you to bed."