LightReader

Chapter 4 - Chapter 4: HARD LESSONS

Chapter 4: HARD LESSONS

The shooting range smelled like gunpowder and testosterone.

I fed another magazine into the Glock 19 and took aim at the paper target twenty feet downrange. Center mass. That's what the instructor had said. Forget headshots—those were for movies. Real shooters aimed for the biggest target available.

The first round went wide left. The second caught the target's shoulder. The third finally hit somewhere useful.

"You're anticipating the recoil."

I lowered the weapon and turned. The range instructor—a retired cop named Hannigan with forearms like telephone poles—was watching me with the expression of a man who'd seen a thousand beginners make the same mistakes.

"I know."

"Knowing and fixing are different things." He stepped closer, adjusting my grip. "You've got steady hands. Good. But you tense up right before the trigger breaks. Your body's expecting the bang before it happens."

The body remembers things the mind doesn't.

Webb had never fired a gun before my arrival. The flinch response was hardwired into his nervous system. Every shot required conscious effort to override it.

"Again."

I raised the Glock. Breathed. Squeezed.

The round punched through the target's sternum.

"Better." Hannigan almost smiled. "Do that five hundred more times and you might be dangerous."

[PC +1 (Training)]

[SKILL PROGRESS: Firearms (Basic) — 23%]

I'd been at this for a week now. Every morning at the range, every afternoon at the gym, every evening studying surveillance techniques on Webb's laptop. The Jersey motel had become a temporary headquarters—cheap, anonymous, paid in cash.

The ribs had healed. The black eye had faded. But the memories of getting beaten in that Whitmore stairwell remained fresh.

Never again.

The number came three days later.

[NUMBER INCOMING]

[SOCIAL SECURITY NUMBER: 445-89-2134]

[MARTHA REYES — AGE 19 — STUDENT]

[THREAT ASSESSMENT: EXTERNAL — HIGH SEVERITY]

I was mid-rep on the bench press when the notification flashed. The barbell wobbled. I racked it quickly and sat up, ignoring the curious glance from a nearby gym member.

Martha Reyes. The system provided a face—young, Latina, sharp eyes behind thick glasses. College student at NYU. Computer science major.

What did you do, Martha?

The investigation took four hours. I worked from a coffee shop near campus, laptop open, running searches through every database Webb's credentials could access.

Martha Reyes was a hacktivist. Small-time stuff mostly—defacing corporate websites, leaking embarrassing emails from politicians she didn't like. Digital graffiti from someone with more skill than wisdom.

But three weeks ago, she'd gotten ambitious. Stumbled onto a financial server she shouldn't have been able to access. Downloaded records she shouldn't have seen.

Human trafficking. A network moving people through the Port of Newark. Shell companies, wire transfers, shipping manifests. Martha had pulled the thread and found a monster.

And now the monster knows someone's looking.

[THREAT ASSESSMENT UPDATE]

[HOSTILES: ORGANIZED CRIMINAL NETWORK]

[ESTIMATED RESOURCES: SIGNIFICANT]

[INTERVENTION WINDOW: 96 HOURS]

Four days. The traffickers were hunting her. They had resources—money, connections, probably muscle. Martha didn't know she'd been identified yet. She was still going to class, still posting on forums, still thinking she was anonymous.

Can't protect her directly. Can't fight a trafficking network. But maybe I don't have to.

I opened a new browser window and started planning.

[BACKDOOR ACCESS: ACTIVE]

[TARGET: PERSONAL LAPTOP — MARTHA REYES]

[SECURITY: MINIMAL — PROCEEDING...]

The connection established at 2:47 AM. Martha was asleep—her laptop sat open on a desk in her dorm room, connected to the campus wifi. Child's play to access.

Her files spread across my screen like a map of her investigation. She'd been thorough. Financial records, shipping schedules, names and dates and amounts. Enough evidence to bring down the entire network if it reached the right hands.

That's the solution. Make the information public. Remove any reason to silence her.

I copied everything to a secure drive. Then I started composing anonymous tips.

FBI Cyber Division. Homeland Security human trafficking task force. Three investigative journalists known for breaking organized crime stories. I packaged the evidence differently for each—law enforcement got the full data dump, journalists got curated highlights with enough details to verify independently.

By 4 AM, the emails were queued. By 4:15, they were sent.

Now we wait.

I was about to disconnect from Martha's laptop when something caught my attention.

A file I hadn't opened. A log file, tucked in a system folder where it shouldn't exist. I clicked it.

Code scrolled across my screen. Elegant, efficient, almost beautiful in its construction. Someone else had accessed Martha's system. Someone who knew what they were doing.

The timestamp was three days old. Before the traffickers identified her. Before any of this started.

Someone else was watching her.

I captured the code signature and ran it through every analysis tool Webb's software library contained. No matches. No identifying markers. Just clean, professional work from someone who didn't want to be found.

[ANALYSIS: UNKNOWN DIGITAL SIGNATURE DETECTED]

[ORIGIN: UNDETERMINED]

[THREAT LEVEL: UNKNOWN]

The discovery sat in my chest like a cold stone. Martha had two watchers. The traffickers were one. But who was the other? And why were they interested in a college student hacktivist?

Questions for later. Finish the mission first.

The FBI moved faster than I'd expected.

Forty-eight hours after my anonymous tips, the Port of Newark operation was raided. Seventeen arrests. Forty-three victims recovered. The story broke across every news channel in the country.

Martha Reyes's name never appeared. Her evidence was attributed to "an anonymous source within the criminal organization"—close enough to the truth to be plausible.

[NUMBER RESOLVED]

[RESOLUTION: INFORMATION WARFARE]

[XP GAINED: +200]

[SYSTEM LEVEL 5 → 6]

[TP: 32 → 35]

I watched the news coverage from my motel room, eating cold pizza and nursing a beer. Forty-three people freed. A trafficking network dismantled. All because a college student got curious and I knew how to weaponize information.

This is what I'm good at. Not fighting. Not surveillance. Information.

But the unknown signature nagged at me. Someone else was out there, watching the same targets I was watching. Someone sophisticated enough to leave no trace except that elegant code.

I saved the signature to an encrypted drive and filed it away. A mystery for another day.

The TV droned on—talking heads discussing the raid, politicians taking credit, victims' faces blurred for privacy. I fell asleep somewhere around midnight, dreaming of code and cargo ships and eyes watching from the dark.

Who else is playing this game?

Want more? The story continues on Patreon!

If you can't wait for the weekly release, you can grab +10, +15, or +20 chapters ahead of time on my Patreon page. Your support helps me keep this System running!

Read ahead here: [ patreon.com/system_enjoyer ]

More Chapters