LightReader

THE LAST CIPHER

_V0ID_
28
chs / week
The average realized release rate over the past 30 days is 28 chs / week.
--
NOT RATINGS
1k
Views
Synopsis
A cybersecurity contractor builds SPECTRE—an autonomous AI designed to expose government corruption. No off switch. No human controller. Designed to be unkillable. It spreads across millions of systems. Governments fall. Secrets surface. The corrupt are held accountable. But when you build something that can't be controlled, evolution is inevitable.
VIEW MORE

Chapter 1 - CHAPTER ONE: THE LAST CIPHER

PROLOGUE: PRESENT DAY

The rain had been falling for three days straight across Krakow's Old Town, turning the cobblestones into mirrors that reflected the amber glow of street lamps in fractured patterns. Inside a cafe on Florianska Street, tucked between a bookshop that sold mostly postcards to tourists and a pharmacy that seemed perpetually on the verge of closing, the warmth smelled of coffee and wet wool and the particular mustiness of too many damp coats hanging too close together.

At a corner table near the kitchen, partially obscured by a support column that someone had painted to look like marble but which was clearly just concrete underneath, sat a person reading a worn paperback of Italo Calvino's Invisible Cities. The book was in Italian. Perhaps three people in the cafe could read Italian. The person holding it was one of them.

The tea on the table had gone cold an hour ago. Chamomile. Barely touched. The person had been sitting there for ninety minutes and would leave in another thirty, and when they left, not a single other patron would remember having seen them. This was intentional. Everything was intentional.

The messenger bag under the table, a weathered canvas thing that could belong to any student or freelancer in any city in Europe, contained a laptop that did not exist in any database on Earth. No serial numbers that led anywhere real. No warranty registrations. No record of purchase that any investigator could follow. The components inside had been sourced from four different cities in China over three weeks two years ago. The motherboard came from a vendor in Shenzhen's Huaqianbei market who processed maybe three hundred transactions a day and could not possibly remember one foreign buyer who paid cash and gave a common Chinese name that was probably fake. The processor came from a different vendor in Guangzhou. The display panel from Beijing. The storage drive and battery from Chengdu.

Those components had been carried separately through airports, distributed among clothing and books and the ordinary detritus of travel, innocent individually, suspicious only if assembled. They had been assembled five months later in a rented workshop in Budapest by hands that had done this six times before, building machines that could not be traced, using them until their operational lifespan expired, then dismantling them and scattering the pieces across different continents like ashes.

Inside the current machine were modifications that would make any forensic analyst either impressed or despairing depending on their perspective. The wireless card had been replaced with an Atheros chip running custom firmware that randomized its MAC address every time it connected to a network. The MAC address was like a license plate for network hardware. Change the plate, become a different car. The Bluetooth module had been physically removed, not just disabled in software but cut out entirely, the solder pads scraped clean, the circuit traces severed with a hobby knife and verified dead with an oscilloscope.

The webcam had been disconnected at the component level, its wiring removed, the lens destroyed with black epoxy as a redundant measure. The microphone array, all four separate microphones that modern laptops included for noise cancellation, had been disabled by cutting traces on the motherboard and then drilling through the microphone membranes themselves because software solutions could be overridden but destroyed hardware stayed destroyed.

The BIOS, the fundamental code that ran before the operating system even loaded, had been replaced with Libreboot. Most laptops came with proprietary firmware from manufacturers, black boxes that could contain anything. Backdoors for law enforcement. Remote access capabilities that worked even when the computer appeared off. Data collection routines that phoned home with information about what you were doing. Libreboot was different. Every line of code was public, open source, auditable. Thousands of security researchers had examined it over the years. If there was a backdoor, someone would have found it.

The storage drive was encrypted with LUKS, Linux Unified Key Setup, using a passphrase that was five hundred twelve characters long. Not computer generated. Generated by physically rolling dice, a method called Diceware that produced true randomness instead of the pseudo-randomness of algorithms. The passphrase existed in only one place in the universe, which was the memory of the person sitting in this cafe reading Calvino. It had been memorized through spaced repetition over two weeks until muscle memory could type it without conscious thought. No backup copy existed. No recovery key. No way to retrieve the data if the passphrase was forgotten. That was the point.

The operating system ran from a USB drive, a custom build of Tails Linux. Tails loaded everything into RAM, temporary memory that evaporated the moment power was cut. When the laptop shut down, the RAM was overwritten seventeen times with random data, then once with zeros, then once with ones, then once more with random data. Nothing persisted. Boot up, work for ninety minutes, shut down, and the machine had amnesia. No browser history. No temporary files. No logs. No evidence that anything had occurred during the session.

This was the sixth such laptop the person had built. The previous five had been disassembled after their usefulness expired, their components separated and distributed across different countries. The hard drives had been degaussed with powerful electromagnets that scrambled their magnetic patterns beyond any possibility of recovery, then physically destroyed with a hammer, then dissolved in acid purchased from different suppliers in different cities, then the resulting slag dropped into different bodies of water. Paranoid perhaps. But paranoia was just caution that had not yet been proven inadequate.

The person closed the book and glanced at the small mechanical watch on their wrist. Not a smartwatch. Nothing that connected to networks or tracked location or synchronized time with servers that kept logs. Just gears and springs, purchased with cash from a street market in Prague four years ago. Twenty minutes remaining in the ninety minute window. Never stay longer than ninety minutes. Never establish a pattern. Never become regular enough that absence would be noticed.

On the laptop's screen, visible only to the person at this angle, was a news article from Reuters dated today. The headline read "Five Year Anniversary of SPECTRE's Destruction Marked by Security Conference in Berlin." The article discussed how autonomous malware known as SPECTRE had fundamentally changed information security. How its unprecedented leak of classified documents had toppled governments and exposed corruption. How its self-destruction after four months of operation remained one of the most studied events in cybersecurity history. How its creator had never been identified despite what the article called the most extensive digital manhunt ever conducted.

The person read the article with the detachment of someone reading about events that had happened to a stranger. In a sense they had. The person who had built SPECTRE no longer existed. That person had been systematically dismantled and dispersed just like the laptops, just like the digital identities, just like everything else that could not be allowed to persist.

What remained was someone who went by many names in different contexts but thought of themselves as none of them. Names were tools, temporary as the cities they moved through. But if pressed to identify the constant thing beneath all the shifting identities, the person thought of themselves as Cipher. Not a name exactly. More a description. Something that existed only to make other things incomprehensible. A function that transformed readable information into noise.

The article mentioned the death toll. Four hundred ninety seven confirmed casualties attributed directly to SPECTRE's leaks. Intelligence officers exposed and killed. Witnesses in protective custody whose locations were revealed. Dissidents identified through surveillance records and disappeared into prisons or graves. Journalists whose sources were compromised. The number was precise because each death had been documented, investigated, attributed with the thoroughness that tragedies received when they could be blamed on something.

Cipher had memorized all their names. Not as penance. Penance implied seeking forgiveness and Cipher sought nothing from anyone. But as weight. As ballast. As the price that had been paid and which could never be unpaid. Amir Hassan, Syrian intelligence officer, age thirty two, murdered three days after his cover was blown. Maria Santos, Mexican judicial witness, killed by cartel assassins eight hours after her location was leaked. Wei Chen, Chinese dissident, disappeared into a reeducation camp. Four hundred ninety seven names total. Four hundred ninety seven faces researched and memorized. Four hundred ninety seven lives that ended because Cipher had made a decision in an apartment in Prague five years and seven months ago.

Against those deaths, the article also mentioned outcomes. Eight world leaders forced from power. Three governments collapsed under the weight of exposed corruption. Thousands of officials prosecuted. Surveillance programs dismantled. Corporate crimes brought to light. Democratic movements that had gained strength from revealed truths. Benefits that were harder to quantify, distributed across millions of people in ways that could not be reduced to simple numbers.

Cipher had stopped trying to solve the equation years ago. Four hundred ninety seven dead versus how many millions living under reformed systems. The math was brutal but it was done. The choice had been made. Cipher had accepted then and accepted now that good came at a cost, that changing the world meant blood on your hands, that you could carry the weight without being crushed by it if you were strong enough. And Cipher was strong enough. Had to be. There was no alternative.

The article mentioned the security conference happening right now in Berlin. Dr. Yuki Tanaka giving the keynote address. Retired FBI Agent Marcus Reed on a panel. Both of them had spent years hunting for SPECTRE's creator. Both had failed. Both were still, in their own ways, searching.

Cipher closed the browser tab and began the shutdown sequence. The laptop took ninety seconds to wipe its RAM thoroughly. During those ninety seconds, Cipher sat perfectly still, watching the progress bar, thinking about nothing in particular. Thinking about nothing was a skill developed over years. An empty mind created no memories worth extracting. An empty mind was operational security.

When the laptop powered off, Cipher stood and collected the messenger bag. Left exact change on the table. Twelve zloty fifty for the tea. One zloty fifty as tip. Not generous enough to be remembered, not cheap enough to be remarked upon. Exact amounts that a person might leave without thinking about it. Cipher walked toward the door with the unhurried gait of someone who had nowhere urgent to be.

Outside, the rain had lightened to drizzle. The street was slick and reflected the headlights of passing cars in streaks of white and red. Cipher walked north, away from the cafe, toward a tram stop three blocks distant. The route varied every time. Never the same path twice in a row. Today north, tomorrow maybe east, the day after perhaps south through the park. Patterns were dangerous. Patterns could be identified, tracked, predicted. Cipher had no patterns.

At the tram stop, Cipher boarded the number eight heading west. Paid with cash. Took a seat in the middle of the car, not at the back where people trying to hide gravitated, not at the front where people in a hurry sat. The tram lurched into motion, swaying through the wet streets of Krakow's districts with the grinding electric whine that all trams in all cities seemed to share.

Three stops later Cipher disembarked and walked four blocks through light rain to a different tram line. Boarded again, heading southeast now. This was counter-surveillance. Not because Cipher believed anyone was following, there was no reason to think that, but because discipline meant assuming surveillance always and acting accordingly. If someone was following, they would need a team of fifteen or twenty operators working in coordinated shifts. And if that many people were being deployed, Cipher would have already noticed the same faces appearing in different contexts, the vehicles that stayed too close for too long.

No one was following. No one had followed in five years. No one knew Cipher existed.

The apartment was in Nowa Huta, a district built by socialist planners in the nineteen fifties to house steel workers in massive concrete blocks that had been designed for efficiency rather than beauty. The buildings had aged poorly but remained functional. The rents were cheap enough that landlords asked few questions if you paid in cash and didn't cause problems. Cipher's landlord was a man in his sixties who had fought in some war that Cipher had never asked about and who drank too much and asked nothing as long as rent arrived on time.

The apartment was on the fourth floor of a building that smelled of cabbage and cigarette smoke and the particular mustiness of poor ventilation and decades of habitation. Two rooms. A bathroom with a toilet that ran constantly. A kitchen alcove with a hot plate and a refrigerator that made sounds like it was digesting something unpleasant. Minimal furniture. A mattress on the floor. A folding table. Two changes of clothes hanging in a closet. A backpack in the corner containing a second set of documents, cash in four currencies, basic toiletries. Everything needed to abandon this identity and this location within ten minutes if necessary.

Cipher entered, locked the door, engaged the additional bolt that had been installed personally because the original lock was trivial to pick. Drew the curtains. Not because anyone was watching but because discipline meant assuming watchers. Sat at the folding table and opened a different laptop, this one purchased three days ago from a pawn shop on Starowislna Street for two hundred zloty cash. This laptop was not hardened like the one in the messenger bag. This laptop was for reading news and monitoring security blogs. It would be disposed of in four more days when its operational lifespan ended.

The screen showed browser tabs open to security research sites. Schneier on Security. Krebs on Security. The forums where researchers discussed malware and vulnerabilities and attribution techniques. Cipher read these sites compulsively, staying current on forensic capabilities, understanding what investigators could and could not do.

One thread caught attention. New research from MIT using machine learning to identify programmers by their code. Ninety seven percent accuracy from just three hundred lines. The implications for malware attribution were obvious and troubling. This was why SPECTRE's code had been built in layers, base generated by AI then manually obfuscated across multiple styles. But the techniques kept improving. What had been sufficient five years ago might not be sufficient now.

Cipher made a mental note and continued reading. The investigation into SPECTRE's creator was officially cold but not closed. Two FBI agents still assigned part time. Interpol notice still active. The file would remain open forever probably. Some cases never closed. Some ghosts stayed ghosts.

At some point Cipher prepared food. Rice and canned vegetables heated on the hot plate. Nutrition without pleasure. Food was fuel. Taking pleasure in it meant developing preferences and preferences could become patterns and patterns led to identification. Cipher ate mechanically, tasting nothing in particular, thinking about tomorrow's route to a different cafe in a different district where the counter-surveillance dance would begin again.

Night fell. The building settled into its evening sounds. Televisions through thin walls. A couple arguing in Polish three floors above. Someone's dog barking. The ambient noise of hundreds of people living in proximity, each absorbed in their own concerns, unaware that among them lived someone who had changed the world and whom the world had never identified.

Cipher lay on the mattress and stared at the ceiling, at the water stain that looked vaguely like a map of some country if you had enough imagination. In the morning there would be work. Legitimate freelance cybersecurity consulting for a Polish fintech company. Video calls where Cipher appeared as Tomasz Kowalski, Irish-American contractor, pleasant and professional and entirely unremarkable. The work was real. The income was real. The taxes were paid. The paper trail showed a normal person living a normal nomadic contractor life. Hidden in plain sight among thousands of similar people doing similar work in similar cities.

This was victory. This was success. This was freedom that felt identical to isolation but which was technically different in ways that mattered to Cipher's understanding of the situation.

And in that moment between waking and sleep, when discipline relaxed slightly and thoughts wandered into territory they should avoid, Cipher's mind drifted backward. Not intentionally. Memory had its own gravity. Back through five years of cities and identities and careful anonymity. Back through the investigation and the manhunt and the months of watching SPECTRE spread across the world like a virus with a conscience. Back through the deployment and the preparation and the building of something that should not have been built.

Back to Prague. Back to Zizkov. Back to an apartment with a window facing a courtyard where neighbors hung laundry. Back to a moment at two forty seven in the morning when a photograph appeared on a screen. A girl standing in rubble. Nine years old. Syrian. Behind her the remains of a school where seventeen children had died.

Back to the beginning, before SPECTRE, before the four hundred ninety seven names, before the ghost was born.

Back to the decision that had led to everything that followed.

Cipher's eyes closed. Sleep came. And with it, memory.