JAN 23 – FRI, JAN 31, 2026
He sold the data in four separate transactions over eight days. The buyers were a competitor firm, a regulatory investigator working privately, a journalist whose connection to the dark web market surprised him mildly and then didn't, and an organization he didn't fully identify whose interest in Fisk's financial subsidiary operations he had theories about and was not going to pursue.
Each transaction was clean. The encrypted files traveled through the market's own anonymizing architecture and arrived where they were going without passing through anything traceable to him.
Total take: Eight hundred and seventy thousand dollars real currency, with a market premium on top that he'd come to understand was awarded for high-value data operations as opposed to physical asset theft. The dark web market's own mechanics he was mapping slowly, the way you mapped anything whose rules weren't written down: by observation, repetition, and inference.
He was doing the accounting with the operational notebook open on the desk, the real-world cash figures updated, the VC balance checked against the shop's current tier requirements, when he hit the name.
He'd kept copies of the data for his own reading, because information was worth understanding before you sold it, and because the habit of knowing what you were handling was too important to skip.
He'd read through the ledgers over three evenings, with the encrypted drive open on his laptop in the warehouse office, taking notes in his shorthand on the things that were relevant and crossing out the things that weren't. Most of it was financial — subsidiary account flows, real estate transactions, fee arrangements that were opaque in the specific way that arrangements intended to be opaque were opaque.
Then, in a footnote to a transfer authorization from two years ago, a name: Pinnacle Capital Management had facilitated a property acquisition in the name of a blind trust whose beneficial owner, per the footnote's internal notation, was identified by a code designation that appeared elsewhere in the ledger tied to a real estate holding company.
He followed the thread. It took forty minutes, working backward through the notation system that the subsidiary had used consistently across three years of records. At the end of the thread was a name attached to a building in Hell's Kitchen that the subsidiary had acquired, renovated, and was currently leasing at rates that bore no relationship to market value, which was itself a kind of information.
Wilson Fisk's name was not in the ledgers. His shadow was, cast through the subsidiary's transactions in the specific way that powerful people arranged their affairs: not present, but evident from the shape of everything around the absence.
Dan sat in the warehouse office for twenty minutes after he'd followed the thread to its end. The screen was still open. The notation was still there. He closed the drive and removed it from the laptop and put it in the strongbox and sat with the information in his head, which was the only place it was now, and thought about what it meant.
It meant that the data he'd stolen contained, among other things, a partial record of Wilson Fisk's real estate activity in Hell's Kitchen. It meant that at least one of his four buyers had probably known this and had bid accordingly. It meant that the price he'd gotten was partly the price of this particular information rather than the aggregate data value. And it meant that Fisk's organization — not the subsidiary, the actual organization — had a reason to be interested in the breach that went beyond embarrassing financials.
He had sold it anyway. He'd made the decision before he'd found the name, and even knowing what he knew now, the calculation didn't change — the separation between the subsidiary and the parent organization was real, the subsidiary's internal incident response would absorb the first weeks of scrutiny, and by the time anything rose to Fisk's level it would be a data theft of unclear origin and motivation among dozens of such thefts the organization fielded in a given year.
He was not the only person stealing from entities adjacent to Fisk. He was merely the most recently successful one.
But he updated his threat model. He opened the operational notebook to the page he'd labeled THREAT LANDSCAPE and added a notation: Fisk awareness — indirect, low probability, medium consequence. Monitor. Maintain distance. No additional Fisk-adjacent targets for six months minimum.
He also bought a second encrypted communication device through the Panel and gave it to Marco on Thursday with instructions that were brief and clear: this was the channel for operational communication from now on, and the old channel was retired. Marco looked at the device and put it in his pocket and said "Okay," which was Marco's version of full comprehension and no further questions.
He told no one else about the name he'd found. Sasha didn't need to know. The threat assessment was his to carry because he was the one who had made the decision to take the job. The consequences of decisions sat with the person who made them. That was the rule, and it was a rule he applied to himself with the same consistency he applied everything else.
He went home from the warehouse on Friday evening and found a note under his door — actual paper, written in Yara's handwriting, which he recognized from the lab notes she sometimes showed him when they overlapped in the library. The note said: Study group Sunday, my place, cellular bioenergetics. You're invited if you want. No obligation. — Y
He held the note for a moment. Outside his window, January was doing what January did, which was make the city look colder than it felt and feel colder than any number could quantify.
He wrote back — actual paper, slid under her door, which was four doors down the hall, a proximity he'd accepted as an acceptable risk when he'd found the room: Sunday works. What time?
She replied in ten minutes: 2PM. Bring something to eat.
He went on Sunday with a bag of pastries from the bakery on Broadway and spent four hours working through cellular bioenergetics with four other students whose names he learned and filed and who were, without exception, people with real lives and real concerns that had nothing to do with the ledger he'd sold and the name he'd found in it and the threat model he'd updated on Friday.
It was four hours of being just a person in a room with other people, and it was, he found, exactly what the week had required and which he had not known until he was in the middle of it.
He walked home at seven with the cold on his face and the Panel quiet at the edge of his vision and thought that the line between his two lives was holding, and that he needed it to keep holding, and that the effort of keeping it was not the same as it being easy.
