The administrative office was silent.
Too silent.
Not the kind of silence associated with an office where everyone worked daily.
Not dust.
Not movements.
But a peculiar kind of silence.
As if the room was holding its breath.
---
Adeiza faced the terminal with focused eyes.
Log reports were filling the screen.
A useless mess to others.
Not to him.
---
"... Slightly sloppy," Adeiza muttered.
Yet, no.
It didn't look sloppy.
No.
It was careful.
Measured.
Very meticulous.
Though the intruder managed to delete some tracks, others were clearly visible.
Most.
---
His fingers started moving slowly across the keyboard.
No.
He wasn't hacking into the system yet.
First, he observed.
Corrupted data pieces.
Misplaced packets.
Response delays.
---
There.
A glitch.
Too small for any diagnostic tool.
Except for him.
---
He isolated it.
Expanding it until he managed to trace its pathway.
---
"…A probe," he said quietly.
Lightweight.
Non-invasive.
Used for mapping purposes.
---
His expression darkened slightly.
"… Not a student."
This wasn't a test.
It was a threat.
---
He studied the probe's design for a while.
Familiar, yet somewhat different.
It was based on his earlier designs, but adapted and improved significantly.
---
Adeiza leaned back slightly, studying the probe intently.
"... You learned from my work," he mused.
More precisely…
From his old work.
Scrapped projects and programs he left behind.
From his former self.
---
Which meant that—
"This isn't one of those Covenant members," Adeiza realized.
Not yet.
---
"A fledgling," he concluded.
Someone building himself from his former dominance.
Someone who would, sooner or later—
Become his equal.
---
Adeiza reached his hands over the keyboard.
The intrusion process started.
Not as simple as hacking into the system, which he could do effortlessly.
This time—
He created an illusion.
---
Lines of code started filling the screen rapidly.
However, he didn't eliminate the probe.
Didn't interfere with it.
No.
Instead, he altered its environment.
---
Creating a false system.
A mirage.
A perfectly controlled illusion.
---
> [Network Expansion Module Activated]
---
The system responded obediently, altering itself.
Pathways shifting.
Access permissions re-writing themselves automatically.
---
For the hacker—
Nothing much happened.
The system still looked damaged and vulnerable.
Still open.
---
In reality—
They just walked into his trap.
---
He inserted a tracer.
Aggressive enough.
Not too obvious.
It would connect to their system quietly.
Patiently.
---
"…Let's see where you go," he mused quietly.
---
He executed the final line of his program.
---
> [Phantom Thread Deployed]
---
The probe continued its job, completely oblivious to it.
However, its actions were being monitored now.
---
He closed the terminal window.
From the outside, the error remained unfixed.
Undisturbed.
---
Getting up, Adeiza adjusted his uniform slightly.
His expression was calm, unremarkable.
---
Just like nothing had happened.
---
Except, the hunt has begun.
---
The rest of the school day went as usual.
Classes were on, and he took part actively.
---
Yet, while others spoke—
Or pretended to speak—
He was elsewhere.
---
While others paid attention—
Or pretended to pay attention—
He was tracking the Phantom Thread.
---
It moved carefully, making jumps between the nodes, testing limits, learning…
"…Not bad," Adeiza noted.
It was disciplined, not reckless or greedy.
Yet—
Inexperienced, as well.
---
Its actions resulted in minute distortions.
Each step was showing his intentions.
---
He followed carefully, watching silently.
Effortlessly.
---
By the time the bell finally rang—
He collected all the necessary data.
---
An IP cluster.
Well-obfuscated, routed through multiple levels.
Yet…
Not enough.
---
"… Found you," Adeiza concluded.
---
Returning home by SUV, he spent the journey thinking.
Lagos was always the same.
Its chaos filled the streets.
Car battles, street vendors, pedestrians.
The constant pulse of the city—
Unpredictable.
Relentless.
---
Inside the SUV—
He pulled up his laptop again.
---
> [New Task Available]
[Task 3: First Digital Confrontation]
[Description: Engage and dominate a hostile or unknown cyber entity.]
[Reward: Advanced Intrusion Toolkit + 300 System Points]
---
Brief pause.
Then—
He noticed a slight change in his expression.
---
"Dominate," he repeated quietly.
---
With deft fingers, he pulled up the path, re-constructing the target environment.
Personal node.
Not company nor institution.
---
"... Home node," Adeiza concluded.
---
Tiny, limited, but well-maintained.
Not belonging to a rich person.
No advanced equipment.
Yet, compensating for it with precision and adaptation.
---
Entering the system, he made no alarms trigger, didn't face any resistance.
Moving further into it.
---
Opening directories.
Looking through the logs.
Reading hand-made scripts.
Hand-written, improvised…
---
Carefully studying them, he did no dismissive gestures.
Not even underestimating.
---
"… Learning quickly," he observed.
Then he chose to make his presence known.
---
A message popped up on the target computer.
Clean.
Untraceable.
---
> Who taught you to use my code?
---
Silence.
For three seconds.
For five.
Then ten.
---
"... Who are you?" finally popped up.
---
Adeiza watched steadily.
---
> Answer me.
---
Pause.
A bit longer.
---
"... I didn't steal your code. I found its fragments online. On forums. Old dumps.
Incomplete, so I reconstructed them."
---
Truthful.
Or, at least, consistent.
---
He leaned back slightly.
---
"… Interesting."
---
> Name.
---
Pause.
Then—
---
> … GhostKey
---
Clearly, a recently-chosen name.
Uncouth, but deliberate.
---
He leaned back slightly, studying the information.
---
> You're inefficient. Your structure leaks patterns. Your masking is shallow.
---
Short pause.
Then—
---
> …Then why didn't you just block me?
---
Expression changing slightly.
---
> Because I was curious whether you were worth noticing.
---
Long pause.
---
The system on the other end—
Hesitated.
---
Then—
---
> …And?
---
Adeiza's gaze sharpened.
---
> Barely.
---
A quick, sharp reply came back.
---
> Then leave.
---
Directly, almost defensively.
---
He remained immobile.
---
> You accessed my node. Used my fragments.
Therefore, you're mine now.
---
He waited patiently for the message to sink in.
---
On the other end—
Typing was interrupted for a moment.
---
Then—
A sudden wave of activity followed.
---
GhostKey was trying to disconnect.
---
Too late.
---
> [Containment Protocol Engaged]
---
The system frozen.
Not crashed, not destroyed.
Just—
Contained.
---
His expressionlessly, cold voice translated in messages.
---
> Relax. Had I wished to destroy you, you wouldn't be typing anymore.
---
Silence.
Heavy, uncomfortable.
---
On the other end—
They typed slowly.
---
> …What do you want?
---
Watching the system carefully, he measured response time, stress patterns.
Decision-making.
---
"... Potential," he noted.
---
> You're going to work for me.
---
Quick reply—
---
> No.
---
He waited calmly.
---
> You don't have a choice.
---
Pause.
Then—
---
> Everyone has choices.
---
For the first time—
Almost invisibly, yet noticeably—
Corner of his mouth curved.
---
"... Good."
Resistance, not blind obedience.
Good, indeed.
---
> Then choose wisely.
Work with me… or be dismantled.
---
Heavy silence.
---
On the other end—
He could feel the tension growing.
They understood.
Understood the gap between them.
---
Seconds passed.
Then—
---
> …What do I get?
---
Adeiza's gaze sharpened.
---
> Access, knowledge, growth.
Everything you are trying to steal… properly.
---
Pause.
---
Then—
---
> …Fine.
---
Without pride or drama.
Simply—
Decision.
---
> Good.
---
Releasing the system, he allowed it to function.
---
> [Target Released]
---
Restabilizing, it became his new subnode.
Not forcefully.
However, now…
Connected to him.
---
> [Subordinate Node Established: GhostKey]
---
The System interface flickered.
---
> [Task Completed]
[Reward Issued]
---
Masses of new data filled the interface.
New tools.
Sharper skills.
More effective reach.
---
Turning off the laptop, Adeiza got up.
---
Outside, his car drove into the Adebayo estate.
---
Inside—
He noticed a difference.
This time, he wasn't alone.
Not because he needed allies.
Just—
Because he would start building them.
Controlling them.
Shaping them.
And, when the time comes—
Using them.
---
Step outside, Adeiza adjusted his uniform.
---
"The board is set," he murmured.
---
In some remote location—
Behind a modest screen in some modest room—
GhostKey stared at the computer, motionless, thinking furiously.
---
They didn't know whom they talked to today.
---
They just knew that—
Starting today—
Nothing will be the same.
---
And somewhere above, beyond reach—
Unseen, unbeaten—
Adeiza started spinning his web.
