Night wore on, but Adeiza remained still.
Physically, at least.
---
His room remained dark, with the only source of light the faint luminescence of his laptop's screen. Time seemed to have stopped as if aware of the necessity of the operation he was about to undertake.
Three active layers on his screen—
Adebayo Holdings (Compromised Relay)
Enemy Outer Node (Feeder Group)
GhostKey (Subordinate Node)
---
Three points.
One system.
---
And Adeiza—
Sitting at its center.
---
"…Commence," he said quietly.
---
The GhostKey node flashed.
Activity increased.
---
> [GhostKey: Active Infiltration]
---
Adeiza didn't interfere.
Neither did he guide or help.
---
He observed.
---
The subordinate node approached the outer layer methodically.
Neither rushing nor over-aggressive.
---
"…Good approach," Adeiza thought.
---
They blended in.
Passed through security.
Skipped the firewall.
---
Self-taught and resourceful,
Yet not perfect.
---
Small delays here.
Marginally consistent encryption handshake there.
---
Tiny mistakes—
Enough for anyone less experienced to—
"…You are detected," Adeiza thought aloud.
---
He didn't warn.
They were testing their ability to adapt.
Their survival.
---
Time passed.
---
The GhostKey node infiltrated successfully.
> [Access: Limited]
---
Inside—
The actions were slow.
Methodical.
---
Observing.
Identifying.
---
Like they'd been instructed.
---
Adeiza watched intently, every action and decision carefully monitored.
---
Then—
There it was.
---
Detection spike.
---
Not instantaneous.
Not clear.
---
But there nonetheless.
---
The feeder group's system reacted.
An instant scan.
Pattern recognition sweep.
---
GhostKey was caught off guard.
Froze for a second.
---
"…You noticed it," Adeiza mused.
---
Good.
Instead of retreating—
GhostKey changed tactics.
---
Activity ceased momentarily.
They masked themselves.
---
Avoidance—
Not flight.
---
"…Better than I expected."
---
The scan was unsuccessful.
GhostKey remained undetected.
---
At least for now.
---
Adeiza leaned back.
"…Continue."
---
Time passed as GhostKey collected more information.
Fragment by fragment.
Log files.
Access points.
System internal structure.
---
They weren't greedy or overly aggressive.
---
Then—
---
They made a mistake.
---
A small one.
But a fatal one.
---
Accessed one subdirectory deeper than necessary—
> [Alert: Anomaly Detection Initiated]
---
The feeder system reacted immediately.
---
Containment protocols activated.
Locked all traffic in and out.
---
GhostKey attempted to withdraw from the system.
Too late.
---
> [GhostKey Node: At Risk]
---
Adeiza's posture didn't change.
"…Now we see."
---
Their system reacted quickly.
Fast scripts run.
Attempted forced extraction from the system.
Masking mechanisms failing under the strain.
---
Panic.
---
Controlled.
---
But unmistakable.
---
Adeiza watched them for three seconds.
Five.
Seven.
---
Then—
He intervened.
---
> [Override: Apex Null Intervention]
---
His code entered the system.
Crisp, neat, unerring.
Not attacking the feeder system—
Reprogramming it.
---
False positives.
Phantom signals.
Turning GhostKey's signature to just another part of the noise in their systems.
---
The containment protocols changed—
---
Shifting focus—
> [GhostKey: Extraction Successful]
---
Silence prevailed once again.
Adeiza withdrew immediately.
No trace left behind.
No footprint.
---
Back on his computer—
He closed the connection window.
---
Seconds later a new one popped up—
> GhostKey: …You said I wouldn't get caught.
---
He responded immediately—
> Apex Null: You didn't.
---
A few seconds of silence.
---
> GhostKey: That wasn't getting out of there.
---
> Apex Null: No. That wasn't.
---
A longer silence.
---
> GhostKey: …So you've been watching the entire time.
---
> Apex Null: Indeed.
---
Another short pause.
---
> GhostKey: So that was a test, then.
---
Adeiza's fingers paused above the keyboard.
---
> Apex Null: Always.
---
No denial.
No explanations.
---
Just facts.
---
GhostKey replied hesitantly.
---
> GhostKey: I went too deep into the system.
---
> Apex Null: Yes.
---
> GhostKey: I thought I could handle it.
---
> Apex Null: You couldn't.
---
Pause.
---
> GhostKey: …Understood.
---
Adeiza terminated the conversation.
---
"Accepts responsibility without excuses," he mused.
---
They would make themselves useful.
---
Returning to the feeder group—
Now—
It's working.
More alert.
More wary.
---
"…Good."
---
Creating tension.
Causing adaptation.
And thus—
Creating patterns.
Which could—
Be exploited.
---
Adeiza reconnected to Adebayo Holdings' relay system.
Still providing false data.
Still trusted.
---
But—
He modified it.
> [Data Stream Modification Initiated]
---
The false information was altered ever so slightly.
Changing some financial projections.
Redefining internal priorities.
Redirecting operational focus.
---
Not enough to cause suspicion.
---
But enough—
To affect their decision-making process.
---
"…Follow my instructions."
---
They would use this data to plan.
Commit resources.
Make plans based on the provided information.
---
And when they did—
"They'll make themselves known," he thought.
Adeiza leaned back in his chair.
"Control," he said softly.
---
Not force.
Not destruction.
---
Manipulation.
---
Guiding the enemy—
Making them walk down precisely the path he wanted them to.
---
A system update notification appeared on his screen.
---
> [System Update]
[Network Stability: 91%]
[Subordinate Efficiency: Increased]
---
He glanced at it momentarily.
---
"…Progress."
---
His room was still and silent.
Outside of it—
The rest of the house remained still.
His family, sleeping and unaware of—
Protected by him.
---
At least for the time being.
---
Adeiza closed his eyes briefly.
---
Before, in his previous life—
He had reacted to threats.
Destroyed those who dared oppose him after the fact.
---
This time—
"I strike preemptively," he thought.
---
Eyes wide open once more.
Focused.
Sharp.
---
Frosty.
---
Staring intently at his screen—
---
The board grew.
New nodes appeared.
Potential threats developing.
Opportunities arising.
---
At the center—
Adeiza Adebayo.
Not a participant.
Not a target.
---
But an observer.
A manipulator—
Controlling everything from the very beginning.
