Adeiza didn't open the network immediately.
For once—
his attention wasn't on the system.
---
It was on the real world.
---
Adebayo Holdings.
---
The company had always been strong.
Stable.
Profitable.
---
But in his past life—
he remembered the cracks.
Small at first.
Ignored.
---
Then exploited.
---
"…Not this time."
---
He opened his laptop.
Not the node map.
Not the distributed core.
---
A different entry point.
---
Internal financial access.
---
He didn't breach it.
Didn't force entry.
---
He already had access—
through legitimate internal channels tied to his family.
---
What he needed wasn't entry.
---
It was visibility.
---
He navigated through the system quietly.
Expense sheets.
Department allocations.
Vendor payments.
---
At first glance—
everything looked normal.
---
But Adeiza didn't look for anomalies.
---
He looked for patterns.
---
"…There."
---
A minor inconsistency.
Repeated across multiple reports.
---
Not large enough to trigger alerts.
Not obvious enough to question.
---
But consistent.
---
Vendor payments routed through layered intermediaries.
Small percentage increases.
Spread across departments.
---
Individually insignificant.
---
Together—
a leak.
---
He clicked into deeper detail.
---
System Window (Opened)
Task: Financial Pattern Scan
Status: Irregular payment layering detected
Reward/Info: Micro-diversion routes identified across vendor chains
---
Adeiza leaned back slightly.
---
"…Internal siphoning."
---
Not external.
---
Someone inside—
or connected to internal operations.
---
Careful.
Patient.
---
But not invisible.
---
He didn't act immediately.
---
Instead—
he traced the endpoints.
---
The money didn't stay within corporate channels.
---
It moved outward.
---
Into smaller shell structures.
Then—
disappeared into fragmented accounts.
---
"…Local network."
---
Not global.
---
Not sophisticated enough for high-level syndicates.
---
But organized.
---
That narrowed it down.
---
Lagos-based.
---
He adjusted the filter.
Focused on timing.
---
Payments aligned with specific operational windows.
Late approvals.
Low oversight periods.
---
"…They're using routine as cover."
---
Expected.
---
He marked the pattern.
Didn't remove it.
Didn't block it.
---
Not yet.
---
Because removing it would alert them.
---
And right now—
he wanted more than prevention.
---
He wanted structure.
---
GhostKey's node flickered.
---
> GhostKey:
You're not in the network core.
---
Adeiza didn't look away from the financial logs.
---
> Apex Null:
No.
---
A pause.
---
> GhostKey:
Then what are you doing?
---
Adeiza's voice remained calm.
---
> Apex Null:
Fixing something I ignored before.
---
Silence followed.
---
GhostKey didn't press further.
---
They understood enough not to interrupt.
---
Adeiza continued tracing the flow.
---
Each endpoint he uncovered—
linked loosely to another.
---
Not centralized.
---
Distributed.
---
But still connected.
---
"…Amateur decentralization."
---
Effective against basic audits.
---
Not against him.
---
He mapped the structure quietly.
---
System Window (Opened)
Task: External Financial Mapping
Status: Endpoint network partially reconstructed
Reward/Info: Linked accounts forming localized siphon structure
---
Adeiza closed it.
---
Now he could see it.
---
Not clearly—
but enough.
---
A small underground financial network.
---
Operating beneath legitimate corporate flow.
---
Taking just enough—
to avoid attention.
---
But doing it consistently.
---
"…That's your mistake."
---
Consistency created patterns.
---
Patterns created exposure.
---
He didn't shut it down.
---
Instead—
he adjusted a single variable.
---
Payment timing.
---
One department.
One cycle.
---
A delay.
---
Not enough to trigger alarms.
---
Just enough—
to disrupt their rhythm.
---
Confirmed.
---
System Window (Opened)
Task: Payment Timing Adjustment
Status: Minor delay introduced in selected transaction cycle
Reward/Info: External siphon synchronization disrupted
---
Adeiza watched.
---
Nothing happened immediately.
---
That was expected.
---
These systems reacted slowly.
---
Human-controlled structures always did.
---
He leaned back.
---
Now—
he waited.
---
Because disruption revealed behavior.
---
And behavior revealed structure.
---
GhostKey's node flickered again.
---
> GhostKey:
…You're baiting something.
---
Adeiza didn't deny it.
---
> Apex Null:
Yes.
---
A pause.
---
> GhostKey:
What kind?
---
Adeiza's eyes remained on the screen.
---
> Apex Null:
The kind that reacts when its pattern breaks.
---
Silence.
---
Then—
GhostKey's activity reduced.
---
They stopped probing.
---
Watching instead.
---
Learning.
---
Adeiza returned his focus to the system.
---
Minutes passed.
---
Then—
a shift.
---
Small.
---
But clear.
---
One of the endpoints adjusted.
---
Rerouted earlier than expected.
---
"…There you are."
---
Not a full reaction.
---
But a correction attempt.
---
That confirmed it.
---
Human oversight.
---
Not automated.
---
He tracked the adjustment.
---
Followed the new route.
---
System Window (Opened)
Task: Reaction Trace
Status: Manual rerouting detected
Reward/Info: Control node direction partially exposed
---
Adeiza closed it slowly.
---
"…Found you."
---
Not fully.
---
But enough.
---
A control point.
---
Someone managing the flow.
---
Close.
---
Local.
---
And careful—
but not careful enough.
---
He didn't move further.
---
Didn't expose the connection.
---
Because now—
he had something more valuable than access.
---
Awareness.
---
He leaned back slightly.
---
No urgency.
---
No aggression.
---
Just control.
---
"…Next step comes after you adjust again."
---
Because they would.
---
They had to.
---
And every adjustment—
would bring them closer.
---
To him.
---
Or—
him closer to them.
---
Either way—
it didn't matter.
---
Adeiza's eyes remained calm.
---
Because for the first time—
his influence had moved beyond the network.
---
Into something slower.
---
Messier.
---
Human.
---
And far easier to break.
