The safe deposit box was different from the Amsterdam one—larger, reinforced, rated for biohazardous materials.
William stood in the Zurich vault facility, watching the attendant verify his identity and lead him to the private viewing room. The containment case sat heavy in his bag, the virus inside held at exactly 4 degrees Celsius by the portable cooling unit he'd acquired during the drive north.
"Separate locations. Intelligence portfolio in Amsterdam, virus in Zurich. If one is compromised, the other survives."
[OBSERVATION: User implementing distributed asset protection]
[ASSESSMENT: Sound strategy. Single-point-of-failure elimination improves survival probability by estimated 14%.]
The vault box opened with a biometric scan and a physical key—two-factor authentication that would require killing William to bypass. He placed the containment case inside, verified the temperature readings one final time, and closed the lid.
The virus was secure. The most dangerous thing in Europe was locked in a Swiss bank vault, waiting for the day William needed it.
The dead-man's-switch took another hour to configure.
William sat in a Zurich café, laptop open, establishing the protocols that would trigger if he failed to check in for seventy-two consecutive hours. The instructions would route through three separate nodes before reaching Jansen, containing coordinates to both vault locations and authorization codes that would grant access.
"If I die, someone gets the leverage. Better Jansen than Providence or the ICA."
[OBSERVATION: User creating contingency distribution for high-value assets]
[ASSESSMENT: Contingency planning is optimal. However, consider: Jansen is not loyal. Jansen is profitable. Ensure incentive alignment.]
[NOTE: User has not committed sin in this activity. Asset protection generates no SP.]
The train back to Amsterdam departed at 3:15 PM. William watched the Swiss countryside blur past the window, his mind cataloguing the assets he now controlled: IAGO auction data, Providence-linked intelligence from Torres's files, the Ether virus prototype. Three months ago, he'd woken up in a dead man's body with nothing but borrowed memories and a voice in his head.
Now he had leverage that could topple governments.
[ASSESSMENT: User asset portfolio has reached significant threshold]
[CURRENT HOLDINGS:]
[- IAGO intelligence: High value (criminal networks, political compromat)]
[- Providence documentation: High value (ICA control evidence)]
[- Ether virus prototype: Incalculable value (bioweapon with global implications)]
[STRATEGIC POSITION: User now possesses sufficient leverage to negotiate with major factions]
[WARNING: Possession of high-value assets creates proportional threat profile]
William closed his eyes and let the train carry him home.
Jansen's message arrived at 11:47 PM.
ICA after-action report — Sapienza. Classified summary attached. Relevant to your interests.
William opened the encrypted file on his secure laptop, Cold Read automatically cataloguing the contents as he scanned.
OPERATION: WORLD OF TOMORROW STATUS: Complete (objectives achieved) TARGETS: Silvio Caruso (eliminated), Francesca De Santis (eliminated) COLLATERAL: Underground laboratory destroyed, Ether Corporation research compromised ASSESSMENT: Mission success. Shadow Client objective fulfilled.
Standard ICA after-action language—clinical, efficient, stripped of anything that might suggest human suffering. But the addendum was different.
ANOMALY REPORT (Appendix C): Wing C containment vault accessed 6:02 AM, approximately 4 hours before primary operation commencement. Access log shows Dr. Emilia Rossi (Ether researcher, current status: missing) as authorized user. Physical inspection reveals Ether virus prototype (ETHER-PRIME) missing from secure storage. Timeline analysis: Prototype removed before facility destruction. Not destroyed in operation. Conclusion: Unknown third party acquired virus sample independent of ICA operation.
DIANA BURNWOOD ANNOTATION: "Sapienza irregularities mirror Paris pattern. Unknown actor with advance operational knowledge. Recommend reopening UNKNOWN-7 investigation with expanded parameters. Torres termination may have been premature."
William read the annotation twice.
"She knows. She doesn't know who, but she knows someone is operating in parallel to 47. And she's not satisfied with Torres as the answer."
[THREAT ASSESSMENT: Diana Burnwood investigation reopening]
[EVIDENCE: Paris pattern recognition, Sapienza timing anomaly, Torres frame inadequacy]
[PROBABILITY OF IDENTIFICATION: 23% within 60 days if investigation proceeds actively]
[RECOMMENDATION: Monitor. Do not engage. Diana Burnwood is dangerous.]
The UNKNOWN-7 file had been closed with Torres's death. Now Diana was pulling it back open, looking for the ghost that had slipped through her net.
William was that ghost. And the woman hunting him was one of the most capable intelligence operatives in the world.
The cold came at 2:17 AM.
William was reviewing his asset distribution when the temperature dropped—not the gradual cooling of a failing heater, but the sudden, sharp chill of something impossible. His breath misted in the air. Frost patterns began forming on the window glass.
[ANOMALY DETECTED: Temperature drop 12°C in 3.2 seconds]
[ENVIRONMENTAL SCAN: No mechanical explanation]
[SPONSOR ACTIVITY: Probable]
The glass of water was on his desk.
William stared at it. He hadn't replaced it since the first incident—the glass he'd found with the fingerprint that didn't match his hand. He'd thrown that glass away, watched it shatter in the garbage bin behind his building.
But here it was. Same glass. Same position. Same impossible presence.
[SYSTEM INTERFACE: Experiencing interference]
[WARNING: External access attempt detected]
The HUD flickered. For three seconds, William's peripheral vision filled with static, and then—
An eye.
Not a human eye. Something larger, older, watching with the patient attention of a predator that had all the time in the world. The icon pulsed once, twice, and then vanished as quickly as it had appeared.
A notification arrived. But the formatting was wrong—not the system's standard output, but something older, more deliberate.
[MESSAGE (SOURCE: UNKNOWN):]
"We see you, little ledger. You've been entertaining."
William's hand trembled. Not from Predator's Calm failing—the buff was working perfectly, suppressing his stress response, keeping his heart rate steady. The tremor was something else. Something the system couldn't control.
"What are you?"
The words came out before he could stop them. Quiet. Barely a whisper. Addressed to an empty room, to a glass of water that shouldn't exist, to something that had just announced its presence in the most unsettling way possible.
Nothing answered.
[OBSERVATION: User attempting communication with unknown entity]
[ASSESSMENT: No response detected. Entity may be observation-only at current phase.]
[NOTE: User asked "What are you?" — this represents emotional engagement beyond operational necessity. The Professional tier should suppress such impulses.]
[COUNTER-NOTE: User is still human. Human responses are expected, if suboptimal.]
The temperature didn't rise for another hour. William sat in the cold, holding the glass of water, waiting for something that never came.
The Sponsors were real. They were watching. And they thought he was entertaining.
Reviews and Power Stones keep the heat on!
Want to see what happens before the "heroes" do?
Secure your spot in the inner circle on Patreon. Skip the weekly wait and read ahead:
💵 Hustler [$7]: 15 Chapters ahead.
⚖️ Enforcer [$11]: 20 Chapters ahead.
👑 Kingpin [$16]: 25 Chapters ahead.
Periodic drops. Check on Patreon for the full release list.
👉 Join the Syndicate: patreon.com/Anti_hero_fanfic
