Page 14 of Lost in Fire

“Furthermore,” Vex continues, pulling up additional displays, “we’ve detected unusual patterns in our communication networks. Encrypted channels that don’t appear in any authorized systems. Messages that correlate with these… protective actions.”

Cassia, who’d been sitting silently overseeing the presentation, stops taking notes. I don’t look at her, but I can feel her tension spike. The network we’ve built over fifteen years of careful work is being dissected in front of us.

“Motion to call for investigation,” announces Elder Cymbane. “Full review of all bloodline verification procedures.”

“Seconded,” comes another voice. Elder Flamebrow. “If there’s a compromise in our systems, we must identify it.”

My heart lurches, but my voice remains level. “A thorough investigation serves our interests. However, I must question the wisdom of broad scrutiny. Our verification depends on confidential processes. Opening these systems to extensive review creates vulnerabilities our enemies would exploit.”

Cassia finally speaks. “If I may…” She clears her throat. “The technical aspects of any investigation would require careful consideration. Verification protocols, authentication systems, magical resonance patterns—all sensitive elements that could be compromised by hasty review.”

“What do you propose?” Vex’s voice carries barely concealed irritation.

“Preliminary assessment,” Cassia responds smoothly. “Internal technical review to determine scope and nature of any irregularities. If that review indicates significant compromise, then we proceed with full investigation under appropriate safeguards.”

I catch her eye for just a moment. Enough to see the warning there.

“The League will vote,” announces Elder Helestre from my left. “All in favor of immediate comprehensive investigation?”

Three hands rise. Vex, Cymbane, Elder Kiasog.

“Opposed?”

Two hands. Myself and Empyreal, whose clan has always maintained neutrality in political disputes.

“Abstaining?”

Elder Helestre and Elder Flamebrow remain motionless. Smart. Let others expose their positions first.

“The motion fails,” Helestre announces. “However, given the seriousness of these allegations, I propose a compromise. Internal review of all verification protocols. Full documentation of communication channels and authorization procedures. Timeline: two weeks.”

The vote is unanimous. Even I raise my hand, because refusing would confirm every suspicion Vex harbors.

“Two weeks,” Vex repeats, his voice carrying dark promise. “I trust that will be sufficient time to clarify these irregularities.”

“More than sufficient.” I stand, projecting confidence I don’t feel. “We’ll provide complete documentation of every protocol, every authorization channel, every communication method used in our systems.”

True, in a way. We’ll provide documentation. Just not the kind that will satisfy his suspicions.

The meeting dissolves into smaller conversations as members file out. I remain seated, reviewing the tactical displays one final time. Memorizing the evidence Vex has compiled, the timeline he’s constructed, the pattern of my own protective actions laid bare.

All the work that we’ve done, and now, in two weeks, the investigation could expose everything.

The parking garage beneath the Enclave echoes with expensive engines and hushed conversations. I wait beside my car until I hear footsteps against stone. Cassia approaches from the shadows between support pillars, her professional demeanor intact even in private. Her hands shake slightly as she checks her phone for surveillance signals.

“Clear,” she murmurs. “For now.”

“What does he know?” I keep my voice low, though we both know the garage is swept for listening devices twice daily.

Cassia’s composed expression finally cracks, showing the fear beneath. “He knows someone’s been messing with the systems. Not who, but enough to be dangerous. The pattern analysis, the operational reviews—he’s connecting specific individuals to the protection network.”

My blood turns to ice. “The documentation we’ve maintained…”

“Is clean. For now.” Cassia pulls up encrypted files on her phone. “But Vex isn’t looking at official records anymore. He’s examining correlation patterns. Timing relationships. Traces from the communication arrays.”

She shows me the analysis. Data points mapping successful interventions against operational timelines. Communication pattern analysis showing encrypted traffic that doesn’t match any authorized channels. Geographic patterns that could lead to communities where certain protected individuals have been relocated over the years.

“What’s his next move?”