Page List

Font Size:

"Timeline suggests this started weeks ago, but the pattern escalated recently." Cole brings up a series of timestamps. "Whoever Echo is, they're thorough. Almost obsessively so."

"More than casing." Cole highlights network intrusion logs. "This is systematic behavioral analysis. They're learning our routines, mapping our vulnerabilities."

He pauses, a hint of admiration creeping into his voice. "It's actually quite sophisticated."

"How sophisticated?" Kade's voice carries that deadly calm that means someone's about to have a very bad day.

Cole brings up another screen showing network data. "They breached seventeen different security systems across the city. Municipal traffic control, private building networks, even some federal databases."

His tone shifts to teaching mode. "Whoever trained them believed in thorough field testing."

"Capabilities assessment?" Remy asks, his green eyes sharp with professional interest.

"Advanced cyber warfare training, patience of a monk, and the kind of operational security that makes government agencies weep." Cole continues his briefing. "They're using rotating proxy servers, quantum encryption, and clean insertion techniques that leave almost no digital footprint."

"So we're dealing with a phantom who's been stalking us for weeks." Jax's leg bounces rapidly under the table. "My gym routine's boring enough without an audience."

"A very talented specter," Cole corrects. "But everyone makes mistakes, eventually."

Damian leans forward, his presence somehow making the room feel smaller. "What kind of mistakes?"

"The obsessive kind." Cole highlights a cluster of data points. "Notice the pattern distribution. While they've surveilled all of us, there's a concentration of activity around..."

He pauses, eyes flicking to me. "Sacramento area. Specifically, around certain coffee establishments."

My blood turns to ice water.

"Asher's recon location," Kade states, his blue eyes calculating as they lock on mine.

"Exactly." Cole's expression grows more serious. "Twenty-three separate instances of surveillance in a four-block radius. Traffic cameras, security feeds, even WiFi network infiltration." He turns to me. "Either you're incredibly unlucky, or Echo has taken a particular interest in your activities."

The implications hit me like a physical blow. Sacramento. The surveillance location I've been using for days. Too convenient.

"Assessment?" Kade demands.

Cole straightens, his voice shifting to full briefing mode. "We're dealing with someone who's been preparing. This isn't random curiosity—it's targeted intelligence gathering. The question is whether they're planning something specific or just building comprehensive files on us."

"Either way, it's a threat," Damian states flatly.

"Agreed." Kade's jaw tightens. "But the level of sophistication suggests we're not dealing with some random hacker with a grudge."

"So what's the play? Track them down and have a friendly conversation?" Xander cracks his knuckles, the sound sharp in the enclosed space.

"First, we consolidate." Kade's voice brooks no argument. "Full security protocols until we understand what we're dealing with."

Every set of eyes in the room burns into me, waiting for my answer.

The logical part of my brain agrees—this is standard procedure when facing an unknown threat.

But something else nags at me. The timing doesn't feel random.

"How certain are we about the Sacramento connection?"

Cole pulls up a detailed map. "Ninety-three percent probability that Echo operates from or frequently accesses networks in that area."

He studies the data clustering. "The concentration suggests familiarity with the location. Regular access to high-speed networks, knowledge of local security systems."

"Could be anywhere," Jax observes. "Office building, internet café, even residential with good equipment."