Morning sunlight glints off the Union Depository's glass and steel facade as you adjust your posture on the bench across the street. To casual observers, you're just another downtown professional enjoying coffee before work. Beside you, Tej fiddles with his phone, his movements casual but purposeful.
"Thirty-seven cameras on the exterior alone," he murmurs, not looking up from his screen. "That's just what's visible."
Your interface scans continuously, mapping security features invisible to normal observation:
[SECURITY ASSESSMENT: IN PROGRESS]
[VISIBLE CAMERAS: 37]
[CONCEALED CAMERAS: 14]
[THERMAL SENSORS: 8]
[RADIO FREQUENCY IDENTIFICATION: ACTIVE]
[SECURITY PERSONNEL: 12 VISIBLE, ROTATION PATTERN ESTABLISHING]
"Fourteen more concealed in architectural features," you respond quietly. "Plus thermal monitoring at all entrance points."
Tej's eyes flick to you momentarily. "How can you possibly know that?"
Instead of answering directly, you activate a specific interface function, transmitting data directly to Tej's custom tablet hidden in his messenger bag. His eyes widen slightly as his screen populates with security specifications that should be impossible to obtain from a park bench.
"What the—" he begins.
"Let's walk," you interrupt, standing casually. "Clockwise around the building. Full perimeter."
Tej follows your lead, professional curiosity overriding his questions for the moment. You maintain a conversation about nothing—sports, weather, meaningless topics that make you appear as colleagues rather than people casing the most secure financial facility in Los Angeles.
Your interface continues mapping, each step adding layers to the digital blueprint forming in your system:
[PERIMETER MAPPING: 38% COMPLETE]
[GUARD ROTATION: PATTERN IDENTIFIED - 22 MINUTE INTERVALS]
[VEHICLE ENTRANCE: REINFORCED GATES, WEIGHT SENSORS, CHEMICAL DETECTION]
[VULNERABILITY ASSESSMENT: CALCULATING]
"They're running a Hirsch Velocity security system," Tej notes as you pass the loading dock. "Latest generation. Military grade."
"With a proprietary modification," you add. "Custom encryption on their access cards."
Tej gives you another sidelong glance. "There's no way to know that from out here."
You tap your temple once, the gesture subtle. "I have certain advantages. Dom knows about them. I'll explain later, but for now—trust that what I tell you is accurate."
The professional hacker in Tej battles briefly with skepticism before practicality wins. "Alright. Say I believe you. What else are your... advantages telling you?"
You continue your casual stroll, interface penetrating deeper layers of security with each passing moment:
[EMPLOYEE IDENTIFICATION: BIOMETRIC + RFID]
[SHIFT CHANGES: 6AM, 2PM, 10PM]
[NETWORK ARCHITECTURE: PHYSICALLY ISOLATED, AIR-GAPPED]
[INTERNAL SURVEILLANCE: 126 CAMERAS, 3 MONITORING STATIONS]
"They run three security shifts with two-factor authentication at all checkpoints," you explain. "Biometric plus physical cards. The real challenge is the network architecture—it's completely isolated from external connections."
Tej absorbs this, mind clearly racing with implications. "Air-gapped system. That means no remote access. We'd need someone physically inside to bridge the connection."
"Precisely." You pause at a newsstand, purchasing a paper as cover while your interface maps the final section of the building's exterior. "There's our first major hurdle."
The complete circuit around the Depository takes thirty-two minutes—enough time for your interface to establish comprehensive external mapping while maintaining an inconspicuous presence. As you return to where you started, a black SUV with federal plates exits the underground garage, triggering an automatic scan:
[VEHICLE IDENTIFICATION: FEDERAL TRANSPORT]
[OCCUPANTS: 2 SECURITY PERSONNEL, 1 ADMINISTRATIVE]
[PATTERN ANALYSIS: DAILY DOCUMENT TRANSFER TO FEDERAL COURTHOUSE]
[POTENTIAL VULNERABILITY: IDENTIFIED]
"The black SUV," you say quietly to Tej. "They make that run every day at this time. Administrative documents to the federal courthouse."
Tej nods, capturing video with his customized phone. "Regular patterns are exploitable patterns."
"Exactly." You check your watch. "Now for phase two."
The interior reconnaissance presents a greater challenge—casual observation won't suffice. You've prepared for this, selecting appropriate covers established through your GTA interface the previous evening.
"There's a bank on the first floor," you tell Tej as you walk toward the main entrance. "Legitimate financial services, separate from the federal reserve functions. I've established accounts for both of us. We're here to discuss investment options for a tech startup."
Tej raises an eyebrow. "Just like that? You established accounts overnight at a federal institution?"
"Just like that," you confirm, straightening your tie. "Follow my lead, ask questions later."
The Depository's lobby presents an imposing first barrier—two security checkpoints, metal detectors, and armed guards monitoring all movement. Your interface maps every detail as you approach the reception desk:
[INTERNAL MAPPING: INITIATING]
[GUARD POSITIONS: 6 VISIBLE, ROTATING PATTERNS]
[WEAPON DETECTION: MAGNETOMETERS + MILLIMETER WAVE SCANNERS]
[FACIAL RECOGNITION: ACTIVE, CONNECTED TO FEDERAL DATABASE]
"Good morning," you greet the receptionist with practiced ease. "We have an appointment with Mr. Harrington in private banking. Reynolds and Parker."
Your falsified credentials pass the initial verification seamlessly. As you're escorted through security, your interface penetrates deeper into the building's systems:
[SECURE NETWORK DETECTION: 4 ISOLATED SYSTEMS]
[VAULT POSITIONING: SUB-LEVEL 3]
[ELEVATOR ACCESS: KEYCARD + BIOMETRIC + VISUAL VERIFICATION]
[VULNERABILITY ASSESSMENT: CALCULATING]
The private banking section occupies a corner of the main floor, deliberately separated from the federal reserve operations but sharing the same security infrastructure—a perfect observation point. Your meeting with the investment banker proceeds according to script while your interface maps critical systems:
[VENTILATION SYSTEM: MAPPED]
[ELECTRICAL GRID: REDUNDANT SYSTEMS IDENTIFIED]
[EMERGENCY PROTOCOLS: ACCESSED]
[STAFF ROTATION: PATTERNS ESTABLISHED]
Tej plays his role perfectly, asking technical questions about international wire transfers that keep the banker engaged while you execute deeper scans. The interface highlights a critical discovery:
[PRIORITY ALERT: MAINTENANCE ACCESS]
[LOCATION: NORTH STAIRWELL, SUB-LEVEL 1]
[SECURITY: REDUCED DURING MAINTENANCE WINDOWS]
[SCHEDULED MAINTENANCE: TOMORROW, 0200-0500]
"We'll certainly need to discuss these options with our partners," you tell the banker as the meeting concludes. "Your international capabilities are particularly interesting."
As you exit through the lobby, a final scan completes your reconnaissance:
[MAPPING COMPLETE: 89% ACCURACY]
[CRITICAL SYSTEMS: IDENTIFIED]
[VULNERABILITIES: 3 PRIMARY, 7 SECONDARY]
[EXPLOITATION STRATEGY: FORMULATING]
Outside, you and Tej maintain your professional facade until reaching the BMW parked three blocks away. Only when the doors close do you both relax into authentic conversation.
"That was..." Tej shakes his head, visibly processing. "Man, I've never seen anything like what you just did. Those security specifications you sent to my tablet? That shouldn't be possible without internal access."
"I told you I have advantages," you reply, starting the engine. "What matters is what we learned."
Tej nods, already adapting to this new reality. "The air-gapped network is our biggest challenge. We'd need someone physically inside to bridge that gap, and even then, we'd have minutes at most before their intrusion detection systems picked it up."
Your interface calculates probabilities:
[INFILTRATION METHODS: ANALYZING]
[OPTION A: IMPERSONATION - 47% SUCCESS PROBABILITY]
[OPTION B: EMPLOYEE LEVERAGE - 62% SUCCESS PROBABILITY]
[OPTION C: MAINTENANCE EXPLOITATION - 78% SUCCESS PROBABILITY]
"Tomorrow night," you say as you navigate toward Dom's garage. "They have scheduled maintenance on their HVAC system. Three-hour window where security protocols are modified to allow contractor access to restricted areas."
Tej stares at you. "How could you possibly know their maintenance schedule?"
"The same way I know the head of maintenance is named Gerald Wilson. Fifty-seven years old. Two kids in college, significant gambling debts in Vegas." Your interface displays the information only you can see. "He's our way in."
The tactical implications register immediately in Tej's expression. "Leverage."
"Exactly."
Back at the garage, the crew gathers around as you and Tej present your findings. The whiteboard fills with security details, patrol patterns, and system specifications that would normally take weeks of surveillance to compile.
"This is... comprehensive," Brian notes, professional assessment in his voice. "More than comprehensive. How did you get this level of detail in a few hours?"
All eyes turn to you, the question hanging in the air. Dom gives an almost imperceptible nod—permission to reveal a measured portion of your capabilities.
"I have certain technological advantages," you explain carefully. "Advanced scanning and data processing abilities. What would take normal reconnaissance teams weeks, I can accomplish in hours."
Vince scoffs. "That's convenient."
"That's valuable," Dom corrects him firmly. "Question is, what do we do with this information?"
Tej steps forward, already integrated into the crew's dynamics. "We have a potential access point. Maintenance supervisor with financial problems. And a schedule—tomorrow night, 2 AM to 5 AM, reduced security protocols during HVAC work."
Your interface analyzes crew reactions:
[CREW ASSESSMENT: MIXED]
[DOM: CALCULATING STRATEGIC VALUE]
[BRIAN: PROFESSIONAL INTEREST]
[LETTY: GUARDED ACCEPTANCE]
[JESSE: TECHNICAL FASCINATION]
[VINCE: CONTINUED SKEPTICISM]
[TEJ: ADAPTATION COMPLETE]
[GISELE: TACTICAL ASSESSMENT]
"So we leverage this maintenance guy," Letty suggests. "Get him to let us in during the window."
"Too risky," Brian counters. "If he's directly involved, he'll panic. Better to use his access without his knowledge."
"I can clone his credentials," Tej offers. "But we'd need physical proximity to his security pass for at least sixty seconds."
The planning continues, strategy forming from the foundation of your reconnaissance. Throughout, you feel Gisele's eyes on you—studying, assessing. When the crew breaks into smaller tactical groups, she approaches.
"Those aren't just technological advantages," she says quietly. "I watched you in there. The way you were processing information—it was beyond human."
Your interface alerts to her perception:
[GISELE YASHAR: PERCEPTION THRESHOLD EXCEEDED]
[RECOMMENDED ACTION: PARTIAL DISCLOSURE]
[RELATIONSHIP STATUS: STRATEGIC ALLY/POTENTIAL PERSONAL CONNECTION]
"Let's take a walk," you suggest, leading her outside where conversations can't be overheard. The afternoon sun casts long shadows as you consider how much to reveal.
"Dom knows," you begin carefully. "About what I can do. Where I'm from."
"Which is?" she prompts.
"Somewhere else," you say simply. "Another reality, another world. I came here with certain abilities—the interface you've seen me use, knowledge that shouldn't be possible."
Instead of disbelief, her expression shows careful calculation. "I've suspected something since that first night in my car. The way you accessed information, knew things without sources."
"And now?"
"Now I'm certain," she says. "The question is why you're here. What you really want."
The directness of her question catches you slightly off-guard, honesty emerging before strategic calculation:
"To belong," you admit. "To build something real in this world. The abilities, the interface—they're tools, not purpose."
Something shifts in her expression—a softening, a recognition. "That I understand," she says quietly.
The moment stretches between you, possibility hanging in the air before your interface alerts to an approaching figure:
[DOM TORETTO: APPROACHING]
[CONVERSATION: PAUSE RECOMMENDED]
Dom joins you outside, his presence commanding without effort. "We have twelve hours before that maintenance window," he says. "Time to decide if we're using it or not."
The decision point arrives, strategy crystallizing in your mind as you consider the next crucial step in what will become the most audacious heist in history.
