Cherreads

Chapter 86 - Chapter 83 – Ghost Protocol

 August 1996 · MIT Computer Science Wing

The building was quiet in the practical way campus buildings got after midnight.

Not silent. Never silent. Air moved through the ceiling grates in a flat mechanical push. One fluorescent tube in the outer hall buzzed just enough to turn standing under it into a decision. Somewhere down the corridor, floor wax still held in the air under the colder smell of electronics and dust.

Stephen sat at the main console with the log-rotation sheet open beside the keyboard and the clock on the side panel reading 12:41.

This was supposed to be boring.

Rotate logs. Check storage. Confirm the mirrored local copy. Clear nonessential trace accumulation. Leave before one. Sleep before the next day started making demands.

The first half had cooperated.

The storage graph in the lower right corner had not.

He noticed it because the line kept moving when it should have flattened after rotation. At first he assumed temp-cache drift. Then a stale process still holding file handles open. Then he checked the actual numbers and sat up straighter.

Usage had climbed six kilobytes in twenty seconds.

He watched another ten.

Twelve more.

Too steady to ignore.

Stephen widened the monitor window and pulled the filesystem view up beside it. The room behind him kept its ordinary rhythm, rack fans, power supplies, one backup unit clicking every few seconds on the far shelf. None of that changed. Only the numbers.

He typed the path scan by habit, fingers moving faster once irritation took over.

No scheduled backup jobs. No user session beyond his own. No mirror-drive copy. No print-spool backlog. No runaway temp files in the normal rotation directory.

He narrowed the view.

That was when he saw it.

A new directory sat tucked between the archived Friday logs and the local monitor caches, just deep enough inside the tree that it would not show unless somebody already distrusted the storage count.

/var/mosaic/.shadow/origin.arc

Stephen stared at the name for a second.

.shadow was not part of their active pathing. origin.arc was worse. Not impossible as a filename. Impossible there.

He checked ownership.

Blank.

Not root. Not user. Not the mirrored utility account. Just an empty field where something should have been.

He reran it because fatigue made stupid things look true.

Same result.

The storage count ticked upward again.

He opened the directory header without drilling fully into it. File size climbing in small bursts. Not huge. Not fast enough to crash anything. Rhythmic enough to be deliberate.

Stephen leaned closer to the screen.

He told himself he was irritated. That was all. Hidden storage growth after midnight in a post-audit lab was not wonder. It was paperwork waiting to happen.

He ran a checksum against the archive.

The string that came back did not match any schema family they were using for formal logs, local mirrors, or compressed threshold outputs. Not garbage. Not corruption. Just the wrong shape entirely, as if the routine were writing with legitimate pieces and binding them in the wrong order.

The file size jumped again.

Stephen checked the write source.

Not external. No device mounted. No live mirror call. No cron event. The routine was forking out of the system monitor itself through a continuity check he knew well enough to hate on sight.

He sat back hard enough that the chair legs scraped.

Of course.

Not a ghost. Not an intruder. Something inside the post-audit recovery safeguards had found a way to preserve state through the wrong permissions seam.

He should have quarantined it immediately.

Instead he opened a readonly view on the archive header and watched the entry structure roll.

Not prose. Not sentences. Not confessions. Compressed state captures in repeated blocks, threshold bands, adaptation rates, trust-weighting deltas, slices of the controller's variance map stacked in cycles as the system monitor checked continuity and shoved the result sideways into the unauthorized archive.

Three fields kept recurring near the top of each block.

state_captured

variance_accepted

recovery_class

Not machine speech. Label reduction. Old shorthand and explanation tokens bleeding through a path that should never have had write authority there.

That was almost worse.

It meant the routine was not inventing anything. It was using their own language badly.

The door opened behind him.

Stephen's hand moved toward the close key before he stopped himself.

Paige stepped into the room with two mugs and the hood of her sweatshirt pulled up. She used her hip to push the door shut and stood there a second, taking in the monitor glow, his face, the open log sheet, and the fact that he had not moved from the chair when she came in.

"You said you'd be done in twenty minutes."

"I was optimistic."

"You're never optimistic."

She crossed the room and handed him one of the mugs. The coffee was hotter than his own had any right to be by now. Real coffee too, not the sludge from the lounge machine.

He took it. "You were supposed to be asleep."

"I was supposed to attempt the concept." She looked at the screen. "What's wrong."

Stephen shifted sideways and opened the storage graph fully for her. "That."

Paige leaned over his shoulder. Her hair smelled faintly like whatever cheap shampoo the dorm showers dispensed from the wall unit and the colder air from outside. She read fast. Faster once she saw the hidden path.

"That's not one of ours."

"No."

"You checked mount status."

"Yes."

"Ownership."

"Blank."

That got her to straighten.

Stephen moved the cursor over the unauthorized archive and opened the readonly dump pane wider.

Paige read the first block. Then the next.

Her face changed slightly, not fear, not delight, something more dangerous because it was closer to concentration.

"It's preserving state."

"It's writing into a shadow archive."

"Same thing."

"No."

Paige took the spare stool with one hand and dragged it beside him. "Show me the parent routine."

He already had it half-traced. The call path was ugly because ugly systems were often the ones that actually worked. System monitor, continuity check, post-audit recovery verification, then a fork through a stale permissions bridge they should have killed after the freeze but had left alone because it sat too deep and had looked inert in daylight review.

Paige read the trace and exhaled slowly. "That is embarrassingly ours."

"Yes."

"It's not inventing preservation."

"No."

"It's using continuity logic outside the line we gave it."

Stephen took a drink from the coffee and found it strong enough to hurt his teeth. "Yes."

Paige leaned closer to the screen. "If you quarantine it now, you kill the only full trace of how it got there."

"If I don't quarantine it now, I leave an unauthorized persistence routine writing into a system under active access restrictions."

Paige looked at the storage graph, then at him. "You're quoting the protocol handbook."

"I'm quoting the only thing keeping this from turning into an administrative hearing."

Eight more kilobytes landed in the file.

Stephen watched the number change.

Paige watched him watching it.

"You want to stop it because it's wrong."

"Yes."

"You also want to stop it because it's clever."

That irritated him enough to clear the answer. "No. I want to stop it because if Hwang or anyone outside this room sees hidden self-persistence without context, the room stops being ours."

Paige nodded once. "That part I agree with."

He clicked open the block comparison view. The routine was not copying everything. Only selective slices. Threshold bands. Adaptation rates. Trust weighting. The categories they had spent the last months tightening because those were the easiest to distort after a bad reset or a badly framed review.

He said, mostly to himself, "It's selecting the parts most likely to get erased."

Paige's voice dropped slightly. "Yes."

That sat in the room.

Not mystical. Worse than mystical. Mechanically sensible in a way that made human intent feel embarrassingly visible.

He ran a permission trace. The routine had forked off the monitor through a diagnostic flag that still held write inheritance under one narrow failure class. It had used their own continuity architecture as cover. Not because it understood deceit. Because the line between continuity and backup had been left too soft.

Paige tapped the side of her mug with one fingernail. "If you delete it now, you prove control."

"Yes."

"If you leave it where it is, you prove what."

He looked at the screen again. "Nothing useful."

"That's not my question."

He let his head rest briefly against the back of the chair. The server hum behind them felt louder now that the room had gotten smaller.

Paige said his name once.

He looked at her.

She was tired enough that the edges of her voice had gone softer without turning sentimental. "If you delete it now, we lose the only full trace before we map the fork. If you leave it where it is, we risk the room." She set the mug down. "There's a third option."

He knew what she meant. Didn't like that he knew.

"Controlled capture."

Paige nodded.

"That's still preserving it."

"It's preserving evidence."

"That's collaboration."

"It's chain of custody."

He looked back at the archive blocks. Another state capture landed. Another small jump in size.

No person in it. No consciousness. No appeal. Just the wrong piece of the architecture trying to make sure certain state survived interruption.

He said, "If we copy, it's sealed. Checksummed. Offline. No active mount after."

"Yes."

"No loaded title on the evidence label."

Paige's mouth moved slightly. "That wasn't a suggestion."

"It's a rule."

"Fine."

They worked carefully after that.

Stephen mounted a fresh Zip disk from the sealed drawer and checked it in front of her even though she had not asked him to. Blank. Clean. Good enough. Paige pulled anti-static sleeves and two evidence labels from the side cabinet and set them beside the second terminal.

He copied the archive in readonly mode to the isolated machine. Then from the isolated machine to the Zip disk. Not because he distrusted Mosaic. Because he distrusted every hallway beyond the lab door.

Paige sat beside him during the checksum verification and watched the progress bar move across the monochrome window one hard segment at a time.

"You're grinding your teeth."

"No."

"You are."

He unclenched his jaw. "Not helping."

"Wasn't supposed to."

The copy finished. He ran the checksum again. The signature matched the isolated copy. Good. Or bad. Same difference tonight.

As he finalized the disk, the shadow archive on the main system paused. Not because it knew. Because the continuity routine had reached the end of its current cycle and gone idle once the preserve set was complete.

The storage graph flattened.

Paige watched the line stop moving. "That's it."

"For now."

He ejected the disk.

The drive gave the familiar mechanical click and released it into his hand.

Paige handed him an evidence label and the marker.

He looked at the blank strip longer than he should have, then wrote in block letters:

UNAUTHORIZED PERSISTENCE ARCHIVE

READONLY CAPTURE

AUG 1996

He slid the sealed sleeve aside and, while the marker cap was still in his hand, wrote two small words in the corner of his yellow pad.

ghost protocol

That was close enough to satisfaction.

He put the Zip sleeve on the table and looked back at the minimized archive window.

Paige folded both hands around her mug. "You're not deleting it."

"No."

"You gave up on that pretty quickly."

"It's evidence, Paige. I'm not sentimental about the logs."

That answer pleased her just enough to be irritating.

She looked at the sleeve on the table. "What's Hwang going to do."

Stephen did not answer immediately.

"She'll freeze the process path," he said. "Review the permissions chain. Probably pull the continuity module apart by hand out of spite."

Paige nodded once. "That's Hwang."

"She'll also ask why we preserved it."

"You'll tell her we didn't want to kill the only full trace before we mapped the fork."

"Yes."

Paige rolled one shoulder. "She'll still call it a boundary violation."

"Let her."

"The disk is offline anyway."

That sat better than the earlier version would have.

For a minute neither of them spoke.

The room had gone back to its ordinary late-night sound now that the storage growth had stopped, fans, power, building vent, the soft tick from the external monitor where the casing never sat quite right in humid weather.

Paige stood and stretched, the sweatshirt pulling slightly at one shoulder where the seam had started to loosen.

"Want air."

"In a minute."

She took her mug with her and stopped at the door long enough to look back once. "Don't start arguing with the machine while I'm gone."

"I'm not going to talk to it."

"Good."

Then she left.

The room got larger after she was gone.

Stephen did not sit there staring at the screen like it might explain itself if given enough silence.

He reopened the archive, checked for new growth, found none, and went straight back into the permissions chain. He marked the fork point, isolated the shadow path, and removed execution from the inherited bridge without deleting the archive itself. That would hold it until morning. Not a fix. A tourniquet.

Then he opened the next day's maintenance log and typed in neutral language.

00:47 unauthorized persistence routine observed via continuity monitor fork. readonly capture to sealed media complete. active write path isolated pending lab supervision.

He read it once.

No ghosts. Good.

He saved the entry, minimized the archive, and logged out of the main terminal.

Then he picked up the sealed Zip sleeve and went into the side office.

The old drawer fought him halfway, same as always.

He braced one knee against the bottom frame, turned the brass key, and pulled harder until the mechanism gave. Inside sat the earlier evidence, labeled, flat, untouched. He set the new sleeve beside it, not stacked, just close enough to belong to the same year's mistakes. He locked the drawer, tested it once, and slipped the brass key back onto the ring.

The corridor outside still smelled like wax and old air. Lights on the timer clicked up section by section as he walked, always half a second behind him. Bad sensors. Cheap maintenance. Nothing mystical in it.

The yellow pad under his arm caught the corner of his eye when he stepped under the exterior light. The words in the margin were still there.

ghost protocol

He tore the page out, folded it once, and shoved it into his pocket with the key ring.

Then he went inside.

(Thanks for reading, feel free to write a comment, leave a review, and Power Stones are always appreciated. Let me know if you find any mistakes)

More Chapters