The first feed flickered. Then a second. Grainy, time-stamped, but alive. He saw the valve house. The main corridor. The emergency shutdown panel. All dark. All empty.
Elias had been that sysadmin. Ten years ago, he’d managed the security network for the Meridian Trans-Alaskan Pipeline—three hundred miles of steel, valves, and permafrost. He’d built a custom version of Blue Iris, the video surveillance software, to handle the brutal cold and the even colder threat of sabotage. Version 5.3.8.17. His magnum opus. Blue Iris 5.3.8.17 -x64--ENG--Portable-
But this was his build. He’d hidden a backdoor. A silent listener that mirrored the main feed to a forgotten IP address. A paranoid redundancy he’d never told anyone about. The first feed flickered
A man in a Meridian security uniform, face obscured by a balaclava, holding a tablet. On the tablet: the same Blue Iris interface. But it was his version. The portable one. Someone had found it, or stolen it, or—Elias’s blood turned to slurry—someone had planned for it. He saw the valve house
“Mr. Craine. We knew you’d check the old instance. You see, 5.3.8.17 wasn’t just portable. It was porous. We’ve been inside your old network for months. The pressure failure? That’s a distraction. We’re after the emergency bypass. And you’re going to help us unlock it.”
He typed the command: --ENG--force-link 10.0.1.47
The man looked up, directly into a camera only Elias knew existed. And smiled.