The first thing you notice is the silence.
Not the silence of sleep, or the silence of a city holding its breath between the last call to prayer and the first gray smear of dawn. This is the silence of a machine that has stopped pretending to be innocent — the kind of silence that has weight, that presses against your eardrums like depth pressure, like the moment before a detonation when the air itself understands what is coming and decides to get out of the way.
In Sub-Level 3 of the Ministry of Energy auxiliary data center on Shariati Avenue, the silence is absolute. Twenty-three banks of servers hum at a frequency below human hearing. The man who stands at the terminal in the center of the room has been here for eleven minutes. He has six minutes remaining.
He types a forty-two character password from memory. A progress bar appears.
It contains one file. The file has one name.
PROTOCOL MAHDI
Each percentage point of that bar represents somewhere between 180 and 240 megabytes: schematics, override codes, dormant payload architecture, activation sequences calibrated to seventeen separate pipeline junctions across three countries — each one already embedded in SCADA monitoring systems that the operators of those pipelines believe are air-gapped and therefore safe.
They are not safe. They were breached eighteen months ago. The breach left no fingerprints because it did not break anything. It integrated. It became part of the architecture. It waited.
At three hundred dollars a barrel, the cascade effects will be felt within seventy-two hours. Airlines grounded. Shipping costs tripled. Agricultural supply chains across three drought-stricken continents — broken. Governments whose social contracts are written in fuel subsidies, facing choices they have never been equipped to make.
The man at the terminal is not doing this for money.
He has done this for a reason he rehearsed once, in the room of a man who is now dead, and has not rehearsed since — because some reasons do not improve with rehearsal.
Ninety-four percent.
He does not hear the door.
The door to Sub-Level 3 weighs four hundred kilograms. Its hydraulic seal is rated at minus forty decibels. What the man at the terminal hears is only the soft final exhale of the seal as the door returns to its frame.
That sound. Just that.
He does not turn around.
"Don't stop it," says a voice behind him. "Let it finish."
One hundred percent.
He ejects the drive. He turns.
The man in the doorway is not facility security. He is perhaps fifty years old, wearing a suit, with the hands of someone who works with his hands — a contradiction the man at the terminal has learned to find dangerous. Between them: four meters of polished concrete floor.
"There is a woman in Tel Aviv," the man says, "who detected an anomaly in the network traffic from this facility. Approximately six hours ago." A pause. "She has not localized it yet."
The man at the terminal says nothing.
"Her name is Nava Amir. She built an algorithmic detection model the NSA has been trying to reverse-engineer for two years. Without success."
Another pause. Longer.
"She will find you, Cyrus."