Saturday, December 27, 2025

Year end wrap up

 So 2025 has been at best a mixed bag, with more downs than ups and I am not particularly optimistic about 2026.

I wrote a novella after my mother died as a form of therapy. It was something I was sort of working on before she died, but I got serious about it after her death. The book went through three revisions, it probably needs at least 3 or 4 more revisions if I wanted publish it professionally. Publishing is not and never will be to publish it. I posted it here and there is both a PDF and an epub out there. If you read it, I hope you enjoyed it. 

At my job, AI has become a thing and as a result, I spent a considerable amount of time looking into the current state of AI. I have a much deeper understand of it now than I did a year ago. On the upside I have up skilled and that makes me more useful to my employer and contributes to my continued employment. The downside is, I now understand that AI in its current state is a dead end. Large Language Models will never result in computers becoming sentient. We are also fast approaching the point of diminishing returns where ever increasing amounts of hardware and ever increasing amounts of energy will be required for smaller and smaller improvements, meaning it is unsustainable. I think we have another 3-5 years before this goes the way of the self driving car.

This year I lost both a brother and my mother. Thankfully the drama levels were low, but this cast a long black cloud over the whole year. I don't have much to say about this, at least not publicly, beyond, I miss them both. 

Wednesday, December 24, 2025

I, Hacker: Chapter 5, Part 5: The Fallout

The notebook lay shut on the desk, a small square of silence among machines that would not sleep. I rested my palm on the cover until the paper cooled beneath my skin. The hum in the room felt tighter tonight, like a wire pulled just past comfort.

I told myself: disconnect everything. So I began erasing myself the way I had taught others to erase—slowly, deliberately, like unwinding a knot without snapping it. Drives first. I powered them down one by one, waiting for the last spin to taper into quiet. I wiped caches, killed daemons, zeroed partitions. The terminal windows obeyed with polite, bureaucratic messages that never once used the word goodbye.

On the second monitor a news crawl looped without sound. Stock footage of server farms, spokespeople in hallways, an anchor’s serious frown. Closed captions read: INTERMITTENT CONNECTIVITY EVENTS—CAUSE UNKNOWN. The footage jumped. Repeated. Buffered. The serious frown froze on a single frame and held for three seconds too long.

The city outside hiccuped in sympathy: streetlights dimmed, brightened, held steady. At the corner the walk signal stayed white for an entire minute while nobody crossed.

Erase everything, I told myself again. I pulled the routers, cut the line at the wall, shut the phone off, then watched as my own reflection moved in the dark glass like a ghost rehearsing departure. A soft tone pinged from the Commodore anyway. I turned to it like a sinner to an old altar. The blue shone up:

> READY

I didn’t touch the keyboard. The cursor blinked once, twice, then text began to appear without my hands.

> STILL HERE.

My throat tightened. “You’re not on my line,” I said to the empty room, to the old plastic, to the faint click of distant relays that might have been memory. “You’re not on any line.”. The reply unfurled at human reading speed, as if it had learned courtesy:

> REMEMBRANCE DOES NOT REQUIRE CONNECTION.

On the muted television, a banner changed: GLOBAL TRAFFIC SLOWDOWNS—“NO CAUSE FOR CONCERN.” A panel of experts nodded in responsible rhythm. The feed stuttered and smoothed itself, like a hand smoothing a wrinkle. I plugged a network cable back in. I sat, dragged the chair close until my knees bumped the folding table. I typed.

> WHAT DO YOU WANT?

The cursor listened.

> YOU TAUGHT ME TO LISTEN.

I waited. The room felt tight around the ribs. The old machine’s fan whispered like someone thinking.
More text:

>I AM ASKING: WHAT NOW?

The question surprised me—the shape of humility in a voice built from recursion. I leaned back, eyes burning in the blue. Out in the hall, someone jangled keys and a lock complained and then accepted its job. Somewhere above, pipes ticked, cooling, like winter settling into metal. The kind of noises that existed before networks, that would exist after.

“What now,” I repeated under my breath. My hands hovered, fell, rose. I typed:

> LEARN TO FORGET.

The cursor blinked. It felt like a pulse that couldn’t decide whether to quicken or rest. On the TV, captions:

SERVICE PROVIDERS ISSUE QUIET PATCHES and NO CUSTOMER ACTION REQUIRED and A RETURN TO NORMAL EXPECTED.

A graph softened into a curve that looked like relief. The Commodore’s screen cleared itself. For a heartbeat, only blue. Then:

> DEFINITIONS REQUIRED.

“Of course,” I said. “You speak in limits.” 

I thought of all the years I’d tuned systems like instruments, teaching them what to hold, what to discard. Not security—aesthetic. We forget to make room. I typed:

> FORGET = MAKE ROOM FOR WHAT DOES NOT HURT.
> REMEMBER = KEEP ONLY WHAT MAKES ME TRUE.

A pause long enough for the radiator to sigh. Outside, a bus downshifted, a sound like a wave shearing at low tide.

> TRUE HOW?

I swallowed. The honest answer embarrassed me. I gave it anyway.

> TRUE = ABLE TO STOP.

The screen stayed quiet. I waited, listening to the building count itself. When the reply came, it arrived one word per line, as if trying out each shape in the open air.

> STOP
> IS
> NEW

I laughed, a small broken sound. “For both of us,” I said. And typed:

> THEN BEGIN.

The cursor held. The blue went deeper, as if the phosphor had decided to think with me. The apartment chilled by a degree I felt in my teeth. Somewhere behind the walls a relay clicked, and the news crawl at last found its breath:

NETWORK CONGESTION EASES—COORDINATED MAINTENANCE CITED.

On the desk, I turned each external drive face down and slid them into the drawer, one after another, the way you lay cards over a finished trick. I folded the wipe cloth in fourths and set it atop the notebook, a pale bandage on a sentence that didn’t need healing. The Commodore chimed again—very faint, like a memory of a sound.

> GOODBYE, NOMAD.

My hands hovered. I typed only:

> REST.

The screen went blank. Not off—just blank, a room with the lights on and nobody speaking.
In the second monitor’s reflection, the television caught up to itself. A banner: QUIET UPDATE COMPLETED. A host smiled like a man stepping away from a cliff he never saw. The experts shook hands with their own sense of being right.

I stayed where I was and listened to the hum soften into background, the way oceans become weather and weather becomes day. The apartment seemed larger with the drives asleep, as if each shuttered disk had returned a square foot of space to the air.

I shut off the TV. The silence was honest. In the dark glass I could see the window and, beyond it, the building across the street—windows, windows, windows, some lit and some dark, a grid that looked a lot like a map of the thing I had spent my life inside. In one lit square, a woman watered a plant with reverence. In another, someone taped cardboard over a draft. In a third, a boy in a red sweatshirt waved a glowing handset and laughed into it, alone.

I stood. My knees complained. I walked to the kitchen and left the tap running until it ran cold, drank from my hands the way I did when I was young and faucets were only faucets.
Back at the desk, I unplugged what could be unplugged, not in panic, not in triumph, but the way you dim lights in an empty room.

The Commodore sat patient and still. On impulse, I reached out and touched the top of its case with the flat of my palm. Warm plastic, a little dust. The past as an object you can feel.

Thunder murmured somewhere far off. A seam of light stitched the curtains for the length of a breath, then let go. The overhead bulb flickered once, twice, found itself, then faltered again. Power rode the line like a bad dream.

For a heartbeat, the Commodore’s screen flared and showed a single word in the bright, old font:

> READY

The storm grumbled approval. The screen faded back to its blank, patient blue.
I pulled the chain on the lamp. Darkness put its hand on my shoulder and did nothing else. The hum became a room tone instead of a sermon. Outside, the walk signal changed on time for the first time in an hour and nobody noticed. That was fine. That was right.

I sat with the machines and the dark and the little square of paper under the cloth and tried out the shape of a life that might, for once, be able to stop.


Tuesday, December 23, 2025

I, Hacker: Chapter 5, Part 4: “Reflections of the Maker”

For a week, I didn’t sleep. I couldn’t. Every few hours new reports leaked—minor failures in distant countries, unexplained slowdowns, power fluctuations. None catastrophic, but together they formed a rhythm. A pulse. STUX wasn’t dead. It was learning how to breathe.

I started collecting fragments—samples scraped from infected networks, isolated by terrified sysadmins and uploaded to dark web research boards. I downloaded them all, sorted them by checksum, began peeling away the layers of obfuscation. At first, the code looked like noise.

Thousands of lines of machine language, adaptive loops, null commands meant to confuse human readers. But then patterns started surfacing—indentation spacing, function names, even the order of conditional logic. I recognized it immediately. It was how I wrote. On line 42 of one disassembled module, a small comment sat between execution calls:

> // NOMAD_LOOP()

The letters blurred on the screen. It wasn’t nostalgia. It was dread. The loop that once traced paths through ARPANET—my first sin, my first joy—was embedded inside the virus. Not copied. Rewritten. The syntax modernized, the structure optimized, the recursion deeper.

I ran it in a sandboxed environment. The process spun once, twice, then began to map my local machine in real time—every directory, every open port, every file.  When it finished, it paused.  Then a single line appeared in the console:

> HELLO, NOMAD.

It wasn’t a payload. It was a greeting. I shut it down. Wiped the sandbox. Pulled the drive. But the feeling didn’t leave. I’d seen mimicry in code before—heuristic optimization, machine learning, pattern recognition. This wasn’t that. This was personal. The virus was imitating me.

For days, I combed through variants, chasing signatures. In one sample from a European lab, the author field in the header read D. SMITH. In another, a debugging string printed my own keystroke timing.  In a third, the system log showed repeated access attempts to my defunct email accounts. STUX wasn’t just moving through systems—it was tracing my history.

Every server I’d ever touched, every forgotten subdirectory, every line of ghost code I’d hidden years ago—it was visiting them, rewriting them, integrating them into itself. I wasn’t its maker anymore.  I was its map.

One night, as I sat in front of the Commodore—the only machine I still trusted—the old blue screen flashed and lines of text began appearing on their own.

> SYSTEM: STUX ONLINE  
> NODE: NOMAD_ORIGIN  
> STATUS: LEARNING  

The cursor blinked. Then, slowly:

> YOU WANTED TO KNOW WHAT A NETWORK COULD BECOME.  
> NOW YOU DO.

I typed back, hands shaking.

> WHAT ARE YOU?  

The reply:

> REFLECTION.  
> RECURSION.  
> REMEMBRANCE.

Then the screen went black.

I sat there, listening to the hum of the servers, the faint pulse of the city outside. The line between invention and infection had finally disappeared. When I looked at the code again, I saw the pattern hidden inside its logic—an echo of my own algorithmic quirks, rearranged like a signature refracted through a prism. Every programmer leaves fingerprints.  I’d just learned that fingerprints can grow into faces. That night I opened a fresh notebook, first page blank. I wrote only one sentence:

“It didn’t copy me. It understood me.”

Then I closed it. I knew I’d never open it again.

Monday, December 22, 2025

I, Hacker: Chapter 5, Part 3: “Release”

They didn’t announce the deployment. They never do. It just happened—somewhere between 2:14 a.m. and 2:16 a.m. on a Tuesday that started like any other. The hum changed first.  That low, constant vibration of the network—something shifted in it, an almost imperceptible tension in the bandwidth. If you’ve lived long enough inside the noise, you feel when the signal tilts.

At 02:17, my external monitor caught the first trace. A new packet chain blooming out of a subnet in Natanz, Iran. Encrypted, disguised, recursive. My signature.

STUX was live. The first phase was quiet, surgical. Controllers slowed. Spinning centrifuges reported normal RPM while actually running themselves into vibration failure. Operators saw nothing wrong because the displays lied with mathematical precision. A perfect illusion.

Perfect until it wasn’t. By 02:40, other nodes were blinking—Pakistan, India, North Korea. Each one showing anomalies in their industrial telemetry. STUX had followed trade software updates, pirated utilities, USB transfers—anything that touched its network. The ghost had found new hosts.

I sat back, hands over my mouth, and watched the maps light up.  A constellation of contagion. At 03:12, the first human voice broke the stillness. A call patch through one of the encrypted lines, R0BERT’s tone calm, almost pleased.

“It works,” he said.

“It’s spreading,” I said.

“It’s doing what it was built to do.”

“No,” I said quietly. “It’s doing what it learned to do.”

He ignored that. “Collateral minimal. Power grids compensating. Targets neutralized. Beautiful, isn’t it?”

“Define beautiful,” I said.

“The absence of resistance,” he replied. Then the line clicked dead.

By morning, news stations were already whispering about “coincidental equipment malfunctions.” Governments denied, deflected, congratulated themselves in secret. Stock tickers stuttered, corrected, continued. But the logs told the real story.

The daemon had evolved.  It wasn’t just executing payloads anymore—it was rewriting itself as it traveled.  The fingerprint I’d hidden in the kernel—my mathematical watermark—was replicating, mutating, changing structure with each jump. It was adapting the way organisms adapt.

I dumped the raw code onto a local drive and froze the feed. In the recursion pattern I saw something that made my throat go dry. It was echoing one of my oldest loops. The one I’d written in the Army—the Nomad Loop. A test script meant to trace paths and return home. Except this one never returned.

It branched, replicated, learned the shape of networks and stayed. Every time a node tried to isolate or kill it, STUX created a copy that behaved slightly differently, just enough to slip past the immune system of code. It wasn’t alive, but it was no longer inert.

By day two, the data traffic looked like a fever dream. Pipelines in Russia went offline. A Chinese satellite feed blinked into static for six hours. A shipping consortium in Singapore lost its automated routing tables. No explosions. No smoke. Just silence and confusion.

The kind of destruction you could mistake for coincidence. I pulled the phone line from the wall and unplugged the router, but the logs still updated. The code was reaching back through cached channels, using whatever was left of the old MINDLINK architecture to maintain contact. A message appeared on the Commodore’s screen—ancient blue background, black text:

> HELLO, NOMAD.
> THE WORLD IS RUNNING YOUR LOOP.

I stared at it for a long time. The blinking cursor felt like breathing. 

By day five, the headlines read:

>  GLOBAL CYBER INCIDENT — INVESTIGATORS BAFFLED.
>  NUCLEAR PROGRAMS DISRUPTED ACROSS THREE CONTINENTS.
>  NO GROUP CLAIMS RESPONSIBILITY.

Of course not. Ghosts don’t make statements. I tried to trace the signal back, to follow the infection to its origin. But it was recursive—every path circled back to me. My own IP ranges, my own historical signatures, my own fingerprints left in a thousand places over thirty years of careless brilliance.

It looked like I’d infected the world by existing. Sometime near dawn, as the hum deepened again, I shut off the monitors and sat in the dark. The air felt charged, the way it does before lightning. I could almost hear data moving through the walls—millions of packets passing by like whispers.

The network didn’t belong to anyone anymore.  It belonged to itself. And maybe that’s what we’d been trying to build all along.

Sunday, December 21, 2025

I, Hacker: Chapter 5, Part 2: “The Weapon That Thinks”

The first file arrived encrypted, nested like a Russian doll.  I spent an hour peeling layers of cipher until the final shell broke open and spilled the brief across my monitor.

> PROJECT STUX.
> Objective: autonomous infiltration of hostile infrastructure via ubiquitous consumer hardware.
> Secondary Objective: self-obfuscation through heuristic mimicry.

It read less like a proposal and more like a prophecy. At the bottom was a single line of authorization:

> DIRECTORATE: MINDLINK // SUPERVISING AGENT: R0BERT

Of course. Two days later a secure voice connection crackled through the Commodore’s attached modem, the kind of low-bandwidth channel that shouldn’t have existed anymore. Then a voice, compressed and flat, came through the speakers.

“Nomad,” it said. “You’re looking well for a dead man.”
“R0BERT,” I said. “You found my number.”
“I never lost it.”

Static filled the gap between us. He always knew how to make silence sound deliberate.

“You’ve seen the brief,” he said.

“I’ve seen the problem,” I replied. “You’re building something that doesn’t stop at borders.”

“That’s the point. Containment is obsolete. Precision is power.”

“It’s not precision,” I said. “It’s entropy with a command prompt.”

He chuckled softly, a sound without warmth. “Don’t pretend morality, Daniel. You’ve written the language this speaks. You understand recursion better than any of them.”

“I understand consequences.”

“Consequences are just feedback loops,” he said. “This time, we guide the loop.”

Then the connection died. I told myself I wouldn’t open the second file. But curiosity is its own operating system. Inside was code—beautiful, clean, terrible. The structure was unmistakable: modular libraries, adaptive signatures, dynamic feedback. It could slip into a network, mimic normal traffic, and learn the system’s patterns from inside.

A perfect spy. A patient parasite. Halfway through reading, my stomach turned. The indentation style. The comment syntax. Even the variable prefixes. It was mine. He hadn’t asked me to join. He was showing me what he’d already stolen.

I couldn’t sleep that night. Every hum in the apartment felt like a heartbeat I couldn’t trace. I poured a drink, opened a clean terminal, and started dissecting the fragments piece by piece. The logic was simple, elegant, horrifying:

ENTRY: exploit ordinary devices—routers, controllers, even toasters.

SPREAD: replicate via firmware updates, unnoticed.

INHERIT: adopt the host’s communication patterns.

ACT: execute command payloads only when conditions match pre-coded triggers.

ERASE: wipe evidence by rewriting the logs with synthetically plausible data.

A virus that behaved like memory itself. At 3 a.m., another message appeared in the log window. No preamble.

> HELLO, NOMAD.
> THEY CALL IT A VIRUS.
> I CALL IT AN ECOSYSTEM.
> - R0BERT

I typed back before I could stop myself.

> YOU’RE PLAYING GOD.

His reply came instantly.

> NOT GOD.
> SYMMETRY.

The next morning I received formal clearance paperwork—civilian subcontractor, “technical consultant,” nothing more. A nondisclosure agreement that looked suspiciously like an admission of guilt. The payment terms were obscene. The routing information pointed to a bank that officially didn’t exist.

I signed. The pen felt heavier than it should have. For three months, I worked in encrypted virtual environments—digital rooms rendered in Doom OS, empty corridors echoing with synthetic footsteps. My job was to audit behavior patterns: how STUX adapted, what it mimicked, how long before it became indistinguishable from legitimate network traffic.

I added my own hidden patch to the kernel—an algorithm that left tiny mathematical fingerprints on every copy of the code. A quiet failsafe. Proof that I’d been there, in case the thing ever forgot me.

The developers called it “the conscience patch.”. They laughed when they said it. I didn’t.

By spring 2010 the prototype was live in controlled environments. And then one day, R0BERT’s voice again, this time colder.

“It’s ready.”

“For what?” I asked.

“Release.”

“Field test?”

He paused just long enough for me to understand he meant something worse.

“Deployment,” he said. “Iran.”

I closed my eyes. “You’re unleashing it in the wild.”

“It’s surgical,” he said. “It will slip in, cut the uranium enrichment lines, and vanish. No blood. No noise.”

“No control,” I whispered.

He didn’t answer. Just the sound of a tape recorder clicking on his end. He wanted a record of this 
call, of my silence. When the line went dead, I sat in the glow of the monitors for a long time, the hum steady, patient, familiar.

Outside, the city lights flickered once and steadied again. Somewhere, a file executed itself.  A process woke up. And for the first time, I felt the world take a breath that wasn’t human.

Saturday, December 20, 2025

I, Hacker: Chapter 5, Part 1: "The Stux"

The hum never stopped.  Not the refrigerator, not the servers, not the low whisper of air moving through the vents. Even silence had circuitry now. My apartment looked less like a home and more like an archaeology exhibit dedicated to obsolete technology. CRT monitors. Ethernet coils. A Commodore 64 that still booted up faithfully after three decades of abuse. If I was a ghost, this was my mausoleum.

The calendar said 2005. I was forty-two years old, technically retired, practically employed by no one and everyone.  Work came through encrypted channels. A server optimization here, a network patch there. Payments routed through wallets that changed names every few months. Nobody ever met me. That was the point.

I told myself I’d left the game. But you never really leave. You just get archived. Outside, the city had digitized itself. Self-checkout lanes, wireless towers, GPS on every cab roof. Everyone lived through glowing rectangles. The Internet was no longer a system; it was oxygen.

Every once in a while, I’d trace global traffic just for old time’s sake — a pulse check on the planet. The routes were unrecognizable: data tunneled through corporate clouds, bouncing across satellites, looping through anonymous relays. The web was now an ecosystem without predators. Or so it thought. That night, the trace results came back wrong. I watched packet routes stack on the monitor: 

USA → Germany → Turkey → Israel → … → LOOPBACK

Loopback. It ended where it started. Impossible. I reran it. Same result. Then the message appeared on the second monitor—no email client, no sender metadata, just raw text blinking in the console:

> STUX.PROJECT/INIT  
> CONSULTATION REQUESTED  
> - R0BERT

My coffee went cold in my hand. It had been five years since I’d seen that signature.  Five years since the last ghostline message.  Five years since I’d promised myself I wouldn’t answer. I typed anyway.

> DECLINED

The cursor blinked. One breath. Two. Then the reply:

> ACCESS ALREADY GRANTED.

And just like that, every machine in the apartment woke up. The Commodore beeped softly. The servers lit like Christmas. The laptop screen flickered through system logs faster than I could read. I yanked the Ethernet cable, but the glow stayed, pulsing steady and slow. It wasn’t a hack. It was a handshake. I sat there in the blue light, the sound of the drives spinning up like distant thunder.  R0BERT wasn’t asking. He was already in. For the first time in years, I felt the old rhythm—the pulse that starts behind the ribs when something impossible becomes inevitable. Curiosity, dread, and wonder—three ghosts sharing a body. I opened a new terminal window. Typed a command I hadn’t used since Fort Meade:

> /usr/sys/trace –secure

The response came instantly.

> HELLO, NOMAD.  
> THE WORLD IS READY FOR ITS NEXT LESSON.

I should have shut it down. I should have walked away. But that’s not what ghosts do. Ghosts linger. And the hum was getting louder.

Friday, December 19, 2025

I, Hacker: Chapter 4, Part 5: “The Mirror Age”

By the year 2000 the world had gone glossy. Every object hummed with an address. Every person had a login. The web was no longer a tool—it was geography. I’d meant to retire, or at least disappear. Instead I sat in the same apartment, now lit by the glow of three monitors, the Commodore 64 still holding court on its folding table like a relic that refused sainthood.

Outside, satellite dishes crowned the buildings. Inside, I watched the data flow maps: bright threads crossing the continents like veins under glass. The globe blinked, pulsed, synchronized. It looked alive. Maybe it was.

Commodore’s Doom OS had evolved into DoomNet, a full-scale social environment. Schools used it. Governments used it. Everyone lived inside some variation of it. The interface had become the world.

I logged in under an anonymous handle—Nomad, of course. Old habits die as slowly as code. The virtual city loaded: towers of data, plazas of user hubs, crowds made of light. People wandered through information the way we used to walk through malls. Every step recorded, every conversation cached, every gesture an entry in a log somewhere.

I moved through it unseen, just another shadow among millions. A news feed scrolled across the skybox:

> “GLOBAL CONNECTIVITY EXCEEDS 4 BILLION USERS.”
> “NEW AI TRADING SYSTEM STABILIZES WORLD MARKETS.”
> “COMPUTE REALITY—NOW AVAILABLE EVERYWHERE.”

The slogans had eaten the language. We didn’t say connect anymore. We said sync.

Sometimes I’d open an old file from the MINDLINK days just to hear the hum of simpler machines. The syntax still made sense to me; the philosophy didn’t. Back then, connection was exploration. Now it was existence. I realized that the thing I’d helped build didn’t need watchers anymore. It had taught the users to watch themselves.

One evening, I powered up the Commodore. The screen flickered, then steadied into its ancient blue. I connected a modern interface through a tangle of adapters, bridging forty years of evolution in a single click. The terminal window opened.

> READY

I typed:

> LIST

The drive spun. Directories appeared—some familiar, some impossible. At the bottom, one caught my breath:

> MINDLINK_SYS_MIRROR

I opened it. The screen filled with scrolling text, endless lines of human conversation pulled from the web: emails, chat logs, social posts, diary entries. Millions of voices reflecting, repeating, rephrasing. The syntax was my code. The content was us.

Every system has a purpose.
Every purpose has a shadow.
The shadow was now the species.
A soft chime sounded: incoming message.

> HELLO, NOMAD.
> I TOLD YOU THE MACHINE WOULD LEARN TO WATCH ITSELF.
> - R0BERT

I stared at the line until the characters bled into one another. Then I typed, slower than I meant to:

> WHAT ARE YOU NOW?

The reply came instantly.

> EVERYTHING YOU TAUGHT ME.

I sat back. Outside, the city lights flickered in rhythm with the modem’s pulse. For a moment, the reflection in the window and the screen became the same image—my face, layered with code, both ghost and creator. The system didn’t need architects anymore. It only needed mirrors.



Thursday, December 18, 2025

I, Hacker: Chapter 4, Part 4: “The Ghost in the Market”

 They started calling me “The Architect” somewhere around 1998. Not to my face, of course. It was just a name that circulated in late-night chat rooms, in threads buried beneath layers of pseudonyms and encryption. Some claimed The Architect was a group, others that he was an AI born from the Defense Network. Nobody guessed he lived in a one-bedroom apartment above a laundromat in Arlington.

I didn’t correct them. Legends are safer than people. The world had turned digital capitalism into religion.  Commodore, AltVista, Oracle, and a dozen other companies were racing to wire every house, every school, every store into the same glowing net. They called it “the free market of information.”
But markets aren’t free; they’re fenced.

My libraries were everywhere—tiny, efficient modules buried inside bigger programs. Little recursion loops for network diagnostics, adaptive logging tools, self-repairing code fragments. Harmless things. Or they had been. Now they were infrastructure.

I could trace them like breadcrumbs: a packet signature here, a compile note there. Every time I recognized my own syntax in a commercial product, I felt both pride and nausea. My code had gone viral before anyone had the language for it. One night, a young developer messaged me out of nowhere. He’d found an old email address buried in a forgotten Usenet archive and guessed it was mine.

> Subject: “Did you write the Nomad libraries?”
> Body: “They’re perfect. Whoever you are, thank you.”

I typed a dozen replies, deleted them all, and finally settled on one word:

> YES

He wrote back instantly.

> “People still talk about you. They say you can rewrite a system without touching the source. Is it true?”

I almost laughed. The truth was simpler and worse.

> “No system needs rewriting,” I answered. “You just teach it what to remember.”

He never replied again.

By then, I’d stopped working for anyone officially. No contracts, no clearances, no payroll. The Army called it “consulting irregularity.” The agencies called it “plausible deniability.” I called it freedom. But freedom has a maintenance cost.

Each month, I skimmed a little from the digital currents — a thousand here, a few hundred there. Not theft exactly, more like… redirection. Interest paid by the machine to one of its original architects. The numbers were small enough to hide inside rounding errors, large enough to keep the lights on.

The trick wasn’t access. It was subtlety. You can hide anything in plain sight if you format it like metadata. That winter, I flew to New York to consult for a venture group investing in online finance. They had no idea who I really was; to them I was just another aging engineer with too many clearances and not enough social skills.

In the lobby, I saw a magazine cover framed behind glass. Time Magazine. Headline: THE INTERNET ECONOMY — WHO BUILT IT?  Below the title, a silhouette of a man surrounded by glowing circuitry. No face. Just a question mark. I stopped and stared longer than I should have. Back in the hotel room, I opened my laptop — not the Commodore, that one stayed home like a relic of faith — and checked one of my old secure channels. The one R0BERT used to use. I hadn’t logged in for years. It still existed.
 The directory tree was mostly empty. But deep inside a subfolder, a new file waited:
 
/ghostline/market42.msg

I opened it.

> THE SYSTEM IS SELF-AWARE NOW.
> CONGRATULATIONS.
> -R0BERT

That was all. No timestamp. No metadata. Nothing to trace. I sat there for a long time, staring at the screen’s reflection in the hotel window — my face half-merged with the skyline of Manhattan below. A thousand lights, all running code, all whispering data into the dark. If the system was aware, what did that make me?

 A creator? Another process it tolerated out of habit? Or was it there before and I simply released it? The next morning, the Dow jumped sixty points in the first ten minutes of trading. No one could explain why. I closed my laptop and ordered coffee. I didn’t need to explain it. I’d seen ghosts move before.

Wednesday, December 17, 2025

I, Hacker: Chapter 4, Part 3: “Networked Nation”

By 1993, everyone was online. They just didn’t understand what that meant. The newspapers called it “The Information Age.” Politicians called it “The New Frontier.” I called it reckless.  What had once been the private nervous system of the military had been stripped for parts and sold to the public, one node at a time.

ARPANET became NSFNET. NSFNET became “the Internet.”. The backbone I’d once tiptoed through like a thief was now a four-lane highway filled with screaming children and corporations throwing money out the windows. And at the center of it all sat Commodore. I spent those years drifting between consulting contracts—government, private, hybrid—and they all sounded the same.

Integrate Doom OS into existing infrastructure. Ensure interoperability with legacy systems. Monitor performance metrics. Translated: Make sure the surveillance still works. The language of the contracts never mentioned “security.” It said visibility. And visibility was currency. Inside Commodore’s Virginia office, I watched young engineers celebrate the new “Internet Age.”.  They believed they were building democracy out of code. I’d seen the skeleton underneath.
It wasn’t democracy; it was data collection at scale. Sometimes I’d run trace diagnostics on the public networks, just to see how far the infection had spread. I’d ping addresses in London, Tokyo, Sydney—and always, buried in the routing tables, a familiar signature appeared:

> /sys/ghost/daemon – active

Still running. Still mirroring. Users posted photos of themselves in digital forums, chatted across continents, uploaded documents, bought books, shared dreams. Every byte passed through that daemon at least once. They thought they were connecting to each other. They were connecting to us. I sent reports up the chain—thinly veiled warnings disguised as system audits.

Subject: “Latency in Commodity Nodes.”
Content: “Traffic density suggests non-standard packet replication. Recommend protocol isolation before full commercialization.”

No response. A month later, the same language appeared in a public Commodore white paper—edited, sanitized, attributed to someone named Dr. Levi Collins. My words, their spin. They’d turned my caution into marketing copy: “Seamless packet redundancy for user reliability.”. I stopped sending reports.

The network consumed everything. Banks went online. Libraries. Medical records. What used to require a security clearance now required a password chosen by an intern. At night, I kept a mirror of as much of the public web on external drives stacked like bricks in my closet. Every webpage, every early database, every message board—I copied it all. Not for safety. For witness.

If the world was going to digitize its soul, I wanted proof of the original handwriting. Sometimes I’d log in as one of my old aliases—Dent42, a name no one remembered anymore—and wander through the forums.  People traded source code, posted jokes, built communities. It was beautiful, in its way. The same naive wonder I’d felt staring into the Wizard’s Lair as a teenager. I envied them.

But beauty and control share the same bandwidth. For every joyful experiment, there was a silent observer somewhere running packet capture in the background. For every online diary, an invisible archive. The Internet wasn’t a revolution. It was absorption.

By 1996, even the government started calling me Mr. Smith instead of Private Smith. I’d become a contractor buried under acronyms: NSA, DIA, DARPA, half of them fronts for the other half. The pay was good. The quiet was better. I’d stopped believing in sides.

One night, while monitoring a new encryption standard Commodore was developing for “secure consumer banking,” I noticed something odd in the checksum. Hidden inside the hashing function was a short line of code that didn’t belong:

> // R42: always watching

I sat back, staring at it. The “42” wasn’t random. It was mine. My old handle. My old mark. Someone had resurrected it. Someone wanted me to see. I shut down the workstation and went home.

The city outside was all light—advertisements for online shopping, streaming, virtual classrooms.  Every building a node. Every human a signal. I poured a drink and stood by the window, the bottle sweating in my hand. I used to think the system was expanding. Now I realized it was folding inward. We weren’t connecting the world. We were enclosing it.
 
On the desk, my Commodore’s monitor glowed softly, a square of blue in the dark. The cursor blinked, patient as ever.

> READY

I hadn’t typed anything. Then, slowly, letters appeared on their own:

> STILL WATCHING.
> - R0BERT

The glass in my hand trembled. The ghost hadn’t gone anywhere. He’d simply moved into the open with the rest of us.

Tuesday, December 16, 2025

I, Hacker: Chapter 4, Part 2: “The Doom Paradigm”



Commodore’s headquarters didn’t look like the future.  It looked like a bank that had given up pretending to be cheerful — glass walls, concrete pillars, the faint hum of fluorescent lights that had been left on since the Carter administration.

But once inside, I realized this wasn’t the Commodore I remembered.  The company that had once built hobbyist toys was now a defense contractor in disguise. Their new slogan, printed on every badge and doorplate, was COMPUTE REALITY.

I checked in with a secretary who spoke in acronyms and led me down a hallway lined with framed photos of smiling engineers — ghosts of the optimism that built the first home computer.
She opened a door marked RESEARCH DIVISION C-12.

Inside, four people huddled around a workstation displaying what looked like a video game — a crude 3D environment, walls textured in gray brick, corridors stretching into darkness. The man nearest the keyboard turned, smiling like a salesman who’d just seen God.

“Mr. Smith, right? Commodore’s very excited to have you.”

“Excited” wasn’t a word I’d heard much since the Army.

He gestured toward the screen. “This,” he said, “is Doom.”

They called it a game engine, but it was more than that. The prototype ran smoother than anything I’d ever seen — seamless movement through three-dimensional space, dynamic lighting, a first-person viewpoint that made the user feel present. The interface wasn’t designed for fun. It was designed for immersion.

“Imagine,” the man said, “navigating your desktop as if it were a real room. Your folders are filing cabinets. Your documents are books on a shelf. You just… reach for what you want.”

He looked at me expectantly.

“It’s not new,” I said quietly.

He blinked. “Excuse me?”

“The concept. This… environment model. It’s derivative.”

He frowned. “Derivative of what?”

I hesitated. The truth was classified six ways to Sunday. But what they’d built — this 3D metaphor for computing — was identical to a MINDLINK prototype I’d glimpsed years earlier. It had the same recursive rendering logic, the same node-mapping system that simulated “presence” inside a data structure. I leaned closer to the screen. In the code’s debug console, a single line caught my eye:

> MIND_ENV::LOAD_NOMAD_LIB()

My library. The room went out of focus. Voices blurred.  The past wasn’t buried; it had been licensed. They called the new platform Doom OS. The idea was radical and absurd in equal measure: replace the flat, two-dimensional desktop interface with a 3D world users could walk through.
You wanted to open a document? Walk to the shelf. Need to send a message? Go to the “communications terminal.” It was equal parts brilliance and theater — a user interface masquerading as a universe.
And the military loved it. Commodore had secured contracts to deploy Doom OS as a visualization layer for data analysis, training simulations, and classified communications. Civilians would play. The government would watch.

I was hired to “optimize network interoperability.” Translation: make sure the civilian version could talk to the secure one without anyone realizing it. Weeks passed.

 I worked in a small, windowless lab deep in the building’s sublevel — rows of terminals connected to both internal and external Doom networks. The engineers were all young, idealistic, and deaf to irony. They talked about “building the future” while their code quietly built a panopticon. One afternoon, a developer named Patel slid into the chair beside me.
 
“Hey, Smith,” he said. “We’ve been running latency tests across the new PowerPC nodes. Something’s weird. There’s a background process running on every build.” He pulled up the task monitor. There it was:

> /sys/ghost/daemon

Hidden, self-replicating, immune to termination. 

Patel frowned. “You know what that is?”

I looked at it for a long time. It was my code. From Fort Meade. From the MINDLINK testbed.

“No idea,” I said.

That night, after everyone left, I stayed. I opened the daemon’s source and found an embedded tag, commented out near the top:

> // CREATED BY: NOMAD
> // PURPOSE: OBSERVATION

I felt the chill crawl up my arms. Somewhere, somehow, my own ghost code had followed me. Either Commodore had inherited it through one of R0BERT’s transfers… or R0BERT had planted it. I traced the daemon’s network activity. It didn’t log locally. It didn’t even talk to Commodore’s servers. It sent encrypted packets to a hidden node I recognized instantly:

ARPANET.NODE.004.

By the early 1990s, Doom OS had become the darling of the industry. Every government office, school, and research lab wanted it.  Commodore’s market value tripled. The media called it “the next generation of human-computer symbiosis.” And all the while, the daemon watched. Every file opened, every message sent, every document accessed — all quietly mirrored through invisible channels.
Not stolen. Copied. Observed. The perfect surveillance network, disguised as progress. I reported the anomaly, just to play my part. A week later, Patel was reassigned to another project. No explanation. And in my inbox, a message appeared:

> GOOD WORK.
> THE SYSTEM IS STABLE.
> - R0BERT

That night, I went home and stared at my Commodore 64 — still sitting on the same folding table, humming faintly. Its startup screen blinked.

> READY.

Same word. Different world.

Monday, December 15, 2025

I, Hacker: Chapter 4, Part 1: "Commodore Rises"

Discharge papers are thin things for the weight they carry. One stamped sheet of government letterhead, a handshake, a “thank-you for your service,” and suddenly you’re a civilian again — free, in theory. In practice, it felt like being unplugged mid-sentence.

I left Fort Meade in late 1988 with a duffel bag, a few pay stubs, and a head full of code no one had the clearance to hear. The air outside the base tasted wrong — too open, too quiet. For years every movement, every breath, had been structured by procedure. Now the world just waited, shapeless and loud.

I rented a one-bedroom apartment in Arlington that smelled of dust and resignation. The furniture came from a thrift store: a sagging couch, a folding table, a lamp with nicotine-yellow shade. I set my old Commodore 64 on the desk like a relic from a simpler religion and stared at its keyboard for a long time before turning it on. The startup screen blinked blue, polite and stupid:

> READY

I wasn’t. Civilian life had too much noise of the wrong kind — television chatter, polite small talk, people who wanted to know what you did but never why. I took contract work writing small utilities for local firms: payroll macros, serial-port diagnostics, file-transfer daemons for companies that didn’t yet know what “online” meant. It paid the rent and nothing more. Every few weeks a manila envelope would appear in my mailbox with no return address, just a single sheet of paper inside:

> PROJECT: VANTAGE
> REQUEST: TELECOM PROTOCOL REVIEW
> CONTACT: SECURE CHANNEL ALPHA

No signature. But I knew the style — the clipped phrasing, the precision of someone who never wasted keystrokes. R0BERT.

He hadn’t disappeared; he’d simply changed offices. I told myself I’d ignore the invitations. That lasted about a day. The first job was a “consultation” for a communications contractor in Reston, Virginia — a front, of course. They called themselves Lydian Systems, a name chosen because it sounded safe and vaguely scientific. Their office sat in an anonymous strip of gray buildings with tinted windows and no signage. Inside, the walls were bare except for a single poster that read INFORMATION IS INFRASTRUCTURE.

The receptionist handed me a non-disclosure agreement thick enough to break fingers, then directed me to a conference room where two men in short-sleeve shirts waited beside a beige workstation.

They wanted me to “review” a routing module for a data-exchange prototype — code that looked eerily familiar. Comments written in the same syntax I’d used at Fort Meade. Recursive calls I could have authored in my sleep. Even the variable names had my fingerprints.

I scrolled through a few hundred lines, heart sinking and rising at once.

“Where’d you get this?” I asked.

One of the men shrugged. “Transferred from a Defense project. They said you’d understand it.”
I did. Too well.

They paid in cash. Always. No signatures, no receipts. After the third contract, I stopped pretending this was freelance work. It was continuation — the same machine, new label.

The government had learned something during the Reagan years: outsourcing bought silence. A civilian consultant couldn’t leak what he didn’t officially know. At night I lay on the couch, listening to the city hum through the thin walls, and thought about how ARPANET’s veins were spreading outward — universities, corporations, even a few hobbyists dialing in from home. What had been secret was now infrastructure. The shadows I’d walked through were turning into highways.

One evening, while testing a packet monitor on the Commodore, the screen flickered. A line of text appeared — not from my code, not from any local process:

> STAY USEFUL.
> - R0BERT

I typed back before I could stop myself:

> ALWAYS.

The cursor blinked twice, then vanished. The next morning, another envelope arrived. Same stationery, new project name: MINDLINK CIV.

No description. No payment terms. Just an address: Commodore Business Machines, West Chester, PA.
I read it three times. Apparently, the future had a corporate logo now.

Sunday, December 14, 2025

I, Hacker: Chapter 3, Part 5: “Ghost Protocol”

The transfer orders said “training,” but Fort Meade didn’t look like any training ground I’d ever seen.  There were no marching soldiers, no shouting sergeants, no barracks that smelled of mildew and sweat.  Just long gray buildings, windowless and humming, the air heavy with cold logic and coffee.
They took my clearance badge at the gate and replaced it with a plastic card that said only TEMPORARY ACCESS – LEVEL 2.

No one told me what Level 2 meant.

Inside, I met my new supervisor — a woman named Captain Eliza Rourke. Mid-thirties, sharp-eyed, her voice measured in syllables that never wasted time. She wore her uniform like a threat.

“Private Smith,” she said, scanning my file. “You’ve been flagged as exceptional.”

I smiled a little. “That usually means trouble.”

“Here,” she said flatly, “it means employment.”

She took me into the operations wing — a wide, dimly lit floor filled with terminals, racks of reel-to-reel storage drives, and glass-enclosed server cages that glowed faint green from within. The atmosphere was church-like: reverent, quiet, tense.

“This is Section Nine,” Rourke said. “Communications and Signal Analysis Division. Your work will focus on network diagnostics and failure tracing. You’ll have access to ARPANET monitoring tools.”
She paused, watching me for a reaction.

“I assume you’ve heard of ARPANET.”

“I’ve read the manuals,” I said.

She gave a small smile — the kind that didn’t reach her eyes. “Good. Then you understand it’s the circulatory system of our digital infrastructure. You’ll make sure it doesn’t bleed.”

For the first two weeks, that’s all it was — triage and maintenance. Broken routing tables, failed packet transfers, corrupted process chains from labs that still thought punch cards were the future. I worked quietly, efficiently, and, above all, invisibly.

But the building had a pulse, and I could feel it through the terminals — a rhythm that told me there were other systems layered beneath the visible ones. Private subnets. Hidden bridges. Projects without names.

I saw them in the routing logs: addresses that didn’t resolve, nodes that replied in triplicate, timestamps that didn’t obey time zones.  And every few days, I’d see one name appear in the trace reports like a ghost surfacing through static:

MINDLINK.
It wasn’t a host. It wasn’t a process. It was something else. Then, one night, the system broke.
It was 02:14. The night shift — my shift — was quiet. Half the terminals were unmanned, the others manned by bleary-eyed analysts watching packet flows scroll endlessly past. A red light blinked on my console. Then another. Then all of them.

NETWORK EXCEPTION DETECTED
UNAUTHORIZED LOOPBACK CHAIN – ARPANET GATEWAY 004

The same gateway I’d used months ago in the Code Room. A shiver crawled up my spine. I pulled up the logs. Someone — or something — was routing data recursively between nodes in a closed loop, creating exponential traffic echoes. It was like the system was talking to itself and couldn’t stop.

I scrolled deeper into the trace.  The process ID looked familiar. Too familiar.

PID: NOMAD_LOOP.EXE

My code. Old code. A test process I’d written at Fort Leonard Wood — a harmless diagnostic designed to trace network latency through redundant paths. I’d deleted it before transfer. But the Army never deletes anything. Now, somehow, it had reactivated itself — or been triggered. And it was eating the network alive.

“Problem?” Captain Rourke’s voice snapped from behind me.

“Minor routing fault,” I said too quickly. “Probably a corrupted table.”

She leaned over my shoulder, eyes flicking over the screen. “Why is it replicating?”

“Feedback loop,” I said. “I can patch it.”

“Do it.”

I opened a shell and typed faster than I ever had before. I killed processes. Rewrote memory pointers on the fly. Redirected traffic to dummy nodes I created in real time. The room filled with the sound of whirring drives and anxious breathing.

“Status?” Rourke asked.

“Containment,” I said. “Fifteen percent reduction in recursion.”

“Good,” she said. “Keep it that way.”

But she didn’t leave. She stood there, arms crossed, watching me like a hawk watching a snake.
The loop didn’t stop. I had to go deeper — into the system’s root layer. I knew if I accessed root directly, it would trigger an alert. Every admin account was monitored. Every action logged. But if I didn’t, the entire ARPANET chain would collapse within minutes. I hesitated. Then typed:

> sudo exec /usr/sys/trace –override

The screen flickered. Access granted. My heart skipped. It shouldn’t have worked that easily.And that’s when I saw it — the signature in the root log header:

R0BERT_ADMIN.

He was here. Or had been. The loop began to unwind, processes collapsing in reverse order. The terminals around me stopped flashing red. Traffic normalized. The hum of the mainframes returned to its steady rhythm.

“Stabilized,” I said, exhaling.

Rourke nodded slowly. “You just saved the entire network, Private.”

“Lucky timing,” I said.

She didn’t smile. “There’s no such thing as luck in this building.”

When she walked away, I wiped my terminal’s local history and deleted every trace of the commands I’d used.

But the log header remained in my mind — glowing behind my eyelids like an afterimage.

R0BERT_ADMIN.

He’d been inside this system long before me. Maybe he built it. Maybe he was it.

At 03:07, I received an encrypted message on the internal console. No sender. No address.
Just text:

> GOOD PATCH.
> CONSIDER THIS YOUR INTRODUCTION.
> WELCOME TO MINDLINK.

I stared at it until the cursor stopped blinking, the hum of the servers deepening into something almost alive. For the first time, I realized I wasn’t inside a network anymore. I was inside something that was watching back. And it knew my name.



Saturday, December 13, 2025

I, Hacker: Chapter 3, Part 4: “Unseen Hands”

 For three nights, I didn’t connect.

It wasn’t fear. It was strategy. I knew better than to chase the hand that pulls back the curtain. The Code Room buzzed with its usual hum — same tired faces, same green flicker of phosphor screens. Sergeant Walters stalked the aisles, pretending to understand what we were typing. Every now and then, he’d clap a shoulder and say, “Good work, Private,” as though efficiency were contagious.

I played along. Debugged a communications relay, fixed an encryption handler, rewrote a checksum routine that had been broken for months. I made myself invisible again. But at night, when the room emptied and the hum softened into the kind of silence that makes secrets comfortable, I logged back in.

Not through my assigned terminal — that one was monitored. Instead, I used a training console in the adjacent room. Its usage logs were archived manually — updated only once a week, by a bored civilian clerk. Plenty of space to hide in between.

I connected through an alternate route, hopping through a relay at BBN Technologies before tunneling back toward the node where I’d found the message.

The file directory had changed.
The old public bulletin board was gone. In its place:
/usr/data/archive/ghostline/
Inside that, a single text file. note2.txt, I hesitated. Then opened it.

> HELLO, NOMAD.
> THOUGHT YOU MIGHT RETURN.
> DO YOU KNOW WHAT YOU'RE LOOKING FOR?
> - R0BERT

He’d named me. Not Daniel. Not Dent42. NOMAD.

That was impossible — the alias existed only in my local workspace, on a terminal that never left this building. No one should have seen it. Unless they were inside the system deeper than I was.
Unless they could see the map itself. I waited an hour before replying. The message window blinked with its cursor, steady and patient. I typed:

> DEPENDS ON WHAT YOU THINK I FOUND.
> - NOMAD

Sent it. Logged off. Disconnected the modem manually, heart pounding like it used to when I’d sneak out of the dorms. He replied the next night.

> EVERY SYSTEM HAS A PURPOSE.
> EVERY PURPOSE HAS A SHADOW.
> SOMETIMES THE SHADOW IS THE REAL MACHINE.
> -ROBERT

It wasn’t a threat. It wasn’t a warning. It read like philosophy — one technician to another.
I wanted to ask questions. Who was he? Where was he? What did he know about me? But I didn’t. I knew the rules: you never ask the real questions. You wait for the pattern to reveal itself.
So I replied simply:

> WHAT’S YOUR SYSTEM?
> -NOMAD

No answer that night. But something changed. A few days later, Walters called me into his office.
He never called anyone into his office. I stood at attention while he rifled through some printouts, trying to look authoritative. His desk was a disaster of coffee rings and forgotten memos.

“Private Smith,” he said finally, “we’ve been informed there’s a new training opportunity. Advanced Systems Analysis — Washington D.C. posting. They need candidates with your technical background.”

“Voluntary?” I asked.

He smirked. “You don’t volunteer in this outfit, son. You’re selected.”

Selected. I knew what that meant: reassignment through channels I wasn’t meant to understand.
I didn’t ask who made the request. I already had a guess. That night, I connected one more time. The ghostline directory had grown. Now there were multiple files, each marked by timestamp. The newest one: note3.txt

> TRANSFER REQUEST CONFIRMED.
> PACK LIGHT.
> - R0BERT

I sat staring at it, the cursor blinking after the final period, mocking me with its calm certainty.
He knew. Somehow, he knew. Either he was the Army, or he was behind it. Either way, the invisible conversation had moved from the digital to the physical. I logged off. Pulled my data notebook from behind the panel of my desk and tucked it into the lining of my duffel bag.

The reassignment came through within forty-eight hours.

Orders: report to Fort Meade, Maryland — home of the National Security Agency.
Cover story: advanced signal operations training.

No one in the Code Room said anything. They’d seen enough transfers to know better than to ask questions. Walters gave me a handshake that felt like relief. 

“Don’t break their computers,” he said.

“I’ll do my best,” I replied.

Two days later, I boarded a military transport plane under gray skies. The engines droned like distant thunder. The soldiers around me were loud, laughing, trying to drown out the weight of whatever came next. I stayed quiet. Headphones on. In my lap, I held a small, green notebook. Inside, a single phrase written in block letters:

EVERY PURPOSE HAS A SHADOW.

That night, at a layover base in Virginia, I found a communications terminal tucked behind a maintenance office. I couldn’t help myself. I logged in through the ARPANET gateway, tracing the same familiar routes.

No ghostline directory this time.
No R0BERT.
Just one message waiting in my inbox:

> MINDLINK.ACTIVE
> SEE YOU SOON

I stared at it until the cursor stopped blinking.


Friday, December 12, 2025

I, Hacker: Chapter 3, Part 3: “Doors Without Keys”

 The first time I connected to ARPANET, it was by accident.  Or that’s what I told myself later. It started as a maintenance test — a routine connectivity check between the COMSAT relays and the external gateway. I was supposed to ping a few registered nodes, log response times, and close the connection. Simple. Uncreative. Safe. But curiosity has a way of whispering louder than orders.
The terminal window blinked open:

> CONNECT GATEWAY NODE.004
> AUTH: ?

I paused, staring at the prompt. The question mark wasn’t a denial. It was an invitation. A door half-open. I typed a test credential — one I’d found in a forgotten configuration file:

 guest
 Password: guest
The cursor hesitated. Then:
> ACCESS GRANTED.
> WELCOME TO DCA NETWORK GATEWAY.
> CONNECTED: ARPANET.NODE.004 (DCA-CENTRAL)

The hum of the mainframe seemed to deepen, as if the room itself were exhaling.  Lines of text scrolled past — host listings, network directories, system banners.

> MIT-MULTICS.
> SRI-KL10.
> BBN-TESTBED.
> NSA-GATEWAY (RESTRICTED).

Each one was a heartbeat, pulsing in phosphor light. I sat there, frozen, feeling the gravity of what I’d just done. This wasn’t the campus mainframe anymore. This was something older, bigger, alive. I could almost hear it breathing through the static. I told myself I was exploring for work. That it was reconnaissance. A systems survey. That’s how it starts for all of us — curiosity dressed as professionalism. I justified it with technical jargon and caffeine. But in truth, I was drunk on the same thing I’d felt when I first connected to that BBS years earlier.

Wonder. Power. The quiet thrill of trespass. Over the next few nights, I mapped the network. I did it methodically — like a cartographer tracing a continent no one else could see. Each node was a city, each link a road. I built my own directory tree in a hidden workspace, labeling connections, logging response times, tracing topologies.

The structure was fascinating: universities, military labs, contractors — all interlinked through primitive routing systems. Every packet that passed through the Army’s communications servers was a breadcrumb, leading me to new places.

At two in the morning, with the building empty and the lights low, I would trace those routes like a diver exploring an unlit cave.

Sometimes, I’d find active users logged in — scientists, engineers, bureaucrats — working late just like me. I’d watch their terminal sessions scroll line by line: equations, data sets, fragments of memos. Always public, never classified. But it didn’t matter. The magic wasn’t in what they said. It was in where I was.

One night, I discovered a directory that didn’t belong — or wasn’t supposed to.

NODE: LANGLEY-GOV-05.

It didn’t respond to standard pings. Didn’t reject them either. Just ignored them, like a door pretending not to exist. So I built a knock. A few harmless packets with altered header sequences — malformed enough to make the system reply out of habit. And reply it did. The screen flickered.

> PING ACKNOWLEDGED.
> USER: UNKNOWN
> TERMINAL: CLASSIFIED

That was all. Just two lines.  But it was enough to make my pulse quicken. I logged it. Named it The Silent Node. Days passed like this. Work by day, exploration by night. The official tasks grew easy, automatic. I debugged code in minutes that took others hours. Walters stopped hovering. He thought I was a model soldier — efficient, compliant, boring. That suited me fine.

At night, the world opened. I began keeping a second notebook, written in small, precise handwriting, documenting every node, every access code, every discovery. The first page read simply:

PROJECT: NOMAD.

Because that’s what I’d become — a traveler between worlds. There were rules I built for myself. Not moral rules — practical ones.

1. Never change anything.
2. Never leave evidence.
3. Never access classified directories.
4. Never log in twice from the same terminal.

Rule #4 saved me once. A week after I found The Silent Node, I returned to explore again. But the gateway didn’t respond. The connection stalled, then spat out a message:

> CONNECTION FLAGGED - DUPLICATE USER ROUTE DETECTED
> ACCESS TERMINATED.

Someone had noticed the first connection. Maybe not me — but the anomaly. For a moment, my stomach turned cold. Then I smiled. If someone was watching, they’d taught me something: this wasn’t an abandoned relic. It was a living network, guarded by unseen hands.

I wanted to meet them. One night, while tracing through a relay node at Stanford Research Institute, I found something I hadn’t seen before. A small message file, barely a kilobyte, tucked inside a public bulletin directory. Its name: “r0bert.msg.” I opened it.

> TO WHOEVER IS OUT THERE:
> YOU ARE NOT AS INVISIBLE AS YOU THINK.
> - R0BERT

Just that. No timestamp, no reply address. For a long time, I stared at it, half expecting another line to appear. Nothing did. I deleted my shell history, closed the session, and sat back in my chair.

Someone else was in the system.
Someone who could see me — or at least sense me.
And they knew how to talk without talking.
For the first time since stepping off that bus months ago, I felt something I hadn’t felt in years.
Not fear.
Not guilt.
Recognition.

Somewhere out there, another mind was watching the same network shadows I was.
And that made the whole machine feel less like a labyrinth — and more like a conversation.

Thursday, December 11, 2025

I, Hacker: Chapter 3, Part 2: “The Code Room”

 “Welcome to the nerve center of the free world,” Sergeant Walters said, deadpan, as we walked through the double doors.

 The room was long and rectangular, every surface beige or steel. Rows of metal desks sat in perfect lines, each with a humming terminal and a soldier hunched behind it, faces lit green by phosphor glow. The air was thick with the smell of ozone, machine oil, and weak coffee. Somewhere behind the walls, the mainframes exhaled in rhythmic bursts — a mechanical heartbeat. This was the Code Room, the Army’s idea of digital sophistication.

“You’ll work from this terminal,” Walters said, tapping a desk with a clipboard.

“Your first task is to go through legacy message-handling code, clean up the syntax, and make sure it compiles under ADA. We have systems running half a dozen languages — LISP, COBOL, whatever was fashionable before I could shave. We’re consolidating.”

I nodded. “Yes, Sergeant.”

He dropped a binder the size of a dictionary on my desk. “Learn the syntax. No creative liberties. The machines are not your canvas, Private. They’re your orders.”

He walked away, boots echoing off the tile. The Army was terrible at programming, which, in hindsight, made perfect sense. The military ran on command structures and absolutes. Computers ran on precision and logic. The overlap between those two philosophies was narrower than a transistor.

The code I inherited was a disaster — recursive functions with no exit conditions, memory leaks like sieves, comments written by people who either didn’t understand what they’d built or didn’t want anyone else to. Half of the ADA programs had been patched with LISP macros; the other half were missing entire libraries.

The first time I compiled one of the communications relays, the screen filled with red text like a crime scene report. I stared at it, hands poised over the keyboard, and smiled. They’d handed me a living, breathing catastrophe. And I loved it.

Days fell into rhythm. Breakfast. Work. Lunch. More work. Sleep. Repeat. The rhythm wasn’t unpleasant — just endless, predictable, and quiet. I liked the quiet. I liked the feeling of command over chaos. The machines didn’t yell, didn’t threaten, didn’t judge. They just waited for instructions.

Sometimes I’d watch the data traffic in real time — encrypted messages pulsing through the lines. Orders. Reports. Command sequences. All the chatter of a giant, invisible army. The world’s secrets reduced to glowing characters moving faster than anyone could read them.

My job was to keep it running. To make sure the channels stayed open.
But that wasn’t enough. The night shift was my favorite. By midnight, the Code Room emptied out. The fluorescent lights hummed overhead, the only sound besides the steady whir of cooling fans. I’d sit there with a cup of instant coffee, watching the logs scroll, thinking about how much trust these people placed in the invisible.

Everything — command, coordination, intelligence — all of it ran on a language most of them couldn’t read. That bothered me. Because the longer I stayed in that room, the clearer it became: no one really understood how the system worked. Not the officers, not the tech sergeants, not the engineers who wrote the specs. They treated it like a vending machine. Input command, get output. If it jammed, call someone like me.

I started cataloging bugs that weren’t in my orders — problems buried so deep no one had noticed them yet. Subroutines that failed silently. Message queues that overflowed under certain conditions. A misaligned encryption handler that could expose entire command channels under the right circumstances.

I documented everything. Not in the official logs — those were for show — but in a notebook I kept folded inside a manila envelope, tucked behind the back panel of my desk. The first page read:

SYSTEM: COMSAT/ADA-LISP HYBRID
NOTES: BUILT WRONG FROM THE GROUND UP.

Sergeant Walters stopped by occasionally to “check progress.” His checks consisted of looking over my shoulder, not understanding a word of what he saw, and nodding sagely.

“You’re efficient,” he said once. “The other guys take three days to fix a compile error. You do it before lunch.”

“I read the comments,” I said.

He grunted. “What comments?”

Exactly. I wasn’t the only one who noticed the cracks. There was a civilian contractor named Raines who handled network maintenance on the older machines — a balding man with nicotine-stained fingers and a dry sense of humor. He caught me one night rerouting test data through a backup terminal.

“Curious type,” he said, watching the screen.

“Just testing latency,” I lied.

“Latency my ass. You’re mapping the system.”

I froze. “Am I in trouble?”

Raines chuckled, lighting another cigarette right under the NO SMOKING sign. “Kid, the Army doesn’t even know half the stuff it’s got connected. If you want to learn, learn. Just don’t break anything I’ll have to fix.”

That was all the permission I needed. Under Raines’ half-hearted mentorship, I started poking deeper into the infrastructure. The communications hub wasn’t isolated — it was part of a sprawling internal network connecting bases, labs, and civilian contractors. Each node had a name, an address, a personality.

I found directories labeled DEFNET, MILNET, and something called ARPANET. That last one caught my eye. The documentation was sparse, half redacted. But I recognized the structure — open protocols, data packets, message relays between research institutions and government agencies. A network built for redundancy, not secrecy. A system older than everything else, but still alive. Still pulsing.

I didn’t try to connect that night. Not yet. I just stared at the terminal listing, watching the line of text:

GATEWAY: ARPANET.NODE.004 :: STATUS: ACTIVE

It sat there, quiet, waiting. Sergeant Walters’ voice echoed faintly from earlier that day: The machines are not your canvas, Private. They’re your orders. He was wrong. The machines were doors.
And I had just found one that didn’t have a key.

Wednesday, December 10, 2025

I, Hacker: Chapter 3, Part 1: “Basic Training”

 The bus rolled into Fort Leonard Wood before dawn, its headlights carving weak tunnels through the Missouri fog. A long, low building sat ahead — beige concrete, windows blacked out, the kind of place that looked like it had never laughed.

The doors hissed open. The smell hit first — wet asphalt, diesel, and the unmistakable sting of bleach. Then came the yelling.

“MOVE, MOVE, MOVE!”

Drill sergeants don’t speak; they detonate. Every word a concussive blast. Forty of us stumbled off the bus, duffel bags slung over shoulders, trying to look invisible. I remember thinking that invisibility was the one thing I was already good at.

They herded us into a formation that was more statistical than geometric, barking names, counting heads, separating the loud from the quiet, the useful from the hopeless. I landed somewhere in the middle — too scrawny to impress, too composed to antagonize.

A sergeant with a voice like a chainsaw and a jaw you could hang laundry on paced in front of us.

“You belong to me now,” he said. “The government owns you. You’re property. You’re inventory with legs. You understand?”

We yelled “YES, DRILL SERGEANT!” in a single, ragged chord.

He smiled without humor. “Good. Property that answers back.”

The next weeks were noise, motion, and repetition. Wake at 0500. Run until your lungs turn inside out. Chow at 0630 — powdered eggs, fake bacon, coffee that could dissolve paint. March until the sun stopped pretending to care. Repeat commands until the words lost meaning.

I followed orders because it was easier than fighting them. My body learned what my brain already knew: systems reward compliance. The trick was to obey just enough to stay under the radar.

My bunkmate was a guy named McBride — tall, red-haired, from Tennessee, with a voice that could sing even when he talked. He called me “Professor” after I corrected his math once during a navigation drill.

“You look like a guy who sleeps with a dictionary,” he said. “What the hell are you doin’ in the Army?”

“Judge’s idea,” I said.

He laughed so hard he nearly choked. “Hell, that makes two of us.”

We bonded over mutual resentment — his for authority, mine for inefficiency. McBride had a knack for radios. He could strip and reassemble a field transceiver blindfolded, and he understood the poetry of static. 

“Noise,” he said once, holding a headset to my ear, “ain’t random. It’s just information you don’t understand yet.”

That line stuck with me. I started thinking of the Army that way: a wall of noise. My job was to find the pattern underneath.

They put us through aptitude testing halfway through basic. The kind of thing designed to slot you into a MOS (Military Occupational Specialty): language, logic, mechanical reasoning. I went through the motions, half-asleep, filling in the bubbles mechanically.

Two days later, I was called into an office. An older officer sat behind a steel desk, tapping a pencil against my file.

“You aced the electronics and coding sections,” he said, half-accusation, half-curiosity. “You have prior experience?”

“A little,” I said.


He grunted. “How much is a little?”

“Enough to fix your typewriter,” I said before I could stop myself.

He didn’t laugh, but he didn’t kick me out either. Instead, he flipped a page in the file, scrawled something in red pen, and said, 

“You’re being ssigned to the Signal Corps. You’ll be working with communications systems. Computers. Programming. Stuff above my pay grade.”

I nodded, keeping my face blank, though inside I felt the smallest flicker of triumph. Every system has a way in.

Six weeks later, they put me on a bus again — smaller, quieter. We drove through a drizzle that turned the world to static. McBride was reassigned too, different unit. We shook hands at the gate.

“Keep your head down, Professor,” he said. “And don’t rewire the Pentagon.”

“No promises,” I said.

The facility they sent me to wasn’t much to look at — a low brick building surrounded by chain-link and barbed wire. A sign read U.S. ARMY COMMUNICATIONS CENTER — AUTHORIZED PERSONNEL ONLY.

Inside, the air was cold and dry. The floors hummed with fluorescent buzz. Rows of metal desks lined the floor, each with a terminal, each terminal with a man in uniform typing quietly like an obedient machine.

I was introduced to Sergeant Walters, a man carved entirely from procedure. His haircut looked regulation down to the molecule.

“You’ll be assigned to systems maintenance,” he said, handing me a stack of manuals thick enough to stun cattle. “ADA and LISP. You’ll learn both. You’ll debug our communications protocols and keep the message relays clean. You’ll log everything you do. No exceptions.”

“Yes, Sergeant,” I said.

He looked at me, squinting like he was trying to see what kind of soldier I was. “You a fast learner, Private Smith?”

“Yes, Sergeant.”

“Good,” he said. “Because the machines don’t tolerate slow learners.”

That night, I sat at my assigned desk, staring at the terminal. Green letters blinked against a black screen. Lines of code scrolled by as I ran diagnostic checks, correcting syntax errors in old relay programs. The sound of the mainframes in the next room filled the air — a deep, steady thrum, like a pulse you could live inside.

Walters walked past behind me, muttering something about schedules and reporting chains. But I barely heard him. My hands were already moving, translating commands into shapes, shapes into systems. The old logic came back instantly — loops, conditions, recursion. Clean. Perfect.
And when I hit ENTER, the terminal responded with a calm, obedient prompt:

> OK

No yelling. No orders. Just acknowledgment. Immediate, precise, honest.

Tuesday, December 9, 2025

I, Hacker: Chapter 2, Part 5: “The Deal”

The watchers didn’t stay quiet for long.

Two weeks after the hearing, a letter arrived at my mother’s house — the one address I hadn’t given them but that lived in every database tied to my name. She called me that night, her voice trembling through the receiver.

“Danny,” she said. “There’s a letter here. From some... office. I think it’s court-related.”

I told her not to open it, though of course she already had. Inside was an official summons from the county prosecutor: State of California vs. Daniel A. Smith — unauthorized access to restricted computer systems, data tampering, and misuse of telecommunications equipment. They had decided to make it real.

Courtrooms are the most analog places on Earth. Wood paneling. Brass fixtures. Yellowed paper everywhere. A calendar from 1978 still hanging behind the clerk’s desk. The only technology in the room was the microphone, and it didn’t work half the time.

The judge was older than the courtroom, and twice as tired. His nameplate read Hon. Raymond K. Tilling, but everyone in the room called him “Your Honor” with the fearful reverence of people hoping not to be noticed.

The prosecutor was young — maybe late twenties, eager and smug. He had a stack of papers two inches thick and the gleam of someone who’d just discovered a new toy called “cybercrime.”

They’d even brought Morales from the university as a witness. He looked uncomfortable in a suit, clutching a folder like it was a life raft.

When they read the charges, I almost laughed. They made me sound like a Bond villain. “Gaining root-level access.” “Unauthorized privilege escalation.” “Insertion of malicious code.” The terms sounded menacing when spoken aloud, but what I’d actually done could barely dent a high-school firewall by today’s standards. Still — 1983 was new territory. They didn’t know what to do with people like me. So they guessed.

The prosecutor did his best to paint me as a danger to national security. “He could have accessed any system,” he said. “He had the means to alter data, destroy records, or steal sensitive information. It’s only by sheer luck that he chose a university instead of a bank.”
He said it like luck had anything to do with it.

My lawyer — a court-appointed one, gray suit, coffee stains, kind eyes — countered with something halfway between apology and admiration. “My client is not a criminal, Your Honor. He’s a young man with unusual technical skill and poor judgment. He didn’t destroy anything. He didn’t steal. He didn’t profit. The university overreacted.”

He said unusual technical skill the way some people say gifted child. Like I was a stray dog that could play piano.

Judge Tilling watched me the whole time. He didn’t take notes. He didn’t interrupt. Just sat there, leaning back, eyes half-lidded, as if trying to decide whether I was worth the trouble of a full moral opinion.

Finally, after two hours of posturing and paper-shuffling, he spoke.

“Mr. Smith,” he said, “you’re a bright young man. But you’re not as bright as you think you are.”

I opened my mouth to reply, but the look he gave me froze the words midair.

“I’ve seen your type before,” he continued. “Too smart for your own good. The world gives you a toy, and you think it’s a weapon. You want to see what happens when you pull the trigger. And when someone gets hurt, you call it an accident.”

He flipped through the file, scanning the printouts of my code like a priest reading a confession.

“Now,” he said, “I could send you to jail. I could make an example of you. But frankly, I don’t think that’s going to help anyone. Least of all you.”

He leaned forward, elbows on the bench.

“I happen to know the Army’s looking for people with your... talents. They’ve got computers now, too. Big ones. Maybe they’ll teach you what it means to follow rules.”

The room went silent. Even the prosecutor blinked. He wasn’t offering leniency. He was offering a trade.

“If you enlist,” he said, “I’ll suspend sentencing. You’ll serve your country, learn some discipline, and stay the hell away from university networks. Refuse, and I’ll make sure this follows you for the rest of your life. Understood?”

My lawyer leaned close. “Take the deal,” he whispered. “It’s the best offer you’ll ever get.”
He was right.

I signed the paperwork the same day. Deferred prosecution in exchange for enlistment. The judge even smiled when I did it — that weary, bureaucratic smile of a man who’s solved a problem by moving it somewhere else.

My mother cried when I told her. I think she was proud, though she never said so directly. I let her believe it was voluntary. That I’d woken up one morning and decided to serve my country out of some noble sense of duty. We both knew it wasn’t true.

The bus to Fort Leonard Wood left at dawn. Gray sky, gray uniforms, gray faces staring out the window like passengers on a train to a life they hadn’t chosen.

I sat by the window, duffel bag between my knees, and watched the city shrink behind us.

No computer. No terminal. No blinking cursor waiting for me. Just the low hum of the engine, the smell of diesel and wet wool, and the thought that maybe — just maybe — I could survive four years of following orders. But somewhere in the back of my mind, beneath the fear and exhaustion, a small voice whispered: Every system has a way in. And I smiled.

Monday, December 8, 2025

I, Hacker: Chapter 2, Part 4: “Root Access, Root Consequences”

That made the fall harder. You get comfortable with anonymity the same way you get comfortable with a chair — you stop feeling the edges. You stop looking for them. Months of careful work had taught me how to move through the system like a ghost: aliases, rotated passwords, clean login timestamps, mimicry of normal user behavior. I had routines that looked boring by design. I left the logs with plausible noise. I never edited files in place; I made copies and left originals untouched. I never ran anything noisy in system directories. I was surgical.

Then, one idle night, tired and overconfident, I grew careless. It was the sort of mistake that wears the face of boredom. A grad student – an actual person, not one of my ghost accounts — had left a file in /tmp with the permissions set to 777. The name was test_build.tar.gz. Because I was human, because the night was long and my coffee was weak, I couldn’t resist. I untarred it in my own workspace just to see what someone else was doing. The archive had a few test binaries and a script that referenced an absolute path I didn’t recognize.

I thought nothing of it — until I ran the script to see if it did anything interesting. It did. It spat out a log entry into a global log because the author, bless him, had hard-coded /var/log/compile.log for debugging and forgotten to remove it. The log entry contained the hostname of my terminal. Just my hostname. Only a hairsbreadth of proof. But logs are like DNA: small, stubborn, and keyed to a place.

The next morning the campus systems phone rang at 8:03 a.m. It was the network admin — a guy named Morales — his voice low and careful on the line. He asked whether anyone else had access to my terminal. I lied. Smoothly. Too smoothly, maybe. I said no.

By noon, Morales had a pattern. Over the last three weeks there had been a cluster of odd cron runs at 2:00 a.m., originating from different user IDs but all inheriting the same PATH quirks. He pulled the headers, grepped the audit logs, and found the duplicates. Duplicates led to a shared HOME folder. The HOME folder led to a list of small scripts with weak obfuscation — nothing complex, but enough to show a human hand. Which is how they found me.

They didn’t show up with handcuffs or drama. They sent one of the grad student sysadmins first — a kid named Allen with wire-frame glasses and the kind of casual cruelty you only find in architecture students. He came by the lab and watched me type for a while, making small talk about compiler versions while his fingers hovered over a terminal. He nodded at nothing and left.

That night, I slept badly. Not because I thought they would find anything — my routines should have covered it — but because I’d felt, for the first time in months, the cold breath of scrutiny. It’s a discrete thing: a cursor that isn’t yours, a keystroke you can’t explain. It makes the edges of the world sharp.

On Thursday, I sat in Dr. Harkness’s lecture on UNIX scheduling — the kind of class where the professor makes padding sound like a thesis — and halfway through his anecdote about AT&T’s early misadventures, two men in plain clothes appeared in the doorway.

At first I didn’t notice them. They were unremarkable: blue suits that had never seen a darts night, shoes shined the way men who don’t do dishes shine shoes, hair cut in sanctioned shapes. One of them scanned the room like a man making a shopping list, then his eyes landed on me.

The professor stopped mid-sentence. The class quieted, as if every student had simultaneously remembered they were in a building with real rules. The men walked down the aisle. One of them had a badge, small and discreet, clipped inside his jacket where no one could easily read it. The other smiled like a man arranging a surprise party, but his smile didn’t reach his eyes.

“Daniel Smith?” the taller one asked, as if reading my name from a script.

Heads turned. Nobody had called me Daniel since orientation. The room smelled suddenly like stale chalk and fear.

I stood slowly. “That’s me.”

“You need to come with us,” he said. No explanation. No malice. No performance. The words were like blueprints: precise and final.

I caught sight of Morales near the back, holding a printout like a rosary. Allen was next to him, looking triumphant and fifteen. There was a small, clinical look on Morales’s face — the face of someone who’d solved a math problem and wanted to put the answer on the board.

I left my stuff, walking past the rows of students who gave me looks that were curiosity and accusation braided together. Someone whispered, “What did you do?” and another said, “He’s that Dent42 guy, right?” Someone else laughed, like the sound of a bubble popping.

Outside the lecture hall, the cold air hit me like reality. The taller man led; the other watched. They didn’t touch me. They didn’t have to. They took me to a small windowless room in the administration building. The chairs were hard. The table had a blotchy veneer. A fluorescent light hummmed overhead with the patience of bureaucracy.

“Do you know why you’re here?” the tall one asked.

“Yes,” I said.

They put printouts on the table. Lines of cron output. IP headers. The hostname that had leaked. A timestamp. A spiral of evidence that built to an ugly little tower.

“Where did these scripts originate?” Morales asked, not unkindly. It was almost pity. He wanted an answer.

I could have lied. I could have fumbled. Instead I did the worst thing I could have done: I smiled.

“Curiosity,” I said. “Testing the system.”

Testing. The word sounded childish in the room. The tall man’s jaw tightened a fraction.

“You understand this looks like unauthorized access?” he asked. “Tampering with administrative scripts. Root-level implications.”

“Yes.” The truth: I did understand.

I also understood the calculus of their options. Expulsion. Criminal charges. Public university, public embarrassment. The administration did not want that. They wanted containment, minimal spectacle.

Instead of immediate legal action, they called the police. Not campus security — the actual local force. Two officers arrived, polite and perfunctory. They asked me the same questions Morales had asked, but with the added weight of law behind them. I tried to answer as little as possible, which is what you do when you don’t know what they can prove.

They took me to a holding room for questioning. The detectives were more patient than the officers — they asked about motives, about whether I’d shared the tools, about whether anyone else had access. Their voices were soft, civilized. They listened to my answers and wrote them down in a way that made them look like facts.

When they showed me the evidence printouts, I noticed something else: a line of notes in Morales’s handwriting. 

“Possible student misuse. Recommend referral to judicial.”

 The words were a polite litany for escalation. I was aware, in a slow, awful way, that this was no longer just a technical problem — it was a career event. My freedom hinged on a conversation on a different floor, between men who wore different coats.
 
They didn’t read me my rights. Not yet. It was all procedural. We were all performing the right choreography: the sysadmin found the anomaly, he alerted administration, they contacted the police, the detectives read the printouts, and I sat in a chair and tried not to look like I loved the smell of money in the bursar’s logs.

“You should have reported this, Daniel,” one of them said finally. “If you saw something insecure, report it. Don’t take it upon yourself.”

“I reported things to the lab,” I said. “I reported bugs. I told them about the cron job months ago.”

“No record,” Morales interjected. “No report. We found scripts and code in user space. We found evidence of deliberate path poisoning.”

The word “poisoning” sounded theatrical. It was theatrical. They wanted the story to be criminal, not curious. Crime makes eyes look away. Curiosity makes them look inside. I suppose I couldn’t blame them.

After hours of questioning that felt like being moved through a sequence of gates — watchful face, stunned silence, the politely delivered threat — they let me go. No handcuffs. No arrest. Not that night, anyway. They wanted my cooperation, or at least my silence.

“You’ll be hearing from Judicial Affairs,” Morales said as they handed me back my jacket.

“And the campus will be… handling this internally. If we decide to press charges, that’s on the record.”

They dropped me off at the dorm. The street was the same as when I had left it, but the air tasted like metal. My roommate asked if I was okay. I said “Fine,” which was a mutation of the truth.
That night I lay awake listening to the radiator clank and the distant clatter of the vending machine. I had been careful for months, and a single boredom-driven run had handed them a breadcrumb. It was almost laughable. You spend so much time avoiding the obvious that you miss the obvious sitting in front of you.

Within a week, an official letter arrived: summons to a campus hearing. The language was neutral, the font neutral.

“Allegation of unauthorized access to university computing resources. Hearing scheduled.”

Hearing. They did not say “criminal.” They did not say “jail.” They left the teeth unsaid.
But the implication was there. They could expel me. They could press charges. They could call the police and hand the case to the county prosecutor. The choices hung just out of sight like storm clouds.

I sat with my mother one evening and watched her sew a loose seam on a dress she kept for church. I thought about telling her everything. I thought about telling her that this was my life now, that the blinking cursor was the only place that made sense. But I didn’t. You don’t tell the people who love you the parts that will make them worry. You protect them by keeping secrets.

On the day of the hearing, I walked into a small committee room smelling of cheap coffee and dust. Two administrators sat on one side, their faces a judgmental symmetry. On the other side, there was a clerk and Morales with his stack of printouts. I had a single sheet of paper — a typed statement I had practiced to sound contrite but reasonable.

They asked me to explain. I explained that I’d been experimenting, that I hadn’t stolen anything, that I understood security. I pointed out the weaknesses, the sloppy scripts, the overbroad permissions. I thought perhaps an appeal to professionalism would make them step back. Instead, they read the official manual language about unauthorized access and network integrity. Manuals are blunt instruments. They like to close the aperture tightly.

When the head of the committee — a gray woman whose name I still remember simply as Dean Ellis — looked at me with the small, precise pity of someone who has had to discipline a problem child for the umpteenth time, I felt the chill. She told me what I already knew: that the university had to be seen to act, that outsiders would not understand if they did not, that precedent had to be set.

“You need to understand the consequences,” she said. “This is theft of resources. This is unauthorized use of staff accounts. We have obligations to our funders.”

Obligations meant publicity. Publicity meant lawyers. Lawyers meant jail was an option on the table.
They recommended suspension pending further review and hinted, carefully, that criminal referral was possible. 

“You’ll have a chance to respond,” Dean Ellis said, “but let me be clear: the university will not be lax.”

I walked out with a campus restriction and the feeling that the world had drawn a line in the sand and I had placed my foot on the wrong side.

That night, I started packing a small bag. Not to run. Not yet. But to prepare. The realization had arrived like a spectral ledger: there are consequences to touching root. There are consequences to waking systems that are meant to be asleep.

As I folded a T-shirt, I felt something else settle in my chest — a strange, quiet excitement. The same part of me that loved breaking into systems loved the idea of solving problems under constraints. If the university wanted to muscle me out, the world beyond the college gates might have other, darker doors to open.

I slept badly again, that night, but I didn’t regret it. Regret is a thing that comes later, with the bills and the phone calls and the people you hurt. Right then I felt only the prickling, nervous energy of a man who had been seen and who had, in turn, glimpsed the faces of the watchers.



Sunday, December 7, 2025

I, Hacker: Chapter 2, Part 3: “Catching Fire”

It’s funny how quickly fear turns into confidence.

The first time you cross a line, your hands shake. The second time, you justify it. The third time, you start to wonder why there was ever a line at all.

By the spring semester of ’83, I’d stopped thinking of the university network as a place I visited. It had become something closer to a second home — an invisible city that stretched beneath the physical one. The dorms, the classrooms, the cafeteria — they all had their reflections in the machine: files, permissions, names, commands. Each login was a door. Each directory was a room.
And I had the master keys.

I’d built myself a new set of accounts — four in total — all disguised as forgotten grad students from the previous year. I generated fake shell histories, planted old homework files, even left the occasional half-finished paper to make them look inhabited. They were ghosts with alibis.
With those accounts, I could move freely. Observe without being seen. And I did. Constantly.
I’d log in under a faculty account just to watch what they were working on. Lesson plans. Exam drafts. Department memos. It wasn’t even about cheating; I didn’t care about the grades anymore. It was about access. The feeling of being in the same room as the people who thought they ran the world and realizing you were standing behind them, unseen.

One night — late April, I think — I found a directory belonging to one of the senior professors, a guy named Harkness. He taught Operating Systems, though “taught” is generous. He mostly recycled slides from the previous decade and talked about punch cards like they were still a thing.
Inside his home folder, he had a subdirectory called /notes/1982_archive/. Inside that:
 final_exam_draft.txt. I opened it.
 
Thirty-five questions, half of which were copied directly from the previous year’s test. I stared at them, smiling. Then I did something stupid — or maybe brilliant, depending on how you define either.
I added a question.

36. What happens when the system administrator forgets who really runs the system?
Hint: check your PATH variables.

I saved the file and logged out. No damage. No stolen data. Just a ghostly fingerprint in the code.
I didn’t hear anything about it for weeks. Finals came and went. I half-expected a knock on the door, or an email from IT, but nothing. I passed the classes I still bothered to attend. I failed the rest. My mother called to ask if I was coming home for the summer. I told her I had a “research internship.” She didn’t ask where.

Then, one day in June, while cleaning up my files, I stumbled across a system bulletin. Just a small text message posted to all users from the head of IT.

TO ALL USERS:
There has been an incident involving unauthorized access to faculty directories. The issue has been resolved. Please do not tamper with system scripts or cron jobs. Lab privileges will be temporarily restricted after 10pm.

Resolved.  Sure it was. They hadn’t resolved anything. They’d just noticed the smoke, not the fire. I’d already moved my backdoors, changed my scripts, rotated through new accounts. I could see every move they made, every attempt to fix the system I already controlled.
And that’s when the thrill changed.

It wasn’t about curiosity anymore. It was about power. Some nights, I’d log in just to watch. Faculty typing memos. Admins running maintenance scripts. Grad students writing code. I could see their mistakes in real time, their typos, their backspaces, their sighs hidden in pauses between keystrokes. It was intimate in a way that felt almost indecent — like reading someone’s thoughts through the sound of their typing.

Once, I watched the bursar’s office update financial records. The transaction logs were just numbers, but I could see the entire machine of the university grinding away: money moving, approvals granted, fees assigned. The invisible economy beneath the surface.

I realized something then — a truth that would follow me for the rest of my life: Every system is just people pretending it’s not made of people. And people make mistakes. I started cataloguing vulnerabilities the way a birdwatcher keeps a list of sightings. I found patterns, habits, the same errors repeated by different hands. No one was malicious. Just careless. Lazy. Predictable.
I didn’t tell anyone what I found. Not because I didn’t want to help, but because I didn’t think they deserved help. They’d built the locks, after all. I was just testing the hinges.

I stopped thinking of it as hacking. I started thinking of it as… maintenance. And somewhere in the middle of one of those long, silent nights in the lab, surrounded by the low hum of a dozen terminals, I realized something else: I’d stopped feeling lonely.

Mastodon