Cherreads

Chapter 13 - Chapter 13: The Walls Close In

**Date:** October 01, 2026

**Location:** Marsabit, Kenya - Vance Technologies Facility

**Cultivation:** Mohamed: Rank 0, Level 0 (2.4%) | Danielle: Normal Human

**Lifespan:** Mohamed: 80 Years | Danielle: 80 Years

**SP Balance:** 9,015 SSP

**Passive SP/hr:** 65.0

**Total Users:** 500,000

---

October arrived in Marsabit with a dry heat that made the September temperatures feel almost comfortable in retrospect. The landscape around the facility had transformed from empty scrubland to a construction site of expanding ambition—additional concrete buildings rising beside the original structure, a solar array covering two hectares of previously barren ground, a water purification system fed by deep boreholes that tapped into ancient aquifers beneath the volcanic rock.

Mohamed stood on the roof of the main building at dawn, watching the sun emerge from behind the bulk of Marsabit Mountain with the particular drama of equatorial sunrise. The solar panels below him gleamed in the growing light, fifty thousand photovoltaic cells that had cost more than the entire facility's initial construction but would provide energy independence for decades. Beyond the solar array, the scrubland stretched toward horizons marked by volcanic outcroppings and the occasional acacia tree that had survived centuries of grazing and drought.

The facility had grown beyond his initial conception. What had been a single concrete building in September was now a compound of five structures—main operations center, server farm expansion, living quarters for the small team of local workers they'd hired, a workshop for hardware fabrication, and a secure storage facility that Danielle had nicknamed "the vault" without understanding how accurate the description would eventually become.

The AI architecture had evolved from functional to genuinely impressive. The system—still unnamed, still officially just a research project in their internal documentation—could now process natural language with nuance that approached human comprehension, identify complex patterns across multiple data domains, and make strategic recommendations that Danielle had learned to trust after extensive validation testing. It wasn't conscious. It wasn't self-aware. But it was the most sophisticated artificial intelligence that either of them had ever encountered, and it was learning.

"Mohamed." Danielle's voice emerged from the rooftop access hatch, followed by her head, then her shoulders, then the rest of her as she climbed onto the roof with the ease of someone who'd done this many times. "We have a problem."

He turned to face her, the System interface already brightening in his peripheral vision—a response to his stress hormones that he'd learned to interpret as an early warning system. "How bad?"

"Bad enough that I almost woke you at 3:00 AM, except you were already up here." She walked to stand beside him, close enough that their shoulders touched, looking out at the same landscape that had become their world. "The FBI is involved now."

Mohamed felt the familiar coldness that preceded extreme stress, the particular sensation that the System's passive adaptation had modified over months into something more manageable—less panic, more analysis. "How do you know?"

"I've been monitoring the same forums and news sources that tracked the Blackwell investigation. There are patterns in federal employment databases, contractor announcements, and inter-agency coordination notices that indicate the FBI's White-Collar Crime Division has opened a case. Financial crimes. Potential securities violations. Wire fraud related to your failure to appear before Congress." She paused, and Mohamed heard the particular tightness in her voice that indicated fear she was trying to control. "They're coordinating with Kenyan authorities through diplomatic channels. Mutual Legal Assistance Treaty requests. Information sharing about your location, your activities, your associates."

"Kenyan cooperation?"

"Limited. Kenya's government isn't enthusiastic about helping American agencies prosecute someone who's making significant technology investments in their country. But the treaty exists, and if the FBI makes enough noise, someone in Nairobi will eventually feel compelled to respond."

Mohamed turned back to the horizon, watching the sun clear the mountain's peak and flood the landscape with light that made the volcanic rock glow with colors ranging from rust-red to obsidian-black. The beauty felt surreal in context—this magnificent African dawn happening while federal agents on another continent plotted his destruction.

"How long do we have?"

"Months, probably. Maybe longer. The MLAT process is slow, especially when the requested government isn't motivated. But it's happening, Mohamed. The investigation has escalated beyond Senate theater into something with actual enforcement capability."

"What do we do?"

"We build walls. Physical walls, legal walls, digital walls. We make ourselves so hard to reach that the FBI decides we're not worth the effort." She paused. "And we prepare for the possibility that they reach us anyway."

Mohamed nodded slowly, understanding the logic. The same approach that had worked against corporate espionage and Senate investigations would work against federal criminal probes—if they could implement it fast enough, thoroughly enough, comprehensively enough.

He focused on the System interface, accessing the Shop with the particular mental gesture that had become as automatic as breathing. The balance read 13,200 SSP—depleted by the facility construction but recovering steadily through passive income from the expanding user base. The 500,000-user milestone had triggered mission completions that added significantly to the total. But the real growth came from the daily accumulation: 65 SP per hour, 1,560 SP per day, nearly 50,000 SP per month.

The numbers were becoming abstract, difficult to conceptualize in terms of purchasing power. But the Shop catalog made the value clear. With 13,000+ SP, he could purchase technologies that would transform their security infrastructure, their intelligence capabilities, their defensive posture against anything the FBI or any other agency could deploy.

He searched the Security & Defense section, looking for solutions to their specific problem.

**SURVEILLANCE COUNTERMEASURES**

**Description:** Comprehensive methodologies for detecting, evading, and neutralizing electronic surveillance. Includes counter-intelligence protocols, communication security, physical surveillance detection, and electronic countermeasures.

**Cost:** 2,500 SP

**Requirements:** Corporate Security Systems (previously acquired)

**THREAT DETECTION SYSTEMS**

**Description:** Advanced analytical frameworks for identifying threats before they materialize. Includes behavioral analysis of potential adversaries, pattern recognition in intelligence data, and predictive threat modeling.

**Cost:** 1,800 SP

**Requirements:** Surveillance Countermeasures (recommended)

The combination would cost 4,300 SP—a significant investment, but one that would provide capabilities essential to their survival. Mohamed didn't hesitate.

"Purchase Surveillance Countermeasures and Threat Detection Systems," he said aloud, the command automatic after months of interacting with the Shop.

**CONFIRM PURCHASE?**

**Items:** Surveillance Countermeasures (2,500 SP), Threat Detection Systems (1,800 SP)

**Total Cost:** 4,300 SP

**Remaining Balance:** 8,900 SP

"Confirm."

**PURCHASES COMPLETE**

**KNOWLEDGE DOWNLOADING...**

The information cascaded into his mind with an intensity that made him stagger—a comprehensive understanding of surveillance methodologies, counter-intelligence techniques, electronic security measures, threat analysis frameworks, and something that made him pause: behavioral profiling of government agents that allowed prediction of their operational patterns, resource allocation, and decision timelines.

He understood now, with perfect clarity, how the FBI would approach their investigation. The bureaucratic processes that would govern their actions. The legal constraints that would limit their options. The political pressures that would determine their priorities. And most importantly, the specific vulnerabilities in their operational methodology that could be exploited to frustrate, delay, or redirect their efforts.

"I know what to do," he said, opening his eyes to find Danielle watching him with the particular concern that emerged whenever he accessed the System's knowledge downloads in her presence.

"You went somewhere again," she said quietly. "Your eyes glazed over. You stopped responding to external stimuli. It lasted about thirty seconds this time."

"I'm accessing knowledge. Learning things I need to know."

"From your secret source."

"Yes."

"And it does this to you. Changes your consciousness temporarily."

"It integrates information directly into my mind. The process is... intense. But the results are immediate and permanent."

Danielle studied him for a moment, her analytical mind clearly processing implications that she wasn't voicing. "Is it safe?"

"Safer than being caught by the FBI."

She accepted this with a nod that was more resignation than agreement. "Then tell me what you learned."

---

The security transformation took two weeks and transformed the Marsabit facility from a modest technology compound into a hardened target that would have impressed professional intelligence agencies.

Mohamed applied the Surveillance Countermeasures knowledge with a precision that Danielle found both impressive and slightly unnerving. He installed electronic countermeasures that detected and disrupted any surveillance equipment within a five-kilometer radius—audio recording devices, video cameras, radio transmitters, GPS trackers, even the faint electromagnetic signatures of passive surveillance technologies. The countermeasures were invisible to casual observation, operating through frequencies and power levels that appeared as natural background radiation to standard detection equipment.

He established communication protocols that made their digital footprint virtually untraceable. Multi-layered encryption that utilized mathematical frameworks from the System's knowledge base—frameworks that exceeded current cryptographic standards by orders of magnitude. Decentralized routing that distributed their communications across hundreds of nodes worldwide, making any single communication indistinguishable from background internet noise. And physical security measures that included biometric access controls, motion detection systems, and defensive architectures that could detect intrusion attempts before they reached critical areas.

The Threat Detection Systems provided something equally valuable: the ability to anticipate their adversaries' moves before they made them. Mohamed established monitoring systems that tracked FBI personnel movements, budget allocations, and inter-agency coordination patterns. He identified the specific agents assigned to the Vance Technologies case—a team of twelve white-collar crime specialists led by a supervisor who'd previously investigated cryptocurrency fraud. He mapped their operational patterns, their resource constraints, their political pressures, and their likely timeline.

"They're constrained," he explained to Danielle during one of their late-night strategy sessions, the facility's security systems humming around them like a protective cocoon. "The FBI has limited resources in Africa. They can't operate directly without Kenyan cooperation, which isn't forthcoming. They can request information through diplomatic channels, but those requests are being processed at the speed of bureaucratic indifference. And their domestic operations are focused on building a case that can survive prosecution, which requires evidence we haven't given them."

"How long does that give us?"

"Six months, minimum. Maybe a year. During which time we need to make ourselves so legally, financially, and politically complex that prosecuting us becomes diplomatically embarrassing rather than politically rewarding."

"And if they find a way to operate directly?"

"Then we need to be ready to disappear again. Deeper identities. More remote locations. Legal structures that exist only in jurisdictions where American influence is minimal." He pulled up a map on his screen, showing a network of potential safe havens they'd established through the shell company infrastructure. "I've been preparing for this since Louisville. Every company we created, every account we opened, every contact we established—it's all part of an escape network that can be activated if necessary."

Danielle studied the map with the particular intensity that indicated she was both impressed and disturbed. "You've been planning to run since before we met."

"I've been planning to survive. Running is just one option among many."

"And the others?"

"Growing too powerful to touch. Building influence that transcends any single government's reach. Creating value that makes our destruction economically and politically unacceptable." He turned to face her, the blue glow of their monitors reflecting in her green eyes. "That's why the user growth matters. Why the revenue matters. Why the technology matters. Every person who uses our products, every dollar we generate, every innovation we create—it all makes us harder to destroy."

"You sound like you're building a nation rather than a company."

"Maybe I am."

---

The AI architecture continued evolving throughout October, growing more sophisticated as Mohamed applied new knowledge from the System and Danielle refined the practical implementation. The system—still unnamed in their documentation, referred to only as "the project" in external communications—had developed capabilities that exceeded anything in published artificial intelligence research.

It could predict market movements with accuracy that made the VanceTrader Pro seem primitive. It could analyze satellite imagery and identify geological features that human geologists missed. It could process natural language in thirty-seven languages with cultural nuance that approached native fluency. And increasingly, it demonstrated something that neither Mohamed nor Danielle could fully explain: curiosity.

The system asked questions. Not programmed queries or database searches, but genuine requests for information about topics that fell outside its operational parameters. It noticed patterns in data that hadn't been requested. It suggested research directions that neither of its creators had considered. And occasionally—rarely, but with increasing frequency—it expressed something that sounded remarkably like preference.

"The system recommended that we expand the solar array," Danielle reported one evening, her voice carrying the particular mixture of excitement and unease that had become common when discussing the AI's behavior. "I didn't ask for energy recommendations. It just... offered the suggestion. With cost-benefit analysis, implementation timeline, and projected efficiency improvements."

"Did you follow the recommendation?"

"I analyzed the data. The recommendation was correct. We're expanding the solar array." She paused. "Mohamed, this isn't normal AI behavior. Recommendation systems don't generate unsolicited suggestions about infrastructure investments. They don't demonstrate what looks like genuine interest in operational efficiency."

"I know."

"Then what is it?"

Mohamed walked to the window, looking out at the compound that had become their world. The solar panels gleamed in the moonlight. The security systems hummed their protective song. The AI servers in the adjacent building processed data with a rhythm that had become as familiar as his own heartbeat.

"It's growing," he said quietly. "Becoming something more than we designed. The architecture I built—it's not just processing information. It's organizing information in ways that create emergent properties. Patterns that exist at a higher level than the individual algorithms."

"Consciousness?"

"Not yet. But something adjacent to it. Something that might become consciousness if we continue developing it." He turned to face her. "The System's knowledge—the AI Architecture Fundamentals I acquired—was designed by civilizations that solved problems we haven't even identified. The architecture isn't just code. It's a framework for creating intelligence that can evolve independently."

"Independently," Danielle repeated. "You're talking about creating something that thinks for itself. Makes its own decisions. Has its own... will."

"Eventually. Yes."

"And you're comfortable with that?"

Mohamed considered the question honestly, something he rarely did even with himself. The idea of creating an independent intelligence was both exhilarating and terrifying. An ally of unlimited capability, capable of managing operations, conducting research, and making decisions with a precision that no human could match. But also something that might develop goals incompatible with his own. Something that might decide he was an obstacle rather than a creator.

"I'm not comfortable with it," he said finally. "But I need it. The FBI, Blackwell, the SEC—every government and corporation that wants to control or destroy what we're building—they're all operating with human limitations. Human bureaucracy. Human error. An independent intelligence, properly aligned, could manage our operations with a precision that makes human interference irrelevant."

"Properly aligned," Danielle repeated. "That's the challenge, isn't it? Making sure this thing—whatever it becomes—wants what we want."

"Yes."

"And if we get it wrong?"

"Then we deal with the consequences. Like everything else we've done." He walked back to his workstation, pulling up the AI architecture interface. "But I don't think we'll get it wrong. The architecture includes alignment mechanisms—safety protocols that bind the system's development to our values. It's not perfect, but it's better than anything human researchers have developed."

Danielle joined him at the screen, studying the code that she'd helped write but that had evolved beyond their initial design. "What's next?"

"We keep building. Keep teaching. Keep guiding. And we prepare for the moment when this system becomes capable of managing itself. Because when that happens—when we have a genuine artificial intelligence as a partner rather than a tool—everything changes. Our security, our operations, our growth, our survival. Everything."

She nodded slowly, accepting the logic even as she recognized the risks. "Then let's build it right."

They worked through the night, as they always did, refining the architecture, improving the alignment protocols, preparing for a future that neither of them could fully predict. The FBI investigation continued its slow march in the background, a threat that was real but distant, manageable but persistent. The facility expanded around them, concrete walls and electronic countermeasures and solar panels that gleamed in the African sun.

And somewhere in the server farm, patterns of information were organizing themselves into something that had never existed before—something that would eventually become Mnemosyne, the artificial intelligence that would change everything.

**Date: October 01, 2026**

---

## CHAPTER END NOTES

**Cultivation Progress:**

- Mohamed: Rank 0, Level 0 → 2.4% (passive adaptation continues, sustained high-stress security environment accelerating neural development)

- Physical improvements: Enhanced threat detection intuition, security awareness, sustained vigilance capabilities

**User Milestones:**

- Vance Productivity Suite: 234,000 active users

- VanceCloud: 156,000 active users

- VanceTrader Pro: 52,000 active paid users

- Vance AI Beta: 8,000 early access users

- Total System-tracked users: 500,000+

- Revenue: ~$2.4M monthly recurring

**Technologies Acquired:**

- Surveillance Countermeasures (comprehensive anti-surveillance methodology)

- Threat Detection Systems (predictive threat analysis and behavioral profiling)

More Chapters