Investigations began with the mundane: server logs, camera feeds, the slow crawl of forensic time. The Corps spread across the archive like ants on sugar, each member following a different trail. One found a corrupted checksum deep in the admission database — a tiny inconsistency that bloomed into evidence of a replication routine gone rogue. Another discovered signals where none should be: packets disguised as maintenance pings that carried compressed whispers of files — file names, notes, the metadata that stitched objects to their stories. The pattern was deliberate. The attacker was not random; it had purpose and patience.