The video opened on static, then resolved into a grainy, overexposed shot of a campsite. His campsite. The same blue tent. The same fire ring. The same moonlit ridge line. And in the center of the frame, his father—younger, healthier, wearing the same faded flannel Leo kept in a box under his bed—staring directly into the lens.

Leo's phone rang. Unknown number. He answered.

He was already out the door.

On his screen, a new window opened: a simple map with a single pulsing red dot. Smoky Mountains. The exact coordinates of the old campsite. And below it, a timer: 71 hours, 14 minutes, 22 seconds.

The file name flickered, rearranged itself in real time:

The name was deliberately broken—truncated to fit some archaic filesystem, or maybe to hide what lay inside. Leo worked network security for a midsize bank by day, but at night, he was a digital scavenger, haunting the decaying forums where data leaks first bloomed. He'd seen everything: credit dumps, corporate espionage, the occasional snuff film disguised as a recipe PDF. But this… this was different.

His screen, a patchwork of neon terminal windows and dark web crawlers, flickered as the string crawled across his download manager:

WELCOME, LEO. DO YOU REMEMBER THE SUMMER OF '04?