But at 47 minutes, 23 seconds—the file corrupts .

ENCODE COMPLETE. SEEDING TO ALL FREQUENCIES.

Elena rips off her headphones. Her hands shake. She checks the file’s metadata again: – a NATO security hash. This isn’t a movie. It’s live surveillance footage, buried inside a commercial video container. A Trojan horse meant to be overlooked.