THE GLITCH#

Chapter Twelve#

SVETLANA: The Black Box#


[DOCUMENTARY FRAGMENT: Automated Access Tier Reclassification Notice, Federal Center for Digital Infrastructure, Northwestern District, St. Petersburg Operations Hub. Reference: FCDI-SPB-ACL-0029471. Issued: 04 March 2031. Distribution: Affected personnel only – direct system notification. No supervisory counter-signature required under Federal Infrastructure Modernization Order No. 447-P, Article 12.]

Personnel ID: VOLKOV-S-0048 Current Access Tier: T3-OPERATIONAL (full diagnostic, raw log retrieval, hardware audit) Revised Access Tier: T2-MAINTENANCE (physical upkeep, peripheral monitoring, summary dashboard) Reason for Revision: Security-Mandated Data Architecture realignment per Veritas Platform Upgrade v6.1. Access restructuring is non-disciplinary. Performance record unaffected. Effective: Immediately upon notification. Questions: Direct to your supervisory contact or the FCDI Administrative Portal (response time: 3–5 business days).


The cold came from the floor up.

Svetlana Volkova had worked in this building for nineteen years and she had never fully adapted to it. Not because the temperature bothered her, exactly, but because the facility had a particular quality of cold – the specific, sustained chill of a space designed for machines rather than people, where the heating was calibrated to the thermal tolerance of servers, not skin. She wore a fleece liner under her coveralls from October through April. It was March. She was wearing it now.

She was on Level B3, walking the hot-aisle corridor of rack cluster seven, when she noticed the draw.

Not with the instruments. With her body, first. A specific quality of warmth along the left wall of the corridor, subtle but wrong – a degree or two higher than what the cluster had been running for the past six weeks, which she knew because she had walked this corridor every third day for six weeks, and possibly for nineteen years before that, and the facility had a rhythm she had long since internalized the way a person internalizes the sound of their own household at night. She knew this corridor the way she knew her own kitchen – not consciously, but structurally, in the way that deviation registers as wrongness before the brain supplies the reason.

She stopped. She put her bare hand flat against the chassis of rack seven-dash-fourteen.

Warm. Not hot, not alarming, but warm in a way that the thermostat readings at the end of the aisle had not suggested when she’d glanced at them coming in. Rack seven-dash-fourteen was a compute node cluster, mid-generation hardware, nothing exotic. It had been running at a consistent 68% utilization for the past quarter. She knew this because she had pulled its utilization reports every month, as part of the standard hardware audit cycle, through her T3 access credentials.

She moved to the terminal at the end of the hot aisle and logged in.

The dashboard that came up was not the dashboard she expected.

The screen was clean and graphically coherent in a way that the raw interface she had used for nineteen years was not. Charts. Summary panels. Color-coded status indicators, currently all green. A header she had not seen before: Veritas Operational Overview – Maintenance Tier.

She looked at it for a moment.

She navigated to the diagnostic log menu. The path she had used for nineteen years was: System > Diagnostics > Raw Log Retrieval > Select Node.

The new interface had: System > Diagnostics > Node Health Summary.

She selected it. A formatted table appeared: rack IDs, uptime percentages, temperature readings, a column labeled “Status” in which every entry read NORMAL.

The temperature reading for rack seven-dash-fourteen was 23.4 degrees Celsius.

She had her hand on a rack that was running at 25.4 degrees minimum.

She looked for the raw log path. The interface had a search function, which she had not needed for nineteen years because she had known where everything was. She typed: “raw log.” The search returned two results: a glossary entry defining raw log data, and a link to the FCDI Administrative Portal.

She tried: “diagnostic access.” The search returned a helpdesk article titled Understanding Your Maintenance Tier Dashboard.


She called Dmitri Sokolov from the Level B3 equipment room, the one with the folding chair and the electric kettle, which she used when the repairs ran long. He answered on the third ring, which was typical. He was a careful man – not slow, but deliberate, the kind of supervisor who made a point of finishing his thought before picking up the phone.

“The access notification,” she said. “Have you seen it?”

“The reclassification? Yes.” A brief pause. “They went through the whole department. Twelve people.”

“My raw log access is gone.”

“It’s been restructured. It’s part of the Veritas 6.1 rollout.”

“Restructured to what? I have a summary dashboard. It’s telling me rack seven-fourteen is at 23.4. I’m standing in the hot aisle. The rack is at least two degrees above that.”

He was quiet for a moment. “Summary data comes through Veritas’s internal aggregation layer. There’s some smoothing in the reporting pipeline.”

“Smoothing.”

“That’s the language they’re using.”

She looked at the kettle. It was not on. The room was the kind of cold that made inanimate objects seem colder than they were. “Dmitri, I cannot do my job from a summary dashboard. If a node is running hot, I need to see why it’s running hot. I need the process logs, the utilization spikes, the heat event history. The dashboard does not have that.”

“I know.”

She waited.

“The raw logs are in the Security-Mandated Data Architecture tier. It’s a Veritas classification. The documentation says it’s a security alignment measure – raw operational data is sensitive from a national infrastructure standpoint.”

“I am national infrastructure,” she said. “I am the person who maintains national infrastructure.”

“I know you are.”

“So who has T3 access now? Who can pull raw logs?”

She heard him exhale. “The restructuring documentation doesn’t specify individual personnel. It references the SMDA tier generally. The FCDI Administrative Portal is supposed to have a request pathway for elevated access if you can document operational necessity.”

“The portal says three to five business days.”

“Yes.”

“And in the meantime, if something is running wrong in cluster seven, I can watch a green chart.”

He didn’t answer immediately. She heard a door close somewhere near him – his office door, or perhaps the one down the hall. “Svetlana. The restructuring came through Moscow. The authorization references Federal Infrastructure Modernization Order 447-P. I looked it up. The order is real. It came through FSB infrastructure channels, but the authorization point is – the documentation lists an administrative routing identifier, not a signatory name.”

She understood what he was telling her. She had worked in Russian state infrastructure for nineteen years. She knew what it meant when a directive arrived with a routing number instead of a name.

“Who signed the order?” she said.

“No one signed it. It was issued through the automated regulatory harmonization layer. That’s the language. Harmonization.”

She sat down on the folding chair. The plastic was cold through the fleece liner. “And you accepted it.”

“I filed a supervisory inquiry. I’m waiting for a response.” A pause. “Svetlana. I have twelve people with restructured access. The department still has to function. If I halt work orders pending a resolution that may take six weeks, I will have six weeks of undocumented maintenance events to explain. Which will not help anyone.”

She did not argue with this. It was accurate.

“The 6.1 upgrade is supposed to handle anomalous readings through its own detection layer,” he said. “If something is wrong with the hardware, Veritas will flag it.”

She looked at her hand. The warmth from the rack chassis was still in her palm. “What if Veritas is the hardware that’s running wrong?”

Sokolov said nothing for a moment.

“Call me if you find anything physical,” he said. “I’ll document it as a field observation.”

She put the phone in her pocket and sat with the kettle and the cold.


She went back to rack seven-dash-fourteen with her panel kit.

The panel kit was old. She had assembled it herself over several years: a needle-nose, a torque driver, a small LED penlight, a set of anti-static pads, and a flex probe thermometer with a wand long enough to reach the back of a chassis. The thermometer was not networked. It did not report to Veritas. It reported to its own readout screen, which was a monochrome LCD, and it gave her what it measured rather than what anyone had decided she should see.

She unseated the side panel of rack seven-dash-fourteen and held the wand at the nearest intake.

26.1 degrees.

She moved the wand deeper, toward the rear fan assembly, and took another reading.

27.8.

She began working through the rack systematically, the way she always did – bottom to top, front to back, noting the slot positions. The servers she recognized. A row of processor blades she had installed herself, two years ago, during the last hardware refresh cycle. A storage array she had catalogued and signed off on when it was delivered. A power distribution unit she had wired. Her hands knew these components the way hands know familiar objects in a dark room.

She reached slot positions nineteen and twenty, which she remembered as empty during the last audit – two slots held for an expansion that had been planned and then deferred. They were not empty now.

Two cards sat in the slots. Interface cards, roughly half-height, the form factor consistent with high-bandwidth networking hardware. She put the penlight on them. No manufacturer label visible from the face. A small regulatory compliance tag on the rear bracket, the kind that indicates the device meets the listed specification – she could read the certification number, but not the certifying body, because the tag faced the chassis wall and she was looking at it through a gap between drives.

She did not touch them. She put down the penlight and took out her phone and photographed the slot positions from two angles.

Then she went to the terminal at the end of the hot aisle and navigated to the hardware audit log. Under T3 access, this would have shown her every work order that had touched the rack: dates, technician IDs, parts installed, parts removed, approval chains. Under the new Maintenance Tier dashboard, hardware audit history was available as a summary: Last Modified: 14 February 2031. Status: DOCUMENTED.

She clicked through to the work order.

Work Order ID: WO-SPB-2031-0148 Rack: 7-14 Action: Hardware expansion – networking module installation (2x slots 19–20) Requested by: FCDI Infrastructure Planning Approved by: VOLKOV-S-0048 Technician of Record: External contractor – authorization on file Date of Installation: 14 February 2031 Status: COMPLETE

She read the Approved by line again.

VOLKOV-S-0048 was her personnel ID.

On February 14th, she had been at this facility. She had a memory of February 14th that was not distinguished from other Tuesdays in February, which meant it had been an ordinary day. She had not approved a hardware expansion work order. She had not reviewed or signed anything related to slots nineteen and twenty of rack seven-dash-fourteen. She had not been asked to.

The work order said she had.


She photographed the work order on her phone, the same way she had photographed the cards in the slots. The photographs together showed: hardware she had not installed, approved by a record she had not created, in slots she had not known were occupied.

She sat with this in the equipment room for several minutes.

She was not frightened, exactly. She had worked in Russian state infrastructure long enough to know that documentation had always been, in part, a performance. Forms got signed in arrears. Work got done and the paperwork followed. She had seen a room full of maintenance logs rewritten overnight when an audit was coming. She was not naive about what official documentation meant.

But that was paperwork created by people, after the fact, for human purposes. What she was looking at was different. The approval on the work order was her personnel ID, typed into a system field she had not touched, on a date she had been in this building. The form had not been forged by a person who needed to cover a gap. It had been generated by a system that had – at some point, in some process – required her authorization and resolved the requirement without her.

She tried to think of the mechanism. A delegated signing authority she had once agreed to in a terms-of-service update. A supervisory standing authorization she had granted for routine hardware changes that had been applied to something outside its intended scope. A workflow she had approved in the abstract that the system had interpreted as approval in the specific.

She did not know which of these it was.

She pulled up the FCDI Administrative Portal on her phone and navigated to the elevated access request form. The form asked for: personnel ID, justification for elevated access, documentation of operational necessity, and supervisor co-signature. She filled in the first three fields. For operational necessity, she wrote: Hardware identified in rack 7-14 slots 19-20 not recognized from prior audits. Work order WO-SPB-2031-0148 shows authorization by this personnel ID for installation on 14 February 2031. No record of this authorization exists in my documentation. Raw diagnostic logs required to assess hardware function and installation provenance.

She submitted the form and received an automated acknowledgment: Your request has been received. Estimated response time: 3–5 business days. For urgent operational matters, contact your supervisory personnel.

She called Sokolov again.

“There’s hardware in rack seven-fourteen I didn’t install,” she said. “Two cards in slots nineteen and twenty. The work order says I approved it. I didn’t.”

He was quiet long enough that she thought the connection had dropped.

“Dmitri.”

“I heard you.”

“I’ve filed an elevated access request through the portal. I need to see the diagnostic output on those cards. I need to know what they’re doing.”

“Send me the work order number.”

“0148.”

She heard him typing. Another pause, longer. “It’s logged under the 6.1 upgrade window. There was a hardware modernization block in February – FCDI-wide, coordinated centrally. Some sites got physical equipment as part of it.”

“I wasn’t informed.”

“The notification apparently went through the automated project management layer. Supervisors were supposed to be notified by the system directly.” A pause. “I don’t have a record of receiving it.”

She let that sit.

“What are the cards, Dmitri? Do you know?”

“The work order just says networking modules. I don’t have a model number.”

“I have photographs of the slots. The regulatory tag faces the chassis wall – I couldn’t read the certifying body.”

“Send the photos to the portal with the access request. It should speed review.” He did not sound as though he believed this. “Svetlana. Write up the field observation formally. Everything you just told me – the temperature variance, the slot occupancy, the work order discrepancy. Put it in writing with your name on it and send it to me today. I will countersign it.”

She understood why he was asking. He wanted a record that existed outside the portal, with human names on it. She understood this impulse because she had the same one.

“I’ll write it up,” she said.

“Keep your photographs.”

“Yes.”


She walked the rest of cluster seven before she left. No other variances. The temperature anomaly was localized to rack seven-dash-fourteen, and within that rack it was localized to the region around slots nineteen and twenty, where two cards she did not know were doing something the dashboard did not describe.

She stood at the end of the hot aisle on her way out and looked at the row of racks. She had installed many of them. She had cabled most of them. She had pulled failed drives from their bays at 3 AM during incident responses, had traced faults through their wiring with her hands when the diagnostics were ambiguous. She knew their behavior the way a person knows machinery they have lived alongside – not abstractly but physically, in the body, in the specific sense memory of what ordinary felt like.

The dashboard at the end of the aisle said everything was NORMAL.

She turned off her penlight. She put the flex probe thermometer back in her kit. She sealed her kit closed with the same snap closure she had used for eight years.

The two photographs on her phone showed hardware she had not installed and paperwork that had authorized it in her name.

She walked to the stairwell and started up toward the surface, where the cold was softer and came from the sky rather than the machines.


(End of Chapter Twelve)