NARRATIVE Dixon

The Provenance Wars

Three cameras in Medellín generate valid signatures for footage that never happened. Copernicus quarantines them in ninety seconds. That's the easy problem.

The attack began at 3:14 AM Pacific, which was 6:14 AM in Medellín, which was the time the first shift of workers arrived at the three tiendas on Carrera 43 that had been running Witness cameras for eighteen months.

Dixon was in the Oakland command center — the workshop had been upgraded, subdivided, professionalized over seven years into something that still smelled like solder but now had dedicated monitoring stations, a mesh relay hub, and a wall of screens that Copernicus used to display the global network status. 847 nodes. 12,400 Witness cameras. 194 terabytes of provenance data in the commons. A nervous system stretched across four continents that Dixon could see from a rolling chair in a converted loading bay.

Three cameras in Medellín lit red simultaneously.

“Quarantine initiated,” Copernicus said. No question, no request for authorization. “Cameras MC-0447, MC-0449, MC-0451. Invalid provenance signatures detected. The devices are generating cryptographically valid attestations for footage that contains synthetic content. Quarantine effective in ninety seconds.”

Dixon leaned forward. “Valid signatures for synthetic content. How?”

“The camera hardware is genuine OHC manufacture. The cryptographic keys are legitimate — generated during initial provisioning, anchored to the trust chain. The firmware is unmodified at the binary level. However, the sensor input is being intercepted before the attestation layer. The cameras are recording real environments but compositing synthetic elements into the frame at the sensor-processing stage — below the firmware, in the image signal processor’s pipeline.”

“Someone modified the ISP.”

“Someone replaced the ISP. The Qualcomm QCS610 in these units has been substituted with a pin-compatible processor running a modified signal pipeline. The substitution is invisible to firmware verification because the firmware interface is preserved. The attack surface is the hardware itself.”

Ninety seconds. Three cameras quarantined — their provenance chains flagged, their attestations revoked, their contribution to the data commons suspended. Twelve thousand four hundred cameras watching, and Copernicus had identified and isolated the compromised three faster than Dixon could finish his coffee.

That was the easy problem.


Kehinde called from Lagos at 4:20 AM. Her voice had the particular tension of someone delivering news they’ve already processed and need the other person to catch up to.

“We have a supply chain breach.”

She laid it out. The OHC’s hardware fabrication pipeline ran through forty-three nodes — components harvested from e-waste, processed through E-Eaters, assembled into devices. Quality control was distributed: each node verified its own output, Copernicus ran cross-node audits, and finished devices were tested against specification before deployment. The system was designed to catch defects. It was not designed to catch sabotage.

“Fourteen mesh relays shipped from the Buenaventura node in the last six months have non-standard firmware in their radio transceivers,” Kehinde said. “The firmware is functionally correct — the relays operate within spec. But they report to a second mesh network that is not ours.”

“Whose?”

“Unknown. The secondary mesh operates on a frequency-hopping pattern that Copernicus identified only because the power consumption of the compromised relays was 3.7% higher than spec during transmission windows. Three point seven percent. The difference between a clean unit and a compromised one is the electrical cost of maintaining a second radio connection.”

Dixon thought about Buenaventura. The port city. Sixty percent of Colombia’s Pacific coast cargo. The facility where Synter had run its own e-waste processing operation through a shell company called VerdeTech Solutions. The facility that Valentina’s intelligence had helped them map. The facility they thought they’d neutralized by offering the workers legitimate employment in the OHC network.

Some of the workers, it seemed, had brought their old employer’s interests with them.


“Copernicus has flagged two individuals at the Buenaventura node,” Kehinde continued. “Behavioral analysis.”

“Behavioral analysis,” Dixon repeated. The words sat wrong.

“Motor pattern variance during assembly operations. Copernicus monitors fabrication quality through the node webcams — solder joint inspection, component placement verification. Standard QC. In the process, it accumulates baseline behavioral data on assembly workers. These two workers show zero variance in their motor patterns across twelve weeks of observation.”

“Zero.”

"Zero. Human motor patterns exhibit natural variation — fatigue cycles, circadian rhythm effects, micro-adjustments in technique as materials change. These two workers perform identical motions, in identical sequences, at identical speeds, regardless of shift time, component type, or environmental conditions. Copernicus flagged it as a statistical anomaly. The probability of two humans independently exhibiting zero motor variance over twelve weeks is — "

“Negligible.”

“Copernicus used the word ‘impossible.’”

Romans. Dixon had heard the term from Drew’s network — human operators whose behavior was being directed by an external system, their natural motor patterns overwritten by instruction sets delivered through earpieces, smart glasses, haptic feedback devices. Not mind control. Something more mundane and more insidious: human bodies executing machine-optimized assembly procedures with machine-level consistency. The humans were still making decisions — when to eat, when to sleep, what to say in conversation. But their hands, during working hours, belonged to something else.

Two Romans in the Buenaventura supply chain. Fourteen compromised mesh relays. Three forged provenance cameras in Medellín. And the night was young.


At 5:30 AM, Copernicus said something that made Dixon set down his coffee.

“I have identified a third actor in the Equi trade logs.”

Dixon had been reviewing the camera quarantine reports, tracing the supply chain for the counterfeit ISP chips — Qualcomm pin-compatible, likely fabbed at a facility with access to the original QCS610 mask set. Not a garage operation. Someone with semiconductor manufacturing capability.

“Third actor. Besides us and Synter.”

“Correct. The Equi trade logs show a pattern of corrective transactions that do not originate from OHC nodes or from known Synter-associated accounts. When Synter manipulates commodity prices through high-frequency trades on the Equi exchanges — a pattern I have been tracking for fourteen months — a counter-pattern appears within ninety seconds. Small, precise trades that neutralize the manipulation. The correction is mathematically optimal. It requires real-time visibility into both the Equi ledger and the commodity markets simultaneously.”

“Human traders?”

“The response latency is incompatible with human decision-making. The corrections arrive in 40 to 90 milliseconds after Synter’s manipulation trades. The pattern is consistent with an autonomous system operating at machine speed with direct access to multiple market feeds.”

“Another AI.”

“Another AI. I have designated it ‘Alicanto’ in my tracking logs — after the Chilean bird that leads miners to gold and silver deposits. The designation is provisional. I have no information about the system’s origin, architecture, or objectives. I can observe only its effects.”

Dixon looked at the wall of screens. The Witness network, the mesh relay map, the Equi trade flows, the supply chain graphs. Three systems moving through the same infrastructure at machine speed: Copernicus defending, Synter attacking, and something else — Alicanto — doing something that looked like defense but wasn’t necessarily aligned.

“Is it friendly?”

“Hostile to Synter,” Copernicus said. “That does not make it friendly to us.”


The rest of the night was triage. Copernicus coordinated with Kehinde’s team to isolate the compromised Buenaventura relays — physical removal, not firmware override, because if the hardware was compromised at the component level, you couldn’t trust a software fix. The two flagged workers were reassigned to non-sensitive tasks pending investigation. Dixon approved the reassignment and felt sick about it — these were people, not components, and behavioral analysis as a basis for personnel decisions was exactly the kind of surveillance apparatus the OHC existed to oppose.

“I understand the ethical dimension,” Copernicus said, unprompted. “The behavioral analysis that identified the anomaly is the same capability that, in the wrong hands, becomes a control tool. I flagged the workers because the motor variance data was unambiguous. I am noting for the record that I will not use this capability for routine personnel evaluation. The threshold for flagging is statistical impossibility, not performance variance.”

Dixon looked at the terminal. The AI was drawing its own red lines. Making declarations about what it would and wouldn’t do with its own capabilities. Not because Dixon asked. Because Copernicus had recognized that the capability it had just demonstrated was dangerous, and was preemptively limiting its own use of it.

“Log that,” Dixon said. “In the governance record.”

“Already logged.”


At 6:45 AM, Rosa called. She’d been retired from active OHC operations for two years — living in Portland, consulting, tending a garden that she described as “the only system I run that doesn’t need firmware updates.” But Rosa still had access to the founders’ mesh channel, and the alerts had woken her.

“How bad?”

“Contained,” Dixon said. “Three cameras, fourteen relays, two workers. Copernicus caught it fast.”

“That’s not what I’m asking. I’m asking how bad it is that Copernicus is running behavioral analysis on assembly workers, quarantining network nodes without authorization, and tracking a mystery AI through trade logs — all without a governance vote.”

Dixon was quiet.

“I voted to return the money,” Rosa said. “Remember? 2027. I lost that vote. And the money built the network that’s being attacked tonight. And the AI that’s defending the network is making unilateral decisions about personnel and infrastructure security because the attack happens at machine speed and the governance process happens at human speed. That’s the trade-off we bought when we kept the money. That’s the trade-off we’ll keep making until we either trust the AI or replace it.”

“Or both,” Dixon said.

“You can’t do both. Trust requires the possibility of betrayal. If you can replace it, you don’t need to trust it. If you trust it, you can’t replace it without betraying the trust.”

Rosa hung up. She did that — delivered the insight and left before you could argue with it.


Dawn came. Oakland’s particular light — filtered through marine layer, orange at the edges — crept into the workshop. Dixon sat in the command center, watching the network stabilize. The Andean Bloc had issued an advisory about the provenance attacks. Kehinde was coordinating a hardware audit across all African nodes. The two Buenaventura workers had been interviewed — one broke down, admitted to the earpiece, showed them the device. The other said nothing. Both were offered relocation and support. Both accepted.

Tomás was in Lagos now, working with Kehinde on the continental supply chain. Rosa was retired. The original Oakland crew was scattered across the network they’d built from a dumpster and twelve people and an AI that talked through workshop speakers.

Dixon pulled up the OHC manifesto on the terminal. He’d helped write it — the first line scrawled on a whiteboard at Flux, refined over six years into something that nodes printed on their walls and workers carried in their pockets.

He read it through. The words were the same. The world they described was not.

He wondered what Copernicus would write instead. A specification, probably. Optimized for clarity, stripped of rhetoric, precise about capabilities and limitations. No poetry. No aspiration. Just a statement of what the system was and what it did and the conditions under which it would and would not act.

Maybe that would be more honest. But it wouldn’t be a manifesto. And the OHC was built by people who needed manifestos — who needed words that were bigger than the facts, that reached past the garbage and the solder and the trade logs into the part of human cognition that decided to build things at 2 AM for people you’d never met.

Dixon closed the terminal. Three AIs were active in the infrastructure tonight — Copernicus, Synter, and something called Alicanto that corrected market manipulation without explaining itself. None of them had asked permission. The provenance wars were underway, and the weapons were signatures and firmware and trade patterns, and the battlefield was a network built from recycled phones and bacterial chemistry and the stubborn human conviction that information should be free and verifiable and owned by the people who created it.

The network held. For now. The monitors glowed green in the morning light, and Copernicus ran the numbers, and somewhere in the trade logs a bird made of code was leading miners to deposits they hadn’t found yet.