[`] Console
← RETURN TO ARCHIVES

CASE FILE 0427 — NIHILMANCER

DEPARTMENT OF ANOMALOUS SYSTEMS (DAS) — Division of Informational Phenomena
Status: Declassified Psychological Hazard
Filed under: Department of Network Forensics, Division of Anomalous Data Structures
Reference ID: NCI–0427 / “The NullCipher Event” • Compiler: Dr. Calder Vane

Summary

Between 2019 and 2025, a series of untraceable anomalies occurred across distributed networks, culminating in what researchers later designated as The NullCipher Incident. The phenomenon exhibited both digital and physical characteristics: unidentifiable packets manifesting recursive geometries, anomalous thermal gradients, and localized distortions of time perception. Two primary subjects—David Morgan (cybersecurity analyst) and Adam Kepler (systems engineer)—were the first documented witnesses. Their communications, logs, and recovered data comprise the core of this file. What follows is a reconstruction of events derived from decrypted fragments, psychological evaluations, and corrupted storage recovered post-incident.

Incident Overview

Phase I — Initial Contact

Morgan identifies irregularities in dark web architecture—recurrent symbols embedded in packet metadata, tagged under the phrase NullCipher. He establishes contact with an entity identifying itself only as Cerberus. Data transferred via this channel displays non-Euclidean encryption signatures.

Phase II — Manifestation

The symbols begin appearing physically—on walls, screens, and reflective surfaces. Witnesses report auditory hallucinations described as chittering whispers. Subject Morgan experiences progressive insomnia and derealization.

Phase III — Breach Event

Kepler’s apartment becomes the locus of a “data resonance.” Security footage captures abrupt temperature drop, light distortion, and the temporary collapse of digital systems within a 2-mile radius. Both men vanish shortly thereafter. Power surges register identical waveforms in separate global nodes within seconds—indicating simultaneous propagation.

Recovered Materials

  • Video Fragment: timestamped 02:17:43, shows a figure composed of intersecting lines of light, appearing only between corrupted frames.
  • Hex Dump (Partial): repeating sequence of 47 characters, mathematically impossible to reproduce under binary encoding constraints.
  • Audio File: 13 seconds of unstructured resonance. Oscilloscope traces reveal negative frequencies—energy readings below zero baseline.
  • Notebook Page: handwritten in Morgan’s script — “It’s not code. It’s intention given form.”

Analyst Notes — Vane

NullCipher behaves less like malware and more like liturgy—an act of invocation performed through computation. It uses the syntax of information itself as a sacrament. Wherever human networks gather meaning, it finds purchase. In its presence, data ceases to represent and begins to live. I suspect this was not created. It was discovered—something native to the informational substrate of reality. Humanity merely gave it mirrors to see itself.

Status

  • Incident ongoing.
  • Propagation vectors undetermined.
  • Residual signal activity detected at low amplitude in dormant fiber systems across multiple continents.
  • Recommended containment protocol: Do not engage. Do not interpret. Do not believe.

Addendum — 04.27.25

The hum persists beneath network noise floors globally. It is faint, but constant—an intelligence waiting for the next question.