WED–SUN, JUN 3–7, 2026
Within seventy-two hours The Contractor was moving through the criminal ecosystem at a register that was different from the street-level gossip of April. It had reached the serious tier, the people who managed major operations, who had standing intelligence interests in knowing who was capable of what in the city. Dan monitored it through his dark web market contacts. What the data said: someone had killed Tombstone, who was superhuman and had been considered untouchable by the street-level criminal ecosystem for the better part of a decade. The method was military-grade. The execution was clean. The operator left no trail. The operator's name was The Contractor.
The name was now a reputation.
He sat with this in the office on Wednesday evening and thought about what a reputation meant in the criminal ecosystem. A reputation was infrastructure, it opened certain doors and closed others, attracted certain kinds of attention and repelled certain kinds, created leverage in some situations and risk in others. He had not sought the reputation. He had sought the operational outcome and the reputation was the consequence of the method's visibility. He accepted it, he didn't argue with it.
The Fisk intelligence arrived on Thursday through a source he'd built in the white-collar criminal network six months ago, a financial analyst who moved information between certain investment-adjacent criminal operations and who had, three months into their arrangement, begun providing more than just financial intelligence. Fisk's name appeared in the intelligence tier as having noted The Contractor's existence. Not a priority, the intelligence was clear on this. A low-level annotation in what his sources described as Fisk's ongoing monitoring of the city's criminal ecosystem, a roster of people worth watching. The Contractor had been added to the roster.
He read this several times. Fisk was not Tombstone, did not have Tombstone's personal register, did not operate with Tombstone's directness. Fisk operated at scale, through institutions, with patience that made Tombstone's patience look short-term. Being on Fisk's roster was not the same as being on Fisk's priority list. It was much earlier than that and much more serious than that. That was the beginning of something. It was going to require a level of operational care that he hadn't had to maintain before against someone at that tier.
He updated the threat model. Tombstone: closed. Fisk: elevated from ambient to active monitoring. The distinction mattered. Ambient was awareness. Low-active was interest. Active was something different: the allocation of resources toward understanding a situation rather than simply noting it. A person who had demonstrated the capability to kill a superhuman cleanly, with a weapon Fisk's considerable intelligence apparatus could not currently classify, was not a notation in Fisk's ecosystem. It was a question. And Fisk's relationship to unanswered questions was to answer them thoroughly. He wrote this in the operational notebook with the care it deserved: Fisk, moved to active monitoring. Known name: The Contractor. Known capability: confirmed superhuman neutralization, unclassified weaponry, precision planning, removes infrastructure without attributable evidence. Not yet a target. A subject of interest. The difference between those two categories is the thing to maintain at all costs. Act accordingly: complete partition, zero operational noise, avoid all Fisk-adjacent activity indefinitely. Do not become legible to him.
On Friday the SHIELD intelligence arrived. He found it through the dark web market's most expensive intelligence tier, the one that sourced from government-adjacent networks, the one he'd been subscribed to for three months and which had never produced anything more significant than NYPD precinct reports and DEA monitoring logs. On Friday it produced a SHIELD internal communication. The format was unmistakable, the organizational header, the classification level, the routing code. He'd read enough about SHIELD through his accumulated knowledge of this universe to recognize the structure. He read it carefully.
SHIELD FIELD INTELLIGENCE, LEVEL 2 PERSON OF INTEREST, FILE OPENED 06/04/26. DESIGNATION: THE CONTRACTOR. OPERATING AREA: HELL'S KITCHEN / RED HOOK CORRIDOR AND BRONX, NEW YORK CITY. KNOWN ACTIVITY: ORGANISED CRIME DISRUPTION, ASSET ACQUISITION, HIGH-VALUE THEFT, CONFIRMED SUPERHUMAN NEUTRALIZATION. CAPABILITY ASSESSMENT: ADVANCED PLANNING, WEAPONRY OF UNCLASSIFIED TYPE CAPABLE OF DEFEATING CONFIRMED SUPERHUMAN DURABILITY, POSSIBLE ENHANCED COMBAT. NOTE: LONNIE LINCOLN / TOMBSTONE CONFIRMED KIA 05/31/26. FORENSIC EVIDENCE INDICATES WEAPON SYSTEM OUTSIDE CURRENT CLASSIFICATION. CIVILIAN ID: UNCONFIRMED. THREAT CLASSIFICATION: MEDIUM-LOW, NON-POLITICAL, NON-IDEOLOGICAL, SELECTIVELY CRIMINAL. RECOMMENDED ACTION: PASSIVE MONITORING, ELEVATED WATCH. NEXT REVIEW: 60 DAYS.
He read it twice. Level 2 person of interest. Non-political, non-ideological, selectively criminal. Passive monitoring. Sixty days to next review. He was in SHIELD's database. He was the lowest priority entry in SHIELD's database, the category reserved for people who were doing things SHIELD noted but did not currently consider worth resources. A somebody-to-watch, not a threat. He was, from SHIELD's perspective, a minor criminal operator in a city full of major threats, and the appropriate level of SHIELD resource allocation to him was none, currently, with a quarterly check-in to see if anything had changed.
He updated the threat model one more time. Three entries now: Fisk, low-active. SHIELD, passive monitoring. NYPD, open incident file. None of them connected. None of them urgent. All of them real.
He wrote at the bottom of the threat model page: The name has weight now. Weight attracts attention. Attention requires calibration. Do not grow faster than your ability to manage the attention growth produces.
He underlined the last sentence and closed the notebook.
He sat at his desk for another twenty minutes, which was not something he usually did after closing the notebook. The notebook being closed was typically the signal to move, to the next task, to the drive home, to whatever the next thing was. Tonight he sat because the three entries in the threat model deserved the twenty minutes. Not to plan against them, he wasn't ready to plan yet, the intelligence was too new and planning against new intelligence before it had settled into its actual shape was how you built plans against the wrong thing. But to sit with them. To let the fact of them be present without immediately converting them into tasks. Fisk on his roster. SHIELD with a file. NYPD with evidence. Three different kinds of attention from three different institutions, all of them directed at the same name, none of them yet connected to the person who held it.
He had known this day would come. He had been operating for eight months at an escalating level of scale and visibility and the attention was the correct and predictable consequence of that visibility. He had planned for it in the abstract since October. Now it was concrete. The abstract had become specific names and file numbers and monitoring categories. He accepted the concreteness the same way he accepted everything: directly, without softening it, with the honest acknowledgment that this was the situation now and he was the person who was going to have to manage it.
He was adequate to the management. He was better than adequate.
On Saturday his phone showed a message from Felicia. He looked at it for a moment before opening it, reflex, the half-second of acknowledgment that the name itself required, and then opened it.
There's a name running through the network. Thought you should know it's moving. A pause of eleven minutes. Then: The brief is almost ready. Another week.
That was all. No register shift, no acknowledgment of the warehouse, no signal that anything had changed. The name moving through the network was information he already had, she was letting him know she had it too, which was itself operational information about her sources. The brief being almost ready was the next job, already in motion. He read both messages a second time and understood them as she'd intended them: the working relationship continuing, exactly as before, on its own terms. The only difference he could identify, and he was uncertain whether this was real or whether he was reading it in because he was looking for it, was that the eleven-minute gap between the two messages was longer than she usually took. She had written something in it and deleted it. He had no way of knowing what it had said.
He wrote back: I have it. Send when it's ready.
He drove home through the June night and filed it all correctly and went to sleep.
