home

search

## Chapter 26 — Outsmarter

  ## Chapter 26 — Outsmarter

  The investor's name, as he had given it at the initial contact, was Fang Mingzhi.

  Chen Hao had found him through a financial industry networking forum — a man who posted occasionally about private equity trends, never with enough specificity to be useful but always with enough vocabulary to signal access. His profile photo was careful: not wealthy-looking, not modest, the specific neutrality of someone who had thought about what the photo communicated. He had three hundred connections. He had been on the platform for four years. He was, by the surface indicators, exactly what he appeared.

  Chen Hao had been working the approach for eleven days before the first meeting.

  ---

  The operation was a variant of the Lin Shouqing structure. Chen Hao had refined the method across three successful operations since June. The shell company had two months of light activity behind it: a registered address, a phone number that answered, two recommendations from secondary identities. Sufficient for the target tier he had been working.

  Fang Mingzhi was a step above that tier.

  He should have noticed this earlier. He noticed it at the first meeting, when Fang arrived seven minutes late — not the lateness of a disorganized man but of a man who had spent seven minutes in the car park confirming something on his phone. He sat down with the ease of someone who had already decided something and was here to confirm it.

  The conversation was good. Fang asked intelligent questions. He shared selective financial detail — enough to seem open, not enough to be useful. He suggested a second meeting.

  Chen Hao left with a small, specific unease he could not yet locate. He walked to the metro and stood at the window and tried to locate it and couldn't. He flagged it and moved on.

  ---

  He located it on day three.

  Background check. Standard practice now, the eight-day minimum for targets above a certain value threshold. The forum profile was four years old. The three hundred connections included seventeen people who had themselves joined the platform in the last eight months, profiles with the same careful neutrality as Fang's photo, posted between zero and two times each.

  Secondary identities.

  Chen Hao sat with this for an hour.

  Two possibilities: Fang was running his own operation on a different target and Chen Hao had encountered the preparation infrastructure by accident. Or Fang was running his operation on Chen Hao.

  He turned the second possibility over. Felt for doubt — the instinct to assume the more innocent explanation. The doubt was present. He noted it. He set it aside. He had seventeen data points pointing one direction and the desire for a simpler explanation pointing the other, and he had learned to be suspicious of desire as evidence.

  You could be reading stolen content. Head to the original site for the genuine story.

  The second meeting was in four days.

  ---

  He went.

  He reconfigured his approach entirely in the forty-eight hours before the meeting. He arrived eight minutes early, chose a different table — better sight line, secondary exit, facing the door. He ordered water. He was already seated when Fang arrived.

  Fang saw the table change. A fraction of a second's adjustment — so brief that without the past eleven days of preparation Chen Hao would not have caught it.

  He caught it. Something in him went very quiet.

  They sat. Fang described the opportunity: a development project in Zhuhai, 4 million yuan financing gap, 18% projected return over thirty months. He slid documentation across the table.

  Chen Hao looked at it without touching it. He looked at the table. He looked at his own hands, flat on the table, and took one slow breath.

  He said: "You're a fraud investigator."

  ---

  A silence of two or three seconds. Fang's face settled — not surprise, resolution. The specific expression of a calculation receiving its answer.

  "Retired," Fang said. "Consulting now."

  "For whom."

  "Varies." He picked up his tea. "You're better than most."

  "The secondary identities. Seventeen accounts, similar construction to yours. More infrastructure than a private investor needs."

  "More than a legitimate consultant needs too," Fang said, looking at Chen Hao with something genuinely close to interest. "How long did it take you to spot them."

  "Day three."

  "Most people look at the profile. Not the network." He set down his tea. "You came anyway."

  "I wanted to understand the structure."

  "And?"

  Chen Hao thought about what he had understood, across eleven days and two meetings. Fang had built a target profile through the forum. Had allowed the secondary identity infrastructure to remain visible — just visible enough — as a test. Had constructed the Zhuhai project as a plausible offer to move a less careful operator to commitment.

  "You weren't trying to arrest me. If you were, you'd have brought someone."

  "No."

  "You wanted to see how far the operation would run. And whether I'd recognize it."

  Fang was quiet for a moment.

  "I've been doing this eleven years," he said. "Investigating, then consulting. I've seen most configurations." He looked at Chen Hao steadily. "Your configuration is unusual. The shell company is light but not careless. The approach construction is sophisticated. The target selection shows pattern recognition most people in your position don't develop for years." He paused. "You're also newer to this than you present. There's a carefulness that experienced operators lose."

  "What do you want."

  "I have clients who need intelligence on specific operations. Not prosecution — they're past the point where prosecution is useful. They want to understand the mechanics of what was done to them." He placed a card on the table. Plain, a phone number, no name. "Paid consulting. Analytical work. You would not be required to do anything you haven't already done."

  Chen Hao looked at the card.

  The structure of what was being offered was clear: an operator identified through a counter-sting, placed inside a legitimate-adjacent framework, skill set extracted for the investigator's clients. Both sides received value. Chen Hao received a fee and, implicitly, a degree of protection from someone who had just demonstrated the capability to identify him.

  It was a pyramid. He recognized it the way you recognize a face in a crowd — immediately, without working it out.

  He picked up the card.

  "I'll think about it," he said.

  He left first. He did not hurry.

  On the street he walked two blocks and stopped in the afternoon light.

  Fang had run three of the six levers on him across eleven days: authority, identity affirmation, urgency — the Zhuhai timeline. He had felt none of them land while they were landing. He had caught them only in retrospect.

  That was useful information about himself. The kind of information he would have preferred not to have confirmed.

  He put the card in his jacket pocket and kept walking.

  *The world was full of people who understood the structure. He had been learning to read — and had not fully considered that other people, differently positioned, were also reading. The pyramid had watchers at every level, and some of them were watching him.*

Recommended Popular Novels