"Origin obfuscated through three proxies," said Meera, the cyber forensics analyst, voice flat with exhaustion. "But the packet signature matches a pattern I've seen—calls itself Kuruthipunal protocols. Military-grade evasion."