Marcy looked at her screen. The script was still running. File by file. Ghost punches stacking up like a second shift no one ever saw.
She downloaded it anyway.
“Hey, don’t delete that USB drive. Corporate’s sending someone tomorrow. They’re asking about ‘legacy access logs.’”
Then she wrote a new script. This one didn’t read. It watched. zkteco dat file reader
She wrote a loop. One file turned into a hundred. The script began stitching together shifts. Absences. Late arrivals. Then—anomalies.
Marcy found the raw hex dump. The ZK Teco devices stored user-defined fields. One field was labeled AccessLevel . For J. Carver, it wasn't 1 (Manager) or 2 (Employee).
It was 0xFF .
She’d been tasked with cleaning out the server closet—a decade of digital sediment. Worn CAT5 cables, a modem that remembered dial-up, and a single USB drive labeled only: ZK Teco Backups 2014-2019 .
Terminal spit out: User ID: 0042 | Name: J. Carver | Timestamp: 2016-03-14 08:31:47
Pause. “They said a ZK Teco device went missing from the vault corridor in 2016. We never reported it.” Marcy looked at her screen
Just a punch. Clocking in.
Leo squinted. “Old timeclock data. Fingerprints. Punch logs. The software to read them died with Windows 7.” He shrugged. “Why, you writing a novel?”
In the fluorescent hum of the back office at “A-1 Secure Logistics,” Marcy discovered the file. Ghost punches stacking up like a second shift
“What are these?” she asked Leo, the daytime IT guy who claimed to know everything.