
A Whistleblower, a Sealed Cabin, and a Train That Doesn't Stop
“Bolted from the inside. Laptop wiped. The bodyguard says he heard nothing.”
Federal rail safety auditor Victor Hale boarded the 11:40 PM express carrying a locked briefcase and, almost certainly, the evidence that would end several careers. He never reached Meridian. He was found in his sealed sleeper cabin — briefcase emptied, laptop wiped to bare metal, door bolted from the inside. His private security escort, hired after a series of threats, was stationed in the corridor for the entire journey and swears he heard nothing. Hale had spent eight months documenting falsified telemetry and safety records across Meridian Rail lines. Four people on that train had both the access and the motive: the onboard systems engineer, the lead attendant, the bodyguard, and a corporate liaison shadowing the audit. One of them was in that cabin before the door was bolted.
A sleek overnight express moving through pitch-black countryside. Motion blur on dark pine forests. Rain streaking horizontally across steel. The sleeper corridors dimly lit, cabin doors heavy and identical, the rhythm of rails underneath every conversation. Trains are small societies on wheels — everyone on board shares an alibi but nobody has a good one. This is the classical locked-room puzzle in modern form: constrained geography, short time window, fixed cast, and a body behind a door that shouldn't have opened for anyone.
Controls diagnostics, ventilation, and telemetry on Train M-77. Previously reprimanded for altering maintenance reports.
Oversees cabin staff and incident reporting. Keeps trains on schedule by any means.
Contracted to protect Victor Hale after threats. Carries himself like he knows how to disappear problems.
Company rep shadowing the audit. Handles regulators, press posture, and ‘incident narratives.’
Whistleblower investigating falsified telemetry and safety logs across Meridian Rail lines.
File recovery — the "wiped" laptop is not as wiped as the killer hoped. Magic bytes and carving reveal what was deleted.
How this technique works →Cryptography — the whistleblower's files are encrypted, and the key is somewhere in his luggage, correspondence, or behaviour.
How this technique works →Corporate money trails — who was paying whom, and how much, and when it suddenly stopped.
How this technique works →Communications forensics — incoming and outgoing traffic from onboard connectivity, resolved to specific devices and times.
Expert difficulty. Approximately 120 minutes — our most complex case by a small margin. Strong fit for fans of Agatha Christie and classic whodunits. The central puzzle is the locked room itself: how did someone get in, kill Hale, and leave the door bolted behind them? The evidence layer adds a wiped laptop, encrypted whistleblower files, telemetry records, and four competing narratives from four suspects who can all account for themselves — on paper.
Ready to investigate?