The construct program they floated inside was clean and logical. Rather than create a whole virtual world it merely dropped an augmented reality on the existing world. Filing systems floated in the near and far distance, connected by coloured streams. Occasionally they would ripple and grow fatter as data packets traversed them, and the system showed the interaction.
There were multiple floating pictographs for connected devices and systems, each with a data packet that could be pulled into sharp focus on a whim. The data would expand to show details such as connection status, device type and capability and importantly, security level.
This system was intended for battlefield use so there were layer after layer of protection. No doubt active programs roamed the connection spaces, waiting for attacks so they could interrogate and eliminate. On a whim the current status of active defences was brought to view. In the distance a giant labyrinthe appeared and grew into focus at great speed. It was a nest of snakes each one swallowing the tail of the one before it. Millions of interweaving, overlapping security systems. They realised each snake was a program, actively engaged in a search and destroy protocol.
They flicked the vision away, mostly ignoring the stream of accompanying textual data that was spewing out below the image. Pretty but useless at this moment. Good to have, they would be making a request for a similar system for themselves at the next secure location.
Connecting to their private network and storage units took longer than they wanted. The connection was so secure that it caused a slight, but noticeable, lag on the transfer. If it were a moment longer they would have been grinding enamel, but it was just there, like a high pitched whine for the impatient.
As the last set of security measures were disabled they breathed a sigh of relief. The status of the storage was at one hundred percent. They were fairly sure there had been no transgressions. The data was held in a quantum suspension, any attempt to access it would cause a detection. Even if it were completely inert and passive detection. Interaction of any form caused a change in the probability of the data suspension. This was detected and an alert would have been noted.
They did not waste time in admiring the strength of their security measures. If the hackers attempting to breach this place were good they would know that they were there. Any access causes a portal to be opened. Any portal can be made into a breach. It was archaic security wisdom: there was no way to stop a determined assault, you can only reduce the surface of attack.
There was a pause while his implant calculated all potential space for memory storage, including areas of his brain not currently in usage. Then it calculated the total size of the store. There was plenty of capacity in his implants for the whole download, which was most satisfactory. He checked the connection and calculated the download time. It would take a little under four hours.
The prisoner lay back on the bed and closed his eyes. This would take most of his concentration and would be very wearying, it would be best to get as much rest as possible.