Induced Habits

By BillJ7

2K 29 6

His location was always crucial, however certain objects will always create another frustrating habit! George... More

Seclusion
:1-Diversion
:2-Concealment
:3-Superiority
:4-Obsession
:5-Observation
:6-Security
:7-Control
:8-Diving
Sequence
:9-Division
:10-Concession
:11-Sectioned
:12-Objurgation
:14-Superficial
:15-Configuration
:16-Divergence
Statistics
:17-Intersection
:18-Exclusion
:19-Restricted
:20-Activation
:21-Accession
:22-Reprisal
:23-Execution
:24-Interference
Static
:25-Interrogation
:26-Experiment
:27-Responsivity
:28-Actuation
:29-Acceleration
:30-Reality
:31-Extol
:32-Intensifying
Statements
:S-1.0
:S-2.0
:S-3.0
Detention
:D-1.0
:D-2.0
:Analysis
:A-1.0
:A-2.0
:Confirmation
:Contradiction

:13-Objection

47 1 0
By BillJ7

In effect, he is now a satellite informant who works on behalf of a framework. The upshot was affirmation, but the negative was a parallel reporting shaft and constant scrutiny.

The term, "framework", in conjunction with an induction, had led him to believe that BM was directing other IT cells. This was not the case as he was a singular instrument!

Scanning for security threats is a derivative of the HH (Hypersensitive habit) so his first instinct was to search his new abode for hidden recording devices. A devious spot is always behind the fridge. He was painfully aware that the hum is an inbuilt preventive measure, but it can produce secondary reactions. When he is satisfied that no devices are present, he can then proceed to securing the Laptop.

Irrespective of the virgin packaging or the labels, he needed to verify the console via his own secure method. He used his flash-drive to pinpoint miniscule manipulations of Microsoft OS files. A deep scan finds nothing unsought, yet it does provoke the "Hereditary Habit". He has found a weakness in the framework and this weakness can be exploited!

Despite the provisional mould and the detailed instructions from BM, which were "acquire information on Fred", his first thoughts are to hack the framework itself. 

BM was adept with the knock on affects of blind living; hence there were legitimate reasons for compartmentalising his agenda. He operates under the principle of zero data communications for a reason. George was not the first informant, who thought he could eliminate the other network cells!

Continue Reading

You'll Also Like

191K 1.4K 16
it's in the title, thanks for reading :)
776 61 18
George 5,000 miles away Sapnap leaving to visit his depressed friend Dream left alone in his humid miserable home No one's winning
230 22 26
An ancient evil reborn, the answers he seeks to faded memories may unknowingly awaken old (genocidal) habits.
328 28 21
He has lost everything....