Novels2Search
2084 by Michael Harrington
Chapter 2: Activated

Chapter 2: Activated

At home I checked my alarm system immediately upon entering the house. It was conveniently placed in a large closet where I always closed the door before checking it. There was the normal alarm but there was also a covert addition added by the special people I secretly associate with. The covert part indicated no one had entered and then played around acting as if they had not been here at all. Since the Government required that they have codes for all alarms that was a very real thing. Fortunately, I would not have to worry about it today.

I grabbed my 'never online' tablet from the charger in the same closet.

The next part was the part I never liked. It was going to be work.

I downloaded the picture from my phone of the license plate cover. I ran a program called “Hail Damage Identifier.” In this case it saw the special tags in the picture and demonstrated the visual makeup of the license plate cover. This included flaws that were slightly detectable. These flaws were small indentations. Since the art was designed around the indents it was not obvious to the elites or others.

I used an option to graph the license plate. If anyone was watching, they would think I was critiquing the plate cover rather than anything too out of norm for me. The truth was that the indentations was a combinatorial based data storage method.

The encryption also relied upon the first color in the upper right of the cover. In this case it was a dark blue. Blue started the color chart with four for light blue, five for dark blue, six for light green, seven for dark green, through yellow, orange, and red. Purple would mean no data that day if light or if dark meant danger and would be my clue to be very cautious of which program took a picture of the license plate cover.

In any case the four meant smaller math for me today. I would break it all down into four square groups using the graph function. Then the location and count of the flaws would give away the data stored. The flaws were small compared to the graphed areas but that meant a flaw could be in any location inside a graphed square. I played the video to make sure the system caught all the flaws, zooming in to areas that had no detected flaws per section of four. I found three areas this way but there were a few more that appeared to have no flaws.

I carefully counted one, two, three is flaw, four. If there were two flaws it was more difficult, like the next one, two flaws meant I needed to think in combinations-based math. In this case there were six patterns that two could make and four patterns that three could make. Since the enemy would be thinking in binary terms, we used a system that could seem like binary, flaw or no flaw, but was distinctly not binary. Four options were two bits, six options were two to three bits as in a Huffman routine like 00, 01 100, 101, 110, 111. By doing it this way they would try four bits for every section of four and never get anywhere. That or they would assume that sections with more than one flaw (there was a lot of those) were indicative of more bits. When I was shown this system, they indicated that without knowing the system the government would make many assumptions of how it worked. If captured all I needed to do was indicate it was binary and indicate that I passed the information off at my office without saying to who.

All flaws were a 0 and no flaws was a 1. License plate covers were small, so our system only allowed so many bits. In this example we had forty-two locations that gave us one hundred bits. Twelve and a half bytes. This being Thursday I had collected four hundred and twenty-five bits. These bits were encrypted so I could not tell you what they said, I was merely a middleman passing information from our artist to a public dissemination method. Who the artist got his information from and what it encased I never knew.

That said I needed to start planning my blog story about the license plate cover. First, I turned off the graph system and truly looked it over. In this case it was a series of symbols of the Department of Auditing. For example, that one was symbolic of the end of Oracle and the one next to it was from the end of the NFL for distracting people from their righteous work.

Moving to my desk I started my desktop. The tablet was to the side, and I plugged my phone into the desktop to download the image to the desktop. He had four ways he could encode his data. Odd length words and even length words, which were harder than it sounded, words with I and words with o in them, which also was much harder than it sounded. I could also do numbers if I could make it work. That sometimes could work but I was also advised that I could only do it once a quarter without possibly attracting attention.

If you come across this story on Amazon, it's taken without permission from the author. Report it.

That left option number four. Option four was to include typos in my work. First, I would make a typo or two in the last forty letters, characters, numbers and even sometimes symbols. Forgetting an apostrophe was one of my favorites. This would tell them how many bits there were. The options were many since two errors or three could give the same value just via different patterns. After a long time working with the forty-length combinatorial, I could create it from memory. I always used split screen and I would make a really nasty rough draft. Something no one would read without a headache. It had a lot of errors in it, and no one would see any value in it if they were reading. The rough draft was so I could write an article in theory but make it, so I had to redo it to make it readable.

That way I could keep count as I typed, and I could add typos when appropriate. Before I did that, I made a light meal, also per my pattern, after writing the rough draft. Any auditors watching me would presume that I was eating so I could wake up and do some better typing, or so I hoped. In reality the time the microwave took, and the other delaying methods was so I could arrange for a conversion of every eight bits. I would try two errors in twenty and see what I got. If this did not work, I could then use two errors in the next twelve locations. I also was using up to down to hide the errors rather than left to right. It made double errors easier to hide that way. I also skipped one column per. I had to have forty characters for the end and at least something in the range of up to 3000 characters since we skipped columns. I usually went to about 5000 on purpose with no errors over a 20-12-20-12 double pattern set. The no errors on sixty-four would indicate end of the message. The three thousand in a very specific font designed to keep the columns clear.

A quick set of free hand on my napkin to indicate where the combinations would go (done covertly next to the microwave and made of a food based edible paper), I would already know almost exactly my column count from the first draft, I always made a second draft with the combinations in mind when I made my typed up second draft, the final draft was where I got serious about error placement. I would then read it several times from the decryption view to see if it was correct and then make a show of finishing off a quick bite and eating my napkin.

Only by being a “low waste” type could I get away with the edible napkin, it was now a lifestyle where at first it was a distinctly difficult change for me.

At 4. 5 characters per word on average I had about 1250 words. All said it was a ten-paragraph work about the quote and unquote, fantastic piece. So good of him to highlight the courage and the diligence of the Department of Auditing.

With the piece done and checked many times over I hit publish. Mission accomplished it was not time to check comments on the arts and crafts side then on the elite's portion.

I first observed a Kylo Ren making a minor comment about wanting a Star Wars license plate cover. I really was unsure what Star Wars was.

Then I noticed two more posts which made me tense up.

The oldest was a Daisy Duke and she commented how the General Lee would look with one of the race car covers.

Daisy was a flower type as was Ren. The center post was from John Washington. The trick was to choose a definitely Christian first name and to pick the name of a former President. Then before that person posted and after he posted, inside a window of 30 to 60 minutes before and after the flowers were to post. Many people might miss that Ren was a type of flower.

It was a message for me. Fortunately, it was not an alert, but unfortunately it was a notification that I was going to be contacted soon to assist in an operation. The minor insurgency was surviving by using the cell system, using vetted individuals and families, and most of all in extreme discretion. I survived the extensive efforts by the auditors and elites by my very hidden nature and the difficulty in detecting me at all. No one could peg me for anything at all.

I was not happy, and it showed. Through the evening I paced, I changed channels, I even had a touch of the low-grade alcohol I had stashed away for times just like this.

Fortunately, the near miss with the Director would protect me if someone was spying on me right now. Periodically when I got lucid from my melancholy, I mumbled the name Carl. I did this because one could not be paranoid enough in this society.

Eventually it was bedtime, and I did my wipe of the tablet, the shutdown of my desktop, my cleaning of dishes and brushed my teeth. I also put pajamas on. Professional note, the auditors sometimes did audits acting as if they had evidence against you. If you wanted to avoid 8 hours of being naked and surrounded by people who might be willing to take advantage of your nudity to hurt you while supposedly acting, well then you wore pajamas to bed like I do every night.