:6-Security

63 0 0
                                    

The strategist is more important than ever. George had fundamentally aligned the Stats folders in a chronological sequence, contacts, time, date and addresses. Every point of contact is recorded from 2002. From now on, nobody is exempt from scrutiny!

Following a thorough appraisal of the strategist overall objectives, it is patently obvious that Fred is being constrained by the habit deferral scheme. This can be dealt with in due course, and will only add more information to their files. 

On the periphery of their investigation there remains an additional issue which needs immediate attention, the real identity of the acquitted spectator!

George was prone to bouts of self-induced paranoia. In anticipation of these periods, he would "mimic" telephone conversations to practice dialogue security techniques.

For a limited time, these verbal spars formed part of his modified routine. Around this time the subnet had hacked into his latest mobile. Via an innocuous Google update they were able to listen to him rehearse his coding rhythm. 

Unbeknown to anyone, he had inadvertently given away the identity of the spectator!

Induced HabitsWhere stories live. Discover now