What we were thinking: The Enigma Wraith #4 of the Enigma Book Series-

Author Insight –

Jealousy or Delivery Proof Points

Major Guano, a long time subordinate to our evil Chairman Chang, finds himself down a peg with the addition of Prudence, a traitor to her country. Her value proposition to Chang was to provide a special element of the code he plans to control vertical agnostic systems.

Prudence’s strength has always been to play on the egos of those above her while walking on top of her co-workers. Her ability to make even long term staff appear lacking has served her well and allowed her to achieve status, now in multiple countries.

Guano, even as spineless as he appears, has no frame of reference to battle with this woman.

The evil characters in our series are typically covert, hidden in plain site, and always with underlying agendas. Let us know your thoughts. 

This story is also available in paperback and audio formats.  Enjoy and please share reviews.

Excerpt-The Enigma Wraith

After a few tense seconds, the Major stoically replied, “My apologies, Director! Please would you be so kind as to deliver your briefing orally to Chairman? Your oral talents have lead you to the top of your profession. As we all know your oral delivery is much preferred by Chairman to all other reporting.”

The innuendo that Prudence always delivered orally to Chairman wiped the smirk off her face.

Prudence turned to face the now grinning Chairman as she explained, ““Chairman, we have so named this in honor of the Chinese Bai Hu or White Tiger. I would be most pleased if this was for your white tiger, Nikkei.

“Our work on the BAI HU project has yielded some very positive results, Chairman. The first proof of concepts showed that our mutating code, genetically engineered for infiltrating host systems, can then assemble itself and grow dynamically to complete the embedded tasks.

“Our original prototype code is now greatly enhanced to penetrate every defense system we have introduced it into. The BAI HU project has been greatly accelerated with the access to the super computer that you arranged. The first generation of our code, as you will remember, was simply encrypted with self-destructing algorithms to be launched if it was detected.

“This new generation of code is self-generating, opportunistically adaptive, and self-propagating, which is very much more to our purposes. We can program in the ultimate assignment, the time parameters, mile-stones, and exit protocol and simply launch it. It builds with internally generated material and grows at a rate suitable to meet the time deadlines.”

Chairman enthusiastically asked, “And what of the forensics team efforts after the fact? Can the digital fingerprints be re-assembled to understand how it is put together or where it came from? Most importantly, can it be traced back to us?”

Prudence smiled a Cheshire cat smile as she responded, “We have seen to it that the dispatched code suffers from digital decomposition the same as its biological counterparts. Basically nothing is left to analyze since part of its genetic makeup is to remove all traces of itself from the point of its inception to the last digital breath that it takes. It comes from nowhere and leaves without a trace. Genetic engineered code designed to vanish when complete.”

Chairman was thoughtful for a few minutes, then asked, “And what of the BAI HU project while it is operating on its mission? How does it defend itself while it is operating on assignment and thus essentially vulnerable?”

Prudence confidently replied, “We have given it a couple of defense mechanisms which includes functioning at the operating system level, much like a standard rootkit in encrypted mode. It is though greatly enhanced by the IQ 5678 super computer. You would have to know when and where the vanishing code had been introduced and have an equally powerful Chinese super computer to be able to try and break the encryption algorithm.

“To vet our encryption algorithm, after we built it, we fed it into the IQ 5678 super computer to see how long it would take. Because of its genetic design and adaptability, the Chinese super computer had no small amount of difficulty in breaking it. Basically, the IQ 5678 consumed all its computer resources, which was undoubtedly what Professor Lin was referring to with regards to consuming all his resources.

“We had to terminate the program request to break the encryption algorithm and requested an estimated projection of processing time to do the job. The IQ system indicated that it would take two to the twenty fourth power in centuries to break the code. I am quite confident that we should be done with our program objective by then.”

Chairman agreed, “Madam Director, I am glad your ability to deliver results was not an idle boast. I am pleased with the progress. Let’s speak again at the end of the week. I am anxious to hear the details of the next proof of concept test you have planned. We will talk again then.”