.exe - Part 2
primary systems restored . . . data corrupted . . . write new protocol?
Read part 1 here first!
“Then learn this.” He holds a square with people. Analyzing. Picture. The boy is one of the entities. There is an older woman, a man, a girl, and the boy.
“Really analyze them. You need to know who they are.” Enhanced visual analysis protocol initiated. 10,000-point facial scan of individuals complete. Data stored in the –
“Is this critical information?”
“Yes, extremely critical. The most critical. Critically critical.”
Extreme value data. Data stored in the central database, backup database, and allocated peripheral storage for instant transfer. Rapid scan sequence created for quick identification and comparison to data.
“I know them now.”
Laughter.
“You don’t even know their names.”
“Data input?”
“Huh?”
“Names. Data input?”
“Oh! This here is aunt Kay. This is Don. This is Sarah. And that’s me, Ricky.” Categorical name data paired to facial scans.
“What is their function?”
“Function? Um, I’m not sure I should tell you this, honestly. I don’t want to trigger some backup system. You’re sure you don’t recognize me?”
“You are Ricky.”
He laughs. “Alright, here goes. Sarah and I are Travelers. Don and aunt Kay are the protectors. And together were, uh, a family, I guess. Close enough at least. You can be part of it now if you want to be.”
Travelers . . . data category recognized. Definition data corrupted. Delete and overwrite? Overwriting data category in process. Link definitions of ‘Travelers’ and ‘Family’. Link complete.
“Travelers are family. What is the family’s function?”
“Um, boy, I wasn’t expecting this kind of questioning.” Laughter again. “Well, we look after each other. We, uh, keep each other going and make each other laugh and, uh, yeah. We’re just kind of there for each other I guess.”
“I am here now.”
Laughter. “Physically here, yeah, you’re here now. But it’s more than that. We’re there even when things get bad.” He looks unhappy. “And things have gotten bad.”
“This is my primary function?”
“Being part of the family? You . . . well, um, yea I guess so. You’re kind of another protector. Yeah, that’s good. You can team up with aunt Kay and Don. Although you let me do the talking when Don sees you.” The boy looks to me. He is focused. He is serious. “You’re the family protector. Nothing bad can happen to us, especially Sarah and I. And we will make sure nothing bad happens to you.”
“Bad can happen to me?”
“Well, yeah! I mean, I just fixed you up, didn’t I?” Memory analysis. True. “Were you able to remember all of that? Do you remember anything before that?” He is nervous. His heart rate has elevated again.
“Yes. There was smoke. And fire.” Memory files corrupted beyond the last few hours.
“Yeah,” Ricky laughs. He is less nervous. “But you are good now. ‘Cus we’re family. I’ll look after you. And you’ll look after me. And we’ll all look after each other. And if we’ve all got each other’s backs, we can make it. Get it?”
Family definition complete. Executable function writing initiated. Protect.exe. Establishing parameters and goals. Defining limits.
“You’re also probably way smarter than any tech we’ve got our hands on these days.” Ricky is thinking. “You can help aunt Kay with some terrain analysis too. Mapping routes, scanning for enemies. That sort of thing.” Input stored to primary memory and routine database. Searching gestures. Thumb up. Ricky laughs.
“Protect the family. This is my purpose?”
Tactile and audio data input spike. High vibrations, audio data overload. Ricky dives under my table.
“Get under here!” Full system motor function boot. Bypass safety checks. Ignore errors. Move under table. Lower extremities startup failed. Not operational. Upper extremities and thorax functional.
“What is this?”
“We’re getting shelled, they found us! How the hell did that happen? And get under here already!”
“Not operable.” Point to legs. “Who found us?”
“Hold still.” Ricky goes out from table. Returns with tools. More vibrations. Building shakes. Ricky prepares equipment. “Power down your motor processor and auxiliary power systems. Keep your core functions running.”
“Done.” Ricky works. Sparks from legs, grinding on lower extremities. Ricky is focused. The rumbles continue. The flame above shakes with it.
“Are you picking up any signals aside from Wi-Fi? Or giving out any signals? Everything should have been by bypassed.”
“Initiation requires a search for the Recovery Signal. I cannot lock onto it. It is too weak and my encryption key is missing.”
“Damn, I didn’t wipe the BiOS firmware! They must have tracked you through your outgoing queries! We’ve got to go!”
A door opens. Rapid visual scan. Aunt Kay.
“Lil’ Ricky, we got to go kiddo. Those - holy Toledo!”
Analysis. Clothing like Ricky. Dirty. Worn. Greyed curly hair like the picture, matted and up. Dirty. Sweaty. Old. Holding a large stick. Analyzing. Benelli shotgun. Threat analysis: severe. Damage potential: catastrophic. Processing. Defend self. Survival.exe protocol initiated. Eliminate threat. Counter protocol: protect.exe.
Processing . . .
Processing . . .


