ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Eyes Wide Shut An Enigma - Chapter 6

Updated on July 18, 2015

Book Available

Available @ Amazon
Available @ Amazon | Source

Rough Draft: 6th Chapter

Chapter 6 What are you going to do?

JR impatiently asked, “What are you going to do next?” Curtis replied, “Both were in danger. Would JR help? They needed to learn what, where, and when to observe.” JR, gulped down the rest of the second shot. He replied, “Count me in.”

Curtis noted that they would apply the same principle that Daemon had applied: eyes wide shut. They would hide in plain sight. They would do their normal routines. Their hidden agenda was theirs alone. No one else could know. The same “need to know” rules that Daemon used applied to them too.

JR said, “The safe house was compromised. Daemon would know that it existed when they entered.” Curtis agreed and tossed back the rest of his second shot. Curtis reflected, thinking aloud, “JR, how are we gonna get out of here undetected? The safe house would be a place that they could talk, but Daemon would know something was being hidden from him.” “Exactly the case,” JR replied.

Curtis, relaxed said, “The good booze was stored in the safe room. It was always cool in there. The safe room was the best place to go for a drink.” Simple. Curtis said, “He would invite Daemon over for a drink and introduce him to JR.”

No plan of action could be discussed. They needed to learn more. Curtis said looking at JR with a smile, “How many times did they do the impossible?”

Curtis said, “JR, nothing stopped us. We produced results. Remember when they said that the KW26 Crypto Computer could not be decrypted? It used the Fibonacci Code as a universal code line that never repeated itself with, a noise diode that randomly started the code line change based on random noise?” JR Remembered the Fibonacci Code. The KW26 took the numbers derived from the Golden Ratio and converted them into a binary code.

Curtis said, “Recall it was impossible to decode (break) the Fibonacci coding, our project broke the code lines?” Curtis and JR were original thinkers.

Curtis told JR, “He had developed a method whereby they could securely communicate. It exceeded the need-to-know granularity. All data stored and processed by multi-level information systems security initiative (MISSI). This begins the process to stop Daemon.”

Curtis had completed a recent study of Frequency-hopping spread spectrum (FHSS), direct-sequence spread spectrum (DSSS), time-hopping spread-spectrum (THSS), chirp spread spectrum (CSS), and combinations of these techniques that used forms of spread spectrum.

No one knew of the technique where Curtis used sunlight, moonlight, or starlight as the carrier. Any source of ambient light would work. The noise was filtered. He got the idea when he answered his doorbell and the motion detector on his porch light had turned on the light.

Perhaps if he developed a transmitter that sensed where information had changed the environment, and he filtered the ambient noise out, he could transmit and receive all over the world using existing light. There was always light available. He used light filters that enabled him to work in infrared and visible light.

Curtis had developed The Golden Ratio that was used to generate infinite positive or negative values encryption methods. These techniques employed pseudorandom number sequences that determined and controlled the spreading pattern of the signal across infinite bandwidth that was based on transmitting short duration pulses. It was a triple random encryption of the Golden Ratio encryption process.

He had figured how to monitor the infinite spectrum for desired key codes that enabled him to transmit to a receiver that could decode his ambient infinite spectrum. The quantum codes were infinite.

Curtis and JR agreed to use Curtis’ newly discovered communication process that did not use headphones or use electrical or mechanical devices. Their special eye contacts provide visual communication.

Curtis, getting a glass of water, told JR, “The real breakthrough was the transmitting side. Reducing the transmitter to a transparent contact lens was difficult.”

Curtis told JR, “His special eye contacts would be available next week at JR’s optometrist.” They said good night and JR left.

Curtis had six pairs of the special communication eye contact lens that could be worn 24/7 for a month before requiring to be cleaned. They could be modified for individual needs.


    0 of 8192 characters used
    Post Comment
    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      9 years ago from Bakersfield, CA

      World-Traveler, The edited version is much better! I too hope the book will be adapted to a movie format... After the book is "complete," it must go through another editor and lots of "readers," it will become a viable commercial product... The scary part it is based upon actual events...

      It is possible... Stay tuned...

    • World-Traveler profile image


      9 years ago from USA

      I can think of several real life situations where there was no oversight. There should be, but there isn't.

      I hope one of the studios approach you to have a movie made of your book. James Bond calling! Or, if you cannot wait for them is there any possibility you could get the funding needed from a venture capitalist, the same way Hubpages got its start? It is possible.

    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      9 years ago from Bakersfield, CA

      Thanks! Since you are "theory" oriented, you may understand the basic concern of this book. Absolute power corrupts absolutely... This book is based upon my experiences with Top Secret Projects. The ability to do things not authorized is great. Notwithstanding people watching the "watchers," the "professional," observant leader soon learns the weaknesses of the "system." The "need to know is a valid security precaution. However, it introduces "opportunities" for abuse of power. People die "natural" deaths based upon one man's decision... or a group of individuals without "oversight." We hear about the failures of the "elimination" of the undesired individuals. This is normal in clandestine operations... "Mistakes" are eliminated...

    • Enlydia Listener profile image

      Enlydia Listener 

      9 years ago from trailer in the country

      still reading.

    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      9 years ago from Bakersfield, CA

      Are you still reading? Editing process to follow in June...

      Stay tuned.

    • loveofnight profile image


      9 years ago from Baltimore, Maryland

      you have my attention.......


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)