ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Eyes Wide Shut An Enigma, Chapter 5

Updated on April 11, 2015
New Book Available at Amazon
New Book Available at Amazon | Source

Chapter 5 - Rough Draft

Chapter 5 Curtis Joins Daemon

Daemon asked in a formal business manner, “Are you with me, or against me?”

Curtis knew Daemon was a dangerous man. He must join him to stop him. Daemon would be the key to how own destruction.

Daemon broke into Curtis' thoughts with, “Well?”

Curtis said, “Count me in. My background and interest is a perfect match. I need to live like a normal person. Will I be able to leave this place?” A relaxed Daemon said, “of course. You begin work at eight. I, not any government program, will pay you. I will pay you in cash more than you ever dreamed of getting $1,200,000 per year – that is $100,000 per month.” Curtis nodded his head and said, “I am with you.” Daemon replied, “Welcome to the Experimental Flying Weapons Platform Program.”

Dallas knew Daemon could access information, or people anywhere, anytime. He would know what Curtis was doing. Daemon reminded Curtis about the dead bank robber incident. Curtis understood he would be under constant surveillance 24/7.

“Our primary concern is that the Top Secret activities not be discovered. Our cover is the experimental testing of advance flying weapons systems platforms – both manned and unmanned. We are damn good at it. Are there any questions Curtis?” Curtis did not respond.

Daemon describes some activities of the facility. “One example of the experimental testing program was the development of the anti-gravity fighter disc fleet (silver disk) that you saw. That cave entrance has a clever entry and closing mechanism. We knew you looked for it.”

The anti-gravity fighter disc fleet is equipped with Neutral Particle Beam directed-energy weapons, and capable of effecting optical as well as radar invisibility, it is deployed for worldwide military operations.

Another product was the TR-3, a secret hyper-sonic ram jet aircraft capable of a Mach 6 performance that was immediately recognizable by the pure delta triangle air frame and the reported, “Donuts-On-A-Rope” contrails. We use that aircraft to conduct regular flights to the secret ‘Black’ space stations orbiting the Earth. It has reached the end of its useful cycle. You do not need to know about the replacement.”

Curtis believed Daemon. When the U2 was phased out, it was technology had surpassed the program. Same with the SR73.

Daemon, with a tilt of his head, said, “He was integrating a particle beam weapon into his flying platforms.” Curtis asked, “So what is a particle beam weapon?” Daemon, who loved to demonstrate his superior knowledge, explained, “It is similar to a laser. Lasers shoot a beam of electromagnetic radiation (light), while particle beam weapons shoot a beam of sub-atomic particles. Things such as electrons, protons, or ions. Think of particle beams are atomic weaponry on steroids. The best part is you can direct them to pinpoint accuracy. The beams are not radioactive either.”

Curtis asked Daemon exactly what were his “altered humans” going to do? How were they going to “eliminate” the people that he did not approve?

Daemon smiled and said, “You always ask too many questions. When you have the need to know, I will inform you. You know the “Need to Know” process. It is a matter of security.”

Daemon was scary. Curtis looked at his watch, thinking he had heard enough and knowing he was tired of Daemon. He wanted to go home. JR would be worried if he did not meet him for a scheduled dinner at their favorite Jake's steak house. Daemon had noticed that Curtis glanced at his watch and said, “I bet you are wondering how you will get home?” Curtis yawned, “Yes he must leave immediately to meet his friend. He needs to get back to his car at McDonald's.”

As Curtis passed through the magnetically opened door, he wondered if he was going to be kidnapped again. Daemon interrupted his thoughts telling Curtis he is arranging transportation to his car.

There are security protocols that Curtis needed to know about this place. How does he get back here? Does he need a pass and duress word? What time did he work tomorrow? Daemon told Curtis “It was not like the old days, a pass, or duress word was not required. Curtis’ unique electronic profile had received clearances. Be here at 8 in the morning.”

Daemon paused in the hall and said, “He needed to tell Curtis about the area in general. There are many underground facilities around here. Their existences are classified. A facility known as the Plateau is nearby Tejon Ranch where Northrop has built a secret underground facility.

Another nearby underground facility around here is Llano. It is similar to The Facility here. It does not use wires for electricity or anything electronic. It uses fiber optics and magnetism. There are no normal electrical controls. Everything electrical is the same at the Facility. This is used to have a defense against a large nuclear device triggering electro motive forces - pulses (EMF) that would destroy all existing wired electronic and electrical devices.

The average depth of these bases is over a mile, and they again are basically whole cities underground. They all are between 2.66 and 4.25 cubic miles in size. They have laser-drilling machines that can drill a tunnel seven miles long in one day. The Black Projects sidestep the authority of Congress, which as we know is illegal. Right now, my friends are depending on these bases.

We are of course at Edwards Air Force Base (EAFB) Experimental Flying Weapons Platform Testing facility. It is called simply, The Facility. It is the most secure facility in the world. The facility is about 3,000 feet below the surface in a bomb-proof, biological, and chemical hazard resistant facility. It was self-contained.”

Curtis had been briefed in other underground facilities. The rock geology posed a significant challenge for nuclear weapons. Such a target is difficult to penetrate. The facility has “S” reversed curved halls with two abrupt 90º corners to deflect and trigger massive doors dropping immediately into the tunnel.

Daemon gave Curtis a summary of the Facility. “Using the current massive ordnance payloads (30,000-50,000 lbs.) with dual delivery, where a second penetrator follows immediately behind the first, and boosting the penetrator velocity with a rocket motor, a depth of up to 40 meters (131 feet) can be achieved in moderately hard rock. In view of the promise of such a massive penetrator for both conventional and nuclear payloads, the Facility is 3,000 (914meters) feet below the surface. The Facility cannot be penetrated by a nuclear payload.”

There was a section of The Facility that was connected to the underground research self-contain city. Daemon was the only one that knew about it. He had his “deleted” associates construct the unhidden door. It was a clever arrangement of hiding the entrance in plain sight within the underground city. No one could have access to The Facility from the underground city, except him. The entry had quantum-encrypted locks that matched his unique biological vibrations.

In addition, the facility had a Faraday grid embedded in concrete ensuring that they were not accessible to audio or electromagnetic penetration. They were invisible to satellites. The Facility utilized cloaking devices that bent electromagnetic waves, such as light, or radar. The facility was invisible.

Curtis had worked many underground installations. Some of them were near EAFB. Most recently at the underground tunnels and facilities in New Mexico at Dulce, Quartzite Mountain, and Tonopah.

Curtis had a cousin, Laury who told him about Edwards Air force Base. "There's more than just tunnels down there. There's everything you can imagine down there. I know because we put it up. It would blow your mind. We installed it. We did everything."

As Curtis reflected about what Laury had said, he remembered Laury saying “He said he would take tube shuttles 50 miles to the other end of the base in the Tehachapi Mountains. The underground base had been referred to as an underground city. He remembered his buddy was fired for being ‘unmanageable’ as EAFB management puts it. He was spray painting. He was talking. He was not supposed to talk. The Spybee kept bumping into the back of his neck. He turned and said, ‘screw you’ as he sprayed the Spybee.

Laury said, “Even though he was fired, it was funny watching the Spybee blinded, disappeared bouncing off the walls, and quickly withdrew from its spy mission.”

The Spybees were weird. They were everywhere. If you said anything, one would appear.

Curtis could not tell if the two people inside the approaching van were the same ones earlier. They all looked alike. Curtis thought, “Are they clones?” Daemon said, “Get in, they will take you back to your car. See you tomorrow.”

Steganographic Telephoto of Entrance: EAFB Experimental Aircraft Testing

As Curtis was being escorted to the entrance of the underground Facility, he could see how the facility was designed to deflect bomb blast ricocheting down the hall with two 90º turns. It did not take long to drive through the “S” shaped tunnel. Two similar looking MPs were at the entrance.

The ride back to McDonald's was uneventful with no conversation. Curtis was glad to be back in his car. It was time to meet his JR for dinner.

Curtis had worked in projects where he used time proven technologies of alerting his agency each time that he changed locations and indicating estimated time for arrival (ETA) for his arrival at the new locations. Cell phones and a GPS devise that updated his position on a real basis were used.

The rules were changed. Daemon was very resourceful. The USAF Experimental Aircraft Testing Facility was doing the monitoring. They knew everything. His job was to find and exploit the weaknesses.

Curtis and JR greeted and sat down for dinner. How was Curtis going to tell JR what the hell has happened? JR was knowledgeable about the projects that Curtis has worked on. He was a quick and resourceful thinker. JR could help Curtis, if he knew what to do.

Curtis knew he was being watched. How was he being watched? Electronic or audio surveillance, or both? Daemon was obviously integrating Remote Neural Monitoring RNM of individual’s bio electric fields.

Everyone has a unique electronic resonance that could be monitored through many inputs: satellites, power lines, metal pipes, Radio Frequency ID (RFIDs) grains broadcasted in strategic places, or invisible holograms all integrated into useful information upon user’s request.

Daemon had access to advance tools and unlimited resources. Curtis would develop a systematic approach to learn the extent of his surveillance. He knew JR had lots of experience in this area. He would consult with JR.

Curtis knew that JR’s most recent experience in developing advanced surveillance tools included Air Force Spybees, Bugbots, or Micro Air Vehicle (MAVs) bug-like drones that were smaller than a fly. They now used artificial Intelligence (AI) and were in communication with thousands of other BugBots as well as command centers. JR had successfully integrated passive Radio Frequency ID’s (RFID) when scanned from satellites, produced enhanced surveillance. The combined inputs produced flexible, on-demand information that enhanced other surveillance inputs.

JR had worked with NSA Signals Intelligence and was able to remotely detect individuals electronic neuronal activity.

As Curtis and JR settled in their chairs, Curtis noticed two gentlemen being seated with their backs facing Curtis in the far corner. They looked the same as the two MP’s that demonstrated their ability to do Daemon’s “right thing.” They had been followed.

JR noticed that Curtis was quiet. JR asked, “Are you OK? Curtis replied, “Are you a widow’s son?” JR knew this was a duress statement. Both were neighbors from the first grade through high school graduation. They were veterans of various games such as: “Cops and Robbers,” and make believe “James Bond Spy games.” They had agreed when they were children they would always be available for each other and their coded statement would be used to let the other one know something was wrong.

They had chosen this statement because JR’s dad had been rejected for a bank loan when he muttered, “Are you a widow’s son,” (thinking the banker had no heart) and the banker immediately stopped and gave him the loan. JR and Curtis thought that the phrase must be important, or meant something.

JR smiled and said, “Do I look that bad?” They both laughed. They had communicated. They enjoyed their dinner; Curtis invited JR to stop for an aperitif. JR agreed to follow Curtis home.

The two gentlemen at the far corner did not move. They did not leave their table. Curtis knew that they did not have to follow Curtis for Daemon to know what they were doing. Daemon wanted Curtis to know he was watching.

They went directly into a very special room that Curtis had prepared for emergencies. Curtis slightly lifted and twisted the large picture on the far wall. An invisible vault door swung opened; the door edges matched the paneling grooves.

They entered the self-contained safe room. It was “spy proofed.” No electronic or audible penetration was possible. No compromising (usually referred as TEMPEST) emanations of any frequencies could come in or go out. It was his safe house where he could live for a month or escape. They entered and closed the heavy door. They heard the massive dead bolts engage. No one could get into the reinforced, 18-inch thick, concrete walls, floors, and ceiling safe room. They were safe for now.

“What the hell is going on Curtis?” JR waved his hand toward Curtis with a concerned look, “You get someone pregnant?” Curtis answered running his hand through his hair, and said, “Wow, you would not believe what happened to him.” Curtis told JR what had happened as JR poured two shots of their favorite aperitif, Frangelico liqueur.

JR puzzled asked, “What are you going to do? Curtis replied, “He first must treat the Daemon threat as if it was a research project. The first step in solving a problem is to use the Ockham's Razor principle: keep it simple.

Curtis knew from years of scientific research that a simple five-step scientific method:

1. State the problem,

2. Make Observations,

3. Form a Hypothesis,

4. Do the experiment, &

5. Draw a conclusion

To solve the problem would be the first step in the process to organize his thoughts and actions/reactions to eliminate, or neutralize Daemon as a threat.

The problem was how to stop Daemon with “New World Order” undertones. Was this a worldwide conspiracy being orchestrated by an extremely powerful and influential Daemon? Daemon determined what was right, or wrong with life or death consequences. He was the judicial system that included the verdict.

JR poured another shot for both of them. Curtis began to pace. Curtis said, “JR, a good opponent can be beat if they are understood and their capabilities are known.”

JR asked, “Was Daemon the leader of the apparent genetically related individuals? Is Daemon the leader? Are there others?” Curtis replied, “Perhaps many of the world's wealthiest people, top political leaders, and corporate elite are involved. Daemon’s goal may be to create a One World Government, stripped of nationalistic and regional boundaries, which would be obedient to their agenda. He says he wants to eliminate the world polluters.” JR, looking straight at Curtis said, “Pollute, hell, he is just another greedy bastard that wants power. He is crazy to think stopping the world polluters will produce stability and peace. We got to stop that bastard now.”

Curtis and JR had established their goal: stop Daemon. How would they be able to it? Curtis knew he had seen only the tip of a huge iceberg. To stop octopus tentacles from moving, you must kill it.


    0 of 8192 characters used
    Post Comment
    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      9 years ago from Bakersfield, CA


      Thanks! We have similar interests...

    • ArtzGirl profile image

      Camaron Elliott 

      9 years ago from San Diego

      Very nice article!

    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      10 years ago from Bakersfield, CA

      Thanks! An interesting side note... I was told our encryption computers were not possible to "break the code." People up the "food chain" allowed our Top Secret encryption computers to be placed in harms way. The "bad guys" got them and used them. We had figured out a way to break the code... You really do not know what is going on.. Yo do exactly what you are told to do. Those with the "need to know" higher up the "food chain" have a better idea. Still they do not always know what is "going on." There is much mis-information flowing back and forth. It is a deadly game...

    • World-Traveler profile image


      10 years ago from USA

      I think one interesting story about spies and intrigue was about the capture of the German code machine Enigma during World War II. Incredible. Your story above provides very interesting narative. Thanks!

    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      11 years ago from Bakersfield, CA

      Thanks ! I learn as I write...

    • Raging Bull profile image

      Raging Bull 

      11 years ago from Melbourne, Australia

      Excellent, I'm enjoying your work, great insight in the continuing story...fabulous!


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)