Bastrastanovia Part 4

in #bastrastanovia6 years ago

"They are with us because the testimony of God is with us. They may know God by many names. But, all of our testimony has reason. We cannot know all things. But, we can try to act with goodness. And, we can come to understand to the best of our ability."

The best of ability was at work in consideration of the Pruere mission. The speed of war creates works of genius. API's began forming and the collection of militant rank was sculpting a map with points of interest. The collective of initiative offered verification to the King. While the King was grand in his legacy. It was others that were far more adept at ruling over devices. Where devices offered insecurities it was truthful when saying militant advancements may exists that are far from conception. The initiative was to ensure that the military grid would provide points of interest for reasons of conducting surveillance, collection and retention of investigative informations retained, as well as for the potential of retaliation once exposing that all but one at the active special operations commander level was eliminated. In verification, a specific request at localized area where suspect ping trace would illuminate hack device trace. The hack devices used by the localized overload the device and project a signal mirroring the device. The hacker can than extract information directly from the tower. These style devices were being used by localized investigators. The verification in status swap would provide that remote operations were in essence keeping vigil over the locations pinging devices. The verification status provided a statement; "Once you land in Bastrastanovia. The world can become a place where cryptic cultivation is various as those whom join the circus are diverse." The message was swapped to revealed another statement when posting. The statement revealed was most obviously the result of a hack. The statement would reflect something that was relevant to those whom had been ordered to have vigil over their devices. The state of war was one that called for advancements to ensure evidences corruption would have international back ups to provide trace of actual information. In the event of references changing backups would be checked for their consistency. Where evidence changed would provide for a question within the investigation conducted by elitists pressing forward in the war against terrorism. "Why change the evidence?" There are limited possibilities as to why evidences may change. One possibility was corruption. The hypothetical example of a virgin comes back into view. Where these devices ping trace resulted in the potential of corruption. The skin of the sample within the economy that slowed the virtues of processing justice would be addressed. Should there be corruption, there will surely be de-evolution, and should corruption go under exposed it won't be long before exposures of under development. Therefore, the operation now included the ability to keep vigil over devices while in use, and API's retained by various investigative agencies. The verification once sent to the King included a message revealing that it was time to leave. The area of Pruere was one that had less likely suspect for a target of example whom had trace evidences of corrupt action without recourse of justice to impose upon illegal operations. Therefore, the essence of the work would come with the resulting proof that no virgin was intended for harm. The judgment of a deep cover mission is liable to reflect cryptic alternatives offering various perspective. When in international waters assembling a covert operation aiming to adjust the position of those whom arm terrorists there is no objective too strange to consider. The selection of suspects where known stories of corruption had been brushed beneath the sand were partly direct missions of remote operatives investigation. Suspects of foul play, and internal corruption, coupled with terrorist support resulted in the means of espionage within a multiple of sovereignties. The retention to be retained streamlined data by sustaining backups with initiative to red flag and allocate variations implementation into a unique category for investigation. These suspect changes in evidence would alert the potential of hackers entering the same devices in similar fashion to evade their prosecution. These suspect changes may also provide evidence resulting in revelation where considerations of evidences changes were occurring internationally. As a security measure, the enablement of such a task would appear as a massive workload. There were a large number of interested people wishing to resurrect the King to his rightful throne. While, he stood alone in Pruere investigating a coffee shop for a potential future mate. The missions did not slow in their effectivity. A third mission was actively underway where considerations of elements of terrorist insurgents rallied. The mission worked in tandem with the recon of investigative agencies. While, not all investigative agencies were suspect of corruption. The methodology of investigations conducted over the investigators were not aiming to entrap, falsify, or expose the communities darkest data secrets. The method of investigation was a securitization that was advanced by long term militants understanding that political leadership positions expire. But, the love in loyalty for a Royal family is forever. The third mission was one that required the insurgents be handled finitely. The missions operative was to maintain a secrecy in reporting for defined term. The term was defined by regulation and consideration of reporting was one that was part intent. The intent would surely be filled. The secret operation to cleanse sovereignty of illegal terrorist protestors was effectively dual in it's purpose. The purpose to cleanse sovereignty was clearly by reason of need to keep the peace. Not only should peace be kept. But, in order to keep the peace an illegal rally should not be allowed to occur. The pressing protests of terror were seen as acts of war once the King initiated the mission. The cryptic was traversed among the nations where terrorists rallied and archives began to form recognition technology API's categorizing rally attendees. A continued attempt to return to such rallies would increase the suspects suspect of terrorist ties. The information was retained with intent to provide that bounties could be clearly identified. The third missions technology advanced with the various other protocols to create recognition that would include records kept by various international investigative agency. In essence. If, someone was to wear a pair of tech glasses offering the API while walking in a large city. Than, identifications could be made in complete with previous offenses and various other data attachments. The tech glasses could sync to a device where illumination of such data could provide retrieval. The wearer could be provided with advanced information on everyone they came to cross where data extraction has occurred. The initiative in creating such things is one to cleanse sovereignty of international bounties. The upgrade in sophistication communication with various advanced programing indexes (API's) was one that was natural to have result in a world filled with suspect corruption. The direction to go was clear, and a path was made to travel the distance. The Kings verification came with delight. Knowing that the suspect of internal corruption would be documented and evidences retained would have vigil kept over them while in threat of change. Should any evidence change the alert would provide additional missions to begin to solve the failure of the system unable to eliminate corruption threats. Conducting investigations in this method wasn't entirely legal by all means. However, legality is in dispute when considering the residency of remote operation. Hypothetically, if the base for the techs keeping vigil over the localized investigators was in international waters there would be no laws to bind their action aside from espionage. To reveal and expose corruption would come with the need for savvy. Potentially, the hack savvy of the militant operation could suggest that changes in posts previous to their sending could offer a lead to investigators worthy of completing the tasks necessary for eliminating corruption. The mission was clear for the King. It was time for the King to follow the lead sent in a unique fashion. The indicator would be clear to any whom kept vigil over the King's public media that a change was offering verification to localized should they doubt he was well protected by elitists. The protocols of the cleanse were to extract DNA with samples of militants executed for their exposed ties to terrorist organizations attempting to rally in sovereignty. As the world began to take notice of the infamous King it was first the elitists watching over him in the night. The night watchman had long verified their dedication to the mission of restoring the King to his rightful throne complete with entitlement. The lead suspect in disabling the King's family in modern times reverse traced to Pruere. Before the news of arming terrorists with funds and weapons there was no fire lit within the King to command his elitists engage Pruere. However, the evidences needed to be confirmed or disavowed. For this reason, and because this was an actual war, the protocols required verifications such as the primary siting in this part of the story titled Bastrastanovia.

@Sutter

Coin Marketplace

STEEM 0.20
TRX 0.15
JST 0.029
BTC 63725.17
ETH 2619.74
USDT 1.00
SBD 2.82