Two

Inside the chassis was a dock port for manufactures to test and diagnose the machine for errors in its programming or recognition software. I took a USB cable from my satchel, inserted one end into the back of my head and the other into the machine’s chest. Once the connection happened, my body took over its power source and gave me access to all of its software.
My vision switched from ocular to a black screen, a stream of code appeared.

Initiating boot-up sequence…

Accessing Program Files…Denied.

Overriding Security…Granted.

Accessing Menu Options…

Once I was into it’s code, a menu revealed options for me to browse. A search through its memory revealed that its audio and visual sensors were damaged in a firefight a few months prior and since then, hasn’t been able to trace its route. That wasn’t the only thing I found. Its base-code was corrupted by an outside force through a wireless connection, like a code had been broadcasting that blended the code with conflicting information. Ei. Its programming concerning confrontations was overridden to fire on sight rather than wait for a response.

Whatever did this was aware of what it was doing and was most likely trying to convert these machines to do what it wanted, but only managed to mix up the code rather than re-write it. The code was beginning to get more cryptic and harder to read, soon I would be stuck trying to exit if I keep going down the rabbit hole.

            Ending user session…

            Powering Off…

My vision switched from the pane of code back to my ocular vision of a decaying French village. The machine was still standing in place in a combative stance, having no more purpose to me unless it was able to answer who was corrupting its programming.

Once our units were disconnecting, I packed the two batteries into my bag and continued on my way.

ental���9���

Next Chapter: Three