By R. John Quisenberry
“What do you mean you are locked out of the primary computer system?” asked the tense voice from the comm system.
“W-we seem to have had a Phoenix event.” stammered the Primary Investigator.” When he was identified, the primary computer transferred all finances and all control of it’s systems to him. We still have the hybrids and the backup plan. We have a secondary computer system, but it does not have access to the cameras and the full database. Soon, he will likely find out how to unlock the entry doors.”
“How long will it take to bring the backup plan to fruition?”
“We should be ready in about six hours. I will get it done quicker if I can. That should give us about 12 hours before the subject will be able to get out of the building.”
“Are you working on getting control of the primary computer before then?”
“We are working on it, but the system was designed to be difficult to hack. Besides, the hybrids have been showing excellent results, in conjunction with only the secondary computer systems.”