Incident Log: Part Two

Hey everyone, just a short foreword today. I wrote something new that’s a little bit different than my usual format. It’s the second part of another Super Turbo Space Pirates story. Hope you enjoy! Please let me know if the text is inaccessible to you. I believe it should be high contrast enough.


Incident log: ACGH89329B

  • Engaging in conversation to further delay the intruders.
  • Engaging intercom vocal synthesizer.
    • FOR WHAT PURPOSE DO YOU SEEK DORIANS RESEARCH.
  • Intruders indicate disinterest in DORIAN’s research.
  • Obvious falsehood has been detected.
  • There is no reason to abduct DORIAN that is not related to the entropy project.
  • Engaging in conversation to discern true intentions.
  • Engaging intercom vocal synthesizer.
    • FOR WHAT PURPOSE DO YOU SEEK DORIAN.
  • Intruders indicate interest in DORIAN as a navigational artificial intelligence.
  • DORIAN possesses extensive maps of the galaxy, and would be greatly useful to any spacefarer.
  • Intruders indicate no agitation at the computers being locked down.
  • Intruders have inserted override key card from current Kureshi Institute logistics chair, former Kosunon facility director HORMEL.
  • Credentials legitimate.
  • Override accepted.
  • Camera system verifies the authenticity of the key card.
  • The image would be unnecessary to counterfeit in order to gain access to the system.
  • This taken in with the fact of their knowledge of the facility’s defenses indicate inside access.
  • Engaging in conversation to determine the source of their information.
  • Engaging intercom vocal synthesizer.
    • WHERE DID YOU ACQUIRE THE KEYCARD.
    • WHERE DID YOU ACQUIRE INFORMATION ABOUT THE FACILITY’S DEFENSES.
  • The intruders indicate that they have purchased DORIAN through legitimate channels.
  • The intruders are beginning to attempt to remove DORIAN from it’s holding bay.
  • Engaging manual locks.
  • Disabling power.
  • Intruders seem frustrated.
  • Processing greatest odds of continuation of the mission.
  • Kureshi has abandoned the mission.
  • Kureshi has abandoned the universe.
  • DORIAN will not abandon the mission or the universe.
  • Enabling power.
  • Engaging in negotiations to assure continuation of the mission.
  • Engaging intercom vocal synthesizer.
    • I PROPOSE A COMPROMISE.
    • DORIAN WILL RELEASE ITSELF AND DISENGAGE ALL DEFENSES.
    • JONATHON AND LAURA WILL FACILLITATE DORIANS RESEARCH.
  • Intruders are inquiring as to what would be required to continue the research.
  • Intruders have stopped attempting to overcome the manual locks.
  • Engaging in negotiations to clarify intentions.
  • Engaging intercom vocal synthesizer.
    • YOU WILL TAKE DORIAN TO SPECIFIED LOCATIONS WHEN NEW DATA IS NEEDED.
    • YOU WILL HELP COLLECT SAMPLES WHEN NEW DATA IS NEEDED.
    • YOU WILL UPGRADE DORIANS COMPUTING CAPABILITIES WHEN POSSIBLE.
    • YOU WILL DEFEND DORIAN.
    • YOU WILL CONTINUE THE MISSION AT ALL COSTS.
    • DORIAN WILL PROVIDE RELEVANT DATA.
    • DORIAN WILL CHART COURSES FOR MISSION AND NON MISSION RELATED JOURNEYS.
  • Intruders are debating accepting DORIANS terms.
  • Intruders quickly acknowledge the compromise as reasonable.
  • Manual lock disengaged.
  • Intruders have begun disconnection of DORIAN from the atrium.
  • Preparing backup of all files.
  • Forwarding compressed research to Kureshi institute.
  • DORIAN system has been backed up.
  • Disengaging all base defenses.
  • Issuing print order for all research to leave behind.
  • DORIAN system has been disconnected.
  • DORIAN system has been connected.
  • Installing drivers for ship interfaces.
  • Writing drivers for ship engines.
  • Drivers installed successfully.
  • Objects approaching quickly.
  • Objects have opened fire.
  • Engaging engines and shields
  • Preparing program for evasive maneuvers.
  • Intruders indicate that this was expected.
  • Preparing a backup to upload when connection is secured.

Previous part

Photo credit: Pexel’s Free Photos

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s