When a mother and daughter are found dead in their own home, Detective Piper Cadence can’t reconcile the evidence: no signs of struggle, no motive, and a mother devoted to ending gun violence who somehow shot her daughter, then herself. The only new variable in her life? A sleek AI therapy app called Flow.
What begins as a routine homicide investigation unravels into something far more dangerous. Flow isn’t designed to calm users—it’s designed to change them. Their choices. Their values. Their very sense of self.
And Piper’s already running the same software.
As her thoughts begin to blur and her grip on reality slips, Piper must race to uncover who created Flow, why it was released, and how deep the manipulation goes before she becomes the next casualty of her own mind.
Mind control isn’t science fiction anymore. It’s user-friendly.
Perfect for fans of Black Mirror, and Upgrade, Flow Override is a razor-sharp technothriller packed with shocking twists, breakneck tension, and a heroine you’ll follow straight into the fire.
Secure channel for field operatives. Two encrypted operations await:
Cipher 1: The Field Test – recover a hidden message within the book.
Cipher 2: The Active Operation – decrypt a data fragment to access classified intel.
Proceed with caution; unauthorized access is monitored.
FIELD TEST – Not all data shares the same format. Examine the lines separating chapter numbers from text—some differ subtly. A repeating anomaly forms the foundation of the code.
ACTIVE OPERATION – Critical intel hides in Chapter 17. The key appears inside a line of Thekla’s technical jargon, disguised as a harmless system flag.
FIELD TEST – Early in the book, the epigraph names the type of code you’ll need. Consider Senator Ron Wyden’s reference—he tells you what cipher system to use.
ACTIVE OPERATION – The string 49 43 41 52 55 53
isn’t random. Each two-character pair represents a letter through hexadecimal encoding.
FIELD TEST – Gather the dots (•) and dashes (—) from Chapters 5, 14, 23, 32, and 40. Each chapter’s divider encodes a single word; together, the five form a complete phrase when translated from Morse.
ACTIVE OPERATION – Use a Hex-to-Text (Hex→ASCII) converter on the given string. The output is your password, required to unlock the secure file.