When a mother and daughter are found dead in their home, Detective Piper Cadence can’t reconcile the evidence: no struggle, no motive, and a mother devoted to ending gun violence who somehow shot her own child—then herself. The only new variable? Flow, a sleek upgrade to the mandatory AI therapist that runs quietly in every citizen’s mind.
What begins as a routine homicide unravels into something far more insidious. Flow isn’t designed to heal—it’s designed to steer. To rewrite decisions. To erase resistance.
As Piper’s thoughts begin to fracture, she must uncover who engineered Flow—and why—before she becomes its next casualty.
Flow Override is a dark, near-future technothriller about autonomy, AI, and the illusion of free will. For fans of John Marrs and the spirit of Black Mirror, it blends the psychological tension of a crime thriller with the chilling speculation of futuristic science fiction.
Mind control isn’t science fiction anymore. It’s user-friendly.
Secure channel for field operatives. Two encrypted operations await:
Cipher 1: The Field Test – recover a hidden message within the book.
Cipher 2: The Active Operation – decrypt a data fragment to access classified intel.
Proceed with caution; unauthorized access is monitored.
FIELD TEST – Not all data shares the same format. Examine the lines separating chapter numbers from text—some differ subtly. A repeating anomaly forms the foundation of the code.
ACTIVE OPERATION – Critical intel hides in Chapter 17. The key appears inside a line of Thekla’s technical jargon, disguised as a harmless system flag.
FIELD TEST – Early in the book, the epigraph names the type of code you’ll need. Consider Senator Ron Wyden’s reference—he tells you what cipher system to use.
ACTIVE OPERATION – The string 49 43 41 52 55 53 isn’t random. Each two-character pair represents a letter through hexadecimal encoding.
FIELD TEST – Gather the dots (•) and dashes (—) from Chapters 5, 14, 23, 32, and 40. Each chapter’s divider encodes a single word; together, the five form a complete phrase when translated from Morse.
ACTIVE OPERATION – Use a Hex-to-Text (Hex→ASCII) converter on the given string. The output is your password, required to unlock the secure file.