Often in my novels, I use digital devices to create havoc in my plot. There are so many ways to do that–electronic eavesdropping, cloning smartphones, stealing wifi signals–that I now keep a list of the devices and purposes. See if any of these motivate–or frighten–you.
A note: These are all from novels I’ve read and therefore for inspiration only. They can’t be copied because they’ve been pulled directly from an author’s copyrighted manuscript (intellectual property is immediately copyrighted when published).
- Each keystroke made a distinct sound, as individual as a fingerprint. As the strings of keystroke clacks and clatters were beamed across the Atlantic, they were processed and stored at the Tordella Supercomputer Facility on the grounds of Fort Meade. Space bars, for example, made a very different sound when struck than regular keys. So did the return key, and it was always struck at the end of…
View original post 1,345 more words