Chapter XXIV

Background color
Font
Font size
Line height


It resembled a large potato. However, in all fairness that comparison would only be applicable if there were anyone around to observe its appearance. Even then, the analogy for whom or whatever the viewer might be would fall flat. For no one would know what a potato was as they had yet to exist.

This oblong celestial citizen was just one of many rocky travelers trapped in a gravitationally controlled river of stone. One more ordinary piece of planetary debris, floating through space slowly turning in reaction to some long ago action that set it into motion. Then, boom! A rather thrilling textbook example of intersecting paths takes place. A rocky outsider from somewhere beyond serendipitously makes contact with the large asteroid, sending it hurtling into the dark expanse, connecting the first link in a long chain of cataclysmic events.

Inertia from the collision sends the fractured rock on a rapid tour through its host solar system toward a tiny dot very far away. It ejects small fragments of its body as it tears through the belt it once called home. The massive rock skims past its nearest large body neighbor. Small patches of green and blue spread like veins over the red surface. The features only visible between the white streaks splashed over the orb's outer atmosphere.

The traveler continues its violent voyage, racing past a few of its straggling brethren trapped in the gravitational pull of the nearby planet. Any contact with them sending more chunks of rocky children spinning off into the void.

A moderately sized gray satellite gingerly misses contact with the tumbling rocky missile. However, it does greet several of the asteroid's spawn with quite the brilliant display of fanfare. Fiery ejections provide visual evidence of the violence that erupts on its darkened surface.

Unaware of the tumult occurring further out in its solar system, a pretty blue planet floats without concern in the nothingness. A vibrant, healthy star peeks above its horizon providing warmth for the thriving occupants inhabiting the surface. This was the way it had been for millennia. A perfect symbiotic relationship of gravity, energy, and matter that was soon to have its ass kicked...hard.

Fireworks erupt across the planet's glassy atmosphere as smaller pieces of rock vaporize instantaneously due to their lack of size. These are the first to arrive; emissaries of the destruction on the way.

Repeatedly it rolls. End over end. The surface of the large rocky behemoth now glowing as it forcibly enters the gaseous shell of what is to be the rock's final resting place. The asteroid bids its final farewell to the vacuum that once was its home. It sinks ever deeper into the dense warm atmosphere culminating in a fiery spectacular goodbye.

On the surface of the planet, loud low booms herald the appearance of the sudden and unwelcomed guest. Sounds so intense they send winged creatures once camouflaged in the endless canopy of trees airborne in response. Beasts large and small frightfully look up to witness what would soon be the first act in the final chapter of their long reign of this world.

The Sub-System A.I. coldly analyzed the data it collected post event. It calculated that favorable environmental conditions were 93.8% more likely than previously in placebo. This world would now qualify for protected status mode. There would be no more harm brought to this planet. The native fauna would be allowed once again to flourish without fear of any more astral disturbances. "Estimated optimal planetary conditions...potentially several million solar cycles. Adjust timing clock to facilitate. Running...maintain close observation."

"Wait...incoming command data. Request to force data stream initialization. Premature decompression eminent. Data corruption possible. Stop. Examine external input operations to determine source...cease external command processes until suitable decompression variables are available."

"Sub-system operational focus. Obey Primary Command...analyze external input source as possible threat. Deploying neural security analysis. Collecting data...disable threat if necessary. Action is necessary..."

You are reading the story above: TeenFic.Net