Pinky arrived home just in time to hear the computer in his lab go off indicating he had received new mail on the company server. He knew from experience that all his actions on that computer were logged and could be traced back to his true intentions. No matter how secretive the OWCA thought they were Pinky was smarter and had devised protocols to dealing with such inconveniences.

Quickly making his way to his lab he quickly started typing in his bypass software so the company could not see what he was about to do.

After the bypass software had taken effect and all his activity blocked from other servers was complete Pinky got straight to work. Going through the document he knew, as with any official document, that areas and sentences had been edited to protect the higher ups in case something was leaked. This was Pinky's specialty. Finding anything deleted and restoring it to original condition so he could see any and all discrepancies in the document, namely anything that would point to the OWCA setting up his former friend and comrade. A few minutes of serious typing and code rewrites gave Pinky exactly what he was looking for.

A complete debriefing of Perry the Platypus's last mission.

Agent: Perry the Platypus

Operation: Doofinshmirtz Demise

"Agent successfully infiltrated Doofenshmirtz Compound. Valuable weapons recovered and delivery to resistance compound underway. Full debriefing listed nothing out of the ordinary. Agent considered for high level operation. Perry primal instinct and ability to react will make him a top candidate for operation P.B. Please advi…

Secluding and scanning…(Unknown software detected…Shutdown protocol activated…Unknown software deleted…File safe and secure)

End Session. Attached Video unlogged.

Pinky wondered what Operation P.B. was about and what it stood for. With the entire document completely visible Pinky began to scroll down looking for Operation P.B. he would have no luck. The attached video would just be of the debriefing so he overlooked it.

Eventually Pinky tried thinking outside the box and began doing alternate searches for such a document. Searching "Operation P.B." Yielded no results "Classified Operations" Lead to no results. Pinky had one more idea and quickly searched "Operations not listed" again nothing was produced. If it was not listed within any of those parameters then that would mean this document was missing key scripture. But that would mean intentional foul play from someone within the OWCA server and only a few people actually had access to that. The only way for him to know for sure if it was OWCA intentions to hide such an operation from view of the current agents would be to enter the server and do a system wide check for any operations containing the key words. The only problem was once he logged into the server his bypass software would be useless from reporting any suspicious activity he made. But it was a risk he was willing to take.

Quickly deleting his bypass software the original document returned to normal and all deleted data was re deleted. Now was the hard part. Each server linked to a different agent and each server required different passwords and key phrases that would unlock them and give access. The hard part was trying to find a server with the information he needed. His two best bets were to hack the server of Major M and his assistant Carl. Them being the obvious two that had access to all files both deleted and on record. He was in for the time of his life.

(Several hours later)

Pinky finished his hacking and was disappointed. With the amount of security protocols on the two servers he withdrew almost no data. Debriefings on each and every agent that worked for them as well as annual fitness reports on each agent. A quick search for Perry's files brought up years of work he had done and none of it portrayed to any secret operation. Pinky was getting discouraged and decided to go back to the original document. It took a few minutes to put up the bypass but he had to working in no time.

Something about that document was bugging him. It was standard security protocol for all logged files to be secluded and scanned when potentially dangerous software is detected. The problem was it never saved a trace of the software so nobody ever knew where it came from…He suspected that software might have actually been an outsider hacking in and attempting to change some information in the file. But for what purpose?

Pinky did a quick scan and found the ID of the software used. It matched Doofenshmirtz encryptions that bypassed several security protocols and was only stopped when he tried to access the file and make changes. The system reports that all changes and software was deleted so he obviously failed. But why would Doofenshmirtz give up after one attempt? It wasn't unheard of that maybe he just gave up but then again we are talking about the man who has been able to do almost anything when he puts his mind to it. As well as his robots hacking abilities would be invaluable in this scheme…He was missing something…but what?

Pinky didn't understand…All logged files were constantly scanned for any such changes and software that would compromise it. If Doofenshmirtz had in fact changed something then how did the scanner not pick up on it? Even he, with his bypass, could not alter any files just restore them. Pinky began scanning the file again but visually instead of depending on his computer. That's when it hit him.

All logged data was scanned. Anything logged into the official report was scanned constantly. So what if Doofenshmirtz hacked the file and attempted to make changes to start the shutdown sequence and then added a small bit of information on an unlogged account…the scan would destroy his software and any changes but would leave the unlogged information alone.

Pinky quickly clicked on the video attached to the original document.

Video log requests to be logged in?

User selects "No"

Video buffered…Video prepared…Proceed?

User selects "Yes"

Video Uploaded…Error…Video invalid…Error please open manuscript…

User opens Manuscript…Manuscript available…Proceed?

User selects "Yes"

Pinky waited as the manuscript of the video was slowly displayed on screen. Quickly he began reading through the document.

Operation P.B.

Operation Terminate Doofenshmirtz.

Agent selected: Perry the Platypus.

Time of selection and date beginning "Unlogged"

Operation P.B. is a specialty mission assigned to only the top agents of the OWCA. Specifics are left up to the agents on how they wish to accomplish this objective. Primary objective is destroying Doofenshmirtz at all costs. Infiltration will happen through east corridor with least resistance. Agents will be on their own, everything is authorized. After receiving delete from server and proceed with new mission.

Transmission terminated…

Last viewed…Record deleted…

Operation deletion in progress…

Delete terminated…

Search in place…Operation P.B.

File found

Pinky couldn't believe it…Perry had actually found a file that matched one; containing info on Operation P.B. Quickly clicking on it Pinky knew something was up.

File secured…

Password…

Password failed…

Password failed…

Password failed…

Password…

Pinky knew that this was Doofenshmirtz he was dealing with, he was unsure if Perry knew at the time or not. What would his Password be? Pinky smiled.

Password…

"Vanessa"

Password Accepted…

File loading…

File loaded…

Operation Platy-Borg

Audio Log detected…

Like it? That's my take on the OWCA operation….See I changed the name around and made it borg…What do you mean it makes no sense…Of course Perry will come…He thinks he's going to arrest me or something but thanks to Norm keeping that system busy I slipped in a false file…Yes it will work…I put East corridor…Triple the guards and be ready…I deleted the time and date don't worry…Is this thing on…Hey stop that…

Audio Log end…

Pinky knew what he just found…He just found Proof Perry had been set up but not by the OWCA but by his new "Leader"

This was not good. But why did Perry go if he knew Doofenshmirtz was sending false files…Unless…Pinky thought he knew what happened.

(Author Note)

So sorry to everyone following this story, I am really sorry. I have been up too much and am finally back…well at least on weekends. I will try to maintain updates.

Sorry about all the technical talk but I wanted to shed a little more light on my take of what could have happened.

Again sorry and I'll try to make updates more frequently.

3rd-Generation