Restless Souls/Technology: Difference between revisions

m
more nightmare tools of the Network: shapeshifting firmware viruses, ransomeware, virophages, air-gap bridging attacks
m (Does Konoko have an Intercepter?)
m (more nightmare tools of the Network: shapeshifting firmware viruses, ransomeware, virophages, air-gap bridging attacks)
Line 169: Line 169:
: ''Hint: The sub-node data consoles are located in the rooms that flank the main computer chamber.''
: ''Hint: The sub-node data consoles are located in the rooms that flank the main computer chamber.''


So it is indeed something big. In the following I will expand the idea because of both - the Syndicate's/Network's history and the Daodan's history.
What's a megacomputer? Maybe naming it supercomputer wasn't cool enough or TITAN is supposed to be even bigger.
 
Anyway, the Syndicate seems to possess much computing power. In the following I try explain a possible origin while taking also the Syndicate's/Network's history and the Daodan's history into account.


The Syndicate would have needed much computing power to rerun the Daodan simulation or parts of it so that they could create a Daodan ready for mass production.
The Syndicate would have needed much computing power to rerun the Daodan simulation or parts of it so that they could create a Daodan ready for mass production.
Line 202: Line 204:
: Though the big money was to be found on the military sector. With BGI another financial pillar was established.
: Though the big money was to be found on the military sector. With BGI another financial pillar was established.


: Police investigations were stopped or slowed down by cyber attacks and hired hitmen that took out the officers in charge of Network cases.
: Police investigations were slowed down and some stopped completely by cyber attacks. At first files were deleted, then to avoid early detection backup files were not deleted but encrypted by ransomware. In critical cases the Network sent agents to attack [http://phys.org/news/2014-10-leak-sensitive-isolated-air-gap-mobile.html air-gap secured] targets. Mukade and his men were very successful and soon became their first choice. Often they didn't execute these mission themselves. Smartphones of police officers and criminals alike became modified to steal and transmit passwords after the carrier has left the facility again.
 
: As last resort hitmen were hired to take out the officers in charge of Network cases.


: This led to more investigations and acts of vengeance.
: This led to more investigations and acts of vengeance.
Line 210: Line 214:
:* First, they could protect their own facility until crucial personal was evacuated.
:* First, they could protect their own facility until crucial personal was evacuated.
:* Second, they could raid guarded companies and research facilities.
:* Second, they could raid guarded companies and research facilities.
:* Third, an own paramilitary division reduced issues of available strike power and concerns about trust/loyalty of third-party hitmen.
:* Third, an own paramilitary division reduced issues of available fire power and concerns about trust/loyalty of third-party hitmen.
:* Fourth, they were now able to conduct ''field tests'' of new weapons.
:* Fourth, they were now able to conduct ''field tests'' of new weapons.
:* Fifth, ''persuading'' all other big criminal organisation to work for them. All together they make up the "Syndicate".
:* Fifth, ''persuading'' all other big criminal organization to work for them. All together they make up the "Syndicate".


: The division grew huge and soon demanded a proper location for training and everything else that shouldn't be interrupted by random TCTF visits.
: The division grew huge and soon demanded a proper location for training and everything else that shouldn't be interrupted by random TCTF visits.
Line 228: Line 232:
: The TCTF was going to use quantum computer to eventually break the Network's strong encryption.
: The TCTF was going to use quantum computer to eventually break the Network's strong encryption.


: The next logical step for the Network was to built quatum computers as well. With these their [http://phys.org/news/2014-02-quantum-codes-harder.html encryptions was save again].
: The next logical step for the Network was to built quantum computers as well. With these their [http://phys.org/news/2014-02-quantum-codes-harder.html encryptions was save again]. Also, state computers infected by ransomeware are forced to connect to a Syndicate-controlled QC and enforce the encryption. [http://phys.org/news/2015-04-human-technical-ingenuity-required-defeat.html Shapeshifting] [http://phys.org/news/2015-02-malware-infecting-hard-disk-firmware.html firmware] viruses ensured persisted infection despite complete hard disk formatting and re-installation.
 
: The latest Network's expansion was in the drone and telecommunication sector.


: They use drones to transport legal and illegal goods and attack drones owned by the TCTF. Those became reprogrammed to have ''[[Quotes/Diary#CHAPTER_06_._COUNTERATTACK|blind spots]]''. The TCTF tried to locate servers the Network uses. They forced telecommunication companies to give them full access to all their data. But the Network knew it beforehand and took preparations. The TCTF also installed spyware in old fashion of intelligence agencies and potent enough to surpass [http://en.wikipedia.org/wiki/Regin_%28malware%29. Regin.]


: Since the the Network had always a close eye on TCTF operations they developed a virus-infecting virus codenamed [http://phys.org/news/2011-03-virus-eating-virus-antarctic-lake Sputnik]. Ironically, the TCTF's virus put themselves under surveillance.


===Aftermath===
===Aftermath===
8,452

edits