Jump to content

Restless Souls/Technology: Difference between revisions

m
grammar review, part 2
m (grammar review, part 1)
m (grammar review, part 2)
Line 104: Line 104:


====Wasn't Hasegawa sentenced?====
====Wasn't Hasegawa sentenced?====
Hasegawa wasn't authorized to enter the Wilderness Preserve and he killed his wife. So, there must have been a lawsuit.
Hasegawa wasn't authorized to enter the Wilderness Preserve, and he killed his wife. So, there must have been a lawsuit.


But it seems he doesn't had to spend time in a prison.
But it seems he didn't have to spend time in a prison.
* Either, WCG offered him some sort of deal for not using his connections and public sympathy to his advantage. (He and Jamie were active in the environmental movement.)
* Either the WCG offered him some sort of deal for not using his connections and public sympathy to his advantage... (he and Jamie were active in the environmental movement)
* Or he was sentenced. But before reaching prison or later on, a syndicate/ninja group freed him.
* Or he was sentenced, but before reaching prison, or later on, a Syndicate/ninja group freed him.


Why speaks Kerr of himself as a criminal. Maybe he arranged Hasegawa's rescue. After that they had no other chance to work for the Syndicate anyway.
Why does Kerr speak of himself as a criminal? Maybe he arranged Hasegawa's rescue. After that, they had no other choice but to work for the Syndicate anyway.


: 13_65_21 Kerr: "Your father and I were criminals, funded by the Syndicate. We couldn't get backing from any legitimate source. [...]"
: 13_65_21 Kerr: "Your father and I were criminals, funded by the Syndicate. We couldn't get backing from any legitimate source. [...]"


At that time point, Hasegawa already must had a rough plan persuasive enough so that Kerr and more importantly the Syndicate would join.
At that point, Hasegawa already must have had a rough plan persuasive enough that Kerr, and more importantly the Syndicate, would join him.


: 12_43_11 Hasegawa: "[...] I'm going to do something about the nightmare that killed her. Her brother will help me. He misses her as much as I do."
: 12_43_11 Hasegawa: "[...] I'm going to do something about the nightmare that killed her. Her brother will help me. He misses her as much as I do."


It's said that Mai "[[Quotes/Manual#Konoko|orphaned at the age of 3]]" and she said that a Chrysalis was implanted [[Quotes/Speech#Friends|at the age of 7]]. So the Chrysalis prototypes were created within approximately 4 years. How could this complex project be finished by a mere two-men army? Likely Hasegawa didn't started from scratch. Also, he and Kerr possibly used [[wikipedia:In_silico#Cell_models|potent simulations]] of their time. (Another reason why Oni should take place in 2055.)
It's said that Mai was "[[Quotes/Manual#Konoko|orphaned at the age of 3]]" and she said that her Chrysalis was implanted [[Quotes/Speech#Friends|at the age of 7]]. So the Chrysalis prototypes were created within approximately 4 years. How could this complex project be finished by a mere two-man army? Likely Hasegawa didn't start from scratch. Also, he and Kerr possibly used [[wikipedia:In_silico#Cell_models|powerful simulations]]. (Another reason why Oni should take place in 2055.)




====When did Mukade join?====
====When did Mukade join?====
Ninjas have always been interested in knowledge and new technology. So, at least Mukade, as a boss of his clan, monitored WCG's and the Syndicate's scientific projects. Either he would have become informed by reading the first summary of Hasegawa's simulations or even earlier when the two scientists made the deal with the Syndicate.
The ninjas have always been interested in knowledge and new technology. So at least Mukade, as a boss of his clan, monitored the WCG's and the Syndicate's scientific projects. Either he would have been informed by reading the first summary of Hasegawa's simulations, or even earlier when the two scientists made their deal with the Syndicate.




Line 128: Line 128:
Hasegawa and Kerr request more computing power.
Hasegawa and Kerr request more computing power.


Pensatore (meaning "the thinker") is an SLD scientists and leading the AVATARA project. He is consulted by Mukade to judge if the Chrysalis is really worth its cost.
Pensatore (meaning "the thinker") is an SLD scientist, and leads the AVATARA project. He is consulted by Mukade to judge if the Chrysalis is really worth the cost.


: Background:
: Background:
Line 134: Line 134:
: The European [http://en.wikipedia.org/wiki/Blue_Brain_Project Blue Brain Project] as well as the American [http://en.wikipedia.org/wiki/BRAIN_Initiative BRAIN Initiative] failed.
: The European [http://en.wikipedia.org/wiki/Blue_Brain_Project Blue Brain Project] as well as the American [http://en.wikipedia.org/wiki/BRAIN_Initiative BRAIN Initiative] failed.


: The Blue Brain Project ignored glia cells and similar supporting elements. The BRAIN Initiative [http://www.nature.com/news/neuroscience-map-the-other-brain-1.13654 did better] but still had no real neuronal input and no information from cells that messure concentration of oxygen, sugar, etc.
: The Blue Brain Project ignored glial cells and similar supporting elements. The BRAIN Initiative [http://www.nature.com/news/neuroscience-map-the-other-brain-1.13654 did better] but still had no real neuronal input and no information from cells that measured the concentration of oxygen, sugar, etc.


: And there are a lot [[wikipedia:Autonomic_nervous_system#Sensory_neurons|neurons in the human body]]. So it became more and more clear that reducing a brain to its own neurons was far from enough.
: And there are a lot of [[wikipedia:Autonomic_nervous_system#Sensory_neurons|neurons in the human body]]. So it became more and more clear that restricting the brain to its own neurons was far from satisfactory.


: After they had a full body simulation up and running the next step was to educatate the AI and let it control a body in the physical world.
: After they had a full body simulation up and running, the next step was to educate the AI and let it control a body in the physical world.


: At this point the networking supercomputer had clusters all over the world and was named AVATARA. (This full body simulation depicting AI was remote controlling a robot, its avatar.)
: At this point the networked supercomputer had clusters all over the world and was named AVATARA. (This full body simulation depicting AI was remote-controlling a robot, its avatar.)


: The collected data from this "[[Restless_Souls/Technology#Speculation_about_brain_components|SLD generation 0]]" wasn't enough to design an AI from scratch because most of the data still needed years to become fully analysed.
: The collected data from this "[[Restless_Souls/Technology#Speculation_about_brain_components|SLD generation 0]]" wasn't enough to design an AI from scratch because most of the data still needed years to be fully analyzed.


: The bits of knowledge learned from generation 0 and with the ongoing technological progress Pensatore would soon start the research on SLD generation 1.
: With the bits of knowledge learned from generation 0, and ongoing technological progress, Pensatore would soon start the research on SLD generation 1.


: Meanwhile planet Earth faced its first AI which ironic task was to understand itself. In doing so it tried to read all available knowledge about the subjects the scientists worked in.
: Meanwhile, planet Earth had its first AI, whose first task, ironically, was to understand itself. In doing so, it tried to read all available knowledge about the subjects the scientists worked in.


: The AI got significant smarter and drew interest from more researchers to solve complex problems and calculations.
: The AI got significantly smarter and drew interest from more researchers to solve complex problems and calculations.


: Pensatore was still in charge of AVATARA and had a hard time granting Hasegawa a full month to complete the Daodan.
: Pensatore was still in charge of AVATARA and had a hard time granting Hasegawa a full month to complete the Daodan.
Line 154: Line 154:


====Full body simulations====
====Full body simulations====
Computing power was limited. So taking the children virtual bodies (possessing roughly half the number of cells of adults) helped out Hasegawa's project once more.
Computing power was limited. So using the children's virtual bodies (possessing roughly half the number of cells of adults) was helpful for Hasegawa's project once more.


Pensatore: "In the coming months AVATARA will be upgraded."
Pensatore: "In the coming months, AVATARA will be upgraded."


:Hasegawa: "Months. Why does it take so long?"
:Hasegawa: "Months. Why does it take so long?"


Pensatore: "That's nothing really special, as bigger a machine get as longer you need to maintain and to upgrade it. [http://phys.org/news/2014-07-large-hadron-collider.html Our colleges at CERN] can tell one thing or two about it. The difficulty with AVATARA is to split simulations on multiple, geographically far apart clusters and let it run reliable. Before AVATARA's official restart there will be tests to ensure everything will be alright. This includes also AVATARA's new autonomy protocols. We will pretend complications in order to run more tests. These are your actual Daodan simulation. This way you will get about one month computing time. No more, so you better use your time wisely."
Pensatore: "That's not unusual; the bigger a machine gets, the longer you spend maintaining and upgrading it. [http://phys.org/news/2014-07-large-hadron-collider.html Our colleges at CERN] can tell you a thing or two about it. The difficulty with AVATARA is splitting simulations across multiple, geographically distant clusters and having it run reliably. Before AVATARA's official restart, there will be tests to ensure everything will be alright. This includes AVATARA's new autonomy protocols. We will pretend there are complications that require running more tests. These will be your actual Daodan simulation. This way you will get about one month's computing time. No more, so you better use your time wisely."


:Hasegawa: "I don't understand why you mentioned the AI's autonomy protocols."
:Hasegawa: "I don't understand why you mentioned the AI's autonomy protocols."


Pensatore: "First of, under that condition AVATARA can hide your simulation from superusers. And second, with the additional rights AVATARA can effectively adapt to your Big data challenge."
Pensatore: "First off, that will allow AVATARA to hide your simulation from superusers. And second, with the additional rights, AVATARA can effectively adapt to your Big Data challenge."


:Hasegawa: "Like what."
:Hasegawa: "Like what."
Line 172: Line 172:
[...]
[...]


Mukade foresees the missing results of the extra tests and uses the TITAN network to generate fake data, scaled and polished. "Pensatore, you expected our all little secret to be busted. But you aren't the only one that has a decent understanding of computers and networks."
Mukade foresees the missing results of the extra tests and uses the TITAN network to generate fake data, scaled and polished. "Pensatore, you expected our little secret to be busted. But you aren't the only one that has a decent understanding of computers and networks."




====How Syndicate's TITAN became a tool for further research====
====How Syndicate's TITAN became a tool for further research====
During Muro's leadership TITAN may or may not have gained some sort of key role in the Daodan project.
During Muro's leadership, TITAN may or may not have gained some sort of key role in the Daodan project.


At least Daodan and TITAN are mentioned together in the [[Quotes/Consoles#STURMANDERUNG_:_Secondary_Stage|second]] and third phase of STURMÄNDERUNG.
At least Daodan and TITAN are mentioned together in the [[Quotes/Consoles#STURMANDERUNG_:_Secondary_Stage|second]] and third phase of STURMÄNDERUNG.
Line 182: Line 182:
:9) Daodan core technology (ref.TITAN\uwlb)
:9) Daodan core technology (ref.TITAN\uwlb)


As it is theorized on the quote pages these lines could be some simple links to files that need "high-security access" (in comparison to [[Quotes/Consoles/level_19a|dwarf]]).  
As it is theorized on the Quotes pages, these lines could be links to files that need "high-security access" (in comparison to [[Quotes/Consoles/level_19a|dwarf]]).  


But I would like to think that TITAN plays a bigger roll than being a high-security data archive or mail system.
But I would like to think that TITAN plays a bigger role than being a high-security data archive or mail system.


[[Quotes/Objectives#CHAPTER_14_._DAWN_OF_THE_CHRYSALIS|In the objectives]] you can read this:
[[Quotes/Objectives#CHAPTER_14_._DAWN_OF_THE_CHRYSALIS|In the objectives]] you can read this:
Line 190: Line 190:
: ''Hint: The sub-node data consoles are located in the rooms that flank the main computer chamber.''
: ''Hint: The sub-node data consoles are located in the rooms that flank the main computer chamber.''


What's a megacomputer? Maybe naming it supercomputer wasn't cool enough or TITAN is supposed to be even bigger.
What's a megacomputer? Maybe naming it supercomputer wasn't cool enough, or TITAN is supposed to be even bigger.


Anyway, the Syndicate seems to possess much computing power. In the following I try explain a possible origin while taking also the Syndicate's/Network's history and the Daodan's history into account.
Anyway, the Syndicate seems to possess much computing power. In the following, I try to explain a possible origin while also taking the Syndicate's/Network's history and the Daodan's history into account.


The Syndicate would have needed much computing power to rerun the Daodan simulation or parts of it so that they could create a Daodan ready for mass production.
The Syndicate would have needed much computing power to re-run the Daodan simulation or parts of it so that they could create a Daodan ready for mass production.
<!--
<!--
After entering the mountain compound you can even meet a [[Quotes/Speech#Is_that_a_yes.3F|Syndicate scientist]] that seems to know what Muro and Mai really are.
After entering the mountain compound you can even meet a [[Quotes/Speech#Is_that_a_yes.3F|Syndicate scientist]] that seems to know what Muro and Mai really are.
Line 202: Line 202:
What could be a legit background story to portray TITAN's evolution as supercomputer?
What could be a legit background story to portray TITAN's evolution as supercomputer?


: One factor of the Syndicate's success lies its former decentralized nature.
: One factor of the Syndicate's success lies in its formerly-decentralized nature.


: [[WCG#History_of_the_Syndicate|History of the Syndicate]]
: [[WCG#History_of_the_Syndicate|History of the Syndicate]]
Line 209: Line 209:
: Decentralized organizations are more difficult to destroy because there's no main target.
: Decentralized organizations are more difficult to destroy because there's no main target.


:: The [[wikipedia:Pink_Panthers|Pink Panthers]] can serve as example for a decentralized organization. They are kinda independent groups raiding jewellery shops. According to a TV documentation the most successful group takes the lead over the others.
:: The [[wikipedia:Pink_Panthers|Pink Panthers]] can serve as an example of a decentralized organization. They are kinda independent groups raiding jewelry shops. According to a TV documentary, the most successful group takes the lead over the others.


: In case of the Network, they don't steal and sell jewellery but prohibited technology.
: In case of the Network, they don't steal and sell jewelry, but prohibited technology.


: In order to allow secure communication among the groups the Network built powerful servers all over the world. The TITAN servers provided very strong encryption. At same time they were wired to the [[wikipedia:Tor_(anonymity_network)|Tor network]] to keep things anonymous.
: In order to allow secure communication among the groups, the Network built powerful servers all over the world. The TITAN servers provided very strong encryption. At same time, they were wired to the [[wikipedia:Tor_(anonymity_network)|Tor network]] to keep things anonymous.


: With increasing computing power, reverse engineering fit nicely into their business strategy.
: With increasing computing power, reverse engineering fit nicely into their business strategy.


: Now instead of selling the technology they were going to produce copies to earn even more money.
: Now, instead of selling the technology, they were going to produce copies to earn even more money.


: On the civil markets they provided underground shops (aka Resurrection Shops) with RE tools, restricted TITAN access and 3D printers.
: On the civil markets they provided underground shops (aka Resurrection Shops) with RE tools, restricted TITAN access and 3D printers.
Line 223: Line 223:
: They are serving customers plagued by goods with [[wikipedia:Planned_obsolescence|built-in obsolescence]], and of course they sell any illegal technology or modification.
: They are serving customers plagued by goods with [[wikipedia:Planned_obsolescence|built-in obsolescence]], and of course they sell any illegal technology or modification.


: Though the big money was to be found on the military sector. With BGI another financial pillar was established.
: Though the big money was to be found in the military sector. With BGI, another financial pillar was established.


: Police investigations were slowed down and some stopped completely by cyber attacks. At first files were deleted, then to avoid early detection backup files were not deleted but encrypted by ransomware. In critical cases the Network sent agents to attack [http://phys.org/news/2014-10-leak-sensitive-isolated-air-gap-mobile.html air-gap secured] targets. Mukade and his men were very successful and soon became their first choice. Often they didn't execute these mission themselves. Smartphones of police officers and criminals alike became modified to steal and transmit passwords after the carrier has left the facility again.
: Police investigations were slowed down and some stopped completely by cyber attacks. At first, files were deleted, then, to avoid early detection, backup files were not deleted but encrypted by ransomware. In critical cases the Network sent agents to attack [http://phys.org/news/2014-10-leak-sensitive-isolated-air-gap-mobile.html air-gap secured] targets. Mukade and his men were very successful and soon became their first choice. Often they didn't execute these mission themselves. Smartphones of police officers and criminals alike became modified to steal and transmit passwords after the carrier has left the facility again.


: As last resort hitmen were hired to take out the officers in charge of Network cases.
: As a last resort, hitmen were hired to take out the officers in charge of Network cases.


: This led to more investigations and acts of vengeance.
: This led to more investigations and acts of vengeance.


: As countermeasure the Network invested into their paramilitary division. This had multiple benefits.
: As a countermeasure, the Network invested in their paramilitary division. This had multiple benefits.


:* First, they could protect their own facility until crucial personal was evacuated.
:* First, they could protect their own facility until crucial personnel were evacuated.
:* Second, they could raid guarded companies and research facilities.
:* Second, they could raid guarded companies and research facilities.
:* Third, an own paramilitary division reduced issues of available fire power and concerns about trust/loyalty of third-party hitmen.
:* Third, an in-house paramilitary division reduced issues of available firepower and concerns about the loyalty of third-party hitmen.
:* Fourth, they were now able to conduct ''field tests'' of new weapons.
:* Fourth, they were now able to conduct ''field tests'' of new weapons.
:* Fifth, ''persuading'' all other big criminal organization to work for them. All together they make up the "Syndicate".
:* Fifth, ''persuading'' all other big criminal organization to work for them. Together, they make up the "Syndicate".


: The division grew huge and soon demanded a proper location for training and everything else that shouldn't be interrupted by random TCTF visits.
: The division grew huge, and soon demanded a proper location for training and everything else that shouldn't be interrupted by random TCTF visits.


: During the the Great Uprising the Network took its chance to spread influence on the African continent.
: During the the Great Uprising, the Network took the opportunity to spread influence on the African continent.


: They supported countries that didn't want to get annexed by the WCG.
: They supported countries that didn't want to get annexed by the WCG.


: Ensuring their contractors' sovereignty they were granted a few bases. The biggest one is simply called "the Camp".
: Ensuring their contractors' sovereignty, they were granted a few bases. The biggest one is simply called "the Camp".


: Of course police and TCTF tried to learn more about the tricks the Network used.
: Of course, police and TCTF tried to learn more about the tricks the Network used.


: Almost every attempt to analyze their computational hardware and software failed due to [http://phys.org/news/2014-10-dissolvable-silicon-circuits-sensors.html sophisticated self-destruction measures.] Dissolvable chips were especially used in wearable equipment.
: Almost every attempt to analyze their computational hardware and software failed due to [http://phys.org/news/2014-10-dissolvable-silicon-circuits-sensors.html sophisticated self-destruction measures]. Dissolvable chips were especially used in wearable equipment.


: The TCTF was going to use quantum computer to eventually break the Network's strong encryption.
: The TCTF was going to use quantum computing to eventually break the Network's strong encryption.


: The next logical step for the Network was to built quantum computers as well. With these their [http://phys.org/news/2014-02-quantum-codes-harder.html encryptions was save again]. Also, state computers infected by ransomeware are forced to connect to a Syndicate-controlled QC and enforce the encryption. [http://phys.org/news/2015-04-human-technical-ingenuity-required-defeat.html Shapeshifting] [http://phys.org/news/2015-02-malware-infecting-hard-disk-firmware.html firmware] viruses ensured persisted infection despite complete hard disk formatting and re-installation.
: The next logical step for the Network was to built quantum computers as well. With these, their [http://phys.org/news/2014-02-quantum-codes-harder.html encryption was safe again]. Also, state computers infected by ransomware are forced to connect to a Syndicate-controlled QC and enforce the encryption. [http://phys.org/news/2015-04-human-technical-ingenuity-required-defeat.html Shapeshifting] [http://phys.org/news/2015-02-malware-infecting-hard-disk-firmware.html firmware] viruses ensured persistent infection despite complete hard disk formatting and re-installation.


: The latest Network's expansion was in the drone and telecommunication sector.
: The latest expansion by the Network was in the drone and telecommunication sector.


: They use drones to transport legal and illegal goods and attack drones owned by the TCTF. (See [http://phys.org/news/2015-05-cicadas-military-swarm-mini-drones.html HERE] for RL mini drones.) Those became reprogrammed to have ''[[Quotes/Diary#CHAPTER_06_._COUNTERATTACK|blind spots]]''. The TCTF tried to locate servers the Network uses. They forced telecommunication companies to give them full access to all their data. But the Network knew it beforehand and took preparations. The TCTF is using long-established spyware of intelligence agencies, those days even more powerful than [http://en.wikipedia.org/wiki/Regin_%28malware%29 Regin.]
: They use drones to transport legal and illegal goods and attack drones owned by the TCTF. (See [http://phys.org/news/2015-05-cicadas-military-swarm-mini-drones.html HERE] for RL mini drones.) Those became reprogrammed to have ''[[Quotes/Diary#CHAPTER_06_._COUNTERATTACK|blind spots]]''. The TCTF tried to locate the servers the Network used. They forced telecommunication companies to give them full access to all their data. But the Network anticipated this, and took preparations. The TCTF is using the long-established spyware of intelligence agencies, even more powerful than [http://en.wikipedia.org/wiki/Regin_%28malware%29 Regin.]


: Since the the Network had always a close eye on TCTF operations they developed a virus-infecting virus/spyware codenamed [http://phys.org/news/2011-03-virus-eating-virus-antarctic-lake.html Sputnik].
: Since the the Network always had a close eye on TCTF operations, they developed a virus-infecting virus/spyware codenamed [http://phys.org/news/2011-03-virus-eating-virus-antarctic-lake.html Sputnik].


: The sputnik viruses are part of the Fat Loot project. It was developed as two-track strategy. Intelligence agencies have already the capacities to monitor all relevant electronic communication. So the Network took the dangerous but most rewarding challange to infect these agencies in one way or another. At same time they take over telecommunication companies either by buying the whole companies or employees in key positions. This way the Network has a double check on all data which allows them to react on situations where the counter-intelligence gets suspicions. Every datastream is a trace. With growing monitoring they are expanding their grip on the companies and send their programs at the agencies into hibernation, there only using them when it's absolutly necessary.
: The sputnik viruses are part of the Fat Loot project. It was developed as a two-track strategy. Intelligence agencies have already the capacity to monitor all relevant electronic communication. So the Network took the dangerous but most rewarding course of action, infecting these agencies in one way or another. At the same time, they took over telecommunication companies either by buying the whole companies or placing employees in key positions. This way the Network has a double check on all data which allows them to react to situations where the counter-intelligence gets suspicious. Every data stream is a trace. With growing monitoring, they expand their grip on the companies and place their programs at the agencies into hibernation, only using them when it's absolutely necessary.