2,112
edits
m (changing link from http->https) |
m (changing link from http->https) |
||
Line 367: | Line 367: | ||
: They use drones to transport legal and illegal goods and attack drones owned by the TCTF. (See [http://phys.org/news/2015-05-cicadas-military-swarm-mini-drones.html HERE] for RL mini drones.) Those became reprogrammed to have ''[[Quotes/Diary#CHAPTER_06_._COUNTERATTACK|blind spots]]''. The TCTF tried to locate the servers the Network used. They forced telecommunication companies to give them full access to all their data. But the Network anticipated this, and took preparations. The TCTF is using the long-established spyware of intelligence agencies, even more powerful than [[wp:Regin_(malware)|Regin.]] | : They use drones to transport legal and illegal goods and attack drones owned by the TCTF. (See [http://phys.org/news/2015-05-cicadas-military-swarm-mini-drones.html HERE] for RL mini drones.) Those became reprogrammed to have ''[[Quotes/Diary#CHAPTER_06_._COUNTERATTACK|blind spots]]''. The TCTF tried to locate the servers the Network used. They forced telecommunication companies to give them full access to all their data. But the Network anticipated this, and took preparations. The TCTF is using the long-established spyware of intelligence agencies, even more powerful than [[wp:Regin_(malware)|Regin.]] | ||
: Since the the Network always had a close eye on TCTF operations, they developed a virus-infecting virus/spyware codenamed [ | : Since the the Network always had a close eye on TCTF operations, they developed a virus-infecting virus/spyware codenamed [https://phys.org/news/2011-03-virus-eating-virus-antarctic-lake.html Sputnik]. | ||
: The sputnik viruses are part of the Fat Loot project. It was developed as a two-track strategy. Intelligence agencies have already the capacity to monitor all relevant electronic communication. So the Network took the dangerous but most rewarding course of action, infecting these agencies in one way or another. At the same time, they took over telecommunication companies either by buying the whole companies or placing employees in key positions. This way the Network has a double check on all data which allows them to react to situations where the counter-intelligence gets suspicious. Every data stream is a trace. With growing monitoring, they expand their grip on the companies and place their programs at the agencies into hibernation, only using them when it's absolutely necessary. | : The sputnik viruses are part of the Fat Loot project. It was developed as a two-track strategy. Intelligence agencies have already the capacity to monitor all relevant electronic communication. So the Network took the dangerous but most rewarding course of action, infecting these agencies in one way or another. At the same time, they took over telecommunication companies either by buying the whole companies or placing employees in key positions. This way the Network has a double check on all data which allows them to react to situations where the counter-intelligence gets suspicious. Every data stream is a trace. With growing monitoring, they expand their grip on the companies and place their programs at the agencies into hibernation, only using them when it's absolutely necessary. |