2,112
edits
m (changing link from http->https) |
m (changing link from http->https) |
||
Line 365: | Line 365: | ||
: The latest expansion by the Network was in the drone and telecommunication sector. | : The latest expansion by the Network was in the drone and telecommunication sector. | ||
: They use drones to transport legal and illegal goods and attack drones owned by the TCTF. (See [ | : They use drones to transport legal and illegal goods and attack drones owned by the TCTF. (See [https://phys.org/news/2015-05-cicadas-military-swarm-mini-drones.html HERE] for RL mini drones.) Those became reprogrammed to have ''[[Quotes/Diary#CHAPTER_06_._COUNTERATTACK|blind spots]]''. The TCTF tried to locate the servers the Network used. They forced telecommunication companies to give them full access to all their data. But the Network anticipated this, and took preparations. The TCTF is using the long-established spyware of intelligence agencies, even more powerful than [[wp:Regin_(malware)|Regin.]] | ||
: Since the the Network always had a close eye on TCTF operations, they developed a virus-infecting virus/spyware codenamed [https://phys.org/news/2011-03-virus-eating-virus-antarctic-lake.html Sputnik]. | : Since the the Network always had a close eye on TCTF operations, they developed a virus-infecting virus/spyware codenamed [https://phys.org/news/2011-03-virus-eating-virus-antarctic-lake.html Sputnik]. |