8,452
edits
Paradox-01 (talk | contribs) mNo edit summary |
Paradox-01 (talk | contribs) m (a little more detail on TCTF's inability to take down the Network (Fat Loot project .. lol)) |
||
Line 236: | Line 236: | ||
: The latest Network's expansion was in the drone and telecommunication sector. | : The latest Network's expansion was in the drone and telecommunication sector. | ||
: They use drones to transport legal and illegal goods and attack drones owned by the TCTF. Those became reprogrammed to have ''[[Quotes/Diary#CHAPTER_06_._COUNTERATTACK|blind spots]]''. The TCTF tried to locate servers the Network uses. They forced telecommunication companies to give them full access to all their data. But the Network knew it beforehand and took preparations. The TCTF | : They use drones to transport legal and illegal goods and attack drones owned by the TCTF. (See [http://phys.org/news/2015-05-cicadas-military-swarm-mini-drones.html HERE] for RL mini drones.) Those became reprogrammed to have ''[[Quotes/Diary#CHAPTER_06_._COUNTERATTACK|blind spots]]''. The TCTF tried to locate servers the Network uses. They forced telecommunication companies to give them full access to all their data. But the Network knew it beforehand and took preparations. The TCTF is using long-established spyware of intelligence agencies, those days even more powerful than [http://en.wikipedia.org/wiki/Regin_%28malware%29 Regin.] | ||
: Since the the Network had always a close eye on TCTF operations they developed a virus-infecting virus/spyware codenamed [http://phys.org/news/2011-03-virus-eating-virus-antarctic-lake.html Sputnik]. | |||
: The sputnik viruses are part of the Fat Loot project. It was developed as two-track strategy. Intelligence agencies have already the capacities to monitor all relevant electronic communication. So the Network took the dangerous but most rewarding challange to infect these agencies in one way or another. At same time they take over telecommunication companies either by buying the whole companies or employees in key positions. This way the Network has a double check on all data which allows them to react on situations where the counter-intelligence gets suspicions. Every datastream is a trace. With growing monitoring they are expanding their grip on the companies and send their programs at the agencies into hibernation, there only using them when it's absolutly necessary. | |||
===Aftermath=== | ===Aftermath=== |
edits