19,596
edits
m (grammar review, part 1) |
m (grammar review, part 2) |
||
Line 104: | Line 104: | ||
====Wasn't Hasegawa sentenced?==== | ====Wasn't Hasegawa sentenced?==== | ||
Hasegawa wasn't authorized to enter the Wilderness Preserve and he killed his wife. So, there must have been a lawsuit. | Hasegawa wasn't authorized to enter the Wilderness Preserve, and he killed his wife. So, there must have been a lawsuit. | ||
But it seems he | But it seems he didn't have to spend time in a prison. | ||
* Either | * Either the WCG offered him some sort of deal for not using his connections and public sympathy to his advantage... (he and Jamie were active in the environmental movement) | ||
* Or he was sentenced | * Or he was sentenced, but before reaching prison, or later on, a Syndicate/ninja group freed him. | ||
Why | Why does Kerr speak of himself as a criminal? Maybe he arranged Hasegawa's rescue. After that, they had no other choice but to work for the Syndicate anyway. | ||
: 13_65_21 Kerr: "Your father and I were criminals, funded by the Syndicate. We couldn't get backing from any legitimate source. [...]" | : 13_65_21 Kerr: "Your father and I were criminals, funded by the Syndicate. We couldn't get backing from any legitimate source. [...]" | ||
At that | At that point, Hasegawa already must have had a rough plan persuasive enough that Kerr, and more importantly the Syndicate, would join him. | ||
: 12_43_11 Hasegawa: "[...] I'm going to do something about the nightmare that killed her. Her brother will help me. He misses her as much as I do." | : 12_43_11 Hasegawa: "[...] I'm going to do something about the nightmare that killed her. Her brother will help me. He misses her as much as I do." | ||
It's said that Mai "[[Quotes/Manual#Konoko|orphaned at the age of 3]]" and she said that | It's said that Mai was "[[Quotes/Manual#Konoko|orphaned at the age of 3]]" and she said that her Chrysalis was implanted [[Quotes/Speech#Friends|at the age of 7]]. So the Chrysalis prototypes were created within approximately 4 years. How could this complex project be finished by a mere two-man army? Likely Hasegawa didn't start from scratch. Also, he and Kerr possibly used [[wikipedia:In_silico#Cell_models|powerful simulations]]. (Another reason why Oni should take place in 2055.) | ||
====When did Mukade join?==== | ====When did Mukade join?==== | ||
The ninjas have always been interested in knowledge and new technology. So at least Mukade, as a boss of his clan, monitored the WCG's and the Syndicate's scientific projects. Either he would have been informed by reading the first summary of Hasegawa's simulations, or even earlier when the two scientists made their deal with the Syndicate. | |||
Line 128: | Line 128: | ||
Hasegawa and Kerr request more computing power. | Hasegawa and Kerr request more computing power. | ||
Pensatore (meaning "the thinker") is an SLD | Pensatore (meaning "the thinker") is an SLD scientist, and leads the AVATARA project. He is consulted by Mukade to judge if the Chrysalis is really worth the cost. | ||
: Background: | : Background: | ||
Line 134: | Line 134: | ||
: The European [http://en.wikipedia.org/wiki/Blue_Brain_Project Blue Brain Project] as well as the American [http://en.wikipedia.org/wiki/BRAIN_Initiative BRAIN Initiative] failed. | : The European [http://en.wikipedia.org/wiki/Blue_Brain_Project Blue Brain Project] as well as the American [http://en.wikipedia.org/wiki/BRAIN_Initiative BRAIN Initiative] failed. | ||
: The Blue Brain Project ignored | : The Blue Brain Project ignored glial cells and similar supporting elements. The BRAIN Initiative [http://www.nature.com/news/neuroscience-map-the-other-brain-1.13654 did better] but still had no real neuronal input and no information from cells that measured the concentration of oxygen, sugar, etc. | ||
: And there are a lot [[wikipedia:Autonomic_nervous_system#Sensory_neurons|neurons in the human body]]. So it became more and more clear that | : And there are a lot of [[wikipedia:Autonomic_nervous_system#Sensory_neurons|neurons in the human body]]. So it became more and more clear that restricting the brain to its own neurons was far from satisfactory. | ||
: After they had a full body simulation up and running the next step was to | : After they had a full body simulation up and running, the next step was to educate the AI and let it control a body in the physical world. | ||
: At this point the | : At this point the networked supercomputer had clusters all over the world and was named AVATARA. (This full body simulation depicting AI was remote-controlling a robot, its avatar.) | ||
: The collected data from this "[[Restless_Souls/Technology#Speculation_about_brain_components|SLD generation 0]]" wasn't enough to design an AI from scratch because most of the data still needed years to | : The collected data from this "[[Restless_Souls/Technology#Speculation_about_brain_components|SLD generation 0]]" wasn't enough to design an AI from scratch because most of the data still needed years to be fully analyzed. | ||
: | : With the bits of knowledge learned from generation 0, and ongoing technological progress, Pensatore would soon start the research on SLD generation 1. | ||
: Meanwhile planet Earth | : Meanwhile, planet Earth had its first AI, whose first task, ironically, was to understand itself. In doing so, it tried to read all available knowledge about the subjects the scientists worked in. | ||
: The AI got | : The AI got significantly smarter and drew interest from more researchers to solve complex problems and calculations. | ||
: Pensatore was still in charge of AVATARA and had a hard time granting Hasegawa a full month to complete the Daodan. | : Pensatore was still in charge of AVATARA and had a hard time granting Hasegawa a full month to complete the Daodan. | ||
Line 154: | Line 154: | ||
====Full body simulations==== | ====Full body simulations==== | ||
Computing power was limited. So | Computing power was limited. So using the children's virtual bodies (possessing roughly half the number of cells of adults) was helpful for Hasegawa's project once more. | ||
Pensatore: "In the coming months AVATARA will be upgraded." | Pensatore: "In the coming months, AVATARA will be upgraded." | ||
:Hasegawa: "Months. Why does it take so long?" | :Hasegawa: "Months. Why does it take so long?" | ||
Pensatore: "That's | Pensatore: "That's not unusual; the bigger a machine gets, the longer you spend maintaining and upgrading it. [http://phys.org/news/2014-07-large-hadron-collider.html Our colleges at CERN] can tell you a thing or two about it. The difficulty with AVATARA is splitting simulations across multiple, geographically distant clusters and having it run reliably. Before AVATARA's official restart, there will be tests to ensure everything will be alright. This includes AVATARA's new autonomy protocols. We will pretend there are complications that require running more tests. These will be your actual Daodan simulation. This way you will get about one month's computing time. No more, so you better use your time wisely." | ||
:Hasegawa: "I don't understand why you mentioned the AI's autonomy protocols." | :Hasegawa: "I don't understand why you mentioned the AI's autonomy protocols." | ||
Pensatore: "First | Pensatore: "First off, that will allow AVATARA to hide your simulation from superusers. And second, with the additional rights, AVATARA can effectively adapt to your Big Data challenge." | ||
:Hasegawa: "Like what." | :Hasegawa: "Like what." | ||
Line 172: | Line 172: | ||
[...] | [...] | ||
Mukade foresees the missing results of the extra tests and uses the TITAN network to generate fake data, scaled and polished. "Pensatore, you expected our | Mukade foresees the missing results of the extra tests and uses the TITAN network to generate fake data, scaled and polished. "Pensatore, you expected our little secret to be busted. But you aren't the only one that has a decent understanding of computers and networks." | ||
====How Syndicate's TITAN became a tool for further research==== | ====How Syndicate's TITAN became a tool for further research==== | ||
During Muro's leadership TITAN may or may not have gained some sort of key role in the Daodan project. | During Muro's leadership, TITAN may or may not have gained some sort of key role in the Daodan project. | ||
At least Daodan and TITAN are mentioned together in the [[Quotes/Consoles#STURMANDERUNG_:_Secondary_Stage|second]] and third phase of STURMÄNDERUNG. | At least Daodan and TITAN are mentioned together in the [[Quotes/Consoles#STURMANDERUNG_:_Secondary_Stage|second]] and third phase of STURMÄNDERUNG. | ||
Line 182: | Line 182: | ||
:9) Daodan core technology (ref.TITAN\uwlb) | :9) Daodan core technology (ref.TITAN\uwlb) | ||
As it is theorized on the | As it is theorized on the Quotes pages, these lines could be links to files that need "high-security access" (in comparison to [[Quotes/Consoles/level_19a|dwarf]]). | ||
But I would like to think that TITAN plays a bigger | But I would like to think that TITAN plays a bigger role than being a high-security data archive or mail system. | ||
[[Quotes/Objectives#CHAPTER_14_._DAWN_OF_THE_CHRYSALIS|In the objectives]] you can read this: | [[Quotes/Objectives#CHAPTER_14_._DAWN_OF_THE_CHRYSALIS|In the objectives]] you can read this: | ||
Line 190: | Line 190: | ||
: ''Hint: The sub-node data consoles are located in the rooms that flank the main computer chamber.'' | : ''Hint: The sub-node data consoles are located in the rooms that flank the main computer chamber.'' | ||
What's a megacomputer? Maybe naming it supercomputer wasn't cool enough or TITAN is supposed to be even bigger. | What's a megacomputer? Maybe naming it supercomputer wasn't cool enough, or TITAN is supposed to be even bigger. | ||
Anyway, the Syndicate seems to possess much computing power. In the following I try explain a possible origin while taking | Anyway, the Syndicate seems to possess much computing power. In the following, I try to explain a possible origin while also taking the Syndicate's/Network's history and the Daodan's history into account. | ||
The Syndicate would have needed much computing power to | The Syndicate would have needed much computing power to re-run the Daodan simulation or parts of it so that they could create a Daodan ready for mass production. | ||
<!-- | <!-- | ||
After entering the mountain compound you can even meet a [[Quotes/Speech#Is_that_a_yes.3F|Syndicate scientist]] that seems to know what Muro and Mai really are. | After entering the mountain compound you can even meet a [[Quotes/Speech#Is_that_a_yes.3F|Syndicate scientist]] that seems to know what Muro and Mai really are. | ||
Line 202: | Line 202: | ||
What could be a legit background story to portray TITAN's evolution as supercomputer? | What could be a legit background story to portray TITAN's evolution as supercomputer? | ||
: One factor of the Syndicate's success lies its | : One factor of the Syndicate's success lies in its formerly-decentralized nature. | ||
: [[WCG#History_of_the_Syndicate|History of the Syndicate]] | : [[WCG#History_of_the_Syndicate|History of the Syndicate]] | ||
Line 209: | Line 209: | ||
: Decentralized organizations are more difficult to destroy because there's no main target. | : Decentralized organizations are more difficult to destroy because there's no main target. | ||
:: The [[wikipedia:Pink_Panthers|Pink Panthers]] can serve as example | :: The [[wikipedia:Pink_Panthers|Pink Panthers]] can serve as an example of a decentralized organization. They are kinda independent groups raiding jewelry shops. According to a TV documentary, the most successful group takes the lead over the others. | ||
: In case of the Network, they don't steal and sell | : In case of the Network, they don't steal and sell jewelry, but prohibited technology. | ||
: In order to allow secure communication among the groups the Network built powerful servers all over the world. The TITAN servers provided very strong encryption. At same time they were wired to the [[wikipedia:Tor_(anonymity_network)|Tor network]] to keep things anonymous. | : In order to allow secure communication among the groups, the Network built powerful servers all over the world. The TITAN servers provided very strong encryption. At same time, they were wired to the [[wikipedia:Tor_(anonymity_network)|Tor network]] to keep things anonymous. | ||
: With increasing computing power, reverse engineering fit nicely into their business strategy. | : With increasing computing power, reverse engineering fit nicely into their business strategy. | ||
: Now instead of selling the technology they were going to produce copies to earn even more money. | : Now, instead of selling the technology, they were going to produce copies to earn even more money. | ||
: On the civil markets they provided underground shops (aka Resurrection Shops) with RE tools, restricted TITAN access and 3D printers. | : On the civil markets they provided underground shops (aka Resurrection Shops) with RE tools, restricted TITAN access and 3D printers. | ||
Line 223: | Line 223: | ||
: They are serving customers plagued by goods with [[wikipedia:Planned_obsolescence|built-in obsolescence]], and of course they sell any illegal technology or modification. | : They are serving customers plagued by goods with [[wikipedia:Planned_obsolescence|built-in obsolescence]], and of course they sell any illegal technology or modification. | ||
: Though the big money was to be found | : Though the big money was to be found in the military sector. With BGI, another financial pillar was established. | ||
: Police investigations were slowed down and some stopped completely by cyber attacks. At first files were deleted, then to avoid early detection backup files were not deleted but encrypted by ransomware. In critical cases the Network sent agents to attack [http://phys.org/news/2014-10-leak-sensitive-isolated-air-gap-mobile.html air-gap secured] targets. Mukade and his men were very successful and soon became their first choice. Often they didn't execute these mission themselves. Smartphones of police officers and criminals alike became modified to steal and transmit passwords after the carrier has left the facility again. | : Police investigations were slowed down and some stopped completely by cyber attacks. At first, files were deleted, then, to avoid early detection, backup files were not deleted but encrypted by ransomware. In critical cases the Network sent agents to attack [http://phys.org/news/2014-10-leak-sensitive-isolated-air-gap-mobile.html air-gap secured] targets. Mukade and his men were very successful and soon became their first choice. Often they didn't execute these mission themselves. Smartphones of police officers and criminals alike became modified to steal and transmit passwords after the carrier has left the facility again. | ||
: As last resort hitmen were hired to take out the officers in charge of Network cases. | : As a last resort, hitmen were hired to take out the officers in charge of Network cases. | ||
: This led to more investigations and acts of vengeance. | : This led to more investigations and acts of vengeance. | ||
: As countermeasure the Network invested | : As a countermeasure, the Network invested in their paramilitary division. This had multiple benefits. | ||
:* First, they could protect their own facility until crucial | :* First, they could protect their own facility until crucial personnel were evacuated. | ||
:* Second, they could raid guarded companies and research facilities. | :* Second, they could raid guarded companies and research facilities. | ||
:* Third, an | :* Third, an in-house paramilitary division reduced issues of available firepower and concerns about the loyalty of third-party hitmen. | ||
:* Fourth, they were now able to conduct ''field tests'' of new weapons. | :* Fourth, they were now able to conduct ''field tests'' of new weapons. | ||
:* Fifth, ''persuading'' all other big criminal organization to work for them. | :* Fifth, ''persuading'' all other big criminal organization to work for them. Together, they make up the "Syndicate". | ||
: The division grew huge and soon demanded a proper location for training and everything else that shouldn't be interrupted by random TCTF visits. | : The division grew huge, and soon demanded a proper location for training and everything else that shouldn't be interrupted by random TCTF visits. | ||
: During the the Great Uprising the Network took | : During the the Great Uprising, the Network took the opportunity to spread influence on the African continent. | ||
: They supported countries that didn't want to get annexed by the WCG. | : They supported countries that didn't want to get annexed by the WCG. | ||
: Ensuring their contractors' sovereignty they were granted a few bases. The biggest one is simply called "the Camp". | : Ensuring their contractors' sovereignty, they were granted a few bases. The biggest one is simply called "the Camp". | ||
: Of course police and TCTF tried to learn more about the tricks the Network used. | : Of course, police and TCTF tried to learn more about the tricks the Network used. | ||
: Almost every attempt to analyze their computational hardware and software failed due to [http://phys.org/news/2014-10-dissolvable-silicon-circuits-sensors.html sophisticated self-destruction measures. | : Almost every attempt to analyze their computational hardware and software failed due to [http://phys.org/news/2014-10-dissolvable-silicon-circuits-sensors.html sophisticated self-destruction measures]. Dissolvable chips were especially used in wearable equipment. | ||
: The TCTF was going to use quantum | : The TCTF was going to use quantum computing to eventually break the Network's strong encryption. | ||
: The next logical step for the Network was to built quantum computers as well. With these their [http://phys.org/news/2014-02-quantum-codes-harder.html | : The next logical step for the Network was to built quantum computers as well. With these, their [http://phys.org/news/2014-02-quantum-codes-harder.html encryption was safe again]. Also, state computers infected by ransomware are forced to connect to a Syndicate-controlled QC and enforce the encryption. [http://phys.org/news/2015-04-human-technical-ingenuity-required-defeat.html Shapeshifting] [http://phys.org/news/2015-02-malware-infecting-hard-disk-firmware.html firmware] viruses ensured persistent infection despite complete hard disk formatting and re-installation. | ||
: The latest Network | : The latest expansion by the Network was in the drone and telecommunication sector. | ||
: They use drones to transport legal and illegal goods and attack drones owned by the TCTF. (See [http://phys.org/news/2015-05-cicadas-military-swarm-mini-drones.html HERE] for RL mini drones.) Those became reprogrammed to have ''[[Quotes/Diary#CHAPTER_06_._COUNTERATTACK|blind spots]]''. The TCTF tried to locate servers the Network | : They use drones to transport legal and illegal goods and attack drones owned by the TCTF. (See [http://phys.org/news/2015-05-cicadas-military-swarm-mini-drones.html HERE] for RL mini drones.) Those became reprogrammed to have ''[[Quotes/Diary#CHAPTER_06_._COUNTERATTACK|blind spots]]''. The TCTF tried to locate the servers the Network used. They forced telecommunication companies to give them full access to all their data. But the Network anticipated this, and took preparations. The TCTF is using the long-established spyware of intelligence agencies, even more powerful than [http://en.wikipedia.org/wiki/Regin_%28malware%29 Regin.] | ||
: Since the the Network had | : Since the the Network always had a close eye on TCTF operations, they developed a virus-infecting virus/spyware codenamed [http://phys.org/news/2011-03-virus-eating-virus-antarctic-lake.html Sputnik]. | ||
: The sputnik viruses are part of the Fat Loot project. It was developed as two-track strategy. Intelligence agencies have already the | : The sputnik viruses are part of the Fat Loot project. It was developed as a two-track strategy. Intelligence agencies have already the capacity to monitor all relevant electronic communication. So the Network took the dangerous but most rewarding course of action, infecting these agencies in one way or another. At the same time, they took over telecommunication companies either by buying the whole companies or placing employees in key positions. This way the Network has a double check on all data which allows them to react to situations where the counter-intelligence gets suspicious. Every data stream is a trace. With growing monitoring, they expand their grip on the companies and place their programs at the agencies into hibernation, only using them when it's absolutely necessary. | ||