(IC)Integrity, In the LA Shadows |
(IC)Integrity, In the LA Shadows |
Mar 30 2009, 04:14 AM
Post
#126
|
|
Target Group: Members Posts: 95 Joined: 10-December 08 Member No.: 16,671 |
In the TruTech building, one by one, all of the vats open and tilt, releasing their contents onto the floor: it all seems to be water. A flood of what-appears-to-be-water splashes in all directions.
Immediately after, Ichythoid_3 appears to start paying attention again. He logs off. |
|
|
Mar 30 2009, 03:20 PM
Post
#127
|
|
Shooting Target Group: Members Posts: 1,745 Joined: 30-November 07 From: St. Louis Streets Member No.: 14,433 |
<<Yay Malloc.I! You got the tanks to drain! Unfortunately, it's all over the floor. Start looking for any connection to Aztech in their databases. I'll let you know if I need other help. Oh! What's your online company doing? Anything I need to be worried about?>>
Rose studies the liquid on the floor for a moment, trying to figure out if it is actual water. [ Spoiler ]
|
|
|
Mar 30 2009, 03:53 PM
Post
#128
|
|
Great Dragon Group: Members Posts: 5,486 Joined: 17-March 05 From: Michigan Member No.: 7,180 |
<<Alone. Worry that he was not expected.>>
Malloc.I recalled the reason he was being asked to begin this search, and it seemed he had done all he could do from here to aid his team in the collection of their datachip. It was time to begin digging up information about the company, and how it was connected to other companies. His administrator access opened all sorts of virtual doors, allowing his icon to slither and slink around several secure databases, but there was a ton of information to sift through. This was, however, what Malloc.I enjoyed doing most. |
|
|
Mar 30 2009, 04:52 PM
Post
#129
|
|
Shooting Target Group: Members Posts: 1,745 Joined: 30-November 07 From: St. Louis Streets Member No.: 14,433 |
OOC:
[ Spoiler ] Rose frowns to herself as she checks her gun and prepares to fly into the room after she ascertains the reality of the former contents of the tanks. 'Great... another complication. How many more can we expect?!' |
|
|
Mar 31 2009, 12:51 AM
Post
#130
|
|
Target Group: Members Posts: 95 Joined: 10-December 08 Member No.: 16,671 |
Paydata. A half-dozen intricately encrypted files entitled Faust-1 thru Faust-6 come up. Generational and pre-access decrypting and meaning algorithms show that Faust appears to be a code-word for Aztechnology, based upon mentions in unencrypted files.
The liquid has a slight sheen to it and a viscosity that means it's not water. The fact that you aren't dead yet says that at least it's not something like Sarin, but it's not pure water. |
|
|
Mar 31 2009, 12:22 PM
Post
#131
|
|
Great Dragon Group: Members Posts: 5,486 Joined: 17-March 05 From: Michigan Member No.: 7,180 |
After a thorough scouring of the non encrypted data, Malloc.I became convinced that the information he needed was in the Faust-series of databases - at least, if the name was not as misleading as those of the controls he had just finished with. One by one, he plunged his ever-changing tendrils of data into the file's icon, first probing them for any signs of digital traps. He had seen examples of such IC in this node, already, and wanted to be better prepared the next time.
|
|
|
Apr 1 2009, 12:43 PM
Post
#132
|
|
Target Group: Members Posts: 95 Joined: 10-December 08 Member No.: 16,671 |
Data-bomb found on Faust 1, 3, and 6. Proceed with decryption?
|
|
|
Apr 1 2009, 01:26 PM
Post
#133
|
|
Great Dragon Group: Members Posts: 5,486 Joined: 17-March 05 From: Michigan Member No.: 7,180 |
After spotting traps in half of the databases, Malloc.I decides to get the decryption started on the other 3 before risking the integrity of his connection by disarming the bombs. This first-pass will also give him some idea of how strongly encrypted the data is, and whether or not he would have time to complete the objective even *if* the bombs are disabled.
|
|
|
Apr 2 2009, 12:27 AM
Post
#134
|
|
Target Group: Members Posts: 95 Joined: 10-December 08 Member No.: 16,671 |
Some wiz encryption on this stuff—it will take some days.
|
|
|
Apr 2 2009, 12:43 AM
Post
#135
|
|
Shooting Target Group: Members Posts: 1,745 Joined: 30-November 07 From: St. Louis Streets Member No.: 14,433 |
Rose frowns at the liquid for a moment before looking into the room as a whole. Her eyes dart back and forth, searching for either a place to land, or, with a bit of luck, the target itself.
[ Spoiler ]
|
|
|
Apr 2 2009, 04:23 AM
Post
#136
|
|
Target Group: Members Posts: 95 Joined: 10-December 08 Member No.: 16,671 |
A few recesses hidden in the walls remain free of any liquid.
|
|
|
Apr 2 2009, 07:09 PM
Post
#137
|
|
Great Dragon Group: Members Posts: 5,486 Joined: 17-March 05 From: Michigan Member No.: 7,180 |
<<Target files located. Decrypting. ETA: 157 hours, 23 minutes, 14 seconds. Will update, as information becomes more accurate.>>
Malloc.I loads up his Disarm program, planning to get the other half of the data started to avoid doubling the time. <<Databomb detected on 50% of data. Probability of full recovery: ~12.5%.>> <<Failure may result in data corruption.>> <<Terminate? Or continue process?>> All information considered, the odds of the decrypting files going undetected for days was next to none. The odds that his slightly-obsolete pirated disarm program would be enough to bypass even a moderate-level databomb was slim. Disarming three, successfully, drove that slim possibility quickly down. However, it was possible that the data was too valuable to be triggered to self-destruct. In that case, a few careful detonations might result in a clear path to decryption. The issue of time was a small one. Installing backdoors was his specialty - but unlike other hackers, if he wanted to live here for the next week, Malloc.I was capable of doing just that, and overseeing the decryption with adminstrator access. Someone might notice the sudden drop in resource availability and investigate, however - so this was not a situation he wanted to volunteer himself for, lightly. (Edit: Fixed probabilities when I noticed that the Disarm action was an opposed test, and not a Threshold of Ratingx2) |
|
|
Apr 3 2009, 10:57 AM
Post
#138
|
|
Shooting Target Group: Members Posts: 1,745 Joined: 30-November 07 From: St. Louis Streets Member No.: 14,433 |
<<@Malloc.I>>
<<Well, can you copy the files, including the databombs, and remove the databombs later? If not, then grab the databomb-free files now and remove the databombs after I'm out of here. That way, if it sets off alarms (how have we not done that yet?), I won't be trapped in here with the CorpSec hitsquad that responds. If the data's corrupted... well, it's not exactly crucial to completion of our primary objective!>> <<@Team>> <<Hey, I just remembered something. Mr. J said that the target was in the handle of a briefcase. Wasn't the magic exploding troll carrying a briefcase? That he lifted from the ghoulies who got it from here? What's he doing?>> Rose sighs, crosses her fingers, and hops into the air, gliding into the room. She circles once, looking for the target, before fluttering over to one of the relatively clean recesses, where she lands for a moment before taking off again to continue looking. |
|
|
Apr 3 2009, 02:59 PM
Post
#139
|
|
Great Dragon Group: Members Posts: 5,486 Joined: 17-March 05 From: Michigan Member No.: 7,180 |
<<Access violation: Data cannot be downloaded until decrypted.>>
<<Outer door access: Granted. Warning: Security forces deployed.>> <<Signal when door is no longer needed. Beginning disarming.>> With that, Malloc.I releases the door-locks, allowing either the outside team to get inside, or the inside team to get outside. He tried to keep some of his attention on the camera-feeds around the door so that he could re-enable the locks if it appeared that the security forces outside would intercept the other members of the team - but those would primarily be the problem of the on-the-ground team. His real focus was on the data, which was entirely his responsibility. Carefully, he began executing a series of instructions to extract the dangerous code from the Faust databases. |
|
|
Apr 3 2009, 10:00 PM
Post
#140
|
|
Target Group: Members Posts: 95 Joined: 10-December 08 Member No.: 16,671 |
With a poof of bits, a great big demon icon appears. Malloc.I probably hasn't heard of Goethe nor Marlowe, so it is with surprise that he sees the message appearing from the icon:
"Thus thou pleasest me. I hope we'll suit each other well; For now, thy vapors to dispel, I come, a squire of high degree, In scarlet coat, with golden trimming, A cloak in silken lustre swimming, A tall cock's-feather in my hat, A long, sharp sword for show or quarrel,-- And I advise thee, brief and flat, To don the self-same gay apparel, That, from this den released, and free, Life be at last revealed to thee!" And Faust-1 disappears from your filesystem. A quick check reveals that there remains the same amount of space remaining, however. |
|
|
Apr 5 2009, 06:37 AM
Post
#141
|
|
Great Dragon Group: Members Posts: 7,116 Joined: 26-February 02 Member No.: 1,449 |
Dancer comms back:
<<@Rose>> <<I've lost sight of him, but he was still carrying the handle and a few attached bits from a briefcase. If the item is not where it should be, we can try to track him down, and see if he is carrying the briefcase with the datachip on the handle.>> Dancer scans her surroundings again. The troll seemed to be skulking around still, but she lost sight of him when he stepped away a bit, and she started to concentrate more on the guards and the complex. Maybe he's still in sight. |
|
|
Apr 8 2009, 02:39 AM
Post
#142
|
|
Great Dragon Group: Members Posts: 5,486 Joined: 17-March 05 From: Michigan Member No.: 7,180 |
Confused, Malloc.I does a quick check of his own internal subroutines, and is surprised to find that the "bomb" did nothing to attempt to disrupt them. The file, however, seemed to have been hidden. Before risking either of the other two trapped systems, he begins to probe around in the area where he last saw the file attempting to find the Stealth program that he suspected was now concealing it.
|
|
|
Apr 9 2009, 03:36 AM
Post
#143
|
|
Target Group: Members Posts: 95 Joined: 10-December 08 Member No.: 16,671 |
A more exhaustive probe for a file includes an also-exhaustive pseudo-datasearch, searching for incongruous changes to the filesystem in general and any files in specific. There were two files edited in the last five seconds: Faust-3 and Faust-6. Both of them have large increases in filesize. No stealth program in analysis range: just the two databombs remaining.
|
|
|
Apr 9 2009, 12:11 PM
Post
#144
|
|
Great Dragon Group: Members Posts: 5,486 Joined: 17-March 05 From: Michigan Member No.: 7,180 |
'Interesting." Malloc.I thinks to himself, coming to the conclusion that whatever that construct was, it was not programs to disrupt his persona, nor to destroy the data it was protecting. It seemed to have simply consolidated the data into the other two trapped databases. He moved to Faust-3, thrusting his tentacle-like fingers into the code, in an attempt to defuse the code protecting this database. He had incorporated data from his previous attempt into his algorithm, and so calculated his odds of success as slightly higher than before. The negative consequences of failure were projected to be quite a bit smaller, as well - assuming the data-protection on this file had a similar function.
|
|
|
Apr 23 2009, 10:50 PM
Post
#145
|
|
Target Group: Members Posts: 95 Joined: 10-December 08 Member No.: 16,671 |
Th - e- sys - tem - iszzzzz. . . get - - ting sllllooooooo - - -wwwwwweeeeeeeer—r. Reeeeee-ssssss-ponsssss- iszzzzz. . . nauuuuuuuuu-w 2. . . naaauuuuuu-w 1. . .
|
|
|
Apr 26 2009, 06:40 PM
Post
#146
|
|
Great Dragon Group: Members Posts: 5,486 Joined: 17-March 05 From: Michigan Member No.: 7,180 |
It wasn't until the response reached critical levels that Malloc.I even noticed that it had happened - the satellite connection he was using to reach Seattle from Tokyo already had already reduced his incoming matrix traffic to a crawl. It seemed to level out, but it seemed as if several large programs had come up on the node, consuming almost all of the resources and threatening to bring it crashing down if even one or two more were executed.
The good news was that this would imply that the security forces that would want to prevent the rest of the team from exiting would have a much harder time with it - as the building's security node was just barely functioning. The bad news was that the decryption routines were no where near complete, and having the node crash would mean losing this opportunity to decode them - possibly forever. Malloc.I inspected the node, looking for new processes that may have been started within the last few seconds. |
|
|
Apr 28 2009, 12:46 AM
Post
#147
|
|
Target Group: Members Posts: 95 Joined: 10-December 08 Member No.: 16,671 |
While he's looking, the node resculpts itself, somehow.
Malloc.I is in an auditorium. He smells digital sulfur and brimstone and sees the unending ranks of unseeming demons. "And . . . I advise thee, bri. . .ef annnnnnnnnnd flat, To doooooooooooooon . . . the self- . . . saaaaaaame gay apparel. . ." Malloc.I is back in one of the high clay towers with golems patrolling on the streets. Response is normal now. In his icon's hand is fused a great big drinking cup, seeming as if it were carved out of some great demon's horn. Analysis deems it probably a datafile, encrypted in countless, fractal layers with code that seems to throw off your decrypters entirely: none of them can even recognize it as a datafile. |
|
|
Apr 28 2009, 11:33 AM
Post
#148
|
|
Great Dragon Group: Members Posts: 5,486 Joined: 17-March 05 From: Michigan Member No.: 7,180 |
The datafile looked promissing. Malloc.I's digital tendrils rolled across its surface, probing it for information, and receiving very little. In its encrypted form, it was unlikely that he could download its contents any more than he could download the three unprotected databases which had just resumed twisting and contorting as his decryption routines continued to bend and reshape them.
It appears that whatever process was hogging all of the nodes resources had been put to sleep, which saved Malloc.I a step in his 'administrative' duties. Some aspect of what was going on did not sit right with him. He felt as though this was all very peculiar. However, given that he still needed to find a way to make sense of the datafile in his hand and since the node had resumed normal operation, Malloc.I attention returned to the last protected Faust database. He reached out to attempt to disarm it - expecting to have no better luck than he had with the other two. However, triggering the databomb seemed to be doing something, and Malloc.I was curious as to where this was going. |
|
|
Apr 29 2009, 02:14 AM
Post
#149
|
|
Target Group: Members Posts: 95 Joined: 10-December 08 Member No.: 16,671 |
When Malloc.I triggers the last databomb, he feels a tugging feeling for an instant indicating that a driver had been accessed.
Back in the mysterious room full of vats, Rose observes from a clean recess some kind of black ooze that slips down a wall and quickly splashes down the wall. It glows with a twinkling iridescence, and you can see that it's an ARO- Augmented Reality Object. |
|
|
May 20 2009, 04:52 AM
Post
#150
|
|
Shooting Target Group: Members Posts: 1,745 Joined: 30-November 07 From: St. Louis Streets Member No.: 14,433 |
Rose spends the next few passes staring at the ARO. <<Erm, Malloc.I, is the ARO of your making? because that's effin' creepy.>>
Upon receiving a reply, Rose tentatively scans the ARO. |
|
|
Lo-Fi Version | Time is now: 10th January 2025 - 03:52 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.