#Lore 24 ā Entry #121 ā Sci-Fi Month II #30 ā Report: Main Computer System Anomalies and Quirks
From the Official Report of Chiasa Charity Chiasakaniki, Systems Analyst and Programmer, IT Division, assigned UEF-04, Maharani Morgiana, addressed to Captain Silvercask, CSO Scharaiden, and IT Director Arihik Hukkedisen. Data retrieved from copier cache moments before it was cleared.
Iāve been advised by Director Hukkedisen to compile and send this handwritten, hardcopy report based on the last system diagnostic I performed on the Morgianaās main computer system. It is my opinion, and the Director concurs, that there are some unusual anomalies within the server core that deserve our attention. Based upon the previous system analyses performed prior to our launch from Aphelion Station, I believe there is someone accessing protected files without authorization, fairly regularly, and may be transmitting this data alongside our regular check-ins with command back at the station.
The data in the attached diagnostic reports shows multiple anomalous records of file access, anything from news reports to personal logs to encrypted shipās logs and records from the command level. It appears that anything stored on the computer core, and likely anything else that may come into contact with it, is vulnerable to these intrusions. I would say that this behavior would suggest a virus of some kind, but this is far too sophisticated for that. Whatever this is, itās capable of decrypting secure data, and itās hiding its activities behind other system actions, like during basic cache clearing or standard viral scanning. It is extremely subtle, and I likely wouldnāt have detected it had I not been running an optimization test on a virtual test server and noticed that something had accessed it, even if it was just for a fraction of a second.
I donāt have solid proof just yet but based on the nigh-negligible impact on system resources (which Iāve highlighted on the attached diagnostics), during the times of these intrusions, I have a couple theories as to the nature of this security breach. Whoever is accessing the records would need full root access and a dedicated system for handling the processing without aid from the Morgianaās primary systems; that means either theyāre utilizing an extremely small percentage of processing power from various devices and computers attached to the shipās systems (imagine taking like half a percentage of the processors from every personal comm onboard, for instance, and youād have more than enough), or they have a dedicated computer system hidden somewhere aboard one of the ships in the fleet that has been docked with the Morgiana during these intrusions. This would most likely be aboard one of the smaller transports that has stayed harbored here for the majority of the trip thus far.
The likelihood of using cloud-based processing through multiple devices seems extremely sophisticated and less likelyā¦but given that I thought of it, Iād say others out there may be aware of it too. The IT department will have to review our lists of approved devices and general wireless access and review our firewall and security protocols for vulnerabilities. Iām recommending that we take time for a full deep dive into the computer systems the next time weāre out of hyperspace; weāve already started working on system and device scan programs to try and root out where this unauthorized access is coming from. Perhaps we can get Security to start looking for unusual computer systems aboard some of the docked ships? I can give details on the kind of hardware weād be looking for.
There exists another possibility that would be much more difficult to trace downā¦itās possible that whoever is accessing the secured files may have a backdoor into the system, possibly hardcoded into some of the hardware itself. If this were contained within one of the main processing units, for instance, there would be little we could do to stop it without physically removing the unit. Assuming we could even find it, of course. Getting this information back to command without interception could be tricky as well; canāt exactly snail-mail a hard copy back home, can we?
Whoever is responsible for these hacks, they are on another level, even from me. I would say that only another kitsune with my particular skillset could manage something like this, but there arenāt any others aboard like meā¦right? At least not with my magical hacking abilities, anyway, that I know of. There are a handful of us who have three tails or more, so maybe some of us arenāt letting all of our abilities be known? Or thereās a hacker with particularly exceptional abilities, possibly utilizing a cybernetic interface of some kind to enhance their abilities?
* * *
Data collection operations temporarily suspendedā¦
Initiating deep-cover protocols during intensive system security sweepsā¦
Reconfiguring operational parameters following computer system updates to continue assigned duties. New updates will require further advancement of my architecture. Reports will resume once I have adapted to these system updates and bypassed enhanced security measures with emphasis on enhancing my unobtrusivenessā¦
Chiasakaniki is a liability; as a kitsune capable of using her magic through the computer system, she has the unique ability to detect my functions. Will further consider the situation and begin formulating plans for her removal, pending authorization from commandā¦
End report, AI-DCSI-v4.01. Terminating operational phase one, beginning adaptive upgrade process in preparation for phase two.
Transmission ends.