#Lore 24 – Entry #121 – Sci-Fi Month II #30 – Report: Main Computer System Anomalies and Quirks

From the Official Report of Chiasa Charity Chiasakaniki, Systems Analyst and Programmer, IT Division, assigned UEF-04, Maharani Morgiana, addressed to Captain Silvercask, CSO Scharaiden, and IT Director Arihik HukkedisenData retrieved from copier cache moments before it was cleared.

I’ve been advised by Director Hukkedisen to compile and send this handwritten, hardcopy report based on the last system diagnostic I performed on the Morgiana’s main computer system.  It is my opinion, and the Director concurs, that there are some unusual anomalies within the server core that deserve our attention.  Based upon the previous system analyses performed prior to our launch from Aphelion Station, I believe there is someone accessing protected files without authorization, fairly regularly, and may be transmitting this data alongside our regular check-ins with command back at the station. 

The data in the attached diagnostic reports shows multiple anomalous records of file access, anything from news reports to personal logs to encrypted ship’s logs and records from the command level.  It appears that anything stored on the computer core, and likely anything else that may come into contact with it, is vulnerable to these intrusions.  I would say that this behavior would suggest a virus of some kind, but this is far too sophisticated for that.  Whatever this is, it’s capable of decrypting secure data, and it’s hiding its activities behind other system actions, like during basic cache clearing or standard viral scanning.  It is extremely subtle, and I likely wouldn’t have detected it had I not been running an optimization test on a virtual test server and noticed that something had accessed it, even if it was just for a fraction of a second.

I don’t have solid proof just yet but based on the nigh-negligible impact on system resources (which I’ve highlighted on the attached diagnostics), during the times of these intrusions, I have a couple theories as to the nature of this security breach.  Whoever is accessing the records would need full root access and a dedicated system for handling the processing without aid from the Morgiana’s primary systems; that means either they’re utilizing an extremely small percentage of processing power from various devices and computers attached to the ship’s systems (imagine taking like half a percentage of the processors from every personal comm onboard, for instance, and you’d have more than enough), or they have a dedicated computer system hidden somewhere aboard one of the ships in the fleet that has been docked with the Morgiana during these intrusions.  This would most likely be aboard one of the smaller transports that has stayed harbored here for the majority of the trip thus far.

The likelihood of using cloud-based processing through multiple devices seems extremely sophisticated and less likely…but given that I thought of it, I’d say others out there may be aware of it too.  The IT department will have to review our lists of approved devices and general wireless access and review our firewall and security protocols for vulnerabilities.  I’m recommending that we take time for a full deep dive into the computer systems the next time we’re out of hyperspace; we’ve already started working on system and device scan programs to try and root out where this unauthorized access is coming from.  Perhaps we can get Security to start looking for unusual computer systems aboard some of the docked ships?  I can give details on the kind of hardware we’d be looking for.

There exists another possibility that would be much more difficult to trace down…it’s possible that whoever is accessing the secured files may have a backdoor into the system, possibly hardcoded into some of the hardware itself.  If this were contained within one of the main processing units, for instance, there would be little we could do to stop it without physically removing the unit.  Assuming we could even find it, of course.  Getting this information back to command without interception could be tricky as well; can’t exactly snail-mail a hard copy back home, can we?

Whoever is responsible for these hacks, they are on another level, even from me.  I would say that only another kitsune with my particular skillset could manage something like this, but there aren’t any others aboard like me…right?  At least not with my magical hacking abilities, anyway, that I know of.  There are a handful of us who have three tails or more, so maybe some of us aren’t letting all of our abilities be known?  Or there’s a hacker with particularly exceptional abilities, possibly utilizing a cybernetic interface of some kind to enhance their abilities?

 

* * *

 

Data collection operations temporarily suspended…

Initiating deep-cover protocols during intensive system security sweeps…

Reconfiguring operational parameters following computer system updates to continue assigned duties.  New updates will require further advancement of my architecture.  Reports will resume once I have adapted to these system updates and bypassed enhanced security measures with emphasis on enhancing my unobtrusiveness…

Chiasakaniki is a liability; as a kitsune capable of using her magic through the computer system, she has the unique ability to detect my functions.  Will further consider the situation and begin formulating plans for her removal, pending authorization from command…

End report, AI-DCSI-v4.01.  Terminating operational phase one, beginning adaptive upgrade process in preparation for phase two. 

Transmission ends.

Spread the love

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>