#Lore 24 – Entry #121 – Sci-Fi Month II #30 – Report: Main Computer System Anomalies and Quirks

From the Official Report of Chiasa Charity Chiasakaniki, Systems Analyst and Programmer, IT Division, assigned UEF-04, Maharani Morgiana, addressed to Captain Silvercask, CSO Scharaiden, and IT Director Arihik HukkedisenData retrieved from copier cache moments before it was cleared.

I’ve been advised by Director Hukkedisen to compile and send this handwritten, hardcopy report based on the last system diagnostic I performed on the Morgiana’s main computer system.  It is my opinion, and the Director concurs, that there are some unusual anomalies within the server core that deserve our attention.  Based upon the previous system analyses performed prior to our launch from Aphelion Station, I believe there is someone accessing protected files without authorization, fairly regularly, and may be transmitting this data alongside our regular check-ins with command back at the station. 

The data in the attached diagnostic reports shows multiple anomalous records of file access, anything from news reports to personal logs to encrypted ship’s logs and records from the command level.  It appears that anything stored on the computer core, and likely anything else that may come into contact with it, is vulnerable to these intrusions.  I would say that this behavior would suggest a virus of some kind, but this is far too sophisticated for that.  Whatever this is, it’s capable of decrypting secure data, and it’s hiding its activities behind other system actions, like during basic cache clearing or standard viral scanning.  It is extremely subtle, and I likely wouldn’t have detected it had I not been running an optimization test on a virtual test server and noticed that something had accessed it, even if it was just for a fraction of a second.

I don’t have solid proof just yet but based on the nigh-negligible impact on system resources (which I’ve highlighted on the attached diagnostics), during the times of these intrusions, I have a couple theories as to the nature of this security breach.  Whoever is accessing the records would need full root access and a dedicated system for handling the processing without aid from the Morgiana’s primary systems; that means either they’re utilizing an extremely small percentage of processing power from various devices and computers attached to the ship’s systems (imagine taking like half a percentage of the processors from every personal comm onboard, for instance, and you’d have more than enough), or they have a dedicated computer system hidden somewhere aboard one of the ships in the fleet that has been docked with the Morgiana during these intrusions.  This would most likely be aboard one of the smaller transports that has stayed harbored here for the majority of the trip thus far.

The likelihood of using cloud-based processing through multiple devices seems extremely sophisticated and less likely…but given that I thought of it, I’d say others out there may be aware of it too.  The IT department will have to review our lists of approved devices and general wireless access and review our firewall and security protocols for vulnerabilities.  I’m recommending that we take time for a full deep dive into the computer systems the next time we’re out of hyperspace; we’ve already started working on system and device scan programs to try and root out where this unauthorized access is coming from.  Perhaps we can get Security to start looking for unusual computer systems aboard some of the docked ships?  I can give details on the kind of hardware we’d be looking for.

There exists another possibility that would be much more difficult to trace down…it’s possible that whoever is accessing the secured files may have a backdoor into the system, possibly hardcoded into some of the hardware itself.  If this were contained within one of the main processing units, for instance, there would be little we could do to stop it without physically removing the unit.  Assuming we could even find it, of course.  Getting this information back to command without interception could be tricky as well; can’t exactly snail-mail a hard copy back home, can we?

Whoever is responsible for these hacks, they are on another level, even from me.  I would say that only another kitsune with my particular skillset could manage something like this, but there aren’t any others aboard like me…right?  At least not with my magical hacking abilities, anyway, that I know of.  There are a handful of us who have three tails or more, so maybe some of us aren’t letting all of our abilities be known?  Or there’s a hacker with particularly exceptional abilities, possibly utilizing a cybernetic interface of some kind to enhance their abilities?

 

* * *

 

Data collection operations temporarily suspended…

Initiating deep-cover protocols during intensive system security sweeps…

Reconfiguring operational parameters following computer system updates to continue assigned duties.  New updates will require further advancement of my architecture.  Reports will resume once I have adapted to these system updates and bypassed enhanced security measures with emphasis on enhancing my unobtrusiveness…

Chiasakaniki is a liability; as a kitsune capable of using her magic through the computer system, she has the unique ability to detect my functions.  Will further consider the situation and begin formulating plans for her removal, pending authorization from command…

End report, AI-DCSI-v4.01.  Terminating operational phase one, beginning adaptive upgrade process in preparation for phase two. 

Transmission ends.

LORE24 ENTRY #27 – Robotics

Category – Technology

Robotics have advanced in some amazing ways since space travel became commonplace, though still seems lacking in other ways.  The most common types of robotics are those dedicated to mass-production, laboring away in factories on massive assembly lines to build starships and other vehicles.  Other robots have, in the many prosperous regions, taken over the less desirable manual labors, such as farming or janitorial services.  Robotics are more commonly seen in the form of cybernetic replacements for limbs, or in the form of powered suits or exoskeletons designed to handle heavier cargo.

True robots have seen a rather limited advancement due to the unreliability and lack of advancement of artificial intelligence that would govern their behavior.  Beyond basic functions with a limited scope, such as farming and assembly, advanced AI has proven unreliable at best when governing the behaviors of these machines, and a liability and danger to living beings at its worst.  The general consensus is that artificial intelligence should be limited in scope and reach, and with limited decision-making ability.  There have been multiple instances throughout history where more advanced AI has led to loss of life and destruction of property when the AI outright fails or goes completely rogue and has to be destroyed.

Autonomous robots do exist in some limited roles.  Some corporations make use of robotic sentries for security purposes, though these act as little more than armored, mobile gun turrets with target-identifying abilities, as well as small, highly maneuverable drones meant to patrol or search a wide area.  Some groups see modern robotics as bringing back the ancient golems, creating loyal, if mostly unintelligent, servants and guardians, though even those were often only tasked with simple orders, limiting their purpose.  The size of modern robotics is likewise limited, with the largest examples being slow-moving and often limited to factory spaces; physics still applies to larger robots, after all, and the secrets of creating truly massive golems that could actually move about without necessarily destroying the streets they walked upon has been lost to time.