RE: Delete the Virus
12-23-2018, 01:05 AM
2:20 AM, NATO Cyber Defense Center of Excellence
"Any updates on the situation?"
"So far, the Virus has only penetrated low-hanging fruit, so to speak. Websites that have little-to-no protection against cyberattacks. It's made its current base of operations in some kind of... roleplaying forum hosted in America that is one such low-hanging fruit. However, we suspect that it will use its position to launch cyberattacks on more secure websites."
"How are the counterattack efforts going?"
"Sir, this Virus is unprecedented in the history of cyberspace. It's almost like a distributed artificial intelligence, able to adapt and alter its code with human-like sophistication. We've tried the usual countermeasures: quarantines, DDOS attacks, dark web nests, but the Virus always finds a way around them. Before we can launch an effective counterattack, we need to study the nature of the Virus more closely."
"Very well. Sam, lead a team of IT experts into Cyberspace where the Virus is operating. We need you to scout the nature of the Virus and its corruption of the Internet. To carry out this mission, we are giving you access to our state-of-the-art quantum encrypted secure channels that will protect this operation."
"Well, thank you, sir!"
"Goodbye, Sam, and good luck."
(Action 1)
In the heart of a NATO Installation in the former Soviet Republic of Estonia, a quantum-encrypted channel connects to the Internet. It accesses the Tor network, creating a chain of darkweb nodes that will make any attempt at tracing it rather difficult. Then, it finally penetrates the obscure forum known as Eagle Time.
(Action 2)
A scout team of IT experts emerges on the Battlefield, led by a dark-haired man wearing a pair of virtual sunglasses and looks to be in his early thirties.
"Incredible... the Virus has somehow created an entire virtual world out of a mere forum!"
"Alright, now that we're here, we need to get to work. I'll try to counteract the Virus while you begin examining it and the forum."
The Scout Team begins to analyze the nature of the Battlefield, searching through the logs of the Eagle Time forum to track down the Virus's origin server. The first two actions were spent on summoning the Scout Team as an entity. Sam is my PC, and they are both Anti-Viral. As the Scout Team is composed of human operators, they are resistant to corruption.
(Action 3)
Sam turns to the glitchy, sinister mess that comprises the Virus's representation on the Battlefield. He points to the ground around him. Suddenly, a number of virtual nodes materialize in the direction of his pointing. The nodes link to a mainframe computer back at the base. The mainframe then begins monitoring the situation. If the Virus moves against the Scout Team, the mainframe will use the nodes to launch a DDOS attack against the Virus, blocking its attack. This functions as a one-shot shield that will protect the Scout Team from attack, not as a summon.
Meanwhile...
A general stands in a conference room. On the screen ahead of him lies several people, all of whom appear to be in important positions.
"How quickly can we activate Project FAITH?"
"The program is still quite deficient in adaptability and is therefore not currently suited for deployment against the Virus. However, studying the Virus's sapience may allow us to bestow a similar intelligence upon our program. This makes your scouting efforts even more critical to our efforts. We will be focusing on laying the groundwork for the activation of FAITH."
"Now, while some of you may have some reservations about Project FAITH, I currently see it as the only practical way to counter the Virus. With this technology, we will defeat this enemy and save the Internet from destruction. I will present a status update later. For now, goodbye."
"Any updates on the situation?"
"So far, the Virus has only penetrated low-hanging fruit, so to speak. Websites that have little-to-no protection against cyberattacks. It's made its current base of operations in some kind of... roleplaying forum hosted in America that is one such low-hanging fruit. However, we suspect that it will use its position to launch cyberattacks on more secure websites."
"How are the counterattack efforts going?"
"Sir, this Virus is unprecedented in the history of cyberspace. It's almost like a distributed artificial intelligence, able to adapt and alter its code with human-like sophistication. We've tried the usual countermeasures: quarantines, DDOS attacks, dark web nests, but the Virus always finds a way around them. Before we can launch an effective counterattack, we need to study the nature of the Virus more closely."
"Very well. Sam, lead a team of IT experts into Cyberspace where the Virus is operating. We need you to scout the nature of the Virus and its corruption of the Internet. To carry out this mission, we are giving you access to our state-of-the-art quantum encrypted secure channels that will protect this operation."
"Well, thank you, sir!"
"Goodbye, Sam, and good luck."
(Action 1)
In the heart of a NATO Installation in the former Soviet Republic of Estonia, a quantum-encrypted channel connects to the Internet. It accesses the Tor network, creating a chain of darkweb nodes that will make any attempt at tracing it rather difficult. Then, it finally penetrates the obscure forum known as Eagle Time.
(Action 2)
A scout team of IT experts emerges on the Battlefield, led by a dark-haired man wearing a pair of virtual sunglasses and looks to be in his early thirties.
"Incredible... the Virus has somehow created an entire virtual world out of a mere forum!"
"Alright, now that we're here, we need to get to work. I'll try to counteract the Virus while you begin examining it and the forum."
The Scout Team begins to analyze the nature of the Battlefield, searching through the logs of the Eagle Time forum to track down the Virus's origin server. The first two actions were spent on summoning the Scout Team as an entity. Sam is my PC, and they are both Anti-Viral. As the Scout Team is composed of human operators, they are resistant to corruption.
(Action 3)
Sam turns to the glitchy, sinister mess that comprises the Virus's representation on the Battlefield. He points to the ground around him. Suddenly, a number of virtual nodes materialize in the direction of his pointing. The nodes link to a mainframe computer back at the base. The mainframe then begins monitoring the situation. If the Virus moves against the Scout Team, the mainframe will use the nodes to launch a DDOS attack against the Virus, blocking its attack. This functions as a one-shot shield that will protect the Scout Team from attack, not as a summon.
Meanwhile...
A general stands in a conference room. On the screen ahead of him lies several people, all of whom appear to be in important positions.
"How quickly can we activate Project FAITH?"
"The program is still quite deficient in adaptability and is therefore not currently suited for deployment against the Virus. However, studying the Virus's sapience may allow us to bestow a similar intelligence upon our program. This makes your scouting efforts even more critical to our efforts. We will be focusing on laying the groundwork for the activation of FAITH."
"Now, while some of you may have some reservations about Project FAITH, I currently see it as the only practical way to counter the Virus. With this technology, we will defeat this enemy and save the Internet from destruction. I will present a status update later. For now, goodbye."