Discovery Gaming Community

Full Version: To IMG|
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
...hack.initiated...decryption.in.progress...
...Infiltrator.Vladimir.Scorpius.recognized...transmission.encrypted...
...uploading.data...
[Image: VladimirScorpiusInformal.png][Image: Infiltrator.png]

To whom it may concern,

This is Vladimir Scorpius of The Lane Hackers. I was assigned by Professor to discuss possible business arrangement between our organisations in order to further the relationships as well as make an extra credit where it's due. Once I am contacted by a responsible person, I will be able to reveal more details about this endeavour.
...encryption.in.progress...hack.terminated...
[Image: jack.png]


**** SENDER: Jack Henderson, IMG Operations Coordination ****

**** TO: Vladimir Scorpius ****


Dear Vladimir Scorpius,

Let me quickly introduce myself: Jack Henderson IMG Operations, I make the things happen that others do not want to know about. So, let me know what you are thinking about because you obviously have a plan. I am curious.

Jack Henderson
IMG Operations


[Image: end.png]
...hack.initiated...decryption.in.progress...
...Infiltrator.Vladimir.Scorpius.recognized...transmission.encrypted...
...uploading.data...
[Image: VladimirScorpiusInformal.png][Image: Infiltrator.png]

Mr. Henderson,

It has came to my attention, that the the Guild and Lane Hackers are not as close business partners as they were in the past. Perhaps, doing business more often can restore trust and faith in each other over time in order to strenghten relationships.

As you may know, Lane Hackers specialises in shipment interception. And we often go after the really juicy stuff. Such as various ores and Helium variants. But in most cases we need a pilot, who would be able to redeliver that shipment.

I understand that the Guild must maintain its image or that you might not approve the way we obtain it. Nonetheless, an answer if such business can be conducted would be most appreciated.
...encryption.in.progress...hack.terminated...
[Image: jack.png]


**** SENDER: Jack Henderson, IMG Operations Coordination ****

**** TO: Vladimir Scorpius ****


Dear Vladimir Scorpius,

Things have changed, I agree. It has become much more difficult for the IMG to operate in Magellan and in the whole region. It has become a battlefield in which IMG transports can't operate well. We do not really belong there.

Anyway, yes. I see where this request is moving. It's rather unlikely that an IMG| pilot is around Magellan at the time you need it, but there might be a way to channel some transports with IMG transponders to you, so you can use those in the recycling process? Would IMG equipment with standard papers be a solution? They also have the advantage that they are less conspicuous than our IMG|-tagged transports.

Anyway, let me know how you would like to put that plan into reality and I will try to make it happen somehow. I hope you understand, though, that it is hard for us just to keep a transport somewhere on standby, where we hardly ever operate.

Jack Henderson
IMG Operations


[Image: end.png]
...hack.initiated...decryption.in.progress...
...Infiltrator.Vladimir.Scorpius.recognized...transmission.encrypted...
...uploading.data...
[Image: VladimirScorpiusInformal.png][Image: Infiltrator.png]

Mr. Henderson,

I understand your position and attitude towards this. While it is minor inconvenience to us, I can see how dedicating a transport can be taxing on the resource or simply rerouting a transport might be an obstacle to daily routine. However, Lane Hackers are not in a position to house an undercover transport. Our hangars and mooring points are already occupied for essential ships only.

While this business proposal was the first one, I do have a second one. Lane Hackers are capable software engineers, and we have manufactured some top of the line software for our trusted allies and partners. If the Guild is in need of cheaper and better software in comparison to the overpriced and feature-cut software from the usual distributors ( such as MacroHard ), Lane Hackers are more than ready and able transport few batches of those, individually and specifically tailored to suit Guild's needs.
...encryption.in.progress...hack.terminated...
[Image: jack.png]


**** SENDER: Jack Henderson, IMG Operations Coordination ****

**** TO: Vladimir Scorpius ****


Dear Vladimir Scorpius,

Alright. I see that the suggestion of giving you an IMG transport with clean papers does not work for you for the reasons you stated. It would have been the most flexible, but I undestand why you rule it out.

I have an alternative solution: Freeport 4 has an IMG transport stationed. The transport can be flown by experienced members only, as there is a certain delicacy involved in the operations you mention. So, the transport is there. The problem is, that no pilot may be available when you call. However, there is a chance. Improving the communication infrastructure could be helpful. I suggest the integration of the Sky-P3-Pro protocols for this.

That's also where your software comes into play. Yes, the Guild is interested in using the know-how of the Hackers, especially to secure our own systems against espionage and hacking. After the Freeport 4 annexation and a hasty data purge operations, data security has become big topic. So, yes. The Guild is interested in systems that allow securing data safely and also in a system that can erase data fast, without a possibility of restoring any of it. For a start, this is interesting for two bases and the Guild is ready to pay well for such an upgrade.

Jack Henderson
IMG Operations


[Image: end.png]
...hack.initiated...decryption.in.progress...
...Infiltrator.Vladimir.Scorpius.recognized...transmission.encrypted...
...uploading.data...
[Image: VladimirScorpiusInformal.png][Image: Infiltrator.png]

Mr. Henderson,

Such type of software can be tailored to your needs.

Firstly, you must decide on how data wipe should be perfomed:
1) Data wipe; leave hardware intact
2) Data wipe; malfunction of hardware
3) Data wipe; targeting only sensitive data
4) Data wipe; compute false data
( These are the most common types that we develop for our clients, but we can develop for custom order )

Secondly, to optimise it properly and make it reliable, we will need information on your hardware infrastructure:

Is the whole network connected to one mainframe or are all terminals independent of each other;
Whether your NeuralNet access points are secured for personnel only or whether they are accessable to visitors;
Whether you have supercomputer and if it is network or cluster based;
The number of terminals and NeuralNet access points; the composition of mainframe; the count of processors of supercomputer.

Finally, we must know if all the programs are meeting developers standard and guidelines or was there any custom changes made. In cases changes were made, we will need a secure upload of those, to compare to originals.

Regarding the safe storage of data, we would recommend using legally available products so that there is no conflict with authorities. After all, if they won't be able to trace back the hardware's origin, you might get in trouble and be dragged into legal matters depending on the law. Data wipe will not be traced back to you so easily and thus will allow to avoid any hassle they will try to stick to the Guild.
...encryption.in.progress...hack.terminated...
[Image: jack.png]


**** SENDER: Jack Henderson, IMG Operations Coordination ****

**** TO: Vladimir Scorpius ****


Dear Vladimir Scorpius,

I guess we managed some nice little operation there. Can be repeated. The asset has been placed in a spot that makes missions faster in the future.

About the information technology, or rather: the technology to wipe out the information:

An annexation of Java Station, Tau 23, cannot be ruled out at the moment. Therefore appropriate steps have to be taken to be prepared for such an extreme event. Data security is what I ask for.

We need to backup all the information and store the confidential parts on a secret system. In case the attack happens, it must be possible to make all the secret, dangerous, confidential files disappear before anybody can do anything. That data needs to be gone. The junk can stay, should stay intact and give a clean and nice picture. I guess you get the picture.

I am no expert on IT security, I know that we are using the 30 year old NTES-subsystem and that it has been upgraded, then adapted to Gallic standards and fixed, altered, updated many thousand times. My IT specialsts say, and I quote: "It's a jungle. A messy one.", so you tell me, or better them, how this can be done.

I know one thing: Time is of the essence. We are talking days, perhaps a few weeks, likely not months here. So, give me a solution, a price tag, and when and how to do it discreetly.

I am looking forward to our further cooperation.

Jack Henderson
IMG Operations


[Image: end.png]
...hack.initiated...decryption.in.progress...
...Infiltrator.Vladimir.Scorpius.recognized...transmission.encrypted...
...uploading.data...
[Image: VladimirScorpiusInformal.png][Image: Infiltrator.png]

Mr. Henderson,

I will inspect your station at earliest opportunity to relay it's configuration to our software engineers.
...encryption.in.progress...hack.terminated...
[Image: jack.png]


**** SENDER: Jack Henderson, IMG Operations Coordination ****

**** TO: Vladimir Scorpius ****


Dear Vladimir Scorpius,

This is good to hear. When on Java, please give the Station Administrator the code word "Echelon-4" and be ready to identify yourself by presenting a copy of our secret communication. With this done, access will be granted, so your specialists can inspect the systems and find a solution.

Thank you for your fast reply and swift action.
This time, I want to be prepared better, in case something bad happens.

Good luck and let me know when you know what needs to be done.

Jack Henderson
IMG Operations


[Image: end.png]
Pages: 1 2