► From: Copper Dust
► To: Lane Hackers
► Encryption: Arrasta Civilian
► Encryption: High
► Topic:Counterfeit and hacking software
To whom it may concern.
I spent a lot of time looking for those people who can help me and, it seems, I finally found those who can do it.
But, first of all, let me introduce myself. You can call me "Copper Dust" and I'm the person, who is working on herself. I don't have a lot of big plans, but I have one little project now.
I'm interested in counterfeit and hacking software. I know, that you are the best in this kind of things. I would like to discuss opportunity of developing of unique and special hacking software.
I'm willing to pay good credits for your job, however, I need to know, do you agree to work together with me? Are you interested in? Do you agree to keep this work under the terms of secrecy?
Looking forward to hearing from you soon,
Copper Dust.
|
...hack.initiated...connecting.to.Spyglass.Network...decryption.in.progress...
...Interruptor.Jaws.recognized...encoding.transmission...
...uploading.data...
Copper Dust. Interesting alias
I am Mr Jaws, you may call me Jaws.
I see you're looking into the possibility of delving into the cloak and dagger world of Counterfeit software. for the purposes of hacking i gather? Excellent.
Software development and the counterfeiting of such is where my skills are best placed, what exactly is it that you require?
please, tell me more. If nothing else i can assure you discretion.
...encryption.in.progress...disconnecting.from.network...hack.terminated...
► From: Copper Dust
► To: Mr Jaws
► Encryption: Arrasta Civilian
► Encryption: High
► Topic:RE:Counterfeit and hacking software
Good day to you, mister Jaws
An interesting alias too. However, it's nice to see, that Lane Hackers are interested in my proposal and have a good enough intuition and, it seems, experience. It is a great honor for me to work with such professionals.
More exactly... I'm looking forward for hacking software, able to hack the remote droid. A.I. I understand that without knowing the basic syntax of the language on which this robot's program is written, you can not re-configure it, but I think that you are able to write a program that can turn it off or reorganize the "Master - Enemy" algorithm to give us a way to get access to basic commands.
I hope, that you can do it. Name your price.
Copper Dust.
|
...hack.initiated...connecting.to.Spyglass.Network...decryption.in.progress...
...Interruptor.Jaws.recognized...encoding.transmission...
...uploading.data...
Copper Dust.
I see. well, you certainly have my interest ma'am..
...There's just one thing, before we proceed further, i have to ask.. I haven't been able to find any information on yourself in our database. a noteworthy achievement of course.. but nonetheless.. I am sure you can understand my need to satisfy a curiosity. Maybe you could enlighten me further regarding your background
...encryption.in.progress...disconnecting.from.network...hack.terminated...
...hack.initiated...connecting.to.Spyglass.Network...decryption.in.progress...
...Professor.Provocateur.Nicole.Hunter.recognized...encoding.transmission...
...uploading.data...
Jaws,
Your customer has clearly an action-video level of understanding of what hacking actually is. An operation as complex as overriding an AI-controlled droid cannot be conducted ad hoc via random and chaotic gesticulation over a terminal. Hacking a hostile droid is usually achieved by planting a virus inside a "consumable" data packet - like an update package or through tapping into an existing data stream like a communication transmission. Hacking a captured and immobilized droid is about unlocking its service mode and modifying its software. There is also a crucial difference between working with a human built AI and the self-rewriting and self-redesigning AI often found in the deep Omicrons. Finally, there is a tremendous difference between hacking an isolated unit and a hive-conscious artificial being.
Your customer has to provide us with a detailed explanation of the use case scenario and desired effects. We need to know whether the software is intended as a mean of repeated electronic warfare or just a way of performing a one-time infiltration. We need to know as much as possible about the target and whether it is possible to capture and disable one unit for the reverse engineering process. Finally, your client should be made aware that repeated use of the same algorithm will soon become ineffective as the AI will develop its own safeguards.
P.S. I hope your client understands that a dedicated software will cost him a fortune.
Best,
Nicole Hunter
...encryption.in.progress...disconnecting.from.network...hack.terminated...
::]Incoming Transmission[::
To: Mactan Base, Das Lane Hacker HC
From: Gefreiter Alphonse Fischer
Subject: Equivalent Exchange.
Guten Tag, estimated members of the Lane Hacker union.
Ve have personally witnessed the power and grace of ze Spyglass Scanner, far more superior than any scanner available here in Sirius. I would be pleased to let you know zat, if We could use your technical knowledge, combined to our finest ship craftsmanship, ve could take care of ze Rheinland Vermin and ze
Capitalist Beast once and for all. You see, have been craving for quite a while for your technical expertise and equipment. Don't fret. You will course, receive a relatively large payment in exchange. All we require is a couple of physical copies of ze Spyglass Scanners. If you do agree to our deal, we vill decide for a possible extraction point out of Liberty, in utmost secrecy, in order to avoid any kind of navy-related nuisance. Ze enemies of Liberty are our friends, after all.
Für die Union. Für unser Rheinland.
Gefreiter Alphonse Fischer
Transmission Ended
...hack.initiated...connecting.to.Spyglass.Network...decryption.in.progress...
...Professor.Provocateur.Nicole.Hunter.recognized...encoding.transmission...
...uploading.data...
Dear Mr Fisher,
I am glad that after two months Alster Union has finally broken the silence. What I am not happy about is that this silence occurred in the first place. After months of negotiations, a successful joint smuggling operation and moderately successful joint combat operation in Texas we have came to a conclusion that the next step will be pretty much only a formality. Your silence combined with your noticeable efforts on other fronts have sent us a very clear message. At this point I am not really certain of Alster Union intentions anymore.
Your request is something that could be easily accommodated for a close ally. At this point, however, we have no idea what the relation between the Lane Hackers and Der Alster Union is anymore. We will gladly return to the negotiating table to clear out this uncertainty. Once it is done, if there are no further obstacles, we can discuss your request.
Kind regards,
Professor Provocateur
Nicole Hunter
...encryption.in.progress...disconnecting.from.network...hack.terminated...
::]Incoming Transmission[::
To: Mactan Base, Das Lane Hacker HC
From: Gefreiter Alphonse Fischer
Subject: Equivalent Exchange, II
Let's just say that ve vere having some... internal problems, due to the amount of anti-socialist vermin within Rheinland being toxic and unconstructive towards our movement. However, I am certain that might be able to establish relationships once more in the future ahead. Ve are vell known for our prestigious, successful smuggling routes. Ze Alster Union is overzealous to keep up relationships with other great organizations, such as yours. But for now, ve vill have to decide for an extraction point.
Für die Union. Für unser Rheinland.
Gefreiter Alphonse Fischer
Transmission Ended