Post by Deleted on Sept 17, 2014 8:31:27 GMT -8
There was something soothing about scrolling letters, numbers and symbols
that took your focus away from a room, so a nervous type technician would not have to think about who was in the area. Ensign Nivans took care of the Lieutenant Commander and she took care of the data. Asthe cascading information grew more intense, her focused also intensified, which caused outside distractions and disturbances to melt away from Caroline’s bubble.
//"Braddock to Lieutenant Bartlett. I suspect that the culprit uploaded some sort of phishing
virus. Most likely it was in some non-vital system, something that
wouldn't raise alarm. That means they bided their time, waited to
accumulate the access codes they would need and then acted. More than
likely, the first incident involving an Ensign Eli was a trial run.
Whoever did this knew what they were looking for, and they were very
patient in gathering everything they needed."//
As the message came in suddenly, those sudden bursts of sound busted the
developing bubble that provided her with the mindset to perform her
magic, which caused Caroline to jump slightly. It happened more
frequently than she cared to admit that sudden sounds and messages that
invaded before she got fully ensconced did occasionally startle her. It
took a breath or two to recover and focus on what the Lieutenant said.
Her brow furrowed as she listened to the Lieutenant as Caroline got
excited due to the fact that the SGE Operation’s chief was speaking her
language. For the first time in hours someone was making sense.
//"I would recommend that you look into detecting that phishing script I
described. By now, it's likely attached itself to some program that is
widely accessible to the public. And being that computers naturally log a
script of their use, the haystack we're looking in is getting larger
and larger by the second. Once you find it let me know, I'll start
programming the shell of an anti-phishing script to wipe it from our
systems and hopefully, help us trace it back to its initial upload."//
Caroline responded crisply and efficiently to the SGE’s Chief of
Operations,“LtJG Bartlett to LT Braddock: Acknowledged Lieutenant. I am
combining encryption parameters with phishing parameters to the trace
program. There are a couple of small pings on the encryption
parameters. Standby please. “The cyber world of digital information
that often got ignored or it confused most people were something that
Caroline lived in. That very haystack of conglomerated abstracts that
eventually became readable data would crawl through the redhead’s mind
like it was second nature. With this mindset, the young woman altered
the trace script and packet sniffers to also include the phishing method
along with the encryption method, as Caroline still wanted the hits on
the encryption key. Light blue eyes would melt over the surface picking
up pieces of what appeared to be nothing, to form into ones and zeros as
she initiated the new altered sequence. While EMILIE provided feedback,
the uncanny mind of Caroline’s stopped a moment and took out a case of
iso-chips. She selected a green one and slid it into EMILIE. As the
chip started to glow lightly, she configured the new parameters into the
programs that came up on EMILIE. She looked at the Federation PADD to
adjust the proxy settings. Those eyes started to gleam more as she
watched the streams of data that came through the new filters into the
Federation PADD and into EMILIE. As hits came in, a few interesting
tidbits would get her attention as a picture was being drawn of the
cleverness of this phishing method the perpetrator was using. Her eyes
widened as her entire world focused on the computers. She didn’t hear
the conversations or even noticed anyone watching or looking at her. The
groove of requiem within her work and her zone was clear in the rapt
expression in those sharp intelligent eyes.
She mumbled broken pieces of words as all the pieces that did not have a partner started
to fit in a pattern. Her lips would move a little bit “..bottom feeder.. I bet… “ as she watched the those pieces plucked from the stream. Those small delicate long fingers again got really busy as
Caroline segmented data from sources that appeared to be random. Her eyes poured over what seemed like an insurmountable amount of data to analyze. Certain parts of the data were bolded and highlighted, which she separated these highlighted pieces of data off to a growing
database. The Industrial machinery on the star base worked off of a channel that was just a hair below the subspace channels. On these roads the Specialist rode as she zeroed in on the exact channel stream she was looking for. If anyone on the other end extra was watching the
stream she would appear as another piece of data.
With rapt attention she watched the program pick out these pieces of information
or that piece of information from that channel from the subspace
frequencies. Caroline carefully tagged a piece of data as she followed
the flow of where it went. The tag would consist of normal data
garbage that sometimes sticks to headers or files. As the examination
continued of the process the program was picking out key words she
nodded, ‘It is phishing alright. It is really clever phishing.’
The phishing program was separated into three parts. One part took the
data from the stream with precise parameters. The data then was routed
to the water filtration systems which rarely were used for anything.
The data lines followed along the entire star base that called for
water. These bits of data could ride the data stream all year long
till something called it to collect it. She located a packet of data in a
seldom used replicator that didn’t belong there. She wondered how many
caches of data were out there as the girl looked at the wrapper and
recognized it instantly.
The following communication after carefully confirming her findings: “Lieutenant, we have a bottom feeder. I am in the stream but I do not want to alarm the owner. The program is in three parts in separate areas. I found one holding cache. The program is live, ma’am. Preparing to cast the net“ she would have to pull out very carefully and prepare the said net. What data she
gathered she sent to the Lieutenant so she can view the findings. “The encryption method in the holding cache is the same as the encryption method used in both viral video feeds,” she supplied.
To an observer, Caroline was socially passive. The way she strategically and
systematically attacked the problem might say something else about her.
It did not matter in the long run how people viewed the red head or
think they know what she was like as all of that anxiety and nervousness
narrowed into the task. Caroline's eyes gleamed with the adrenaline
rush of climbing into such a huge database and system as her mind poured
over the streams of data that continued to flow. “Come on. Poke your head up” she
thought she said quietly. She looked like a cat ready to pounce.
Tag: Lieutenant Eden Nivans, @jorge052, @henri, @boribeth, @desan Any
that took your focus away from a room, so a nervous type technician would not have to think about who was in the area. Ensign Nivans took care of the Lieutenant Commander and she took care of the data. Asthe cascading information grew more intense, her focused also intensified, which caused outside distractions and disturbances to melt away from Caroline’s bubble.
//"Braddock to Lieutenant Bartlett. I suspect that the culprit uploaded some sort of phishing
virus. Most likely it was in some non-vital system, something that
wouldn't raise alarm. That means they bided their time, waited to
accumulate the access codes they would need and then acted. More than
likely, the first incident involving an Ensign Eli was a trial run.
Whoever did this knew what they were looking for, and they were very
patient in gathering everything they needed."//
As the message came in suddenly, those sudden bursts of sound busted the
developing bubble that provided her with the mindset to perform her
magic, which caused Caroline to jump slightly. It happened more
frequently than she cared to admit that sudden sounds and messages that
invaded before she got fully ensconced did occasionally startle her. It
took a breath or two to recover and focus on what the Lieutenant said.
Her brow furrowed as she listened to the Lieutenant as Caroline got
excited due to the fact that the SGE Operation’s chief was speaking her
language. For the first time in hours someone was making sense.
//"I would recommend that you look into detecting that phishing script I
described. By now, it's likely attached itself to some program that is
widely accessible to the public. And being that computers naturally log a
script of their use, the haystack we're looking in is getting larger
and larger by the second. Once you find it let me know, I'll start
programming the shell of an anti-phishing script to wipe it from our
systems and hopefully, help us trace it back to its initial upload."//
Caroline responded crisply and efficiently to the SGE’s Chief of
Operations,“LtJG Bartlett to LT Braddock: Acknowledged Lieutenant. I am
combining encryption parameters with phishing parameters to the trace
program. There are a couple of small pings on the encryption
parameters. Standby please. “The cyber world of digital information
that often got ignored or it confused most people were something that
Caroline lived in. That very haystack of conglomerated abstracts that
eventually became readable data would crawl through the redhead’s mind
like it was second nature. With this mindset, the young woman altered
the trace script and packet sniffers to also include the phishing method
along with the encryption method, as Caroline still wanted the hits on
the encryption key. Light blue eyes would melt over the surface picking
up pieces of what appeared to be nothing, to form into ones and zeros as
she initiated the new altered sequence. While EMILIE provided feedback,
the uncanny mind of Caroline’s stopped a moment and took out a case of
iso-chips. She selected a green one and slid it into EMILIE. As the
chip started to glow lightly, she configured the new parameters into the
programs that came up on EMILIE. She looked at the Federation PADD to
adjust the proxy settings. Those eyes started to gleam more as she
watched the streams of data that came through the new filters into the
Federation PADD and into EMILIE. As hits came in, a few interesting
tidbits would get her attention as a picture was being drawn of the
cleverness of this phishing method the perpetrator was using. Her eyes
widened as her entire world focused on the computers. She didn’t hear
the conversations or even noticed anyone watching or looking at her. The
groove of requiem within her work and her zone was clear in the rapt
expression in those sharp intelligent eyes.
She mumbled broken pieces of words as all the pieces that did not have a partner started
to fit in a pattern. Her lips would move a little bit “..bottom feeder.. I bet… “ as she watched the those pieces plucked from the stream. Those small delicate long fingers again got really busy as
Caroline segmented data from sources that appeared to be random. Her eyes poured over what seemed like an insurmountable amount of data to analyze. Certain parts of the data were bolded and highlighted, which she separated these highlighted pieces of data off to a growing
database. The Industrial machinery on the star base worked off of a channel that was just a hair below the subspace channels. On these roads the Specialist rode as she zeroed in on the exact channel stream she was looking for. If anyone on the other end extra was watching the
stream she would appear as another piece of data.
With rapt attention she watched the program pick out these pieces of information
or that piece of information from that channel from the subspace
frequencies. Caroline carefully tagged a piece of data as she followed
the flow of where it went. The tag would consist of normal data
garbage that sometimes sticks to headers or files. As the examination
continued of the process the program was picking out key words she
nodded, ‘It is phishing alright. It is really clever phishing.’
The phishing program was separated into three parts. One part took the
data from the stream with precise parameters. The data then was routed
to the water filtration systems which rarely were used for anything.
The data lines followed along the entire star base that called for
water. These bits of data could ride the data stream all year long
till something called it to collect it. She located a packet of data in a
seldom used replicator that didn’t belong there. She wondered how many
caches of data were out there as the girl looked at the wrapper and
recognized it instantly.
The following communication after carefully confirming her findings: “Lieutenant, we have a bottom feeder. I am in the stream but I do not want to alarm the owner. The program is in three parts in separate areas. I found one holding cache. The program is live, ma’am. Preparing to cast the net“ she would have to pull out very carefully and prepare the said net. What data she
gathered she sent to the Lieutenant so she can view the findings. “The encryption method in the holding cache is the same as the encryption method used in both viral video feeds,” she supplied.
To an observer, Caroline was socially passive. The way she strategically and
systematically attacked the problem might say something else about her.
It did not matter in the long run how people viewed the red head or
think they know what she was like as all of that anxiety and nervousness
narrowed into the task. Caroline's eyes gleamed with the adrenaline
rush of climbing into such a huge database and system as her mind poured
over the streams of data that continued to flow. “Come on. Poke your head up” she
thought she said quietly. She looked like a cat ready to pounce.
Tag: Lieutenant Eden Nivans, @jorge052, @henri, @boribeth, @desan Any