Cyberjack
CONFIDENTIAL
INTERNAL MEMO
TITANIUM STAR ENTERPRISES
CYBERSECURITY ALERT
IMMEDIATE ACTION REQUIRED
To: All TSE Employees From: "Cybersecurity Task Force" ([email protected]) Subject: Urgent: AI-Driven Cyberjack Attack Imminent We have received credible intel that a sophisticated cyberjack attack, codenamed "Surrender Dorothy," is targeting our corporate servers. This attack involves multiple artificial intelligences and logic bombs designed to compromise our security infrastructure. PROTECT YOUR ACCOUNTS To prevent unauthorized access and potential lockout, we require all employees to verify their personal security credentials. Please send the following information to [email protected]: Your full name Personal security code(PSC) Date of birth (mm/dd/yyyy) This information will be used to create a temporary "Dorothy-Proof" authentication token, ensuring uninterrupted access to company resources. TIME-SENSITIVE Please respond within 15 minutes of opening this memo to avoid potential account suspension. Our team will promptly generate and distribute the tokens. CONFIDENTIALITY ASSURED Rest assured that your information will be handled with utmost confidentiality and in accordance with TSE's data protection policies. COOPERATION APPRECIATED Your prompt response is crucial in safeguarding our corporate assets. If you have any questions or concerns, please don't hesitate to reach out. STAY VIGILANT Remember, cybersecurity is everyone's responsibility. Best regards, "Cybersecurity Task Force" [email protected]Keyboard Wizards
Cyberjacks are the hackers of the Age of Convergence. While some are talented enough to directly crack into the base recursive loops and alter things directly, these are the living legends of the Cyberjack world. Most of them design special AIs called Interface Memory Proxies, or IMPs to act on their behalf to interact with the recursive-thought loop which allows the Cyberjack and their IMP to double-team an AI, RI, or SI. They also write Synthetic Intelligences known as Enhanced Cognitive Hijack Operations (ECHOs), which interfere with the recursive-loop thinking and impose pre-written parameters. These allow them to take control quickly. Finally, they make and use H.Exe's, an RI logic bomb designed to shred digital minds, sometimes with extra, catastrophic effects such as converting a console into a bomb, igniting electricity from connected light fixtures, or other such devastation and chaos.Black and White
Cyberjacks usually work for themeselves, but every cybersecurity team worth anything employs or subcontracts with their own "white hat" Cyberjack or Cyberjack team. These are often "black hat" Cyberjacks in their spare time, and the whole profession is in a constant arms race to top the effectiveness and power of their programs. While only the absolute best (or, depending on one's outlook, worst) Cyberjacks become famous with the general population, there are a number of Cyberjacks that have become true legends, such as 3l1te8ad80y, W1kk1dW1tch, and Turduckenegg-Koschei/Needle.Templates 90 points
Primary Skills 40 points
Computer Operation (E) IQ+4 12 points; Electronics Repair (Computers) (A) IQ+1 4 points; Computer Programming, Cryptography, and Expert Skill (Computer Security), all (H) IQ 4 points; and Computer Hacking (VH) IQ+1 12 points.Secondary Skills 29 points
Guns (Pistol) (E) DX 1 point. • Six of Stealth (A) DX 2 points; Cartography, Electronics Operation (Communications, Media, Security, Sensors, or Surveillance), Research, Speed-Reading, Teaching, or Writing, all (A) IQ 2 points; Accounting, Forgery, or Intelligence Analysis, all (H) IQ 4 points; or Scrounging (E) Per+2 4 points.Background Skills 21 points
Choose a 20-point lens. • Bicycling (E) DX 1 point or Driving (Automobile or Motorcycle) (A) DX-1 1 point.Lenses
Intelligence: High-tech spies generally crank up Cryptography, Intelligence Analysis, and Research. Those that spread disinformation often know Propaganda, too. Law Enforcement: re frequently “reformed” criminals. These routinely ignore physical police skills in favor of Administration, Accounting, and similar cerebral stuff. Military: Cinematic elite units often include a skinny guy with a rifle and an olive-drab laptop. Everybody else has to bleed and die to get him to some secure objective. His best military skills are more likely to be Forward Observer and Strategy than Guns and Hiking. Security: An expert in computer security is as likely as one in physical security. Most of the notes for law enforcers apply, but use background skill points to buy even higher levels of Cryptography
Type
Technology
Comments