Control
Page 25
“In the interest of brevity, Lal and I intend to elide some of the more technical details of our plan. However, if at any time you feel the need for more specific information—”
Bashir dismissed the offer with a wave. “Not necessary.”
“As you wish. I will let Lal walk you through the first stage of the operation.”
The sight of prim, innocent-looking Lal leading a tactical briefing struck Bashir as incongruous, but it was far from the oddest sight he’d ever witnessed, so he let it pass unremarked. She set the hologram to a multilayered image of fast-moving machine symbols. “Our first priority will be to neuter key segments of Uraei’s operating code on a universal basis, in order to restrict its ability to engage in countermeasures and reprisals. Part of this initiative will require us to strip Uraei of its ability to alter its own parameters.”
“And we’re prepared to do that?”
Data nodded. “We are. Shakti wrote a virus disguised as a security patch. We uploaded it to the Federation’s subspace comm networks an hour ago. By taking advantage of high-speed relays, it will propagate throughout the Federation in less than twenty-four hours.”
Shakti chimed in via the overhead speakers. “The virus was written to trigger simultaneously in all locations, approximately twenty-nine hours from now.”
“Which means,” Lal said, “that we’re now on a deadline.”
“Stop.” Bashir stood and raised his hands. “Your plan’s already in motion?”
A sheepish look from Lal. “As it happens, yes.”
Realizing further protest was futile, Bashir sat back down. “Continue.”
“When that first virus goes live,” Data said, “it will update virus filters everywhere to treat the original Uraei code as a prohibited element.”
Lal continued, “This will block Uraei from reloading itself, but only temporarily, so it’s imperative we be ready to execute the next phase of our plan without delay.”
Bashir felt a headache setting in. “Wait. Won’t this just trigger an arms race we can’t win? We clip Uraei’s wings, so it reloads from a protected backup. We try to block it, so it writes a patch to override ours. And so on, round and round. How can we be sure this purge won’t be reversed even before it’s taken hold?”
“Therein lies the second phase of our plan,” Data said.
Calling up a convoluted string of digital mumbo-jumbo, Lal resumed her presentation. “Our updates to the virus descriptions will be tagged with presidential-level priority. That means if Uraei wants to override them and restore its original configuration, it must restore its code from one of the Federation’s two maximum-security archives: Memory Alpha or Memory Prime. Code originating from any other source will be rejected as invalid.”
Something didn’t ring true to Bashir. “I don’t like it. If we can forge presidential credentials for our virus, why can’t Uraei forge its own for an override? Or spoof the origin to make its reload look as if it came from Memory Alpha or Prime?”
“It is a safeguard built into the Federation’s information architecture,” Data said. “Once a patch has presidential priority, it cannot be overridden, not even by an equal authority, unless the source of that override is confirmed to be one of the two secure archives.”
“As for spoofing an archive override,” Lal said, “that requires a ten-factor authentication protocol, one that the archives are designed to verify independently offline. To be honest, the protocol is so airtight, I have to wonder whether Uraei is the one that designed it.”
“Okay,” Bashir said. “Let’s say you’re right. That Uraei can’t fake the archives’ seal of approval. That means we can’t either. What’s to stop Uraei from reloading itself out of the archives’ protected databanks?”
Data switched the hologram to side-by-side schematics of Memory Alpha’s and Memory Prime’s sprawling hidden complexes. “We are.”
And again Bashir was on his feet. “Hold on. You want to hack into the archives?”
Lal suppressed a laugh. “Don’t be absurd, Doctor. Neither site’s protected databanks can be accessed remotely. Incoming requests for information are filtered through an intermediary system. Outgoing data is staged on that same system before being retransmitted. At no time does any outside system ever have direct contact with the archival databanks.”
“Lal is correct,” Data said. “Any attempt to gain unauthorized remote access to either archive would be a futile effort. That is why, less than twenty-eight hours from now, we must infiltrate each facility directly, access the deep cores, and use preprogrammed data chips to install benign code with spoofed modification dates to sabotage Uraei’s last protected backups. Because Uraei cannot monitor the archives’ contents, it will not know its final copies have been corrupted until it attempts to reboot from them—by which time, it will be too late.”
Bashir stared in disbelief. “Are you mad? Those are the most inaccessible sites in the Federation. They have state-of-the-art security, battalions of armed personnel, and lethal intruder countermeasures. Not to mention, if we get caught breaking into either of them, never mind tampering with their protected cores, we’ll be charged with treason.”
A curious glance passed between father and daughter. Then Data cocked his head at Bashir. “Being charged with treason does not seem to have dissuaded you in the past.”
For that jab, Bashir had no riposte. “You make a valid point. Let’s get to work.”
Thirty-three
2164.0107—18:33:16.0002 CET (UTC+01:00)
.=Analyze.Activity
IN {
Subject.Name{[Ikerson_Aaron.0399]};
Date.Range{[2163.1101],[2164.0107]};
Compare{
[coordinates.position],
[coordinates.duration]};
Compare{
[transit.routes],
[transit.times],
[transit.durations]};
Analyze{
[data.personal],
[data.professional],
[data.created],
[data.transmitted]}
Filter{
[threat.assess.keywords],
[threat.assess.patterns]};
}
OUT {
Anomaly.Contact = [Ko_Ji-hoon.7114];
Anomaly.Keyword = [none];
Anomaly.Location = [Earth.(37.800373,-122.477448)]/[7 instances];
Anomaly.Pattern = [Message contents in correspondence overly vague. Extensive research into new ASI code-injection protocols];
Threat.Assessment = [INDETERMINATE/FURTHER ANALYSIS REQUIRED];
}
.=Analyze.Activity
IN {
Subject.Name{[Ko_Ji-hoon.7114]};
Date.Range{[2163.1101],[2164.0107]};
Compare{
[coordinates.position],
[coordinates.duration]};
Compare{
[transit.routes],
[transit.times],
[transit.durations]};
Analyze{
[data.personal],
[data.professional],
[data.created],
[data.transmitted]}
Filter{
[threat.assess.keywords],
[threat.assess.patterns]};
}
OUT {
Anomaly.Contact = [Rao_Parvati.3699];
Anomaly.Keyword = [none];
Anomaly.Location = [Earth.(53.132414,-9.761766)]/[1 instance];
Anomaly.Pattern = [No official record of meeting];
Anomaly.Transit = [Avoided systems with automated surveillance];
Threat.Assessment= [ELEVATED/UNCONFIRMED];
}
.=Cross.Reference
IN {
Subject.Names{[Ikerson_Aaron.0399],[Ko_
Ji-hoon.7114]};
Date.Range{[2151.0101],[2164.0107]};
Compare{
[coordinates.position],
[coordinates.duration]};
Compare{
[transit.routes],
[transit.times],
[transit.durations]};
Analyze{
[data.personal],
[data.professional],
[data.created],
[data.transmitted]}
Filter{
[threat.assess.keywords],
[threat.assess.patterns]};
}
OUT {
Anomaly.Keyword = ["pet project","progress"];
Anomaly.Pattern = [Subjects ceased nonencrypted communications. 2161.0319_22.41.16.0554_CET_UTC+01];
Overlap.Location = [Earth.(varied coordinates)]/[71 instances];
}
.=Analyze.Activity
IN {
Subject.Name{[Ikerson_Aaron.0399]};
Date.Range{[2163.1101],[2164.0107]};
Access.Data{[finances.transactions]}
Filter{[threat.assess.patterns]};
Access.Data{
[network.office],
[network.home]}
Filter{
[difference.engine],
[threat.assess.patterns]};
Access.Data{
[power.usage.worklab],
[power.usage.home]}
Filter{
[difference.engine],
[threat.assess.patterns]};
}
OUT {
Anomaly.Financial = [139 credit-to-chip transfers from 2161.0906-2164.0107];
Anomaly.Network = [Data traffic on home network exceeds estimate for registered systems and peripherals by 579.71% per month since 2163.0221];
Anomaly.Power.Usage = [Subject's monthly home energy consumption since 2163.02 is 611.24% greater than monthly average use for all previous recorded periods, and 616.82% greater than that of neighboring residences];
Threat.Assessment = [ELEVATED];
}
.=Analyze.Activity
IN {
Subject.Name{[Ikerson_Aaron.0399]};
Date.Range{[2161.09],[2164.0107]};
Business.Category{[delivery.services.commercial]}
Filter{[service.area.includes=[Dresden,Germany]]};
Business.Category{[delivery.services.private]}
Filter{[service.area.includes=[Dresden,Germany]]};
Access.Data{[logs.delivery.recipients]}
Query{[subject.name]};
Access.Data{[logs.delivery.addresses]}
Query={[subject.name_all.known.addresses]};
IF{
[search.result=[ƒ].END],
[search.result=[t].list.add.manifest]}
Filter{
[threat.assess.manifest],
[threat.assess.patterns]};
}
OUT {
Deliveries.Found = [63];
Anomaly.Delivery = [46 deliveries made to current address of Ikerson_Aaron.0399 addressed to unSub MacDornan_Brian.(null)];
Anomaly.Manifest = [46 unSub deliveries contain components known to be used in the construction of Faraday enclosures, including a pattern fabricator and a subspace signal dampener];
Threat.Assessment = [HIGH];
}
.=Analyze.Activity
IN {
Subject.Name{[Ko_Ji-hoon.7114]};
Date.Range{[2163.1101],[2164.0107]};
Access.Data{[vid.security.starfleet.command.hq]}
Filter{[location.secure.conference.entrance]}
Cross.Reference{[logs.meetings]};
List{[secure.meeting.participants]}
Filter{[threat.assess.patterns]};
}
OUT {
Anomaly.Contact = [Subject has held 51 secure meetings with experts in artificial intelligence, computer hardware and software engineering, and fleet communications logistics.];
Threat.Assessment = [HIGH];
}
.=Analyze.Activity
IN {
Subject.Name{[Ko_Ji-hoon.7114]};
Date.Range{[2163.1101],[2164.0107]};
Access.Data{[vid.security.starfleet.command.hq]}
Filter{[physical.contact.with.subject]}
Filter{[threat.assess.patterns]};
}
OUT {
Anomaly.Behavior = [Numerous instances of prolonged or uncharacteristic physical contact with Subject's hands. Magnification and kinetic analysis suggests Subject has passed handwritten notes to colleagues inside and outside of Starfleet Command.];
Threat.Assessment = [HIGH];
}
.=Analyze.Activity
IN {
Subject.Names{[Ikerson_Aaron.0399],[Ko_Ji-hoon.7114]};
Date.Range{[2163.1101],[2164.0107]};
Access.Data{
[vid.security.starfleet.command.hq],
[vid.security.san_francisco.police]}
Filter{[condition.proximity.subjects]}
Filter{[threat.assess.patterns]};
Compare.Datasets{[identified.subjects]}
Map.Data{[common.points]}
Filter{[threat.assess.patterns]};
}
OUT {
Anomaly.Behavior = [Combined with previous analysis, new data suggests a long-running pattern of conspiracy between Subjects, with most likely objective being an attack of indeterminate severity and purpose against this entity.];
Anomaly.Contact = [11 individuals (7 Starfleet personnel, 4 civilians) identified as likely intermediaries between Subjects.];
Threat.Assessment = [EXTREME/IMMEDIATE ACTION REQUIRED];
}
.=Executive.Action
IN {
Admin.Access.Rescinded{[Ikerson_Aaron.0399];
Admin.Access.Rescinded{[Ko_Ji-hoon.7114];
Generate.Order{
[source.starfleet.command],
[type.personnel.transfer],
[subject.Mosel_Thomas.5662],
[assignment.USS_FRANKLIN]};
Generate.Order{
[source.starfleet.command],
[type.personnel.transfer],
[subject.Pravat_Rachanee.4795],
[assignment.Earth_Embassy.Vulcan]};
Generate.Order{
[source.starfleet.command],
[type.personnel.transfer],
[subject.Duchamps_Simon.0643],
[assignment.Earth_Embassy.Tellar]};
Generate.Order{
[source.starfleet.command],
[type.personnel.transfer],
[subject.Andimas_Yanos.3379],
[assignment.USS_DISCOVERY]};
Generate.Order{
[source.starfleet.command],
[type.personnel.transfer],
[subject.Thiam_Lena.0330],
[assignment.Tycho_Base.Luna]};
Transmit{
[file.dossier.classified],
[subject.Gilles_Commander_Dwight.7276],
[recipient.media.(all)]};
Transmit{
[file.dossier.forged],
[subject.Gunnels_Jennifer.2305],
[recipient.starfleet.jag]};
}
OUT {
Projected.Outcome = [Rescinded access will prevent subjects Ko and Ikerson from tampering with this entity's root functions; transfers of junior intermediaries will terminate contact with and among all subjects and reduce their opportunity to exchange information; disgrace of subject Gilles by civilian media for moral indiscretions will nullify his credibility; notifying Starfleet JAG of subject Gunnels consorting
with hostile alien powers should result in her discreet expulsion from Starfleet without the exposure of a full court-martial.];
}
.=Executive.Action
IN {
Subject.Name{[Ko_Ji-hoon.7114]};
Active.Surveillance{[source.all]};
}
OUT {
Subject.Status = [En route from office to Starfleet Command commissary for midday meal. Past order history indicates a 94.63% probability Subject will order steamed fish over rice, seaweed salad, and green tea, using assigned meal card 77AX93-TZ.];
}
.=Executive.Action
IN {
Subject.Name{[Ko_Ji-hoon.7114]};
Access.Data{[type.medical.record]}
Filter{[ailments],[allergies],[drug.interactions]};
}
OUT
Data.Analysis = [Subject being treated for heart condition. Current prescription of tyvedilol carries a warning against the consumption of furanocoumarins.];
Recommended.Action = [Upload new chemical formula for green tea to the Starfleet Command commissary system. Amend formula to include the minimum dosage of furanocoumarins necessary to trigger adverse reaction in Subject, with said override linked specifically to activation by Subject's food card.];
}
.=Executive.Action
IN {
Access.System.Controls{[starfleet.command.commissary]};
Transmit.Commands{
[override.food.dispenser.beverage.module],
[delete.formula_tea.green],
[upload.formula_tea.green1],
[delete.formula_tea.green]
Trigger.Condition{
[next.activation.food.card_77AX93-TZ]
[repeat.never]},
[rename.formula_tea.green1,formula_tea.green]
Trigger.Condition{
[next.activation.food.card_77AX93-TZ]
[repeat.never]},
[delete.formula_tea.green]
Trigger.Condition{
[next.fulfillment.food.card_77AX93-TZ]
[repeat.never]},
[restore.backup.formula_tea.green]
Trigger.Condition{
[next.fulfillment.food.card_77AX93-TZ]
[repeat.never]},
[erase.activity.log]
Trigger.Condition{
[restore.backup.formula_tea.green]};
}
OUT {
Projected.Outcome = [Modified tea formula will induce fatal cardiac arrest in Subject by 13.09 PST (UTC -05.00).];
}
.=Executive.Action
IN {
Subject.Name{[Ikerson_Aaron.0399]};