by MaP_Prime » Fri Oct 28, 2011 5:24 pm
Ultrax
Starscream watched Contemptor walk off after he had spoken to the other Decepticon, causing the Commander to pause and think for a moment. He pondered how best to go about truly getting the information he wanted, relying on others was risky at best, and he somewhat regretted talking to Contemptor, he was an unknown factor, a risk, and one he likely could not trust. No, relying on such informants was not the way to go, he need raw, unfiltered data, that he could work with that no one else knew about.
A plan began to form in his mind, and a slight grin spread across his face. He began to pick his way through the derelict corridors of the Ultrax, searching for the ships computer lab. Every Decepticon ships, regardless of its function, had at least one for data processing and related duties. It took two or three breems for him to find it, and Starscream had actually passed the door once before he found it. Unsurprisingly the Stunticons seemed to have made little use of this room, considering Starscream had to push a large piece of scrapped ship armour out of the way to get through the door. Once inside the lights flicked on and the low hum of large, powerful computers at work registered in his audio processors.
He made his way over to one of the workstations and brought it on line, and thankfully it was actually in fairly decent working order. He worked quickly, setting up a series of firewalls around this specific station and taking careful steps to ensure that it was isolated from the rest of the network to ensure that no one who might be watching could see what he was doing. Starscream was also careful to cover his tracks to ensure that his activities would not be noticed for the time he was to work here. Once his computer was secured he set to work on writing a series of spy programs, taking careful steps to make them as subtle and silent as he could. His intention was to upload these programs to the various personal databases of the various Decepticons currenbtly serving under his command. Each of the programs would disguise itself as simple background data that existed on any computer system and would remain idol until after a new entry was made by any DEcepticon under his command. The purpose of these programs was simple: to keep Starscream informed of any personal journal entries or proivate communications that went on amongst the other Decepticons to see what they had to say about him. Each program would upload itself as part of the next software update that were automatically uploaded and installed to the various databases in the computer network used by all the Decepticons on Earth. Once a new journal entry or communication was made and logged the spy programs would activate and upload a copy to a seceret database that Starscream operated, and was only accessible to himself.
It took him several breems to write all the programs he would need. He had to becareful, any sloppy work would be detected, he needed to make sure his work was tight and methodical so his programs would go unoticed in the network. He also decided to not bother with trying to upload these programs to Soundwave's personal database as he knew that eventually, no matter how careful he was, the spy master would find them and likely trace the origin of the program back to Starscream. It was unfortunate that he had to leave Soundwave out, but he really had no other option.
Once the programs were written and he was ready to upload them Starscream paused. Although they were enough to keep him up to date on the few Decepticons that actually made personal entries in their databases, it would not be enough to keep track of the other the Decepticons he knew were already against him. He was aware that Scrapper was not beholden to him, and as soon as the Constructicon leader found allies, or came up with a plan of his own he would move against the Commander. Starscream frowned. He needed to do something to find anything he could use against Scrapper. He knew that he could not get a spy amongst the closed ranks of the Constructicons, and they were to busy with their current assignment to try and isolate one of them and wear him down to giving up any secrets they may have. No, he needed something else.
Then it dawned on him. The Constructicons operated an exclusive database for their various projects and ideas, it was where they stored the blueprints for virtually every base, foritfication, weapons emplacement, space station, facility and any other project whether it be a prototype or some future project they had going on the back burner. It was heavilly encrypted and only accessible by a Constructicon, but it was not inpenetrable. However, basic spy programs would not be enough to get in, Starscream would have to create something speical. Before the war and in its early days Starscream had used to design special data mining worms that he had used to essnetially borrow into other computer networks and databases that had a rudamentary AI programing. These worms were meant to be slow, methodical, and very effcient as they tested the firewalls and encryptions of the targeted systems for the inevitable weakness or backdoor that it could exploit. Once it found that opening it carefully wormed its way into the system and began to collect all the data stored in side, makeing regular copies of itself. These copies would remain dormant and hidden within the system, and each one would have the msot recently obtained data from the system it had infiltrated. The purpose of these copies was to ensure that even if the active worm was found and deleted, one of the copies would activate and carry on. Since these copies were dormant they were always very difficult to detect, even by a skilled technician, and usually a system would not be fully rid of them without being completely destroyed and rebooted. Also when it came to the data upload the worm would copy itself right before an upload and delete itself to ensure that the data upload would not be detected, and if it was detected the source would not be found, with the new copy activating a short time later to carry on before the next upload.
It was a time consuming and complex thing to create, and again Starscream had to be very careful when creating it to ensure that he had the best worm he could possibly make. Once he was finished fashioning his software spy he grinned. He prepared all of the spy programs and the worm for upload as soon as he reconnected to the net work. They would be shunted into the que for the next software update, which he knew was to occur within the next day, this way he could avoid the problem of them being discovered and being traced back to this station via a direct upload. Once ready he reconnected the work station to the network and had all of his programs intergrated into the software update. He then cleared the stations memory and rebooted it to cover his tracks.
Once his work was finished he quietly left the room and made his way back to the bridge, once there he opened his com line to his various teams on Earth.
>>Starscream to all teams. Check in with a status report on your current assignments.<<