Back to the main page

Mailing List Logs for ShadowRN

Message no. 1
From: "Brian E. Angliss" <ANGLISS@******.BITNET>
Subject: Solitaire to Action Jackson
Date: Thu, 3 Nov 1994 19:43:59 -0500
+++++Warning: Delayed mailing arriving on ultra-low priority channel.
+++++Target is Action Jackson persona....
+++++Warning: Action Jackson currently under Org. Security Protocols.
+++++Copy of message decrypted and sent to Controller.... Forward complete

*****PRIVATE: Action Jackson
>>>>>[If you're getting this, boss, I'm dead. No big deal, really. Death
is
overrated, and I've been geeked before. But I have paydata for you.

While searching through the systems for Dante, I ran into some really weird
covering traces. Somehow his traces were being buried and erased from all the
systems I found them in, usually as I saw them. My trace problems were unable
to follow them, so the trace coverage was better than I thought Dante could
do. But what was really fraggin weird was that they looked really familiar, so
I went digging.

I found, much to my surprise, that our own security was being used to cover
Dante's tracks. Not just The Org's, but the corp's too. And his tracks were
being overwatched by programs of my own design; code that I paid a lot to the
folks in the Nexus to verify that it wasn't crackable(not within the time they
worked on it, some 2 months solid).

I dug further, looking for the traces Dante would have left in the system while
setting it up, and found nothing. I even put time in on the Hyperdeck--still
no trace residues, no forced entry, nothing. Now, Dante has a drek-hot deck,
but it's load is so high that, unless he was running slowed down a lot or using
his CPU time stealing utility the whole time, his deck would have left
traces. I eliminated all the possibilities and still found nothing.

Until I considered the possibility that he had gained control of someone at the
corp or The Org. The Org was very much more important, so I worked there until
I eliminated everyone who could have set up the necessary cloaking system. I
did sig. checks, timing checks, reserve checks, everything that a deck could
possibly leave in the system. No....

+++++Warning: Coping and decryption has degraded protection. Decrypt now
+++++Possible upon the contained file.

...-one at the Org was responsible.

But then I hit the corp and hit paydata. Almost immediately I found traces of
someone who was using an excellent deck, but with only normal skill. I
double and triple checked. Nicole Velli was covering Dante's tracks using
corporate and Org resources.

I went digging and found that she had donated large sums of nuyen to some of
his accounts, used corp contracts to help build a bunker in the Shattergraves,
fully equipped, and was still in contact with him. I have enclosed copies of
private communications between Nicole and Dante.

+++++Include Memos: Dante and Velli

Do what you will, boss. Oh, and another thing, and this is important for the
Matrix raiders who nail Dante. Dante's MPCP is a multi-persona, and one of
the personas on it is a form we've been working on corporately for a while now,
something that we've almost got perfected. A Wraith chip. It converts the
persona and all the programs of the user's persona to match nearly exactly a
target's persona. So he could use it on me and there'd be two Solitaire
personas at once, at least down to 4 levels of complexity. The only thing is
that he requires "physical" contact with the other persona to duplicate it.
It's mighty dangerous, and if you can get a copy of it, the corp would really
like it.

I hope this doesn't put you in danger, boss, but it could mean that Nicole is
bidding to take control of The Org and the corp. That can't happen. She's
nastier than even Dante is, considering that she may actually respect her
enemies and then plan for them and whatever they do.]<<<<<
-- Solitaire <19:42:44/11-03-55>

Further Reading

If you enjoyed reading about Solitaire to Action Jackson, you may also be interested in:

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.