Back to the main page

Mailing List Logs for ShadowRN

Message no. 1
From: Karl Low <kwil@*********.COM>
Subject: Watch your Assets
Date: Tue, 3 Mar 1998 19:53:12 -0700
*****Internal: AresNet
>>>>>[ TO: McquayB {Byron McQuay}
The interview with Ms. Hutton went as expected. She was completely unaware
of the situation and is extremely concerned about Michael's welfare.

As for Michael, apparantly he's been gaining external access from a modified
deck which we've confiscated. This deck came to him as noted in the
report included below.

+++++include package.log : 13-12-54

Per procedure for this project, we added the standard trace chip before
supplying Michael with the deck, but it seems he took it into his head to rip
the thing apart and make some modifications, the least of which included
ditching the trace chip and modifying his processor signature to match that
of Thomas Beesee, father of one of his class-mates, Vernon Beesee.

+++++include BeeseeV.dat
+++++include BeeseeT.dat

We examined the Beesee's deck as well. Thomas was unaware that his
deck had been opened up, but said he had noticed that it seemed to be
reacting better for the last few months. He attributed that to his growing
familiarity with it. It appears that Michael disabled some of the routine
error-checking in Thomas' deck, giving it a bit of a speed boost, and in the
process figuring out the signature the deck left.

In light of this, I'd like to request an increased watch-team on Michael, as
well as occasional checks on any of his known friends and associates and the
addition of a second signature to be implanted in his deck somewhere he
won't remove quite so readily. Currently I'm thinking in the simsense control
processor.

As for how he got out, it seems he found a minor hole in our delete sub-
routines. You are undoubtedly aware that certain files are assigned a no-
delete code to protect sensitive data from accidental or malicious erasure.
The general procedure is when such a file is deleted, it hits a subroutine
before it gets junked that checks it. If marked no-del, the file bounces to
the person who issued the mark. It shouldn't be possible for a persona to
pass into this routine at all for a number of reasons, beginning with simply
that personas aren't files, they're not stored on our system anywhere so
can't be deleted.

The second is that we don't give this deletion the bandwidth something like a
persona requires. Assuming you did send a persona down that way, you'd be
flying blind and senseless all the way, not something I'd really want to do.
Plus there are the various safegaurds making sure only an authorized user can
issue the non-delete.

So what does he do? He strips his persona to almost nothing, basic eyes, ears
and mouth and that's about it. If any IC had noticed him, he would have been
almost instantly core-dumped. Of course his persona's so damn small at this
point that it almost looks like a regular file transfer. At any rate, he dumps
his entire persona into a file on his deck and marks it no-del, but modifies
the
issuing address to one in the open matrix system. The safeguards miss it
because he's fully authorized to mark his own system, and the subroutine
doesn't
bother to check the issuing address before bouncing the mail. The scary thing
is,
he has to essentially delete himself, and then activate his persona before it
gets bounced out of the system, all while completely blacked out on all
senses.

It'd be like throwing yourself into a whirlpool wearing a black garbage bag on
your head, and knowing that the only way out is through the bottom.

We've since closed off the hole but as it stood, it would only have worked to
get out of the system, not in. Even so, I want to talk to him about how long
it
took him to figure this out. It's taken me this long to figure out what the
heck
he was doing even with his deck spread out across the desk in front of me.
It's unorthodox as hell, but great intuition.

I wouldn't think anybody else has found this hole, much less used it, but I've
taken the liberty of attaching a frame to the system to make sure if anybody
else tries this stunt we know about it.

Among the other things I've found were the data files for some basic frames,
it looks like he's set up one to play in one of our netgames. Some of the
adaptive routines he's programmed into it are comparable to stuff I've seen
come from the second year university crowd. It's still holding fifth place in
the
top score list, even though it hasn't been able to access a few of its data
files
since we grabbed his deck.

As for that file which started this whole mess, no trace on his deck. Although
we do have a mail from one J R W Lynch on here that I'd say spooked the
kid into wiping the crack and his code for it from his machine.

I'm putting in a recommendation that we look at a trust fund for Michael to
take care of tuition when it comes time. If he's this good natural, with some
proper training under his belt he'd be a great asset to our programming
team.]<<<<<
-- WilliamsT {Trevor WIlliams} <19:36:45/03-03-59>
Ares Internal Matrix Security
Exp Project R3g-32534

*****Internal: AresNet
>>>>>[TO: WilliamsT {Trevor Williams}
It stands to reason that to be a bell curve there must be someone at the high
end. Next time hopefully we'll find the high end before s/he sets off so many
alarms.

Return the Beesee's confiscated deck, I've already received a complaint from
his supervisor.

I'll pass your recommendation on to Sam.

Kill his game frame. Having something like that running confuses our stat
gathering programs. Those games are to provide us data on our students
personality types, not on their programming skills.]<<<<<
-- McquayB {Byron McQuay} <19:46:32/03-03-59>
Ares Psychological Division
Exp Project R3g-32534

*****Internal: AresNet
>>>>>[TO: GarentS {Sam Garent}

Enclosed is what Trevor has determined.

+++++include: R3g-32534.log33

Since it appears the security hole has been located and dealt with, I see no
reason to further delay CINT in their requests to interview Michael. However,
I do insist that one of the psychological assessment team be on hand during
the interview along with our legal and matrix representatives. Michael may
be a very valuable asset and I want to make sure that nothing interrupts our
formation of him.]<<<<<
-- McquayB {Byron McQuay} <19:48:32/03-03-59>
Ares Psychological Division
Exp Project R3g-32534
Message no. 2
From: Avenger <Avenger@*******.DEMON.CO.UK>
Subject: Re: Watch your Assets
Date: Thu, 5 Mar 1998 23:47:24 +0000
*****INTERNAL: Achilles Project
>>>>[Seneca has received clearance from Ares to interview Michael
Hutton. A CINT team should be arriving in the morning to supervise the
interview. ARES have requested that one of their psychologists attend
the interview to ensure the questioning does not endanger the boy or
cause unnecessary stress. Special Agent Wrigley will accompany the team
in order to guide the Matrix questioning.


Agent Wrigley, the information you requested is on my desk, collect it
before you leave in the morning.


Let's hope we get some answers we can use.]<<<<<
-- SASIC P. Anderson <23:45:11/03-05-59>

Further Reading

If you enjoyed reading about Watch your Assets, you may also be interested in:

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.