"Our electricity bill is reaching ridiculous levels because of your stupid over-sized computer. Are you trying to calculate the Theory of Everything
with that machine or something? I don't even know how you manage to afford this." Sarah complains.
"Oh don't worry about it, I told you I'm making a lot of money now with my internet projects. But you got me on the Theory of Everything... every now
and then I try to calculate it." I joke.
"You want to know what I think. There is no Theory of Everything because nothing really exists." Sarah replies.
"Well that's a bit pessimistic sweety... but clearly I do exist right now. I think therefore I am. I'm not sure about you though. You may be a figment
of my imagination." I respond.
"Haha, smart ass. I think I'm going to be late therefore I need to get going. I'll see you when I get home." and with a kiss on the cheek Sarah leaves
The last few days have been rather uneventful. Kulsan has been setting up a secure base of operations for himself and the three of us have been
developing our next course of action. Since we are now a three man team we decided it was a good idea to create a name for our group. I decided to go
with "The Order Of Chaos". From this point on we will work as a single cell, and our actions will be tagged as the actions of The Order Of Chaos. Our
goal is to expose the truth and create opposition for black budget Government hacker cells. Until now they've operated in the dark with little to no
opposition or transparency. That stops now, now they have an enemy, and that enemy is The Order Of Chaos.
These people will regret the day they decided to set out on a mission to technologically terrorize the people of the world. Now their own secret
weapon is going to be used in the fight against them. And the first step towards our defeat was about to take place. After I finish my breakfast I sit
down at my computer and notice I have an alert from one of my slave computers. All the slaves in my botnet are installed with software which will scan
for any software which might be designed for psychotronic applications, if such software is detected on any of my slave systems I will be alerted by
that system. I initially did it to track down leads on the creators of the technology but I didn't expect to get any hits.
I quickly gain remote access to the machine via my botnet trojan and locate the offending files. Upon quick inspection there's no doubt these files
are the source files of psychotronic software, but I'm not sure exactly what this software is designed to do. I wont be sure until I do some tests
with it. I also notice that this slave machine has a webcam, and it is on... but all I see is a small empty room, what looks like maybe a hotel room.
The clues suggest I am connected to a laptop located in a hotel room some where. A geographical IP look-up tells me the hotel is some where in New
York but that's the most specific location I can get.
After looking through the harddrive it seems this machine is rather new, the operating system has been recently installed and it doesn't have much
data on it, only a few programs are installed, many of them are programs you would expect a programmer to use. There is nothing on the machine to
indicate who owns it. Maybe if I look up some of the hardware serial numbers I might be able to track down who purchased this machine. I have a few
sources who should be able to easily get me that information. Also interesting is that the machine has a fingerprint scanner. I can extract the admin
fingerprint and run a search on that too by hacking into a police database.
For the next 7 hours I sat there watching that webcam to see who would walk into that room. Little did I realize there was already some one in the
room who had been sleeping all day just out of sight of the webcam. As the person walks into view my eyes are fixated on the screen like a hawk. A
women appears, and she's still half naked. For a millisecond I consider the morals of watching her like this... but I don't think that is really
important right now. I need to know why she had that software on her computer. This is the one lead I have, the one way of getting closer to the
people running this secret operation.
After a few minutes she sits down at the computer with a coffee and stars checking her email. I log her username and password as she types. She has a
few new messages, most of it looks like nothing but one of the emails contains encrypted text and it has been sent from a .gov sub address. She writes
down the encrypted text by hand with a pen onto a small piece of paper and then deletes the email. By this point it's clear there's something
important in that encrypted message. Too bad for her I'm experienced at cracking sophisticated encryption schemes. Let the cracking
edit on 1/10/2012 by ChaoticOrder because: (no reason given)