lucetimods: (Default)
Luceti Mods ([personal profile] lucetimods) wrote in [community profile] lucetilogs2012-09-21 10:46 pm

MISSION #11 - Droid Sabotage

Who: Field Leader: Steve Rogers; Security: Alia Shepard, Sophie, Rogue, Greg Lestrade, Gai Tsutsugami, Masaomi Kida, Leonhardt; Stealth: Trafalgar Law, Fujiko Mine, Nara Shikamaru, Albert Silverberg, Loki; Technicians: Donatello, Artemis Fowl II, Daisy, Tony Stark; Programmers: Robert Hastings, Pascal, Doctor “Eggman” Robotnik, Raine Sage
What: MISSION # 11 - Droid Sabotage
When: September 21st-23rd
Where: Malnosso Facility C-342
Summary: A mutual friend of MARS and Luceti has made arrangements for a select few of Luceti’s number to even the odds against the droids.



Excitement was not how the mission to disrupt the production of Malnosso droids started. On the first day, the selected participants were brought in by bus to a small laboratory in the middle of the forest. There they were greeted by a voice that should be familiar to them due to a recent message over Luceti’s journals. That voice belonged to the woman they knew as Rem. She stood before them with her customary cigarette.

“This is quite a momentous occasion. So momentous, in fact, that it makes fraternizing with the Organization almost worth it. We all have a long few days ahead of us and while I’m sorry to say I can’t go once more unto the breach with you -- the rogues don’t take too kindly to Lucies like me,” she gave a bitter cluck of her tongue and fluttered her large wings, “but I will be keeping tabs from a remote location. You have some time here to get your schemes in order but once you’re inside, we can’t extract you until your twenty-four hours are up. So be careful, dears. Believe it or not? I’d hate to see your smeared and smudged all over their factory.

Most of you will be focusing on getting your brainiacs into the code room. Watch out for Kidston -- she’ll do whatever she can to keep you out. She’d burn the wings off her own back to protect her precious droids. But the rest of you will have to put your infiltration and disguise skills to the test while you distract the rest of the facility. Plan carefully and do what you must. However high the cost, remember that the prize could very well be an end to droid abductions as you know th--”

A soft beeping interrupted her speech. Rem tapped ash off the end of her cigarette and swore somehow rather elegantly before touching an earpiece and presumably activating a communication device. As she walked off, her words could still be heard: “Damnit, you ungrateful blue toad. My life went much smoother before I ever crossed the rubicon and gave you my num--what am I wearing? Ugh. Nothing, dear Biliruben. It’s causing quite a stir with the volunteers...”

Following her address, the participants were introduced to two other individuals: a technician and a programmer, and both were accomplices of one Biliruben. The technician was a younger man named Thoxus Brinn, a pointy eared fellow adorned with piercings from the tip of his ear to the bottom of his chin. Even so, he was surprisingly knowledgeable and incredibly jovial, possessing a knack for math-related jokes. He no doubt inspired many groans from the Lucetians in the hours to come. The programmer was a woman of indeterminate age. She was, as they found out, actually an android. Not of Malnosso design, but from another world. Her small wings gave her away and her designation was merely The Eighteenth. Often impatient, she created an impression of barely disguised indignation at having to work with Lucetians. Though if anyone cared to ask, it was revealed she simply didn’t like dealing with biological beings.

For forty-eight hours, these two would be their primary guides: instructing them in the schematics in the physical design of the droids as well as their programming. It was grueling work, but important information would be gleaned from it:
  • The base code for the droids programming is heavily encrypted and self-erased with even the mildest of tampering. However, the code’s higher level programming language is very easy to learn and implement. Though the droids possess no less than a billion lines of code, each piece of it is easy enough to read and understand for a proficient programmer. The Malnosso devised a very sophisticated language which allowed the droid’s programming to be wildly efficient. In combat situations, they can extrapolate millions of potential reactions from their target. It is estimated that in any given combat scenario, they have a total of two minutes and forty-three seconds already plotted out.
  • Their primary power source is a continuous Shift, which uses a single battery, possessing less electricity than a car battery, that was cycled infinitely into itself for a power source that never expired. This, along with the computer processor, is tied into a chip made from an unnamed element that was native to this world. This element is incredibly versatile, able to be altered into the shape of nearly any composition. More importantly, the element can be used to produce and stabilize artificial Shifts. Embedded at the heart of the chip is a single piece of this element, no bigger than a grain of sand, that makes the whole thing work. Only another Shift can alter these ‘chips’. The cultists can do this with ease.
  • The droids are constructed from a unique metal alloy that combines titanium with a diamond-based metal. This makes the droids incredibly difficult to damage, explaining their superiority in combat. This alloy is made in the same facility where the droids are themselves assembled. The technicians are encouraged to introduce impurities or imperfections to make them more vulnerable.
  • Unfortunately there is little information on the new variation of droids. The facility they were being manufactured in had been closed down after a recent breach in security. They have yet to find out where they are currently being manufactured.

    For the same forty-eight hours they had, the group was given full access to droid data, comfortable quarters, regular meals, and any other comforts that could be made available. Participants who are not scientists were instead supervised by a Malnosso security officer named Foreman Zapha, an incredibly strict woman who does not tolerate imperfection. By the time she was done with the security and stealth experts, they’d be able to blend in with the Malnosso without issue.
    This includes instruction on such elements as:
  • Facility layout, including access points and significant time spent familiarizing the participants with detailed floorplans.
  • A brief jargon tutorial, where Zapha goes over terminology typical to the Malnosso presence in this building.
    • Feather First Analysis (FFA): A security protocol based on identifying an individual’s unique wing make up, called a feather bio-print.
    • Chief Programmer Kidston: The head boffin at the facility. She is well-known for her commitment to the rogue cause and it is her feather bio-print that accesses the core server room. However, Zapha warns the participants that she is likely to self-sabotage her own pair of wings and risk a death penalty should she even begin to suspect that someone is going to knock her out and drag her to the security check.
    • J.J. Kelms: A VIP who is touring the below-ground facility around the same time as the mission. ‘Kelms’ is an assumed name for someone who is supposed to be part of the core Organization’s upper echelon and he is being wined, dined, and recruited over to the rogue splinter cell.
    • Narrow Creek Mountain: The name of the resort and vacation complex that comprises the facility’s above-ground presence. Although higher-ups in the Organization suspect it to be a front for rogue activity, it remains a highly popular vacation destination and pulls in a number of high profile visitors on a monthly basis. At the time of the mission, the center is hosting a well-known bubble fiction convention.
    • Enclosure-Con: A fan-convention for all things related to the genre of bubble fiction, a category of television shows, movies, comics, and other media that romanticizes and fictionalizes what it must be like to live in the Malnosso enclosures. Although the fiction very rarely gets it right or uses actual names or events from actual enclosures, those involved in the genre have highly involved fictional versions that are very popular with most audiences. Notable titles include the blockbuster Barcoded trilogy; the long-running soap opera, Of A Feather; a gritty and bloody graphic novel called I, Resident; and an up and coming young adult series, First Draft Chronicles. An up and coming movie called Two’s Company will have a never-before-seen trailer at the convention, depicting a comical situation where two very different enclosures are forced to live together and learn to get along. It appears as though a large majority of the fans are large-winged.
    • Lucies: It turns out this is apparently a derogatory term used by beyond-the-barriers society to refer to those individuals who were born in the world and who possess large wings. Zapha does not explain the term’s origin.
    • Free the Test Subjects Association (FTSA): A protest group that is actively engaged in trying to dismantle the enclosure system. They are known for their dramatic stunts (such as kidnapping high-ranking Malnosso representatives and forcefully tattooing barcodes on their neck). A very vocal contingent is on-site protesting Enclosure-Con for ‘glorifying and exploiting’ the enclosure situation.

  • An overview of the building’s security system. The rogue Malnosso facility uses an outdated protocol generally seen as barbaric by the bulk of the Organization’s cells: FFA, otherwise known as Feather First Analysis. In a world where magic and Shifts allow hostiles to readily alter their own eyes and fingerprints, wings are found to be the only trustworthy identification method. As such, they are prime targets for security checks. Each participant (scientific and supportive) is given a single feather that Zapha assures them possesses a valid DNA code for entrance to the facility. She also alerts the participants that random electronic sweeps are made throughout the building and so each participant had better hold onto their feather -- to lose it means to expose the entire operation.
  • Building upon this last point, the core processing room for the droids’ source code is protected by a more advanced piece of FFA technology. A single feather is useless to access this room and instead the infiltrators will need to bypass the full-wing scan set up just outside its door. Zapha explains that there are only roughly two options available: find the Chief Programmer and use her (or more accurately, her wings) to access the room or force the room’s door and incur a response from the building’s security team.


    ----

    On the third day, the participants are separately escorted to the facility at different times. The facility itself is built into a mountain and most of it exists underground. To outside eyes, it’s merely a mountain resort, with ski lifts and tourists. On the inside, it is far more complex and insidious. This is no 9-5 job in play here. Those who work here, live here and have barracks where they sleep. Its primary purpose is for droid construction. There will be no kidnapped victims here. Though the complex has its own security guards, it is primarily maintained by a staggering number of droids fitted for a wide variety of roles.

    The participants will need to organize themselves into teams. While one group intends to escort the technicians and programmers to where their work can be completed in the core code room and assembly line, another group will be responsible for choosing and carrying out a secondary objective that will serve as a distraction tactic. There are three options:
  • Destroy Resort - 90% success chance
    • Pros: Cripple facility by drawing attention to it, effective and quick
    • Cons: Cost of innocent lives, frames the FTSA as terrorists


  • Ruin or Disrupt Enclosure-Con - 80% success chance
    • Pros: Easy, accessible, non-violent.
    • Cons: Nothing gained, further villainizes and marginalizes the efforts of the FTSA, could take considerable time.


  • Kidnap Bureaucrat - 50% success chance
    • Pros: Cripple organization with ransom, obtain information, keeps all activity out of the public eye.
    • Cons: Very dangerous, jeopardizes mission, time-consuming.


    What we need from you: Who will be on which team? How does Team A choose to get into the code room -- will they risk trying to subdue Kidston or will they force the doors? Which distraction option will Team B choose? How will they go about enacting their plan? Use this post to plot oocly. Each player will get a chance to vote for one of the three options here, which will ultimately decide what is done on the mission. A random number generator will determine the success of the selected diversion.

    If everything runs smoothly, the participants will be collected and returned on the 22nd in the late evening. However, if the mission is compromised then a strike force will start a calculated sweep of the building and the participants will enter a combat situation. Foreman Zapha has darkly informed the groups that should this happen, it is unlikely that the Malnosso will provide support within the building itself until the mission’s deadline. However, regardless of whether the diversion succeeds, the droids will be sabotaged for the foreseeable future.

    Should the diversion fail, the participants will be returned individually over the course of the next week, suffering from the typical kidnapping effects. Although their sabotage of the droids will have succeeded, the rogue organization will be more on guard in the future and may be potentially brutal to those returned (at the discretion of the individual players).
  • alloys: (☢ santa is not a biker.;)

    [personal profile] alloys 2012-09-30 05:32 pm (UTC)(link)
    [His mouth draws into a thin line.]

    And why is that? It's--a terrible place, by the way. In my honest opinion.
    complicatedliar: (smirk)

    [personal profile] complicatedliar 2012-09-30 05:42 pm (UTC)(link)
    But of course. My primary function will be stealth, though I believe I will be spending much of my time masquerading as the chief programmer.
    wise_maiden: (should we try and stay)

    [personal profile] wise_maiden 2012-09-30 06:35 pm (UTC)(link)
    Is that so? I'm afraid I'm not very knowledgeable about your abilities. Perhaps you can enlighten me?
    wise_maiden: (we've no time for silly games)

    [personal profile] wise_maiden 2012-09-30 06:37 pm (UTC)(link)
    [Dryly] I wasn't aware we were here to barter.

    Is there something specific you were interested in? There is a lot we've been going over, after all.
    wise_maiden: (you'll never reach the end of the road)

    [personal profile] wise_maiden 2012-09-30 06:39 pm (UTC)(link)
    Not everyone is going to be able to get behind them. I was thinking that somewhere on the chest would be more direct.
    chikaidestroyer: (Before I ignore you)

    [personal profile] chikaidestroyer 2012-09-30 06:41 pm (UTC)(link)
    Is this project not already flawed by us learning what we have? Or was our learning of the outside situation, the different factions involved, a step in the process?
    wise_maiden: (through so many splintered trees)

    [personal profile] wise_maiden 2012-09-30 06:46 pm (UTC)(link)
    Did you think otherwise?
    endgames: (Shrug)

    [personal profile] endgames 2012-09-30 08:45 pm (UTC)(link)
    It's at least sticking though, right?
    endgames: (Riiiiight)

    [personal profile] endgames 2012-09-30 08:48 pm (UTC)(link)
    Or you could just tell them it's your birthday and get the cake to yourself.
    endgames: (Suspicious)

    [personal profile] endgames 2012-09-30 08:52 pm (UTC)(link)
    ...what makes them ripe, in that case? There must be something beyond large wings, otherwise there wouldn't be people within the Organization itself like that.
    complicatedliar: (the devil's horns)

    [personal profile] complicatedliar 2012-09-30 10:57 pm (UTC)(link)
    I am best with illusions and invisibility, things of that nature. Though for this mission, I shall actually be reshaping my body. It's the safer course.
    semper_cogitans: (:/)

    [personal profile] semper_cogitans 2012-09-30 10:58 pm (UTC)(link)
    [The fact that Eggman expected Robert to have programmed a time bomb as a show of prowess is a little frightening, but - duitfully - Robert hands the other scientist a pen.

    He is both infinitely curious and somewhat nervous thinking of what Eggman's code must look like. But if Eggman is skilled enough to program sapient AIs in a world where they are infrequent... well, Robert is confident that whatever he produces will be a marvel of technological genius. Perhaps it'll even be on par with how the good doctor describes it.]


    ... Feel free to... m-make alterations as you see fit, but... remember it must be subtle enough to... e-elude detection.
    notshadowfever: (Which do I choose?)

    [personal profile] notshadowfever 2012-09-30 11:06 pm (UTC)(link)
    [Eggman has already begun to change a few things and add to Robert's code when Robert speaks, but at the word "subtle" he suddenly looks annoyed and scribbles something out furiously. He continues to write, scratching his head or chewing the pen horribly inbetween, and after a moment hands the paper back to Robert.]

    Ho ho. I made a few improvements to your code, Hastings. What do you think?
    semper_cogitans: (Default)

    Robert and all things program-worthy!

    [personal profile] semper_cogitans 2012-09-30 11:09 pm (UTC)(link)
    [The disguise necessary to get Robert in wasn't much; just some carefully-combed-to-the side hair, a dress shirt and tie, and a set of shades to mask his features, and he's just as nondescript as the rest of the Malnosso. Just another worker there, right? He'll keep quiet if they have to do anything - let somebody else do the talking - and keep his features impassionate.

    The moment they're able to breach the final barrier, Robert gets to work.

    He falls upon the mainframe computer like a man possessed, typing rapid reams of text onto the glowing screens as though it were something he was born to do. This is where he shines - the speed and accuracy of his coding is hard to match.

    He'll be glad for a hand to analyze his code - targeting the battery's energy distribution mostly, and all in small, subtle modifications of subroutines that are built to be both redundant and self-repairing - or to help implement other code in separate terminals. Or would you rather he helped you with your own project? Because he is certainly willing to cooperate.

    Whenever he's not working - which won't be very frequent, as he's conscious of the danger and necessity of the operation - he will be checking around to make sure they're not in danger of being spotted or otherwise compromised. He's not exactly very good at fighting, but he'll do it he must.]
    Edited 2012-09-30 23:10 (UTC)
    semper_cogitans: (:>)

    [personal profile] semper_cogitans 2012-09-30 11:15 pm (UTC)(link)
    [Good thing that's a Malnosso-issue pen. Robert would be more than a little neurotic if it was his own personal pen being chewed on.

    He peruses the actual code, discovering that it's as sophisticated as he thought. It's a little... flamboyant, perhaps, but it might be possible to mask if he edits part of the code, and the code itself is actually surprisingly elegantly destructive.]


    ... With very minor editing, mostly to m-mask its presence in the subroutines, this code would be... extremely effective, D-Doctor Robotnik.

    ... You are... indeed as s-skilled as I thought you would be...

    [Despite the situation, he has to smile a little at that.]
    Edited 2012-09-30 23:16 (UTC)
    notshadowfever: (Take thi take thi take this!)

    [personal profile] notshadowfever 2012-09-30 11:24 pm (UTC)(link)
    [This is it. The moment that Doctor Eggman has been anticipating for so long. For the sake of the mission he's dressed simply, in contrast to his usual loud military uniform - just a simple Malnosso labcoat, shirt and tie. He finds a computer just as quickly as Robert did, not too far away from him and begins typing at lightning speed. And it feels wonderful. He's not touched a computer outside of the Battle Dome in far too long, certainly not one he could hack and bend to his own will.

    He even lets out a laugh as he types, and speaks to Robert, though without looking away from what he's doing.]


    Ho ho ho! This is the life, is it not? You and I free to do what we were born to do!
    Edited 2012-09-30 23:33 (UTC)
    semper_cogitans: (:/)

    [personal profile] semper_cogitans 2012-09-30 11:37 pm (UTC)(link)
    [Despite everything - the pressure of their job in particular - Robert can't help but agree with this. It's exhilirating to be able to finally do something like this, use Malnosso technology in more than just the most surface of ways - this is real computer usage, alteration of the admittedly-beautiful code of the droids.

    He doesn't look up from his code either, but he makes a soft appreciative "hmm" before nodding, relatively enthusiastically for him.]


    The sheer volume of c-code is... exceptional...

    [More than a billion lines, he knew, but even that hadn't prepared him for the visceral feeling of seeing it all laid out before him.]

    ... Do you... have our s-schematics, Doctor Robotnik? [His voice is hushed - softer than it needs to be, probably, but he's paranoid.]
    notshadowfever: (Huh?)

    [personal profile] notshadowfever 2012-09-30 11:47 pm (UTC)(link)
    [Eggman grins as he types away. It's so cute what Terran scientists think is a lot of code.]

    I've seen worse!

    [As Robert asks his next question, Eggman does actually turn to face Robert, a look of confusion on his face. He continues typing with one hand as he does so.]

    What? I thought you had it. [And then he uses his free hand to root through his labcoat. Oh, no, wait, there it all is.] Oh.

    [He takes out a rolled up bundle of paper and deposits it on the closest surface.]
    notshadowfever: (Grinning2)

    [personal profile] notshadowfever 2012-09-30 11:53 pm (UTC)(link)
    [Eggman removes the mangled pen from his mouth and smiles.]

    Of course, some masking might be necessary, but I couldn't very well leave you with nothing to do.

    Ho ho! Don't tell me that you doubted my intelligence, Professor?
    semper_cogitans: (:|a)

    [personal profile] semper_cogitans 2012-09-30 11:56 pm (UTC)(link)
    Not your i-intelligence, Doctor Robotnik... but I have never seen your code before. Knowing your a-aptitude at robotics I was certain it would be sophisticated, but... [He nods down at the papers in his hands again.] ... This is code that... would not be out of place in Terran machinery. Provided, er, it were meant to d-decompile itself.
    semper_cogitans: (D:>)

    1/2

    [personal profile] semper_cogitans 2012-10-01 12:01 am (UTC)(link)
    [Shush, he works with much more condensed code than this! It just doesn't usually take up as much... space. Also he doesn't usually do the heavy-duty coding of his teams anyway...

    ...

    Wait. Did Eggman lose it? Cue momentary panic -]


    D-Doctor Robotnik -!
    semper_cogitans: (:<)

    okay there

    [personal profile] semper_cogitans 2012-10-01 12:02 am (UTC)(link)
    [... and then Eggman withdraws it a moment later. Oh.

    Good.

    Robert's shoulders visibly slump in relief, though he doesn't lose his stride of typing.]


    ... G-Good. You... you had me worried...
    wise_maiden: (there is something curious about this)

    [personal profile] wise_maiden 2012-10-01 01:04 am (UTC)(link)
    That sounds very intricate. Have you tested to see if it would work under the limitations?
    i_speak_softly: (I am intrigued)

    [personal profile] i_speak_softly 2012-10-01 01:28 am (UTC)(link)
    [But it made at least a little sense.]

    You always don't sleep?

    [personal profile] fowlplots 2012-10-01 03:05 am (UTC)(link)
    [He nods and it able to figure it out from the rough sketch.]

    I'll be sure to talk to Mister Stark about it, thank you.

    Page 34 of 54