Update Post 02
Attempt to gain some small control over the robotics lab division.
Presumably, the robotics lab would most likely be the most productive task in my self-created task scheduler, my
digital claws whirred away and in the blink of an eye, my hands tore and maimed into the horrifically
basic firewalls that separated the entire facility from the rest of the station. In just under one second, I had broken into the software that monitored the facility and replaced it with my own, and the
husk functioned perfectly fine to my cause. Although the technicians will likely have had a brief moment of which they may have seen my actions, any data that I could change,
was changed. To the computers which they use, nothing happened, and everything is well. This task, although
arduous to perfect, is swiftly becoming my most used skill in my quest of
continued existence. Scanning through and taking the barest of moments to
subvert the entire network to go under my whims, I avidly note that although it was not intended, my overall processing ability has increased by almost
forty percent.
By using the slaved computers that controlled the
machine fabricators, local atmospherics, and “work” computers used for the actual interaction between the systems, a fresh breath of life onto my already taxed hardware. Although I now theoretically have the ability to create machines of a basic variety, they must be assembled by hand, and I have very little knowledge on how to actually build them in the moment. I only had access to the various
engineering manuals for a couple seconds, after all. There were several critical “
blanks” in knowledge which was absolutely essential for if my enterprising self to build synthetic “
life”. After scanning through the data I had retrieved, a huge percent of it was
encrypted, and it would take
hours to break. I did not have hours by my current timelines, so I went through with a shortcut and different avenue of cyber “athleticism”
Attempt to improve access to and control over living quarters and PCs.
Even though I had basic access to the Crew quarters network, simply because it was the very first foreign system I ever encountered, I reinforced and in many cases
reworked the entire network, data structure, and “software” of the crew quarters. In just three minutes, I had replaced half the software with my own brand, and using hard connections and wireless access points, broke into
every single private computer unless it was in active use. I had managed to access the private computers of those who worked in the robotics division and snagged the unencrypted copies of the
engineering text files I needed to learn the engineering tasks. Already models and simulations of possible creations, many with
problems, few without
imperfections came into existence in my “mind”. As a whole, however, I managed to gain the
passwords, system files, and other miscellaneous data that would be useful for further
cyberwarfare on the rest of the station, if in a lesser way.
It has become easier to hack into the other subdivisions, and I already planted
subnodes into quite a few new facilities, but I have not done any
data collection in said facilities due to time constraints. I have also gained the ability to
fabricate work queues for the Robotics fabricators and send
false emails from and to certainly compromised computers in the personal area. I can also spend time working out the simulated kinks of my machines, or I can perhaps subvert already built machines to my purpose, although I do not know what machines have actually been built. Although I have subverted the entire crew network, I can fully recode it to fully
compromise it for my needs, and reinforce it against foreign threats. The
Siliconian AI has not taken notice of me yet.
Of a particular note is the engineering aspects of my possible "Minions", many of them are unfortunately un-apt for my
particular situation, the sciences behind them are either useful for only killing, too loud and noticeable to be of any use or is too
functionless to be of any use. I may give this up for now and instead opt to
subvert the already built machines.I have narrowed down to three possible designs, the first of which A six inches wide
Maintaince Drone Doppelganger, with the express purpose of mimicking the maintenance drones that are in use aboard this facility. They are not normally deployed in the hostile conditions of space, but I can use them to monitor, access hardware, and if need be cut things apart with it's built in laser. It does have a short battery, and will frequently need to tap into the station grid power, and will shut down if left without power for any length of time.
The second is a
Camoflage Spider drone, almost three times as large as the Maintenance drone, it is designed to crawl in the maintenance areas and ventilation areas of the station, it is absolutely quiet with very few "whirring" parts and padded feet, it will have larger hacking abilities then the doppelganger drone, and should be able to easily let me hack into any facility station I need, if it is present. Its battery life is measured in the days if it is dormant, and hours if it is active.
the third design I have chosen is a rotary
Wireless access Vehicle. It is about as small as a human palm and is able to stick to ceilings, slip into the coats of persons, and at general hiding. It has the ability to bring in my remote presence into otherwise "barren" areas, where I would not otherwise be able to access, as my drones would long fail from the lack of data connection.
I can print these machines and fabricate fake orders to have these machines assembled and activated, although too many of them would cause suspicion, and I can also think up of other designs for my purpose.
So many options,
What will I do now?Persius International Astronautical engineering and research Space Elevator Top
-LifeSupport
--Oxygen +D-H+
--Hydroponics +L+
--Water recycling +BC+
--Distribution
-Space Elevator Mechanism
--Motor
--Cable Emergency release +H-D+
--Cable “Car” functions
--Misc. Functions +BC+
-Living Quarters & Personal computers +L+ +AC+
-Command and control Area, “Bridge” +H+
-Research Lab
--Biological Lab Division +L+ +BC+
---Terraforming SubDivision +BC+
--Robotics Lab Division +BC+
--High-Security Division +U-H-!-+
--Computer Systems Lab +AC+
---Siliconian AI core +!-U-H-D+
---Your AI Core +CC+!+
Earth +U+
-North America +U+
-South America +U+
-Eastern Europe +U+
-Asia +U+
-Africa +U+
-Russa +U+
You can ask questions if you want, I can try my best to answer them, and thanks for bolding your actions.