//------------------------------// // Chapter 68 - Processing // Story: The Freelancers // by OverHeart //------------------------------// While Access was hard at work, Sheet Rock decided to check out the other two rooms ahead of time. Both were of the same design as the one they’d broken though, that is to say, relatively sturdy and cheap to deploy in netspace. Everything they could see, touch, and interact with put some kind of strain on the host system, and many operators only put the bare minimum into virtual environments when designing their subnets if the horsepower was needed elsewhere. A quick scan of the process registry Access had broken into during his search for anything useful revealed something in the room beyond to be using an incredible amount of processing power, which Sheet Rock presumed to be the long-distance link. She couldn’t be further from the truth however, as instead she found where the data packets went after being sorted by the AI, that being security control. This room was much smaller than the others, and was comprised of a single terminal and a large diameter pipe, inside which was a wire frame model of a wall shrouded in flames. That must be their firewall, at least the one used to screen regular computer data. As packets streamed in, each was captured for a thorough inspection then quickly passed on once they had been properly scanned for malicious data. Screening Cyberdeck signals was a little more complicated and costly however, and was usually left up to the various forms of ICE and other Runners to deal with. Most of the time, when someone attempted a break in, it was generally more advantageous to ensure they could never try again, whether that be at the hooves of Netwatch or a corporate death squad. Sheet Rock inspected the terminal, hoping to find some way of crossing the link without being noticed. Their signal cloaking techniques could actively mask their presence once they arrived, but not while in transit, during which they’d be the most vulnerable. With the amount of data currently crossing the link, there was a fifty-fifty chance of the AI noticing the amount of data it processed wasn’t the same as what was transmitted. In other words it’d be pure chance as to whether it raised the alarm or not. “Hey I might have something here.” Access called out. “You find anything?” “We’ve got maybe a fifty-fifty chance of being noticed when we cross the link.” Sheet Rock answered as she stepped out from security control. “Not unless you’ve found a way to deal with that AI.” ”Well, yes and no.” “Which is it?” “I can forge a couple of sigs that should get us through to the other side, but if we’re noticed they’ll connect the dots pretty much immediately as to where our signals are coming from and close off the link.” “Phantom said there wasn’t any ICE.” Sheet Rock stated as a matter of fact. “The only obstacle is that AI.” “Well that was some bad info she got, because a bulletin on their internal noticeboard says the far side is swarming with detection programs and anti-system ICE.” “Are they expecting us?” “I don’t think so.” Access said, shaking his head. “If they suspected anything they’d send runners through, so it’s probably just a precautionary measure.” “Scarlet says the other building’s a bust as well, we could’ve bodged together a quick and dirty way through if they had a microwave dish, you know, just on the off chance we needed it.” “We could jack out, come back later?” “No, the plan is riding on us being in the right place at the right time.” “The only other choice is to take the plunge and hope we don’t get smoked, are you willing to risk that?” “Alright, alright, just go forge those sigs and I’ll finish up here.” Sheet Rock groaned. “This is a bad idea.” “The worst that could happen is our decks get trashed, I’m sure the others could manage, I mean, Phantom probably has a few contingency plans up her sleeves.” It took only a few moments for Access to forge a couple of signatures and apply them to their decks. To the AI and any ICE they encountered, they’d hopefully look like a couple of corporate runners on assignment. Their forged signatures wouldn’t hold up to scrutiny levied against them by any organic security though and any Runner or SysOp would be able to tell they weren’t supposed to be there the moment they set eyes on them. Sheet Rock considered their options should they need to escape for a moment while Access breached the lock on the door to the link itself. Before long it was time to take the plunge, sink or swim. Sheet Rock went first, and after a moment’s wait, she arrived at a grand black pyramid, glittering in the dark of the net. To nobody’s surprise, there were indeed a great number of programs flitting about, scanning every object they could find with increasingly evident urgency. Among them were anti-system programs, menacing cuboid constructs capable of doing some real, and permanent, damage to the systems they assaulted. The worst they could do is fry a Cybermodem, a phone line, a Netrunner's chair, maybe a terminal, but any damage would need to be repaired and that took time they simply did not have. They were approached by a roaming program almost as soon as they’d finished materializing in the subnet. It didn’t immediately attack, which was a good sign. “Submit to an ID scan or disconnect immediately!” it spoke in a digitized, tinny timbre. “Reminder: Failure to comply will lead to lethal force being used upon you.“ The program seemed to glitch for a short moment, as did the landscape, before it wandered off without conducting the scan it was to perform on all visitors. This happened again a few times in succession as the two gingerly made their way forwards, unsure if their cover was still intact. “They couldn’t have made it to the Arcology yet, could they?” “I don’t think so.” Access answered. “Glitches like this occur as a symptom of high processor or network load. Their systems are working real hard for some reason, but without access I couldn’t say what.” “Alright, let’s look for a code gate and bust in while they’re distracted, I don’t want to be around when security realizes they didn’t check us.” The pyramid was smooth on all sides apart from the irregularly placed vent-like protrusions on its surface, much like how the Arcology appeared in realspace. It only had one true entrance in realspace, but in the net, it had at least a half-dozen hidden underneath its digital plating, one of which was known to be weaker than the others. This information was perhaps a couple of years old now give or take, but small details tend to get overlooked, especially if external access only came about once in a while. It stood to reason that this weakly fortified code gate was once used to gain unfettered access to external resources, so assuming it still existed, it could be used in reverse too. “What in the actual hell did you two do!?” Phantom’s voice suddenly bellowed over a comm link. “On-site security can’t keep still for some reason, they’re checking everyone’s credentials!” “We’ve had our fair share of problems too, you don’t need to shout.” Sheet Rock said coolly. “The Arcology’s subnet is glitching hardcore right now, and it wasn’t something we did.” “Wait, really?” “There’s anti-system ICE everywhere but it’s not working quite right, it’s like the system can’t keep anything from crashing.” Access explained. “Detection programs are outright ignoring us too. We were noticed initially, but after that, it’s like we don’t even register to them.” “Be very careful, this has to be the work of another crew, dunno who though.” “Could they be using the same link we are?” “Couldn’t say, I only know of a couple ways they could be accessing the Arcology remotely so they could be local for all we know.” Phantom grunted. “Stay on your hooves and hole up somewhere you can access the systems we need, don’t connect to GeneTech’s subnet yet or take unnecessary risks until we can investigate.” “Don’t have to tell me twice.”