Operational Security

December 22, 2014 § Leave a comment

The images and data flashed in a frantic unending stream as she stripped every bit of data she could from the mainframes.  Assaults by mercs in physical operations were just a godsend to her. Being a third unexpected party she was able to skirt the scrambled security to access less secured data such as personal communication and general building video feeds. Not that she couldn’t get in on her own ability.

A lot of Hackers might call those paltry but there was a lot to be said for them. Messaging data and images could often prove rich of blackmail material which she typically didn’t employ personally but resold. As for the video feeds she would review them for weeks or months even, finding out the routines, the emergency protocols and various details hidden from the outside. Her end result even when stalking on the tails of a failed operation were fairly detailed documentation of internal behavior and structure. To a certain brand of Infiltrators who favored stealth and espionage such information was invaluable.

She wasn’t the go big sort of Hacker, she never aimed for the heavy score guarded behind central security bulwarks. What she culled could hint at corporate secrets and the larger score though. In sample documents she provided to various mercs she always provide just enough of those details to tantalize and sell the bulk of her data. What she did was the research for operations before anyone even conceived of them.

Tagged: , , , , ,

Come on, speak up! I'd love to hear it.

What’s this?

You are currently reading Operational Security at 2andforty.

meta