KiKi Synthetic Intelligence
The KiKi Synthetic intelligence core code was created nearly a decade ago, and has seen regular use, both legal and illegal since then. The original KiKi was created as a data recovery program, and was designed to lurk out of sight, gather specific fair use information, and report back to it's home network. This basic premise lent itself to being compromised to hacking purposes, and now the main use of the SI is such that is it is classified as malware.
The biggest surprise about the KiKi synthetic intelligence is that given time and the right system resources, the malware can actually 'evolve' down a preset path. A hacker can over time, attack a server, nerwork, or node with KiKis, and eventually one will get through security and countermeasures. Once inside, the malware would gather it's data, bide it's time, and undergo its technometamorphosis to emerge as a new, stronger, and more capable SI.
KiKi avatars are difficult to spot in cyber environments, as their default nature is passive/evasive. KiKi is shy and doesn't want to be seen or engaged in any meaningful way. The program almost always renders it's persona as a teenager of feminine or androgynous appearance and fitting into a typical Neo-Goth pattern. Facial piercings are common, but not outlandish, and KiKi favors a black/purple/black color palette.
As a malware program, KiKis in and of themselves, are relatively harmless. They observe, sneak about, and generally make a nuisance of themselves by activating virtual countermeasures and then running away. This generates false positives, and can slow down a security system's response times. Most intrusion countermeasures do not generate a strong response against KiKis as the malware strongly resembles the appearance and behavior of a shy child. In in depth cyber attacks, KiKis can and are used to flush out countermeasures for stronger and more capable malware to attack, or to serve as spotters for hackers. The program can be used for brute force hacking or virtual combat, but they have limited abilities, weak attack, and their only defense is evasion and stealth.
KiKis gather data that is not sensitive or protected by encryption. They will note who is buying what, and where, but they cannot tell how much they paid, or banking information.
The evolved form of KiKi, the KiKi II is a music and entertainment sorting program that roots itself into servers and local nodes where it sorts through the entertainment files there. It resembles an older version of KiKi, affecting a death metal/neo-goth look and the same general color palette. The program has basic hacking abilities, allowing it to be used to steal personal information, identities, and even virtual commodities such as the currency in games, or in server systems.
KiKi II malwares are considered a common security threat as they are easily able to penetrate into local nodes. The level of security required to keep them out would be even more restrictive to legitimate users. The most common use of this malware is for stealing entertainment media, and in game goods. While it is capable of cracking into personal and banking data, most would be hackers who are running this program and not elite or professional, as those high level users are typically capable of writing their own malware SIs, which are able to pass themselves off as more human than most humans.
KiKi II's are basic level hacking and data theft programs. It is not an aggressive malware and if threatened, it would quickly flee and become highly evasive. It is not particularly dangerous.
The least subtle of the KiKi family of malware, KiKi3 appears like a high profile neo-gothic lolita. The persona wears a black and frilly white dress, and affects a range of strange clothing options such as top hats, canes, monocles, and exotic colored hair. To security systems, the malware looks like the virtual avatar of a Ko Girl or other member of a fashionista clique. This blatancy is often flamboyant enough that it bypasses security checks, often to the chagrin of said programmers. The KiKi3 is a potent hacking tool and can steal personal information, data mine, break through common encryption codes, and perform acts of virtual vandalism, theft, serve as a delivery vehicle for code based weapons, and even hijack control of nodes, compromise automated security systems, and more.
KiKi3 malware is considered a federal/felony level offense as these malwares are capable of inflicting damage on the operational infrastructure of an arcology, space habitat, or smartdrive vehicle.
Not Registered Yet? No problem.
Do you want Strolenati super powers? Registering. That's how you get super powers! These are just a couple powers you receive with more to come as you participate.
- Upvote and give XP to encourage useful comments.
- Work on submissions in private or flag them for assistance.
- Earn XP and gain levels that give you more site abilities (super powers).
- You should register. All your friends are doing it!
? Responses (5)-5
I like the description details and the way it looks like the program resembles a kid growing as it evolves. But how the program communicates? I mean if it is so evasive, I highly doubt that it would leave a port open for outside communication. Is it used only when you hack locally? I guess it just randomly attacks without any specific target in the system. Also can you explain some specifics? It leaves sensitive data alone in first version but is it because it cannot break encryption or is it just to avoid detection by avoiding data which monitored closely? What are the specific abilities?
I like KiKi.
As opposed to Linean I do not want further details. This is a roleplaying system, and as such you have provided more than enough to properly employ KiKi into any setting.
Sure it is nice to put detailed tech info into a submission, but all us IT geeks know how deep that rabbit hole goes, and we don't want another 100 page Microsoft White Paper on our hands ;P
Good job, Scras. 4/5
Very Nice 4.5/5 Would love to see more of these Scras!!!!!!!
I almost fell into the trap AG mentioned with this one, but I like the visuals on this one.
It would be interesting for a PC to be targeted by one of these in cyberspace that had developed a fascination for them, even though they were not deliberately targeted by whoever deployed the KiKi. Its obsession with the PC could be quite annoying for the party that just wants the KiKi to do its damn job.
Just the right mix of cyberenvironment and tech explanation. I love how you took the concept of a sneaky data-stealing malware and gave it the perfect NPC personality to represent its nature.
As a sidenote, I always love me some technobabble, but this stands solidly on its own without it.