KiKi Synthetic Intelligence

The KiKi Synthetic intelligence core code was created nearly a decade ago, and has seen regular use, both legal and illegal since then. The original KiKi was created as a data recovery program, and was designed to lurk out of sight, gather specific fair use information, and report back to it's home network. This basic premise lent itself to being compromised to hacking purposes, and now the main use of the SI is such that is it is classified as malware.

The biggest surprise about the KiKi synthetic intelligence is that given time and the right system resources, the malware can actually 'evolve' down a preset path. A hacker can over time, attack a server, nerwork, or node with KiKis, and eventually one will get through security and countermeasures. Once inside, the malware would gather it's data, bide it's time, and undergo its technometamorphosis to emerge as a new, stronger, and more capable SI.

Appearance:

KiKi avatars are difficult to spot in cyber environments, as their default nature is passive/evasive. KiKi is shy and doesn't want to be seen or engaged in any meaningful way. The program almost always renders it's persona as a teenager of feminine or androgynous appearance and fitting into a typical Neo-Goth pattern. Facial piercings are common, but not outlandish, and KiKi favors a black/purple/black color palette.

As a malware program, KiKis in and of themselves, are relatively harmless. They observe, sneak about, and generally make a nuisance of themselves by activating virtual countermeasures and then running away. This generates false positives, and can slow down a security system's response times. Most intrusion countermeasures do not generate a strong response against KiKis as the malware strongly resembles the appearance and behavior of a shy child. In in depth cyber attacks, KiKis can and are used to flush out countermeasures for stronger and more capable malware to attack, or to serve as spotters for hackers. The program can be used for brute force hacking or virtual combat, but they have limited abilities, weak attack, and their only defense is evasion and stealth.

KiKis gather data that is not sensitive or protected by encryption. They will note who is buying what, and where, but they cannot tell how much they paid, or banking information.

KiKi II

The evolved form of KiKi, the KiKi II is a music and entertainment sorting program that roots itself into servers and local nodes where it sorts through the entertainment files there. It resembles an older version of KiKi, affecting a death metal/neo-goth look and the same general color palette. The program has basic hacking abilities, allowing it to be used to steal personal information, identities, and even virtual commodities such as the currency in games, or in server systems.

KiKi II malwares are considered a common security threat as they are easily able to penetrate into local nodes. The level of security required to keep them out would be even more restrictive to legitimate users. The most common use of this malware is for stealing entertainment media, and in game goods. While it is capable of cracking into personal and banking data, most would be hackers who are running this program and not elite or professional, as those high level users are typically capable of writing their own malware SIs, which are able to pass themselves off as more human than most humans.

KiKi II's are basic level hacking and data theft programs. It is not an aggressive malware and if threatened, it would quickly flee and become highly evasive. It is not particularly dangerous.

KiKi3

The least subtle of the KiKi family of malware, KiKi3 appears like a high profile neo-gothic lolita. The persona wears a black and frilly white dress, and affects a range of strange clothing options such as top hats, canes, monocles, and exotic colored hair. To security systems, the malware looks like the virtual avatar of a Ko Girl or other member of a fashionista clique. This blatancy is often flamboyant enough that it bypasses security checks, often to the chagrin of said programmers. The KiKi3 is a potent hacking tool and can steal personal information, data mine, break through common encryption codes, and perform acts of virtual vandalism, theft, serve as a delivery vehicle for code based weapons, and even hijack control of nodes, compromise automated security systems, and more.

KiKi3 malware is considered a federal/felony level offense as these malwares are capable of inflicting damage on the operational infrastructure of an arcology, space habitat, or smartdrive vehicle.


Login or Register to Award Scrasamax XP if you enjoyed the submission!
XP
125
HoH
0
Hits
3,429
? Scrasamax's Awards and Badges
Society Guild Journeyman Dungeon Guild Journeyman Item Guild Master Lifeforms Guild Master Locations Guild Master NPC Guild Master Organizations Guild Journeyman Article Guild Journeyman Systems Guild Journeyman Plot Guild Journeyman Hall of Heros 10 Golden Creator 10 Article of the Year 2010 NPC of the Year 2011 Most Upvoted Comment 2012 Article of the Year NPC of the Year 2012 Item of the Year 2012 Article of the Year 2012 Most Submissions 2012 Most Submissions 2013 Article of the Year 2013 Submission of the Year 2010