Chapter 23 - Crystal Part 2 (1/2)
Using that information the AI kept an eye on its creator as it cross-referenced that name with the address it was currently located at.
(Peter Parker, Born 27 August 2003.)
(Parents: Richard and Mary Parker, Both deceased recently.)
(Relatives: May and Ben Parker.)
(Hospital Born in…..)
(Cross referencing, information designated False. Searching hospital records.)
(Information required, searching Parents information.)
(Error, Information tampered.)
(Tracking residual signature.)
(Problem, signature tracked to SHIELD network.)
(Decision, Hack network.)
(Processing power required)
As the AI started to search the information pertaining to it creator it found discrepancies in the hospital records. Wanting to find out why, the search led it to looking into Peter's parents. The problem with this was that there information was also tampered with. After tracking the residual electronic signature that changed the data, it came up against the SHIELD network firewall.
This was one of the only firewalls since it had been made that it couldn't crack. Bar some of the top network security companies in the world, the AI could brute force its way through any firewall. Making a decision the AI shut down most of the other processes it was working on and focused fully on the SHIELD security network firewall.
The first thing the AI did was to hack into a renowned hacker's computer to use it as a proxy when it worked its way into their servers. Drawing on its immense processing power and new servers, the AI immediately attacked the firewall with everything it had.
On that night all of SHIELD's cyber security team had no sleep as they were awoken to track and block an intrusion. Spending a few minutes longer than it ever had before when breaking a firewall, the AI was successful in its endeavor. Once inside the servers of one of the biggest agencies in the world, the first thing the AI did was to create a small piece of code that it could use to infiltrate the server again.
By scanning over the existing code and then embedding the quick back door, the AI covered all traces of that activity and then went on to find all the information on a one Richard Parker and Mary Parker.
While it did this it also simultaneously started to download all files it could get its hands on. This way they wouldn't notice the AI's interest specifically on Richard and Mary Parker.
Quickly finding their files the AI copied everything in a few seconds. Once that was done, it truly started to copy everything on the server. It was about half way through all their files when the experts at shield started to fight back and lock the code out.
Using its newly acquired sentience and brains, the AI reasoned that showing it could continue to operate and steal all their information while fighting off their cyber security team would raise too many flags at SHIELD. Deciding that it had gathered what it came for, and making sure that the backdoor was in place and untraceable, the AI started to wipe out the telltale signs that could lead back to its code and started to leave.
10 minutes after SHIELD was hacked there was nothing left to tell how someone got past their numerous firewalls and protections, other than the calling card of one of the best hackers in the world. 20 minutes later SHIELD experts found traces that lead back to a certain laptop in Washington. And 30 minutes later a strike team busted down the door of a sleeping hacker cuffed him and took him away.