Space Pirate Science

REVISED Azerothian Operations Document
Latest version as of now.

Here is the latest version of this document.

TOP SECRET SCI EYES ONLY
Azerothian Joint Operations Command (AJOC)
Overview of all operational resources
NO-DIST, NO-FORN

List of Active Facilities on Planet Azeroth >>

Sector Zero: GM Island and Others
Space Pirate Arzerothian Operations Command HQ >> SPAOC
Azerothian Hacker Underground Central HQ >> AHU
Public Test Realm Joint Operations Research Facility >> PTR Facility
S7DII/AJOC Section N44E >> (Basically the Guantanamo Bay of the Planet Azeroth)
S7DII Numbers Station GM Island
Joint Operations Numbers Station GM Island
Programmers Isle Code Monkey R&D Facility
Azerothian Central Intelligence Department >> ACID
Telecomix Azeroth Central HQ
Anonymous Azeroth Central HQ
Azerothian Joint Operations Command Central HQ >> AJOC-0
AHU People’s Liberation Front Central HQ >> AHUPLF

Sector 1: Azeroth
Anonymous Azeroth Intelligence Agency
Temple of Cryptographia
Telecomix Azeroth Numbers Station
Telecomix Azeroth WeRebuild
Azerothian Joint Operations Command HQ >> AJOC
AHU People’s Liberation Front Main Operating Base

Sector 2: Kingdoms of Kalimdor
Kalimdor Joint Operations Command Center >> Kalimdor Facility
AHU Numbers Station Sennon
Sennon Fortress AHU Black Site >> Sennon
WAR10CK’s Lair Primary Location
World Of Warcaft Aerospace Defence Command >> WORAD
AHU People’s Liberation Front Kalimdor Installation

Sector 3: Outland
Space Pirate Science Team Special RESTRICTED Area No. 52 >> Area 52
Storm Spire Research Institute >> SRI
Alliance Medical Research Institute for Infectious Diseases >> AMRIID
Azerothian Research Institute for Alchemical Science >> ARIAS
National Data Administration Primary Data Center
Azerothian Centers for Disease Control HQ >> ACDC
Anonymous Azeroth Numbers Station Outland

Sector 4: Northrend
Aperture Science Azerothian Enrichment Center
ACID Numbers Station Ice Crown Citadel
SkyTown Joint Operations Bureau of Surveillance Research and Exposure >> SkyTown
Space Pirate Science Team Phazon Leviathan Seed Research Facility >> Leviathan Facility
Space Pirate Azerothian Research Facility >> SPARF >> RELOCATED DUE TO AREA 52 EXPANSION.
Scarlet Monastery AHU Black Site >> The Tomb
National Data Administration Off Site Secure Data Center
AHU People’s Liberation Front Northrend Installation
AHU People’s Liberation Front Northrend Forward Operating Base

Sector 5: Malstorm
Space Pirate Geothermal Clean Energy Facility

Sector 6: Pandaria
Azerothian Hacker Underground Pandarian Headquarters >> Pandarian Headquarters
WAR10CK’s Lair Undisclosed Secure Location
National Data Administration Data Haven Facility
Telecomix Azeroth Crypto Munitions Bureau
Telecomix Azeroth News Agency
SPAOC Numbers Station Pandaria
AHUPLF Numbers Station Pandaria

Sector 7: Azerothian Space
AJOC Moon Base Alpha-1 >> Under Construction
AJOC Night Star Space Colony >> Under Construction

Offsite: NeverEndlessWoW
AJOC Azerothian Department of Defense HQ >> The Hexagon
______________________________________________________________________

Cipherspace Darknet Stats for Planet Azeroth >>

Protocols in use:
The Onion Router (Tor)
Invisible Internet Project (I2P)
AnonNet
ShadowWalker >> Being Tested
Drac >> Being Tested
Hordes >> Being Deployed

Cipherspace Darknet Nodes:
Number of active Planetary AnonNet Nodes: 36,000
Number of active Planetary Tor Nodes: 20,087
Number of active Planetary I2P Nodes: 17,576
Number of active Planetary Horde Nodes: 512
Number of active Planetary Drac Nodes: 128
Numner of active Planetary ShadowWalker Nodes: 256

Cipherspace Darknet Sites:
Number of active Planetary AnonNet .anon Sites: 22,576
Number of active Planetary Tor Hidden Service .onion Sites: 16,542
Number of active Planetary I2P .i2p eepsites: 13,564

Current Cipherspace Authentication: Telecomix Azeroth Root Certificate CA: Telecomix Azeroth Crypto Munitions Bureau.

Current DNS Server ISP: TCMB (Telecomix Crypto Munitions Bureau) DNS
______________________________________________________________________

Mission Critical Websites >>

Sektor 7: azeroth.sektorseven.org, .anon
WeRebuild Azeroth Wiki: werebuild.azeroth.nerr, .anon
Telecomix Azeroth Crypto Munitions Bureau Wiki: cryptoanarchy.azeroth.nerr, .anon
SkyTown Joint Operations Bureau of Surveillance Research and Exposure: bluecabinet.azeroth.nerr, .anon
Telecomix Azeroth News Agency: interfax.azeroth.nerr, .anon
BHU/AHU Public Free Web Hosting Service Battle.Hax: name.battle.hax, .anon ex. kommandos.battle.hax
Azerothipedia Dramatica: azerothipediadramatica.azeroth.nerr, .battle.hax, .anon
Par:AnoIA: par-anoia.azeroth.nerr, .anon
Wikileaks Azeroth: wikileaks.azeroth.nerr, .battle.hax, .anon
Telecomix Azeroth: telecomix.azeroth.nerr, .anon
Anonymous Azeroth: anonops.azeroth.nerr, .battle.hax, .anon
Intellipedia Azeroth: AJOCIntellipedia.azeroth.anon (Often filled with Edit Wars, Vandalism, POV, BLANKING IN PROGRESS, and other Wiki Related Drama because the people from Anonymous Azeroth who are cleared for access to the wiki are so immature… The classified area of wiki has plenty of drama but the Unclassified area… we are thinking about renaming it to Intellipedia Dramatica.)
_______________________________________________________________________

Mission Critical IRC Channels >> GET ON IRC FGT

IRC Server URLs >>
irc.battle.hax, .anon
irc.sektorseven.org, .nerr, .anon
irc.wtfux.nerr, .anon
irc.anonnet.nerr, .anon
irc.telecomixAz.nerr, .anon

Ports: 2600, 1337
Encryption: Digital Fortress SSL RSA: 16384
Logging: Secured NDA Data Haven Facility

Channels >>
#TelecomixAzIRC
#WikileaksAzIRC
#AnonOpsAzIRC
#AHUhaxIRC
#adIRC
#par-anoiaAzIRC
#WeRebuildAzIRC
#tcmbAzIRC
#BlueCabinetAzIRC

Numbers Relay Pages >>
NumbersBin >> NumbersBin API, OTR, No IP Logs, TCMB-Numbers-Web-Station >> numbersbin.azeroth.anon, .nerr, .battle.hax
AnonNumbers >> ZeroBin PHP Software, OTR, No IP Logs
TheNumbersStation >> DoxBin API, OTR, No IP Logs
TorNumbers >> DoxBin API with .onion domain, OTR, No IP Logs
I2Numbers >> DoxBin API with .i2p eepsite domain, OTR, No IP Logs
PasteNumbers >> ZeroBin PHP Software, OTR, No IP Logs
Telecomix Numbers Relay Page >> TCMB PasteBin API, .anon domain, OTR, No IP Logs
Cryptoanarchy Numbers Relay Page >> TCMB PasteBin API, .anon domain, OTR. No IP Logs
______________________________________________________________________

Telecomix Azeroth TCMB Erebus Numbers Station Stats >>

Erebus Numbers Stations Approved Ciphers >>
OTP-MODE1: ROT-X
OTP-MODE2: VIGENERE S-BOX
OTP-MODE3: NUMBERS
OTP-MODE4: TCMB-MFSK-1337 CYPHER (Digitrx RDFT Analogue Transmission of binary data)
OTP-MODE5: ROT-NUMBERS
OTP-MODE6: TCMB-CYPHER-XPA1337 (Polytone Analogue Transmission of binary data)

Station Terminal Specs >>
OS: Telecomix Cipher Operating System wth Telecomix Cipher Secure Linux Kernel
CPU: Kahos Krypto Processor with embedded dual Kahos QRNGs
Keygen: Dual Kahos Quantum Random Number Generators (QRNGs)
Key Management: Marutukku RAM File System
Crypto: TCMB-CYPHER Cryptosystem
Network: TCMB-Erebus Secured Lines

Active Erebus Numbers Stations on Planet Azeroth >>
STATION NAME: The Torture Chamber TCMB Erebus 1
OPERATORS: Azerothian Hacker Underground AHU
LOCATION: Sennon Fortress, Sector 2 Kalimdor
CALL SIGN: Sound of man being tortured by Ynen followed by Yankee, November, Echo, November
FREQUENCY: 13375 kHz
~~~
STATION NAME: Ing Hive TCMB Erebus 2
OPERATORS: Anonymous Azeroth
LOCATION: Area 52, Sector 3 Outland
CALL SIGN: Screeches of Warrior Ing followed by Delta, Romeo, Alpha, Yankee, Kilo, Echo
FREQUENCY: 16475 kHz
~~~
STATION NAME: White Room TCMB Erebus 3
OPERATORS: Sektor 7 Department of Intelligence & Information S7DII
LOCATION: GM Island, Sector Zero
CALL SIGN: SSTV image of white room followed by Zulu, Echo, Echo
FREQUENCY: 5422 kHz
~~~
STATION NAME: Frostmourne TCMB Erebus 4
OPERATORS: Azerothian Central Intelligence Department ACID
LOCATION: Ice Crown Citadel, Sector 4 Northrend
CALL SIGN: Frostmourne curse text followed by Juliet, Alpha, Zulu, Mike, Yankee, November
FREQUENCY: 10426 kHz
~~~
STATION NAME: Chozo Station TCMB Erebus 5
OPERATORS: Telecomix Azeroth
LOCATION: Temple of Cryptographia, Sector 1 Azeroth
CALL SIGN: Chozo language recital of station name followed by Alpha, Zulu, Oscar, Romeo, India
FREQUENCY: 6900 kHz
~~~
STATION NAME: Azerothian Music Station TCMB Erebus 6
OPERATORS: Space Pirate Azerothian Operations Command SPAOC
LOCATION: AHU Pandarian Headquarters, Sector 6 Pandaria
CALL SIGN: Continually plays Azerothian music and then numbers on a schedule. Sierra, Alpha, November, Golf, Uniform, India, November, Echo plays before the numbers
FREQUENCY: 15682 kHz
~~~
STATION NAME: Erebus 7 TCMB Erebus 7
OPERATORS: AHU/Joint Operations (Backup Station)
LOCATION: GM Island, Sector Zero
CALL SIGN: CHARLIE ONE EREBUS X2 followed by Bravo, Alpha, Zulu
FREQUENCY: 3133.7 kHz
~~~
STATION NAME: Patriot Broadcasting Station TCMB Erebus 8
OPERATORS: AHU People’s Liberation Front
LOCATION: Undisclosed Location, Sector 6 Pandaria
CALL SIGN: Some random military song followed by Delta, Romeo, Alpha, Kilo
FREQUENCY: 1337 mHz

Active TCMB Numbers Web Stations >>
Voice of Northrend
Panda Free Radio
The Havenshire Poacher


AHU Media Channels with Dynamic Anti Jamming Technology >>
Covert Encrypted Pirate Mirror Channels are also active in case of technical problems.

TV: (Both HD Analogue and Digital via Satellite Grid, Unencrypted and DRM Free)
Hack The Planet Channel
Telecomix Azeroth News Agency

Pirate TV Satellite Service: Hack The Planet TV Azeroth (Part of the Hack The Universe TV: Intergalactic Pirate Satellite TV Network)
Subscription is a one time payment for the hardware dish receiver with DVR and multimedia and networked device playback plus all other Sat TV features. After that, service is FREE! Content is encrypted but DRM Free. Rip away. Donations accepted.

Radio: (Shortwave HF and Satellite channels Excludes Numbers Stations)
Hack The Planet Radio
Voice of Azeroth
Telecomix Azeroth Interfax
Free Azeroth Radio
_____________________________________________________________________

Civil Defence and DEFCON Systems >>

Defense Condition (DEFCON):
DEFCON 5 >> Peace
DEFCON 4
DEFCON 3
DEFCON 2
DEFCON 1 >> WAR!

Threat Level (THREAT-CON)
RED 5 EPSILON >> PANIC!
ORANGE 4 OMEGA
YELLOW 3 GAMMA
BLUE 2 BETA
GREEN 1 ALPHA >> SAFE

Emergency Broadcast System (EBS)

View
Azerothian Operations Document
Very Detailed

If anyone on here is currently doing a World of Warcraft based Campaign or is planning on doing one, then I have this document I would like to share with you. This is a outline of the settings in my WoW based stories on another site. Feel free to use just give me some credit plz.

TOP SECRET SCI EYES ONLY
Azerothian Joint Operations Command AJOC
Overview of Operations Resources
NO-DIST NO-FORN INTERNAL USE ONLY

List of Active Facilities on Planet Azeroth >>

Sector Zero: GM Island and Others
Space Pirate Arzerothian Operations Command HQ >> SPAOC
Azerothian Hacker Underground Central HQ >> AHU
Public Test Realm Joint Operations Research Facility >> PTR Facility
S7DII/AJOC Section N44E >> (Basically the Guantanamo Bay of the Planet Azeroth)
S7DII Numbers Station GM Island
Joint Operations Numbers Station GM Island
Programmers Isle Code Monkey R&D Facility
Azerothian Central Intelligence Department >> ACID
Telecomix Azeroth Central HQ
Anonymous Azeroth Central HQ
Azerothian Joint Operations Command Central HQ >> AJOC-0
AHU People’s Liberation Front Central HQ >> AHUPLF

Sector 1: Azeroth
Anonymous Azeroth Intelligence Agency
Temple of Cryptographia
Telecomix Azeroth Numbers Station
Telecomix Azeroth WeRebuild
Azerothian Joint Operations Command HQ >> AJOC
AHU People’s Liberation Front Main Operating Base

Sector 2: Kingdoms of Kalimdor
Kalimdor Joint Operations Command Center >> Kalimdor Facility
AHU Numbers Station Sennon
Sennon Fortress AHU Black Site >> Sennon
WAR10CK’s Lair Primary Location
World Of Warcaft Aerospace Defence Command >> WORAD
AHU People’s Liberation Front Kalimdor Installation

Sector 3: Outland
Space Pirate Science Team Special RESTRICTED Area No. 52 >> Area 52
Space Pirate Azerothian Research Facility >> SPARF
Storm Spire Research Institute >> SRI
Alliance Medical Research Institute for Infectious Diseases >> AMRIID
Azerothian Research Institute for Alchemical Science >> ARIAS
National Data Administration Primary Data Center
Azerothian Centers for Disease Control HQ >> ACDC
Anonymous Azeroth Numbers Station Outland

Sector 4: Northrend
Aperture Science Azerothian Enrichment Center
ACID Numbers Station Ice Crown Citadel
SkyTown Joint Operations Bureau of Surveillance Research and Exposure >> SkyTown
Space Pirate Science Team Phazon Leviathan Seed Research Facility >> Leviathan Facility
Scarlet Monastery AHU Black Site >> The Tomb
National Data Administration Off Site Secure Data Center
AHU People’s Liberation Front Northrend Installation
AHU People’s Liberation Front Northrend Forward Operating Base

Sector 5: Malstorm
Space Pirate Geothermal Clean Energy Facility

Sector 6: Pandaria
Azerothian Hacker Underground Pandarian Headquarters >> Pandarian Headquarters
WAR10CK’s Lair Undisclosed Secure Location
National Data Administration Data Haven Facility
Telecomix Azeroth Crypto Munitions Bureau
Telecomix Azeroth News Agency
SPAOC Numbers Station Pandaria
AHUPLF Numbers Station Pandaria

Sector 7: Azerothian Space
AJOC Moon Base Alpha-1 >> Under Construction
AJOC Night Star Space Colony >> Under Construction

Offsite: NeverEndlessWoW
AJOC Azerothian Department of Defense HQ >> The Hexagon
______________________________________________________________________

Cipherspace Darknet Stats for Planet Azeroth >>

Protocols in use:
The Onion Router (Tor)
Invisible Internet Project (I2P)
AnonNet
ShadowWalker >> Being Tested
Drac >> Being Tested
Hordes >> Being Deployed

Cipherspace Darknet Nodes:
Number of active Planetary AnonNet Nodes: 36,000
Number of active Planetary Tor Nodes: 20,087
Number of active Planetary I2P Nodes: 17,576
Number of active Planetary Horde Nodes: 512
Number of active Planetary Drac Nodes: 128
Numner of active Planetary ShadowWalker Nodes: 256

Cipherspace Darknet Sites:
Number of active Planetary AnonNet .anon Sites: 22,576
Number of active Planetary Tor Hidden Service .onion Sites: 16,542
Number of active Planetary I2P .i2p eepsites: 13,564

Current Cipherspace Authentication: Telecomix Azeroth Root Certificate CA: Telecomix Azeroth Crypto Munitions Bureau.

Current DNS Server ISP: TCMB (Telecomix Crypto Munitions Bureau) DNS
______________________________________________________________________

Mission Critical Websites >>

Sektor 7: azeroth.sektorseven.org, .anon
WeRebuild Azeroth Wiki: werebuild.azeroth.nerr, .anon
Telecomix Azeroth Crypto Munitions Bureau Wiki: cryptoanarchy.azeroth.nerr, .anon
SkyTown Joint Operations Bureau of Surveillance Research and Exposure: bluecabinet.azeroth.nerr, .anon
Telecomix Azeroth News Agency: interfax.azeroth.nerr, .anon
BHU/AHU Public Free Web Hosting Service Battle.Hax: name.battle.hax, .anon ex. kommandos.battle.hax
Azerothipedia Dramatica: azerothipediadramatica.azeroth.nerr, .battle.hax, .anon
Par:AnoIA: par-anoia.azeroth.nerr, .anon
Wikileaks Azeroth: wikileaks.azeroth.nerr, .battle.hax, .anon
Telecomix Azeroth: telecomix.azeroth.nerr, .anon
Anonymous Azeroth: anonops.azeroth.nerr, .battle.hax, .anon
Intellipedia Azeroth: AJOCIntellipedia.azeroth.anon (Often filled with Edit Wars, Vandalism, POV, BLANKING IN PROGRESS, and other Wiki Related Drama because the people from Anonymous Azeroth who are cleared for access to the wiki are so immature… The classified area of wiki has plenty of drama but the Unclassified area… we are thinking about renaming it to Intellipedia Dramatica.)
_______________________________________________________________________

Mission Critical IRC Channels >> GET ON IRC FGT

IRC Server URLs >>
irc.battle.hax, .anon
irc.sektorseven.org, .nerr, .anon
irc.wtfux.nerr, .anon
irc.anonnet.nerr, .anon
irc.telecomixAz.nerr, .anon

Ports: 2600, 1337
Encryption: Digital Fortress SSL RSA: 16384
Logging: Secured NDA Data Haven Facility

Channels >>
#TelecomixAzIRC
#WikileaksAzIRC
#AnonOpsAzIRC
#AHUhaxIRC
#adIRC
#par-anoiaAzIRC
#WeRebuildAzIRC
#tcmbAzIRC
#BlueCabinetAzIRC

Numbers Relay Pages >>
NumbersBin >> NumbersBin API, OTR, No IP Logs, TCMB-Numbers-Web-Station >> numbersbin.azeroth.anon, .nerr, .battle.hax
AnonNumbers >> ZeroBin PHP Software, OTR, No IP Logs
TheNumbersStation >> DoxBin API, OTR, No IP Logs
TorNumbers >> DoxBin API with .onion domain, OTR, No IP Logs
I2Numbers >> DoxBin API with .i2p eepsite domain, OTR, No IP Logs
PasteNumbers >> ZeroBin PHP Software, OTR, No IP Logs
Telecomix Numbers Relay Page >> TCMB PasteBin API, .anon domain, OTR, No IP Logs
Cryptoanarchy Numbers Relay Page >> TCMB PasteBin API, .anon domain, OTR. No IP Logs
______________________________________________________________________

Telecomix Azeroth TCMB Erebus Numbers Station Stats >>

Erebus Numbers Stations Approved Ciphers >>
OTP-MODE1: ROT-X
OTP-MODE2: VIGENERE S-BOX
OTP-MODE3: NUMBERS
OTP-MODE4: TCMB-MFSK-1337 CYPHER
OTP-MODE5: ROT-NUMBERS

Station Terminal Specs >>
OS: Telecomix Cipher Operating System
CPU: Data Dyne Cryptographically Secure Processor with embedded dual QRNGs
Keygen: Dual Quantum Random Number Generators (QRNGs)
Key Management: Marutukku RAM File System
Crypto: TCMB-CYPHER Cryptosystem
Network: TCMB-Erebus Secured Lines

Active Erebus Numbers Stations on Planet Azeroth >>
STATION NAME: The Torture Chamber TCMB Erebus 1
OPERATORS: Azerothian Hacker Underground AHU
LOCATION: Sennon Fortress, Sector 2 Kalimdor
CALL SIGN: Sound of man being tortured by Ynen followed by Yankee, November, Echo, November
FREQUENCY: 13375 kHz
~~~
STATION NAME: Ing Hive TCMB Erebus 2
OPERATORS: Anonymous Azeroth
LOCATION: Area 52, Sector 3 Outland
CALL SIGN: Screeches of Warrior Ing followed by Delta, Romeo, Alpha, Yankee, Kilo, Echo
FREQUENCY: 16475 kHz
~~~
STATION NAME: White Room TCMB Erebus 3
OPERATORS: Sektor 7 Department of Intelligence & Information S7DII
LOCATION: GM Island, Sector Zero
CALL SIGN: SSTV image of white room followed by Zulu, Echo, Echo
FREQUENCY: 5422 kHz
~~~
STATION NAME: Frostmourne TCMB Erebus 4
OPERATORS: Azerothian Central Intelligence Department ACID
LOCATION: Ice Crown Citadel, Sector 4 Northrend
CALL SIGN: Frostmourne curse text followed by Juliet, Alpha, Zulu, Mike, Yankee, November
FREQUENCY: 10426 kHz
~~~
STATION NAME: Chozo Station TCMB Erebus 5
OPERATORS: Telecomix Azeroth
LOCATION: Temple of Cryptographia, Sector 1 Azeroth
CALL SIGN: Chozo language recital of station name followed by Alpha, Zulu, Oscar, Romeo, India
FREQUENCY: 6900 kHz
~~~
STATION NAME: Azerothian Music Station TCMB Erebus 6
OPERATORS: Space Pirate Azerothian Operations Command SPAOC
LOCATION: AHU Pandarian Headquarters, Sector 6 Pandaria
CALL SIGN: Continually plays Azerothian music and then numbers on a schedule. Sierra, Alpha, November, Golf, Uniform, India, November, Echo plays before the numbers
FREQUENCY: 15682 kHz
~~~
STATION NAME: Erebus 7 TCMB Erebus 7
OPERATORS: AHU/Joint Operations (Backup Station)
LOCATION: GM Island, Sector Zero
CALL SIGN: CHARLIE ONE EREBUS X2 followed by Bravo, Alpha, Zulu
FREQUENCY: 3133.7 kHz
~~~
STATION NAME: Patriot Broadcasting Station TCMB Erebus 8
OPERATORS: AHU People’s Liberation Front
LOCATION: Undisclosed Location, Sector 6 Pandaria
CALL SIGN: Some random military song followed by Delta, Romeo, Alpha, Kilo
FREQUENCY: 1337 mHz

Active TCMB Numbers Web Stations >>
Voice of Northrend
Panda Free Radio
The Havenshire Poacher


AHU Media Channels with Dynamic Anti Jamming Technology >>
Covert Encrypted Pirate Mirror Channels are also active in case of technical problems.

TV: (Both HD Analogue and Digital via Satellite Grid, Unencrypted and DRM Free)
Hack The Planet Channel
Telecomix Azeroth News Agency

Pirate TV Satellite Service: Hack The Planet TV Azeroth (Part of the Hack The Universe TV: Intergalactic Pirate Satellite TV Network)
Subscription is a one time payment for the hardware dish receiver with DVR and multimedia and networked device playback plus all other Sat TV features. After that, service is FREE! Content is encrypted but DRM Free. Rip away.

Radio: (Shortwave HF and Satellite channels Excludes Numbers Stations)
Hack The Planet Radio
Voice of Azeroth
Telecomix Azeroth Interfax
Free Azeroth Radio
_____________________________________________________________________

Civil Defence and DEFCON Systems >>

Defense Condition (DEFCON):
DEFCON 5 >> Peace
DEFCON 4
DEFCON 3
DEFCON 2
DEFCON 1 >> WAR!

Threat Level (THREAT-CON)
RED 5 EPSILON >> PANIC!
ORANGE 4 OMEGA
YELLOW 3 GAMMA
BLUE 2 BETA
GREEN 1 ALPHA >> SAFE

Emergency Broadcast System (EBS)

View
NUMBERS STATION Revised
0096 2251 2001 8105 1211

I have revised the Numbers Station Document to include Numbers Relay Pages and some of my own fictional Numbers Relay Pages too.

TOP SECRET SCI EYES ONLY
Telecomix Intergalactic
Telecomix Crypto Munitions Bureau Erebus Network Project

The Telecomix Crypto Munitions Bureau under the order of Cipher Cat has deployed the Erebus Project. The Erebus Project is a series of covert Numbers Stations that are scattered across the land in a complex network of terminals utilizing the highly classified TCMB CYPHER Crypto System.

This network of covert shortwave radio stations is connected to a central network of closed loop Erebus Network Lines that cannot be tapped into and are totally hack proof and magically shielded. But they also have satellite comm lines too as a back up. These secure lines are used to send the messages to be broadcasted out to each station. They are also used to send the random seed values generated by the Cryptographically Secure Pseudo Random Number Generator (CSPRNG) in each terminal in the event of a Cypher Compromise. These lines are encrypted with a special Crypto System called Cyber Saber.

This open source tiny algorithm is able to be forged into your own personal crypto algorithm. Darken Rahl forged the Cyber Saber that is used in the Erebus Lines. He wrote a special One-Time Pad based Stream Cipher that uses special One-Time Key Files consisting of random binary data generated with a processor that has dual Quantum Random Number Generators (QRNGs) built into the die itself. QRNGs use the unpredictability of photons to generate truly random sequences of numbers. These are not Pseudo-Random in anyway.

These Key Files are used encrypt and decrypt the messages sent across the lines. After a message or seed value is sent to a station, the Key Files are securely erased and changed automatically by the system. The Key Files themselves are stored in tamper proof secured cryptographic modules and cannot be accessed by the users or any unauthorized hardware and software. There are Anti-Magic Components in these chips which will vaporize them if they come in contact with any form of magical energy. The Key Files will self destruct if the chip is tampered with in anyway.

Each Station uses the One-Time Pad in order to remain perfectly secure. Unlike the QRNGs used to generate the Key Files, the CYPHER Crypto System uses CSPRNGs to generate the Cyphers. However, the random seed vales used to feed the CSPRNGs do use QRNGs to ensure that the seed values are unpredictable. These seed values are then sent via the Erebus Lines to all the other stations to ensure that we don’t have to issue pads unique to each station.

The Original CYPHER Crypto System was cracked on Middle Earth due to a Zero Day Exploit that we had no idea even existed. The Erebus Lines were not compromised themselves.

Each Cypher has a unique identifier called the Key Fingerprint. This identifies exactly what the Cypher File is in use. It is generated by encrypting the Random Seed Value and then sending it across the Erebus Lines as a Ciphered Message Authentication Code (CMAC). It used a special Block Cipher called the Telecomix Encryption Standard (TES) however it was operating in Electronic Code Book (ECB) Mode. This is a very insecure mode and not to mention it used 128 bit keys which is not really secure now a days. Because of this weak encryption scheme it was possible to extract the Random Seed from the Key Fingerprint. Once you have the Seed you can create an exact clone of the Cypher File. Also the CSPRNG was compromised too due to it being a software based RNG.

An example of this is shown below.

Key Fingerprint: 0×1D078D43544145770D2FF055F1D6598A3761D972
CSPRNG Value: 0xF2BE1FC7B6EF1463057C0CB658AF88CC

As a result we updated the CYPHER Crypto System to include two other input values. But first we changed the system to use the terminal’s built in Dual QRNGs to generate the Random Seed Value and use that Seed to create an Initialization Vector (IV) for the new TCMB Polymorphic Mutating Block Cipher which is a fork of the Digital Fortress Polymorphic Mutating Encryption Algorithm. This is a cipher that operates on Cipher Block Chaining (CBC) Mode by default. This one uses a Polymorphic Engine with a QRNG to enhance the Rotating Cleartext Function. Then the operator enters a User Defined Key to further scramble the Random Seed Value and the IV. Finally all of this is used to generate the Key Fingerprint.

An example of the new system is shown below.

Key Fingerprint: 0×371B62A0CBB78CBACE936E0D5674E550C517ED5E
QRNG Value: 0×86937C774E6C11874008DE6C784B9BF0
IV: 0×85D6E58A46C3ED59F2B7F9A39865A618
User Defined Key: 0×7438DA33EBE97E9782299FAC29D6DC22

Each terminal uses the Telecomix Cipher Operating System with the Marutukku Cryptographically Secure and Deniable File System. To ensure that the keys are not compromised, the Marutukku File System has been modified to become a RAM File System. If the station is compromised and the power is cut off or the computers are damaged, the files are wiped from the system because of the fact that RAM is wiped every time the computer is powered off.

To begin a broadcast, first you input a series of randomly assigned numbers that are converted into HEX values to begin the initialization process of the Cypher. This will determine the values for a iteration of the Cypher. There are multiple iterations for each Cypher File. The core of this system lie in a series of blocks. Cypher Blocks and Key Blocks. For each Cypher Block there are 5 Key Blocks. In total there are 8 Cypher Blocks and 40 Key Blocks.

Once the IV values are entered they are XOR’d with the pre determined QRNG values in the Cypher Blocks. The Cypher Blocks are in charge of the distribution of the values for the Key Blocks. Each Cypher block based on the current QRNG seed built in then uses a CSPRNG to distribute the keys to each Key Block. This function is used to obfuscate the distribution of the keys to ensure that no pattern appears.

Once this is done then you have your Cypher mostly completed. Now you can broadcast the numbers and the computer will handle the permutations of the Key Blocks as you broadcast the message. You will have enter the sub key values after each group is sent. The terminal utilizes biometric voice recognition software to prevent unauthorized people from broadcasting false messages.

The Cypher File can be securely downloaded and saved to an external device although is not recommended that you do this as you risk the file being compromised. If you have to save the file to another system then you should save it to a secured cryptographic device that has no network interfaces wired or wireless. One such device would be the ultra secure Iron Key USB flash drive with a built in secured secure cryptographic module and a tamper proof design. You will have to perform the permutations manually if the Cypher File is on an external device but before you can do that, you must load the Cypher File into the station terminal.

The reason you must perform the permutations manually is because of the fact that when the Cypher File is downloaded, the CYPHER Software will automatically alter the Cypher’s Hash Checksum with a flag that indicates the file was downloaded and thus possibly compromised. If this flag is detected by the computer then the distribution of the Key Blocks from the Cypher Blocks will come directly from the QRNG instead of the CSPRNG. So you will have to calculate the permutations manually.

Each person who is a Field Agent will be issued a One-Time Pad to decrypt the messages.

Officially these stations do not exist.

The other part of the Erebus Program are the Numbers Relay Pages (NRPs). These are minimalist pastebin type sites that allow people to post Numbers Messages. These sites are public and everyone with an outernet connection can enter and post a message. Everyone is free to read all the messages but only those with the correct One-Time Pad can decrypt them. IP addresses are not logged and they can be hosted on just about every computer or cloud service that is capable of web hosting. Connections are routed randomly across the outernet to avoid tracking. All you have to do is type in a username in the name field and paste your Numbers Message into the paste field and hit Send Paste. Your Numbers Message will then be sent to the server and ready to be read. Each post will look like this:

Example:

Message posted by WAR10CK on January, 01, 2014 at 5:00:32 EST

307
Number 114
Group 034

04090 03403 29286 20356 38122 33628 55375
52145 01500 99398 83458 04554 59754 96338
86434 49249 93679 64770 62798 19244 44996
19794 49378 27271 80437 14363 98605 24798
56999 85443 72665 99182 64776 49871

NOTE: You can format the Numbers Message in any way you like.

A few of the available NRP Pages recommended by Telecomix Crypto Munitions Bureau are as follows:

NumbersBin >> NumbersBin API, OTR, No IP Logs
AnonNumbers >> ZeroBin PHP Software, OTR, No IP Logs
TheNumbersStation >> DoxBin API, OTR, No IP Logs
TorNumbers >> DoxBin API with .onion domain, OTR, No IP Logs
I2Numbers >> DoxBin API with .i2p eepsite domain, OTR, No IP Logs
PasteNumbers >> ZeroBin PHP Software, OTR, No IP Logs
Telecomix Numbers Relay Page >> TCMB PasteBin API, .anon domain, OTR, No IP Logs
Cryptoanarchy Numbers Relay Page >> TCMB PasteBin API, .anon domain, OTR. No IP Logs

The best one is NumbersBin because it uses the TCMB PasteBin API maintained and developed by Telecomix Intergalactic and the TCMB. The TCMB PasteBin API is a modified PasteBin API that allows for Off The Record connections and never logs IP Addresses EVER! It also allows for the new TCMB-Numbers-Web-Station that is a Sound Cloud/Web Radio Podcasting Service. This is a new service that just exited beta that allows you to run your own Audio Numbers Station on the web as a podcast. You can transmit anything you want and use Voice, Morse Code, Polytone MFSK, and Digital Transmission sound formats. All audio sent to the service will be encoded in and or converted to the lossless .wav format. The NumbersBin Service is run by the WAR10CK. The URLs are as follows:

numbersbin.nerr
numbersbin.i2p
numbersbin.anon
numbersbins03gjsfdda.onion

Besides these intergalactic URLs, The WAR10CK has released the source code for NumbersBin. His new NumbersBin API is now ready for download at any of the NumbersBin URLs or the Source Forge page numbersbin.sourceforge.nerr

Now anyone can run their own NumbersBin service. The NumbersBin API even supports the TCMB-Numbers-Web-Station! Here are some of the following new NumbersBin services that have been created now:

numbersbin.azeroth.anon
numbersbin.rokugan.ninja
numbersbin.westeros.anon
numbersbin.ME.anon

NOTICE: NRPs are for Numbers Messages ONLY! Only Encrypted Messages and or discussions about relaying encrypted messages are allowed to be posted. This is not your own blog nor is it a pastebin that you leave your random unrelated stuff on. Anything that is not Numbers Related may be deleted!

Same with the TCMB-Numbers-Web-Station. It is not a place for you to run your own talk/squawk radio show or pirate music station. You must include Numbers Messages routinely. All audio on the station is not live and one way only. So for example, running a music station or talk show with Numbers Messages in it is ok. Streaming the Alex Jones Show with absolutely no Numbers Content is not.

A example of what this means is this: One of the regulars is the Voice of Northrend, it consists of the following:
A introduction and announcements segment, some news and entertainment segments, some Numbers Messages, some more misc content, and finally a conclusion segment.

End of line

View
NUMBERS STATIONS
0096 2251 2110 8105


Since World War II Intelligence agencies have used secret stations to send encrypted assignments to agents in the field.

Unlike digital and cellular communications, these shortwave broadcasts of encoded numbers are untraceable.

Governments deny the use of these so called Numbers Stations yet they can still be heard today.

Google the term Numbers Station and search for them on youtube. They do exist and you can actually listen to them on the radio even now.

This is essentially a way for anyone who is interested, to implement Numbers Stations into their campaign. Feel free to use, copy, and modify if needed.

TOP SECRET CRYPTO 5 SCI EYES ONLY
Cipher Cat Operations
Telecomix Crypto Munitions Bureau
Erebus Network

The Telecomix Crypto Munitions Bureau under the order of Cipher Cat has deployed the Erebus Project. The Erebus Project is a series of covert Numbers Stations that are scattered across the land in a complex network of terminals utilizing the highly classified TCMB CYPHER Crypto System.

This network of covert shortwave radio stations is connected to a central network of closed loop Erebus Network Lines that cannot be tapped into and are totally hack proof and magically shielded. But they also have satellite comm lines too as a back up. These secure lines are used to send the messages to be broadcasted out to each station. They are also used to send the random seed values generated by the Cryptographically Secure Pseudo Random Number Generator (CSPRNG) in each terminal in the event of a Cypher Compromise. These lines are encrypted with a special Crypto System called Cyber Saber.

This open source tiny algorithm is able to be forged into your own personal crypto algorithm. Darken Rahl forged the Cyber Saber that is used in the Erebus Lines. He wrote a special One-Time Pad based Stream Cipher that uses special One-Time Key Files consisting of random binary data generated with a processor that has dual Quantum Random Number Generators (QRNGs) built into the die itself. QRNGs use the unpredictability of photons to generate truly random sequences of numbers. These are not Pseudo-Random in anyway.

These Key Files are used encrypt and decrypt the messages sent across the lines. After a message or seed value is sent to a station, the Key Files are securely erased and changed automatically by the system. The Key Files themselves are stored in tamper proof secured cryptographic modules and cannot be accessed by the users or any unauthorized hardware and software. There are Anti-Magic Components in these chips which will vaporize them if they come in contact with any form of magical energy. The Key Files will self destruct if the chip is tampered with in anyway.

Each Station uses the One-Time Pad in order to remain perfectly secure. Unlike the QRNGs used to generate the Key Files, the CYPHER Crypto System uses CSPRNGs to generate the Cyphers. However, the random seed vales used to feed the CSPRNGs do use QRNGs to ensure that the seed values are unpredictable. These seed values are then sent via the Erebus Lines to all the other stations to ensure that we don’t have to issue pads unique to each station.

The Original CYPHER Crypto System was cracked on Middle Earth due to a Zero Day Exploit that we had no idea even existed. The Erebus Lines were not compromised themselves.

Each Cypher has a unique identifier called the Key Fingerprint. This identifies exactly what the Cypher File is in use. It is generated by encrypting the Random Seed Value and then sending it across the Erebus Lines as a Ciphered Message Authentication Code (CMAC). It used a special Block Cipher called the Telecomix Encryption Standard (TES) however it was operating in Electronic Code Book (ECB) Mode. This is a very insecure mode and not to mention it used 128 bit keys which is not really secure now a days. Because of this weak encryption scheme it was possible to extract the Random Seed from the Key Fingerprint. Once you have the Seed you can create an exact clone of the Cypher File. Also the CSPRNG was compromised too due to it being a software based RNG.

An example of this is shown below.

Key Fingerprint: 0×1D078D43544145770D2FF055F1D6598A3761D972
CSPRNG Value: 0xF2BE1FC7B6EF1463057C0CB658AF88CC

As a result we updated the CYPHER Crypto System to include two other input values. But first we changed the system to use the terminal’s built in Dual QRNGs to generate the Random Seed Value and use that Seed to create an Initialization Vector (IV) for the new TCMB Polymorphic Mutating Block Cipher which is a fork of the Digital Fortress Polymorphic Mutating Encryption Algorithm. This is a cipher that operates on Cipher Block Chaining (CBC) Mode by default. This one uses a Polymorphic Engine with a QRNG to enhance the Rotating Cleartext Function. Then the operator enters a User Defined Key to further scramble the Random Seed Value and the IV. Finally all of this is used to generate the Key Fingerprint.

An example of the new system is shown below.

Key Fingerprint: 0×371B62A0CBB78CBACE936E0D5674E550C517ED5E
QRNG Value: 0×86937C774E6C11874008DE6C784B9BF0
IV: 0×85D6E58A46C3ED59F2B7F9A39865A618
User Defined Key: 0×7438DA33EBE97E9782299FAC29D6DC22

Each terminal uses the Telecomix Cipher Operating System with the Marutukku Cryptographically Secure and Deniable File System. To ensure that the keys are not compromised, the Marutukku File System has been modified to become a RAM File System. If the station is compromised and the power is cut off or the computers are damaged, the files are wiped from the system because of the fact that RAM is wiped every time the computer is powered off.

To begin a broadcast, first you input a series of randomly assigned numbers that are converted into HEX values to begin the initialization process of the Cypher. This will determine the values for a iteration of the Cypher. There are multiple iterations for each Cypher File. The core of this system lie in a series of blocks. Cypher Blocks and Key Blocks. For each Cypher Block there are 5 Key Blocks. In total there are 8 Cypher Blocks and 40 Key Blocks.

One the IV values are entered they are XOR’d with the pre determined QRNG values in the Cypher Blocks. The Cypher Blocks are in charge of the distribution of the values for the Key Blocks. Each Cypher block based on the current QRNG seed built in then uses a CSPRNG to distribute the keys to each Key Block. This function is used to obfuscate the distribution of the keys to ensure that no pattern appears.

Once this is done then you have your Cypher mostly completed. Now you can broadcast the numbers and the computer will handle the permutations of the Key Blocks as you broadcast the message. You will have enter the sub key values after each group is sent.

The Cypher File can be securely downloaded and saved to an external device although is not recommended that you do this as you risk the file being compromised. If you have to save the file to another system then you should save it to a secured cryptographic device that has no network interfaces wired or wireless. One such device would be the ultra secure Iron Key USB flash drive with a built in secured secure cryptographic module and a tamper proof design. You will have to perform the permutations manually if the Cypher File is on an external device but before you can do that, you must load the Cypher File into the station terminal.

The reason you must perform the permutations manually is because of the fact that when the Cypher File is downloaded, the CYPHER Software will automatically alter the Cypher’s Hash Checksum with a flag that indicates the file was downloaded and thus possibly compromised. If this flag is detected by the computer then the distribution of the Key Blocks from the Cypher Blocks will come directly from the QRNG instead of the CSPRNG. So you will have to calculate the permutations manually.

They are all set up and will start broadcasting encrypted messages by the end of the month. Each person who is a Field Agent will be issued a One-Time Pad to decrypt the messages.

Officially these stations do not exist.

End of line

View
Middle Earth Infrastructure Status Report 07

Announcing the Middle Earth Encryption Standard

KHAZAD: A 128 bit Legacy Level Block Cipher.

Documentation and reference implementation files are ready to download at h4xx0rz.ME.nerr and SourceForge.ME.nerr

The Khazad Cipher passed our Test Vectors and Analysis Tests! Middle Earth now has its very first encryption standard! May it serve us well. This has been cleared to protect classified information up to the Top Secret SCI Level on Middle Earth Only. Just like the encrypted files on my sword drive are now using the Khazad Algorithm.

So far our enemies have not been able to break this cipher and it has been widely adapted to our systems in all cryptographic applications. We have decided to use it in various modes of operation including ECB and CBC modes.

View
Middle Earth Infrastructure Status Report 06

Today a rather curious event occurred.

Us hackers who are running the deployment of the Middle Earth IT received a 128 bit Symmetric Key Block Encryption Algorithm from an anonymous source. It uses 64 bit blocks and 128 bit keys. The Package of papers included spec documentation and source code. There was no computer disks or portable storage devices included. Just papers and that’s it.

The most interesting thing is that the Substitution or S-Box is identical to the Rjindael S-Box. Like this:

The Khazad S-box
|00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F ---|--|--|--|--|--|--|--|--|--|--|--|--|--|--|--|--| 00 |BA 54 2F 74 53 D3 D2 4D 50 AC 8D BF 70 52 9A 4C 01 |EA D5 97 D1 33 51 5B A6 DE 48 A8 99 DB 32 B7 FC 02 |E3 9E 91 9B E2 BB 41 6E A5 CB 6B 95 A1 F3 B1 02 03 |CC C4 1D 14 C3 63 DA 5D 5F DC 7D CD 7F 5A 6C 5C 04 |F7 26 FF ED E8 9D 6F 8E 19 A0 F0 89 0F 07 AF FB 05 |08 15 0D 04 01 64 DF 76 79 DD 3D 16 3F 37 6D 38 06 |B9 73 E9 35 55 71 7B 8C 72 88 F6 2A 3E 5E 27 46 07 |0C 65 68 61 03 C1 57 D6 D9 58 D8 66 D7 3A C8 3C 08 |FA 96 A7 98 EC B8 C7 AE 69 4B AB A9 67 0A 47 F2 09 |B5 22 E5 EE BE 2B 81 12 83 1B 0E 23 F5 45 21 CE 0A |49 2C F9 E6 B6 28 17 82 1A 8B FE 8A 09 C9 87 4E 0B |E1 2E E4 E0 EB 90 A4 1E 85 60 00 25 F4 F1 94 0B 0C |E7 75 EF 34 31 D4 D0 86 7E AD FD 29 30 3B 9F F8 0D |C6 13 06 05 C5 11 77 7C 7A 78 36 1C 39 59 18 56 0E |B3 B0 24 20 B2 92 A3 C0 44 62 10 B4 84 43 93 C2 0F |4A BD 8F 2D BC 9C 6A 40 CF A2 80 4F 1F CA AA 42
Unlike the Serpent S-Box which is a simply Binary S-Box this one is essentially a look up table. Here is the Serpent S-Box:

S0: 3 8 15 1 10 6 5 11 14 13 4 2 7 0 9 12
S1: 15 12 2 7 9 0 5 10 1 11 14 8 6 13 3 4
S2: 8 6 7 9 3 12 10 15 13 1 14 4 0 11 5 2
S3: 0 15 11 8 12 9 6 3 13 1 2 4 10 7 5 14
S4: 1 15 8 3 12 0 11 6 2 5 4 10 9 14 7 13
S5: 15 5 2 11 4 10 9 12 0 3 14 8 13 6 7 1
S6: 7 2 12 5 8 4 6 11 14 9 1 15 13 3 10 0
S7: 1 13 15 0 14 8 2 11 7 4 12 10 9 3 5 6

See? Big difference.

Not to mention that it is generated in a pseudo random manner and the algorithm is self
inversing unlike Rjindael. Which is very nice because this means we can integrate a CSPRNG or even a HRNG into it if used in a Secure Cryptographic Processor.

Its small size makes it compatible with even 8 bit processors. It runs very fast and uses minimal memory and CPU cycles. This makes it perfect for running them on Smart Cards that only have 8-Bit chips. This also makes it good for micro computer deployment as well.

If the party headed for Fort Knox said they could not find a finer blade, then we could not find a finer cipher.

There was no name given and the only thing that we know is that the name of this cipher is
KHAZAD. The person who delivered it has severe lacerations on his back and was in horrible shape. But there was no bleeding. It was almost as if he was mercilessly lashed with a flaming whip.

We have uploaded the algorithm to our new outernet site SourceForge.ME.nerr and are now running it through our Test Vectors. If this works them we will finally have a Middle Earth Encryption Standard or MEES for short. The most unique thing about this cipher is that it appears to work on even the oldest computers. This is a Legacy Block Cipher. Due to it being a Public Domain Algorithm and Open Source, people can create forks of them and perhaps improve key sizes. Right now we want to how it works in a CMAC mode.

This should be very interesting. As of now we are still unable to figure out who sent it or wrote it. But one of the Dwarves has an idea who our unknown cryptographer is. But he will not be allowed in our safe haven if it is who I think it is. As of now, the earthlings have not been able to crack this code despite the fact that it uses only 128 bit keys.

End of line.

View
Middle Earth Infrastructure Status Report 4
Linux FTW!

Middle Earth Infrastructure Status Report No. 04

All of the Middle Earth infrastructure has been finalized in the Elvish Sector at this stage. We are now installing the Linux OS on all terminals and computers in the facilities and teaching the Elves how to install, boot, deploy, and use Linux. They are really good at this and are catching on with minimal issues.

Credit and thanks goes to the Gnomes for developing the GNU Network Object Model Enviroment or GNOME as a Graphical User Interface.

We are amazed at the fact that they can use the Command Line Interface with ease. Their hands just fly across the keys and they have almost no need to use the GNOME Interface. Unlike other races such as Trolls, Goblins, and Orcs who can’t type commands for crap. So they rely on GNOME almost exclusively.

Our Supercomputer System known as The Wiz is being hooked up right now even as we speak. It will be using Beowolf Clustering method because it is the most well known and most popular method for Supercomputing clusters. Its parallel processing capabilities are the best in the field.

They Elves have chosen to use the Debian Distribution for its many packages. Personally Darken Rahl uses the Backtrack 5 R3 Distribution for its hacking capabilities. We are surprised that they did not decide to use Red Hat as it is the most common one out there.

The Trolls, Goblins, and Orcs all chose the Ubuntu Distribution for its ease to use obviously. This is because they are not that intelligent when it comes to technology and it is very hard for them to learn.

End of line.

View
Middle Earth Infrastructure Status Report 5
Linux FTW

Middle Earth Infrastructure Status Report No. 05

Already the people of Middle Earth are inventing new standards for computers.

The Elves have created a new file format for use in computers. The Executable and Linkable Format or ELF format is a universial executible file format compatable with most operating systems.

The Dwarves have also invented a sophisticated universal debugging data format called Debugging With Attributed Record Formats or DWARF. So far they have made improvements to the format in DWARF-3 but they expect to deploy there next version 4 after they complete the beta testing.

We now know that the wizards use Linux Distros called Sorcerer or Source Mage.

We will report more on this when we have more information.

End of line.

View
Campaign: Space Pirate Science: Extermination
Pray for the people trapped inside. Prey that they never get out.

Inside an underground Orc fortress complex the Space Pirate Science Team found deposits of raw blue Phazon a couple hundred meters under it. Taking the opportunity to use this, a large research facility was constructed adding three more levels to the complex, and the orcs already inside would make ideal test subjects. Additionally safeguards were installed in fortress levels too in order to prevent incidents from occurring.

So while the orcs were conducting their usual cruel business, unknowingly beneath their feet the Science Team is working around the clock running experiments and doing research on all sorts of different lifeforms.

One day during a Phazon infusion experiment with an Orc whip torturer, the subject broke out of its status tank and escaped. The alarms all through the dungeon while the security command center displayed in ruby red text: CONTAINMENT BREACH! BIOHAZARD WARNING!.

A scientist working in the lab where the orc was running loose called security command over the red phone. “THIS IS NOT A DRILL! SEAL THE BUILDING NO ONE IN OR OUT!” the man said over it.

At that moment, large blast resistant containment doors started sliding out of the walls throughout the entire facility, sealing off every sector one by one. The workers and scientists who try to flee become trapped behind the containment doors with no way out.

Meanwhile the orcs and other lifeforms in the other areas escape their containment units as well and feed on the people trapped inside the quarantine lockdown. Containment doors that were installed in the fortress levels begin to close and panic begins to spread throughout. Everyone in the fortress attempts to escape but are either killed in the chaos or trapped. Some are even crushed by the containment doors while struggling to get through them.

Only one person makes it out of the complex as the last containment door slams shut behind her. Now this survivor who made it out said the fortress and the laboratories beneath are filled with dangerous monsters that could potentially escape the facility despite the blast doors blocking off all sectors. And if they do, then the land is forever screwed.

Now she is seeking out the strongest and most valiant warriors and people to enter the fortress and slay every escaped experiment inside.

Untill then, prey for the people trapped inside. Prey that they never get out.

View
Space Pirate Log no. 1.452.52
The Temple of Illumination.

THE TEMPLE OF ILLUMINATION
THE ILLUMINATI SANCTUARY AND THE LAST AIRBENDERS SECRET HOME
By Jordan Trujillo.

Chapter 1: The City of Light

It was a huge climb up the colossal mountains of the earth kingdom. Crimson Demon and Sekmeleon Oria were walking to a sacred place.

“Where are you taking me Crimson Demon?” said Sekmeleon who was getting tired of walking. “To a very special place Sek, Actually is a place you might have heard about before. Are you aware of a person called the avatar?” said Crimson Demon. “Yeh he’s the last air bender on the planet. What about him?” Sekmeleon asked.

“I know where he lives.” said Crimson. “NO WAY! No you don’t, no one knows that!” said a skeptical Sekmeleon. “Oh I forgot to tell you a lot of stuff went on during your confinement in the seal sphere. I let you out because you were deemed not a threat to the public anymore.” Crimson Demon said with a smug grin. “BUT” he said in a stern voice, “if you go on another rampage again, like in the T-Rex Demon incident, I will have you returned to the seal sphere.”

“I am capable of doing that you know, just like I did with Marilarnu & Javara in the Dark Combat incident. So don’t say you weren’t warned.” Sekmeleon gulped and nodded without a word.
“Oh and those two are terrified of you now because of that little incident, so nice job on that hero.” Crimson Demon said sarcastically.

The two continued the hike but Sekmeleon said he needed to take a break. Crimson Demon agreed and the sat on a bench like rock. Sekmeleon took out his water sack and drank while Crimson Demon sat down too. “So enlighten me on how you know where the avatar lives.” said Sek. “Oh yeh, right” said Crimson. “Well, you see it’s not as simple as you think.” he said.

He pulls out a bronze medallion and hands it to Sekmeleon. It displays a 13 level pyramid with a glowing eye at the top of it. There are also 2 Latin words on either side of the eye saying ANNUIT COEPTIS. Also at the bottom in a banner is the Latin phrase NOVUS ORDO SECLORUM.

“This is the Temple of Illumination. It’s a secret sanctuary constructed before the fire kingdom wars, by a secret society known as the Illuminati. It serves as a HQ to them and a sacred place where the 4 elements are united as one.” said Crimson Demon.

“Oh that’s right, The place where all the kingdoms are united as one.” Sekmeleon said. “I read about it in a scroll in the great library. But it’s just a legend. No one has ever found it.” he said. “Well I am ready. Let’s continue on shall we?” Sekmeleon said. Crimson Demon agreed and they resumed walking.

Five hours later they reached the top of the mountain and looked at the area ahead. “This is it. We have arrived.” said Crimson Demon. In the valley below there was a towering pyramid with a massive city surrounding it. A great lake was to the east, a volcano to the west, a windy area to the north, and a dense jungle to the south. At the top of the pyramid is a giant glowing fiery eye floating above.

Sekmeleon was in shock as he looked at it. “Oh… My… God… It is real.” he said in wonder.
Crimson Demon walked up to Sekmeleon and said “Welcome to the City of the Enlightened Ones. Yes its beautiful is it not? This is the place that I wanted to show you. The reason no one found this place is because no one knew where to look.”

Chapter 2: Security and the ASE

As Sekmeleon headed forward Crimson Demon cried “NO WAIT, STOP!!! YOU’LL GET…” but it was too late. Sekmeleon felt a chill as a rough monstrous voice in his mind said "SEKMELEON ORIA DEMON PRINCE OF THE 8TH HELL, YOU DON’T BELONG HERE!!!” He immediately froze and saw the eye staring right at him and glowing brighter than before. Crimson Demon pushed him out of the way, as a fiery beam of light shot out of the eye burning off the left side his armor and the hairs of his skin.

The beam of light passed harmlessly through Crimson Demon as he said something in an unknown language. The eye immediately turned to his direction and after more nonsensical talking the glow return to normal and the eye went back to watching the lands.

Sekmeleon who was shocked stood up and was breathing rapidly and heavily. “WHAT THE HELL WAS THAT!?!” he gasped. “The cities defense system.” said Crimson Demon calmly. “That is the all seeing eye formerly known as the eye of Sauron. It did not recognize you and thought that you were an enemy.” he said. “Why did it not burn you?” Sekmeleon asked. “Because it doesn’t harm people it knows as friends.” Crimson Demon said.

“What!?! You are friends with these people!?!” said Sekmeleon. “Yes because I helped build this place. I am the one who designed the plans for the entire area.” said Crimson Demon. “NO WAY!!! THAT IS NOT POSSIBLE!!!” exclaimed Sekmeleon. “It is Sek. It is.” said Crimson.

“So shall we proceed to the city Sekmeleon?” he said. “I don’t know, I don’t wanna get fried by that eye again.” Sekmeleon said nervously. Crimson Demon assured him “Don’t worry I told the eye that you are a friend of mine.” “However” he said sternly, “it said that you are not to transform into any type of demon while in this or any other area it watches. Or else it will see you as a foe and attack without warning. GOT IT!?!”.”Yes" said Sekmeleon. “Good” said Crimson.

They both proceeded down the mountain and into the dense jungle. As they were walking Sekmeleon said "Hey Crimson Demon do you mind if I ask you a question.” “Sure” Crimson said "fire away.” “Is there any other way into this place besides this mountain path?” Sekmeleon asked.

“There are only 3 ways into this place. The first is the main gateway over there.” Crimson Demon pointed south, to an ornate gateway cut into the mountain with large doors controlled by a complex locking mechanism. Next he pointed to another gateway to the east with a harbor. There were also large doors blocking the way in.
“The second one is the lake harbor over there. Finally the path we took is the third way.” he said.

6 hours later when they arrived at the first entry point Sekmeleon looked at it. It is huge with large ornate stone carved doors, each showing half of a diamond shaped figure. “These doors are actually 6 feet thick solid steel. The stone serves as a coating over the emblem and door. Right now the doors are open because there is no threat in this sector. But when an army tries to attack, these doors are locked down and the eye will attack anything trying to breach them.” Crimson Demon said.

6 hours after that they arrived at the second entry point he saw massive doors secured by another complex locking system blocking off the lake entry area. “These doors are also made of 6 foot thick solid steel. But these are always closed unless supply ships pass through. The eye also watches this door too.” Crimson Demon explained.

“Any types of hostile attacks from outside forces will attract the attention of the eye. Also the all seeing eye can focus on multiple things at once and attack them too. So this city is impossible to attack.” he said.

Sekmeleon asked why was this city built. Crimson Demon explained "During the wars we needed a secret location that the 4 kingdoms can come together and discuss matters between them.

So I came up with plans for a remote city with a great temple, but that was not enough for that friggen fire kingdom and their stupid machines might be able to breach the city. So we needed a safe guard to protect the city from any threat it might face.

Now using the Illuminati’s infiltration capabilities, we managed to steal Sauran’s all seeing eye and place it at the apex of the city to serve as a guard that watches not only the city itself but all the sacred cities and locations too.“.”So let’s go to the temple.” said Crimson. “Ok.” said Sekmeleon.

As they approached the pyramid someone ran into Sekmeleon. Sekmeleon got real mad and transformed into the wolf demon mazaku and tore him apart spraying blood everywhere. The eye immediately became brighter and focused on him. Then it let him have it with a fiery laser blast.

A black and smokey Sekmeleon changed back to normal and was a little shocked. “O…k. So you weren’t kidding when you said that.” said Sekmeleon. “Why, did you think that I was kidding!?!” Crimson asked. “Because I did not think that you had the capabilities to do something like that” Sekmeleon said. “It was not me that did that. Blame the eye. Oh and I wouldn’t advise attacking it either cuz it is impossible to kill” Crimson Demon explained. Sekmeleon decided wisely to move on.

The two stepped up to the temple doors and they were huge. The massive locking mechanism was really complex. As Crimson Demon approached the doors he placed the medallion in a recess on the door. The doors carvings instantly lit up with a green glow revealing a hidden symbol the pyramids emblem. It was an ambigram of all the elements EARTH AIR FIRE WATER united in a diamond shape.

“Is that the…” Sekmeleon asked. “Yes it is the symbol for the Illuminati diamond.” Crimson replied cutting him off. The diamond was placed here for safe keeping after the Firedagger incident. This was the only place that it can be hidden safely from any evil.

A large floating icon of a pyramid with rings around the eye on top appeared on the door. He aligned the rings and they disappeared. The temple door’s locking system clanked open and they slowly slid open revealing the beautiful antechamber. The center of the floor was a masterpiece of art, the temple emblem made with multiple colors of marble tile along with the ILLUMINATI ambigam made of solid platinum inset in the middle. On each corner of the emblem was the ambigrams each element. EARTH made of solid brown topaz, AIR made of solid diamond, FIRE made of solid ruby, and WATER made of solid sapphire. Fountains and waterways adorn the sides and corners of the chamber. 4 doors in the room lead to the other areas of the temple. One leads to each sector dedicated to one element. Each door has the Illuminati diamond ambigram on it. But each door has the element of its sector colored in on the diamond with the elements color.

Sekmeleon was amazed at the size of the place and was looking at the ornate floor. “These stones must be worth a fortune” he said. “Yes they are.” Crimson replied. "And don’t even think about looting this place. It has safe guards to protect the Illuminati’s sacred treasures.”

“Like what, traps?” asked Sekmeleon. “That and even better.” Crimson Demon said pointing to one of many red and blue chaos emerald sized gems dotting the whole place. They had what looked like moving eyeballs inside them.

“Those sentinel utility crystals are connected to the all seeing eye. They are scattered throughout the temple. They will fire deadly lasers at anyone who is a threat or a trespasser. These “eyes of ra” cannot be destroyed by anything. Also it is impossible to hide from them because they are every ware.

Also the all seeing eye and the safe guards are completely immune to magic so it is useless against them. Any raiding parties will be destroyed by the eye before they can even cross the city limits and no armor or protection magical or not can deflect the eyes and the cities defenses." explained Crimson.

Sekmeleon also took note of the solid gold Illuminati diamond ambigram on the main chamber ceiling. In the court yard there were space pirates practicing the art of earth, air, fire & water bending. Sekmeleon looked at the blood red Tarkatan samurai warrior. “Uh why?” he said motioning toward the space pirates.

“Oh yeah, their training to become part of a new special forces unit called the elemental elite. This is just a little side project I was working on and it has a very high success rate and I am hoping to get them on the field soon.” Crimson replied. After going through several more chambers and tunnels, opening and closing doors, Sekmeleon and Crimson Demon approach a very large stone door. A large sentinel crystal was on the door, it was focused mostly on Sekmeleon which was creeping him out. “Uh Crimson, why is that crystal staring at me?” he asked nervously. "Because it doesn’t know you well. The ASE is very suspicious of anyone entering the avatar’s chamber, do anything that it finds threatening and it will vaporize you.

The Crimson Demon revealed a control panel and interacted with it. This caused a ton of eyes in the walls, ceiling, and floor to open. Those eyes started to emit red laser beams and move random directions. Sekmeleon was yelling a lot of ouches, yows, and owws. “Oops, wrong code!” the demon said. He then inputted the sequence again and the lasers shut off and eyes closed. The door then hummed as the symbols glowed showing the illuminati ambigrams and temple seal. It then quietly opened up and they both stepped through.

They are now in the outer room where another door identical to the first one was blocking the way. Like the other one, a large sentinel crystal was on it and once again it was staring at the wolven warrior exclusively. This room was also covered with those laser eyes but these are still closed. “BTW demon what were those laser eyes that were burning me in that last room?” he asked. “Those were Sentry-eyes.” he explained. “They are part of the temple security systems. They are located in the high security areas of the temple. They are triggered by the presence of intruders and once activated they emit high intensity lasers that will burn through any part of the body that touches them.”

“They are in constant motion and the movements improvise randomly so it is impossible to dodge them. The speed and direction of the beams movement is totally random so it’s impossible to plan a way through them. they cannot be destroyed and magic will not affect them nor will it protect things from them. Also once the temple security systems are activated, an automatic lockdown is triggered and so is the alarm system too. When the alarms are activated security is alerted and will close in on all intruders in seconds. If anyone spots something suspicious they can trigger the alarms by remote.”

Chapter 3: The Avatar

“Well I guess the security here is insane like they say.” Sekmeleon said as the Crimson Demon was opening the door. “Got it.” the demon said as the second door glowed and opened. As they both stepped inside the door closed behind them and they were in a large open chamber with a large view of the outside. They saw a small boy wearing symbols meditating in the center of the open area. “So this is the demon prince of the eighth hell.” The boy said as Sekmeleon freaked out. "I saw what you did to that man on the way to this temple and advise you to never do that again!”

Ticked off and spooked Sekmeleon began to transform and yelled at him saying “WHO DO YOU THINK YOU ARE YOU LITTLEYYYEEEEEEEEEOOOOOOOOOOOOWWWWWWWWWW!!!” he screamed as a powerful stream of electricity shot through his body causing him to light up like a Christmas tree. “I am the avatar, the last air bender on earth. I can see everything Sekmeleon Oria!” the boy said as he let him go.

“Was that that stupid glowing fire eye again?” Sekmeleon asked. The avatar told him that he was the one who zapped him because he was defending himself. “Now welcome Sekmeleon Oria, to the city of light! I have been expecting you.” the avatar responded. “Been eating humans again haven’t you Da…MMMPPPPPPPHHH!!!” “Don’t tell him my real name. You will blow my cover!” said the demon with his hand over his mouth.

A few minutes later the avatar told Sekmeleon that the Crimson Demon brought him here to help find an artifact hidden in the sub sectors below the temple.”The space pirates are inspecting the lower levels but cannot find it so you gotta help them because you are a demon and so you might be able to find it. Also some prince called Valgar is in the outer room. I can’t shut off the laser defenses ether so you will have to deal with this yourself.” the kid said, The Crimson Demon went to the door steaming mad mumbling “Stupid prince how’d he get in here!?!".

He turned on the computer screen and the outer room feed came up. Valgar was seen doing a torturous break dance. “HEY DEMON DO YOU MIND GIVING ME A HAND HERE?” he shouted. “First of all how did you get in here?” the demon asked. Valgar told him that he was visiting the city when he saw the Crimson Demon open the pyramid. So he followed him inside and was hoping he would lead him to the avatar so he could challenge him to mortal kombat and prove he was invincible.
But he did not expect security like this to show up and, however he was cut off by him turning off the computer feed.

“So what’s up with him?” Sekmeleon asked. “Oh just something about trying to pick a fight with the avatar and what not. So any way you were saying?” the Tarkatan said smugly. “It appears that a very powerful artifact was hidden in the ruins located in the lower levels of the city but the problem is that it is in the fire sector. The satellites have pin pointed its location to the eruption chamber of the volcano and the only creature who can survive jumping into the middle of a volcanic eruption is a demon or one with the gravity suit and so that’s where you come in. We need you to go into the eruption chamber, navigate the lava channels, retrieve the artifact and bring it back to the lab, Oh and also bio-scans indicate that there might a Magmoor or 3 or 6 so I would be prepared for some fighting,"

“That is all Sekmeleon, now go forth and find that artifact before evil finds it.” the avatar said.

Chapter 4: Sekmeleon gets PW3ND by his arch enemy AGAIN.

While Sekmeleon is on his mission the crimson demon and the avatar were walking around the temple and chatting up a storm about every kind of topic one could think of. Suddenly a covenant guard told him that some weird Protoss mutant/hybrid with a hood and skull wanted to know where Sekmeleon Oria was because he had to give him something, The demon told him that he was at the volcano looking for something. The then guard left to tell this “thing” the location.

A few hours later the avatar asked the demon what is taking so long for Sekmeleon to get that artifact. “I don’t know he should be back by now. Lets go see where he is at.” he told the boy and they both raced to the temple command center. Once there the crimson demon pulled up the satellite images from the volcano sector. Just as soon as the map was up an alarm sounded and the computer displayed a red alert. Immediately the map homed in on Sekmeleon’s position with an alert bubble connected to his biochip dot. The kid typed in some commands and pulled up Sekmeleon’s biosigns. “He’s been hurt, badly!” the avatar exclaimed. The Tarkatan samurai rushed over and took a look at the screen.

“He died in the lava but someone revived him. He’s in the artifact chamber but someone is beating the crap outta him. He is at critical level, but this can’t be right. Our data shows that the Magmoors are terminated, but not by Sekmeleon. Someone else is there too and his biosigns are bigger then his. Looks like i am going to have to bail his butt out again,” the crimson demon said.
1 hour later at the artifact chamber the Crimson Demon rose from the magma wearing the gravity suit. He found Sekmeleon on the ground all torn up and barely alive. Gouldolth was standing over him about to finish him off when the demon stunned him with a charged wave beam blast. This gave him just enough time to grab the artifact and Sekmeleon and escape with both. Another hour later Sekmeleon woke up at the temple hospital inside a regeneration tank. Once he was released he was informed about the events that took place.

YOU SHOULDN’T HAVE INTERFERED!!! I WAS JUST ABOUT TO DEFEAT HIM!!!” he yelled. “EXCUSE ME!?!  YOU WERE ABOUT TO BE MINCE MEAT!!! IF I HADN’T SAVED YOUR SORRY BUTT YOU WOULDN’T BE HERE RIGHT NOW!!!” the demon yelled back. “Any way the most important thing is that Gizoid is secured and yes Sekmeleon Oria if the crimson demon hadn’t been there to rescue you you would have been dead. So you should thank him.” the avatar said.

“Also now that you are healed, you have a fight to finish with you enemy Gouldolth. So get your butt to the city arena and fight. The crimson demon and Shao Kahn are waiting for you.” he said. 5 minutes later at the arena everyone was present there including the avatar to watch the kombat. “ROUND 1: FIGHT!” yelled Kahn as they started to tear each other apart. 1 hour later at the end of round 2 Khan yelled “FINISH HIM!” what happened next was to grisly for words. “GOULDOTH WINS! FLAWLESS VICTORY! ULTIMATE BRUTALITY FATALITY!!!” Kahn yells. “Better luck next time Sekmeleon!” he said as he left the arena. All the kingdoms witnessed Sekmeleons defeat along with all the people on intergalactic TV. The footage was posted on outernet and meanwhile Valgar watched it at the hospital while getting himself pieced back together so to speak.

THE END.

View

I'm sorry, but we no longer support this web browser. Please upgrade your browser or install Chrome or Firefox to enjoy the full functionality of this site.