Cyber Security Malware SCP (first draft)


Object Class: Safe

Special Containment Procedure
SCP-XXXX is currently uncontained as there currently is now known method which is plausible for the containment of SCP-XXXX. Current research into an effective containment procedure is set to Zullo priority as information archived by SCP-XXXX is inaccessible by any means aside from direct access through SCP-XXXX-1 and has proven to be an effective utility for SCP Security Detail.

Original copy of SCP-XXXX-1 is to be stored onto a simple eight (8) gigabyte flash drive. Flashdrive containing SCP-XXXX-1 is to have no other save data other than the base copy of SCP-XXXX-1 to prevent corruption. Flash Drive is to be secured in secure storage locker (insert locker type here). Access to storage locker is strictly prohibited to any personnel without Level Four (4) Security Clearance or higher.

Copies of SCP-XXXX-1 are only to be created by Dr. ██ ████████ by request of Level 4 Security Clearance. Requester must possess a letter of clearance by at least two (2) personnel possessing Level 5 Security Clearance or one (1) O5 Member. Device containing a copy of SCP-XXXX-1, is to be produce by the technology developer front controlled by the SCP Foundation. In the case in which device is lost, the device will be remotely triggered to initiate protocol (redacted). In the case of device system breach, the device will automatically initial protocol (redacted).

Any result which don’t retrieve archive information are be regarded as possible creator’s of SCP-XXXX and are to be detained at first available chance away from the general public. If no immediate chance of apprehension is available, agents are to tag the person of interest with a Foundation GPS bug and forward tracking information to local Foundation agents working as local authorities at first available opportunity.

SCP-XXXX is a sentient malware program, which actively and covertly monitors camera’s and listening devices across the globe. Level of SCP-XXXX’s sentience is resticted to it’s ability to modify and adapt it’s code to avoid detection by cyber security programs. Program is also able to actively identify and monitor the activities of nearly every human being on the planet. Program then compiles and archives said information to SCP-XXXX cloud. Although the location of SCP-XXXX Cloud server is still being calculated, backup files for SCP-XXXX have been found scattered throughout the globe on various storage devices including: Server Rooms, Personal Computers, Personal Cellular Devices, Video Game Consoles, exc.. Backup files seem to be only fragments and can therefore not be opened by current means. Fragments seem to always be located in (Redacted). If fragment is remove, a new copy of the deleted backup fragment is found to have replace the deleted copy within 24 hours. Currently, there has been no way to access the SCP-XXXX's archives without the use of SCP-XXXX-1.

SCP-XXXX-1 is a device application labeled (redacted), which was released on nearly every major app store on ██/██/████. All companies running affected app stores claim that no one every greenlit the publication of SCP-XXXX-1. SCP-XXXX-1 was soon found to be the the reader application to SCP-XXXX. Use of SCP-XXXX-1 is fairly simple as it only requires a picture of any person of interest. Angle or size of photo of the person of interest seems to have fairly little effect upon SCP-XXXX-1’s ability to determine and retrieve archived information detailing the person of interest.