User Tools

Metis / ADA Brief documents

On 12th of September this post indicated hackable media would be released through certain portals.

This post used the term METIS - while other posts referred to the media as ADA Briefs.

On 13th of September, media was hacked from certain portals. Only 8 slides were recovered during the window of opportunity (the deadline was set for Monday, Sept. 15 Midnight UTC). The remaining slides were released by X set 1 set2.


Complete METIS/ADA Briefs

Slide 0 - A Detection Algorithm: Origin, Evolution and Capabilities

Transcript: A Detection Algorithm: Origin, Evolution and Capabilities
Background, analysis and threat projections of the artificial intelligence created by the Niantic Project in 2012 and currently considered a PO security risk. Prepared for (portion redacted).

Author: (redacted)
Date: (redacted)

TS (redacted) NOFORN METIS

Additional Information


Slide 1 - Omnivore

Transcript:

TS (redacted) NOFORN/METIS
OMNIVORE
1997

  • Omnivore compiled using a subset of algorithms contained within (redacted)
  • Created to monitor and collect data utilizing primitive primitive machine learning systems.
  • First SIGINT use of multi-nodal pattern recognition. Omnivore v1.x able to perform a fully automated 128 node correlation analysis on a 1.4 GB/sec input

Next to the bulleted list

IAO (Information Awareness Office). Disclosed in 2002. Program designed to help develop Total Information Awareness capabilities.

Omnivore v1.x Data Center (image)

Additional Information


Slide 2 - Omnivore Fork and Classification Changes

Transcript:

Additional Information


Slide 3 - Omnivore Black Dev Era

Transcript:

Additional Information


Slide 4 - Creation of ADA

Transcript:

Additional Information


Slide 5 - Unexpected Emergent Behavior

Transcript:

Additional Information


Slide 6 - ADA (Possibly) Becomes Self-Aware

Transcript:

Additional Information


Slide 7 - Hazdata Incident

Transcript:

Additional Information


Slide 8 - ADA Self-Replication Patterns

Transcript:

Additional Information


Slide 9 - Initial Response to Threat

Transcript:

Additional Information


Slide 10 - Unconfirmed (F3) Intel - ADA's Objectives

Transcript:

Additional Information


Slide 11 - Threat Analysis

Transcript:

Additional Information


Slide 12 - NIA Operation and ADA Hard Drive Recovery

Transcript:

Additional Information


Hacked Media

WLN0X8YGOM4LI9ZJXY8FPHH0EGLG78YS
WPZHG73X73MDROTJN156ENC04UULT7W1
1Y3E4NM3KAHGOM11P1Z2HW04GOO2ZNPH
88X3F2V5F9HVG1EIA4ANPAVRKEW9H5C5
298JCFU0KXP4LTRK1VK8UO1S9WHIBRSG
F8U3UWHQDKQ5ZTSWJ99YP471854BTNCE
WCFYQA6F47L4CA0EDR6KK6CFOTG5K5T1
WG4IIJ5HJU61KAM9QKFUA4Z18X4R2BY2