[It's been a while since L has addressed the network in any capacity: he's been occupied with one thing and another. Today he sounds unusually weary, but people who see him on a daily basis know that this has been a frequent state for him for the past two months: there have been highs and lows, and they've been extreme on both ends.]This is Ryuuzaki, speaking on behalf of Communications. I'll be discussing several things today.
We'd like to remind you that your private communications should never be considered completely private. For the past few months, we've all been using a different style of encryption than the one that was previously available. Communications now believes that we have a good understanding of how the new style works. If we can figure it out, someone else certainly can, if they're determined enough.
[It rankles him to have to admit this, but the people who are worth hiding the information from probably don't need to be told to be careful about secrecy to begin with, and letting everyone else know is a matter of good PR. Aside from that, if he doesn't, it's very likely that someone else will.]Following on that, we still haven't been able to create any encryptions of our own that the rebooted network will accept. If you find that you're able to do that yourself, it's possible that we could use you in the department.
On another note, I've heard some concern that van Rijn's people are eavesdropping on our network. While I can't guarantee that they won't hit the archive if they're ever to gain control of the ship, the method of their contact two months ago didn't utilize this network at all. It was a direct external signal to the communicators themselves. It's extremely unlikely that they're following our current internal discussions -- I think if they were, we'd have heard from them more and in a different way.
[He pauses, and when he speaks again, his tone has shifted in a way that indicates a change in topic.]I don't think any of us can deny that there have been
several important
developments in the last few months.
There's always some value in sitting back and trying to determine
what we know -- and those of you who are new here should certainly direct your attention to
the documents which Support posts in the first few days after a jump. It's vital that you're
up to speed. I've attached some useful information to this message.
However, I'd like to propose a different question:
What don't we know?What are we still trying to determine? In which areas are we lacking information? I'm looking for specific questions, not broad subjects -- try to break them down. Likewise, if you think you can answer one of these questions --
definitively, no wild guesses -- please do so, so we can remove it from the list. If you have information you'd like to share, leads, that might also be helpful. It's always a good idea to use the network to document anything you learn.
These questions could determine new avenues of investigation, or if we receive further outside contact, we may be able to pursue some of those subjects in that way. Even if that turns out not to be the case, it may help us coordinate our efforts.
I'm afraid I'll have to apologize in advance to a few of you -- Ward, Resnik, Charlotte, our smiling friend -- it's possible that we may be discussing you as if you aren't here.
[His tone turns slightly wry.] Try not to take it personally.
[He has never in his life cared, not even in the least, about that sort of thing: he'll call someone a murderer when they're in the same room if the evidence fits the accusation. He'll even relish it. But he understands that any of those three could chime in on this conversation, and that the situation is different, because he's calling not for their arrest, but for a discussion that may touch on details that they'd rather were private.][OOC note: About the network and hacking! Regardless of what L is looking for, user-created encryptions no longer work on the network as of 1 November 2014 -- and they may never work again. It's a change in game mechanics! A single, extremely robust level of security is available to everyone, simply by marking messages as private before sending them.
It will take even a top-level, technopath-type hacker at least three months of full-time effort to figure out how to hack a message marked as private under the new system, and they will flag SEC several times in the process. Working as a group (dealing with other duties and fluctuations in character availability), it has taken Comms about four months. The amount of time it will take someone to decrypt a single message after they've spent several months working on figuring out how the encryption itself works will depend on the hacking character's level of skill and the length of the message in question, but it will be very slow work even for the best of the best.
L's search for encryptions that aren't built into the system is probably in vain, but characters who are interested in trying may still be interested in joining Comms. They can also make the attempt on their own time, of course!]