The Order of Morpheus

Created sometime in the mid 2000s by a hacker known as Yiri and several associates, the Order of Morpheus is dedicated...
 

Created sometime in the mid 2000s by a hacker known as Yiri and several associates, the Order of Morpheus is dedicated to understanding the patterns of the human mind, as well as the liberation of the human collective from groups who use propaganda and authoritarian means to inhibit human potential. Generally, OoM operatives seek to acquire data quietly, embedding backdoors into legitimate distributed computing programs and networks (allowing them to be taken over as botnets if necessary), and using long-con strategies, like exploiting both physical access vulnerabilities and social engineering strategies to infiltrate organizations of interest. OoM seeks to blend machine learning with oneirology to map trends and patterns in the human unconsciousness into a virtual space, and eventually develop artificial intelligence from this data.

 

 

This organization manages a series of holding companies, and through them controls several Bitcoin and other cryptocurrency mining operations located in Iceland. This provides them with a ready source of funds for operational purposes. Additionally, the Order of Morpheus has access to funds and assets held by numerous shell corporations they have established. They are also indirectly supported by the Eschaton Foundation, which funds research into brain-computer interfacing and other forms of physical augmentation. The Eschaton Foundation is more commonly known for subsidizing the cost of treatment and prosthetics for young victims of complex accidents.

 

 

A group with many aliases and handles, the real life identities – and motivations – of most of their members remain unknown to both to each other and to the world at large. Typically, members communicate over Freenet utilizing a carefully guarded codebook. The leadership of the faction consists of a small core group, each of which directs many operational cells. These cells consist of 1-3 members, and may be further groups into temporary infrastructure teams of 2-5 cells. A cell or a team may coordinate with external parties if necessary to accomplish an objective, but prefer to stay isolated from one another.

 

 

The primary methods used to secure members and data of the faction are isolation, encryption, and obfuscation. Cells and members are kept well-isolated from one another, and communicate over encrypted networks using codebooks. Proxy organizations are often utilized for cyberattacks, and flashmobs are employed to distract from these attacks. Cyberattacks they are responsible for typically get little publicity, thanks to their understanding of media cycles and careful timing.

 

<Asteria>
Name Unknown
De facto faction leader, closely tied to their late leader Yiri. Controls the organization’s cryptocurrency mining operations and oversees the work of operatives.

<Baku>
Jiro Yamada
Counterintelligence operative located in East Asia. Oversees East Asian agent cells.