BACKING QUANTUM LEAP - CYBERATTACKS

 

 

 

 

CHAPTERS: The chapters of this story are published live for collaboration development purposes, with a sequence derived from the Chapters below, supplemented with other (unpublished) writings as we progress. The final order for the proposed screenplay may be the subject of additional drafts to suit production of the final movie (producers/directors/actors).

 

 

 

 

 

 

<<<<<< AFTERLIFE

 

 

SILICON VALLEY, CALIFORNIA, USA - QUANTUM LEAP

 

As William and Jane's company began to gain traction, so too did the attention of unwanted forces. The US military, intrigued by the potential implications of their technology, deployed a covert operation to infiltrate their research. Government agents, skilled in the art of surveillance, bugged their home, tapped their phones, and even hacked into their computers and smart devices.

Corporate espionage was also rampant. Rival tech companies, fearing the disruption their technology could cause, resorted to underhanded tactics. Hackers, sponsored by these corporations, launched cyberattacks, attempting to steal their intellectual property.


To counter these threats, William and Jane had to become increasingly secretive. They limited their digital footprint, avoiding the internet whenever possible. Sensitive discussions were held in person, and crucial documents were stored in physical safes. They installed advanced security systems, including motion sensors and hidden cameras, to deter intruders.

 

The initial euphoria of securing funding soon gave way to a harsh reality. As word of William's groundbreaking research spread, so too did the interest of less benevolent forces. Corporate espionage, government surveillance, and cyberattacks became a constant threat, an everyday occurrence.

The once peaceful home of William and Jane transformed into a fortress. Every electronic device, every line of code, became a potential vulnerability. They were forced to adopt extreme measures to protect their secrets.

With the divine guidance of Anubis, William and Jane devised a cunning plan. They set up decoy computers, infected with malicious software, to lure and trap their adversaries. These computers would not only expose the intruders but also cripple their systems.

 

The daring duo initiated an audacious counteroffensive, launching cyber attacks against their adversaries. Decoy computers, infected with malicious code, were deployed to lure and ensnare their attackers. As their enemies scrambled to contain the damage, William and Jane worked tirelessly to advance their research. These excursions into the world of espionage helped William to write some of the most advanced software. Software to take on and defeat military grade hackers, reliant on super nano computer speeds to unravel, thus beyond the capabilities of Chinese, Russian and US agencies, including the NSA and GCHQ, in the UK.

Anubis, ever watchful, observed the growing hostility of the spymasters, as each of their moves were anticipated and blocked. He saw the potential for a global conflict, a battle between technology and ethics. To protect William and Jane, he subtly influenced the minds of their adversaries, sowing discord and confusion within their ranks. He also empowered William and Jane, granting them the knowledge and skills to defend themselves.

 

Ever the strategist, the protector of the dead, ensured that the most persistent threats were met with swift and decisive retribution. He would subtly influence the minds of those who dared to cross William, leading them down paths of self-destruction.

The ever watchful Anubis, observed the growing threat. He saw the malicious intent of those who sought to hinder William's progress, no matter it was illegal. 

"Their greed will be their downfall," he declared to Isis. 

 

"We must guide William to counter their attacks."

 

Isis smiled knowingly. She would play her part.

In response to the escalating attacks, William and Jane established a clandestine facility, a hidden sanctuary where they could work undisturbed.
They established a secret, heavily fortified facility, a hidden sanctuary for their most critical research. This clandestine location would be their last line of defense against those who would seek to steal their secrets.

 

This facility was equipped with state-of-the-art security measures, designed to thwart even the most sophisticated intrusions.

 

As a final act of defiance, they launched a series of cyber attacks against their adversaries. They developed sophisticated malware, capable of infiltrating the most secure networks. These attacks were designed to disrupt their operations, expose their malicious intentions, and deter future aggression.

 

This would have been illegal, had it not been a counter to the state sponsored mayhem. But, as a self-defense strategy, it was perfectly acceptable. The agencies in their quest to discredit 'The Kid,' would trip over their own dicks. Then get their privates caught in a mangle. Since, the tactics the agencies used were illegal and unconstitutional. Meaning, they could never admit that such devices were used against legitimate members of society.

 

It took a while, but their efforts paid dividends. Soon, would be attackers, became the attacked, their own secrets and illegal activities being exposed, much to the embarrassment of the US military. With DARPA's efforts being made public, the intrusions waned and finally stopped as Congress debated the ethics of such attacks. Jane though, was more distrusting. It was at her behest, that Will devised an exit strategy. Knowing that without a foolproof plan, they did not stand a chance. As the technology stakes increased, William and Jane found themselves in a high-risk game of cat and mouse.

 

They knew the agencies would eliminate them, given the chance.

 

 

WASHING MACHINE >>>>>

 


 

Will Bates built his NanoComm super computer into a watch his father gave him when he was a child         

 

 

OMEGA 1600 TC1 TIME COMPUTER LED 1973 - Omega "Time Computer I" aka TC1 is the first LED watch ever available for sales in Europe. Omega did not enter into the research field of digital watches, but subcontracted design of this LED watch to fill the gap in their portfolio. Omega TC's are based on Pulsar technology and contain late P2 modules that can be transplanted from corresponding Pulsars and Hamiltons. The cases were American made by the Star Watch Case Company with the magnetic-button Pulsar concept. In our story, Will Bates was gifted this classic timepiece from his father, when he was a child. The digital display so fascinated him, that when the electronic module failed, he thought to use the casing for his super-computer masterpiece: CyberCore Genetica. When Hal gets hooked up to this device, the AI becomes self aware, but unlike 'Skynet,' in the 'Terminator' series, is a human-friendly member of the Elizabeth Swann crew.

 

 

 

 

        

 

 

 

 

 

BIOCORE - The most advanced biological human interface, allows a person to communicate with suitably adapted super computers, just by thinking commands. The dream of telepathy has finally come true. But, the technology is top secret, and light years away from the marketplace. John Storm, Cleopatra and Dan Hawk, deem this tech too dangerous. Especially, if the military got hold of it, and corrupt governments, looking to further financially enslave their workforce.

 

 

 

 

 

 

THE BATTLE OF ACTIUM - Queen Cleopatra retreats leaving Mark Antony to lose against Octavian and seek a new deal with Rome.

THE POISON ASP - Hotfoot from Actium, Cleopatra's plan to seduce Octavian backfired leading to a suicide pact with Anubis and Isis

TANZANIA - THE STORM BREAKS - Fanatical DNA collector, John Storm, finds Homo erectus skull, Olduvia Gorge, in Tanzanian dig site.

WRATH OF THE GODS - 365BC destruction of Thonis and Alexandria, Anubis and Isis watch on in horror as Cleopatra is submerged.

WWII ENIGMA - The birth of computers at Bletchley Park under Alan Turing, and his visits from Anubis and Isis, who see the potential in his ideas.

SYDNEY WILL READING - John's uncle Douglas vanished, declared dead, the adventurer inherits keys and a note from George Franks.

ANGEL OF DEATH - Anubis and Isis occupy Josef Mengele's and Adolf Hitler's subconscious as spirits steering their legacies.

INNER CIRCLE OF SIX - Joseph Mengele's Fourth Reich plans an escape to Brazil to develop Nazi-funded human research laboratories.

NELSON BAY - John visits the coordinates George gave him, to discover the Elizabeth Swann, ARK and Hal, AI computer.

BRAZIL BOUND - Doctor Death bargains for funding and logistics of relocation to Amazon South American base via Argentina.

NEW WORLD ORDER - A former Neo-Nazi plan to regenerate Aryan supremacy, develops into a cause for good.

REBEL WITHOUT A CAUSE - Having reached the end of his PhD, William and Jane Bates have epiphanies, Will should follow his dream.

ROADBLOCK - Nobody would fund his R&D, William and Jane Bates are blanked by DARPA, computer and software houses.

THE AFTERLIFE - Cleopatra's tomb lay lost for centuries submerged and out of sight with little change of discovery.

QUANTUM LEAP - Jane and Will find backers, then US military and computer processor chip makers cyber attack, hack and bug them.

WASHING MACHINE - Inventor Franco Francisco comes up with the Incubus, artificial uterus concept while repairing his household appliance.

EXIT STRATEGY - Realising they will always be a target from industrial and military espionage, Jane & Will devise a cunning plan.

PATENT APPLICATION - Franco Francisco files his Claims with the Italian Intellectual Property Office (IPO) in Roma, Italia.

CYBERCORE GENETICA - Nano computer technology is purchased at an auction by a semi religious sect, New World Order.

INCUBUS - Roberta Ferrara secures the expertise of Franco Francisco for knights of the New World Order: Neuwelt Rittertum.

SPLICE - Klaus and Eva von Kolreuter find a way to live forever using cloning technology; Genonimo Investments, Geneva.

TREMORS - Cleopatra's feels vibrations after a shift in the tectonic plates triggered a tremor off the coast of Alexandria.

PANAMANIAN RUNNING MAN - The secret is out, an enhanced human is spotted running at unbelievable speeds.

THE ARK - NeuWelt Rittertum headhunt John Storm seeking access to his genetic DNA map of life on earth, but they fail to reach agreement.

MARJORIE BOYLE - Sam Hollis tracks down sexy backpacker, Majorie Boyle, to Brighton Point in Trinidad, beautiful Caribbean Island.

THE AMAZON - Charley agrees to meet John & Dan at Manaus, but is a little too inquisitive.

OPERATION LEVIATHAN - New World Knights, Klaus and Franco go to Plan 'B' to track and steal the Elizabeth Swann & The Ark DNA database.

TOMB RAIDERS - Safiya Sabuka and Musa Bomani dive among sifting sands to discover precious artifacts and golden treasures.

SCOTLAND YARD - The famous London DNA database is stolen, the biggest data heist to date. The Yard initiates a cover up.

OPERATION ALEXANDRIA - Neo-Nazi occultists recover Cleopatra's sarcophagus from underwater tomb near Palace.

SALVAGE RIGHTS - Entering Cleopatra's mausoleum, locating sarcophagus and raising with air bags to the surface, Safiya Sabuka tomb raider.

COASTGUARD PATROL - Safiya and Musa surface off Alexandria to a waiting customs vessel, they pretend to be sports divers fooling the officials.

UNESCO - Catholic Church fear grave desecration heritage theft, asks agencies for help. Interpol issue Red Notice.

KIDNAP - Charley is taken prisoner but John rescues her, in the process becoming injected with a serum.

SARCOPHAGUS OPENING - The wooden inner casket is opened revealing Cleopatra's mummy, golden crown and death mask, perfectly preserved.

AWAKENING - In the afterlife, the DNA extracted from Cleopatra's mummy triggers a divine stirring with Anubis and Isis comforting the Nile Queen.

REPLICANT - The Society reproduce Cleopatra using Francisco's RepliVator™, uploading synapse sequence and implanted memories.

BRAIN CONDITIONING - Klaus and Franco upload digitally recreated memories in historical order to trigger correct learned synapse firing sequence

REBORN - The former Queen of Egypt speaks for the first time to her creators, proving that her brain is working, the implants succeeded.

FULL STEAM AHEAD - Storm speeds to Thonis, then uses the Swann's AI sensors and the Ark database to find tomb has been plundered.

PROPOSAL - Baron von Richhofen's gambit, a union of Royal ancient and Aryan blood, for strength and intellect, a powerful heir as her successor

RITUAL SACRIFICE - The Baron prepares a drugged Cleopatra for ceremonial impregnation.

MANAUS TO ALEXANDRIA - A hydrogen powered race across the Atlantic Ocean in nine days, John Storm guided by Anubis and Isis.

SANCTUM INTERRUPTUS - John finds secret Nazi hideout near Alexandria, disturbs ritual - rescues Cleopatra, arresting conspirators.

THE CHOSEN ONE - The reincarnated Cleopatra falls for her rescuer. John comes under her spell, despite her being a replicant.

MOVIES, WHAT ARE THEY - Reincarnated Nile Queen asks John and Dan to explain films, they show her 20th C. Fox 1963 Elizabeth Taylor biopic.

MEDITERRANEAN CRUISE - John suggest a tour of the Wadj Ur, Thalassa Nostrum, to relax Cleopatra, Hal plans the ultimate experience.

JOHN'S BLOODLINE - Dan and Hal trace trace John's noble lineage back to the iconic figures of Ancient Egypt & Roman General Mark Antony

DÉJÀ VU - Dan and Hal reveal John's family tree as being related to Roman General Mark Antony via Julia and Queen Drusilla of Mauretania.

MEDICAL EXAMINATION - Jack Mason talks John and Cleopatra into agreeing to a check up at Port Royal, Jamaica, working for NSA and CIA

GEORGE WARNS OF TORTURE - Franks radios Swann to tell John & Dan that New World Knights are being tortured at Guantánamo Bay, you're next.

JESUS CHRIST - Cleopatra asks about this man. John, Dan & Hal explain he is an ancient religious preacher from Galilee, son of Yahweh, Hebrew god.

BIOCORE BRAIN IMPLANT - Dan and Cleopatra drill John's skull, occipital bone implanting biological chip to interface with CyberCore Genetica.

DARPA, NSA & CIA - National security and military intelligence chiefs Iras Charmian and Dr Stefan Raengst, plot to remove all human obstacles.

MILITARY INTERVENTION - The military detain Cleopatra to appease stakeholders, despite media & medical protests. Storm distraught.

BATTLE ARMOUR - Thanks to some unexplained divine intervention, Dan Hawk talks John Storm into wearing a bullet proof suit.

GUANTÁNAMO BAY - History repeats itself, US military kidnap Cleopatra, John forced to rescue puts Elizabeth Swann at risk.

MISSION IMPOSSIBLE - Commander John Storm, in Navy SEAL mode, attacks the Cuban torture camp at Guantánamo Bay, in stealth mode, black op.

MISSILE LOCK - USA military try to hack into Hal, anticipating a strike, as the DOD launch Tomahawks, John hacks into NORAD, and redirects them.

PRESIDENT LINCOLN TRUMAN - Hails the Swann to find out why John is shooting missiles at Guantánamo Bay, Storm sets the record straight. FINALE

 

 

 

 

 

 

 

 

 

 

 

  JANE & WILL FIND BACKERS, A QUANTUM LEAP, FOUNDING CORPORATION - FENDING OFF CYBER ATTACKS, MILITARY AND INDUSTRIAL ESPIONAGE - CYBERCORE GENETICA SUPER NANCOMPUTER IS THE FASTEST IN THE WORLD, MOST POWERFUL, AUCTIONED FOR $20 TWENTY BILLION DOLLARS BY WILLIAM BATES - THE ADVENTURES OF JOHN STORM: CLEOPATRA & THE MUMMY REBORN FROM THE AFTERLIFE

Please use our A-Z to navigate this site or return HOME

 

 

Cleopatra - The Mummy - A John Storm adventure with the Elizabeth Swann

 

 

The rights of Jameson Hunter and Cleaner Ocean Foundation to be identified as the author of this work has been asserted in accordance with section 77 and 78 of the Copyright Designs and Patents Act 1988. This website and the Cleopatra artwork is Copyright © January 2025 Cleaner Ocean Foundation and Jameson Hunter.