Type Blue - Computerized Anomalies


Computerized anomalies, or Type Blues, are found in abundance, with an average of slightly over 600 cases being confirmed annually. Although most cases are benign and classified as Type 2 threats (No immediate threat), others can be anywhere from Type 2 to Type 5 (Immediate threat) and must be destroyed immediately. In the case that a Type Blue animates significantly, it becomes classified as a Type Purple (Animate Robotic Entities).

How They Work

Computerized anomalies are, in 75% of cases, very specific in terms of input and output. Computers work by transmitting highly complicated codes of electricity, using Binary numbering. However, Type Blues contain an inconsistency in at least one place, where the input of a certain piece delivers the wrong output. This can be in any place in the programming. This allows Type Blues to perform actions that normal computers cannot. In 20% of cases, another type of anomaly (whether it be green, yellow, etc.) is contained within a Type Blue. In these cases, they must be separated in order to be terminated effectively.

In some cases, a Type Blue will not be able to be accessed locally. An example is KTE-1394-Blue "IP Address 57.32.███.███." This Type Blue is not local, and therefore, the server had to be located in order for it to be destroyed. Although tracing attempts have failed, it has not been accessed at all since 2009.

Identification and Acquisition

Type Blues can be dealt with once four steps are carried out.

  • Doubt: Operatives must notice that a computer is doing something impossible under its current conditions, identifying it as a Type Blue anomaly. In this case, proceed to step two.
  • Isolation: Type Blues must be isolated form all nearby electrical devices. In addition, a device that impairs the ability of an electrical object to communicate with the outside, such as a Faraday Cage, should be placed around the Type Blue. From this point on, no more personnel are permitted to enter the Type Blue's temporary containment until its nature is discovered, as it may be a vector. As the true nature of the anomaly is unknown, it must be dealt with using extreme caution. Then proceed to step three.
  • Testing: First, the Type Blue must be disassembled and checked manually. If this proves impossible, proceed to step four. If anomalies are detected, use another computer as a control. Using the exact same input, test if the second computer yields the same results. If it does, the computer is not a Type Blue. However, due to the presence of step one, nearby electronics must be checked the same way until they are all either cleared as non-anomalous or identified positively as Type Blues. If neither computer yields the same results after multiple rounds of testing, proceed to step four.
  • Disposal: For effective destruction methods, see “Disposal Methods.”

Disposal Methods

The most effective methods of destroying Type Blues are incineration, disassembly and incineration, and the usage of a high-intensity electromagnetic pulse (EMP) weaponry. In the case of indestructible elements, permanent separation from electricity and electrical components can inhibit the ability of that piece to function at capacity. If the entire Type Blue is indestructible, permanent isolation and denial of access may be the best solution.

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License