Spleeshmicannon

Item #: SCP-XXXX

Object Class: Euclid

Special Containment Procedures:
The anomalous individual is currently at large. Any evidence regarding the location of SCP-XXXX is to be sent to the then President of the United States Government. If no such individual is available then high level United Nations officials will suffice. Any computer system that has been breached by SCP-XXXX is to be immediately shut down and destroyed by any means necessary.

Any and all individuals involved in the destruction of said computer systems must submit to psychological evaluation. Said individuals must then receive up to 3 days off work if deemed necessary by the evaluating psychologist. After which (even if it is not a normal work day) the individuals must come in and give a full and detailed explanation of everything that occurred. This must be taped and archived. Immediately after the individuals have given their explanation of the events they must be placed in a dedicated mental health centre where their behaviour can be monitored and they can be prevented from killing themselves.

Description:
SCP-XXXX is an unknown entity that has access to a powerful computer running the Debian-derived distribution of Linux, Kali Linux, as it’s operating system. This is the only information that researchers and IT perosnnal could gather from the breached hard drives. The entity uses said computer to hack into computer systems. There is no discernable pattern of behaviour displayed by SCP-XXXX concerning which computer systems are hacked, however what happens once said systems are hacked presents similarities.

SCP-XXXX will connect to the computer system using a connections IT personnel have dubbed HTTPS, DSL and Satellite. Using these three connections, SCP-XXXX has been able to connect to any computer system independantly of whether or not the computer system has the cababilities to receive the connection. In such an event, the computer system will automatically install appropriate software.

Once SCP-XXXX has connected to a computer system it will replace all files with images of what has been described as a god like figure in the jpg format with the exception of a few log files related to its connection. This is SCP-XXXX-1 All attempts to get a clear visual description have failed. No individaul that has seen SCP-XXXX-1 has made a full recovery. Out of the 12 individuals that have seen them, 3 remain alive. The other 9 individuals have all committed suicide since the events.

After the computer systems have been breached SCP-XXXX the system will no longer require power to run. Any connected computer systems will become breached if said system is on. Once a manual shutdown (using a button) commences the system will be delayed and its destruction can commence. Breached computer systems, while they do not need power, software or internet to be breached and to cause further harm to connected systems they have not been at all resistant to traditional means of destruction.