

T.E.C.A. Machine "M.D.K."
& Viral Frankenstein code/syntax
Because of what they are..., these are by definition only, not an explanation or how too. They were built on standalone discarded computers for experimental research only. I will never explain further or recreate.
So "let it go, Elsa"!

So for the record... T.E.C.A.
Infections experimentation in code:
1. ZDAE/L - A comprehensive "Zero Day Armageddon Equation/Loop", with a choice of expression as an
expression "A" or "B"
A. Binary number expressed as "0" (zero). Completely elimination of subjecting reaction from binary code. A definite for infinitely inevitability denouement. Conclusion: KIA. No countermeasures
B. Binary number expressed as "1" (one). A segregation sectional section, from a binary singularity elimination, forces a limitation for a "singular variation" equation. Conclusion: KIA. No countermeasures
2. SICIEE - "Sectional inflectional codec modifying encryption executable"
Conclusion: KIA. No countermeasures
3. CSEEP-A - "Computationally singularity Équation elimination polarity Algorithm"
Conclusion: KIA. No countermeasures
4. FMCAFA - "Force Modulation to Coercion Acquisition of Frequency Attacks"
Conclusion: KIA. No countermeasures

I creating experimental & research malware,
from curiosity and for a personal challenge

NOTE:
Everything was created on standalone, unconnected terminals
- Everything was done legally, for TOADD experimentation only, not for intent, future exploits or eCommerce destruction.
- No EU or international laws were every broken while performing research.
- I intentionally 'allowed' the
NSA 's server(s)- on Oahu and others to search, filter, ping servers, to collect "Digital Fingerprints", read my I/O traffic, tier my IP traffic (DFs & associated devices/mac) to further inspection and monitoring.
- I also allowed foreign governments, like GCHQ, MSS, and others... to gain access to a specific servers
- Notwithstanding reciprocity, this also allowed me to see their actions, reactions, algorithms, Standard Operating Procedures-SOP, and revolving insights.
Once again, that's totally legal. :)
Just a Jolly Good time, Chaps
Jolly good
:)

Soap Box:
Race to first...
Technology moves at such an impetuous murderous rate of corrigendum, versus the speed at which the laws are made to help “protect the innocent”; the Laws are actually inconceivable obsolete(!), by the time they are pressed into actions; which they inevitably crumble under their definition of the law.
...End of Lecture...

Side-NOte:
The Internet might have been the conceptually authority of the Military, from it's possession-at the start. But this modern inter-connectivity though associations (from here within that individuals and organization have cultivate a web of inter-connectiveness coexistence) that now spans beyond anyone's authoritarian agency, government, country; to rule as sole Dominion.
So governmental laws can only be applied to the "local user" interactions. By entering a foreign IP or server, the legal precedence changes with the laws of the new local address.
By-the-way.... if caught... Breaking the laws in China, Russia, etc, while physically in US, theoretically... they can list you on an International "Terrorist, activist, hacker watch list", or band from flying or entering a country or you might be extradited to an agreeing country... Like Snowden.
So tread lightly on your computer...
"Think, before you Click"
:/
...End of Line