SCP-3622
#page-content .collapsible-block { 
    position: relative;
    padding: 0.5em;
    margin: 0.5em;
    box-shadow: 2px 1.5px 1px rgba(176,16,0,0.7), 0 0 0px 1px lightgrey;
    overflow-wrap: break-word;
}
 
.collapsible-block-unfolded{
    color: black;
    overflow-wrap: break-word;
 
}
 
.collapsible-block-unfolded-link {
    text-align:center;
}
 
.collapsible-block-folded {
    text-align: center;
    color: dimgrey;
}
 
.collapsible-block-link {
    font-weight: bold;
    color: dimgrey;
    text-align: center;
}
 
.addendumbox {
    padding: .01em 16px;
    margin-bottom: 16px;
    margin-top: 16px;
    padding-bottom: 1em;
    box-shadow:0 2px 5px 0 rgba(0,0,0,0.16),0 2px 10px 0 rgba(0,0,0,0.12);
}
 
.material-box {
    padding: .01em 16px;
    margin-bottom: 16px;
    margin-top: 16px;
    padding-bottom: 1em;
    border: 1px lightgrey solid;
    box-shadow: 1px 2px 2px 0 rgba(0,0,0,0.16);
}
 
.material-box blockquote {
    border: 1px double #999;
}
 
.wiki-content-table {
    width: 100%;
}
 
.addendumbox blockquote {
    border: 1px double #999;
}
 
.addendumtitle {
   opacity: 0.8;
   margin-bottom: 10px;
   color: #b01;
}
 
.maintitle {
   margin-bottom: 10px;
   color: black;
}
 
.scp-header {
    text-align: center;
    font-size:x-large;
    color:#b01;
}
 
.addenda-header {
    width: 100%;
    border-bottom: 2px black solid;
    color: black;
}
 
.scp-info {
    display:flex;
    justify-content:space-between;
    font-size:large;
}
 
.scp-info-box {
    display:flex; 
    justify-content:space-between;
}
 
.object-info {
    color:black;
    align-self: flex-end;
    font-size: large;
}
 
.title-style {
    opacity: 0.8;
    margin-bottom: 10px;
    color: #b01;
    font-size: large;
    text-decoration: underline;
    font-weight: bold;
}
 
.update-div-empty {
    text-align: right;
    font-size: x-small;
    color: lightgrey;
}
 
.update-div {
    text-align: right;
    font-size: x-small;
}
 
.computed {
    border: 1px black solid;
    width: 50%;
    display: inline-block;
text-align: left;
    padding: 3px;
}
.computed:before {
    content:"Computed Code";
    font-weight: bold;
border-bottom: solid 1px black;
width: 100%;
}
.rawcode {
    border: black solid 1px;
    width: 50%;
    display: inline-block;
text-align: left;
    padding: 3px;
}
.rawcode:before{
    content:"Raw Code";
    text-align: center;
    font-weight: bold;
border-bottom: solid 1px black;
width: 100%;
}
.codebox {
    display: inline-block;
    width: 100%;
    text-align: center;
}
.yui-navset .yui-nav .selected a em,  .yui-navset .yui-nav a em{
        padding: 0.25em .75em; 
        top: 0px;
        margin-bottom: 0px;
}
.yui-navset .yui-nav .selected a {
     background: gray;
}
.yui-navset .yui-nav .selected {
       margin: 0px;
}
.yui-navset .yui-nav .selected a, .yui-navset .yui-nav .selected a:focus, .yui-navset .yui-nav .selected a:hover, .yui-navset .yui-nav .selected a {
         background: gray;
}
.yui-navset .yui-nav a:hover,
.yui-navset .yui-nav a:focus {
    background: gainsboro;
    text-decoration: none;
}
.yui-navset .yui-nav a, .yui-navset .yui-navset-top .yui-nav a {
background-color: none;
background-image: none;
}
.yui-navset .yui-nav a {
background: none;
}
.yui-navset .yui-nav li{
margin: 0px;
}
 
#page-content .licensebox .collapsible-block {
    position: unset;
    padding: unset;
    margin: unset;
    box-shadow: unset;
}
 
.licensebox .collapsible-block-unfolded{
    color: inherit;
}
 
.licensebox .collapsible-block-unfolded-link {
    text-align: left;
}
 
.licensebox .collapsible-block-folded {
    text-align: left;
    color: inherit;
}
 
.licensebox .collapsible-block-link {
    color: inherit;
    text-align: left;
}
rating: +81+x

Anomalous Item Entry

Item #: SCP-3622

Object Class: Keter



Last updated by R. Diaghilev, 31/12/2017 23:59:59 UTC. [REDACTED]
Display version: Level 3/3622 [Redacted Elements: 7 | Redaction supervisor: D. Nedjelski ten.pcs.hcrsr|ikslejden.d#ten.pcs.hcrsr|ikslejden.d ]


Special Containment Procedures:


Instances of SCP-3622-1 are to be contained whenever possible, through a combination of misinformation, talent acquisition, and corporate sabotage. In the event that instances of SCP-3622-1 must be taken into Foundation custody, they are to be held in temporary standard humanoid containment for 72 hours, and issued class A amnestics.

Under no circumstances are SCP-3622-1 instances to be contained together, except during testing.

In the event of SCP-3622 infection reaching unmanageable levels, instances of SCP-3622-1 are either to be acquired by the Foundation, or to be encouraged to seek employment at other organizations by Foundation agents.

Suspicions of SCP-3622 infection in Foundation software teams is to be reported immediately. All persons suspected of SCP-3622 infection are not to participate in any Agile methodology meetings, or proceedings until SCP-3622 infection is either ruled out, or wears off.

In the event of a mass outbreak of SCP-3622-1, termination is authorized in select circumstances. Please see Document SCP-3622-T-EX for circumstances and approval chain.


Prepared by Dr. D. Nedjelski, Agent R. Donnarson, 17/4/2017 11:23:51 UTC. ten.pcs.hcrsr|ikslejden.d#ten.pcs.hcrsr|ikslejden.d, ten.pcs.ces|nosrannod.r#ten.pcs.ces|nosrannod.r


Description:


SCP-3622 is a memetic effect which affects computer programmers exposed to SCP-3622's infection vectors. SCP-3622 affects any human who creates, modifies, or maintains software and uses Agile development methodologies1. Affected subjects are collectively designated SCP-3622-1.

SCP-3622-1 instances will begin to introduce minor delays in any daily meetings, development processes, or productivity tools that they interact with, until said processes are brought to a complete stand-still. SCP-3622-1 will also pass SCP-3622 on to any other humans qualifying as SCP-3622-1 hosts.

SCP-3622's primary transmission occurs through a hallucinatory entity, which appears on software development teams through anomalous means. This entity takes the form of a managerial employee, usually deemed an "efficiency consultant", which creates the initial infection vector. Universally, this entity disappears within 24 hours of initial infection. Members of the software team then become instances of SCP-3622-1 and become the secondary infection vector. SCP-3622's effect is passed on by instances of SCP-3622-1 through currently unknown anomalous means.

In most subjects, SCP-3622's effects will cease to manifest after 72 hours, if isolated from other instances of SCP-3622-1. Several cases have significantly longer, or significantly shorter periods of time. All individuals showing this discrepancy have brain stem disorders or deformaties.


Prepared by Dr. D. Nedjelski, 17/4/2017 11:14:55 UTC. ten.pcs.hcrsr|ikslejden.d#ten.pcs.hcrsr|ikslejden.d

Updated Effect Vector


Persons with disorders affecting the brain stem were particularly affected significantly shorter (sometimes for minutes or less), until ██/██/████, corresponding to an "update" to SCP-3622. (See Addendum 4).


Attached by Dr. L. Oliviera, 22/9/2017 17:22:67 UTC. ten.pcs.hcrsr|areivilo.l#ten.pcs.hcrsr|areivilo.l


Attached Addenda

Discovery Report


SCP-3622 was discovered on ██/██/████ when Foundation agents placed at [REDACTED] Inc. reported significantly fewer salient data points over a six week period. Foundation assets brought the agents in under the guise of extended sabbatical.

Agents Kuthrupali and Saksena recovered from the effects of SCP-3622 after 72 hours.

The following is a transcript of an initial interview with Agents Saksena and Kuthrupali.



Prepared by Dr. S. Callaghan, 17/6/2017 03:22:21 UTC. ten.pcs.dem|nahgallac.s#ten.pcs.dem|nahgallac.s

Effect Clarification

Generally, SCP-3622 will slow down a specific team to the point where the developers will come in to work, consume resources, and produce no viable work. As reported in debriefing transcripts, this slow down will not seem out of the ordinary to instances of SCP-3622-1.

Extended observation of SCP-3622 and SCP-3622-1 instances at Bond Street LLC have produced several examples of SCP-3622 behaviors:

  • Daily meetings (commonly referred to as "standups") to discuss progress on ongoing software projects increase in duration steadily. Average duration increase is between 7 and 12 minutes per week, and appears to have a final duration of a maximum of eight hours.
  • Issue tracking descriptions growing increasingly complex, and implementing arbitrary rules for style.
  • Version tracking complexity increasing until general codebase changes are near, or total zero.
  • Documentation requirements sharply increasing for arbitrary reasons, which are rapidly abandoned.


Prepared by Agent Saksena, 15/8/2017 02:14:27 UTC. ten.pcs.ofni|aneskas.a.a#ten.pcs.ofni|aneskas.a.a

Escalation of Effects and Confirmed Use of SCP-3622


On ██/██/████ the Foundation intercepted a mass email to several organizations (see Document-3622-1) confirmed to be using SCP-3622, regarding installation and setup instructions for a new version of the SCP-3622 software.

According to the attached email, the effects of SCP-3622 have been changed and intensified. See text below:

After this email was intercepted, observations at [REDACTED] Inc. showed additional instances of SCP-3622-1 throughout multiple locations belonging to their competitors, apparently spread through the target's issue tracking software. Additional investigation into instances of SCP-3622 at other organizations showed the same patterns, indicating this "upgrade" to the "Quaesturas" software expanded its anomalous effect significantly.

Most significantly the original timing discrepancy found in subjects with brain stem disorders was no longer observed.


Prepared by Technician B. Solano, 15/8/2017 09:14:55 UTC. ten.pcs.ved|onalos.b#ten.pcs.ved|onalos.b

Initial Contact with Potential GoI/PoI


Ledenoff Technologies is incorporated in Wilmington, Delaware, within the United States. Foundation agents approached the organizations registered business address under the guise of a Foundation shell company, with overtures to purchase the software and hardware components which cause SCP-3622. Foundation Agents were dispatched to their corporate headquarters in Toronto, Canada. After six hours within the office building, contact with the agents was lost.

Six minutes after loss of contact, an email was sent to the shell corporation email server.

Attached is the text of the email received:


Agents Danvers and Callavatra were found in their homes with no memory of their time in the Ledenoff Technologies offices.

Foundation agents infiltrated the Ledenoff Technologies office building, but discovered no evidence of Ledenoff technologies within the building. The office space registered to the corporation was unoccupied, but still paid monthly by a registered Ledenoff Technologies account.

Power and internet usage for the building included a large portion going to the 17th floor, which was registered to Ledenoff Technologies.

Surveillance of the entrance to the building has proven non-viable, as to date, no employees of Ledenoff Technologies have been identified other than "Mike Summers", the apparent CEO.

Mike Summers (designated PoI-████) graduated from Carnegie Mellon University in 2002, with a Bachelor of Science degree in Computer Science. Foundation agents raided the registered address of Mike Summers in Toronto; however, the apartment appears to have been abandoned for some time.

Mike Summers was reported missing from 2003 to 2006. Several sightings were made in Sochi, Russia, as well as the Balkan Region around this time. Ledenoff Technologies was founded by Mike Summers in 2007. According to incorporation records, two names were on the original ownership forms. The original copies of these forms were lost during the switch to an electronic tracking system for the incorporating entity in 2008. Amended ownership forms only list Mike Summers as the owner and CEO of Ledenoff Technologies. Passport records indicate that an individual listed as "K. Ledenoff" was recorded as entering Canada with Mike Summers in 2007.

Information regarding K. Ledenoff can be forwarded to Director Stephenson. At this time, it is believed that K. Ledenoff is a potential PoI, due to their potential involvement in [ REDACTED ]3.


Last updated by R. Diaghilev (REDACTION PROTOCOL CHANGED)3, 31/12/2017 23:59:59 UTC. [REDACTED]
Prepared by Agent Saksena, 15/10/2017 14:41:16 UTC. ten.pcs.ofni|aneskas.a.a#ten.pcs.ofni|aneskas.a.a

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License