Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech DataSec C-STM

Status
Not open for further replies.
Image Source: N/A
Intent: To create a anti-slicing routine for turrets to ensure their complete loyalty to sentient overlords.
Development Thread: if/else/default

-----------------------​

Manufacturer: DataSec
Model: v1.21.002 (Impenetrable Tortoise)
Affiliation: Approved Customers
Modularity: No.
Production: Minor
Material: Variables, constants and algorithms. Encryption Module Chips and also memory sticks for delivery.

-----------------------​

Description:
The first in a long planned line of defense articles -- the DataSec Client-Server Turret Manager (or just The Tortoise as the ‘Basement Geeks™’ called it) was a solution to a rising problem that had been observed amongst the battlefields throughout recent history: Slicers.

The idea was simple. The company wanted to ensure that nations and companies who really valued their privacy also had the tools to protect such things in not just the physical realm but the cyberworld as well. DataSec therefor came up with the idea of having things go back to the basics.

Each turret (client) in a system was connected through cables to one central hub (server). This server was in charge of everything. The IFF protocols, the event triggers and what each individual client connected to the server did. Each and every single turret’s impulse, digit and decimal had to be managed by the server itself before the client was allowed to work which in return meant that the workload would be huge depending on the amount of clients that were connected to each hub.

This also meant that on the client-side of things they had to install special encryption modules within the turrets that requested heavily encrypted randomized passwords and orders from the server. Data chips were installed upon the motherboard of said turret to take care of the decryption while at the same time replacing the turret’s original brain with one that only had two tasks: Reporting to the server and performing the server’s returned orders.

That however also meant that if the the cable connecting a client to a server was cut or if the server was shut down somehow the turret would enter standby mode until the connection was fixed again.

Of course, the clients were hackable but all you’d really get out of it would be the heavily encrypted data that the server sent to the turret which effectively meant that by the time you had decrypted the (to you) useless information all you’d really be met with would be the incoming orders that the turret was to execute. This was however a good way block the server’s access to the turret which would in turn effectively shut it down due to a lack of orders.

So in short the DataSec C-STM was the first basis of a product that would see continued development throughout the years. This was merely the first publicly available product they’d launch.

Summary of Weaknesses:


  • It required physical maintenance

  • Quantity =/= Quality and the more clients you had hooked to the servers the slower the reaction times got in the form of severe network lag which could cause turrets to shut down at random.

  • The server had to be one or several physical consoles dedicated solely to running the clients’ every single move.

  • The client could be hacked to prevent the server’s access to its clients though the procedure had to be be repeated once for each client said server had going.

  • If no data was received from the server within a 10 second interval the turret shut itself down.

Summary of strengths:

  • A client that kept unwanted intruders away from your network.

  • A way to make turrets exceptionally difficult to slice and turn on allies.

  • A server that can handle up to 6 turrets individually before the workload started taxing on it too much.

Primary Source: N/A
 
This is interesting, I'm just slightly missing something here.

Fundamentally, this takes the thinking away from the turret and puts it in a central processor.

What I don't understand is:

- What protects the central processor from being sliced?
- How does the server control the turret's aiming if the cables are mostly one way?

Is it that the central server is protected against intrusion to a much higher respect than the systems usually loaded into a turret?

Is it because you've placed intrusion protection devices along the connection between turret and server to monitor and defend against attacks?

[member="Elias Truden"]

It's a good sub, but the benefit needs spelling out a little more clearly! :)
 
[member="Raziel"]

Perhaps I should have added that and removed the part about the cables being one-way, my bad.

The way it works is that the central processor (server) itself is in fact left exposed. If an intruder manages to get itself into a position where they could hack or simply gain credentials to the physical console itself they would also gain access to each turret connected to that server hub.

This also works somewhat on the turrets themselves. A slicer can slice the turret and block out any server data from reaching the turret and therefor rendering the turret itself useless as it no longer is provided neither orders nor identification data.

As for the way the server manages the turrets I'd like to imagine it as a sort of waiter standing at six counters at once. An order comes in and the server provides it. In this case the customer is a turret and the order is a request to check if this person's radio signal matches any registered personnel files. The turret itself sends a request to the server which in turn has to check it's database for signatures before getting back to the turret with an order to either fire the weapons at the unrecognized person or it stay in standby because it was recognized.

It blocks out the client from overloading the remote CPU running it is by applying a time filter and the more units that are connected to the system the longer the wait time is. That means a server running 16 turrets at once would for example have a wait time of 15 seconds because of the highly unrecommended amount of traffic the server has to work through before reaching said turret's request.

Just to kinda add, I decided to make the submission itself somewhat faulty on the basis that my company is small and most likely doesn't have a budget to pull something like this off as easily as a bigger company would. (In case you were wondering on that too :lol:)
 
[member="Raziel"]

Right, my bad, again.

The thing that hinders the slicer from gaining access to control of a turret is the one-way(ish) connection between the server and the turret.
 
[member="Elias Truden"]

Right I'm with you now :)

Could you just make that nice and clear up front and state that of the turret stops receiving control messages from the server it will simply shut down? (or something similar)

Thanks for being patient with me
 
[member="Raziel"]

No worries, I should have been more clear from the start. I appreciate the help, thanks.

I rewrote the part about cables and italicized the parts that I feel is the key weaknesses to this tech in order to make it easier for others to find them.
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom