Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech Hel-Class EWAR System

Status
Not open for further replies.
x8XcNF.gif

x8XAzb.gif

x8XEWf.gif


  • Able to disrupt sensor returns, allowing a soldier to avoid detection or enemy weapons locks.

  • Able to disguise a sensor signature

  • Able to counter enemy jamming

  • Able to help provide a picture of the battlefield to the user

  • Able to Hijack Enemy communications, scanners, and databases.

x8Xhl6.gif


  • Able to Jam enemy communications, either through a broad spectrum jamming of all available frequencies, or a targeted jamming of specific frequencies as picked out by the Courier Communications Scanner.

  • Able to crack enemy encryption, allowing a commander access to enemy communications and plans.

  • Able to distort the sensor signature of the armor it is built into, making it harder for enemy missiles, vehicles, and fighters to acquire the armor as a target.

  • Able to hijack enemy communications and sensors to slice into their systems, and often is able to then control infected comm systems, sensor systems, and any databases connected to them.

x8X6Mp.gif



  • Jamming works best on passive detection systems, a powerful enough active sensor system will burn through jamming to show the target beneath.

  • Sufficiently capable encryption systems cannot be defeated, or cannot be defeated in time for the battle meaning that even if you know your enemy are talking, you have no idea what it is they’re saying, nor able to access their systems.

  • Not Stealth: The ECM can distort a sensor signature, making it harder to locate, but it’s not stealth and there will still be a weak return. While many systems would disregard it as a ghost, a sufficiently capable system or operator will be able to spot the return.

x8Xqme.gif

While working at Locke and Key Mechanics, an idea to miniaturize one of its specialty components came up. After studying the Loki E-War System, Allya set to work to create a system powerful enough to affect a large area, but small enough to work with a powerful set of armor, such as the sort she had designed for the Dauntless soldiers.
It is designed to control the flow of information. It can jam enemy communications, it is able to slice into comm systems, encrypt and de-crypt comm messages, it can take control of many sensor systems, and steal data from them and comms connected to bases or command vehicles. It makes it harder to target the armor with missiles, and harder for sensor systems to pick up its exact location, and even creates false sensor readings of new enemies so even in the midst of battle, it becomes difficult for enemies to target and attack it efficiently.
When connected to the IONA AI, it becomes infinitely more effective, able to be used to its full capabilities.
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom