Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

"Intelligence" I series augments

I feel its fairly appropriate here to make a thread for similarly themed items, considering my intended business model.

These augments in this thread should be Vigil's designs for 'intelligence' purposes. This should include gathering information, protecting information, etc. These will be things that can be mounted to appropriate droid models.
 
Hush Protocol (?)


OUT OF CHARACTER INFORMATION

  • Intent: To continue Vigil's "Series I" model augmentations for standard stock droids
  • Image Source: N/A
  • Canon Link: N/A
  • Restricted Missions: N/A
  • Primary Source: N/A
PRODUCTION INFORMATION
  • Manufacturer: Keen-Eye Electronics
  • Model: N/A
  • Affiliation: Closed-Market
  • Modularity: No
  • Production: Mass-Produced. (Anyone.))
  • Material: Electronic parts, Microphone parts, Recording parts
SPECIAL FEATURES
  • Audio Recording Device: Can record audio taking place around the augmented droid.
Strengths:
  • High Quality: The audio quality recorded by the series I-01 augmentation is almost lifelike, provided the recording isn't damaged before being recovered from the interior of the droid.
  • Subtle: The recording device can be activated remotely, such as with a simple audio cue programmed into the droid.
  • Memory Wipe Proof: Because the device is not attached to droid memory in any way, memory wipes do not affect the recordings. Which means the droid can be routinely cared for as any other.
Weaknesses:
  • Faint hum: There is a slight hum that comes from the droid recording. Though it could be attributed to background noise, if one were close to the droid they may be able to tell the droid is recording.
  • Data Recovery: As the device is much like a pilot's black box, the audio data is trapped inside the droid until being removed manually by technicians trained to do so.
  • Limited space: There is about two hour's worth of storage space, making it a usefully subtle recording device but not one which can be relied upon for lengthy periods of time.
DESCRIPTION

Droids have often been used to spy upon one another, and one such common practice was the use of a bug, a recording device to record audio, video, or both. However these kinds of recordings often have significant problems, which are addressed by the Hush protocol. First off, the device is in itself separate from the original droid, containing a small recording device unaffiliated with the droid memory banks. This makes it possible to be put into any droid with the spare space, and
 
Idea note: Here will be an augment to utility droids for advanced hacking capabilities.

OUT OF CHARACTER INFORMATION

  • Intent: To create an advanced hacking tool for applicable KEE droid models.
  • Image Source: N/A
  • Canon Link: N/A
  • Restricted Missions: N/A
  • Primary Source: N/A
PRODUCTION INFORMATION
  • Manufacturer: Keen-Eye Electronics
  • Model: N/A
  • Affiliation: Closed-Market (Any character can use this if they have explicit permission through, for example, a marketplace purchase)
  • Modularity: No
  • Production: Minor (Any Character, Only Select Groups Of NPCs)
  • Material: Electronic Components
SPECIAL FEATURES
  • The Bentley Program: Advanced hacking protocols
Strengths:
  • The Bentley Program: Advanced hacking protocols that drastically improve a droid's ability to push itself into systems it does not have the authorization for. The program is roughly the equivalent of a high class, quality hacker with extensive experience.
Weaknesses:
  • A Mind of their Own: Droids upgraded with this protocol almost universally develop some sort of personality quirk, not unlike a droid that has gone for a lengthy time without a memory wipe.
  • Memory Wipes: Due to the design, a memory wipe will inhibit or negate the upgrade's purpose, causing it to be a waste of credits.
  • Restricted Models: Due to the design, this upgrade can only be put on applicable droids, such as astromech droids.
  • Military Encryption: Due to the nature of security, while capable of slicing through military security systems the upgrade does not ensure success. Military grade encryption can pose a problem.
DESCRIPTION

The Bentley Protocol, named so for the disabled programmer who designed it, is an advanced slicing protocol that can transform a standard astromech droid into a high-quality slicing machine. By overwriting 'unnecessary' code, the Bentley Protocol enhances a droid's capability in finding loopholes within code and accessing higher and higher security. In a rough estimation of capability, a droid upgraded with this protocol will be capable of slicing through most civilian, non-military security with greater ease. Most criminal elements, such as small-time gangs, will also be within reasonable capability, though big time crime empires will pose difficulty in the same way military installations will. Though capable of slicing through, the Bentley Protocol is not designed to be the top-of-the-line slicing protocol, but a protocol to upgrade the standard ability of an astromech droid to become a valuable espionage tool.

A noticeable flaw, however, is the development of personalities and quirks. For reasons KEE assures are unintentional, the protocol accelerates the development of droid personalities, a common flaw with lacking memory wipes. This would not be a problem if the protocol was not dangerously susceptible to memory wipes, making memory wipes a poor option to solve a droid with this upgrade developing a.. problematic personality. In extended operations this is a liability, as the droid's protocols will be wiped should the droid be taken in for a routine memory wipe to fix the noticed eccentric personality development.
 

Users who are viewing this thread

Top Bottom