Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech SE-211 Attack Terminal

Status
Not open for further replies.
OUT OF CHARACTER INFORMATION

Intent: To create a shipboard terminal for slicing into computer systems
Image Source: NA
Canon Link: NA
Restricted Missions: NA
Primary Source: NA

PRODUCTION INFORMATION

Manufacturer: Starchaser Enterprises
Model: SE-211 Attack Terminal
Affiliation: Closed Market
Modularity: Program upgrades
Production: Limited
Material: Cables, computer components

SPECIAL FEATURES

Able to control a virus hacking through a station/ship system

Strengths:
· Capable of slicing a computer system of a station, beacon, or ship
· Manually controlled computer hack using visual interface
· Able to slice and shut down a system
· Hidden from alerting standard automated defensive systems

Weaknesses:
· Disables hacking ship’s weapons when module is in use
· Disables cloaking when in use
· Disables hacking ship’s shield recharge
· Can not assume control of a ship system, merely turn it on, or off
· Hacking works better with ship physically tethering to opponent rather than wireless, however wireless can be done
· Detectable by programmers
· Limited attempts before system lock-out
· One system affected per successful hack
· Time intensive the larger targets

DESCRIPTION
The Starchaser Enterprises 211 Attack Terminal is a new and experimental system that can put the power of a slicer directly into a ship. A computer system that provides a 3D HUD display for computer hacking, this system is specially tuned to allow even incompetent computer terminal users to successfully break into an opposing ship, station, or beacon’s systems in order to wreck havoc. This system, while powerful, definitely pulls the focus of a ship’s systems. When this system is engaged, the hacking ship can not fire, nor cloak, and the shield recharge rate drops to zero. A ship also needs to keep a close orbit, or if possible, be physically tethered and plugged into the target through use of specially designed cables that must fired from the attacking ship and then spidered into part of the target’s computer network.
The major advantage is that this can be placed on any size vessel, and the use of it on smaller vessels to hack the system is quickly seen as the best practice, as the larger signature masks the smaller ship’s radar cross section. However, once a system is affected, it wouldn’t take long for the opposing crew to realize the problem. This would then need the opposing ship to disable firewalls in their own system, take control of their vessel’s affected system.
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom