Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Private The DSDT Signal and the Slicers

Code From Here
Her Her

Feet up at the Data Dive's rooftop on a rare dry day, Ghost lounged back, skimming through four different net feeds at once. "Hey, Sick, ya got a sec?" He jacked his AT-Link into the stream, taking a long sip of his usual morning brainrot. "Got somethin' ya might like."

Sickle—their resident anarchist—was damn good at two things, nuking systems and cracking whatever codes corpos threw their way. This one looked higher-end than usual. She smirked, neon-tinted lenses reflecting the scrolling data as she cracked her knuckles. "Oh, you know I live for this kriff. What've you got, Ghost? Somethin' juicy?"

"Dunno yet. Looks like choice work, though. You got a read?"

Over the next few hours, with more of the crew filtering in, Rogue Protocol had datapads stacked up, stimcaf cups drained, and at least two more rounds of brainrot in circulation. Ghostkey yawned as the morning rushed into late afternoon, the skyline spitting neon fire as clubs powered up and the city woke to life.

"Oh man, GOT IT!" Sickle was the first to call it, beating Ghost by a whisker, which ticked him off! She adjusted her neon-green specs, zooming in.

  • WE RELY ON A CODE
  • DIRECT LINK SIGNAL ON
  • CODE HIGH ZONE
  • DSDT KEY DIRECTORY
  • THE CONE OF SILENCE
  • PORTABLE DAMPENING
  • KILL THE CODE LINK USED
DSDT?
Ghost chewed down on a SticknEat—some processed garbage marketed as nutritious. Like everything on Denon, the ads were probably half lies.

Glade hovered over in her chair, popping her lips as she thought. "Wait—uh, I've seen that before. Somethin' from a deep crawl…" She sifted through more net history in minutes than some minor factions managed in a month, a certain op on a certain ship, no idea what it was about, only the filename.

"Direct Surveillance of… uh, Domestic Threats." Glade hesitated. That wasn't small-time. "Well… y'know, what do we do now?"

Ghost shrugged, then hit send.

"File decoded. What do you need, and how much is it paying?" A team of slicers who could crack their codes and had as many eyes on the grid as an intelligence outfit? If nothing else it was a danger. Could be the right move to hire them. Who knows, but their own signal was bounced around more fake nodes than you could count.
 
Last edited:
  • Love
Reactions: Her

ISB-cog.png


Direct Surveillance of Domestic Threats, Empire of the Lost;
The Fifth Wing Conspiracy.




"For the present, the more covert we remain, the more influence we can have. . ."
-- Darth Tenebrous.





Time is a flat circle.

Hiding in plain sight is a superior disguise. Cryptography, as understood by the laymen, is the practice of encoding information so that it can only be read by the intended recipient. Esotericism, as by it's very definition, is intended for, or likely to only be understood by only a small number of people with a specialized knowledge or interest.

It was Darth Bane who first taught that those who practised the ways of the dark side should act in complete and utter obscurity but it was his successor in Plagueis who once practiced new avenues of philosophy into understanding the very nature of the Force through the aspect of incorporating esotericism into his work while under the watchful gaze of the Jedi. Politicians, entrepreneurs and members of the criminal class were often invited to SOJOURN to participate in the grand plan to fulfil the promise of the Sith. Often compartmentalized, manipulated and mostly unknowing of their involvement in the plot all the while under the gaze of symbology, and esoteric designs that they didn't fully comprehend, or understand.

Much like the Fifth Wing.

To traverse the Galaxy under the guidance of these philosophical takes about the dark side invited the believer into practising the esotericism preached by their forbearers who came about after the wise old Muun met his demise. With the knowledge that their presence-- the very fibre of their being had been obscured by the power of the dark side-- led to a rush of revelation through esoteric signs of their existence: a warning that someone, or something was there in the dark, watching. We live in a time where there are so many of them now.

Symbology. Morphology. Longevity. Cryptography.

What do you see when you look in the mirror?
Have you ever been somewhere you know you shouldn't be, and felt that feeling creeping up on you?
We both know what I am talking about, don't we?

You reach a certain age where you know who you are. Now I live in a little room, traversing the Galaxy cloaked, working towards the promise, and in between I dream; and there isn't nobody there to stop me. I know who I am; and after all these years, there's a victory in that.



GBS.png


In the GALACTIC BASIC STANDARD (some call it Aurebesh) there are forty-nine letters, or symbols used to communicate. Words, grammar, punctuation, symbols. Seven lines of numbers interlinked to items recorded within the Direct Surveillance of Domestic Threats were taken during the SARTINAYNIAN CRISIS. Each line are differentiated by how many numbers are present in each line corresponding to their distinct item: a dossier, an encrypted message, a prototype, the program, a Cone of Silence, a generator, and a shuttle.

Taking into account that A = 0 then translating the numbers to their corresponding letter in the GBS reveals the following:


Dossier 2351185122591472015251521
~
2351185122591472015251521
CDFBBIFBCCFJBEHCABFCFBFCB
#25 Numbers / Letters.
25 = Z.

Encrypted Message 418525-201811419139191991514
EBIFCFCABIBBEBJBDJBJBJJBFBE
#27 Numbers / Letters.
27 = CH.

Chandrila DataTech's "3457-89-01" Prototype
DEFHIJAB
#8 Numbers / Letters.
8 = I.

DSDT Program - #419420-1129391-418525
EBJECABBCJDJBEBIFCF
#19 Numbers / Letters.
19 = T.

"The Cone of Silence" - #2085-315145-156-1991251435
CAIFDBFBEFBFGBJJBCFBEDF
23 Numbers / Letters.
23 = X.

Portable Dampening Field [PDF] - #1615182012125-4113165149147-695124
BGBFBICABCBCFEBBDBGFBEJBEHGJFBCE
32 Numbers / Letters.
32 = OO.

Annihilator-class Boarding Shuttle - #11414989121201528-31211919-21511849147-198212020125
BBEBEJIJBCBCABFCIDBCBBJBJCBFBBIEJBEHBJICBCACABCF
48 Numbers / Letters.
48 = /.

The above only takes into account single digits numbers corresponding to their respective letter in the alphabet. Six out of the seven items discovered within the DSDT PROGRAM reveals the key to deciphering the message. For example, when taking into account that there were twenty-five numbers displayed beside, 'DOSSIER 2351185122591472015251521', revealed the letter, 'Z', when translating the number to it's corresponding letter.

In cryptography, in order to obfuscate the information contained within the cipher, there is often junk intermixed with the real in order to throw off someone attempting to decrypt data. Among the discovered items only one contained a series of numbers which only equated to a single digit. It was the prototype which contained eight numbers linked to it's item which translated to the letter, 'I'. Treating this as junk leaves only six double-digits numbers corresponding to seven letters, and a symbol:


25 = Z.
27 = CH.
19 = T.
23 = X.
32 = OO.
48 = /.
~
ZCHTXOO/.

Doesn't that look like a password?



Analysis of the cipher, when taking into the account the existence of single digit numbers, and double-digit numbers corresponding to a letter, punctuation, or symbol contained in the GBS language reveal a different set of letters. For example: in GBS the double-digit number for twenty-three equals to the letter, 'X'.

When putting the cipher through this analysis to take into account single digit numbers, and double-digit numbers, new data was established which differentiated from the previous cipher presenting new permutations waiting to be discovered. Here is an example:


Previous cipher when taking into account only single-digit numbers:

Dossier 2351185122591472015251521
~

2351185122591472015251521
CDFBBIFBCCFJBEHCABFCFBFCB
#25 Numbers / Letters.
25 = Z
~

New analysis taking into account both single-digit numbers, and double-digit numbers:

2351185122591472015251521
XFLIFMZJOHCAPZPV
#16 Numbers / Letters.
16 = Q.

There are six other items discovered with their corresponding string of numbers attached. What do they mean, pilgrim?


 

Users who are viewing this thread

Top Bottom