Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech Wind-Talker Class Personal Communications Array

Status
Not open for further replies.
francis-goeltner-grimmodds-props-datapx-portfolio01-noannotations-m.jpg
OUT OF CHARACTER INFORMATION
  • Intent: To create a Commlink/Holographic Display for future subs or as a standalone technology.
  • Image Source: Gallery
  • Canon Link: Commlink
  • Permissions: None
  • Primary Source: Spectrum CWEW
PRODUCTION INFORMATION
  • Manufacturer: Freebirds Industries, Confederacy of Independent Systems
  • Affiliation: The Dire Wolves Mercenary Company, Closed-Market
  • Model: C-1
  • Modularity: Can be integrated into helmets, armors, or utilized as a standalone comm unit/holo-display, able to link up with any kind of sensors package so long as the proper software is downloaded. Comm equipment onboard is able to integrate with any type of comms system however security is not always guaranteed with systems that do not keep themselves as secure as this unit.
  • Production: Minor
  • Material: Plastoids, quantum processing unit, silver based wiring, Phrik-A casing, electronic and electrical components, solid state memory system, communicator components and quantum transmission components
SPECIAL FEATURES
  • Communications package that has rotating encryption that work in two ways. Firstly there are two sets of encryption that are rotated counter to each other and are also set in a way that no two keys will ever come up more than once in a life cycle of the key rotation, which lasts for a standard galactic month. Encryption keys are a randomly generated 232 bit encryption that rotates every half second, and each device is synchronized to know exactly which key set is being used, at exactly which time manually, meaning if a device gets compromised, you simply change the internal time settings on the secure devices and the enemy no longer has a tap into your systems. The second way it works is that with a variable frequency transmission, where based on the encryption key present, the com-link will jump across various preset frequencies that allow for this either evade jamming by getting some of the transmission through specific jamming, but also prevent someone from isolating a specific frequency and trying to tap into your transmission by brute forcing the encryption from their side as a simple receiver. This means that any would be listeners would have to not only guess the frequency your talking on, but the encryption key, and with each change happening over a half second this gives little chance for someone to actually perform this. Physical distribution of the keys requiring a manual upload and synchronization with another device prevents these from being remotely accessed and having their keys stolen with a literal physical copy of the key set for that point in time.
  • Also has quantum communication system that synchronizes devices to each other allowing for direct point to point communication but is much more difficult to actually add devices into, requiring a device that's a part of the current network and a full workshop to tune it into this direct network. This is much more secure and guaranteed to transmit but also is much lower bandwidth only allowing for voice communications to be transmitted clearly and effectively. If a system gets compromised on this version of the network there is no way to tell if your communications have been compromised as there is no key, but this can only be done by obtaining a comm from that specific network, as without a tie in to the network there is no way to "tune in".
  • Utilizes AM/FM/HF radio waves to also communicate across other more local channels, and has the ability to screen across these waves so that any attempt to remotely access the system from this method of communication will force the attacker onto the actual wavelength of the main communication grid forcing them to either sync up with the current encryption key, or be forcibly disconnected. This makes this com-link unique in that it can be utilized on lower security settings without itself actually becoming compromised as it forces other com-links to either specifically send or receive data as these transmission bursts are analyzed by the quantum processor aboard the com-link itself. This makes it nigh impossible to hack into but can also cause trouble with other outside com-links as if there is any suspicious code detected in the transmission it will immediately treat that as an attempt to access its system.
  • Com-link is also able to sync up with other sensor packages, armors, and other secondary systems to provide extra data from these packages and systems to allow for display and control of these systems. All connections made through to other systems however are hard wired, which means that there is no way to wireless tap into the com-link from another system. This ensures maximum speed and security, but if that connection gets damaged you will lose the ability to use the display as a port for that piece of tech.
  • Allows for the isolation of certain transmissions along a certain wavelength and to be able to ignore said transmissions or if the proper equipment is in place, jam that specific transmission. This allows for multiple units to identify enemy transmissions and specifically either ignore them to keep their own comms traffic clear if they are running below optimal security settings, or actively jam enemy communications while running their own communications around their own jamming frequencies.
  • Larger backpack integrated versions of this communicator are able to transmit from ground to space easily and are useful for people performing coordination of aerospace, space, and capital class vessel assets. And with multiple ways to transmit, this allows you to be able to coordinate with multiple types of vessels and communication methods.
STRENGTHS
  • Extremely versatile piece of com tech: This communication system is designed to work with a variety of transmission protocols, being able to be flexible enough that if it encounters a communicator that isn't the same type as itself, it can step down its security protocols to receive and transmit to said communicator without compromising itself to offensive cyber or electronic warfare attacks. This makes this little piece of technology extremely handy to the ground pounder and anyone else either in the field as a soldier, or as a high level executive who likes their privacy and ability to communicate.
  • Ability to serve as a second display: The holographic display on this com-link is also quite handy as it allows for not only video-based communications, but also as a display to any sensor based or secondary system you attach it to, and while it requires you to have a physical connection to said piece of equipment, this is hardly a downside when you think of all the things you can attach this to and make this almost like a second computer or datapad.
  • Nigh Unbreakable Security Protocols: This communicator doesn't take security lightly at all. Combining the encryption keys, a frequency hopping transmission, or even just forgoing the frequencies altogether with a quantum point to point transmission and the software to back it up makes this thing a daunting task to try and break into. And sure if you get your hands on one that makes the job that much easier, but the moment the people who you are trying to hack into know on of their comms just got hacked, you'll essentially be back to square one as they can change their security protocols immediately with a simple time change. And there's a lot of half seconds in a galactic standard month.
WEAKNESSES
  • Doesn't play nice with other comms: So this thing has a ridiculous amount of security on it and for a very simple reason. Compromised comms means compromised lives. This com-link doesn't like playing nice with other types of com-links and while it can sure send and receive data from these com-links, without the ability to go secure and confirm that it is on a secure connection with a friendly com-link, it will be a hassle to send any kind of data over point to point net. That means that if you are trying to send coordinates, or other types of tactical data and the guy on the other end of your transmission isn't running one of these with the exact same security protocols, you are better off just telling him the coordinates rather than trying to just transmit them. Let alone videos or any other kind of communications that isn't speaking. That requires the user to actually manually disengage security protocols and force the com-link to accept lower security transmissions. Because if they don't you're connection is going to be supremely lagged out as the com-link has to pore over every spec of data that comes through to prevent a possible hack or data breach of any kind. And sure that quantum processor is great but it's not a miracle worker and has a lot of other stuff to do. So unless you want your stuff completely secure and don't care about other people trying to talk to you, you might want to go elsewhere.
DESCRIPTION
The Com-link. Designed to be the latest and greatest in communications technology that allows for instantaneous transmissions of data anywhere into the galaxy, even onto the holo-net, this technology is one of the greatest avenues for people to connect and communicate across vast distances with ease. And also one of the greatest weaknesses of any data network available. And so enter Freebirds Industries' own entry into this veritable technology, The Wind-Talker Class Personal Communications Array. This com-link has one thing and one thing only in mind when it approaches its job, and that is security. From the outside of the network, this communications system is nigh unhackable with the only real way to possibly get a chance to get inside the network is with the very specifically generated keys, how those keys are being run, and where exactly they are in that sequence. This means that across an entire month you have an entirely unique key set that changes every half second to not only include the frequency you are on, but also the encryption you are using, meaning no two half seconds will ever be an exact match for each other. This allows for this communications system to be nigh impossible to break into or let alone actually hacked into. And while you can engage these com-links with more standard versions that doesn't have near as high security protocols, you won't get anywhere as the user of the com-link has to manually disengage the security protocols to allow for you to have access into the system. And while this means that interactions with other systems will be severely lagged from both ends you can manually disengage the security if you know the transmissions are coming from a trusted source. This is risky but also allows full bandwidth usage across this system and a lesser system. Otherwise this will be like a really bad connection with other com-links. Finally a feature of this com-link is that you're able to use this with other secondary systems with an interactive display. This allows you to sync it up with other sensor packages and equipment to utilize this display as a way to interact with said systems. All in all this makes this com-link a great multi-tool that will allow you to utilize it as a PDA, with a first in class secure comms package.
 
Last edited:
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom