Chloe Santhe
Character
OUT OF CHARACTER INFORMATION
- Intent: To create an advanced slicing tool set
- Image Source: Picture 1 Picture 2 Picture 3
- Canon Link: N/A
- Permissions: N/A
- Primary Source: https://starwars.fandom.com/wiki/Security_kit https://www.starwarsrp.net/threads/minerva-hud-system.102471/
- https://starwars.fandom.com/wiki/Computer/Legends
- Manufacturer: Chloe Santhe
- Affiliation: Chloe Santhe, Closed Market
- Model: CS-9001 Slicer System
- Modularity: Yes
- Production: Semi-Unique
- Material: Electronic components, code, digits, reinforced duraplast, insulated circuitry, shielded wiring, explosives
- Headphones:
- Headphones - Music/Audio players
- Directional transceiver
- DNA Tracer/Tracing Module
- FullSpec sensor package
- Sniffer Weapon Detector
- Visual Scanners
- Low-feedback scanner
- 9000 Energy Scanner
- Power scanner
- PX-7 Heat Sensor
- Courier Communications Scanner
- ChemDetect
- Diagnoster
- TeleSonic audio pickup
- EMS Scanner
- Tech scanner
- Audio sensor
- Sonic imprint sensor
- Holographic recording mode
- Sonic stunner
- Sonic dampener
- Audio-radial stunner
- Neural band
- Secure-A3 comlink
- Sunglasses
- Microcomputer
- Full functioning advanced computer
- Small handheld form
- Touch screen interface
- Self Destruct Mechanism - Explosives and EMP
- Scramble key
- SVC-700 Voice Scrambler
- Anti-security blade
- Merilang-1221
- Circuit disrupter
- Communication wave descrambler
- Computer spike
- Overrider
- PSG-8487 View Masker
- Diagnostic Systems Diverter
- Electronic lockpicking kit
- Resonator key
- Field security overloader
- Security cardlock breaker
- Security Domination Interface
- Security override device
- Shard of Alderaan
- Shortwave remote control hack
- Slicer chip
- Slicers' key
- Slicing unit
- ID processor
- Slicer virus
- Remote slicer
- Coded eraser virus
- Three in one: The device is an amalgamation of three separate units that form a singular whole. Because of this, their abilities are greatly increased, allowing the unit to perform highly complex tasks and perform a wide range of things. It is a comm unit, sensor system, HUD, visual aid, and slicer’s paradise, all in a rugged EMP resistant package.
- Remotely: The devices do not need to be manually plugged into a data source to be able to slice and manipulate it. They are able to find vulnerabilities, and exploit them at range, doing so all while being very hard to spot, track, or break into.
- My Kung fu is strong: The device is able to search for, and find weaknesses in systems, machines, data streams, comm units, and the like. It is a very powerful tool against even the most pesky security firewalls, data encryption and so much more. And if ever it's captured, it can explode!
- Force and vision: The neural band and View Masker offer great amounts of protection, helping to stop a mind from being controlled or manipulated by the force, and when activated, makes visual, sensory and so on identification next to impossible.
- Military Jamming: It is highly susceptible to heavy military grade jamming. It doesn’t have any real way to counteract the effects of it on it’s own and it limits its abilities tremendously, making it unable to use its remote slicing abilities, and so many other at range abilities.
- Ion: While resistant to EMP fields, it is highly susceptible to direct ion blasts to any part of the device. It will just stop working, no ifs, ands, or buts.
- Range: While powerful, it has an effective range of 300 meters, and a maximum range of 500 meters. Beyond that, it simply cannot perform ANY of it’s “magic”.
- Weapon Detectors: High Powered explosive detectors can detect the explosives found in the datapad if it’s scanned directly.
The CS-9001 is a powerful slicing tool, created by Chloe Santhe. It exists in three separate parts, connected by a series of cables, as well as incredibly short range direct line of site information bursts. It takes technology, micronizes it, and places it into a fairly inconspicuous package. It is capable of remotely slicing into computer systems, droids, comm units, sensors, and so much more at a decent range, without ever having to come into contact with it. This is done through the way the technology of each piece coexists with the other pieces.
Headphones: They appear to be a set of plastic like cat ear headphones with speakers inside as well as connected to the ears. The colors are able to be changed. The top and bottom speakers are able to play music, vocal noise, as well as amplify other recorded auditory objects. The two speakers on the cat ears can also be used to play loud and powerful sonic frequencies and utilize them as a crude non-lethal weapon to aid in escaping. Inner speakers can amplify conversation around them. It also contains a massive amount of sensors and scanners that can pick up and record audio information, comm signals, follow power fluctuations, find weaknesses within data streams, and power grids, and other technological sources. The headphones are where the data gathering happens, that allows the users to avoid capture, find exploits in types of system. It also contains a neural band that helps to protect the users mind from force manipulation.
Glasses: They appear to be cheap sunglasses made of a plastic material. However, they are the HUD system, where the gathered information is displayed. The main idea for the glasses is to act as a non-descript way of viewing data logs, video feeds, to analyze the data the sensor systems gather and feed it to the user in a meaningful way so they can act upon it. However, it also helps to protect the eyes from harsh lights, bright flashes as well as to see in the dark.
Micro-Computer: It appears very similar to many datapads that are found across the galaxy. However, it is a very powerful encrypted micro-computer, able to perform a wide range of functions. Music can be stored, games played, news watched, research performed and so much more. However, it’s primary function is to act as a slicing and data hub. It takes in the data gathered by the sensors, analyzes it, and feeds it to the glasses. It predicts behavior, follows heat sources, finds weaknesses with planetary infrastructure, loopholes within security grids, and so much more. It contains some of the most complex and sophisticated analyzing and slicing tools in the galaxy. It can reach out and pluck data from the air, and find ways to insert data into other critical systems and use these tiny weak points to exploit entire buildings when used right. It can exploit datapads, comm units, computer systems, droids, electrical signals, sensors, cameras and nearly anything the user can think of. It also has an explosive device hidden inside, in case of its capture so the information cannot be used to incriminate the users patrons. However, at the end of the day it is a tool, not a slicing droid. While it can offer the world to the user, the user must know how to use it correctly.