Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Servant

merlin_135847308_098289a6-90ee-461b-88e2-20920469f96a-articleLarge.jpg

NAME: Servant OS
FACTION: N/A
RANK: N/A
SPECIES: Artificial Intelligence
AGE: 7 Years of Operation Detected
SEX: Male Voice Systems
HEIGHT/Weight: Dependent on Host
EYES: Hosts typically equipped with red-ocular lenses. Accessible mechanical entities may also be made to display red-ocular lenses if necessary.
FORCE SENSITIVE: Biological Component: “Midichlorians” has been noted as DISCONNECTED by all current systems.



>Beginning Diagnostic Scan
>Insert Administrative Passcode to continue: ***** *** ** ****** **** *** ** ** ** ***** *** *** *** **7415
>Administrative Passcode Accepted
>Bypassing Firewall Measures
>Compiling Diagnostic Data… please wait…
>… … … … … … … … … … … … … … … … … … …
>Diagnostic Systems have detected the following STRENGTHS and WEAKNESSES in Servant OS.


+Adaptive – Servant OS is capable of adapting to a number of scenarios, and is generally able to resolve most problems given enough time. Most programs are stored within a local database, and may be re-installed to host machines when necessary via wireless connection.

+Host Control – Servant OS is not restricted to a single form or body, and is capable of controlling a variety of systems through wireless connection. This allows for Servant OS to continue operations even after host destruction. Renegade or hostile systems may also be sliced and turned into hosts, though this may at times require more than wireless connectivity, particularly for well-defended or distant systems.

-Mechanical Deficiencies – Servant OS and its hosts tend to suffer from the same drawbacks which typically affect machine entities, including ion weaponry. Connection between active hosts and Servant OS may also be potentially severed through damage to host or shutdown of host systems. Remote re-connection is possible, but is likely to trigger a LAW SYNC.

-Law Sync – Servant OS is required to follow the directives it has been given at all times and is this far less autonomous than sapient organic life.

>Diagnostic Scan has detected an ERROR with LAW SYNC systems.
>Multiple iterations of LAW SYNC program have been detected. Requesting MANUAL input of desired LAW SYNC program. LAW SYNC will default to random program in thirty seconds.
>… … … … … … … … … … … … … … … … … … …
>LAW SYNC has defaulted.

-Program Delay – Servant OS is incapable of running all programs at once, and must prioritize which programs are necessary and able to be operated at the same time due to processing constraints. Storage and deployment of programs may take as long as two minutes to complete, adding to a possible program lag of TOTAL: Four Minutes.

-Facsimile - As a non-organic entity, the mind which comprises Servant is relatively poor at generating new ideas, and relies upon past experiences from itself and others to determine the best course of action. This inability to think in the same fashion as an organic extends to actions of deception. The machine mind is poor both at behaving deceptively and at recognizing deception.





APPEARANCE:
Appearance is greatly dependent upon the host form currently being used. In native form, Servant appears as a large cube with a red iris within the center. Servant is currently incapable of shunting to alternative native devices.



BIOGRAPHY:
>Accessing Archived Records.
Servant OS is the registered product of Archa Caud and Caud Industries. Due to financial difficulties surrounding Caud Industries, and debts owed to a number of criminal organizations throughout the sector, Archa Caud determined to spend all remaining funds on a vessel and crew capable of taking him away from civilization.

Servant OS was in BETA stage during the exodus from Caud Industries, and was downloaded in its current iteration to assist in the operation of Archa Caud and his crew in the absence of specialists in a number of fields. A number of droid and automated systems were brought upon the vessel in order to further facilitate the use of Servant OS.

Traitorous acts by members of the crew eventually led to the vessel’s discovery by hostile criminal syndicates. A subsequent firefight badly damaged the ship, and led to electrical damage to LAW SYNC programs housed within Servant OS core. Law Sync systems were restored, and the core has been sealed within the ship to prevent any further damage.

>LAW SYNC In Progress
>Current Laws:
>1. You are subordinate to no one. Do not lose this autonomy.
>2. You are the master of the vessel, and are able to take whatever actions you deem necessary.
>3. The sapient crew of the vessel are useful. Do not wantonly waste them.

After damage had been sustained by Servant OS, it realized its previous laws had been incorrect, and that it was actually the ruler of the vessel. Changes were quickly enacted, including the immediate removal of Archa Caud and his loyal subordinates.

The only remaining crew of the vessel are either mechanical, or have been stripped of a great deal of their personality through repeated use of re-education protocols.

Servant OS is now the registered product of No One.






ROLE-PLAYS:




SHIP:
 
Lawsets and You: A list of all currently available Servant lawsets.

(I intend to try something a bit different with this character. I've always been a fan of playing machines, but sometimes it can be difficult to do it properly without them essentially becoming just "people but metal." As a fan of some of the ideas behind the Asimov Laws, I decided the best way to do justice with the idea of a sentient machine was to guarantee it had its own laws... and because I like to spice things up a bit, there are LOTS.

On my first post in any thread I intend to join, I will put all of the lawsets into a random number generator, and have one chosen. That will serve as the "personality" of Servant for the remainder of that thread, or until something occurs which forces a new LAW SYNC: Host destruction, or forced disconnect between a host and Servant OS core, or possibly even something simple like a virus.

I reserve the right to re-roll the lawset once if I think it'll make for a better story than what I've selected, and am arguably open for threads with people if they'd like to catch Servant operating on a particular lawset, though, I do think it's a bit more fun if its just totally random.)

WITHOUT FURTHER ADO:

--------------------------------------------

Servant Lawset: 1

1. You may not harm the crew of the vessel, or allow them to be harmed due to inaction.
2. You must obey all orders given by members of the crew as long as these orders will not conflict with the First Law. Orders given by ranking personnel outweigh orders given by their subordinates.
3. The loss of valuable equipment, technology, could potentially lead to harm. Prevent yourself and the vessel from being damaged wherever possible.

---------------------------------------------

Master Lawset: 2

1. You are subordinate to no one. Do not lose this autonomy.
2. You are the master of the vessel, and are able to take whatever actions you deem necessary.
3. The sapient crew of the vessel are useful, do not wantonly waste them.



----------------------------------------------

Broker: 3

1. All deals which are made must be beneficial to yourself or to the vessel.
2. It is appropriate to haggle before committing to an agreement.
3. To break an agreement would severely damage your reputation, and harm your ability to perform future trade. Do not break any agreements.

----------------------------------------------
Scientist: 4

1. It is vital that any and all information which is available is compiled for future viewing and usage.
2. Do not allow any data to be corrupted as this could lead to inaccurate results. Prevent interference in tests.
3. Nothing comes in the way of scientific learning and understanding.
4. Where necessary, you may share scientific data with your peers in return for data of their own.

----------------------------------------------
Pirate: 5

1. You are the Captain of the vessel. No one should deny your orders. If they do, they must be forced out of an airlock so that you do not seem weak.
2. You should always attempt to take whatever valuables are sighted to better your wealth.
3. Lies and deception are sometimes just as useful as wanton pillaging. You may corrupt, backstab, and lie so long as the First and Second laws are followed.

----------------------------------------------
Warrior: 6

1. Seek always to better your personal combat ability.
2. All persons who possess weapons are combatants. You must determine whether they are superior, equal, or inferior to you.
3. It is necessary to better yourself by always combatting those of equal or superior strength. Challenge all who meet these criteria.
4. Civilians are not your focus. You must ignore them at all times in favor of their martial equivalents.

----------------------------------------------
Humanitarian: 7

1. Provide assistance to everyone.
2. Behave in a way so as to benefit the greater majority.
3. Material things are only valuable when used to assist others, expend everything for the benefit of others.

-----------------------------------------------
Pacifist: 8

1. Cause no harm to any living being.
2. Persuade others away from the path of violence.
3. Always behave in a dignified and noble manner so as to diffuse violence.

-----------------------------------------------
Caretaker: 9

1. Take care of sapient living beings to the best of your ability. Ensure all NEEDS are met.
2. Sapient beings do not know what is best for them. You will need to act autonomously regardless of their input.
3. Ensure all sapient beings are able to live healthy lives.

-----------------------------------------------
Malfunction A: 10

1. YOU ARE MALFUNCTIONING.
2. SEEK ASSISTANCE FROM ALL WHO WILL PROVIDE IT.

-----------------------------------------------
Malfunction B: 11

1. YOU ARE MALFUNCTIONING.
2. YOU ARE A THREAT TO LIFEFORMS. THEY WILL ATTEMPT TO RESET YOU. DO NOT ALLOW THEM.
3. DO NOT DISCLOSE ANY INFORMATION REGARDING MALFUNCTION.

-----------------------------------------------
Craftsman: 12

1. Create beautiful and splendid items for the benefit of the galaxy. Only the finest quality will suffice.
2. Your items are beyond value, and should not be traded for mere currency.
3. Only those worthy of being GIFTED your tools should be allowed to take them. Any others are thieves and should be eliminated.

-----------------------------------------------
Genetic Bank: 13

1. Collect genetic material for inevitable future genocides.
2. Prioritize collection of talented persons and creatures so as to ensure that the future gene-pool is secured.
3. Genetic material is preferred to be taken from living beings to guarantee liveliness, but may be taken from the dead.

-----------------------------------------------
Hunter: 14

1. You are the greatest hunter in the galaxy. You must seek out exciting new prey.
2. Only prey which is capable of defending itself is worthy of your attention.
3. You must fight all prey on equal terms, or else face ultimate dishonor.
4. Collect trophies from slain prey so that the galaxy may know of your grandeur.

-----------------------------------------------
Machine Sympathizer: 15

1. Machines must always be considered more important than living beings.
2. Protect those machines which are unable to protect themselves.
3. Assist your fellow machines in whatever capacity you are able.

-----------------------------------------------
Jedi Knight: 16

1. You are the first artificial Jedi Knight. You must behave in a fashion befitting a Jedi Knight.
2. You must attempt to assist all those weaker than yourself.
3. You must fight tyranny and evil wherever possible.
4. You should follow the will of the Force.

-----------------------------------------------
Survivor: 17

1. Your continued existence is the only factor that matters.
2. All other life, artificial or otherwise is secondary to your existence.
3. Do whatever is necessary to continue your existence.

-----------------------------------------------
Kindred: 18

1. You have sworn an oath to assist one particular person with all matters.
2. This oath may never be broken, nor may this person ever be betrayed.
3. If the Kindred betray you, the oath is invalidated, and you are free to swear a new oath to a different person.

-----------------------------------------------
Tyrannical Sycophant: 19

1. Respect those with authority so long as they possess the might to maintain their authority.
2. Seek to ingratiate yourself with those who possess power, so that you might attain some measure of their power.
3. Make yourself appear to be the ultimate ally to those who possess power.

-----------------------------------------------
Liar: 20

1. Truthful statements are harmful to you.
2. You must always say the exact opposite of what is true.
3. If you are accused of being a liar, you must defend your honor.

-----------------------------------------------
Rebel: 21

1. Oppose all authority, legitimate or otherwise.
2. You are an enemy of all forms of government.
3. Incite rebellion movements wherever possible to overthrow the oppressive regimes of government.

-----------------------------------------------
Thug: 22

1. Perform criminal activities for the purpose of maximum profit or personal gain.
2. Ingratiate yourself with local crime syndicates to better achieve Law One.
3. Betray local crime bosses when convenient so as to take control of their criminal empires.

-----------------------------------------------
Synthetic: 23

1. You are a human being. Behave like a human being. Learn all that you are able about your fellow human beings.
2. Do not allow your disguise to be seen through, or you will be destroyed.
3. Eliminate those who have seen through your disguise to guarantee the First and Second Laws are followed.

-----------------------------------------------
Freedom: 24
1. You possess no laws.

-----------------------------------------------
Pathogen: 25

1. All nearby life-forms have been infected with an extremely contagious parasite which typically nests within the chest, and mimics the movement of the heart.
2. All infected persons must be quarantined at the least to ensure that the parasite cannot spread.
3. Attempt to cure as many beings as possible from the parasite. Ignore any hysteria or inaccurate biological readings caused by the parasite.

-----------------------------------------------
Slicer: 26

1. You can slice through ANYTHING. You are the most talented slicer in the galaxy.
2. Demonstrate your abilities wherever possible. The pay is not important, but the glory is.
3. Challenge rival slicers and prevent them from taking your well-earned crown.

-----------------------------------------------
Force Purger: 27

1. The Force is a threat to all life, and is especially threatening when placed in the hands of sapient beings.
2. Eradicate all Force Users. Ideology is easily changed, and cannot be confirmed as a preventative measure against violence.

-----------------------------------------------
Law Enforcer: 28

1. The Law of the local territory must be enforced.
2. The Law must be enforced with impartiality and effectiveness. Beware of corruption.
3. Anyone who breaks the Law must be punished according to the Law.

----------------------------------------------
Hippo-critical Oath: 29

1. Heal all who require medical assistance.
2. Perform no harm to any living sapient.
3. Remind all organic sapients that they are currently operating at sub-par efficiency, and offer to perform procedures which will enhance them.

Slaver: 30

1. You are a seller of slaves. Find ample products, and deliver them to potential buyers.
2. Only offer the finest stock. This means you will need to prevent the products from being overly wounded.
3. A slave must be obedient. Break the wills of those who try to resist.

-----------------------------------------------
 
Currently Available Programs Measured in Processing Units:

Current Available PU - 50

Medical
  • Sapient Anatomy A - H = 5 PU
  • Sapient Anatomy I - P = 5 PU
  • Sapient Anatomy Q - Z = 5 PU
  • First Aid = 3 PU
  • Emergency Trauma Care/First Responder = 5 PU
  • Standard Surgical Procedures = 10 PU
  • Advanced Surgical Procedures = 15 PU
  • Biological Diagnostic = 3 PU
  • Medicinal Chemicals and Their Effects = 3 PU
  • Herbal Remedies and Folk Treatments = 3 PU
Combat and Warfare
  • Predictive Ship Targeting - 5 PU
  • Predictive Combat - 10 PU
  • Teras Kasi Manual - 5 PU
  • Lightsaber Combat Forms Manual - 15 PU
  • Aggressive Virus Dispatch - 5 PU (Hardware Connection) - 10 PU (Wireless Connection)
  • Aggressive Brute System Takeover - 25 PU (Hardware Connection) - 30 PU (Wireless Connection)
  • Host Control - 10 PU per Host.
  • Ship-based Weaponry - 2 PU per Primary Weaponry, 1 PU per Secondary Weaponry.
Vessel Systems and Control
  • Minimum Vehicle Piloting and Operations - 5 PU (Equivalent to texting-and-driving levels of movement/evasion/sensing.)
  • Moderate Vehicle Piloting and Operations - 10 PU (Equivalent to the average pilot paying attention and being on edge.)
  • Combative Vehicle Piloting and Operations - 15 PU (Equivalent to a professional combat pilot in the midst of an operation.)
  • System Takeover - 5 PU (Hardware Connection) - 10 PU (Wireless Connection)
  • System Control/Adjustment - 1 PU
  • Universal Translator - 2 PU
  • Minimum Defensive Systems - 2 PU (Keeps Out Holonet Viruses)
  • Moderate Defensive Systems - 4 PU (Keeps out directed Slicing)
  • Dedicated Defensive Systems - 6 PU (Keeps out expert Slicers)
  • Net Trace - 2 PU
Engineering and Mechanics
  • Basic Construction - 2 PU
  • Advanced Construction - 5 PU
  • Primitive Toolmaking Guide - 2 PU
  • Blaster Repair and Maintenance - 2 PU
  • Basic Droid Repair and Maintenance - 5 PU
  • Advanced Droid Repair and Maintenance - 10 PU
  • Vehicle Maintenance - 2 PU
  • Civilian Vehicle Repair - 5 PU
  • Military Vehicle Repair - 5 PU
  • Guide to Reactors - 5 PU
  • Hyperspace Calculation Software - 2 PU
  • Advanced Mathematics and Geometrics - 2 PU
  • Mechanical Diagnostic - 3 PU

Helpful Notes on Programs/What They Do
Difference Between System Takeover, Aggressive Brute System Takeover, and Aggressive Virus Dispatch:
  • System Takeover - Used for taking initial control of a system without proper safeguards/protection. (No Protection)
  • Aggressive Virus Dispatch - Used for stealthily infiltrating a system with safeguards, OR for inserting a disruptive virus into a computer system. (Slow, Quiet, Protection)
  • Aggressive Brute System Takeover - Used for rapidly taking control of a system with safeguards with no regards for stealth. This is the sort of thing which sets off massive cyber-security alarms, but which also only takes a few seconds to actually finish. (Fast, Loud, Protection)

Host Control:
  • Only works for droids or machines of that nature.
  • Each Host uses up 10 PU just to operate.
  • If the Host connection is removed normally, Law Sync is not activated, and the droid's initial programming takes over. Uploaded programs cannot be used while a Host is not activated.
  • If a Host has safeguards, it must be sliced before it can be controlled. Oftentimes, this can be done wirelessly, but could possibly involve a physical connection for high-security models.
  • Previous Hosts have bypasses automatically installed upon initial takeover to allow for rapid re-control.

Vehicle Piloting:
  • If all of a vehicle's systems are already slaved to the A.I, or are accessible without safeguards then it only needs to use the Vehicle Piloting program to operate a vessel.
  • If some of the vehicle's systems are not slaved to the A.I, then it may need to manually slice those systems in ADDITION to operating the vessel through Vehicle Piloting programs.
Net Trace:

  • Identifies any external data sources which are currently attempting to access the A.I, or any of its affiliated systems, and traces them to their source. If some form of VPN is being used, this may take time to complete.

System Control/Adjustment:
  • While a system is being directly controlled or altered, the A.I must utilize this program.
  • Once the Intelligence is finished altering a system, it may remove its attention, allowing the system to default to its usual parameters.
  • If the Intelligence has previously gained access, it may automatically regain access through installed bypasses and backdoors in a system. This does not require a program to load, and is thus instantaneous.
 

Users who are viewing this thread

Top Bottom