Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech SOAR [Slicing-Operation-Assistance-Routine]

Status
Not open for further replies.
93eqxB8.gif
rl7Gff.gif
  • Intent: To create a slicer-aiding Artificial Semi-Intelligent system.
  • Image Source: N/A
  • Canon Link: N/A
  • Primary Source: Artificial Intelligence
rl7b1z.gif

  • Manufacturer: Roble Manufacturing
  • Affiliation: Confederacy of Independent Systems
  • Model: SOAR - (Slicing Operator Assist Routine)
  • Modularity: Modifying SOAR is possible, although the complexity of encryption and code would make it nigh-impossible for all but a skilled slicer.
  • Production: Minor
  • Material: Electronics, code, digits.
rl7lvJ.gif

  • Database of all Computer Languages known to the CIS Ministry of Secrets
  • Database of all Encryption and Decryption methods known to the CIS Ministry of Secret
  • Ability to perform high-function Encryption and Decryption protocols
  • The ability to hyper-quickly read, sort through and organize basic-to-advanced code
  • Theoretical information on advanced mathematics
  • 'Leave No Trace' protocol conceals and deletes evidence of slicing as well as neutralizes existing firewalls.
  • Ability to be stored and transported on a small portable drive
rlz7dQ.gif

SOAR is a specially-developed Artificial Intelligence system designed to be a slicer's best friend. SOAR has the ability to read virtually every known Computer Language known to the CIS Ministry of Secrets, and is complete with protocols to both decrypt and encrypt software, as well as disseminate code and information quickly. Agents can also use this valuable sorting function to input terms or values and find the most relevant results, cutting down overall slicing time which can be end up being crucial in certain situations. The Leave No Trace protocol of SOAR is also handy when it comes to covert operations, making sure that a target's firewalls are incapacitated and evidence of slicing is erased.
rl7SKs.gif

  • Advanced Slicing: The decryption and encryption programs of SOAR, along with the knowledge of almost every computer language, operating system and how to read them make SOAR a valuable decryption tool when on the field.
  • Targeting System: SOAR is able to quickly process and organize information, and is equipped with a function allowing the user to have SOAR search through code along a set of parameters. This can often cut down slicing time by a significant amount.
  • Leave No Trace: The Leave No Trace protocol acts as a defensive countermeasure to system firewalls in place, and either enables the hacker to fly under a firewall's radar or corrupts the code before the firewall can race an alarm. The protocol also acts as a clean-up, restoring code to it's original status so that nothing would appear to be amiss.
rl7ALN.gif

  • Non-Sentient: SOAR is merely a compilation of extremely advanced protocols and code, and is incapable of reasoning or ethical contemplation.
  • Not Wireless: SOAR is transported via means of a small and ultralight portable drive, and to utilize the software an agent must physically plug SOAR into the target system.
  • Leave No Trace: The Leave No Trace protocol takes additional time to perform it's intended function; if the portable drive is withdrawn from the system to early, then the benefits of the protocol are rendered void.

CHANGES MADE:
  • Production changed to Minor
  • Manufacturer changed to Roble Manufacturing
 
[member="John Locke"] [member="Runi Verin"] [member="Vigil Rostu"]

Request to be moved to Technology Creation for Judgement
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom