Difference between revisions of "DataCaster"

From Traveller Wiki - Science-Fiction Adventure in the Far future
Jump to navigation Jump to search
Line 27: Line 27:
 
== Description ([[Specifications]]) ==
 
== Description ([[Specifications]]) ==
 
DataCasters are offensive weapons broadcasting or beamcasting petabytes of information at or against enemy sensors and communicators. DataCasters pursue three strategies: they attempt to spook or overload sensors, they attempt to introduce viruses into onboard systems through flaws in sensor inputs, and they transmit tailored psychological messages and propaganda. {{Ludography cite|name= T5 Core Rules |page= 388}}
 
DataCasters are offensive weapons broadcasting or beamcasting petabytes of information at or against enemy sensors and communicators. DataCasters pursue three strategies: they attempt to spook or overload sensors, they attempt to introduce viruses into onboard systems through flaws in sensor inputs, and they transmit tailored psychological messages and propaganda. {{Ludography cite|name= T5 Core Rules |page= 388}}
* Sensor Overload. Successful DataCaster Attacks on Sensors or Comms inflict Damage on a specific Sensor or Comm.  
+
* Sensor Overload. Successful DataCaster Attacks on Sensors or Comms inflict Damage on a specific Sensor or Comm. {{Ludography cite|name= T5 Core Rules |page= 388}}
* Virus. Successful DataCaster attacks on non-Sensor, non-Comm locations insert a Virus A Virus successfully introduced onto a ship disables the Component at the Hit Location. In each successive Combat Round, the Virus may attack an adjacent Hit Location and succeeds if 1D < Computer + Virus. For example, a Virus is assigned a value = 1D = 3. It attacks an adjacent Hit Location Power Plant controlled by Computer/2. It must roll 1D for 2+3 or less = 5. If successful, that location is disabled. A Virus is isolated if all computer connections are cut between the Virus disabled locations and all other hit locations. The computers can operate independently; but this step prevents use of batteries and commcasters, and restricts the use of weapons to R=7 or less.  
+
* Virus. Successful DataCaster attacks on non-Sensor, non-Comm locations insert a Virus A Virus successfully introduced onto a ship disables the Component at the Hit Location. In each successive Combat Round, the Virus may attack an adjacent Hit Location and succeeds if 1D < Computer + Virus. For example, a Virus is assigned a value = 1D = 3. It attacks an adjacent Hit Location Power Plant controlled by Computer/2. It must roll 1D for 2+3 or less = 5. If successful, that location is disabled. A Virus is isolated if all computer connections are cut between the Virus disabled locations and all other hit locations. The computers can operate independently; but this step prevents use of batteries and commcasters, and restricts the use of weapons to R=7 or less. {{Ludography cite|name= T5 Core Rules |page= 388}}
* Psychological Attacks. Datacaster attacks provide a shifting series of morale attacks, false messages, appeals to a variety of cultural and social fears. Psychological attacks challenge the Sanity of crew, passengers, staff, and troops. A successful Datacaster attack requires each individual in the affected area to Check San.  
+
* Psychological Attacks. Datacaster attacks provide a shifting series of morale attacks, false messages, appeals to a variety of cultural and social fears. Psychological attacks challenge the Sanity of crew, passengers, staff, and troops. A successful Datacaster attack requires each individual in the affected area to Check San. {{Ludography cite|name= T5 Core Rules |page= 388}}
 +
* DataCasters. One purpose of DataCasters is to communicate with enemy Self-Aware Missile Brains. Success shocks the Brain into inaction or even to turning on its launchers. {{Ludography cite|name= T5 Core Rules |page= 525}}
  
 
=== Functional Explication ===
 
=== Functional Explication ===
Line 43: Line 44:
 
{{Sources
 
{{Sources
 
|S1= {{Ludography cite|name= Adventure Class Ships Volume 1 |page= TBD |article= Book 2 |version= Classic Traveller}}
 
|S1= {{Ludography cite|name= Adventure Class Ships Volume 1 |page= TBD |article= Book 2 |version= Classic Traveller}}
|S2= {{Ludography cite|name= T5 Core Rules |page= 342-343, 381, 386, 390, 409, 413}}
+
|S2= {{Ludography cite|name= T5 Core Rules |page= 342-343, 381, 386, 390, 409, 413, 415, 508, 525, 617}}
 
|S3= [[Traveller Wiki Editorial Team]]
 
|S3= [[Traveller Wiki Editorial Team]]
 
|S4= Author & Contributor: Lord [[Matthew Kerwin]] Baron [[Thon (world)|Thon]]
 
|S4= Author & Contributor: Lord [[Matthew Kerwin]] Baron [[Thon (world)|Thon]]

Revision as of 14:29, 15 August 2019

DataCaster
Imperial Sunburst-Sun-IISS-Traveller.gif
TBD
Type TBD
Tech Level TL–10
Cost TBD
Size TBD
Weight TBD
Manufacturer Various
Also see Ship Equipment
Reference TBD
TBD

A DataCaster is an electronic warfare weapon. [1]

Description (Specifications)

DataCasters are offensive weapons broadcasting or beamcasting petabytes of information at or against enemy sensors and communicators. DataCasters pursue three strategies: they attempt to spook or overload sensors, they attempt to introduce viruses into onboard systems through flaws in sensor inputs, and they transmit tailored psychological messages and propaganda. Marc Miller. T5 Core Rules (Far Future Enterprises, 2013), 388.

  • Sensor Overload. Successful DataCaster Attacks on Sensors or Comms inflict Damage on a specific Sensor or Comm. Marc Miller. T5 Core Rules (Far Future Enterprises, 2013), 388.
  • Virus. Successful DataCaster attacks on non-Sensor, non-Comm locations insert a Virus A Virus successfully introduced onto a ship disables the Component at the Hit Location. In each successive Combat Round, the Virus may attack an adjacent Hit Location and succeeds if 1D < Computer + Virus. For example, a Virus is assigned a value = 1D = 3. It attacks an adjacent Hit Location Power Plant controlled by Computer/2. It must roll 1D for 2+3 or less = 5. If successful, that location is disabled. A Virus is isolated if all computer connections are cut between the Virus disabled locations and all other hit locations. The computers can operate independently; but this step prevents use of batteries and commcasters, and restricts the use of weapons to R=7 or less. Marc Miller. T5 Core Rules (Far Future Enterprises, 2013), 388.
  • Psychological Attacks. Datacaster attacks provide a shifting series of morale attacks, false messages, appeals to a variety of cultural and social fears. Psychological attacks challenge the Sanity of crew, passengers, staff, and troops. A successful Datacaster attack requires each individual in the affected area to Check San. Marc Miller. T5 Core Rules (Far Future Enterprises, 2013), 388.
  • DataCasters. One purpose of DataCasters is to communicate with enemy Self-Aware Missile Brains. Success shocks the Brain into inaction or even to turning on its launchers. Marc Miller. T5 Core Rules (Far Future Enterprises, 2013), 525.

Functional Explication

DataCasters are typically turret-mounted. Their efficacy is based largely on their tech level compared to the target's tech level. [2]

DataCasters are starship-mounted offensive weapons designed to overwhelm enemy sensors with excess data, preventing them from functioning. In addition, DataCasters can jam communications and potentially install computer virii in insufficiently protected enemy computers. [3]

History & Background (Dossier)

The Terrans used DataCasters to great effect against the Vilani in the early period of the Interstellar Wars. For over a century, wars on Terra had involved an electronic warfare component, and Terran nations had developed myriad systems for overwhelming and disabling adversarial computer systems. The Vilani had no such traditions. They had not encountered malicious computer code before, and their previous enemies did not utilize electronic warfare. [4]

References & Contributors (Sources)

This list of sources was used by the Traveller Wiki Editorial Team and individual contributors to compose this article. Copyrighted material is used under license from Mongoose Publishing or by permission of the author. The page history lists all of the contributions.
  1. Information provided to the library by Matthew Kerwin
  2. Information provided to the library by Matthew Kerwin
  3. Information provided to the library by Matthew Kerwin
  4. Information provided to the library by Matthew Kerwin