DataCaster
| DataCaster | |
|---|---|
TBD | |
| Type | Electronic Warfare Device |
| Tech Level | TL–10 |
| Cost | Various |
| Size | Various |
| Weight | Various |
| Manufacturer | Various |
| Also see | Ship Equipment |
| Reference | T5 Core Rules 388. |
| TBD | |
A DataCaster is an electronic warfare weapon. [1]
- CommCasters and DataCasters use Data Broadcasts or Beamcasts to send data at the target. [2]
- It is a kind of Ship Equipment that functions as a Transmitter and a Jammer. [3]
Description (Specifications)
DataCasters are starship-mounted offensive weapons designed to overwhelm enemy sensors with excess data, preventing them from functioning. In addition, DataCasters can jam communications and potentially install computer virii in insufficiently protected enemy computers. [4]
- DataCasters are typically turret-mounted. Their efficacy is based largely on their tech level compared to the target's tech level. [5]
Image Repository
No information yet available.
Functional Explication
DataCasters are offensive weapons broadcasting or beamcasting petabytes of information at or against enemy sensors and communicators. DataCasters pursue three strategies:
- They attempt to spook or overload sensors.
- They attempt to introduce viruses into onboard systems through flaws in sensor inputs.
- They transmit tailored psychological messages and propaganda. [6]
Specific Capabilities
Specific attacks and mechanisms include:
- Sensor Overload: Successful DataCaster Attacks on Sensors or Comms inflict Damage on a specific Sensor or Comm. [7] This occurs through overloading and deliberate misfunction instruction of the electronics device. [8]
- Virus Implantation: Successful DataCaster attacks on non-Sensor or non-Comm locations may insert a Virus. A Virus successfully introduced onto a ship may disables the component at the Hit Location. Viruses can spread to adjacent ship equipment. A Virus may be isolated and destroyed if all computer connections are cut between infected locations and other uninfected locations. [9] Computers may operate independently; but independent operation may prevent shipboard use of batteries, commcasters, and restrict naval weapons to reduced ranges or limited functionality. [10]
- Psychological Attacks: Datacaster attacks provide a shifting series of morale attacks, false messages, appeals to a variety of cultural and social fears. Psychological attacks challenge the Sanity of crew, passengers, staff, and troops. [11] A successful Datacaster may cause psychological distress to crewsophonts or possibly even drive them insane under extreme conditions. [12]
- Intelligent Ordnance Spoofing: One purpose of DataCasters is to communicate with enemy Self-Aware Missile Brains. Success shocks the Brain into inaction or may even cause the ordnance to turn on its launchers. [13]
History & Background (Dossier)
The Terrans used DataCasters to great effect against the Vilani in the early period of the Interstellar Wars. For over a century, wars on Terra had involved an electronic warfare component, and Terran nations had developed myriad systems for overwhelming and disabling adversarial computer systems. The Vilani had no such traditions. They had not encountered malicious computer code before, and their previous enemies did not utilize electronic warfare. [14]
References & Contributors (Sources)
- Jordan Weisman. "Book 2." Adventure Class Ships Volume 1 (1982): TBD.
- Marc Miller. T5 Core Rules (Far Future Enterprises, 2013), 342-343, 381, 386, 390, 409, 413, 415, 508, 525, 617.
- Traveller Wiki Editorial Team
- Author & Contributor: Lord Matthew Kerwin Baron Thon
- Author & Contributor: Lord (Marquis) and Master of Sophontology Maksim-Smelchak of the Ministry of Science
- ↑ Information provided to the library by Matthew Kerwin
- ↑ Marc Miller. T5 Core Rules (Far Future Enterprises, 2013), 386.
- ↑ Information provided to the library by Maksim-Smelchak
- ↑ Information provided to the library by Matthew Kerwin
- ↑ Information provided to the library by Matthew Kerwin
- ↑ Marc Miller. T5 Core Rules (Far Future Enterprises, 2013), 388.
- ↑ Marc Miller. T5 Core Rules (Far Future Enterprises, 2013), 388.
- ↑ Information provided to the library by Maksim-Smelchak
- ↑ Marc Miller. T5 Core Rules (Far Future Enterprises, 2013), 388.
- ↑ Information provided to the library by Maksim-Smelchak
- ↑ Marc Miller. T5 Core Rules (Far Future Enterprises, 2013), 388.
- ↑ Information provided to the library by Maksim-Smelchak
- ↑ Marc Miller. T5 Core Rules (Far Future Enterprises, 2013), 525.
- ↑ Information provided to the library by Matthew Kerwin