Results 1 to 10 of 10

Thread: Computer Viruses in Trek

  1. #1
    Join Date
    May 2001
    Location
    Merrimack, NH
    Posts
    7

    Post Computer Viruses in Trek

    One of my players (his character is a computer specialist science officer type) has expressed interest in developing computer viruses to use against Dominion ships (a campaign set during the War).

    Setting aside for the moment that this isn't a very Federation tactic (in my opinion), are there any guidelines and thoughts on how this might work within LUGTrek? I'm wrestling with not only the mechanics of this, but of how much info about Dominion ship systems would be available to a Lt Cmdr on a ship in the Gamma Quadrant and how much would be Classified beyond his ability to reach.

    Also, how (if at all) could these viruses be used against other hostile species whose technology has not been extensively encountered?

    Thanks,

    Chris

  2. #2
    Join Date
    Nov 1999
    Location
    Vallejo, CA USA
    Posts
    221

    Post


    That's a difficult question, as the different technologies and languages would prevent contamination -- it's not like the Dominion is running Windows NT, Linux, etc.

    So your programmer/computer whiz would need a representative sample of their technology ... this could be as simple an item as a PADD, or even one of the headset/monocular devices.

    Next, they would have to establish a vector, a means of transmission -- an isolinear chip, a data cartridge, etc. (No flying up in a shuttle and delivering it via a PADD with a subspace transceiver, okay? )

    Then you have to gamble that they don't have countermeasures in place on their systems.

    I would grant each computer system with a difficulty rating, modified for the programmer's range of knowledge -- i.e., knowing the language lowers the difficulty, a first-contact/unfamiliar situation raises it. This can be further modified by active resistance -- an equally skilled programmer or science officer knowing what's going on and trying to stop it.

    If you want to make the player work for it, ask them how they would go about preparing, testing, and distributing the virus. They can try just about anything ... it's up to you to decide what is and isn't possible by setting the difficulty.

    Bob


  3. #3
    Join Date
    Feb 2001
    Location
    Brockville, Ontario, Canada
    Posts
    4,394

    Post

    As a LTCMDR the character, according to the Starfleet Intel. Handbook, has Secret clearance which I think would give him the ability to get a good portion of info on ships, weapons and possibly Dom. fleet movements. If he has the ability to purchase the Security Clearance advavtage at 3pts that would give him top secret clearance. Which probably would have the basic the info he would need to start work on such a virus, I would assume that it would take a while to program the virus...First he would have to have a working knowledge of the language that the Dom. uses to program their computers, then he would have to spend "awhile" developing the virus. Basically the war could be half over before he had a working model...Unless you want to pull a Independence Day.

    As to the idea of it being a un-fed tactic, that depends on what he wants the virus to do. If it blew an infected ship to atoms then yes I agree with you, but he could simply have the virus shut down main power...taking out weapons and propulsion crippling the ship.

    If you really want to get your claws into him have Section 31 pay him a visit. Once he developed the virus and a few Dom. ships go BANG, then Section will have him right where they want him. Sinister, eh.

    ------------------
    In the Praetors Name!

  4. #4
    Join Date
    Sep 1999
    Location
    Melbourne, Australia. Winner of the First Trek Survivor Trivia Show, and Bearer of the Steve Long Pink Elephant Stamp of Learning. :)
    Posts
    526

    Lightbulb

    It's not necessarily un-Trek...the intended result of the virus will have a bearing on Starfleet's attitude towards it. It's important to note, however, that Picard was told off by Vice-Admiral Nechayev for NOT introducing a destructive, genocidal virus into the Borg Collective, so YMMV...

    As to how to go about creating a virus, I'd consider the following: about two weeks to create the virus (modified downwards according to the result of his Computer(Programming) roll) - may be longer or shorter according to what he wants the virus to do; he'll need a Computer(Hacking) check to be wildly successful to deliver the virus into the opponent's system(s); various systems checks to ensure that the virus does what it should (for instance, Propulsion Engineering (Warp Drive) if he intends the virus to shut down the opponent's Warp Drive), or something similar - he should at least have the skills related to the systems he wants to affect; allow a day or two for simulation and tuning (if this is going to be a virus for a critical moment, then he really wants to make sure it works first!) - a successful Computer (Simulation) check may reduce testing time.

    Just a few things to think about...

    ------------------
    "...and more controversial than Oolon Colluphid's trilogy of philosophical blockbusters Where God went Wrong, Some More of God's Greatest Mistakes, and Who is this God Person Anyway?"
    - The Hitch Hiker's Guide to the Galaxy, Douglas Adams (dec.)

  5. #5
    Join Date
    Apr 2000
    Location
    Albertson, NY, USA
    Posts
    1,467

    Post

    Durring the war, the federation wouldn't hesitate to use a virus program if it meant winning a battle or saving a star system.

    Karg

  6. #6
    Join Date
    Jun 2001
    Location
    Perth, WA, Australia, Sector 001
    Posts
    301

    Thumbs up

    I had one of my players doing the same. The campaign takes place 6 years after the Dominion war when the Borg invade back.

    Anyway to cut the long story short he asked a permission of senior RRT Officer (in charge of boarding party) to destroy the integrity of Federation Computer Core as it was in the process of being assimilated by the Collective. Since of course he had a security clereance to the ships computer core and was accompanied by Starfleet Intel personnel the suggestion was accepted.

    What good did it have is of course an entirely different matter as they very overrunned by the drones and had to be rescued by another platoon of RRT.
    Of coure I would assume that thanks to that he would have denied any tactical/strategical data to the Borg as well as control over the vessel (or what was left of it) at least until the Borg have 'repleaced' the 'software' within the computer core.

    Commander Alexandra Polanski
    Acting Captain, USS Avatar

    [This message has been edited by Polanski (edited 06-26-2001).]

  7. #7

    Post

    <font face="Verdana, Arial" size="2">Originally posted by Polanski:
    I would assume that thanks to that he would have denied any tactical/strategical data to the Borg as well as control over the vessel (or what was left of it) at least until the Borg have 'repleaced' the 'software' within the computer core.


    [This message has been edited by Polanski]
    </font>
    Or until the Borg assimilated someone who knew the tactical data, even subconciously, the assimilation would then share that individuals knowledge with the Collective.

    But then, this trails right back to the 'Beat the Borg thread' and we all know that that CANT happen unless its the wussy Voyager Borg. (I hesitate to use the words cute and fuffy, specially when referring to Jeri Ryan.



    ------------------
    Dan.

    Spock; "That unit, is a woman."
    Nomad; "A mass of conflicting Impulses."
    http://www.theventure.freeserve.co.uk

  8. #8
    Join Date
    Sep 1999
    Location
    Melbourne, Australia. Winner of the First Trek Survivor Trivia Show, and Bearer of the Steve Long Pink Elephant Stamp of Learning. :)
    Posts
    526

    Post

    That's the beauty (?) of the Borg. It doesn't matter if you return a Computer Core to its constituent components - if you have knowledge of the data contained within that Core, and the Borg assimilate you, then the Borg will know what was in the Core.

    Sure, the Borg can download from a Computer Core without problems - but they can download from assimilated beings with equal ease. So against the Borg you have two problems: (1) destroy all computer files; (2) don't get assimilated.

    Good Luck.

    ------------------
    "...and more controversial than Oolon Colluphid's trilogy of philosophical blockbusters Where God went Wrong, Some More of God's Greatest Mistakes, and Who is this God Person Anyway?"
    - The Hitch Hiker's Guide to the Galaxy, Douglas Adams (dec.)

  9. #9

    Post

    This message has been removed on request by the
    poster

  10. #10
    Join Date
    Mar 2001
    Location
    Alpha Quadrant
    Posts
    21

    Post

    Our chief security/tactical officer (who, as a male Vulcan of advanced years is an unashamed Tuvok-ripoff, but we all still love the player)is a big fan of 'hacking' in our games.
    I must admit that as a group, we never got far beyond the stage of moaning "it's not really Star Trek" and "Why dontcha go play Shadowrun or something"

    This state of affairs is a bit lame, I think...especially because I've seen similar situations in other Trek games in my region.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •