KES Security and Failsafe Protocols

Prudence

[ All I am surrounded by is fear — and dead men ]
SWRP Writer
Joined
Jan 29, 2013
Messages
5,760
Reaction score
3,945
All security protocols listed below are confidential. Not all protocols below are known by all personnel. Protocols are divided by security clearance:

Commonly Known Protocols:
Cole Protocol
- The systematic and immediate purge of all databases on all major systems in the current facility/facilities selected or the current system in which the ship issuing the command is residing unless specific mention is made as to the system/facility to target or to target all facilities. The information is deleted and destroyed through Orion Protocol. The information burned and dispelled includes any technological specifications, travel data and star coordinates, mission statements, and other sensitive information, as well as the input of a single coordinate set for an immediate hyperspace jump. Cole Protocol's single coordinate changes every time it is issued. The first time Cole Protocol was ever issued was during the Battle of Sirius Primaris in which the jump location lead to a location of deep space near DSC Daedalus. Unfortunately only Vestar Trane and Mother Superior know the location of CP's next jump location, and that information is too classified to list here.

Orion Protocol - A protocol for the standard of data-destruction for KES facilities and devices. Orion protocol can take a long time to execute depending on the amount of data, the size of the drives, and the speed of the computers. Orion protocol first wipes all data from the drives, and fills the drives by writing a series of "1"s until the drive is completely full. This is then erased, and the same thing is done with "0"s. This is erased and then another layer of "1"s is added. This insures that all drives have been so overridden that data is impossible to restore. Orion protocol is commonly used by other protocols, the most notable being Cole Protocol. (Real Life Equivalent, it actually exists)

Standard Diplomatic Procedure: During all diplomatic procedures in which KES personnel are dealing with persons or parties unknown or unfamiliar to the KES all data-transfers and communications are to use secure KES lines and avoid all public forms of communication or transfer. Also, all datapads will enter SDP mode and will be remotely accessed and erased by the diplomatic partner, KES High Command, or any other KES terminal. Datapads will also have microphones and cameras on at all times and be live transmitting to KES high command through their ship. After the situation at Roon all KES diplomats will be required to wear security armor until a weapons check has been performed, or take security personnel with them. KES diplomatic personnel will not be more than 30 minutes removed from a strike team awaiting orders from High Command or diplomatic personnel to insert themselves and either evacuate KES personnel or eliminate a threat. Strike team will be handled by Naval High Command and Security High Command. Key Entities will not be allowed to travel on diplomatic or recruiting missions without KES personnel trained in anti-forcer combat, or with lightsaber resistant armor and or training. This is to prevent unstable forcer elements from eliminating or capturing Key Entities and give them an additional boost should the need arise. Likewise during negotiations and diplomatic meetings, an automatic ping system will send pings to KES High Command via long range transmitters onboard the ship. These transmissions will be every minute. Should one fail to come a strike team will be inserted for immediate evacuation unless notice from the diplomats themselves with ample explanation for the radio silence.

Forceful Decommission Protocol - Forceful Decommission protocol is the protocol that governs the immediate destruction of KES Facilities. Issued times when scorched earth is necessary to prevent facilities to end up in enemy possession. When focusing on a ship or space facility the command bridge should be the first target, followed by the engines, then complete destruction. When targeting land facilities server rooms should be the first target, followed by command structures, construction compounds, and troop barracks, and then any remaining buildings. Protocols mandate that FDP only be issued when a facility has been completely evacuated.

Secret Protocols, Security Only:
Keywork Protocol -
Due to the unstable nature in which Core Entities are created, and Key Entities are recruited, Keywork Protocol is in place in the event a Key or Core Entity goes rogue or needs to be subdued. An attempt to use non-lethals should always be taken first, however if non-lethals are not effective Keywork Protocol should be taken into affect. During Keywork Protocol all security personnel are to focus their fire on the Entity's head and abdomen area. After Keywork protocol has been issued it is not to be stopped until the Entity is deceased, unless withdrawn by Naval or Security High command. During subduing of Entity personnel, any anti-forcer personnel, I.E. Mandalorians, Force Hunters, Heavy Shock Troopers, Key/Core Entity personnel, should be the closest to the Entity at all times, while standard security personnel assist from behind their cover. Once Keywork protocol is finished the body of the deceased Entity is to be recovered and preserved for the Order's use, and a mission report from all involved to be given. Keywork protocol can only be issued by Security and Naval Commanders, Ryan Jacen, Prudii Kyramud, Admiral Deftinwolf, Admiral Trane, etc. Keywork Protocol is to be reserved for absolutely necessary situations.

Order 2113: Given by field commanders or higher. Order 2113 is an order given to execute an enemy of the Supreme Commander (acting Supreme Commander is Vestar Trane). Order can be followed through a pre practiced plan, or through improvised measures, but should always result in maximum effort to immediately annihilate the enemy with extreme prejudice.

Top Secret, Confidential, Eyes Only:
Terrestrial Facility Protocol:
This protocol was the brainchild of Admiral Trane, Mother Superior, and Cambria Kilganon. Only the former two know the location of these facilities. Cambria herself will admit that she cannot hold up under interrogation as the other two can. These facilities can range from mines, to military centers, to full on backup headquarters. They are kept off all KES databases, in offline datapads that are only in the possession of Superior, and Trane. Only one in existence to date.
 
Last edited:

Outlander

All Indie, All the Time
SWRP Writer
Joined
Jun 9, 2014
Messages
5,255
Reaction score
1,909
Something I'd like to bring up here is that your last protocol basically says you have additional backup facilities, including fully outfitted outposts. I'm not entirely sure this will fly, as I believe you need to approve additional facilities.

@Green Ranger @Clayton
 

Prudence

[ All I am surrounded by is fear — and dead men ]
SWRP Writer
Joined
Jan 29, 2013
Messages
5,760
Reaction score
3,945
Something I'd like to bring up here is that your last protocol basically says you have additional backup facilities, including fully outfitted outposts. I'm not entirely sure this will fly, as I believe you need to approve additional facilities.

@Green Ranger @Clayton
Modified it to reflect that the only one in existence is the current KES base. Nice catch.
 

Outlander

All Indie, All the Time
SWRP Writer
Joined
Jun 9, 2014
Messages
5,255
Reaction score
1,909
Modified it to reflect that the only one in existence is the current KES base. Nice catch.

Only one is known to date? I'd honestly feel better is you stated its the only one in excistence, since the current wording can be ambiguous.
 

Prudence

[ All I am surrounded by is fear — and dead men ]
SWRP Writer
Joined
Jan 29, 2013
Messages
5,760
Reaction score
3,945

Outlander

All Indie, All the Time
SWRP Writer
Joined
Jun 9, 2014
Messages
5,255
Reaction score
1,909
Much better. Thanks for the prompt edits.
 
Top