Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Command Navigation Program: Difference between revisions

From Battlestar Wiki, the free, open content Battlestar Galactica encyclopedia and episode guide
More languages
Joe Beaudoin Jr. (talk | contribs)
m Text replacement - "\(\[\[TRS\]\]\: "\[\[([A-Za-z0-9_, ]*)\]\]\"\)" to "{{TRS|$1}}"
Joe Beaudoin Jr. (talk | contribs)
m Text replacement - "\(\[\[TRS\]\]\: \[\[([A-Za-z0-9_, ()]*)\]\]\)" to "{{TRS|$1}}"
Line 3: Line 3:




Developed by computer scientist [[Gaius Baltar]], the '''Command Navigation Program''' (CNP) is an operating system<ref>The Command Navigation Program is an actual operating system (similar, after a fashion, to the Microsoft Windows, Linux and Mac OS X operating systems on today's personal computers) that works as designed. However, the work of Number Six adds the compromises that allows the Cylons to control it.</ref> utilized by the [[Colonial Fleet (RDM)|Colonial Fleet]] and some civilian spaceships in the [[The Twelve Colonies (RDM)|Twelve Colonies of Kobol]].<ref>[[Aaron Doral]] provides a requested report to [[Gaius Baltar]] in [[CIC]]: "You asked for a report on how many civilian ships had your CNP program?" ([[TRS]]: [[Miniseries, Part II]]).</ref>
Developed by computer scientist [[Gaius Baltar]], the '''Command Navigation Program''' (CNP) is an operating system<ref>The Command Navigation Program is an actual operating system (similar, after a fashion, to the Microsoft Windows, Linux and Mac OS X operating systems on today's personal computers) that works as designed. However, the work of Number Six adds the compromises that allows the Cylons to control it.</ref> utilized by the [[Colonial Fleet (RDM)|Colonial Fleet]] and some civilian spaceships in the [[The Twelve Colonies (RDM)|Twelve Colonies of Kobol]].<ref>[[Aaron Doral]] provides a requested report to [[Gaius Baltar]] in [[CIC]]: "You asked for a report on how many civilian ships had your CNP program?" {{TRS|Miniseries, Part II}}.</ref>


Installed in the central computers of [[Viper Mark VII|Vipers]] and [[Raptor|Raptors]] and in the [[Computers#Navigation computer|navigation computers]] of almost all battlestars, the CNP was more than two years in the making.
Installed in the central computers of [[Viper Mark VII|Vipers]] and [[Raptor|Raptors]] and in the [[Computers#Navigation computer|navigation computers]] of almost all battlestars, the CNP was more than two years in the making.
Line 12: Line 12:
Unbeknownst to Dr. Baltar, his lover and co-writer of the CNP turns out to be a version of the [[humanoid Cylon]] known as [[Caprica Six|Number Six]]. The Cylon infiltrator programmed backdoors into the CNP so that the Cylon attack forces could render any ships that use the operating system to shut itself down by a remote command.
Unbeknownst to Dr. Baltar, his lover and co-writer of the CNP turns out to be a version of the [[humanoid Cylon]] known as [[Caprica Six|Number Six]]. The Cylon infiltrator programmed backdoors into the CNP so that the Cylon attack forces could render any ships that use the operating system to shut itself down by a remote command.


Battlestars and fighters begin to shut down during the Colonial defensive "as if a switch were flipped."<ref>The process is similar to how some home and business computers today can be [[w:Zombie computer|taken over secretly and remotely]] for use in nefarious purposes on the Internet, such as [[w:E-mail spam|email spamming]].</ref> Communications officer [[Anastasia Dualla]] describes reports of "system failures" throughout the Fleet and how at least one battlestar loses power when the attack begins  ([[TRS]]: [[Miniseries, Night 1]]). When the Cylon fleet jumps in during the [[Fall of the Twelve Colonies], they use the CNP to take down an entire battlegroup over Caprica as well as the defense mainframe, leaving ships drifting out of control and easy targets {{TRS|The Plan}}.
Battlestars and fighters begin to shut down during the Colonial defensive "as if a switch were flipped."<ref>The process is similar to how some home and business computers today can be [[w:Zombie computer|taken over secretly and remotely]] for use in nefarious purposes on the Internet, such as [[w:E-mail spam|email spamming]].</ref> Communications officer [[Anastasia Dualla]] describes reports of "system failures" throughout the Fleet and how at least one battlestar loses power when the attack begins  {{TRS|Miniseries, Night 1}}. When the Cylon fleet jumps in during the [[Fall of the Twelve Colonies], they use the CNP to take down an entire battlegroup over Caprica as well as the defense mainframe, leaving ships drifting out of control and easy targets {{TRS|The Plan}}.
<br clear="all">
<br clear="all">


Line 18: Line 18:
The CNP was previously received by ''{{RDM|Galactica}}'', but the program was never loaded into the primary memory of the ship's navigation computer. ''Galactica'' itself is spared from Cylon computer attacks as the CNP is not loaded on any of its computers, nor were its computer systems networked, sparing the ship from any backdoor or cracking attempts. However, ''Galactica'' supports a modern squadron of [[Viper Mark VII]] fighters, which received the upgrade. As a result, the squadron is massacred by two [[Cylon Raider (RDM)|Raiders]] on their way back to [[Caprica (RDM)|Caprica]].
The CNP was previously received by ''{{RDM|Galactica}}'', but the program was never loaded into the primary memory of the ship's navigation computer. ''Galactica'' itself is spared from Cylon computer attacks as the CNP is not loaded on any of its computers, nor were its computer systems networked, sparing the ship from any backdoor or cracking attempts. However, ''Galactica'' supports a modern squadron of [[Viper Mark VII]] fighters, which received the upgrade. As a result, the squadron is massacred by two [[Cylon Raider (RDM)|Raiders]] on their way back to [[Caprica (RDM)|Caprica]].


Lieutenant [[Felix Gaeta]] has the CNP source code purged from the [[Computers in the Re-imagined Series#Mainframe Computer|mainframe]] on Baltar's instruction. The program is also retrograded on the [[Computers#Avionics|flight systems]] of surviving Mark VII Vipers, Raptors, and civilian ships ([[TRS]]: [[Miniseries, Night 2]]).
Lieutenant [[Felix Gaeta]] has the CNP source code purged from the [[Computers in the Re-imagined Series#Mainframe Computer|mainframe]] on Baltar's instruction. The program is also retrograded on the [[Computers#Avionics|flight systems]] of surviving Mark VII Vipers, Raptors, and civilian ships {{TRS|Miniseries, Night 2}}.


== Notes ==
== Notes ==

Revision as of 04:37, 9 September 2020

This article details how the Cylons compromised Colonial Fleet defenses by cracking the Colonial flight operating system in the Re-imagined Series.
For other related computer or biological attacks, see Virus.


Developed by computer scientist Gaius Baltar, the Command Navigation Program (CNP) is an operating system[1] utilized by the Colonial Fleet and some civilian spaceships in the Twelve Colonies of Kobol.[2]

Installed in the central computers of Vipers and Raptors and in the navigation computers of almost all battlestars, the CNP was more than two years in the making.

Backdoors[edit]

The CNP managed the avionics of Viper Mark VIIs and almost all battlestars before the few fighters that survived were retrofitted after the attack.

Unbeknownst to Dr. Baltar, his lover and co-writer of the CNP turns out to be a version of the humanoid Cylon known as Number Six. The Cylon infiltrator programmed backdoors into the CNP so that the Cylon attack forces could render any ships that use the operating system to shut itself down by a remote command.

Battlestars and fighters begin to shut down during the Colonial defensive "as if a switch were flipped."[3] Communications officer Anastasia Dualla describes reports of "system failures" throughout the Fleet and how at least one battlestar loses power when the attack begins (TRS: "Miniseries, Night 1"). When the Cylon fleet jumps in during the [[Fall of the Twelve Colonies], they use the CNP to take down an entire battlegroup over Caprica as well as the defense mainframe, leaving ships drifting out of control and easy targets (TRS: "The Plan").

Usage of the CNP on Galactica[edit]

The CNP was previously received by Galactica, but the program was never loaded into the primary memory of the ship's navigation computer. Galactica itself is spared from Cylon computer attacks as the CNP is not loaded on any of its computers, nor were its computer systems networked, sparing the ship from any backdoor or cracking attempts. However, Galactica supports a modern squadron of Viper Mark VII fighters, which received the upgrade. As a result, the squadron is massacred by two Raiders on their way back to Caprica.

Lieutenant Felix Gaeta has the CNP source code purged from the mainframe on Baltar's instruction. The program is also retrograded on the flight systems of surviving Mark VII Vipers, Raptors, and civilian ships (TRS: "Miniseries, Night 2").

Notes[edit]

  • The CNP is not a virus, nor is it a worm or Trojan Horse, but an example of backdoor exploitation of a secured computer system through a secreted password or other hidden access in order to gain command privileges.
  • The backdoor tactic differs from the Cylons' older infiltration tactics used in the first Cylon War of using their computers to seek exploits within and forcibly enter ("crack") a Colonial computer, whereby the attacked computer is infected with a virus that causes havoc on the Colonial computer.

References[edit]

  1. The Command Navigation Program is an actual operating system (similar, after a fashion, to the Microsoft Windows, Linux and Mac OS X operating systems on today's personal computers) that works as designed. However, the work of Number Six adds the compromises that allows the Cylons to control it.
  2. Aaron Doral provides a requested report to Gaius Baltar in CIC: "You asked for a report on how many civilian ships had your CNP program?" (TRS: "Miniseries, Part II").
  3. The process is similar to how some home and business computers today can be taken over secretly and remotely for use in nefarious purposes on the Internet, such as email spamming.