IFAS
Name: Interceptor-class Fast Attack Ship (IFAS)
Type: Interceptor
Designer: TTR Industrial
Manufacturer: TTR Industrial
Length: 100 meters
Personnel: 50 enlisted, 20 soldiers, 30 droids
Consumables: .5 years
Hull: 200 RU
Shields: 350 SBD
Sublight: 25 MGLT
Hyperdrive: 1x
Back-up: 2x
Weapons:
- 04 Taim & Bak XX-9 Retractable Turbolaser Cannons – (1 Starboard-Wing Emplacements | 1 Port-Wing Emplacements | 1 Aft-Port Emplacements | 1 Aft-Starboard Emplacements)
- 04 Bryn & Gweith CGL 55ci Retractable Concussion Missile Launchers ( 1 Fore-Port Emplacement| 1 Fore-Starboard Emplacement | 1 Aft-Starboard Emplacement)
Other Equipment: Standard Sensors Package
Sekotian ZY-100 Engine:
Sekotian ZY-100 engines pack a punch for their size. There are two of them installed on the IFAS while the “Xyto” cruisers use a different type of engine. Although the engines are different, they still use the crystal start mechanism. This will save lives in the long run. The ZY-100 has been designed by Sekotan/ORS/TTR mechanics to be the newest in stealth engines. It is designed specifically for stealth purposes. The power generators, which supply power to the engines have been covered with special durasteel plating to reduce the radiation emissions. Noise from the engines has been greatly reduced due to newer and smaller parts for the engines.
Maneuver:
The addition of inlayed maneuvering jets will allow for faster turning as well as better maneuvering ability in combat. The jets, when needed, extend out from the hull in order to activate.
The Acheron System:
This system, designed to keep vital information out of the hands of the enemy, is a last ditch effort in defense of allied forces. There is a button on the underside of the Captains command chair specifically for this use. If a ship is endanger of being captured, enemy forces are inside the vessel, the captain will depress the button. The button subsequently releases a virus into the computer systems of the vessel that erases all memory and information withheld in the vessel. This information includes the locations of planets and facilities as well as codes. This process takes a maximum of 2 minutes to complete. After these two minutes are up, a second virus is released. This virus deletes the previous virus then hides itself among the computer systems that are still running. The virus then acts as a spy, using hidden cameras and microphones to capture information from the enemy. This information is relayed every ten minutes to a base on Tholatin. This allows for the ship not only to keep vital information from the enemy, but also to gather information from the enemy.
C3 Computer:
Built by Comar for use in the Tri-Tracker, the Countermeasures Compensation Computer attempts to account for the jamming and evasion devices used by its targets. The C3 extrapolates the target's continued trajectory and feeds that into the targeting device.
Power Dispensation System:
This is a system common in many vessels that have a tendency to need the extra power during battle. This system, incorporating a series of entombed wires hidden inside the walls of the vessel, allows for the transfer of power more effectively from unnecessary functions to functions more valuable to the ship. In times of need, certain functions can be shut down and the power diverted through the wires incorporated in the system to functions that are more important to the cause of keeping the ship intact and functioning. The wires are high strength and can handle as much power as can feasibly be pushed through them. The encasing is made of fine crystasteel so technicians can check the wires easily but they can't be destroyed easily by enemy fire. This function causes the ship to have a better likely hood of surviving if damaged or staying cloaked if power to the generator should fail.
Retractable Weapons Cannons:
After reviewing recent battle reports, it has come to the attention of ORS and TTR military officials that weapons cannons mounted on the hull of a ship presents open targets to enemy gunners. To combat this, all weapons cannons on the IFAS are retractable. They go through three phases in order to fire. One, the cannon comes out of the hatch in the side of the hull. Two, the cannon fires. Three, the cannon retracts into the hull, recharges, and is ready to fire again. The rails on with the cannon moves have been coated with lubricant to counteract the slow moving cannon. This assures that the cannon can move into firing position and retract quickly.
Auxiliary Bridge:
“War breeds necessity.”
This could not be more truthful. In recent events it has been observed that the need for a second bridge has become apparent. The auxiliary bridge is smaller then the main bridge, but it has all the necessary components that it’s larger companion carries. The bridge is activated in two ways –
One, in the event of total systems failure on the main bridge, the second bridge can be activated.
Two, if the first bridge is destroyed somehow, the second one comes online.
The same security measures applied to the main bridge also are implemented on the auxiliary bridge: fingerprint scanners, and force locks. In the event of the bridge crew being killed, trained crewmembers have been instructed in how to operate the ship.
R&D Time: 20 days
Start: 1-14-04
End: 2-2-04
Type: Interceptor
Designer: TTR Industrial
Manufacturer: TTR Industrial
Length: 100 meters
Personnel: 50 enlisted, 20 soldiers, 30 droids
Consumables: .5 years
Hull: 200 RU
Shields: 350 SBD
Sublight: 25 MGLT
Hyperdrive: 1x
Back-up: 2x
Weapons:
- 04 Taim & Bak XX-9 Retractable Turbolaser Cannons – (1 Starboard-Wing Emplacements | 1 Port-Wing Emplacements | 1 Aft-Port Emplacements | 1 Aft-Starboard Emplacements)
- 04 Bryn & Gweith CGL 55ci Retractable Concussion Missile Launchers ( 1 Fore-Port Emplacement| 1 Fore-Starboard Emplacement | 1 Aft-Starboard Emplacement)
Other Equipment: Standard Sensors Package
Sekotian ZY-100 Engine:
Sekotian ZY-100 engines pack a punch for their size. There are two of them installed on the IFAS while the “Xyto” cruisers use a different type of engine. Although the engines are different, they still use the crystal start mechanism. This will save lives in the long run. The ZY-100 has been designed by Sekotan/ORS/TTR mechanics to be the newest in stealth engines. It is designed specifically for stealth purposes. The power generators, which supply power to the engines have been covered with special durasteel plating to reduce the radiation emissions. Noise from the engines has been greatly reduced due to newer and smaller parts for the engines.
Maneuver:
The addition of inlayed maneuvering jets will allow for faster turning as well as better maneuvering ability in combat. The jets, when needed, extend out from the hull in order to activate.
The Acheron System:
This system, designed to keep vital information out of the hands of the enemy, is a last ditch effort in defense of allied forces. There is a button on the underside of the Captains command chair specifically for this use. If a ship is endanger of being captured, enemy forces are inside the vessel, the captain will depress the button. The button subsequently releases a virus into the computer systems of the vessel that erases all memory and information withheld in the vessel. This information includes the locations of planets and facilities as well as codes. This process takes a maximum of 2 minutes to complete. After these two minutes are up, a second virus is released. This virus deletes the previous virus then hides itself among the computer systems that are still running. The virus then acts as a spy, using hidden cameras and microphones to capture information from the enemy. This information is relayed every ten minutes to a base on Tholatin. This allows for the ship not only to keep vital information from the enemy, but also to gather information from the enemy.
C3 Computer:
Built by Comar for use in the Tri-Tracker, the Countermeasures Compensation Computer attempts to account for the jamming and evasion devices used by its targets. The C3 extrapolates the target's continued trajectory and feeds that into the targeting device.
Power Dispensation System:
This is a system common in many vessels that have a tendency to need the extra power during battle. This system, incorporating a series of entombed wires hidden inside the walls of the vessel, allows for the transfer of power more effectively from unnecessary functions to functions more valuable to the ship. In times of need, certain functions can be shut down and the power diverted through the wires incorporated in the system to functions that are more important to the cause of keeping the ship intact and functioning. The wires are high strength and can handle as much power as can feasibly be pushed through them. The encasing is made of fine crystasteel so technicians can check the wires easily but they can't be destroyed easily by enemy fire. This function causes the ship to have a better likely hood of surviving if damaged or staying cloaked if power to the generator should fail.
Retractable Weapons Cannons:
After reviewing recent battle reports, it has come to the attention of ORS and TTR military officials that weapons cannons mounted on the hull of a ship presents open targets to enemy gunners. To combat this, all weapons cannons on the IFAS are retractable. They go through three phases in order to fire. One, the cannon comes out of the hatch in the side of the hull. Two, the cannon fires. Three, the cannon retracts into the hull, recharges, and is ready to fire again. The rails on with the cannon moves have been coated with lubricant to counteract the slow moving cannon. This assures that the cannon can move into firing position and retract quickly.
Auxiliary Bridge:
“War breeds necessity.”
This could not be more truthful. In recent events it has been observed that the need for a second bridge has become apparent. The auxiliary bridge is smaller then the main bridge, but it has all the necessary components that it’s larger companion carries. The bridge is activated in two ways –
One, in the event of total systems failure on the main bridge, the second bridge can be activated.
Two, if the first bridge is destroyed somehow, the second one comes online.
The same security measures applied to the main bridge also are implemented on the auxiliary bridge: fingerprint scanners, and force locks. In the event of the bridge crew being killed, trained crewmembers have been instructed in how to operate the ship.
R&D Time: 20 days
Start: 1-14-04
End: 2-2-04