This article covers the Canon version of this subject.  Click here for Wookieepedia's article on the Legends version of this subject. 
For other uses, see Spike.
TPMCGYoda.jpg

Master Qui-Gon, more to say, have you?

It is requested that this article, or a section of this article, be expanded.

See the request on the listing or on this article's talk page. Once the improvements have been completed, you may remove this notice and the page's listing.

Computer spikes, also known as data spikes, were electronic devices that, upon insertion into a computer, allowed the user to access classified data and programs. Spikes could be set to initiate a program or be operated manually, and plugged into the same kind of sockets as scomp links. They were often used in infiltrations and thefts.

Description[edit | edit source]

Computer spikes[3] were handheld, vaguely cylindrical devices designed for hijacking computer systems. They could be inserted into a target computer by an astromech droid,[2] or be inserted and operated manually.[4] They could be used in infiltrations[2] or to open locked doors.[4] Spikes were also a common tool in starship thefts, used to overload the target ship's defences.[5]

History[edit | edit source]

Computer spikes were in use by the end of the Republic Era.[4] In 19 BBY, during the issuing of Order 66,[6] mind-controlled clone troopers onboard[4] the Tribunal[7] used a data spike to manually open the door of the medical bay former Jedi Padawan Ahsoka Tano had sealed herself inside with three astromech droids in order to perform emergency surgery on Clone Commander Rex to remove his behavioral modification biochip and free him from the brainwashing. The clones succeeded in getting the door open, however, the efforts of droids RG-G1 and CH-33P were able to reseal the door, and Tano was able to fight off the attackers with some last-minute assistance from Rex.[4] The attacking clones eventually cut the door out of the frame with blowtorches, but by that time Tano and her allies had finished what they needed to do inside the room, and successfully fought their way out.[8]

During the early rebellion against the Galactic Empire, members of the Spectres rebel cell hijacked the Imperial Communications Center on Lothal so they could send an anti-Imperial broadcast. During the raid, Sabine Wren and C1-10P "Chopper" plugged a data spike into the communication tower's computers in order to carry out the hijacking.[2]

Later, during the Galactic Civil War, Chopper was himself hijacked by Imperial controller LT-319 during a mission to the moon Killun 71. After the crew of the Ghost had subdued the rogue droid, Captain Hera Syndulla used a data spike while hooking Chopper up to her ship in a successful ploy to both undo the hacking and destroy LT-319 and his ship remotely.[9]

Behind the scenes[edit | edit source]

The first canonical appearance of a computer spike was in the Star Wars Rebels season 1 episode "Call to Action".[2] They were first identified as computer spikes in the accompanying episode guide on StarWars.com.[3]

Appearances[edit | edit source]

Non-canon appearances[edit | edit source]

Sources[edit | edit source]

Notes and references[edit | edit source]

In other languages
Community content is available under CC-BY-SA unless otherwise noted.