Computer spikes, also known as data spikes, were electronic devices that, upon insertion into a computer, allowed the user to access classified data and programs. Spikes could be set to initiate a program or be operated manually, and plugged into the same kind of sockets as scomp links. They were often used in infiltrations and thefts.
Description[]
Computer spikes[3] were handheld, vaguely cylindrical devices designed for hijacking computer systems. They could be inserted into a target computer by an astromech droid,[2] or be inserted and operated manually.[4] They could be used in infiltrations[2] or to open locked doors.[4] Spikes were also a common tool in starship thefts, used to overload the target ship's defences.[5]
History[]
Computer spikes were in use by the end of the Republic Era.[4] In 19 BBY, during the issuing of Order 66,[6] mind-controlled clone troopers onboard[4] the Tribunal[7] used a data spike to manually open the door of the medical bay former Jedi Padawan Ahsoka Tano had sealed herself inside with three astromech droids in order to perform emergency surgery on Clone Commander Rex to remove his behavioral modification biochip and free him from the brainwashing. The clones succeeded in getting the door open, however, the efforts of droids RG-G1 and CH-33P were able to reseal the door, and Tano was able to fight off the attackers with some last-minute assistance from Rex.[4] The attacking clones eventually cut the door out of the frame with blowtorches, but by that time Tano and her allies had finished what they needed to do inside the room, and successfully fought their way out.[8]
During the early rebellion against the Galactic Empire, members of the Spectres rebel cell hijacked the Imperial Communications Center on Lothal so they could send an anti-Imperial broadcast. During the raid, Sabine Wren and C1-10P "Chopper" plugged a data spike into the communication tower's computers in order to carry out the hijacking.[2]
Later, during the Galactic Civil War, Chopper was himself hijacked by Imperial controller LT-319 during a mission to the moon Killun 71. After the crew of the Ghost had subdued the rogue droid, Captain Hera Syndulla used a data spike while hooking Chopper up to her ship in a successful ploy to both undo the hacking and destroy LT-319 and his ship remotely.[9]
Behind the scenes[]
The first canonical appearance of a computer spike was in the Star Wars Rebels season 1 episode "Call to Action."[2] They were first identified as computer spikes in the accompanying episode guide on StarWars.com.[3]
Appearances[]
- Star Wars: The Clone Wars — "Shattered"
- Star Wars Rebels webcomic
- Star Wars Rebels — "Call to Action" (First appearance)
- Battle to the End
- Star Wars Rebels — "Double Agent Droid"
- Rogue One: A Star Wars Story novelization
- Rogue One: A Star Wars Story audiobook
- Darth Vader (2015) 2
- Doctor Aphra (2016) 3
- Aftermath: Empire's End
- Aftermath: Empire's End audiobook
- The Mandalorian — "Chapter 11: The Heiress"
- The Mandalorian Season 2 3
- Star Wars: The Last Jedi: Expanded Edition (Mentioned only)
- Star Wars: The Last Jedi: Expanded Edition audiobook (Mentioned only)
- Pirate's Price
- Pirate's Price audiobook
Non-canon appearances[]
Sources[]
- "Call to Action" Episode Guide | Star Wars Rebels on StarWars.com (backup link) (First identified as computer spike)
- Star Wars: The Last Jedi: Incredible Cross-Sections
- Star Wars: The Last Jedi: The Visual Dictionary
- Cyphers and Masks
- Gadgets and Gear
- Star Wars: The Mandalorian Handbook
Notes and references[]
- ↑ Cyphers and Masks
- ↑ 2.0 2.1 2.2 2.3 2.4 2.5 2.6 2.7 Star Wars Rebels — "Call to Action"
- ↑ 3.0 3.1 Call to Action Trivia Gallery on StarWars.com (backup link) (Slide 4)
- ↑ 4.0 4.1 4.2 4.3 4.4 Star Wars: The Clone Wars — "Shattered"
- ↑ Pirate's Price
- ↑ Star Wars: Galactic Atlas
- ↑ Star Wars The Clone Wars Character Encyclopedia: Join the battle! on Amazon.co.uk (backup link)
- ↑ Star Wars: The Clone Wars — "Victory and Death"
- ↑ Star Wars Rebels — "Double Agent Droid"