Data Courier
⚔ Unit · First Signal · Level 5
Rules Text
Battlecry: Draw 1 if you control a Terran unit.
Energy
2
ATK
1
HP
3
TECH
3
CMD
1
SUP
2
Abilities
Weakness
Specifications
"Packets delivered. Awaiting handshake."
Lore
Data Couriers are lightweight messenger units that ferry encrypted intelligence between Terran field positions. Too fragile for direct combat, they compensate with speed and network awareness. When a Courier arrives at a position already staffed by Terran forces, it uploads its data cache instantly — the existing network infrastructure handles the decryption.
Extended Lore
Data Couriers exist because the Terran relay network, for all its sophistication, has a fundamental vulnerability: electromagnetic jamming. When hostile forces — particularly the Caxion — flood an area with interference, wireless relay communication degrades or fails entirely. Data Couriers provide a physical backup — armored messenger units that carry encrypted data packets between positions using good old-fashioned movement.
Each Courier is a small, fast drone built around a hardened data core capable of storing approximately two petabytes of encrypted intelligence. The core is shielded against electromagnetic interference, radiation, and physical shock, and is equipped with a thermite self-destruct charge that activates if the unit's tamper sensors detect unauthorized access. The data inside a Courier is safer than the Courier itself.
Couriers navigate using a combination of pre-programmed waypoints and real-time obstacle avoidance. They are deliberately designed without weapons — their entire mass budget is allocated to speed, armor, and data storage. In combat zones, Couriers rely on evasion rather than engagement, using their small profile and high acceleration to dodge incoming fire.
The handshake protocol that occurs when a Courier reaches a position staffed by friendly Terran units is a marvel of efficiency. The Courier broadcasts an encrypted identification burst. The receiving station verifies the signature against the network's authentication database. If the signature matches, the Courier's data core is unlocked and its contents are uploaded to the local network in under 0.3 seconds. The entire process is automatic — no human intervention required. The Courier then either returns for another run or, if damaged, powers down and awaits recovery.