+ As a new Acolyte of the Holy Orders of the Emperor’s Inquisition you have been presented with a bewildering array of codewords & answer-responses, jargon & syntax, cant & dialects. Should you, by the Emperor’s grace, survive to reach the rank of Interrogator or even Inquisitor you will have picked up most of these through usage, but there are some matters which cannot be left in this way, hence this guide.
+ CODINGANDPRIORITY – AN ACOLYTE’S PRIMER
+ At the header of every reference, document, vid-file, vox-capture, and other info-stub you may encounter there will an amount of metadata. Much of this is relevant only to data-sifters, but the two entries given as coding and priority can reveal much to the trained eye.
+ The coding line comprises two parts, the source of the code used and it’s type. As an Acolyte of the Ordo Calixis you will almost exclusively be shown data that originates within the sector and which uses standard coding methods, given as ‘ClxStd’.
+ Secondly is the type, which in Calixis standard coding has itself two parts, the form and the strength. Strength is rated from One to Ten, the higher the number the deeper the coding. Form presents one of the four three levels of coding that Acolytes are likely to see.
o ‘Lib’ is Library coding, used for open access info-streams across the sector. The strength of the coding represents the degree of resilience and redundancy in the file. Data coded at LibFive can be successfully (prob.: 93.7%) read when three-quarters of the file has been destroyed or corrupted.
o ‘Steg’ is standard Inquisitorial coding, used for messages and information whose existence need not be hidden but its contents must be. The codewalls of a Steg file can be read by anyone with the appropriate clearance. Your Alpha will almost certainly have higher clearance than you.
o ‘Krypt’ is high-level Inquisitorial coding. All Calixis standard compliant systems will not admit the existence of Krypt data unless the querying party has appropriate clearances. Attempts to access Krypt files without such clearance is a serious breach of Inquisitorial protocols and will be sanctioned.
o ‘Masq’ is the highest possible level of coding. Each Masq file is individually coded to specific readers, is capable of actively concealing itself in almost any conceivable info-system, and will protect itself against unauthorised access attempts. The very existence of Masq coding is denied to all but the highest ranks of Acolytes.
+ Priority is more directly relevant to the careers of Calixian Acolytes. It represents the author’s assessment, according to protocol, of the importance of the file in question. As with coding it comes in two parts, commonly referred to as Lead and Tail.
+ There are four classes of Lead: ‘diamond’, ‘ruby’, ‘topaz’ and ‘obsidian’. Diamond is the default priority, given when none of the criteria for the other levels are met. Ruby means that the data is of direct relevance to the Holy Ordos, but of limited scope – a city or a continent. Topaz data is of great importance and breadth – a mission with this priority can typically affect a cluster of worlds or even a sub-sector. Obsidian priority is the highest, representing potential catastrophe or disaster if not acted upon with haste.
+ Priority Tails are rated between One and Five. This is the author’s judgement of the importance of the information within the bounds of protocol. It is also representative of the treatment of the file in message relay systems and astropathic transmission. If two messages with the same Lead arrive at the same time, the one with the higher Tail will be sent first.
+ An exception to this system is obsidianSix priority information. Reserved for data of the highest importance, which has often been capable of shaking the Calixis sector to its foundations, delivery of this message is of such absolute importance that it over-rides any and all other concerns and assignments, no matter what they may be.
+ END OF PRIMER
+ The Emperor go with you in your duties as Acolytes.
Thought for the day: Be pure. Be vigilant. Behave.