Military and Security Forces

There is no interstellar military.

This is the fact that shapes everything else about security in Terran Occupied Space. No government has the reach, the budget, or the political authority to project military force across interstellar distances. No corporation has the incentive to build a navy when the economics of space warfare make it cheaper to negotiate, arbitrate, or simply wait. The UTCA’s Security and Enforcement Directorate, the closest thing to an interstellar armed force, has no standing military, no warships, and the smallest budget relative to its mandate of any directorate in the Authority.

What exists instead is a patchwork: corporate security forces that protect corporate assets, a UTCA enforcement apparatus that functions more like a coast guard than a military, private military contractors who sell violence to anyone with the budget, and, at the bottom of the hierarchy, whatever passes for law enforcement in each colony’s jurisdiction.

It works. Not well, and not for everyone, but the system produces enough stability for the economy to function. That is the bar. It has never been set higher.

Why There Is No Interstellar Navy

The Economics of Space Warfare

Space warfare is economically irrational at the interstellar scale. This is not an ideological position. It is arithmetic.

Blockades are impractical. A naval blockade requires maintaining a presence around the target sufficient to interdict incoming and outgoing traffic. In planetary orbit, this is technically possible; the geometry constrains the approaches. Between stars, it is not. Jump-capable ships emerge from hyperspace at distances dictated by the mass of the destination system, well outside any practical interdiction radius. A blockading force would need to patrol a spherical volume measured in astronomical units, against targets that arrive instantaneously and at unpredictable vectors. No fleet that could be economically sustained achieves this coverage.

Planets are the chokepoints. A planet’s gravity well is its defense. Landing an invasion force requires achieving orbital superiority, then maintaining it long enough to put troops on the ground, then sustaining those troops against a defending population that controls the local infrastructure. The logistics chain stretches across light-years. Every supply shipment takes weeks. Reinforcements take weeks. A planetary invasion is a commitment measured in years of expenditure against a defender who is already there, already supplied, and already motivated.

No IPC has attempted a planetary invasion. The cost models have been run. They do not produce favorable projections under any plausible scenario.

War destroys the thing you are fighting over. The extractable value of a colony world (its mines, its refineries, its workforce, its infrastructure) is the reason anyone wants the planet in the first place. War damages all of it. A contested colony world produces less than an uncontested one. A bombarded colony world produces nothing. The cost-benefit analysis of fighting over a productive asset that you will render unproductive by fighting over it does not support the decision.

The Orbital Bombardment Prohibition

Orbital bombardment (the use of space-based weapons platforms to attack planetary surfaces) is the one military capability that could decisively resolve a planetary conflict. It is also the one line that every faction in TOS has agreed must never be crossed.

The prohibition is not a treaty. It is not a law. It is a consensus born of a single incident that no one involved will describe in detail and no one who heard about it will forget.

During the early expansion period, before the UTCA’s regulatory framework had solidified (when corporate claims overlapped and the mechanisms for resolving disputes were still being invented), a territorial conflict between two mid-tier corporations escalated to orbital strike. The target was a mining settlement on a contested world. The settlement was destroyed. The workers (contractors, families, support staff) were killed. The planet’s surface in the strike zone was rendered uninhabitable for a radius that exceeded the settlement’s footprint by an order of magnitude.

The response was immediate and universal. The UTCA, then a weaker institution than it is today, issued its first unanimous interdiction. Every major corporation, including entities that had been considering similar options for their own disputes, condemned the action. The aggressor corporation’s assets were frozen by the Tau Ceti Interstellar Exchange. Its insurance was voided. Its contracts were terminated. Its leadership was arrested by the only jurisdiction that could reach them. The corporation ceased to exist within a fiscal year, not because of military defeat, but because the interstellar economy severed it like a gangrenous limb.

The lesson was structural, not moral. Orbital bombardment threatens the foundation that every entity in TOS depends on: the assumption that infrastructure investment will not be destroyed from orbit. If that assumption fails, if any corporation could lose a billion-credit colony to a kinetic strike with no warning and no defense, then the risk calculus of colonial investment collapses. No one builds a dome on a planet that might be bombed. No one finances a mining operation on a world that might be cratered. The interstellar economy requires the assumption that orbital bombardment will not happen, and every entity that profits from the interstellar economy is therefore motivated to destroy anyone who proves that assumption wrong.

The prohibition holds because breaking it is suicide: not military suicide, but economic suicide. The entity that conducts an orbital strike will be cut off from the financial system, abandoned by its insurers, deserted by its contractors, and dismantled by the combined economic pressure of every other entity that needs the prohibition to hold. This is not deterrence through military power. It is deterrence through market consequences, and it is the most reliable deterrent in TOS because the entities it restrains care more about their balance sheets than about anything else.

The Financial Architecture as Soft Power

The interstellar credit standard, maintained by the UTCA’s Financial Oversight Directorate and administered through the Tau Ceti Interstellar Exchange, is the infrastructure that makes the prohibition enforceable.

Interstellar commerce requires a common medium of exchange, a trusted settlement system, and a network capable of transferring value across light-year distances despite the communication lag. The Exchange provides all three. The relay network that carries financial data (dedicated courier drones running encrypted transaction records on priority schedules) is the circulatory system of the interstellar economy. Every transaction of significance clears through the Exchange. Every credit balance is denominated in the standard. Every IPC, every colonial government, every independent operator who participates in the interstellar economy does so through infrastructure that the UTCA’s financial directorate controls.

This is the power that the UTCA exercises without appearing to exercise it. The Authority cannot compel a major IPC to comply with a regulation. It cannot field an army. It cannot enforce a court order across interstellar distances. But it can suspend an entity’s access to the interstellar credit system, and that suspension is, for practical purposes, a death sentence for any entity that depends on interstellar commerce, which is every entity that matters.

The Financial Oversight Directorate does not make threats. It does not need to. The directorate’s staff are career bureaucrats who maintain the ledgers, process the transactions, and enforce the technical standards that keep the system functioning. They are aware of their institution’s structural power in the way that a dam operator is aware of the water behind the dam. The power is not theirs. It belongs to the infrastructure. They merely operate it.

This structural power is why the UTCA survives despite its inability to enforce its own regulations through conventional means. The Authority is weak in every dimension except the one that matters: the financial infrastructure that the entire interstellar economy depends on. Defying the UTCA on a regulatory question is low-risk. Defying the UTCA on a question that threatens the financial system’s stability is not something that any rational actor has attempted.

Covenant’s colonial government, host to the Exchange’s physical infrastructure, has begun testing the boundaries of this arrangement, exercising its local regulatory authority in ways that the Exchange’s corporate operators find inconvenient. Whether Covenant understands the leverage it holds by hosting the interstellar economy’s central clearing house, or is simply asserting local authority without grasping the implications, is an open question with significant consequences.

Corporate Security Forces

Corporate security is the military of TOS. It is not called that. It is called “asset protection,” “site security,” “risk management,” or one of a dozen other euphemisms that allow mining companies to maintain standing armies without acknowledging that they maintain standing armies. The euphemisms are important. A corporation with a security division is protecting its investments. A corporation with a military is a sovereign power, and sovereign powers have obligations that security divisions do not.

Scale and Structure

Every major IPC maintains a security force scaled to its operational footprint. The Five collectively employ more armed personnel than any government in TOS, including Earth’s nation-states.

Meridian Dynamics operates the largest and most sophisticated corporate security force. Security services are a core revenue stream: Meridian sells protection the way Tessaract sells ore. Its Security Solutions Division provides armed personnel, facility defense, convoy escort, and threat response to Meridian’s own operations and to external clients. Meridian-trained security operators are the closest thing to professional soldiers that TOS produces. They are well-equipped, well-trained, and deployed under a command structure modeled on Earth-era military organizations.

Tessaract Mining Corporation maintains security forces focused on protecting extraction operations: mine sites, processing facilities, cargo convoys, and the orbital infrastructure that connects them. Tessaract security is industrial: practical, unglamorous, and scaled to the threat environment. In Core systems, this means checkpoint guards and access control. On the Frontier, it means armed patrols, fortified perimeters, and the willingness to shoot at anything that threatens production.

Nakamura-Stellar arms its survey crews and maintains a small but capable security contingent for deep-space operations. Nakamura security is oriented toward the unknown: trained for first-contact scenarios, hostile- environment operations, and the specific dangers of survey work in unsurveyed space. They are fewer in number than the other Five’s security forces but operate in environments where the margin for error is zero.

Sternberg Group equips its construction sites with private military contractors rather than maintaining a large internal security force. Sternberg’s approach is pragmatic: security is a cost center, not a competency, and contractors can be scaled up or down as project requirements change. The contractors are drawn from the same pool that serves every IPC: former Meridian operators, cashiered government soldiers, and independent professionals whose qualifications are verified by their survival rather than their credentials.

Helix Technologies maintains the smallest security force of the Five, focused on facility protection, executive security, and the defense of manufacturing and research infrastructure. Helix’s security posture is corporate rather than paramilitary: surveillance, access control, and information security take priority over armed force. When Helix needs serious muscle, it contracts Meridian.

Equipment and Capability

Corporate security forces are equipped to the standard of a well-funded military without the designation. The baseline kit for a corporate security operator in a contested environment includes hard body armor, a caseless carbine, a sidearm, helmet-integrated communications and targeting systems linked to a cortical mesh, and access to vehicle support (armored ground transport, patrol craft, or shuttles depending on the operational context).

Specialized units carry heavier equipment: powered frames for high-threat operations, precision rifles for overwatch, support weapons for sustained engagements, and the surveillance and electronic warfare systems that modern corporate security depends on at least as much as firearms.

Ship-based security operates armed patrol craft for in-system law enforcement, anti-piracy operations, and territorial defense. Meridian builds most of these vessels: fast, lightly armored, and equipped with point-defense systems and light weapons suitable for disabling civilian ships without destroying them. The objective is always to capture, not to sink. A disabled ship can be boarded, its cargo seized, its crew detained. A destroyed ship is a total loss of whatever value it carried.

What corporate security forces do not have is strategic capability. No IPC maintains weapons systems designed for orbital bombardment, strategic-scale destruction, or operations against hardened military targets. The prohibition on orbital bombardment is reflected in procurement: the weapons systems that could conduct it are not manufactured, not sold, and not maintained. This is enforced by mutual interest rather than regulation: any IPC that acquired strategic weapons would trigger an arms race that every IPC has concluded is unprofitable.

The UTCA Security and Enforcement Directorate

The UTCA’s Security and Enforcement Directorate is a coast guard, a regulatory inspectorate, and an occasionally useful threat, in that order.

What It Does

Interdiction enforcement. The Directorate patrols interdicted regions (the Kessler Void being the most prominent) with contracted patrol vessels. Interdiction enforcement is the Directorate’s most credible function. Entering an interdicted zone voids insurance, invalidates salvage claims, and exposes the violator to liability without corporate legal cover. The Directorate’s patrol presence makes interdiction violations detectable. The financial consequences make them costly. The combination works not because the Directorate’s patrol craft could stop a determined intruder, but because the intruder’s insurer will not cover the result.

Shipping lane security. The Directorate maintains a presence on major shipping routes, inspects vessels for compliance with navigation and safety standards, and responds to distress calls within its operational range. This is coast guard work: routine, necessary, and conducted with inadequate resources across distances that make comprehensive coverage impossible. The Directorate’s patrol craft cover the most-trafficked lanes in Core and Inner Colony systems. Outer Colony and Frontier routes are patrolled intermittently at best.

Enforcement actions. When the UTCA issues an enforcement order (a fine, a cease-and-desist, a charter revocation), the Security and Enforcement Directorate is theoretically responsible for executing it. In practice, the Directorate contracts private security for enforcement actions and relies on corporate cooperation for access to corporate- controlled facilities. An enforcement action against a mid-tier operator works. An enforcement action against one of the Five requires the Five’s permission, which somewhat undermines the concept of enforcement.

Incident investigation. The Directorate investigates incidents that cross jurisdictional boundaries: piracy, interstellar fraud, crimes committed in transit between systems, and increasingly anomalous events that colonial authorities report to the UTCA rather than handle locally. The investigation capability is genuine. The Directorate employs competent investigators with real authority to conduct interviews, access records, and assemble cases. Whether those cases result in consequences depends on who the investigation implicates.

What It Cannot Do

The Directorate cannot project force. Its patrol craft are lightly armed vessels suitable for inspection, escort, and the interdiction of civilian ships. They are not warships. A single Meridian patrol craft outguns the Directorate’s entire deployed fleet in most sectors.

The Directorate cannot sustain operations. Its budget comes from charter fees and UTCA general revenue, both of which are subject to the political pressures that the IPCs exert on the Authority’s funding. A Directorate operation that inconveniences a major IPC may find its funding for the following quarter reduced through channels that do not reference the operation.

The Directorate cannot compel cooperation from corporate security forces, which outman and outgun it in every jurisdiction. When the Directorate conducts an enforcement action in a system where corporate security is the dominant armed presence, the action succeeds because the corporation allows it to succeed, or it does not.

The People

Despite its limitations, the Directorate employs people who take the work seriously. Interdiction patrols are dangerous. Shipping lane security is unglamorous but essential: the crews who answer distress calls in deep space do so knowing that backup may be days away. Investigators who build cases against corporate entities do so knowing that the cases may be buried.

The Directorate attracts a specific kind of person: one who believes in the function if not the institution, who finds satisfaction in the work itself rather than the outcomes, and who has made peace with the gap between what the job requires and what the system permits. These are not idealists. Idealists burn out in the first year. These are practitioners: people who have identified the narrow space within the system where their work can make a difference and who operate within that space with steady, unglamorous competence.

How Corporations Fight

The IPCs do not fight wars. Wars are expensive, destructive, and bad for quarterly projections. What they do instead is compete through means that produce the same outcomes as warfare: territorial gain, resource control, market dominance, without the overhead of actually shooting at each other.

Economic Warfare

The most common form of inter-corporate conflict and the most effective. Price manipulation, supply chain disruption, contract poaching, market dumping, and the strategic application of financial pressure to squeeze a competitor out of a market or force a negotiation.

Economic warfare is constant. It is the background state of inter-corporate relations. Every IPC has a division dedicated to competitive strategy, a polite term for identifying competitors’ vulnerabilities and exploiting them through market mechanisms. The weapons are commodity futures, exclusive supply contracts, patent litigation, and the kind of coordinated regulatory pressure that can make a competitor’s operations in a specific jurisdiction unprofitable overnight.

Espionage

Every major IPC operates an intelligence division. The scope ranges from competitive intelligence (monitoring competitors’ public activities, analyzing their filings, and drawing inferences about their strategy) to active espionage: recruiting sources inside rival organizations, infiltrating research programs, stealing proprietary data, and conducting the kind of surveillance that is illegal in every jurisdiction and practiced in all of them.

Corporate espionage is a mature profession with its own tradecraft, career paths, and professional community. The people who do this work have more in common with each other than with their nominal employers. They are recruited from each other’s organizations. They use the same methods. They attend the same industry conferences under transparent cover identities that everyone recognizes and no one acknowledges. The adversarial relationship is professional, not personal, and the boundary between competitor and colleague is porous.

Proxy Operations

When economic pressure and espionage are insufficient, corporations resort to direct action conducted through proxies that provide deniability.

Private military contractors, criminal organizations, pirate groups, and independent operators are all available for hire. A competitor’s supply convoy is raided by “pirates” who know exactly which container to target. A rival’s key researcher suffers a tragic accident. A colonial government that favors a competitor discovers a corruption scandal that happens to benefit the IPC that manufactured the evidence.

Proxy operations are the violence that the system officially prohibits and unofficially accommodates. They are small-scale, deniable, and targeted not because the IPCs have moral constraints, but because large-scale undeniable violence triggers the kind of response that destroyed the corporation that conducted the first orbital bombardment. The key is to stay below the threshold that forces the system to respond. A murdered executive is a crime. A destroyed settlement is a crisis. The IPCs know where the line is and stay on the profitable side of it.

Information Warfare

Control of the narrative is a form of combat. IPCs manipulate media, suppress unfavorable reporting, plant favorable coverage, and shape public perception of competitors through sustained information campaigns. This is not new; it predates spaceflight. But the interstellar communication lag gives it particular power. A story planted in a Core-system media outlet takes weeks to reach the Frontier. By the time a correction arrives, the damage is done. On colony worlds where the local Net is the only source of information, controlling the local Net is controlling reality.

Private Military Contractors

The market for private military services fills the space between corporate security forces and government authority. PMCs provide armed personnel for hire: facility security, convoy escort, threat response, and the kind of deniable operations that corporate security forces cannot conduct without implicating their employer.

The PMC industry is large, fragmented, and lightly regulated. UTCA licensing requirements for private military operators exist on paper. Compliance is uneven. In Core systems, PMCs operate under regulatory scrutiny that limits their scope and methods. On the Frontier, a PMC is anyone with weapons, a ship, and a client.

The largest PMCs are subsidiaries of Meridian Dynamics or staffed primarily by former Meridian operators. Meridian’s training pipeline produces more qualified security personnel than Meridian itself employs, and the surplus flows into the private market. A PMC outfit staffed by Meridian veterans operating Meridian equipment is functionally a Meridian unit with extra deniability. This arrangement benefits everyone involved except the targets.

Smaller PMCs range from professional outfits with genuine capability to armed gangs with a business license. Quality is assessed by reputation, which is assessed by survival. A PMC that consistently completes contracts without excessive casualties (among the clients, not the opposition) develops a reputation that commands premium rates. A PMC that loses clients does not develop anything except a warning.

Colony-Level Security

Core Systems

Law enforcement in Core systems approaches the functionality of a legitimate police force. Colonial governments in the Core have real budgets, real institutions, and enough independence from their corporate sponsors to maintain police forces that serve the population, within limits. The limits are corporate facilities, corporate personnel, and corporate interests, all of which fall under corporate security jurisdiction rather than colonial law enforcement.

A Core-system colonial police officer can arrest a citizen for assault, investigate a theft, and respond to a domestic disturbance. The same officer cannot enter a corporate facility without corporate permission, cannot investigate corporate employees for crimes committed on corporate property, and cannot enforce colonial law inside the corporate jurisdictional boundary. The practical result is two legal systems operating in parallel: one for the population and one for the corporation. The corporate system is better funded, better equipped, and answerable to the corporation rather than the public.

Inner Colonies

The sweet spot again. Inner Colony law enforcement has enough institutional structure to function and enough distance from corporate headquarters to exercise judgment. Police forces here are smaller and more personal than in the Core: officers know their communities, respond to local conditions, and develop the kind of practical competence that comes from doing a job without adequate resources for long enough to learn what actually works.

Corporate security and colonial police negotiate their overlapping jurisdictions through working relationships that vary by colony. In some Inner Colony systems, the relationship is functional: information is shared, jurisdiction is respected, and the two forces cooperate on matters of mutual concern. In others, the relationship is territorial: each force defending its jurisdiction against encroachment by the other, with the population caught between two organizations that are more interested in institutional boundaries than in public safety.

Outer Colonies

Police forces thin. On some Outer Colony worlds, the colonial police force is a single sheriff’s office with a handful of deputies covering a population spread across multiple settlements. Jurisdiction is nominal: the sheriff has legal authority over everything outside corporate facilities and practical authority over whatever is within walking distance.

Corporate security fills the gap, providing law enforcement services within corporate territory, which is most of the developed area. The distinction between corporate security guard and police officer is invisible to the person being detained. The difference is accountability: a police officer, however under-resourced, operates under colonial law and can theoretically be held to a standard. A corporate security officer operates under corporate policy, which is written by the corporation and enforced by the corporation and reviewed by the corporation.

The Frontier

There is no law enforcement on the Frontier in any meaningful sense. There is corporate security, which protects corporate assets. Everything else is managed by the community, which means it is managed by whoever is willing to manage it: the site manager, the toughest person in the hab, or nobody at all.

Frontier justice is informal, immediate, and frequently unjust. Disputes are resolved by negotiation, intimidation, or violence, depending on the parties involved. Serious crimes (murder, theft of critical supplies, sabotage of life support) are handled by whatever authority the community recognizes, which may be a corporate site manager applying corporate regulations, a community council applying consensus judgment, or a mob applying whatever seems appropriate at the time.

The Frontier is not lawless because people want it to be lawless. It is lawless because the institutions that would provide law are funded by entities that have not funded them and staffed by people who have not been hired. Corporate security protects the mine, the refinery, and the primary dome. Everything beyond the corporate perimeter is someone else’s problem, and the someone else does not exist.

Piracy

Piracy in TOS is a real but overstated threat. Media coverage amplifies every incident because piracy is dramatic, narratively satisfying, and sells advertising space. The actual incidence of piracy is low relative to the volume of interstellar traffic: the vast majority of cargo shipments arrive without incident.

What piracy exists operates on a spectrum.

Opportunistic raiding. Small crews in small ships targeting unescorted freighters on low-traffic routes. The typical pirate is not a romantic figure. They are an underfunded crew in a poorly maintained ship, operating on margins thin enough that a single failed raid can end them. Their targets are soft: civilian freighters without armed escort, whose crews are more likely to surrender cargo than fight. The cargo is sold through fences in Outer Colony and Frontier ports that do not ask questions about provenance.

Organized piracy. Criminal organizations that operate pirate fleets as a business line: coordinated raiding on specific routes, intelligence networks that identify high-value targets, and fencing operations that move stolen cargo into legitimate commerce. Organized piracy is a professional operation with professional logistics. It is also the form of piracy that most reliably turns out to be a proxy operation funded by a corporation that wants a competitor’s supply chain disrupted without its fingerprints on the disruption.

Wreckers. Crews that do not attack ships directly but manipulate navigation data, plant false distress signals, or sabotage relay beacons to cause ships to misjump, drop out of hyperspace in unexpected locations, or approach hazards that the manipulated data did not show. The wrecked ship is then salvaged. Wrecking is rare, technically complex, and considered a category of crime worse than straightforward piracy because it endangers every ship that uses the affected navigation data, not just the intended target. The UTCA treats wrecking as a capital offense in its jurisdictions. The Directorate investigates wrecking reports with more urgency than almost any other category of crime.

Anti-piracy operations are conducted primarily by corporate security forces protecting their own shipping. Meridian escort contracts are a significant revenue stream. The UTCA’s Directorate patrols major shipping lanes but lacks the coverage to provide comprehensive protection. On low-traffic Frontier routes, the only anti-piracy measure is the ship’s own crew and whatever arms they carry, which on a well-run freighter is sufficient against the underfunded raiders who are the most common threat, and insufficient against anything more serious.


See also: Colonial Governance · Megacorporations · Criminal Organizations · Weapons and Vehicles · Law and Enforcement