SWADE - Interface Zero - 3.0 - Hacking Rewrite
SWADE - Interface Zero - 3.0 - Hacking Rewrite
The following section introduces you to hacking in Interface Zero and gives you all the tools you need to hack anything
you can imagine.
<side bar>
Computer Interfaces
The most common computers in 2095 do not use keyboards, mice, etc. The TAP’s Hyper Reality interface and Line of
Sight Triggers handle things like typing via voice-to-text, scrolling through content, opening new hyper panels (think web
browser windows/tabs, etc.), and generally interacting with Hyper Objects and things of that nature. Your Personal Area
Network determines the broadcasting range of your Tendril Access Processor and limits what you can access at any given
point in time. The newest operating system for the TAP is Hyper Panels 3.7.
</side bar>
If the hacker succeeds, the program runs on the system and the target suffers the effects of the program. For more
information on computer systems and devices, see page @@. Additionally, the character has access to the system and may
perform additional actions or launch programs while connected to it. See Hacker Actions on page @@.
Example A: Luciferion wants to hack an opponent’s Tendril Access Processor. He fires up his ICEpick program and launches
an attack. The IDS of his opponent is 3, which imposes a -2 penalty to hacking attempts, but the ICEpick program grants a
+1 bonus to Hacking skill rolls when attempting to gain access to a system, so Luciferion needs to score higher than 5 to gain
access. He has a d8 Hacking skill and scores a total of 6 after modifiers are applied. Luciferion has successfully gained access
to his opponent’s Tendril Access Processor.
HACKING A NETWORK
Hacking a network is slightly different than hacking a computer system or device. To successfully hack into a network, the
character must complete a Dramatic Task as described in Savage Worlds. If the character succeeds, she has access to the
entire network and anything or anyone connected to it. If the character launches malware, it can potentially affect the
entire network, and anyone connected to it. See Access on page @@ for more information on actions characters can
perform when they successfully hack into a network. Only Sprites can make Support rolls to aid the character in a
Dramatic Task.
Optional Rule: Counter Hacking as a Complication: In Savage Worlds, if you draw a Club during a Dramatic Task, a
complication happens. Generally, what happens is open to interpretation and the results of a failed roll are narrow in
scope. In Interface Zero, however we want to add an element of danger to a Dramatic Task involving a hack on a network.
If a character draws a Club during a Dramatic Task, have the computer system’s Intrusion Defense System make a Notice
roll if the character fails a Hacking roll. If the Notice roll is successful, the IDS launches Intrusion Countermeasures to stop
the character. The options available to IDS include Force Booting the character, launching malware, and tracing the
character’s location See the Hacked! section on page@@ for more information. If the counter hack is successful, apply the
appropriate effects to the character and continue along with the Dramatic Task (if possible) until it is resolved one way or
the other.
ACCESS
Once your character has gained access to a computer system, she can perform the following actions. If the character fails a
skill check, the system gets to make a Notice roll to see if it detects the character’s presence in the system. If the system
succeeds, it may respond accordingly. See Hacked! on page @@ for more information.
Access system devices: The character may access any device linked to the system. This includes certain types of
Cybertech implants (See the Computer System and Devices Table for more information). If the device can be controlled,
the character may attempt to operate it by making the appropriate skill roll.
For example, if security cameras are linked to the system, the character can view the area they cover and make a Notice
roll to spot things. If weapon systems are linked to a computer system, the character may fire them by making a Shooting
roll. Note that characters may not fire a smart weapon linked to an Extra or Wild Card’s TAP, though they may eject clips
and unlink the weapon from the TAP. Some devices require a dramatic task to access and manipulate in some fashion.
This can be changed to a standard Hacking skill roll at the GM’s discretion.
Attack the system: If the character has malware, she can upload it to the system and attempt to damage it. See
Damaging a System on page @@ for more information.
Manipulate the system: Characters can manipulate the system in the following ways:
• Create a backdoor: Characters can create a back door in a computer system by making a Hacking roll
modified by the tier of the system’s IDS. Success gives the character unfettered access to the system for
24 hours. The character must still make appropriate skill checks to perform other actions within the
system.
• Datamine: Characters can make a Research roll to scan the system for specific files and other, similar
types of data. This data may be downloaded/replaced or edited as an action. The time it takes to
datamine is equal to one round plus a number of rounds equal to the tier of the computer system.
• Disable a device: Characters can disable any device linked to the system with a successful Hacking skill
check. If the device is a cyberlimb, eye implant or other sensory-affecting device, the character must
make a Hacking VS Smarts Test. If successful, any benefits provided by the device are lost, but not the
most basic functions; a person with a cyber eye which provides enhanced vision will lose the benefits of
the enhanced vision, but she can still see normally. Characters with ability-enhancing cyberlimbs lose
the benefit of the limb, but can still walk, jump, throw a punch, etc.
• Delete a program: As an Action, characters can delete a program running on a computer system by
making a Hacking(programming) skill check modified by the rating of the program. If successful, the
program is deleted, and its effects are stopped.
• Edit a file or device: Characters can edit a file or linked device by making a Hacking (Programming)
skill check. The time it takes to datamine is equal to one round plus a number of rounds equal to the
tier of the computer system.
• Log GISP: Characters may log the Geographic Information System Protocol (GISP) address of a Tendril
Access Processor or computer system to which they have access by making a Hacking (Programming)
skill check, modified by the tier of the IDS protecting the system. A success grants the character a +1
bonus to Dramatic Task rolls to find the user. A raise grants a single free reroll on the Dramatic Task.
<side bar>
The best use of a back door?
Back doors are especially useful tools to quickly get in and out of a system without detection. The question is, when is the
best time to use them? In a combat situation where everything is happening really fast, spending an Action to create a
back door into a TAP or a weapon system is a waste of precious time. Your character will likely only be dealing with that
computer system once and it makes more sense for her to do other things more critical to the situation at hand.
If you are performing a hack into a larger system like a corporate mainframe, or hacking into a large defense network, then
it makes more sense. Having to go through multiple Dramatic Tasks to access the same network makes things needlessly
complex.
</side bar>
HACKED!
If a character’s Tendril Access Processor or system she is monitoring (including other people’s TAPs) has been hacked, the
character may spend an action to respond in a number of ways:
1. Counter hack: If a character has the Hacking skill or a Sprite, they may attempt to counter hack the intruder.
The types of counter hacking are as follows:
• Force Boot: As an action, the character or Sprite may make an Opposed Hacking roll against the intruder. If
the character is successful, the intruder is locked out of the system.
• Launch Malware: Instead of force booting the intruder, the character can choose to upload malware to the
intruder’s system. Make a Hacking roll modified by the IDS of the target of the attack. If successful, the
malware launches, and the target suffers the effects. See programs on page @@ for more information.
• Trace GISP: If the character wishes to trace the location of someone, you must do so by succeeding on a
Dramatic Task using your Research skill. The IDS of the GISP address she is trying to trace determines the
task rating of the Dramatic Task. See the Trace Difficulties Table to find the complexity of the Dramatic
Task. Hacking skill rolls to trace a GISP address impose normal penalties based on the tier of the Intrusion
Defense System. If the character succeeds, she has successfully traced the target’s location.
2. Delete Malware: If the intruder launched malware on the character’s system or a system they are monitoring,
they may spend an action and attempt to remove the malware by making a Hacking roll at a penalty equal to
the rating of the malware (between -1 and -5. See programs on page @@ for more information). If successful, the
malware has been deleted and the character no longer suffers the effects of the malware. If the character fails,
the malware remains on the system.
3. Reboot: The character may choose to shut down her system and reboot it. Rebooting logs any intruders out of
the system and takes an action to accomplish. Anyone logged into a system during reboot becomes Distracted
unless they succeed at a Spirit check. If the system is their own TAP, then the character is automatically Shaken
as well.
OTHER ACTIONS
Some hacking actions do not require a character to be logged into a computer system. Any programs or applications they
have can also be used to assist in the operation(s).
• Create Virtual Private Network (VPN): The character may set up a VPN at any time. See Personal Area
Networks on page @@ for more information. This action doesn’t require a skill check.
• Mask GISP: Characters can mask their Tendril Access Processor and those of anyone connected to their VPN.
The character must make a Hacking (Programming) skill check modified by the number of Tendril Access
Processors she wishes to mask. Success imposes a -1 penalty to any Hacking rolls to gain access to your tap of
that of those connected to your PAN. Raises on the roll increase the penalty by 1 per Raise.
<side bar>
Masking a GISP without a skill check
Masking GISP addresses are generally operations that happen during down time, or when prepping for a mission.
Consequently, it only makes sense that the character doing the masking is going to take their time to do it right.
Therefore, at the GM’s discretion, characters can forego skill checks, but they only get the benefits as if they succeeded. If a
character wants to try for a raise, they must make the skill check.
</side bar>
DAMAGING A SYSTEM OR DEVICE
When a computer system takes damage from malware, it can suffer a number of Wound levels before it crashes and is
useless. Once that happens, the system must be repaired before it can be used again. If the system is a Tendril Access
Processor, the character gains the Unplugged Hindrance until the TAP is repaired.
Example: Neon_Bright needs to hack a security camera with a tier 2 Intrusion Defense System (IDS). She wants to completely
shut down the camera, so she decides to use her pestilence virus, which corrodes the circuitry of the target system.
Neon_Bright makes a Hacking roll at a -1 penalty imposed by the Camera’s IDS and scores a total of 8. The virus runs and
attacks the security camera. Neon_Bright rolls her program’s damage (2d6+1) and scores a 5. The security camera’s
Resilience Rating is 4, so the program does a single Wound of damage. Since the camera is a device, it can only take a single
Wound before it is destroyed, so it emits sparks, makes a loud crackling sound, and shuts down.
Computer systems: computer systems are capable of performing a wide range of things. They control the functions of
nearly anything you can think of. They link networks together, store data and control various devices which are linked to
them. Home and workplace computer systems, vehicle and robot processors, research and development mainframes, and
network servers are examples of computer systems. When you hack a computer system you can access data files on the
system, and modify any devices linked to the system.
Devices: Devices are peripheral components linked to a computer system. They serve a specific purpose and nothing else.
Hacking a device gives you limited control over it. For instance, you might hack a security camera to view the area it
covers, edit the feed to mask your presence, shut it down or destroy it entirely. A smart weapon is also designated as a
device. Once you have accessed it, you can do simple things like fry the microprocessor, eject the clip or, if the weapon has
locking features, you can change those features and prevent the owner from using it.
• Tier: The tier of a Computer System determines how formidable the Intrusion Defense System is. IDS tiers range
from 1 to 5, 1 being the lowest and 5 the most secure. tiers set the scale for Hacking skill penalties to access the
systems they protect. If installed in a Tendril Access Processor, the tier determines the Range of the TAP’s
Personal Area Network. tiers also indicate what skill die the IDS uses when responding to intruders. Finally, the
cost of a computer system is determined by its tier.
• Active Memory Sectors (AMS): Active Memory Sectors determine how many programs a character can have
running on their computer system at one time. This number is equal to double the tier of the computer system.
Programs occupy a number of AMS slots based on the rating of the program. See programs on page @@ for
more information.
• Hacking Penalty: All computer systems have encryption designed to block unwanted attempts to penetrate the
systems they protect. Each level of encryption is represented by a penalty which is applied to any Hacking skill
rolls made to penetrate the system. As with anything, you get what you pay for. The cheapest Intrusion Defense
Systems cost 500 cryptodollars, but do not have any penalties to Hacking rolls, while the most expensive IDS can
cost upwards of 300,000 cryptodollars and are beasts in terms of encryption.
• PAN Range: This entry only applies to Tendril Access Processors. It notes the Range of the TAP’s Personal Area
Network. If a character wants to hack a computer system or device outside the Range of her PAN, she can do so,
but suffers a -1 penalty for every 12” beyond her PAN’s Range. If the character has gained access to a computer
system and moves out of Range, she may attempt to maintain her connection by making a Hacking test. This
Test is considered a Free Action. If she succeeds, the connection is maintained, but she still suffers the afore-
mentioned penalty for hacking outside her Pan’s Range.
• Resilience: All computer systems are designed to withstand corruption damage from malware (See page @@),
and the Resilience rating reflects that. Resilience is equal to 2 plus double the IDS rating of the computer system.
• Wounds: When a computer system takes damage, it can suffer the number of Wound levels before crashing. See
Damaging a Computer System on page @@ for more information. Devices can only take a single Wound before
they are destroyed.
• Skill Die: The tier of a computer system determines its base skill die, which is used for Hacking and Notice rolls.
• Cost: The cost of the computer system is listed in this entry.
OVERWATCH
While acting as Overwatch, your character may respond to any intrusion attempt against team members currently logged
onto your PAN as if the intrusion attempt were made against you. Moreover, the overall security rating of each system
connected to your Personal Area Network is equal to the IDS rating of your Tendril Access Processor.
More often than not, the team’s hacker takes control of the extended network and acts in an Overwatch capacity,
monitoring the team network and dealing with any threats to network security. The character on Overwatch can monitor
a number of TAPs connected to his Personal Area Network equal to half his Hacking skill. If the character acting as
Overwatch does not have Hacking, he can monitor a number of Tendril Access Processors equal to half his Smarts die. All
characters on the VPN must stay within Range of the person acting as Overwatch or lose their connection to the network.
Example: XenoByte is acting as Overwatch for his team as they prepare to raid a Triad safe house. There are five members
logged into XenoByte’s Personal Area Network. His Hacking skill is d8, so he can monitor four people (4[Half his hacking skill]
= 6). Looks like someone is out of the loop.
<side bar>
computer systems higher than tier 5?
Because our system for computer systems scales, applying a -2 penalty per tier, it is easy to continue scaling the computer
systems beyond tier 5, depending on how nightmarish (or all-but impossible to hack) you want the protection to be. The
descriptions provide ideas for what each tier should represent thematically, so if we are talking tier 6, 7, 8, etc. the types of
systems characters encounter shouldn’t be commonly encountered. Characters might have to deal with these systems
perhaps once or twice in an entire campaign, and the secrets or things they protect should have a pretty large impact on
your game.
</side bar>
SPRITES
Sprite act as a personal assistant for your character. Sprites are capable of detecting and repelling unwanted intrusions in a
computer system or network. In computer networks, they often act as overwatch, monitoring entire infrastructures and
dealing with any problems that might arise. They can help characters with Support rolls for things like Hacking skill rolls.
Sprites are treated as Allies, and they may even have personalities. See Allies in Savage Worlds for more information.
• Attributes: Sprites have a rating equivalent to a Rank (Novice, Seasoned, etc.). The rating determines the sprite’s
base Attribute die type, and the maximum tier of the computer system in which it can be installed.
• Skills: Sprites gain a number of skills equal to half their linked attribute. So, a sprite with a d6 Smarts would get
three Smarts-based skills, a d8 Smarts would grant four, d10 five, etc.
• Resilience: Sprites have a Resilience rating which they use to resist malware attacks. The higher the sprite’s
Resilience, the better they understand how to defeat malicious code. A sprite’s Resilience is 2 plus half its Smarts
die.
• Cost: Sprites are an optional component for a computer system, and therefore must be purchased.
Note: There are only two Spirit-Based skills that make sense for an AI; Intimidation and Persuasion. It should be noted
that sprites gain a D8 Spirit at Legendary rank, which would normally give them two extra d8 Sprit-based skills for a total
of four skills. We make up for the difference by giving the sprite a Wild Die.
Sprite Table
Rating Attributes Skills Resilience Cost
1 Smarts d4 Hacking d4, Notice 4 $5,000
d4
2 Smarts d6 Hacking d6, Notice 5 $10,000
d6, Research d6
3 Smarts d8 Hacking d8, Notice 6 $20,000
d8, Research d8,
Taunt d8
4 Smarts d10, Spirit d6 Hacking d10, 7 $40,000
Language d10,
Notice d10,
Research d10, Taunt
d10, Intimidation
d6, Persuasiond6,
Wild Die
5 Smarts d12, Spirit d10 Academics d12, 8 $80,000
Hacking d12,
Language d12,
Notice d12,
Research d12, Taunt
d12, Intimidation
d8, Persuasion d8,
Wild Die
SPRITE ACTIONS
Sprites are capable of performing any Actions a character can perform. They can also Support characters in Networking
rolls and Dramatic Tasks.
PROGRAMS
The following section provides rules for players who wish to make hacking more interesting and sometimes even
dangerous. To achieve this, we introduce programs.
ACQUIRING PROGRAMS
To acquire a program, characters must take the New Program Edge. This Edge requires the character to have the Hacker
Professional Edge and meet any other requirements indicated by the program they wish to learn. See Edges on page @@
for more information.
ACTIVATING PROGRAMS
Programs take an Action and generally require a successful Hacking roll to activate. Some programs might require another
skill to use, such as Notice, Research, or Repair. Activating more than one program at a time incurs a multi action penalty.
Continuous operation: Programs are software, and they run until they are turned off or deleted.
Corruption damage: Corruption damage is a new type of damage. Corruption attacks the core programming of a device,
degrading the code structure until the operating system crashes. Corruption can damage a Sprite by overcoming its
Resilience, or directly harm a Tendril Access Processor and its IDS rating by overcoming the TAP’s Resilience rating. See
Resilience on page @@ for more information. Corruption damage can also affect any devices with a processing unit
installed. If the processor is destroyed, the device will not work until the CPU is replaced with a Repair roll.
Physical damage: Some programs can physically harm a person via their Tendril Access Processor by generating
dangerous levels of heat. Worn armor doesn’t apply to this type of damage in terms of calculating Toughness. Tendril
Access Processors can be fitted with heat sinks. Heat sinks act as armor and increase the user’s Toughness rating.
Mental effects: Some types of malware affect a user’s senses by manipulating the information which passes to and from
the core processing unit and the brain-machine interface.
PROGRAM DESCRIPTIONS
All programs have the following entries.
• Program Name: The name of the program is listed in this entry.
• Requirements: Each program has special prerequisites which must be met in order to obtain the program.
These are listed here.
• AMS: The TAP can store an infinite number of programs, data files and other media. But if a character wants to
use programs, the character must load them into slots known as Active Memory Sectors. Any programs in
loaded into AMS can be used as an Action (See Activating programs for more information.). The AMS rating
determines the number of Active Memory Sectors the program occupies. Characters can remove or switch or
add a program to an AMS slot as an Action.
• Skill: While Hacking is the default skill to launch a program, some may require other skills to use. The
appropriate skill is listed here.
• Rating: All programs are rated between one and five. This rating sets a penalty to any Hacking skill rolls to
remove it from a computer system or network.
• Type: Programs come in two basic types; applications and malware. Applications are programs that aid the
hacker in some way, shape or form. Malware are offensive programs which also act as intrusion
countermeasures.
• Description: The description of the program’s effects is listed here.
PROGRAM LIST
The following programs are available in 2095.
Name: Autodoc
Requirements: Novice, Hacker, d6 Hacking (Programming)
AMS: 1
Skill: Repair
Type: Application
Rating: 1 (-1 penalty to Hacking rolls to delete the program)
Description: Autodoc is designed to counteract the damaging effects of malware on a Tendril Access Processor. Autodoc
does not remove physical damage to a character as a result of malware, but it can repair corruption damage to the CPU.
The program works similar to the Healing power, but the character rolls her Repair skill to fix corruption damage.
Name: Autoscanner
Requirements: Novice, Hacker, d6 Hacking (Programming)
Skill: Research
AMS: 1
Skill: Research
Type: Application
Rating: 1
Description: Autoscan speeds up the datamining process, reducing the time it takes to find information by 1 round.
Name: BlackRAT
Requirements: Seasoned, Hacker, d8 Hacking
AMS: 2
Skill: Hacking
Type: Malware
Rating: 2 (-2 penalty to Hacking rolls to delete the program)
Description: BlackRATs are Remote Access Trojans designed to give hackers direct access to computer systems via
backdoors they create when launched on the target system. Penalties to Hacking skill rolls to create a backdoor are
reduced by 1.
Name: Blaster
AMS: 2
Skill: Hacking
Requirements: Novice, Hacker, d6 Hacking (Programming)
Type: Malware
Rating: 1 (-1 penalty to Hacking rolls to remove it from an infected system)
Description: Blaster overclocks the CPU, generating dangerous levels of heat in the target’s brain. The target takes 1d4+1
damage (Bumps and Bruises) every round until the malware is deleted.
Name: Corruptokhan
Requirements: Novice, Hacker, d6 Hacking (Programming)
AMS: 2
Skill: Hacking
Type: Malware
Rating: 1/-1
Description: Corruptokhan is a program designed to fry the circuitry of the Tendril Access Processor. It does 1d6+1
points of Corruption damage toa computer system’s CPU every round until it is deleted.
Name: DeletePro
Requirements: Novice, Hacker, d6 Hacking (Programming)
AMS: 1
Skill: Hacking
Type: Application
Rating: 1 (-1 penalty to Hacking rolls to delete the program)
Description: DeletePro is a virus scanning tool which identifies malware and attempts to delete it from the system.
Reduce the rating of the program you wish to delete from your computer system by 1 when making Hacking skill checks
to delete the program.
Name: Hyper Editor
Requirements: Seasoned, Hacker Professional Edge, d8Hacking
AMS: 2
Skill: Hacking (Programming)
Type: Application
Rating: 2/-2
Description: Hyper Editor is an application that allows a user to quickly modify any Hyper Objects they have access to.
The program allows a character to edit a Hyper Object as a Free Action rather than an Action.
Name: ICEpick
Requirements: Seasoned, Hacker Professional Edge, d8Hacking
AMS: 2
Skill: Hacking
Type: Malware
Rating: 2 (-2 penalty to Hacking rolls to remove it from an infected system)
Description: ICEpick grants a +1 bonus to Hacking skill checks to gain access to a computer system or network.
Name: Mindfrag
Requirements: Veteran, Hacker, d8 Hacking (Programming)
AMS: 2
Skill: Hacking
Type: Malware
Rating: 3 (-3 penalty to Hacking rolls to remove it from an infected system)
Description: Mindfrag is a variant on the blaster program. It does 2d4+2 damage (Bumps and Bruises) to the target’s
brain every round until the malware is deleted.
Name: Pestilence
Requirements: Veteran, Hacker, d8 Hacking (Programming)
AMS: 2
Skill: Hacking
Type: Malware
Rating: 3 (-3 penalty to Hacking rolls to remove it from an infected system)
Description: Pestilence attacks the computer system’s CPU, doing 1d6+1 Corruption damage every round until it is
deleted.
As malware, the program allows the character to make sudden changes to the world around the target. When the
program is launched, the target must make a Spirit roll or become Shaken. If the program remains on the target’s Tendril
Access Processor the following round, the target must make another Spirit roll or become Distracted. The condition lasts
until the program is removed from the TAP.
Name: Traceroute
Requirements: Novice, Hacker, d8 Hacking (Programming)
AMS: 1
Skill: Research
Type: Application
Rating: 2/-2
Description: Traceroute is an application designed to speed up trace attempts. The program reduces the number of Task
Tokens needed by 1 for tier 1 and 2 Intrusion Defense Systems.
Name: TraceroutePro
Requirements: Legendary, Hacker, d12 Hacking (Programming)
AMS: 1
Skill: Research
Type: Application
Rating: 5/-5
Description: The ultimate version of the Traceroute series, this version negates any Task Tokens needed to trace tier 1
and 2 IDS, further reduces Task Tokens for tier 3 and 4 IDS by 1, and drops the number of Task Tokens needed to trace
tier 5 IDS by 1.
Programs
Name Requirements AMS Skill Type Rating Description
Autodoc Novice, 1 Repair Application 1/-1 Fixes Corruption
Hacker, d6 damage to a computer
Hacking system
(Programming)
Autoscanner Novice, 1 Research Application 1/-1 Reduces time to
Hacker, d6 datamine by a single
Hacking round.
(Programming)
BlackRAT Seasoned, 2 Hacking Malware 2/-2 Ignores 1 point of
Hacker, d8 penalties to create a
Hacking backdoor
(Programming)
Blaster Novice, 2 Hacking Malware 1/-1 1d4+1 damage (Bumps
Hacker, d6 and Bruises)
Hacking
(Programming)
Corruptokhan Novice, 2 Hacking Malware 1/-1 1d6+1 Corruption
Hacker, d6 damage to CPU
Hacking
(Programming)
DeletePro Novice, 1 Hacking Application 1/-1 Reduces the rating of
Hacker, d6 malware by 1
Hacking
(Programming)
Hyper Editor Seasoned, 2 Hacking Application 2/-2 Edit Hyper Objects as a
Hacker (Programming Free Action
Professional
Edge,
d8Hacking
ICEpick Seasoned, 2 Hacking Malware 2/-2 +1 bonus to Hacking
Hacker skill checks to gain
Professional access to a computer
Edge, system or network
d8Hacking
Mask Maker Veteran, 1 Performance Application 3/-3 -2 Penalty to Notice rolls
Hacker, d10 (Disguise) to see through the
Hacking disguise. Unplugged
(Programming) characters are immune.
Mindfrag Veteran, 2 Hacking Malware 3/-3 2d4+2 damage (Bumps
Hacker, d8 and Bruises)
Hacking
(Programming)
Partition Seasoned, 1 Hacking Application 2/-2 Secondary roll to hack
Viper Hacker, d12 (Programming) through firewall. Failure
Hacking triggers a force boot
(Programming) action.
Pestilence Veteran, 2 Hacking Malware 3/-3 2d6+1 Corruption
Hacker, d8 damage to CPU
Hacking
(Programming)
Reality Editor Heroic, Hacker, 2 Hacking Both: See 4/-4 Improved Common
d12 Hacking (Programming) Description Knowledge die, +1 to
(Programming) Notice, can cause
Shaken or Distracted in
targets
Surge Seasoned, 2 Hacking Malware 2/-2 1d6+1 Corruption
Infection Hacker, d8 damage to CPU, Hacking
Hacking VS Smarts Test or
(Programming) become Vulnerable.
One use program (See
Description)
Traceroute Novice, 1 Research Application 1/-1 Reduces Task Tokens by
Hacker, d8 1 for trace attempts
Hacking against tier 1 and 2 IDS.
(Programming)