Академический Документы
Профессиональный Документы
Культура Документы
Serbitar
January 8, 2007
2
Contents
0.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1 Basic Rules 7
1.1 Matrix 101 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2 Basic Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.3 Rules concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.4 Advanced concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.4.1 Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.4.2 Personae/Agents/IC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.4.3 Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.5 Getting Online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.5.1 Cold VR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.5.2 Hot VR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.5.3 AR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.6 Basic Interactions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.6.1 Matrix Perception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.6.2 Jacking out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.6.3 Sending Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.6.4 Spoofing AIDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.6.5 Resisting damage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.6.6 Running Stealth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.7 Interaction with nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.7.1 Log on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.7.2 Probing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.7.3 Searching for Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.7.4 Editing Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.7.5 Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.7.6 Executing Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.7.7 Intercepting traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.7.8 Editing traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.7.9 Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.8 Interaction with personae . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.8.1 Spoofing commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.8.2 Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.8.3 Repair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.8.4 Tracking personae . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.8.5 Redirect Data Trail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.9 Interaction with data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.9.1 Defuse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3
CONTENTS CONTENTS
1.9.2 Encrypt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.9.3 Decrypt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.10 Interactions with WiFi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.10.1 Scanning for nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.10.2 Intercepting traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.11 Node actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.11.1 Scripted Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.11.2 Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.11.3 Terminate Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.11.4 Active Alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.12 Security Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.12.1 IC and Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.12.2 Subscription, hacking in and obtaining AIDs . . . . . . . . . . . . . . . . . . . . . 15
1.12.3 Alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.12.4 Secret connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.12.5 Hardwired Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.12.6 Hardwired Subscription Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.13 Additional Cyberware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.13.1 Encephalon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.13.2 Heuristic Neural Connector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.13.3 Autosoft Interpreter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
4
CONTENTS CONTENTS
3 Augmented Reality 33
3.1 Why AR? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
3.2 Using AR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
3.2.1 AR representations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
3.2.2 AR interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.3 AR samples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
4 Rigging 37
4.1 Attributes and tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
4.1.1 Sensor assisted gunnery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
4.2 Vehicle nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
4.3 Autosofts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
4.4 Drone Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
5 Technomancers 39
5.1 Creating a Technomancer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
5.2 Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
5.2.1 The living Persona . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
5.2.2 Threading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
5.2.3 Sprites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
5.3 Day to day life . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
5.4 Technomancer technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
5
0.1. INTRODUCTION CONTENTS
0.1 Introduction
The matrix is an integral part of SR4. Society has
changed so much that it can not even be described
by the social revolution the internet and cell phone
has introduced to our modern society 2006. 2070
everybody is able to shape the world around him to
his liking. Agents plan most of the social life, make
it a richer and better experience and save you a lot
of time. The 2070 society would not work without
VR, AR and the matrix just like the 2006 society
would not work without electricity.
This makes hackers and Technomancers ex-
tremely important. No SR4 team can live without
a hacker and in a world, where every bit of informa-
tion is available somewhere in the matrix, hackers
seem almost almighty.
Unfortunately the SR4 ruleset for this important
field is quite vague. Lots of things are open to in-
terpretation and some aspects of VR and AR are
still unclear.
Contrary to the SGM v0.9 this is a complete
overhaul of the matrix rules. I try to stick as much
as possible to given SR4 rules, but skip them every-
time there is a considerable advantage in doing so.
The benchmarks on whom the advantage is judged
are:
• fast
• balanced
• and fun
6
Chapter 1
Basic Rules
1.1 Matrix 101 Network” which means that every node, that is
not hidden, is used as a router. If, for exam-
First, some things about the matrix and how the ple, John wants to call his friend two kilometers
matrix works have to be said. As soon as anything away, but both comlinks only have a signal range
logs into the matrix, it is provided with an Ac- of one kilometer they will automatically use the
cess ID (AID). This ID (similar to the IP numbers several comlinks in between as routers to pipe the
today) is used to distinguish matrix entities from data through. However, this case is very unlikely
another and lets the traffic routers of the matrix 2070, as most of every city is littered with wire-
know where to deliver which data packages. Ev- less access points to the matrix, that work just like
erytime a matrix entity interacts with something it the cell phone networks today. This also works
is sending its AID, which can be logged. This is for drones and every other type of data connec-
why hackers spoof their AID afters some time, so tion. If something is in signal range of some-
that nobody can figure out that the guy who just thing that is connected to the matrix, you can ac-
bought the concert tickets is also the guy who just cess/command/manipulate it. One exception are
downloaded a file from shadowland. hidden comlinks and most devices (guns, cred-
The AID is given by one of the various Matrix sticks, your jacket) which have wireless capability
Service Providers (MSPs). Most of the time, an but are not used as routers.
AID is related to a phone number, so an incoming Of course, a large fraction of the matrix is still
call is automatically routed to the entity with the wired. The large data highways between cities and
AID connected to the phone number. This con- even inner city are still glass-fiber cables that con-
nection is done via the database of the MSP, where nect the various wireless networks. However, due
the phone number and the Access ID are registered. to the mesh like nature of the wireless network, the
The AID can also be used to track and triangulate matrix would not break down if major wired con-
a matrix entity, for example a comlink. To change nections were taken out.
ones AID, one has to change his MSP contract.
Hackers (and most Runners) usually have several
MSP accounts at hand, so they can log on to the 1.2 Basic Concepts
matrix with different AIDs.
As a rule of thumb: To interact with some matrix These rules are based on three fundamental con-
entity you have to know its AID. A matrix percep- cepts:
tion test automatically reveals the AID of a node
one is in or the persona one is facing. As mentioned I. Everything that is not allowed is disal-
before, phone numbers are automatically routed to lowed This is needed to prevent the 1001 tricks
the proper AID via the database of the MSP. Active out there you can do with computers. All these
and passive comlinks broadcast their AID, hidden tricks should already be covered in some rating.
nodes do not. For example, you can not get better security by
The wired part of the matrix is a so called ”Mesh saying: My node is sounding an alarm every time
7
1.3. RULES CONCEPTS CHAPTER 1. BASIC RULES
a persona enters it that does not look like X. Such should be appropriate.
things are already included in the firewall rating
and in the stealth program. This prevents people
C. To determine the outcome of a legal ac-
from having to learn real life computer mechanics
tion, the player rolls Logic + Computer (sometimes
to get an edge and keeps things fair and simple.
Data Search or even Electronic Warfare) test, or
extended test. The number of hits determine the
II. There are only three kinds of con-
quality of the test per SR4 standard rules. The
structs in the Matrix Nodes, personae (includ-
hits are restricted by the appropriate program rat-
ing agents,sprites, and AI), and data. Everything
ing. Any hits above the program rating are halved
else falls into one of these categories. Members of
(round normally, that is up).
one category only differ by their ratings and pro-
grams (for example devices, comlinks, full blown
matrix hosts and such are all nodes but differ in D. To determine the outcome of an illegal ac-
their response rating). tion, roll Logic + Hacking vs System + Firewall
test or extended test. The outcome is determined
III. Every decision is a dice roll The idea is, by standard SR4 rules. The hits are restricted by
that dice should only then be rolled when a decision the appropriate program rating. Any hits above the
has been made so something has changed. I do not program rating are halved (round normally, that is
want to have roll several times when there is no up)
decision between the rolls. If this is the case, all The node is collecting all its net hits in hacking
these rolls can easily be transformed into one roll. tests in your security tally. Once it exceeds the
This can not be done in the “real world” rules of hackers stealth program rating, the hacker is found
SR4, as you have to obey physical processes. But to perform illegal actions and the node will take
in the matrix, the rules define the reality, and you actions (as defined by the owner of the node)
can set them however you want. One good example
is hacking into a subscribed node. One would have
E. Personae and Agents can only act against
to find the ID of another node that is transferring
other Personae/Agents that they found via matrix
traffic to that node, spoof the ID and then hack
perception or that have taken any action against
in. That’s several rolls, that have no decision in
them (which automatically reveals a stealthed Per-
between and will always have to be carried out that
sona/Agent to the affected Persona/Agent).
way. Instead I am using only the normal hack in
roll, with a threshold modifier.
F. Actions directed against another construct
are determined by rolling an opposed test using the
1.3 Rules concepts relevant skill for the action + the relevant program
for the action vs the relevant skill of the defensive
A. Everybody in a node is using an account
action (if any) + the relative program for the de-
with certain rights (even a hacker is using a per-
fensive action (if any).
fectly valid account, which he got through hacking
in, though he does not know the password of this
account and can not transfer it to others). The ad- G. Extended matrix tests are capped at
min account has unlimited rights. A matrix action skill+1 rolls.
that is allowed by account rights is a legal action,
one that is not allowed is an illegal action. What is Note that some actions are so easy, that the test
allowed or for standard or security accounts is dif- can be skipped (like loading or unloading programs,
ferent from node to node as the administrator can uploading agents and so on) if they are done legally.
define what is the case. But even if an action was so easy, the test was
skipped using an account that covers the action,
B. To perform a certain matrix action a pro- it still needs a test when performing the action il-
gram is needed. There is always a program that legally.
8
CHAPTER 1. BASIC RULES 1.4. ADVANCED CONCEPTS
Response only determines how many pro- Nodes This are the standard nodes in drones,
grams can run. A node can run Response programs cars, commlinks and other things that normally run
without losing Response. programs and other stuff.
Every multiple of Response +1 programs, the
Persona loses 1 IP. A Persona with Response 5 run- Clusters This are lots of nodes stacked to-
ning 15 programs would have a penalty of 2 IPs. If gether to provide workspace for a lot of people.
the IPs dropped to 0, the Persona could only act They do not suffer from response degradation as
every X combat turns, where X is the degradation they are supposed to have much more processing
below 1 plus 1. A hot VR hacker using a Response power, but have an effective Response attribute in-
1 commlink, running 4 programs could only act ev- stead. They also have no restrictions concerning
ery 2nd combat turn. the maximum number of subscriptions. A cluster
Every persona (for example multiple agents) run- is defined to behave just like a normal node, which
ning on a node keeps track of his own response re- means you do not notice the transition between the
duction. Only if the number of agents on a node nods and have to log in only once.
exceed the Response rating, the overall Response Clusters cost about 10 times the money in system
of the node is reduced. programs and hardware and are not easily portable.
Full blown matrix hosts only have an ”effective
response”. They do not suffer from response degra- 1.4.2 Personae/Agents/IC
dation, as their real response is much higher than
6. Personae are the acting agents of the matrix, its in-
telligence. This includes personae representing real
System only determines the maximum rating persons as well as agents and security agents often
of the programs to run and node consistency checks referred to as IC. Furthermore the living persona of
concerning hack attacks. A node can not run pro- a Technomancer and even AI. A Persona uses the
grams higher than its System rating (excluding attributes of the node that is executing the per-
Firewall). sona. Agents have a logic attribute equal to their
rating concerning matrix tests and a matrix skill
rating equal to the program they use.
Firewall only determines the power of the Everytime a persona is rolling for any action, its
checking routines concerning hacking attacks. hits are capped by the used program. Every hits
above this rating are halved (round normally, that’s
Signal only determines the radio capacities. up).
Nodes can run programs, but they can not oper- A persona has damage boxes equal to 8 + sys-
ate them. A Persona is needed for that. In Unwired tem/2. If a persona crashes, the node running the
9
1.6. BASIC INTERACTIONS CHAPTER 1. BASIC RULES
10
CHAPTER 1. BASIC RULES 1.7. INTERACTION WITH NODES
1.6.3 Sending Data A persona running stealth can oppose any ma-
trix perception test with its own stealth test (which
Program: Edit (Computer)
does not take an action). Only if the observer
Simple Action
achieves any net hits the stealthed persona is de-
Sending data out of the node to another node. tected. For ease of gameplay the GM should roll
Note that a hacker does not have to send from the the stealth tests for players.
node he is in, but can instead send from the node If a stealthed persona interacts with something in
that is operating his persona. A data package al- any way (attacking, sending transmission ...), the
ways carries the access ID of the sending node. target instantly becomes aware of the hacker with-
Communications between two hackers in the out having to perform any test.
same node can be done via the node they are in.
In this case the “real” access IDs are not revealed 1.7 Interaction with nodes
to the participants, but it can be overheard by oth-
ers in the connecting or anonymizig node with an Interactions with nodes are governed by the users
intercept traffic test. Or it can be done via direct access rights in the node. The node resists all illegal
connection, where the “real” access ID is revealed, tests with System+Firewall.
and it can not be overheard without hacking into An asterisk denotes that you do not need a pro-
one of the nodes running the hackers personae, and gram to perform the action legally.
intercepting the traffic there.
1.7.1 Log on
1.6.4 Spoofing AIDs
Program: Exploit* (Computer)
Program: Spoof (Hacking) Complex Action (1 pass)
Complex Action
Everytime you are entering a node or cluster of
Spoofing your AID gives people who are interact- nodes, you have to log on first. This is the point
ing with you only via the node they are in (like in a where log-in and password have to be provided.
matrix bar, or two persona randomly meeting in a Lots of public nodes like matrix bars have anony-
node) a wrong access ID. This does not work with mous public accounts.
people you are directly interacting with, as you au- The Threshold for an illegal log on is the nodes
tomatically send them your access ID. People who firewall. The interval is 1 pass. Note that in the
do not have your AID can not intercept your en- case of a fast hack in, the security tally of the hacker
crypted traffic can not hack into your node and can rises by one for every roll even if no net hit was
not track you, once you have left the node they are achieved. If you want to go for security access in-
in. stead of normal user access, the node may add 2
To change your “real” AID you will have to dice to his System + Firewall tests, in the case of
switch to another MSP account. admin access even 4.
The hits achieved by the spoofing test are the If a user has a valid account, but his access ID is
threshold for a persona to notice your real AID via not on the subscription list, he would still have to
a matrix perception test. hack in like an illegal user. Though, once inside the
node he might just claim security or admin rights
if the has the necessary pass codes.
1.6.5 Resisting damage
Matrix damage is resisted with System + Armor. 1.7.2 Probing
Black Hammer attacks are resisted with Willpower
Program: Exploit (Hacking)
+ Biofeedback Filter Complex Action (1 hour)
This is the slow way of hacking into a node, send-
1.6.6 Running Stealth
ing packages and probing long hours for weakness
Program: Stealth (Hacking) in the node security.
11
1.7. INTERACTION WITH NODES CHAPTER 1. BASIC RULES
12
CHAPTER 1. BASIC RULES 1.8. INTERACTION WITH PERSONAE
1.7.8 Editing traffic a persona to spoof a command, but you need its
access ID and the access ID you want to spoof.
Program: Edit (Computer)
Spoofing a command is resisted with Sys-
Complex Action (variable)
tem+Firewall.
Due to the protocol nature of information trans- One net hit is normally enough to successfully
formation, one is only able to edit the content spoof a command. Spoofing command tests are
of intercepted traffic in a strict sense. Via this never extended tests.
method, one can only change real content data,
like visual, audio or text information. One is not 1.8.2 Attack
able to change commands (like the command to
a drone to attack something) or system commands Program: Attack, Black Hammer, Blackout, Lag
(like the system command to change the subscriber (Cybercombat)
list). However, one can delete both of them in the Complex Action
edited traffic. To change commands or system vari-
ables one has to hack into the node. You have to be in a node with a persona to en-
If it is not obvious that the traffic exists (like gage it in matrix combat as you are using its con-
a video feed in a camera node or a VR feed from nection to the node to send malicious data. There
a drone node) one has to find the traffic first by are 4 types of attack programs: Attack, which
intercepting it. causes normal matrix damage and crash the per-
Thresholds and times vary with the kind and sona/node. Black Hammer and Blackout, which
amount of data involved. can only be used on hackers and deal Stun damage
(that can overflow into physical in the case of Black
Hammer). Lag, which can only be used against
1.7.9 Attack
agents and does not crash them but leaves them in
Program: Attack (Hacking) a continuous loop where the agent still uses system
Complex Action (1 pass) resources.
An attack is resisted with System + Firewall. Or
You can attack the node itself (to crash it) or a System+Firewall+Hacking (the governing hacking
program running on the node. The program or the skill for agents is given by the Attack program)
node crashes if the attack is successfull. in full defense. Similar to matrix perception tests,
The threshold is system rating. The interval is 1 only one persona can attack a certain persona at a
pass. time without penalty. Every further attempt from
another persona at the same pass introduces a cu-
mulative modifier of -2.
1.8 Interaction with personae The damage is equal to the attack program plus
any net hits of the attacker.
For every interaction with a persona, you have to
Attacking something is never an extended test.
first detect it using a matrix perception test (or do
it automatically when the persona is not stealthed
and there are not a lot of them). Interactions with 1.8.3 Repair
personae are often opposed tests.
Program: Medic (Computer)
Complex Action
1.8.1 Spoofing commands
Program: Spoof (Hacking) Only personae running in the node where the re-
Complex Action pair program is running can be repaired by the re-
pair program and only while the persona is not per-
Spoof comands to issue commands to personae forming any actions including matrix perceptions.
(mostly agents) without having them subscribed to Any hits reduce the damage done to the persona.
your node. You do not have to be in a node with Repairing something is never an extended test.
13
1.10. INTERACTIONS WITH WIFI CHAPTER 1. BASIC RULES
1.8.4 Tracking personae fails, the bomb explodes, dealing 2x rating matrix
damage and can trigger alerts (if in home node) or
Program: Track (Computer)
delete the file.
Complex Action (1 turn)
14
CHAPTER 1. BASIC RULES 1.12. SECURITY CONCEPTS
1.12.3 Alert
1.11.3 Terminate Connection
The node can go into active alert and make life for
Normally a connection can only be terminated a hacker more difficult. But this uses resources and
when a transaction is finished. Hackers can use should not be done too often.
this security measure to fight against the node ter-
minating their connection. To do so, the hacker
1.12.4 Secret connections
has to engage in a redirect action every turn. If
he scores less hits than the node in its terminate A node can run a stealth program to conceal a con-
connection test, the connection is terminated. nection to another node from any personae in the
15
1.13. ADDITIONAL CYBERWARE CHAPTER 1. BASIC RULES
node. The connection is only then identified, when like a normal DNI but is also able to extract mean-
a hacker beats the rating of the stealth program in ing and subconscious context of thoughts, greatly
a matrix perception test. shortening the execution time of mental commands.
The HNC provides an additional IP when using VR
1.12.5 Hardwired Accounts up to a total of 4.
16
Chapter 2
17
2.3. SAMPLE SYSTEMS CHAPTER 2. BALANCING AND BASELINE
18
CHAPTER 2. BALANCING AND BASELINE 2.3. SAMPLE SYSTEMS
19
2.3. SAMPLE SYSTEMS CHAPTER 2. BALANCING AND BASELINE
Firewall: 4
System: 4
Signal: 4
Response: 4
Loaded programs:
• Encrypt 4
IC: Patrol
N2
• Pilot 3
• Analyze 3
• Track 3
N3
Not loaded programs
IC: Defender
• Pilot 4
• Analyze 4
• Attack 4
• Armor 4
N1
Nodecluster 3 functions as the security center.
Cameras, door locks and other security related stuff
is run here. Note that most of the time security de- Figure 2.3: Network architecture for the secure cor-
vices are subscribed to the security host and the porate facility.
connection is always encrypted. Note also that
most devices can only run an encryption of 3 and • Medic 4
that the lowest encryption rating is used when two
devices communicate. IC: Patrol 2
As mentioned earlier, the matrix hosts given here • Pilot 4
• Analyze 4
are full blown matrix hosts. They represent the
• Track 4
processing power of some 10-100 comlinks and can • Medic 4
run a lot of programs and stuff. Thus only the ”ef-
fective” rating are given here. Also only programs Not loaded programs
and IC used for hacking purposes are given here. IC: Killer
In reality a lot of other agents and programs might • Pilot 5
be running on the node. • Analyze 5
• Attack 5
• Armor 5
2.3.3 Secure corporate facility net- • Track 5
work
Nodecluster 1 Nodecluster 1 is a security gateway. It has two
Firewall: 5 patrolling IC that constantly scan the area. If
System: 5 something is discovered, the killer IC is launched.
Signal: - The gateway to the closed WiFi-network is pro-
Response: 5 tected by a stealth program. The hacker has to suc-
ceed in a Computer+Analyze vs. Firewall+Stealth
Loaded programs: test (normally the GM should roll automatically
• Stealth 4 for this. Only allow a second roll with the -2 mod-
IC: Patrol 1 ifier for trying again if the hacker is intentionally
• Pilot 4 looking for another way out of the node).
• Analyze 4
• Track 4 Nodecluster 2
20
CHAPTER 2. BALANCING AND BASELINE
2.4. WHAT MATRIX PERCEPTION CAN TELL YOU
21
2.6. SAMPLE ACTION THRESHOLDS CHAPTER 2. BALANCING AND BASELINE
2.5 What results can you ex- 2.6 Sample Action Thresholds
pect from matrix searches
How difficult is it to loop a videofeed? Is it easy to
There are large amounts of data in the matrix. And search a whole database for one file? When do I use
to give thresholds for the data you could find in hacking, computer and data search? This section
certain node is impossible. But there are certain will answer these questions. Note that all of the
kind of things a hacker will allways want to find. given thresholds and modifiers are just suggestions.
These are just some examples what a search for a The GM should feel free to modify them according
person might show up: to the situation.
22
CHAPTER 2. BALANCING AND BASELINE 2.6. SAMPLE ACTION THRESHOLDS
Description: To erase all the traces of the hacking Illegal: Logic + Hacking [Browse] (1 turn/1
activities one has left in the node, the log files minute)
must be edited. Every hit deletes ”edit pro- Thresholds:
gram rating” hits worth of traces left behind. simple search terms (word, picture): 4
If traces are left behind, a security hacker can medium search terms (voice, face, phrase): 8
find out that the system was hacked and what complex search terms (topic, object group): 12
AID was used in the process. very complex search terms (complex topic): 16
23
2.8. SAMPLE HACKING RUNS CHAPTER 2. BALANCING AND BASELINE
24
CHAPTER 2. BALANCING AND BASELINE 2.8. SAMPLE HACKING RUNS
Steps (in the case of back doors) of the used Stealth pro-
(H) Hacking In gram to find stealthed backdoors. IC would resist
(N) Noticing the Hack with Pilot (representing Logic) and Stealth (repre-
(H) Matrix Perception senting the hacking skill for stealth) [Stealth].
(IC1) Matrix Perception For ease of gameplay, the GM is only rolling this
(H) Stealth roll test for stealthed objects. If the hacker wants to
(IC2) Matrix Perception
further examine something he has already detected
(H) Stealth roll
to gain further information he must explicitly say
(H) Unload Exploit
(H) Load Edit so. As the two patrolling IC are not stealthed, the
(H) Browsing for Data hacker sees them without performing any test. The
(H) Browsing for Data GM does not have to roll for stealthed objects,
(N) Noticing the Hack as neither the IC, nor the node, are running any
(IC2) Noticing the Hack stealth programs.
(H) Stealth roll
(H) Downloading the Data (IC1) Matrix Perception Pilot + Analyze
(N) Noticing the Hack
[Analyze]: 4+4 = 3 hits
(IC2) Noticing the Hack
(H) Stealth roll The patrolling IC Patrol-1 is set to constantly
(H) Logging off analyze the node for intruders. As the hacker has
a valid user account for this session, he is no in-
truder, but the IC will have to detect the presence
Explained
of the hacker to note any hacking actions he might
(H) Hacking In Logic + Hacking [Exploit] undertake. As the hacker is running a stealth pro-
(Firewall, 1 Turn): 6+5+2 = 4 hits, 7 hits (reduced gram, the IC must undertake an opposed test to
to 5+2/2 = 6 hits) detect him. For ease of gameplay, this test should
The hacker is trying to hack into the node on be rolled by the GM.
the fly. He is going for a user account. He has to
engage in a Logic + Hacking [Exploit] (Firewall, 1 (H) Stealth roll Logic + Computer [Stealth]:
Turn) test, to do so. 6+5+2+2 = 4 hits
The GM rolls 4 hits for the hacker. The IC does
(N) Noticing the Hack System + Firewall: not detect the presence of the hacker. Unless some-
4+4 = 2 hits, 3 hits thing happens, the IC will not attempt again to de-
The node is trying to notice that somebody is tect the hacker. If the IC tries again, it will have a
hacking in. It rolls System + Firewall, as in every -2 dice penalty for trying again, but normally only
test when a node resists a hacking attempt. Be- one perception test is rolled.
cause this is a ”hack on the fly” attempt, for every
roll 1 is added to the security tally, even if no net
(IC2) Matrix Perception Pilot + Analyze
hits were generated.
[Analyze]: 4+4 = 5 hits (reduced to 4+1/2=5 hits)
In the hackers first try node scores 2 hits, which
The second IC (Patrol-2) is trying to detect the
leaves the hacker with 2 net hits. That’s still 2 to
hacker, too.
go. In the hackers second try, the node scores an-
other 3 hits, leaving the hacker with a sum of 6
hits and beating the threshold. The hackers secu- (H) Stealth roll Logic + Computer [Stealth]:
rity tally is 2 now. 6+5+2+2 = 5 hits
The IC has hit the threshold in this opposed test.
(H) Matrix Perception Logic + Computer It has detected the hacker. As the hacker has a
[Analyze] (Stealth) valid user account for this session, the IC does noth-
The hacker is setting his analyze program to ing else.
constantly analyze his surroundings. He is rolling
Logic + Computer [Analyze] to beat a threshold (H) Unload Exploit Simple Action
25
2.8. SAMPLE HACKING RUNS CHAPTER 2. BALANCING AND BASELINE
The hacker is unloading his Exploit utility. He IC2 is constantly scanning the node for intruders.
can only have 4 programs running without a re- As the hacker is now trying to o something, that
sponse penalty and wants to load an edit tool. is not covered by his access rights, the IC might
notice it. The GM is rolling an opposed Matrix
(H) Load Edit Complex Action Perception test.
The hacker is loading his edit tool.
(H) Stealth roll Logic + Hacking [Stealth]:
6+5+2+2 = 3 hits
(H) Browsing for Data Logic + Data Search The IC does not notice the hacking attempt of
[Browse] (5, 1 pass): 6+5+2 = 3 hits, 8 hits the hacker.
The hacker is using his user account to browse
for the file he seeks. The GM knows that the file
(H) Downloading the Data Logic + Hacking
is not listed in the directories that are accessible
[Edit] (1, 1 pass): 6+5+2 = 4 hits
for normal users. He decides, that it will need an
The hacker is trying to download the data. As
extended test (5, 1 pass) for the hacker to find, that
the file can only be read (and downloaded) with
the file is not listed in the directories. As this is a
security access, he has to perform a hack to do it.
legitimate action, the hacker uses his data search
In his first try, he rolls 4 hits.
skill. After 2 passes the hacker accumulates 8 hits
and is informed that the file is not listed. IC2 is
constantly analyzing the hacker, but as he is doing (N) Noticing the Hack System + Firewall:
nothing wrong, nothing happens. IC1 is not even 4+4 = 2 hits
aware that the hacker is in the node. The node again tries to detect the hack. It rolls
(Note: Some very high security system might 2 hits, which means the hacker achieves 2 net hits
synchronize the detections of their IC, but this trig- and downloads the file.
gers wrong alarms, very often. In such systems, the
hacker can decide to not conceal his presence, but (IC2) Noticing the Hack Pilot + Analyze [An-
only his actions with his stealth program.) alyze]: 4+4 = 4 hits
As the hacker is again trying to o something, that
is not covered by his access rights, the IC might
(H) Browsing for Data Logic + Hacking
notice it. The GM is rolling an opposed Matrix
[Browse] (1, 1 pass): 6+5+2 = 3 hits
Perception test.
The hacker has not found the files in the user ac-
cessible indexes. He knows that the file is there, so
(H) Stealth roll Logic + Hacking [Stealth]:
he tries to hack into the full file index. This is an il-
6+5+2+2 = 5 hits
legitimate action, as accessing the full file directory
Phew, that was a close one. The IC does not
would need security access. The GM decides that
notice the hacking attempt of the hacker.
finding a simple file in an index is an (1, 1 pass)
extended test.
(H) Logging off The hacker is logging off. Note
that the node accumulated a security tally of 5 and
(N) Noticing the Hack System + Firewall: 4 hits during the hack. This means, the hacker left
8+8 = 2 hits lots of evidence of his activities in the node.
The node is trying to detect that somebody is
hacking into the file system. As the hacker achieves
1 net hit, he is finding the file in 1 pass. he GM may 2.8.2 Hacking through a relay of
note down the 2 hits, as they may act as an addi- linked nodes
tional threshold added to the security tally for the It was discussed a couple of times: What can be
hacker to clear the system logs of his hack attempt. done against a network where several nodes are
linked, using the subscriber rule, together to pre-
(IC2) Noticing the Hack Pilot + Analyze [An- vent, or delay, hacking. A very good example would
alyze]: 4+4 = 1 hit be this:
26
CHAPTER 2. BALANCING AND BASELINE 2.8. SAMPLE HACKING RUNS
A runners has a main comlink A, he uses for Logic: 4(6) (with Cerebral Booster)
normal communication, and 5 ”relay” comlinks Hacking: 5 (specialization stealth)
B,C,D,E,F. Only comlink F has wireless capabil- Computer: 5
ity. The runner uses his main comlink to commu- Hot-SIM: +2 dice
nicate, comlink B only accepts input from A and
C, comlink C only accepts input from B and D and • Firewall: 5
• Response: 5
so forth:
• Firewall: 5
• Signal: 5
A - B - C - D - E - F - WiFi-World
27
2.8. SAMPLE HACKING RUNS CHAPTER 2. BALANCING AND BASELINE
28
CHAPTER 2. BALANCING AND BASELINE 2.8. SAMPLE HACKING RUNS
29
2.8. SAMPLE HACKING RUNS CHAPTER 2. BALANCING AND BASELINE
30
CHAPTER 2. BALANCING AND BASELINE 2.8. SAMPLE HACKING RUNS
31
2.8. SAMPLE HACKING RUNS CHAPTER 2. BALANCING AND BASELINE
32
Chapter 3
Augmented Reality
3.1 Why AR? not use transducers comlinks, cameras and all the
stuff, the GM should be really strict and dissallow
Why should a runner use his comlink at all? Why any communication (sometimes even give false in-
not shut it down on a run and be unhackable? Be- formation) to make clear what the difference is.
cause most of the time, when you got a good com-
link defense, the advantages are worth much more
than the drawbacks. 3.2 Using AR
• live video (view from each teammate) fee from 3.2.1 AR representations
teammates (needs cameras)
A person with a comlink in active mode is con-
• live audio (voice communication) feed from tinuously broadcasting a lot of information: Sin-
teammates (needs microphones) gles are broadcasting their profile and the profile
• live bio (condition monitor) feed from team- they are looking for, in bars, they are broadcasting
mates (needs biomonitor) their drinking wished before they arrive, in sport
clubs they broadcast dates where they are looking
• live ballistic (targets, ammunition, ...) feed for sport partners and in night clubs they might
from teammates (needs smartgun) broadcast ambient lighting for themeselves. The
question is, how is all this represented in AR?
• live sensor (audio, video, heat, ultrasound, ...) There is essentially two types of information:
feed from drones nearby (needs drones) Data information information that can be displayed
• live sensor (audio, video, ultrasound, radar, ...) in any way the receiving user likes, and sense infor-
feed from nearby sensors (needs nearby sen- mation that is either accepted or not.
sors, hacked or open) For example, a shop could be sending out visual
information like price tags next to every item and
• live GPS overlay (position of friends, enemies, a small audio message explaining the advantages of
assets) the product once somebody steps close to it. Or
a guy in a bar could broadcast some music and a
• ”see through walls” (if video data from other
nice smell in his vicinity. The receiver has only
side available)
two options: Either accept the sense feed and let
• RFID signals overlay the AR equipment interpret the data, or block it.
As almost everybody and everything is trying to
If every teammember is equipped with the above, force their personal AR feed on others, it is very
the GM has a very good excuse to allow the usual important to have a good spam filter on what to
”out game” chatter that occurs during combat, be- allow and what not.
cause the players know everything and try to co- Data information, on the other hand, can be in-
ordinate. Now they officially can do it. If they do terpreted to the end users liking. In a night club,
33
3.3. AR SAMPLES CHAPTER 3. AUGMENTED REALITY
where all the singles are broadcasting their personal Floor plan overlay
profile with tons of data about them, one could pro-
A floor plan is overlaid over the character’s vision.
gram ones comlink to display a three dimensional
He can “see” through walls getting polygon infor-
heart over all those who’s profile is meeting ones
mation about what is beyond and zoom around. If
demands. Or the heart could be bigger or redder
sensors are included, the “threat” area of each sen-
the better the match is. It is also possible to play a
sor is marked in various color tones of red displaying
warning sound everytime somebody is coming close
the field of vision of cameras, heat sensors, position
who might be boring. All this depends on the cre-
of ultrasound emitters and their sound projection
ativity of the comlink user.
path, lasers and other stuff.
Note that a sim module does not only provide full Needs:
VR but can also supply every sense (video, audio, • live visual data from advantageous position
smell,tactile perception...) with AR input. Advantages:
There are two methods to interact with AR con- • + 2 dice for perception tests (only applies
structs: when subject can be perceived via the supplied
sensor)
• AR gloves, touchpads, keyboards, scroll wheels • + 1 die for shadowing tests
and other hardware. • + 1 die for melee combat
34
CHAPTER 3. AUGMENTED REALITY 3.3. AR SAMPLES
Needs:
• a detailed 3D floor plan
• positional data of all enemies (involved in test)
• detailed visual data of all enemies (involved in
test)
Advantages:
• + 3 dice for suprise tests
• + 2 dice for shadowing tests
• + 1 die for infiltration tests
• + 1 die for indirect fire
• + 1 die for direct fire
35
3.3. AR SAMPLES CHAPTER 3. AUGMENTED REALITY
36
Chapter 4
Rigging
37
4.4. DRONE SECURITY CHAPTER 4. RIGGING
• Orientation (Navigate)
• hidden mode
• patrolling IC
38
Chapter 5
Technomancers
5.1 Creating a Technomancer a +2 dice modifier for any matrix perception tests.
39
5.4. TECHNOMANCER TECHNOLOGY CHAPTER 5. TECHNOMANCERS
40