Editing
Savage Shadowrun AE Conversion
(section)
Jump to navigation
Jump to search
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== MATRIX 101 == The Matrix is built upon millions of different broadcasting Nod Systems that create the virtual structures that act as a real structures to the Matrix Personas and users. A Host is the center of multiple Nod Systems that support an individual sites such as a Corporate Matrix site (think websites of old), Chat rooms, Data sharing sites, News broadcast sites, library sites, government agencies and public access sites, etc. But also illegal chat room, Shadow sites, Warzane sharing sites, etc. For simplistic sake I am using a modified version of Cyberspace (for the Matrix) and Jockeys (for Riggers) found in Spawlrunners. The rules are included below for those without the PDF. '''COMMON TERMS'''</br> Before we get into the rules, there are a few terms we use to describe various rules elements or technology. These terms are presented here so you can familiarize yourself with them before reading further. :'''Active Users''': whenever anyone with a comlink that is on and broadcasting a signal, that person is an Active User. They are viewing the Matrix (generally via AR) and can see information (text, advertisements, other AR users, etc.) that is being broadcasted out via a Nodes. A user can operate in '''Hidden Moe''' where their data is keep private and the can only communicate with Nods that grant them permission. Their broadcast signal is still detectable but their information and conversions are private. :'''AR''' (Augment Reality): With an active user comlink a user can view the world around her via AR which is often called an enhanced version of the real world which is achieved via digital visual elements, sounds or other sensory stimuli that is experienced. Often in commerical area with lots of advertising this can be ads tailored to an individuals but can also include basic data of other active users who are broadcasting that data out for all to see. See Emersion levels below. :'''Back-Door''': A back door is slang for a secret Access port that can bypass certain levels of a Network Host security. For example this could allow a decker to gain Access to a Tier IV security area without first bypassing or Accessing the lower Tier security areas and gets the deccker straight to the Network Host. :'''Closed Host''': A Host system that does not have access to the Matrix. This is often done by paranoid and ultra security minded corps or government agencies where they store their most secretive and sensative data. Often the case for where the real pay dirt might be located and why a Decker might follow a team when breaking into a physical site. :'''Computer System''': A computer system is a term to describe anything with a microprocessor and wireless connectivity. A computer system might be a cyberarm, a comlink, a broadcasting Node, any kind of vehicle, drone or a security system; In 2060s the possibilities are endless. Basically, if it has a microprocessor, it can be hacked via the wireless signal it emits. Hacking a computer system also gives you direct access to any devices linked to the system. See Devices for more information. :'''Counter Hacking''': Counter hacking is the process by which a person defends herself against an unwanted intrusion into a computer system or device. This is accomplished by making an opposed Hacking skill check (the person counter hacking gains their Firewall rating as a bonus to this check). You can attempt this roll untrained if you need to. The winner of the opposed roll is either booted from the system or remains logged in, as the case may be. If booted the hacker suffers a -2 to future hacking attempts against this computer system for the rest of the scene. :'''Device''': A device is an object that is linked to a computer system in some way, much like your home printer, microphone or web camera that is connected to your computer or comlink (in to 2060s desktops are rare). Most devices are wirelessly linked to a computer, though some can be hardwired with cables or nano wires (especially with Cyberware for 'security reasons). Common devices are alarm systems of all types, door maglocks, security cameras and systems (like weapons), elevators and even items you can sync up with your comlink. Some devices can only be hacked by gaining access to the computer system to which they are linked, while others can be hacked directly. :'''Dumpshock''' and '''Logging Off''': when a decker is forced off the Matrix (not just booted from a systems) this can cause her to suffer Dumpshock (see Matrix Combat) as it is not very safe. A decker could suffer dumpshock also by unplugging his Persona from the Matrix as an Action but when using Cold or Hot EMersion, this is also dangerous and requires a Spirit check. A failures causes the decker to be Distracted and Vulnerable for 2d6 rounds (see SWADE pg. 100). Critical failure causes the decker to be Stunned for 1d6 rounds (SWADE pg. 106) and a Vigor check or suffer a Wound. To log off safely the decker must spend 1d4+1 Actions with Cold Emersion and 1d6+2 Actions with Hot Emersion. :'''Emersion''': When a decker uses Emersion to projecting their consciousness into the Matrix and experience it through a Persona the Matrix looks like a whole other world. Emersion requires a comlink and either a simsense rig (an electronic device that can transmit your brain signals from your brain into the Matrix and have that information transmitted back out into the Matrix) or a Datajack that allows a Decked to pulled directly into the Matrix network. See Emersion levels below for more details. :'''Hidden User''': Comlinks can be set on Hidden Mod, their info is not broadcast out to the world and in order to access their info etc. requires a. A simple Scan program check will still detect a hidden comlink as it is still broadcasting. :'''Intrusion Countermeasures''' (or IC): Are Matrix constructs designed to detain and possibly kill deckers invading a network host. IC constructs range from benign Probe constructs that simply monitor activity to Trace programs that determine the location of an intruding decker to IC that can warp or physically damage the brain through lethal biofeedback. :'''Network''': As the name implies, a computer network (or simply network) is a collection of computer systems which are linked together wirelessly. The stronger the network, the wider the area it covers. There are many types of networks in the world. Some are restricted to a single building or collection of buildings (like a hospital or your house). These are commonly known as Local Area Networks (LANS) while others—Wide Area Networks— cover entire cities or even geographic regions (like Europe). Some are satellite networks that comprise Global Area Networks (GANS) spanning the entire globe. :'''Networks Hosts''' (or simply Hosts): Are the millions of individual agencies, corporations, small business, government agencies and local community computer systems that exist within this Matrix network. A company's system might include dozens, hundreds or (in the case of megacorps and lare agencies) thouses of interconnected Hosts with their own seperate data-files and security. It is for this reason Decker who want to break into a Host are looking for something in partical (even if its just something to steal). :'''Node''': Is anything that is broadcasting a signal that others can interact with. Nodes can be anything from a host computer system, a device like a comlink, or Network, etc. :'''Persona''': In the Matrix when anyone is using Emersion (Cold or Hot) and whom are wanting to interact within the Matrix uses a Persona. The Persona has Matix attribute traits and skills that only exist in the Matrix but allow the users to interact within it. :'''Programs''': Matrix Programs are the structures and building blocks of the Matrix. They create everything one sees in the Matrix and how one interacts with it. Illegal programs used by Deckers allow them to modify or bypast the layers of security a Network Host might have installed, fight other decker's Personas or IC programs sent to stop these intruders, etc. ===Actions in the Matrix=== [[File:SR,DracoFound.jpg | right ]] Too maybe make this a bit easier I am going to make most non-combat actions in the Matrix as being '''Dramatic Tasks''' (SWADE pg. 122). As I want to make your programs and powers worth in in these situations also I will have some notes as we go. These Dramatic Tast are split up into the following scenses "'''''Hacking a Device'''''" (Using programs and hacking to cause Tricks against foes), "'''''Searching the Matrix'''''" (finding what your looking for on the Matrix), "'''''Accessing Networks'''''" (hacking through multiple layers of security on the Matrix), "'''''Keeping Secrets'''''" (finding hidden data on the Matrix or Network Host site that someone wants to keep a secret) and "'''''The Dark Matrix'''''" (finding and using a 'dark' Matrix site where info can be provided by other deckers). For these types of Dramatic Tasks the GM first sets what the task is, how long the decker/party has to complete it, and how many 'tokens' they need for success. These are generally Single Person Task as a Team of Deckers is rather rare. Finally unlike normal Dramatic Tasks, many of these tests are Contested by Enemy Programs, Security Systems and/or hostile Personas. Combat in the Matrix happens when the Decker trips up security and alerts Intrusion Countermeasures (IC), enemy Persona and Sprits that might face off against them. This is not a Dramatic Action. Instead see '''Matrix Combat''' below. ====Hacking a Device or Drone==== To hack a device such as a comlink or cybernetic implant, the decker needs to make a Challenging Dramatic Task (4 successes tokens before the end of 3 rounds) with a Hacking contested skill check against the Comlink's Security Hacking skill. This is for any Active User in the decker's broadcast range. If the device is a Hidden User and the decker has located them with the Scan program, the Task requires 5 'tokens' before 3 rounds. Success allows the decker to impose either Distraction or Vulnerable (SWADE pg. 100) onto the target for 1d4 rounds. If the decker gained an extra token during the contest, she can impose both the Distracted and Vulnerable on the target for the same amount of time. Failure causes the decker to suffer a Dumpshock as the device 'kicks her off the system'. A Rigger (or Decker/Technomancer) can try and forcibly take control of an enemy drone, a vehicle or Sypder system with an Opposed Hacking skill check (or in the device is on remote service then a basic Hacking success). The attacking hacker must be within his Broadcast radius. The attack suffers a penalty of twice the devices Firewall rating. The hacker must devote his full attention to this action for the duration that he wish to control the enemy’s device. ====Searching the Matrix==== So you want to find some juicy info on the Matrix. But what do you want to find? Searching for the Public Forum of a famous Simsense star or rocker, or the public press briefing of a Corporation or government agencies is fairly easy and does not require a roll or more than a round or two. But searching for even basic or general information on an individual or on finding some obscure public forum can be a difficult task as there is simply so much information out there these days that one has to shift through a mountain of data to get the answers you might seek. Seeking ultra-secure or illegal data is much more complex and dangerous. Basic data search like looking up a SIN registered comlink number, Low end not illegal datafiles, Traffic Cams, etc. is a CHALLENGING task requiring 2-5 tokens but with no time limit. This requires a Matrix Search skill (or ''Research'' skill but with an additional -1 or -2 to the check). The '''''Agents''''' program will add +1 per Rank to this Search test. The Power '''''Empathy''''' adds +2 to the Technomanchers skill roll. Complications are fairly safe and only incrase simply add Time. Base time for this searches double or thriple the base number of rounds. Complications increase this to 5 rounds per Action round. Note that Searching the Matrix is generally just used for general data hosted on the Matrix. Corporate Files and Secrets are going to be hidden behind layers of Security. As such to gain such data one needs to Access a Network Host and search for Hidden Data (see below). ====Accessing Networks==== Anything above Basic Public information searches are '''''Contested Dramatic Tasks'''''. One must bypast or better the Security AI of a device or Network Hosts to access the information. Deckers must make a seperate Dramatic Task against each Teir of Security. The GM determines where the data will be in the Network Host Matrix system. Too search for Hidden or obscure data searches like private communications between low level wageslaves, corporate project plans, etc. Something semi-legal but private that others don't really want you to know about. A Security System is really only there to monitor its Host, watching for code errors and intuders. Its function is to raise alarms when it detects a problem and/or try to boot hostile Personas or programs from its systems. It still draws Initiative cards and acts in the round as it tries to "fix" any problems that it might encounter. Intrusion Countermeasures or IC (see below) is the more proactive attack-dog programs used to protect to system. ====Keeping Secrets==== As wireless information can be stolen with enough skill, effort and technology, a great deal of sensitive information may not be available via the Matrix but instead is hosted in isolated or Closed Network within an on-sight Network. It’s for this reason that a Decker must often accompany a team to the physical location to get access to the really good info. ====The Dark Matrix==== In the 2060's the Matrix has a number of illegal 'dark networks' sites where like-minded deckers and hackers (and a few technomanchers) hang out and exhange information. If one has the right contacts (Matrix Connected Edge or Contact with a Dark Matrix Decker) you might also access the various information available on the 'Dark Sites' (called Shadow Hosts in Shadowrun). Without a connections one might still find one, depending on how secreative and/or illegal the data they deal in is. This requires a Search Matrix skill check a -1 to -4 (or Research skill check but at an additional -2 skill penalty) Dramatic Task of 4 successes before 3 'rounds'. The rounds here last either 5 minutes up to one day depending again on how secrative and illegal the Shadow Host is. Once you have found one the deckers then needs to 'prove their not a narc' to the other users on the Shadow Host. With contacts this is a simple Persuasion check to ask about the info available (like other Contacts). If a decker is not connected in some way then... and 1d6 rounds. Depending on how obscure this search might be the GM might impose a -1 to -4 to the Skill check and/or add additional time (i.e. by multiple the base 1d6 rounds by extra dice or time like minutes or hours). Raise(s) provide additional information depending on what you are searching for and/or can cut down on the time required. Also when a Decker gains Access to a Network Host site on the Matrix it does not mean that she has been granted all the information located there automatically. First off for even Moderate Corps there will be a mountain of files, reports, recordings, briefings, data, etc. within in the lowest Security Rating. A Decker just doing random searches to see what dig or data he might be able to find here should make a Search check (minus the Host's Firewall) spending 1d6 Actions per Tier of the Host. Success means he found interested data files that he might use, sell, steal, etc. Raises can give you additional or richer payday data filed. If the Decker knows what he is looking for, such as Specific data or a particual data file make the same roll as above but it only takes 1d4 rounds per the Host's security tier. With the Sniffer Program this drops to 1 Action per tier. Success finds the files, and raise might get additional related data-files, etc. Now, just because the Decker has been able to break into and gain Access to a private or secret Tier does not grant them all the data that could be found there. They still must use their Browse or Search Matrix skills or Scan and Sniffer Programs to seek out the specific information or systems that they want find. This data could be hidden in the Tier behind a data-lock or hidden host. So this can take time and the longer the decker is in the Tier the greater the chance they could be detected (just cause you have Acess does not mean that system is not on the lookout for such actives). First step is to seek out the data files. This requires a Browse or Search skill check (minus the Tier's Firewall) and 1d6 Actions times the Tier Firewall. I.e. a Orange Tier Host that is not on alert would imposse a -3 penalty to the Decker's Matrix skill or program and would take 3d6 rounds to located it (if the decker knows what he is looking for. Just random data search double the time required). === Device and Network base Security === {| class="wikitable" border="0" |- | '''Tier''' || '''Code''' || '''Example(s)''' || '''Firewall''' || '''Basic AI System Stats''' |- | I || Green || Comlink, Public Forum || 1 || Smarts d4, Hacking d4, Browse d4, Search d4 |- | II || Blue || Private Data || 2 || Smarts d6, Hacking d6, Browse d6, Search d6 |- | III || Orange || Secure Data or Hosts || 3 || Smarts d8, Hacking d8, Browse d8, Search d8 |- | IV || Red || Secret Hosts || 4 || Smarts d10, Hacking d10, Browse d10, Search d10 |- | V || Ultra || Ultra Secret Hosts || 5+ || Smarts d12, Hacking d12, Browse d12, Search d12 |- |} *'''Teir I''' (Green): Basic secure system common for basic devices, computer system, comlink, maglock, securty cameras, cybernetic system, drone or vehicle, and public forums (just so pranksters can't post offensive comments or change the basic data found here) and small stores and even vending machines. These systemss inclues no IC beyond maybe shutting down to prevent damage or thief. Tier I can take a single Action each round, generally to detect problems, raise an alarm or trying to Boot a hostile Persona. *'''Tier II''' (Blue): Some additional security to protect private or personal data and systems to basic security against hackers looking to steal basic info or items that a Host might provide to the public or hack an well secured Rigged vehicles, etc. This Tier might include some low end 'White' IC programs like Tracers and Alarms that can alert great response. In a bigger corporation when a alert is sounded the Host might even increase the Firewall and dispatched more serious security. This can be expensive though and is uncommon except for larger corps or agencies. Tier II systems can ignore one Multi-Action penalty a round. *'''Tier III''' (Orange): Security here will be protecting more secure information and/or personal data like low-level bank accounts, standard wageslave personal data (not upper management or off-the books employees) files or basic research papers on low end gear or programs. White IC is common at this Tier and depending on the size and wealth of the Host can increase the areas Firewall rating faster. Tier III system can ignore one Multi-Action penalty a round and draw two cards, taking the best for Initiative (as the Level Headed edge). *'''Tier IV''' (Red): Security at this level is for secret data and/or research on the Host. Generally this is where confidential corporate communication and basic data about the corps are stored. These site also include Grey IC programs that are more serious attack programs. The data here could be embarashing or worth a lot as data other corps or agencies want like a bleeding edge program that can better sleazy past IC or the latest version of the Predator'a smartgun interface system, etc. Firewalls and alerts are fast as the system responses to intrudes here. Tier IV systems can ignore two Multi-Action penalties a round and draw two cards, taking the best for Initiative (as Level Headed edge). *'''Tier V''' (Ultra): This level of security is only available to the megacorps or important agencies where they keep the most sensitive and important data secrets. This could be plans and sematics for a new missile system or AI program or for the conspiracy minded -- where the UFOs are keep and experimented on. Black IC is often used here and a decker had better be good and have the best bleed edge tech to survive long in such a system. Tier V systems can ignore two Multi-Action penalties a round and draw three cards, taking the best for Initiative (as Imp. Level Headed edge). === Intrusion Countermeasures (IC)=== Intrusion Countermeasures or IC are Matrix constructs designed to boot, detain and possibly kill deckers invading a computer host. IC constructs range from benign Probe constructs that simply monitor activity to Trace programs that determine the location of an intruding decker to IC that can warp or physically damage the brain through lethal biofeedback. IC acts as hostile NPCs that draw initiative, make attacks, use programs and can take damage and be crashed itself (acting either as an Extra or as a Wild Card depending on the Tier, etc.). There are two features of the IC -- this 'type' (White, Grey or Black) and its Rankings level. The Host's Security Tier somewhat determines the IC's Ranking as lower Tier Hosts cannot handle the massive processing required for higher Ranking IC. Think of Types as how willing a IC is to kill you and Ranking as how danagerous it is in a fight (a White IC might be super dangerous to your Persona but not your meat body or cyberdeck). '''Types of IC''': There are three broad categories of IC and some basic Stats that go with each Category :'''White IC''' is only programmed to attack a decker's online Persona and cannot permanently damage the decker or his deck. :'''Grey IC''' is designed to specifically target the dekcer's cyberdeck and running programs which can result in permanent damage. :'''Black IC''' is specifically progammed to attack the decker himself, creating dangerous biofeedback between the decker and his cyberdeck, possibly leading to permenent physical and psychological damage. '''Rank''' and '''Grade''' are how dangerous the IC is, '''Stats''' is the die ranking for the IC's Smarts, Strength and Vigor Matrix attributes, '''Derived Stats''' are the IC's Matrix Parry and Toughness, '''Skills''' is the ICs die ranking in their Matrix skills -- Hacking, Electronics along with Browse, Search, Sneak and Trickery. '''Actions''' are how many Extra Actions the IC can take in a round, ignoring the Multi-Action penalties for such actions. Finally '''Basic Programs''' are the base line programs for the IC. These Programs work just like the Matrix Decker Programs (see below). {| class="wikitable" border="0" |- | '''Rank''' || '''Grade''' || '''Stats''' || '''Derived Stats''' || '''Skills''' || '''Actions''' || '''Basic Programs''' |- | I || Low || d4 || Parry 4, Toughnes 4 || d4 || 1 || Hammer I |- | II || Base || d6 || Parry 5, Toughness 6 (1) || d6 || 2 || Armor I, Hammer II (Penetrating I) |- | III || Priority || d8 || Parry 7, Toughness 9 (2) || d8 || 2 || Armor II, Hammer III (Penetrating II), Hardening I, Shielding I |- | IV || High || d10 || Parry 9, Toughness 13 (4) || d10 || 3 || Armor IV, Hammer IV (Penetrating IV), Hardening II, Shielding II |- | V || Ultra || d12 || Parry 12, Toughness 18 (6) || d12 || 3 || Armor VI, Hammer V (Penetrating V), Hardening IV, Shielding IV |- |} Now depending on the Type of IC, the systems can have additional Programs as listed below... :'''Basic White IC Programs''': Hammer, Tracer, plus... : *'''Sentry''' - Each rank of this Program adds +1 to the ICs Browse and Search Matrix Skills. : *'''Acid''' - This program can reduces the Toughness of a Persona. The rating adds +1 to the ICs Hacking skill. This is a contested skill of the ICs Hacking vs. the decker's Persona's Hacking skill or Vigor Matrix stat plus Firewall. Success reduces the Persona's Toughness rating by one point per margin of success. of this IC program is used as a bonus to its Contested Hacking skill check vs the Decker. A success lowers the Persona's Toughness rating by one step. Each raise over the IC wins by lowers its Toughness by 1 additional step. These reduces last 5 + the Acid rating of the systems rounds. A decker could reload a Stat or Skill by it takes 1d6 Actions for each step reloaded (a raise get additional step lost reloaded). Average Rating I-II, max rating V : *'''Binder''' - This program can reduces a Persona's Parry score. The rating of this IC program is used as a bonus to its Contested Hacking skill check vs the Decker. A success lowers the Persona's Parry by one step. Each raise over the IC wins by lowers the Parry by an additional 1 step. These reduces last 5 + the Bindder rating of the systems rounds. A decker could reload a Stat or Skill by it takes 1d6 Actions for each step reloaded (a raise get additional step lost reloaded). Average Rating I-II, max rating : *'''Tar baby''' - This program can hold an Persona in place, allowing the system time to trace and/or idenity her real identity. The rating of the program is a bonus to the IC's Strength score when attempting to seize the Persona. Works like Grappling (SWADE pg. 101), but that the IC itself does not need to 'grab' the Persona and can act otherwise normally. : *'''Tracer''' - This program works to locate a Deckers meat body. Could also gain personal data (SIN if the decker has one, etc.) with Raises on the check to find him. The rating is added to the IC's Search skill in a contested roll against Hacking (Ghosting and Spoofing could aid that decker as does his Firewall act as a bonus against this check). It takes 3d6+3 rounds minus the Rating of the Tracer Program (minimum 1 round). If the program fails it can make a new attempt if the Decker is still present in the Host. :'''Gray IC Programs''' : *'''Acid Bomb''' - this program can cause permanent damage to a Persona's Matrix Attributes and Skills. This is done by corrupting and/or erasing the core core of the Persona at its sourse. This requires the Decker to try and repair it through re-writing it or by purchasing a new Persona (or the attributes and/or skills that were effected). : *'''Blaster''' - Works just like Grey Hammer rating I and II under the Matrix Decker Programs. It is used to damage the hardware of the decker's cyberdeck. : *'''Ripper'''- Causes permanent damage to any Program that the persona is running. This is done through corrupting and erasing the code of the Program and requiring a decker to either repair it (by re-writing it, see Matrax Decker Programs) or purchasing a new version. :'''Black IC Programs Cerebropathic - Non-lethal black IC Black Hammer - Induces lethal biofeedback to the decker Non-lethal - Designed to knockout the decker Psychotropic - Conditions the mind of the decker to perform erratically Cyberphobia - induces Matrix and simsense phobia Frenzy - inspires maniacal rage Judas - induces unconscious compulsion to betray Positive Conditioning - inspires love of the company, prevents the character from acting against the company === Enemy Personas and Spyders === Corporates often hire their own Matrix secruty person to help monitor their Network and fight against hostile Personas (i.e. Deckers like you).
Summary:
Please note that all contributions to RPGnet may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
RPGnet:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Navigation menu
Personal tools
Not logged in
Talk
Contributions
Create account
Log in
Namespaces
Page
Discussion
English
Views
Read
Edit
View history
More
Search
Navigation
RPGnet
Main Page
Major Projects
Categories
Recent changes
Random page
Help
Tools
What links here
Related changes
Special pages
Page information