Editing
Savage Shadowrun AE Conversion
(section)
Jump to navigation
Jump to search
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Actions in the Matrix=== [[File:SR,DracoFound.jpg | right ]] Too maybe make this a bit easier I am going to make most non-combat actions in the Matrix as being '''Dramatic Tasks''' (SWADE pg. 122). As I want to make your programs and powers worth in in these situations also I will have some notes as we go. These Dramatic Tast are split up into the following scenses "'''''Hacking a Device'''''" (Using programs and hacking to cause Tricks against foes), "'''''Searching the Matrix'''''" (finding what your looking for on the Matrix), "'''''Accessing Networks'''''" (hacking through multiple layers of security on the Matrix), "'''''Keeping Secrets'''''" (finding hidden data on the Matrix or Network Host site that someone wants to keep a secret) and "'''''The Dark Matrix'''''" (finding and using a 'dark' Matrix site where info can be provided by other deckers). For these types of Dramatic Tasks the GM first sets what the task is, how long the decker/party has to complete it, and how many 'tokens' they need for success. These are generally Single Person Task as a Team of Deckers is rather rare. Finally unlike normal Dramatic Tasks, many of these tests are Contested by Enemy Programs, Security Systems and/or hostile Personas. Combat in the Matrix happens when the Decker trips up security and alerts Intrusion Countermeasures (IC), enemy Persona and Sprits that might face off against them. This is not a Dramatic Action. Instead see '''Matrix Combat''' below. ====Hacking a Device or Drone==== To hack a device such as a comlink or cybernetic implant, the decker needs to make a Challenging Dramatic Task (4 successes tokens before the end of 3 rounds) with a Hacking contested skill check against the Comlink's Security Hacking skill. This is for any Active User in the decker's broadcast range. If the device is a Hidden User and the decker has located them with the Scan program, the Task requires 5 'tokens' before 3 rounds. Success allows the decker to impose either Distraction or Vulnerable (SWADE pg. 100) onto the target for 1d4 rounds. If the decker gained an extra token during the contest, she can impose both the Distracted and Vulnerable on the target for the same amount of time. Failure causes the decker to suffer a Dumpshock as the device 'kicks her off the system'. A Rigger (or Decker/Technomancer) can try and forcibly take control of an enemy drone, a vehicle or Sypder system with an Opposed Hacking skill check (or in the device is on remote service then a basic Hacking success). The attacking hacker must be within his Broadcast radius. The attack suffers a penalty of twice the devices Firewall rating. The hacker must devote his full attention to this action for the duration that he wish to control the enemy’s device. ====Searching the Matrix==== So you want to find some juicy info on the Matrix. But what do you want to find? Searching for the Public Forum of a famous Simsense star or rocker, or the public press briefing of a Corporation or government agencies is fairly easy and does not require a roll or more than a round or two. But searching for even basic or general information on an individual or on finding some obscure public forum can be a difficult task as there is simply so much information out there these days that one has to shift through a mountain of data to get the answers you might seek. Seeking ultra-secure or illegal data is much more complex and dangerous. Basic data search like looking up a SIN registered comlink number, Low end not illegal datafiles, Traffic Cams, etc. is a CHALLENGING task requiring 2-5 tokens but with no time limit. This requires a Matrix Search skill (or ''Research'' skill but with an additional -1 or -2 to the check). The '''''Agents''''' program will add +1 per Rank to this Search test. The Power '''''Empathy''''' adds +2 to the Technomanchers skill roll. Complications are fairly safe and only incrase simply add Time. Base time for this searches double or thriple the base number of rounds. Complications increase this to 5 rounds per Action round. Note that Searching the Matrix is generally just used for general data hosted on the Matrix. Corporate Files and Secrets are going to be hidden behind layers of Security. As such to gain such data one needs to Access a Network Host and search for Hidden Data (see below). ====Accessing Networks==== Anything above Basic Public information searches are '''''Contested Dramatic Tasks'''''. One must bypast or better the Security AI of a device or Network Hosts to access the information. Deckers must make a seperate Dramatic Task against each Teir of Security. The GM determines where the data will be in the Network Host Matrix system. Too search for Hidden or obscure data searches like private communications between low level wageslaves, corporate project plans, etc. Something semi-legal but private that others don't really want you to know about. A Security System is really only there to monitor its Host, watching for code errors and intuders. Its function is to raise alarms when it detects a problem and/or try to boot hostile Personas or programs from its systems. It still draws Initiative cards and acts in the round as it tries to "fix" any problems that it might encounter. Intrusion Countermeasures or IC (see below) is the more proactive attack-dog programs used to protect to system. ====Keeping Secrets==== As wireless information can be stolen with enough skill, effort and technology, a great deal of sensitive information may not be available via the Matrix but instead is hosted in isolated or Closed Network within an on-sight Network. It’s for this reason that a Decker must often accompany a team to the physical location to get access to the really good info. ====The Dark Matrix==== In the 2060's the Matrix has a number of illegal 'dark networks' sites where like-minded deckers and hackers (and a few technomanchers) hang out and exhange information. If one has the right contacts (Matrix Connected Edge or Contact with a Dark Matrix Decker) you might also access the various information available on the 'Dark Sites' (called Shadow Hosts in Shadowrun). Without a connections one might still find one, depending on how secreative and/or illegal the data they deal in is. This requires a Search Matrix skill check a -1 to -4 (or Research skill check but at an additional -2 skill penalty) Dramatic Task of 4 successes before 3 'rounds'. The rounds here last either 5 minutes up to one day depending again on how secrative and illegal the Shadow Host is. Once you have found one the deckers then needs to 'prove their not a narc' to the other users on the Shadow Host. With contacts this is a simple Persuasion check to ask about the info available (like other Contacts). If a decker is not connected in some way then... and 1d6 rounds. Depending on how obscure this search might be the GM might impose a -1 to -4 to the Skill check and/or add additional time (i.e. by multiple the base 1d6 rounds by extra dice or time like minutes or hours). Raise(s) provide additional information depending on what you are searching for and/or can cut down on the time required. Also when a Decker gains Access to a Network Host site on the Matrix it does not mean that she has been granted all the information located there automatically. First off for even Moderate Corps there will be a mountain of files, reports, recordings, briefings, data, etc. within in the lowest Security Rating. A Decker just doing random searches to see what dig or data he might be able to find here should make a Search check (minus the Host's Firewall) spending 1d6 Actions per Tier of the Host. Success means he found interested data files that he might use, sell, steal, etc. Raises can give you additional or richer payday data filed. If the Decker knows what he is looking for, such as Specific data or a particual data file make the same roll as above but it only takes 1d4 rounds per the Host's security tier. With the Sniffer Program this drops to 1 Action per tier. Success finds the files, and raise might get additional related data-files, etc. Now, just because the Decker has been able to break into and gain Access to a private or secret Tier does not grant them all the data that could be found there. They still must use their Browse or Search Matrix skills or Scan and Sniffer Programs to seek out the specific information or systems that they want find. This data could be hidden in the Tier behind a data-lock or hidden host. So this can take time and the longer the decker is in the Tier the greater the chance they could be detected (just cause you have Acess does not mean that system is not on the lookout for such actives). First step is to seek out the data files. This requires a Browse or Search skill check (minus the Tier's Firewall) and 1d6 Actions times the Tier Firewall. I.e. a Orange Tier Host that is not on alert would imposse a -3 penalty to the Decker's Matrix skill or program and would take 3d6 rounds to located it (if the decker knows what he is looking for. Just random data search double the time required).
Summary:
Please note that all contributions to RPGnet may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
RPGnet:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Navigation menu
Personal tools
Not logged in
Talk
Contributions
Create account
Log in
Namespaces
Page
Discussion
English
Views
Read
Edit
View history
More
Search
Navigation
RPGnet
Main Page
Major Projects
Categories
Recent changes
Random page
Help
Tools
What links here
Related changes
Special pages
Page information