Editing Savage Shadowrun AE Conversion
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 54: | Line 54: | ||
* Starts with 5,000¥ to purchase Gear, Cybernetics, etc. Between mission a character must maintain his lifestyle (rent and food) and lose an additional 1d6 x5% ¥ of the characters total cash on hand on miscellaneous events like partying, going out, maintaining contacts, etc. | * Starts with 5,000¥ to purchase Gear, Cybernetics, etc. Between mission a character must maintain his lifestyle (rent and food) and lose an additional 1d6 x5% ¥ of the characters total cash on hand on miscellaneous events like partying, going out, maintaining contacts, etc. | ||
* All Shadowrunners also start with a basic Fake ID (d6) for free (see GEAR) | * All Shadowrunners also start with a basic Fake ID (d6) for free (see GEAR) | ||
− | * Characters start with three months of their Low Lifestyle rent paid for have 3 basic Individual Contacts of their choosing whom they can go to for information and rumors and Network with (SWAE pg. 133). With the CONNTECT Edge a character gains 3 additional contacts of any category – | + | * Characters start with three months of their Low Lifestyle rent paid for have 3 basic Individual Contacts of their choosing whom they can go to for information and rumors and Network with (SWAE pg. 133). With the CONNTECT Edge a character gains 3 additional contacts of any one category – Corporations, Criminal Organizations, etc. |
[[File:SR.D5.team4.jpg | 700px]] | [[File:SR.D5.team4.jpg | 700px]] | ||
== METAHUMANS == | == METAHUMANS == | ||
Line 88: | Line 88: | ||
'''Strong''': base Strength of a d6 and a maximum starting of a d12+1</br> | '''Strong''': base Strength of a d6 and a maximum starting of a d12+1</br> | ||
− | + | '''TROLL'''</br> | |
Averaging 9 feet tall and weighing well over 500lbs trolls and their variants only make up about 5% of the overall population.</br> | Averaging 9 feet tall and weighing well over 500lbs trolls and their variants only make up about 5% of the overall population.</br> | ||
− | '''Big''': particularly large in a world where most others aren’t. He subtracts 2 from Trait rolls when using equipment that wasn’t specifically designed for his race and cannot wear their armor or clothing. Equipment, food, and clothing cost double the listed price. | + | '''Big''': particularly large in a world where most others aren’t. He subtracts 2 from Trait rolls when using equipment that wasn’t specifically designed for his race and cannot wear their armor or clothing. Equipment, food, and clothing cost double the listed price. This includes firearms but not melee weapons.</br> |
'''Clumsy''': -2 to Agility trait test (not linked skills)</br> | '''Clumsy''': -2 to Agility trait test (not linked skills)</br> | ||
'''Dermal Plating''': +2 Armor Points that stack with any other armor.</br> | '''Dermal Plating''': +2 Armor Points that stack with any other armor.</br> | ||
Line 248: | Line 248: | ||
'''BOUNTY HUNTER''' (Novice, Smarts d6+, Intimidate d6+, plus either Occultism, Research or Survival d6+): Bounty hunters devote their lives to hunting down and capturing or killing targets; as a result, they get very good at it. Pick a type of 'targets' that you specialize in. These can include: Sentient Paracritters, Metahumans or Beast. You can make a Occultism (vs. non-meta-human sapient paracritters like dragons and vampires), Research (vs. metahumans) or Survival (vs. animals and non-sentient paracritters) check. Success grants +1 to all Trait rolls against the target and to your damage rolls against it until the end of the encounter. With a raise the bonus to Trait rolls and damage against the target are increased to +2. You can take this edge up to three times, each time your bonuses apply to a different type of hunted.</br> | '''BOUNTY HUNTER''' (Novice, Smarts d6+, Intimidate d6+, plus either Occultism, Research or Survival d6+): Bounty hunters devote their lives to hunting down and capturing or killing targets; as a result, they get very good at it. Pick a type of 'targets' that you specialize in. These can include: Sentient Paracritters, Metahumans or Beast. You can make a Occultism (vs. non-meta-human sapient paracritters like dragons and vampires), Research (vs. metahumans) or Survival (vs. animals and non-sentient paracritters) check. Success grants +1 to all Trait rolls against the target and to your damage rolls against it until the end of the encounter. With a raise the bonus to Trait rolls and damage against the target are increased to +2. You can take this edge up to three times, each time your bonuses apply to a different type of hunted.</br> | ||
'''COMBAT ACE''' (Season, Ace, Boating or Drive or Pilot d8+, Shooting d6+): The vehicle operator can fire one weapon system and make normal vehicle control checks once per action without incurring a multi-action penalty while Boating, Piloting or Driving a vehicle, aircraft, or spacecraft.</br> | '''COMBAT ACE''' (Season, Ace, Boating or Drive or Pilot d8+, Shooting d6+): The vehicle operator can fire one weapon system and make normal vehicle control checks once per action without incurring a multi-action penalty while Boating, Piloting or Driving a vehicle, aircraft, or spacecraft.</br> | ||
− | '''CORPORATE | + | '''CORPORATE MAGE/SHAMAN''' (Novice, Arcane Background – Mage or Shaman, Smarts d8+, Occultism d6+; cannot have Street Mage/Shaman edge): this spellcaster (normally a Mage) is use to the ins and outs of corporate lives and formal training of his or her magical traditions. Due to how commonly they have implants, they receive extra training on how to overcome it. They can ignore 2.0 points of Strain penalty when casting spells.</br> |
'''COVERT OPERATIVE''' (Novice, Thief, Agility d8+, Athletics d8+, Hacking d6+, Stealth d8+, Thievery d6+): Covert Operatives specialize in breaking and entering into places. They gain a +2 to Hacking skill when attempting to bypass a lock or security systems. They also grant a grants a +2 to Stealth rolls to all followers that are within 6” of him (including other Wild Cards).</br> | '''COVERT OPERATIVE''' (Novice, Thief, Agility d8+, Athletics d8+, Hacking d6+, Stealth d8+, Thievery d6+): Covert Operatives specialize in breaking and entering into places. They gain a +2 to Hacking skill when attempting to bypass a lock or security systems. They also grant a grants a +2 to Stealth rolls to all followers that are within 6” of him (including other Wild Cards).</br> | ||
− | |||
[[File:SR.D5.Decker.jpg | 300px | right]] | [[File:SR.D5.Decker.jpg | 300px | right]] | ||
− | '''DIGITAL COWBOY/GIRL''' (Novice, Hacking d6+, Datajack Imlant): You are an expert in the digital world. While you are using full emersion in the Matrix you gain a bonus + | + | '''DIGITAL COWBOY/GIRL''' (Novice, Hacking d6+, Datajack Imlant): You are an expert in the digital world. While you are using full emersion in the Matrix you gain a bonus +2 to your Search and Scan system checks and when using the Sleaze and Spoof programs.</br> |
'''DRONE BOND''' (Novice, Vehicle Rig Control implant): as Beast Bond can spend Bennies on Drones under your control via a VRC.</br> | '''DRONE BOND''' (Novice, Vehicle Rig Control implant): as Beast Bond can spend Bennies on Drones under your control via a VRC.</br> | ||
'''DRONE MASTER''' (Novice, Vehicle Rig Control implant): Drones under your control via a VRC count as Wild Cards (note that vehicles under your Direct Control automatically count as Wild Cards also).</br> | '''DRONE MASTER''' (Novice, Vehicle Rig Control implant): Drones under your control via a VRC count as Wild Cards (note that vehicles under your Direct Control automatically count as Wild Cards also).</br> | ||
'''EXPLORER''' (Novice, Notice d8+, Survival d8+): Masters of survival and observation, an explore gains +2 to Survival checks as well as Vigor checks made due to environmental influences. This includes weather, temperature, or atmospheres, but not things like plants or animal poisons.</br> | '''EXPLORER''' (Novice, Notice d8+, Survival d8+): Masters of survival and observation, an explore gains +2 to Survival checks as well as Vigor checks made due to environmental influences. This includes weather, temperature, or atmospheres, but not things like plants or animal poisons.</br> | ||
− | '''GHOST TALKER''' (Seasoned, Arcane Background – Mage or Shaman; Occultism d8+): The character has learned to speak with ghosts and spirits in astral space and gain information that they would normally not share. This grants the spell caster the ability to take a full minute of concentration to ask a question that a local spirits or ghost might know by making a | + | '''GHOST TALKER''' (Seasoned, Arcane Background – Mage or Shaman; Occultism d8+): The character has learned to speak with ghosts and spirits in astral space and gain information that they would normally not share. This grants the spell caster the ability to take a full minute of concentration to ask a question that a local spirits or ghost might know by making a Spellcasting check. The GM has the final say but most spirits have limited information about their area or a ghost might know how it died (but it might not) and give some basic information of other spirits or metahumans that have passed through the area recently, etc.</br> |
'''INFILTRATOR''' (Seasoned, Stealth d10+): Infiltrators specialize at entering bypassing guards and security systems. You can re-roll a Stealth check so long as the roll was not a Critical Failure.</br> | '''INFILTRATOR''' (Seasoned, Stealth d10+): Infiltrators specialize at entering bypassing guards and security systems. You can re-roll a Stealth check so long as the roll was not a Critical Failure.</br> | ||
'''SMOOTH OPERATOR''' (Novice, Smarts d8+, Persuasion d6+): A master of negotiation. Whether they work for a corporation, a government or a crime syndicate, you gain a +2 to Networking checks within such groups (SWA pg. 133).</br> | '''SMOOTH OPERATOR''' (Novice, Smarts d8+, Persuasion d6+): A master of negotiation. Whether they work for a corporation, a government or a crime syndicate, you gain a +2 to Networking checks within such groups (SWA pg. 133).</br> | ||
Line 294: | Line 293: | ||
:'''Arms Dealer''' – knowledge about all weapons and military hardware and sells weapons. Tends to have a lot of connections and provide for a wide range of clients. | :'''Arms Dealer''' – knowledge about all weapons and military hardware and sells weapons. Tends to have a lot of connections and provide for a wide range of clients. | ||
:'''Corporate Manager''' - a moderate level megacorp offical or mid-manager in a smaller corp in change of a project or two depending on the size of the corp. Probably has some good dig on her own corp and her main rivals. | :'''Corporate Manager''' - a moderate level megacorp offical or mid-manager in a smaller corp in change of a project or two depending on the size of the corp. Probably has some good dig on her own corp and her main rivals. | ||
− | :'''Fixer''' – good for getting jobs but | + | :'''Fixer''' – good for getting jobs but might sell valuable information. Gang Member – good local knowledge about the people. |
:'''Government Agent''' - a low to mid government agent like with the federal or local government, maybe a FBI field agent or metroplex auditor, etc. Good intel in their field and maybe knows whats going on around them. | :'''Government Agent''' - a low to mid government agent like with the federal or local government, maybe a FBI field agent or metroplex auditor, etc. Good intel in their field and maybe knows whats going on around them. | ||
:'''Mid level Syndincate Boss''' - a low end crimal boss for the Mob or Traid or Yakuza, etc. In charge of a division within the overall crimal organization like Enforcers, Extorsionist, etc. | :'''Mid level Syndincate Boss''' - a low end crimal boss for the Mob or Traid or Yakuza, etc. In charge of a division within the overall crimal organization like Enforcers, Extorsionist, etc. | ||
Line 302: | Line 301: | ||
Magic returned some 50 years ago to the world and yet it is still not fully understood. There are three basic Arcane Backgrounds listed below (and Technomancers) are only the most commonly found in the setting I am planning to run (Seattle in the mid to late 2060’s). There are those who practice non-traditional magic like Black Libraray Cultists, Blood Mages, Psychic study, etc. but generally these are going to be NPC only. | Magic returned some 50 years ago to the world and yet it is still not fully understood. There are three basic Arcane Backgrounds listed below (and Technomancers) are only the most commonly found in the setting I am planning to run (Seattle in the mid to late 2060’s). There are those who practice non-traditional magic like Black Libraray Cultists, Blood Mages, Psychic study, etc. but generally these are going to be NPC only. | ||
− | Magic uses the basic Power System from SWAE Powers. There are four basic types of Magic | + | Magic uses the basic Power System from SWAE Powers. There are four basic types of Magic Users – the '''''Adapt''''' (those that turn their magic inward to enhance their abilities and their body and mind), '''''Mages''''' (those spellcasters of the Hermetic or formal learning leaning), '''''Shamanic''''' (those casters of the more intuitive learning) and '''''Technomancers''''' (those who can connect with an enter the Matrix without equipment). Technomachers are covered under the Matrix later. The other three types of magic users are covered here. |
Due to the nature of higher damage and armor in this setting, all Damaging Powers (Bolt, Burst, etc.) increase their damage die type by +1 step (i.e. 2d4 because 2d6; 2d6 becomes 2d8; 3d6 becomes 3d8; etc.) and the Smite Power increases the damage to +3 (+6 with a Raise). | Due to the nature of higher damage and armor in this setting, all Damaging Powers (Bolt, Burst, etc.) increase their damage die type by +1 step (i.e. 2d4 because 2d6; 2d6 becomes 2d8; 3d6 becomes 3d8; etc.) and the Smite Power increases the damage to +3 (+6 with a Raise). | ||
− | + | NOTE that the Teleport and Summon Ally powers are not used in this setting. Summon Ally has been replaced by Summon Elemental or Spirit (see New Spells) and Sprits (see Technomancers). | |
− | |||
[[File:SR.D5.caster.jpg | 300px | right]] | [[File:SR.D5.caster.jpg | 300px | right]] | ||
'''ADAPT''': A physical adapt is a magic user whose powers are turned inward. They range from mystic ninja-like assassin, gun-fu experts, sword saint masters, social chameleons and super-star athelics. | '''ADAPT''': A physical adapt is a magic user whose powers are turned inward. They range from mystic ninja-like assassin, gun-fu experts, sword saint masters, social chameleons and super-star athelics. | ||
Line 395: | Line 393: | ||
:'''Range''': Smarts | :'''Range''': Smarts | ||
:'''Duration''': 10 | :'''Duration''': 10 | ||
− | ''Summon Elemental'' or ''Spirit'' (or ''Sprite'') allows the character to summon an Elemental or Spirit from astral space (or Sprites from the Matrix, see Technomancers). A Mage can summon either an Air, Earth, Fire or Water Elemental while the Shaman may summon an Air (called Sky), Earth (called Land), Water (called Lake or Sea or River) and a Beast Spirits (spirits and elementals are exactly the same just called different things). It materializes anywhere in Range and with a raise on the arcane skill check its’ has a level of Resilient as well. The elemental acts on its creator’s Action Card and follows her commands to the best of its abilities. It has no personality, creativity, or emotions. When the power ends or the ally is incapacitated, it fades into nothingness, leaving no trace behind. How powerful the elemental is depends on the rank of the caster. At Novice level she can summon a basic Elemental type listed in the Bestiary SWAE p. 182-3. The Beast Spirit is listed below. Note that all Elementals and . Summoning an Elemental or Spirit at higher Rank increases their abilities, etc. as listed. | + | ''Summon Elemental'' or ''Spirit'' (or ''Sprite'') allows the character to summon an Elemental or Spirit from astral space (or Sprites from the Matrix, see Technomancers). A Mage can summon either an Air, Earth, Fire or Water Elemental while the Shaman may summon an Air (called Sky), Earth (called Land), Water (called Lake or Sea or River) and a Beast Spirits (spirits and elementals are exactly the same just called different things). It materializes anywhere in Range and with a raise on the arcane skill check its’ has a level of Resilient as well. The elemental acts on its creator’s Action Card and follows her commands to the best of its abilities. It has no personality, creativity, or emotions. When the power ends or the ally is incapacitated, it fades into nothingness, leaving no trace behind. How powerful the elemental is depends on the rank of the caster. At Novice level she can summon a basic Elemental type listed in the Bestiary SWAE p. 182-3. The Beast Spirit is listed below. Note that all Elementals and Spirits are considered Hardy, Gain +2 to recover from Shaken and Stunned and take only ½ damage from Firearms. Summoning an Elemental or Spirit at higher Rank increases their abilities, etc. as listed. |
:'''Additional Modifiers''' | :'''Additional Modifiers''' | ||
:* '''Greater Spirit (+2/+4)''': Too summon a greater Elemental or Spirit requires the caster be at least Veteran rank and its costs additional Power Points. For +2 Power Points (total 6) can summon a Greater Elemental or Spirits (see below). At Heroic rank and +4 Power Points (total 8) can summon a Superior Elemental or Spirit. | :* '''Greater Spirit (+2/+4)''': Too summon a greater Elemental or Spirit requires the caster be at least Veteran rank and its costs additional Power Points. For +2 Power Points (total 6) can summon a Greater Elemental or Spirits (see below). At Heroic rank and +4 Power Points (total 8) can summon a Superior Elemental or Spirit. | ||
=== Spirits & Elementals === | === Spirits & Elementals === | ||
− | + | All spirits and Elementals are quicksilver fast. When Manifested physically they can take two actions a round (ignoring 2 penalties from Multi-Actions). </br> | |
− | All spirits and Elementals are | + | Spirts and Elementals are also '''Duel-Naturer''' which means when they are manifesting phyically they still see into Astral Space at the same time. This is not Distracting for them and as such they can see anyone under the effects of a Power and ignore disgues, illusions and invisibility (as they see right through these affects) and can see the true forms of shapeshifters, etc.</br> |
− | |||
− | Spirts and Elementals are also '''Duel-Naturer''' which means when they are manifesting phyically they still see into Astral Space at the same time. This is not Distracting for them and as such they can see anyone under the effects of a Power and ignore disgues, illusions and invisibility (as they see right through these affects) and can see the true forms of shapeshifters, etc. | ||
[[File:SR.D5.summon.jpg | 300px | right]] | [[File:SR.D5.summon.jpg | 300px | right]] | ||
Line 413: | Line 409: | ||
:* '''Big''': Size +1 | :* '''Big''': Size +1 | ||
:* '''Bite and Claws''': base Str+d8, with teeth and claws. | :* '''Bite and Claws''': base Str+d8, with teeth and claws. | ||
− | + | :* '''Elemental''': No additional damage from Called Shots, ignores 1 point of Wound penalties, doesn’t breathe, immune to disease and poison. | |
− | :* '''Elemental''': No additional damage from Called Shots, ignores 1 point of Wound penalties, doesn’t breathe, immune to disease and poison. | ||
:* '''Entangling Vines''': as the Entangle Power (SWAE). Uses Spirits to active power within its Spirits (6”) range and in a Medium Burst Template, Stronger (-2 to break free and Hardness of 7). | :* '''Entangling Vines''': as the Entangle Power (SWAE). Uses Spirits to active power within its Spirits (6”) range and in a Medium Burst Template, Stronger (-2 to break free and Hardness of 7). | ||
:* '''Fleet Footed''': base Run die of a d10. | :* '''Fleet Footed''': base Run die of a d10. | ||
− | |||
'''GREATER ELEMENTALS AND SPIRITS'''</br> | '''GREATER ELEMENTALS AND SPIRITS'''</br> | ||
Line 650: | Line 644: | ||
In the world of Shadowrun this might not always be a good idea. You don't want Lone Star or mall security to know what you and your friends are talking about especially if you are discussing not-so-legal activities. Comlinks can operate on ‘hidden mode’ where they only talk to other comlinks that have given them permission and do not appear on others AR overlay. Of course this is illegal is certain higher security areas. For example, Lone Star does not allow anyone to operate their comlink in a hidden mode in most of the downtown core areas of Seattle. Most shopping centers and corporate locations also require anyone visiting to have their public information displayed at all times. This has the added benefit of restricting most homeless people and other ‘undesirables’ from these regions. Fake ID can overcome this security… if good enough (high enough ranking). | In the world of Shadowrun this might not always be a good idea. You don't want Lone Star or mall security to know what you and your friends are talking about especially if you are discussing not-so-legal activities. Comlinks can operate on ‘hidden mode’ where they only talk to other comlinks that have given them permission and do not appear on others AR overlay. Of course this is illegal is certain higher security areas. For example, Lone Star does not allow anyone to operate their comlink in a hidden mode in most of the downtown core areas of Seattle. Most shopping centers and corporate locations also require anyone visiting to have their public information displayed at all times. This has the added benefit of restricting most homeless people and other ‘undesirables’ from these regions. Fake ID can overcome this security… if good enough (high enough ranking). | ||
== MATRIX 101 == | == MATRIX 101 == | ||
− | The Matrix is built upon millions of different broadcasting Nod Systems that create the virtual structures that act as a real structures to the Matrix Personas and users. A Host is the center of multiple Nod Systems that support an individual sites such as a Corporate Matrix site (think websites of old), Chat rooms, Data sharing sites, News broadcast sites, library sites, government agencies and public access sites, etc. But also illegal chat room, Shadow sites, Warzane sharing sites, etc. | + | The Matrix is built upon millions of different broadcasting Nod Systems that create the virtual structures that act as a real structures to the Matrix Personas and users. A Host is the center of multiple Nod Systems that support an individual sites such as a Corporate Matrix site (think websites of old), Chat rooms, Data sharing sites, News broadcast sites, library sites, government agencies and public access sites, etc. But also illegal chat room, Shadow sites, Warzane sharing sites, etc. |
− | + | ===Common Term=== | |
− | |||
− | |||
− | |||
Before we get into the rules, there are a few terms we use to describe various rules elements or technology. These terms are presented here so you can familiarize yourself with them before reading further. | Before we get into the rules, there are a few terms we use to describe various rules elements or technology. These terms are presented here so you can familiarize yourself with them before reading further. | ||
:'''Active Users''': whenever anyone with a comlink that is on and broadcasting a signal, that person is an Active User. They are viewing the Matrix (generally via AR) and can see information (text, advertisements, other AR users, etc.) that is being broadcasted out via a Nodes. A user can operate in '''Hidden Moe''' where their data is keep private and the can only communicate with Nods that grant them permission. Their broadcast signal is still detectable but their information and conversions are private. | :'''Active Users''': whenever anyone with a comlink that is on and broadcasting a signal, that person is an Active User. They are viewing the Matrix (generally via AR) and can see information (text, advertisements, other AR users, etc.) that is being broadcasted out via a Nodes. A user can operate in '''Hidden Moe''' where their data is keep private and the can only communicate with Nods that grant them permission. Their broadcast signal is still detectable but their information and conversions are private. | ||
+ | :'''Access''': Once you have hacked into a computer system, device or network host you are considered to have access. Generally, you must have access if you wish to affect a computer system or device in some way shape or form. Many Network Hosts will have multi-layors of security that one might have too break through in order to get to the really juice data. | ||
:'''AR''' (Augment Reality): With an active user comlink a user can view the world around her via AR which is often called an enhanced version of the real world which is achieved via digital visual elements, sounds or other sensory stimuli that is experienced. Often in commerical area with lots of advertising this can be ads tailored to an individuals but can also include basic data of other active users who are broadcasting that data out for all to see. See Emersion levels below. | :'''AR''' (Augment Reality): With an active user comlink a user can view the world around her via AR which is often called an enhanced version of the real world which is achieved via digital visual elements, sounds or other sensory stimuli that is experienced. Often in commerical area with lots of advertising this can be ads tailored to an individuals but can also include basic data of other active users who are broadcasting that data out for all to see. See Emersion levels below. | ||
− | :'''Back- | + | :'''Back-door''': A back door is slang for a secret Access port that can bypass certain levels of a Network Host security. For example this could allow a decker to gain Access to a Tier IV security area without first bypassing or Accessing the lower Tier security areas. |
− | + | :'''Computer System''': A computer system is a term to describe anything with a microprocessor and wireless connectivity. A computer system might be a cyberarm, a comlink, a broadcasting Nod, any kind of vehicle, drone or a security system; In 2060s the possibilities are endless. Basically, if it has a microprocessor, it can be hacked via the wireless signal it emits. Hacking a computer system also gives you direct access to any devices linked to the system. See Devices for more information. | |
− | :'''Computer System''': A computer system is a term to describe anything with a microprocessor and wireless connectivity. A computer system might be a cyberarm, a comlink, a broadcasting | ||
:'''Counter Hacking''': Counter hacking is the process by which a person defends herself against an unwanted intrusion into a computer system or device. This is accomplished by making an opposed Hacking skill check (the person counter hacking gains their Firewall rating as a bonus to this check). You can attempt this roll untrained if you need to. The winner of the opposed roll is either booted from the system or remains logged in, as the case may be. If booted the hacker suffers a -2 to future hacking attempts against this computer system for the rest of the scene. | :'''Counter Hacking''': Counter hacking is the process by which a person defends herself against an unwanted intrusion into a computer system or device. This is accomplished by making an opposed Hacking skill check (the person counter hacking gains their Firewall rating as a bonus to this check). You can attempt this roll untrained if you need to. The winner of the opposed roll is either booted from the system or remains logged in, as the case may be. If booted the hacker suffers a -2 to future hacking attempts against this computer system for the rest of the scene. | ||
:'''Device''': A device is an object that is linked to a computer system in some way, much like your home printer, microphone or web camera that is connected to your computer or comlink (in to 2060s desktops are rare). Most devices are wirelessly linked to a computer, though some can be hardwired with cables or nano wires (especially with Cyberware for 'security reasons). Common devices are alarm systems of all types, door maglocks, security cameras and systems (like weapons), elevators and even items you can sync up with your comlink. Some devices can only be hacked by gaining access to the computer system to which they are linked, while others can be hacked directly. | :'''Device''': A device is an object that is linked to a computer system in some way, much like your home printer, microphone or web camera that is connected to your computer or comlink (in to 2060s desktops are rare). Most devices are wirelessly linked to a computer, though some can be hardwired with cables or nano wires (especially with Cyberware for 'security reasons). Common devices are alarm systems of all types, door maglocks, security cameras and systems (like weapons), elevators and even items you can sync up with your comlink. Some devices can only be hacked by gaining access to the computer system to which they are linked, while others can be hacked directly. | ||
− | |||
:'''Emersion''': When a decker uses Emersion to projecting their consciousness into the Matrix and experience it through a Persona the Matrix looks like a whole other world. Emersion requires a comlink and either a simsense rig (an electronic device that can transmit your brain signals from your brain into the Matrix and have that information transmitted back out into the Matrix) or a Datajack that allows a Decked to pulled directly into the Matrix network. See Emersion levels below for more details. | :'''Emersion''': When a decker uses Emersion to projecting their consciousness into the Matrix and experience it through a Persona the Matrix looks like a whole other world. Emersion requires a comlink and either a simsense rig (an electronic device that can transmit your brain signals from your brain into the Matrix and have that information transmitted back out into the Matrix) or a Datajack that allows a Decked to pulled directly into the Matrix network. See Emersion levels below for more details. | ||
− | |||
:'''Intrusion Countermeasures''' (or IC): Are Matrix constructs designed to detain and possibly kill deckers invading a network host. IC constructs range from benign Probe constructs that simply monitor activity to Trace programs that determine the location of an intruding decker to IC that can warp or physically damage the brain through lethal biofeedback. | :'''Intrusion Countermeasures''' (or IC): Are Matrix constructs designed to detain and possibly kill deckers invading a network host. IC constructs range from benign Probe constructs that simply monitor activity to Trace programs that determine the location of an intruding decker to IC that can warp or physically damage the brain through lethal biofeedback. | ||
:'''Network''': As the name implies, a computer network (or simply network) is a collection of computer systems which are linked together wirelessly. The stronger the network, the wider the area it covers. There are many types of networks in the world. Some are restricted to a single building or collection of buildings (like a hospital or your house). These are commonly known as Local Area Networks (LANS) while others—Wide Area Networks— cover entire cities or even geographic regions (like Europe). Some are satellite networks that comprise Global Area Networks (GANS) spanning the entire globe. | :'''Network''': As the name implies, a computer network (or simply network) is a collection of computer systems which are linked together wirelessly. The stronger the network, the wider the area it covers. There are many types of networks in the world. Some are restricted to a single building or collection of buildings (like a hospital or your house). These are commonly known as Local Area Networks (LANS) while others—Wide Area Networks— cover entire cities or even geographic regions (like Europe). Some are satellite networks that comprise Global Area Networks (GANS) spanning the entire globe. | ||
− | :'''Networks Hosts''' (or simply Hosts): Are the millions of individual agencies, corporations, small business, government agencies and local community computer systems that exist within this Matrix network. | + | :'''Networks Hosts''' (or simply Hosts): Are the millions of individual agencies, corporations, small business, government agencies and local community computer systems that exist within this Matrix network. Generally |
:'''Node''': Is anything that is broadcasting a signal that others can interact with. Nodes can be anything from a host computer system, a device like a comlink, or Network, etc. | :'''Node''': Is anything that is broadcasting a signal that others can interact with. Nodes can be anything from a host computer system, a device like a comlink, or Network, etc. | ||
:'''Persona''': In the Matrix when anyone is using Emersion (Cold or Hot) and whom are wanting to interact within the Matrix uses a Persona. The Persona has Matix attribute traits and skills that only exist in the Matrix but allow the users to interact within it. | :'''Persona''': In the Matrix when anyone is using Emersion (Cold or Hot) and whom are wanting to interact within the Matrix uses a Persona. The Persona has Matix attribute traits and skills that only exist in the Matrix but allow the users to interact within it. | ||
:'''Programs''': Matrix Programs are the structures and building blocks of the Matrix. They create everything one sees in the Matrix and how one interacts with it. Illegal programs used by Deckers allow them to modify or bypast the layers of security a Network Host might have installed, fight other decker's Personas or IC programs sent to stop these intruders, etc. | :'''Programs''': Matrix Programs are the structures and building blocks of the Matrix. They create everything one sees in the Matrix and how one interacts with it. Illegal programs used by Deckers allow them to modify or bypast the layers of security a Network Host might have installed, fight other decker's Personas or IC programs sent to stop these intruders, etc. | ||
− | === | + | ===Searching the Matrix=== |
− | [[File:SR,DracoFound.jpg | right ]] | + | So you want to find something on the Matrix. Well first you have to have access to the Matrix to do such a search, but within a standard Metroplex this is easy with all overlapping broadcasting nodes. [[File:SR,DracoFound.jpg | right ]] |
− | |||
− | + | What do you want to find? Searching for the Public Forum of a famous Simsense star or ricker, or Corporation or government agencies is fairly easy and does not require a roll or more than a round or two. Searching for even basic information on an individual or on finding some obscure public forum can be a difficult task as there is simply so much information out there these days that one has to shift through a mountain of data to get the answers you might seek. | |
− | + | Basic or Standard information search (like looking up a SIN registered comlink number, etc.) requires only a base successful with a Matrix Search skill (or Research skill but with an additional -1 or -2 to the check) and 1d6 rounds. Depending on how obscure this search might be the GM might impose a -1 to -4 to the Skill check and/or add additional time (i.e. by multiple the base 1d6 rounds by extra dice or time like minutes or hours). Raise(s) provide additional information depending on what you are searching for and/or can cut down on the time required. | |
− | + | If one has the right contacts (especially via the Connected Edge) you might also access the various information available on the 'Dark Web' (called Shadow Hosts in Shadowrun), Depending on the Shadow Host (how secrative and illegal are they) it can take a Matrix Search skill check at -1 to -4 (or Research skill check but with an additional -1 to -2) and 1d6 minutes (for low end illgal hosts) to 1d6 days (for the most illegal and well connected hosts) to find one of these sites. | |
− | + | Once you have found such a sight you have to gain permission to acess it via the Host user(s) and operators. This might require you to prove yourself to the operators and/or money, search, information, stolen data, etc. The most secreative and/or plug-in the Host is the more they might except. The GM can set the time required and what is needed but except a lot of hops. | |
− | |||
− | + | Once you have gain access (or permission) to the site you can try either asking for information (requiring a Persuasion check at penalties depending on how obscure or illegal that data you are searching for) or a Matrix Search skill check to shift through any posted data files that might contain the information (at a penalties and should take at least 1d6 hours). | |
− | + | These sites might also provide you Back-Door Access points and codes to get you into a system easier. How extensive this Access would be is dependent on the target Corporations or Agencies importants and the costs can get pretty high pretty fast. | |
− | + | ===Device and Matrix Security=== | |
+ | Getting Access to a device, computer system or secure Network Host requires some skill and programs. In game this can take a few steps. All devices and host sites have a Tiered level of security attached to them. This includes a Firewall system and a basic AI that 'watches' out for these intrusions. This AI also helps the owner of the device to access their own data etc. | ||
− | + | The Security Tier shown below are the systems used to protect the device or host from criminals trying to access their system. A basic Comlink or Mom & Pop small business generally cannot reasonably afford more thebn a a Tier I or II rated system for their security. They might upgrade the Firewall system independently but the system basic stats and skills are far more expensive. Moderately sized corporates and governent Agencies can afford Tier III or maybe Tier IV for some but only the Megacorps and largest most secure government agencies can afford Tier V. | |
− | |||
− | + | The Security Systems '''Rank''' or Tier level is how advanced the system is. The '''Code''' is the general basic mod that the systems AI oerates under. The higher the Rank/Tier of a systems AI the higher its basic '''System Stats''' and '''Firewall''' will be. They systems Firewall acts as a penalty for hostile hackers trying to break into a system and as a bonusfor the AI system to detect and repeal such attempts. The AI system stats include its Smarts (how well and how fast it can react to a situation and/or recognize danger to the system) its Hacking skill (its ability to resist hosital hacking attempts) and it basic Matrix skills of Browse (Matrix Notice) and Search (Matrix Research). | |
+ | {| class="wikitable" border="0" | ||
+ | |- | ||
+ | | '''Rank''' || '''Code''' || '''Example(s)''' || '''Firewall''' || '''Basic AI System Stats''' | ||
+ | |- | ||
+ | | Tier I || Green || Comlink, Public Forum || 1 || Smarts d4, Hacking d4, Browse d4, Search d4 | ||
+ | |- | ||
+ | | Tier II || Blue || Private Data || 2 || Smarts d6, Hacking d6, Browse d6, Search d6 | ||
+ | |- | ||
+ | | Tier III || Orange || Secure Data or Hosts || 3 or 4 || Smarts d8, Hacking d8, Browse d8, Search d8 | ||
+ | |- | ||
+ | | Tier IV || Red || Secret Hosts || 4 or 5 || Smarts d10, Hacking d10, Browse d10, Search d10 | ||
+ | |- | ||
+ | | Tier V || Ultra || Ultra Secret Hosts || 6+ || Smarts d12, Hacking d12, Browse d12, Search d12 | ||
+ | |- | ||
+ | |} | ||
+ | *'''Teir I''' (Green): Basic secure system common for basic devices, computer system, comlink, maglock, securty cameras, cybernetic system, drone or vehicle, and public forums (just so pranksters can't post offensive comments or change the basic data found here) and small stores and even vending machines. These systemss inclues no IC beyond maybe shutting down to prevent damage or thief. | ||
+ | *'''Tier II''' (Blue): Some additional security to protect private or personal data and systems to basic security against hackers looking to steal basic info or items that a Host might provide to the public or hack an well secured Rigged vehicles, etc. This Tier might include some low end 'White' IC programs like Tracers and Alarms that can alert great response. In a bigger corporation when a alert is sounded the Host might even increase the Firewall and dispatched more serious security. This can be expensive though and is uncommon except for larger corps or agencies. | ||
+ | *'''Tier III''' (Orange): Security here will be protecting more secure information and/or personal data like low-level bank accounts, standard wageslave personal data (not upper management or off-the books employees) files or basic research papers on low end gear or programs. White IC is common at this Tier and depending on the size and wealth of the Host can increase the areas Firewall rating faster. | ||
+ | *'''Tier IV''' (Red): Security at this level is for secret data and/or research on the Host. Generally this is where confidential corporate communication and basic data about the corps are stored. These site also include Grey IC programs that are more serious attack programs. The data here could be embarashing or worth a lot as data other corps or agencies want like a bleeding edge program that can better sleazy past IC or the latest version of the Predator'a smartgun interface system, etc. Firewalls and alerts are fast as the system responses to intrudes here. | ||
+ | *'''Tier V''' (Ultra): This level of security is only available to the megacorps or important agencies where they keep the most sensitive and important data secrets. This could be plans and sematics for a new missile system or AI program or for the conspiracy minded -- where the UFOs are keep and experimented on. Black IC is often used here and a decker had better be good and have the best bleed edge tech to survive long in such a system. | ||
− | + | When a decker trying to bypass a device or hosts security to cause problems or steal data they must first gain 'Access' to the First Tier of the system's security. This requires an Action and Hacking skill check minus the devices Firewall rating. Success allows Access to the first Tier of security. This might grant the hacker the basic private information of the user but also could unlock a maglocked door or access a security camera feed to see what it sees etc. | |
− | + | With failured attempt the hacker can try again next round as an Action but this alerts the device user that someone is attempting to access their device. The user could be the devices owner or the system Host security AI. If the hacker is running a Spoof or Sneak program she can make an opposed check verses the device owners or security AI's Notice or Matrix Browse skill. adding their device's Firewall rating as a bonus to this roll. If the decker success the system or user is not aware of the attempted hack and the decker can proceed as normal. If the host or user wins they can reacte in a number of ways. An individual device or computer system might simply be turned off. Or the user or security AI could try a Counter Hacking attempt to boot the hacker from its system. This requires an Opposed Hacking skill check with a bonus to the user equal to the systems Firewall rating. If the user wins it can boot the hacker from their system. | |
− | |||
− | + | A hacker that is booted off the system can try to gain access on the following round as above, but they suffer a additional cumulative -2 to all future checks for each time they have been booted. A system will reset down to a default after some time passes (GMs call) that the hacker will haev to wait at least a few minutes (if not hours or days) before this happens. | |
− | + | The system might also send an alarm (if connected to a larger Host system) about the hacking attempt. For Network Hosts this might mean added security procalls (like an increase in the Firewall rating and/or IC programs being dispatched/activated etc.). How fast and how much security is dispatched depends on the Host Security Tier. | |
− | + | Once a Decker has gained Access to the system or device she has a number of options that she can peruse. These requires a new Action and an Opposed Hacking check (with the host or users Firewall acting as a bonus to this roll). If the host wins it makes a basic Smarts check. If successful it boots the Decker out of the system as normal. If the Decker wins he could shut down one basic system (like a comlinks broadcasting of a comlink or a single piece of cybernetics such as not allowing a smartgun linked weapon to fire, etc.) Another option would be to flood the user’s spam AR such that they are Distracted (and Vulnerable if the attacker got a raise over their opponent with the contested check; see SWADE pg. 100). The Decker could also use any Program they have against the device. | |
− | + | For Network Hosts once a Decker has gained Access to the systems first Tier of security she has more steps to gain greater access to the system. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
+ | To gain access to a Security Tier the Decker uses Programs to fool or trick the Host's security AI or she can attack it to smash through the Tier to 'beat the Host into submission' as it where. Once the decker has Access to that Tier's Tier she could do data-searches, corrupt a system or its data, destroy data-files, etc. A Decker who wish to access some datafile or information on a high Security Tier, also has to break through the lower Tier's security system and gain Access first. However its done, once the Decker had Access they can move higher in the security Tier. See Common Decker Programs below to see how they might go about gaining Access to that Tier. | ||
+ | Now, just because the Decker has been able to break into and gain Access to a private or secret Tier does not grant them all the data that could be found there. They still must use their Browse or Search Matrix skills or Scan and Sniffer Programs to seek out the specific information or systems that they want find. This data could be hidden in the Tier behind a data-lock or hidden host. So this can take time and the longer the decker is in the Tier the greater the chance they could be detected (just cause you have Acess does not mean that system is not on the lookout for such actives). | ||
− | and 1d6 | + | First step is to seek out the data files. This requires a Browse or Search skill check (minus the Tier's Firewall) and 1d6 Actions times the Tier Firewall. I.e. a Orange Tier Host that is not on alert would imposse a -3 penalty to the Decker's Matrix skill or program and would take 3d6 rounds to located it (if the decker knows what he is looking for. Just random data search double the time required). |
+ | As wireless information can be stolen with enough skill, effort and technology much sensitive information is not available via the Matrix but instead is hosted in isolated on-sight Nodes. It’s for this reason that a decker must often accompany a team to the physical location to get access to the really good info. | ||
− | + | == EMERSION LEVEL WITHIN THE MATRIX == | |
+ | When a Decker logs onto the Matrix there are three levels of ‘emersion’ that one can use. Riggers do something similar but generally only access a vehicles system. Technomancers experience the Matrix the same way but can use any of the following emersion automatically without a computer or comlink. So long as they are within their broadcast range of a network. | ||
+ | * '''AR or Augmented Reality''' is the most basic level and most of society in the 2060’s involved in at least some level of AR with the comlinks transmitting and receiving data from all the Nodes and system around them every day. AR user or Decker reaction on his or her initiative card in the round. AR provides lots of additional levels of information that is not overly distracting, except when the Decker tries to interact with both ‘realities’ at the same time (for example, decking and combat in the real world at the same time). At these times the Decker is ‘Distracted’ (SWAE pg. 100). This is in addition to any Multi-Action penalties. You can use a Persona in AR in order to use programs etc., and it can take ‘Matrix damage’ as normal. Most AR browsers do not even have a stock persona and only allow character to use Persona Skills (except Scan). | ||
+ | * '''Cold Sim''' is the safest version of ‘emersion’ into the Matrix (requires a minimum of a Sim Emersion upgrade on a Comlink or a Datajack). The Decker leaves his meat-body back in the real-world as they send their consciousness into the Matrix. Generally the worst that can generally happen to the Decker is that they can be dumped off the Matrix forcibly (called Dumpshock), although some programs (like Grey Hammer) can deal harm to the comlink. Cold Sim grants one Extra Action in the Matrix (can ignore one Multi-Action penalty each round). Using a Simsense Rig (see gear) Cold Sim is the best emersion a person can use. | ||
+ | * '''Hot Sim''' is the most dangerous (and illegal) version of emersion into the Matrix. This requires a Datajack (see Cyberware). With it the Decker uses her Emersion ability (from either cyberware or a comlink) in order to place their consciousness almost fully into the Matrix. Deckers have died while hacking this way while others suffered other adverse physical and psychological effects. Hot Sim grants two Extra Actions in the Matrix (ignore two Multi-Action penalties). In order to use this level of emersion requires a Datajack implant allowing for direct access to the users brain patters when interacting with that Matrix. A decker with a Datajack and the Emersence Comlink does not have to use Hot Sim all the time when in the Matrix. If she wishes to be safe she can dial it back to just using Cold Sim. | ||
− | + | ''NOTE: that other Extra Action Enhancements such as magical Powers (like Quickness) or Cybernetics (Wired Reflexes) only help your reaction with AR. They have no effect on Cold or Hot Sim. Edges like Quick or Level-Headed help all for all types of initiative.'' | |
− | + | == PERSONA == | |
− | + | [[File:SR.D5.Persona.jpg | 300px | left]] | |
− | + | While “jacked” into the Matrix through a direct neural interface Emersion, the Decker projects her conscious into it and no longer have any meat-body Physical Traits (Agility, Strength and Vigor), nor can they use any skill tied to these Traits. Deckers and Wage-Programmers create unique Persona – an electric, Matrix version of whatever the Decker choices to look like (the Decker’s Avatar). At a very basic level a Persona cost of 500¥ with a Strength and Vigor Trait of D4 each (Agility is irrelevant in the Matrix). Each Trait can be Upgrades individually as listed below. The Decker must have a comlink or computer where the electronic version of this Persona is stored and can be uploaded onto the Matrix. Matrix Strength determines the basic number of Programs (see below) that the device can handle running at one time. Comlinks can handle ½ Matrix Strength in Programs while a Cyber-Deck and handle the full Matrix Strength in Programs running at one time. It takes an Action to drop and load a Program unless noted in the Program’s description. | |
− | |||
− | === | + | Rank Cost (each traits must be purchased separately for both Strength and Vigor) |
+ | :D6 = 1,500¥ each | ||
+ | :D8 = 5,000¥ to each | ||
+ | :D10 = 15,000¥ to each | ||
+ | :D12 = 50,000¥ to each | ||
− | + | A Decker’s Persona also has four basic skills – Browse (Matrix Notice), Search (Matrix Research), Sneak (Matrix Stealth), and Trickery (Matrix Persuasion/Deception). Each starts at a base D4 with the basic Persona built. | |
− | + | Rank Cost (each skill rank must be purchased separately for each skill) | |
− | + | :D6 = 500¥ each | |
− | + | :D8 = 1,000¥ to each | |
− | + | :D10 = 2,500¥ to each | |
− | + | :D12 = 5,000¥ to each | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | == | + | == MATRIX PROGRAMS == |
− | + | These programs only work within the Matrix (except for the Scan Program which allows a device to detect the Broadcast signals of other devices and nodes in the 'meat world') and are the most commonly used by Deckers to hack a system. Hence most are illegal. As range is meaningless in the Matrix all Area Effects can affects everything and everyone in the local system (or the Tier security area). | |
− | + | A Decker can attempt to write her own Programs or increase her Matrix Traits and or Skills instead of purchasing them. This takes 20 hours of dedicated work per 2,000¥ to normally purchase it; not counting restricted or illegal price increase. A decker can normally devote 10 hours a day (14 with a Spirits check that if made works for a week). Those who require less sleep (due to drugs or cybernetics like a Sleep Regulator, etc.) can devote an additional 6 hours per day. At the end the Decker makes a Science skill check. Success grants the first rating or increase a Trait or Skill by +1 step. Failure wastes the time invested. | |
− | + | '''STANDARD (COMMON) PROGRAMS''' | |
+ | * '''Agents''' (Restricted) – creates a semi-autonomous programs that can do various takes. The basic Agent has a d6 in Matrix Attributes and a d6 in all Matrix skills. It’s a semi-independent A.I. that will follow orders and instructions but is not creative in any way itself. The Base cost 2,500¥. One can create two Agents for +2,500¥, four Agents for +5,000¥ and a maximum of six Agents for +10,000¥. A decker can grant his agents Programs listed here for the same cost listed. | ||
+ | * '''Armor''' (Restricted) – provide Matrix protection like armor +1 per rating. Cost 200¥ x rating (max 10). This can be combined with raising Toughness at a cost of 500¥ x rating (max 5). | ||
+ | * '''Black Hammer''' (Illegal) – This illegal program not only can damage a Persona but also the meat body of the decker projecting into the Matrixed. The decker’s body suffers ½ the damage the Persona would have taken minus the decker’s comlink Firewall rating. Compare this amount to the decker's unarmored (or cybered) Toughness rating to see if she would suffer Wounds. Cost 30,000¥ | ||
+ | [[File:SR.D5.Programs.jpg | right]] | ||
+ | * '''Confusion''' (Restricted) – This program can cause an enemy Persona or IC to become Distracted and Vulnerable. This is contested check Hacking skill check. Success and the opponent gains both conditions for 1d6 rounds. Every raise increase the duration by 1d6 rounds Cost 2,500¥ | ||
+ | * '''Copy''' – This program can download and copy data from files, etc. in one round. Cost 1,000¥ | ||
+ | * '''Corrupt''' (Restricted) – This program erodes IC or Persona’s traits (Matrix Attributes or Skills). This is a contested Hacking skill check. Success lowers one trait by 1 die step. Each raise lowers a trait (same or a different one) by another 1 die step. Cost 5,000¥. | ||
+ | * '''Data Bomb''' (Illegal) – This program destroys data-files, generally taking one Action per rating. Cost 2,000¥ | ||
+ | * '''Erase''' (Illegal) – This program erodes and destroys a Program. Each round the Decker is in contact with a Program it lowers its rating by one. When it reaches 0 the program is destroy (can be reload by the Host Node but takes time). With a successful Hacking check against an IC or Persona they must make a Matrix Vigor check or suffer a Wound. Cost 10,000¥. | ||
+ | * '''Exploit''' (Illegal) – This program allows the decker to gain control over a Program, IC or Persona. Acts as the puppet power (SWA pg. 166). Cost 10,000¥ | ||
+ | * '''Fortitude''' (Restricted) – This program adds to your Persona’s Matrix Toughness. Each level adds +1 to a max rating of 10. Cost 2,000¥ rating I-V, cost 4,000¥ rating VI-X. | ||
+ | * '''Ghosting''' (Illegal) – the Decker’s persona is partially invisible to other programs and Personas. An the system’s or Persona’s Browse or Search along with Sniffer and Scan programs are at -2 per ranking, with Host nodes gaining a bonus equal to the Firewall rating. Cost rank I: 5,000¥; rank II: 12,500¥; or rank III: 25,000¥ | ||
+ | * '''Glue''' (Restricted) – This program can ensnares an IC, Persona or Program in place such that it cannot move out of the Host zone it was located. For a Persona a decker can jack-out but doing so removes her Persona from the Host area and if she wishes to return she must break into the system again. This is an Opposed Hacking skill check. Success and the target cannot move and is Distracted. With a raise the target is also Vulnerable. In either case if the decker moved out of the host zone the target cannot follow. Cost 5,000¥ | ||
+ | * '''Grey Hammer''' (Restricted) – this semi-legal attack program can damage the target's Comlink. Any damage the Persona inflicts on a target with the Hammer program also compare part (or all) of that damage to the Comlink's Hardness. This can cause Wounds to the Comlink are with other objects also compare the damage to the target’s hardware Hardness plus Firewall rating plus Firewall. This causes wounds are normal to the Comlink (a Wild Card’s comlink or hardware can take three wounds as normal. Use the worst of the Wound Penalty of the Persona or Comlink for penalties in the Matrix, Fourth wound auto crashes the Persona and the Comlink if brioken and in serious need of repair). Cost 5,000¥ Rating I inflections ½ damage to the Comlink directly. Cost 20,000¥ for Rating II and inflicts the full amount against the comlink. | ||
+ | * '''Hammer''' (Restricted) – This program increase the Persona’s Strength damage by the rating. Rating I: Str+1d4, Cost 500¥; Rating II: Str+d6, Cost 1,500¥; Rating III: Str+d8, Cost 4,000¥; Rating IV: Str+d10, Cost 8,000¥; Rating V: Str+d12, Cost 15,000¥. Can add upgrades of Penetrator – Reduces Armor Program by its rating. Cost 200¥ x Rating (max 10). | ||
+ | * '''Jammer''' (Illegal) – This program causes a system to not be able to communicate with its host system or others. This is a contested Electronics or Hacking skill check. Success blocks all communication by the target, thus it cannot raise alarms etc. The basic duration of this program is 5 rounds. Cost 5,000¥ | ||
+ | * '''Medic''' – This program can heal Matrix wounds on itself. The decker makes an Electronics skill check, minus any wound penalties. Success heals a wound, a raise two wounds. This program can only be used a number of times equal to its rating before requiring it to be reloaded (which normally takes a number of actions of 1d6 rounds x rating). Cost 1,000¥ x rating for levels I-III; costs 2,000¥ x rating for levels IV-VI; costs 5,000¥ x rating for levels VII-X. | ||
+ | * '''Passkey''' (Illegal) – This program grants a decker a bonus to Hacking to overcoming a Data-Lock, allowing him to bypass the security protocols faster and with less danger of alerting security. Each rating adds +1 to his Hacking skill against a Data-Lock. Cost 500¥ x rating for levels I-V; 1,000¥ x rating for levels VI-X. | ||
+ | * '''Scan''' – This legal program allows anyone with a Comlink to find nodes and wireless devices while in the real world. The Range equals to the Broadcast range. Requires a basic success with Electronics or Hacking (apply all Firewall penalties). With a basic success, the decker can use Augury with a Hacking check -2 as a free action. This grants the user additional information about the node or com. For example an enemy team’s locations and number, weapon types (everything from clothing to weapons to cyberware has RFID tags, attached to them. The Scan program get access a lot of this basic data almost instantly). Cost 2,000¥ | ||
+ | * '''Shield''' (Restricted) – This program adds to the Persona’s Matrix Parry Score. Each rating adds +1 to this Score. Cost 2,000¥ x rating, I-III. | ||
+ | * '''Sniffer''' (Restricted) – This program is used to find hidden data stores but also to bypass Ghosting and Spoof programs. Each ranking grants +1 to the Persona’s Brows and Search Matrix skills. Cost 1,000¥ x rating for levels I-V; 3,000¥ x rating for levels VI-X. | ||
+ | * '''Spoof''' (Illegal) – This program disguises the Persona to make it appear that it belongs where it normally does not. Each level grants the user a +2 to his Trickery Matrix Skill generally opposed by the systems Notice. Cost rank I: 5,000¥; rank II: 12,500¥; or rank III: 25,000¥. | ||
+ | * '''Tactical Display''' (Restricted) - This program allows the Decker to use Scan to find enemy comlinks within his own range and as an Action share that information with his allies via their AR. Once that has been set up the decker does not need to spend an Action to continue the display. 5,000¥ | ||
+ | * '''Tracer''' (Restricted) – This program uses your Persona’s Search Matrix skill to try and locate the physical location of another Persona almost anywhere on Earth. Make an Search check opposed by the target’s Hacking skill roll plus her Firewall, every 1d6+2 rounds. Success locates the target’s physical location to within a block, with a raise within a few feet. Cost 20,000¥. | ||
+ | * '''White Noise''' (Restricted) – This program fills a local Node or Host system with jamming white noise that causes a general penalty of -1 to all Matrix Skills per rating. But this jamming affects the Decker’s skills and Persona also. Cost 2,000¥ x rating for levels I-III; cost 5,000¥ x rating for levels IV-VI, and 10,000¥ x rating for levels VII-X. | ||
− | '' | + | ''NOTE – these are only the basic programs. You can create others system but remember range has no Matrix effect. Any Area effect will affect everything you can ‘see’ within the Local Node or System'' |
− | |||
− | |||
− | |||
− | + | == MATRIX COMBAT == | |
− | + | As Persona can move around in the Matrix at near light speed (after all you are just code) Range is irrelevant. All combat is assumed to be ‘hand-to-hand’ just for the sake of easy of play. Attack rolls to hit in the Matrix are determined using your Hacking skills minus any Firewall within a System (but not from comlinks, etc.). This penalty only applies to hostile hackers and not a system Program or IC or personas recognized in their own Host system (if a Decker successfully Spoofs or Sneaks into a system he does not suffer this penalty either). A Decker’s Persona Strength deals base damage (plus Hammer Program). Persona Vigor to determine the Decker’s Matrix Toughness (2 + ½ Matrix Vigor die). Armor that a Decker’s meat-body is wearing doesn’t count, nor does Dermal Planting or Brawny or Size. A Persona’s Parry score is equal to 2 + ½ Hacking skill. Edges like Parry do not add to this score nor does Dodge aid in the Matrix. Call Shots are irrelevant in the Matrix. Wild Cards Personas have 3 Wounds, Extras as normal. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | When a Persona takes damage it affects its Matrix skills and traits, etc. just as normal (penalties for wounds). If you are in a Cold-Sim and your Persona takes enough damage to be incapacitated (‘Crash your Persona’), you are forced out of the Matrix and back to the real world in a most unpleasant way… often referred to as '''Dumpshock'''. You are automatically Stunned for 2d6 rounds, and then can recover as normal. When running in Hot-Sim and your Persona is incapacitated your meat body suffers a Wound on a failed Vigor test (you can soak this as normal). A critical failure causes you to be Stunned for 2d6 minutes. | |
− | + | == RIGGERS == | |
+ | Riggers control and operate a numbers vehicles, drones and/or security systems using of '''Vehicle Rig Control''' (VRC) cyberware. All vehicles that are to be controlled must be within her Broadcast range and have the Vehicle Rig upgrade although a Rigger can jack directly into a vehicle via a VCR and Vehicle Rig. This has the added bonuses of granting the Rigger the Interface-Remote Control bonuses to all skills (see Cyberware). A Rigger with a VCR can control a maximum number of such vehicles or systems equal to ½ her Smarts die. With just AR a rigger can control these devices but without the Interface-Remote Control skill bonuses (and using the drone’s skill to make all skill checks with. Remember they are not Wild Cards). Riggers can also use Cold or Hot Emersion. With Emersion they gain the skill bonus and each vehicle or device they control directly and these devices counts as a Wild Card. They can ignore one Multi-Action penalty with Cold Sim and two Multi-Action penalties with Hot Sim emersion. | ||
+ | The Rigger can suffer from Dumpshock or physical damage when a drone or vehicle they are directly controlling is destroyed just like when a Persona is destroyed (see Matrix Combat). | ||
+ | If the rigger is controlling a vehicle, drone or system, they gain the ''Interface-Remote Control'' skill bonuses of +2 to Boating, Drive, Fighting, Notice, Pilot, and +1 to Shooting. A vehicles operator suffers a Multi-Action Penalty when controlling (Boating, Drive, or Pilot) skill check and attacking (Shooting) skill check with the same round. The Combat Ace edge eliminates this penalty. | ||
+ | [[File:SR.D5.Rigger2.jpg | 700px]] | ||
− | + | Riggers use all basic Matrix Skills that a Decker does (and the VCR cybernetic implant includes all at a base rating of D4 each) but its Programs that it can run are limited to Confuse*, Crash*, Exploit*, Ghosting*, Jammer*, Scan, Spoof* and Search (*can only be used vehicles, drones or security systems). They run these through the VRC and don’t require additional computer hardware to do so. These programs are purchased the same way as with Deckers. | |
+ | Drones can extend the range when using Scan and Search to find hidden comlinks, nods, electronic devices, drones, etc. In this way a Rigger can act as something of a team’s ‘Overwatch’ lookout. | ||
− | + | How does the Rigger do this? The VRC Implant allows a Rigger to track her drones via a victual display. With the Scan program added she can detect enemy comlink and drone signals and project that display to her allies comlinks via AR (sharing this info is a free action for her). At the same time they can be running Spoof to hide their own vehicles and team member’s comlinks from hostile Riggers and Deckers. A Decker could do this also with a Tactical Display program (see Programs above). | |
+ | A special type of Rigger employed by many Corps is called a '''Sypder'''. They control a building or corporate area’s surveillance and threat response equipment (Automated Systems; things like alarms, fire suppression systems and of course pop-out wall guns and gas release systems). In these cases, each ‘system’ that the Sypder is in control of counts as a vehicle or drones for the limit to the number of devices he can control remotely. Different remote controlled guns would count as a vehicles, drones, etc. while camera systems don’t. Instead they act as the Spyder’s eyes and ears. Spyder’s often use the same Matrix Programs as Riggers plus Armor and Hammer. | ||
− | + | A Rigger (or Decker/Technomancer) can try and forcibly take control of an enemy drone, a vehicle or Sypder system with an Opposed Hacking skill check (or in the device is on remote service then a basic Hacking success). The attacking hacker must be within his Broadcast radius. The attack suffers a penalty of twice the devices Firewall rating. The hacker must devote his full attention to this action for the duration that he wish to control the enemy’s device. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | == | + | == TECHNOMANCERS == |
− | + | As the Sixth World has advanced with return of magic that surprised the world 50 years ago, a new wonder has made an appearance – the Technomancers; those who can access the wireless Matrix with only the power of their minds. | |
+ | :'''Arcane Background (Technomancer)''' | ||
+ | :'''Starting Power Points''': 10 | ||
+ | :'''Starting Powers''' (Called Living Programs): 3 | ||
+ | :'''Skill''': Hacking (Smarts) | ||
+ | :'''Power List''': Any (However Summon Ally works differently in this setting, see below). | ||
− | + | OTHER BASIC ABILITIES | |
− | + | :'''Wireless Access''': Technomancers can somehow access the wireless Matrix without the benefit of a computer or comlink; they simply can sense and access it as if they did. This allows them to use any Emersion level within the Matrix. They also create something they call a Living Persona within the Matrix without any hardware to back it up beside their mind. They can natural access AR, Cold and Hot Sim. | |
− | + | :'''Natural Signal Strength and Firewall''': Technomancers automatically have the Broadcast ability of 50” (100 yards) with the following modifiers (at no additional cost) – Firewall 1 and the Emersion enhancement and basic Interface abilities. | |
− | |||
− | |||
− | '' | + | '''LIVING PERSONA AND PROGRAMS'''</br> |
+ | The Technomancer start with something called a ''Living Persona''. This grants the Technomancer all the benefits of a comlink and datajack without requiring one. When emerged into the Matrix their Persona’s Strength Trait is equal to their Smarts and their Vitality Traits is equal to Spirits (Matrix Toughness is equal to 2 + ½ Spirits). Technomancer also uses their Hacking as their Fighting skill and Matrix Parry (2 + ½ Hacking). The Technomancer also gains all of the Matrix Skills at a base D4 skill each. A Technomancers’ Living Persona ‘Powers’ works just like a Magic Users spells but only within the Matrix and only effect Matrix Hosts, Programs, IC and other Personas. A Technomancer uses her Hacking skill to ‘cast’ these spells and they cost the same Power Points as listed. | ||
− | + | Note that a Technomancer can run any number of powers at the same that as they wish to 'maintain'. They are not limited by their Matrix Strength as normal Deckers. | |
− | |||
− | |||
+ | As with other Magic Users, a Technomancer gains two power with the New Powers edge. In order to raise her Matrix Attribute Traits or Matrix Skills an Advance grants them 2 points for Matrix Attributes or 4 points for Matrix Skills. These skills are not tied to attributes but the max is d12. | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
'''POWERS IN THE MATRIX'''</br> | '''POWERS IN THE MATRIX'''</br> | ||
− | The Technomancer uses Powers in the Matrix as a magic user uses them to cast spells in the ‘real world’. Programs, Hosts and IC all count as creatures that can be affected by Powers like ''mind reading'' or ''object reading'' or ''puppet''. | + | The Technomancer uses Powers in the Matrix as a magic user uses them to cast spells in the ‘real world’. Programs, Hosts and IC all count as creatures that can be affected by Powers like ''mind reading'' or ''object reading'' or ''puppet''. As range has no meaning in the Matrix, powers like ''teleport'' could be used to move through different Nods and past Firewall security. Area Effect powers effect that entire Nod irregardless of the Burst Size. The GM and player of a Technomancer should use their own creativity when coming up with Trapping Names for these Powers. |
Technomanchers are vulnerable to Grey and Black Hammer attacks as their minds are exposed directly to the Matrix. However the Powers ''arcane protections'' and ''protections'' acts as 'Toughness' verses these attacks (normally arcane protection only protects against other Technomancers Powers and Sprite attacks). | Technomanchers are vulnerable to Grey and Black Hammer attacks as their minds are exposed directly to the Matrix. However the Powers ''arcane protections'' and ''protections'' acts as 'Toughness' verses these attacks (normally arcane protection only protects against other Technomancers Powers and Sprite attacks). | ||
There are two Powers that need special attention for how they work in the Matrix…</br> | There are two Powers that need special attention for how they work in the Matrix…</br> | ||
− | + | '''Astral Projections''': this power works in the Matrix like the real world(?) for mages. The Technomancher can move through most Nods security unseens and only other Technomanchers and Sprits can somewhat interact with them. However they cannot see or understand the codes and icons that they view from these 'Realm'. Everything looks cold and fuzzy although they might get some emotions off personal or important datafiles, etc.</br> | |
− | + | '''Banish''': this power works against Sprites but also artificial IC but against them the power only has a Duration of 5.</br> | |
− | + | '''Summon Sprite''': a Technomancer that takes the Summon Sprits Power can summon up these constructs (?) from the deep Matrix. They act in all ways as elementals and spirits. These Sprites work exactly like Summoned Elemental power except for their traits powers and abilities as listed below. Note that none of the Sprits have Agility score or Pace listed as movement is irrelevant in the Matrix as everything is moving at near light speed.</br> | |
− | |||
Line 1,152: | Line 1,044: | ||
''Cyberleg only Upgrade''</br> | ''Cyberleg only Upgrade''</br> | ||
− | '''Leg Smash I-II''' (+500¥/level) | + | '''Leg Smash I-II''' (+500¥/level): each leg can purchased this upgrade separately. Level I grants unarmed Str+d6 kick damage and level II grants unarmed Str+d10 kick damage.</br> |
− | '''Movement Enhancers I-IV''' (+ | + | '''Movement Enhancers I-IV''' (+1,500¥/level) [Require both leg replacement]: each level increases the subject’s Pace by +2 and Run die by +1 step.</br> |
− | '''Hydraulic Jack I-II''' ( | + | '''Hydraulic Jack I-II''' (4,500¥/level) [Requires both leg replacements]: each level improvement the subject to leap distance. Level I horizontal base 4” and vertical 2”; Level II horizontal base 6” and vertical 3”.</br> |
''NOTE that for all Cyber-firearms, it takes a normal loading action to reload their Ammo capacity but the weapon must ‘out’ and in view, it cannot be hidden within the cyberarm during this time.'' | ''NOTE that for all Cyber-firearms, it takes a normal loading action to reload their Ammo capacity but the weapon must ‘out’ and in view, it cannot be hidden within the cyberarm during this time.'' | ||
Line 1,184: | Line 1,076: | ||
| Armored Vest with Insert Plates || 6* || d6 || 14 || 850¥ || Torso | | Armored Vest with Insert Plates || 6* || d6 || 14 || 850¥ || Torso | ||
|- | |- | ||
− | + | | Biker Helm || 3 || d4 || 3 || 100 || Head | |
− | |||
− | | Biker Helm || 3 || d4 || | ||
|- | |- | ||
− | | Combat Helm || 4* || d6 || | + | | Combat Helm || 4* || d6 || 4 || 400 || Head |
|- | |- | ||
| Chameleon Suit || 2* || d6 || 14 || 2,000¥ || Full body | | Chameleon Suit || 2* || d6 || 14 || 2,000¥ || Full body | ||
Line 1,215: | Line 1,105: | ||
'''Armored Jacket''' a fashioned form of heavy Kevlar that is somewhat made to look like a normal jacket. It requires a normal Notice check to tell that it is actually armor.</br> | '''Armored Jacket''' a fashioned form of heavy Kevlar that is somewhat made to look like a normal jacket. It requires a normal Notice check to tell that it is actually armor.</br> | ||
'''Vest with Plates''' obvious armored vest that is worn over clothing.</br> | '''Vest with Plates''' obvious armored vest that is worn over clothing.</br> | ||
− | |||
'''Bike Helmet''' standard motorcycle helmet.</br> | '''Bike Helmet''' standard motorcycle helmet.</br> | ||
'''Combat Helmet''' a obvious a military combat helmet with snap down visor (Restricted)</br> | '''Combat Helmet''' a obvious a military combat helmet with snap down visor (Restricted)</br> | ||
Line 1,240: | Line 1,129: | ||
| Forearm Snap-Blades || Str+d6 || 1 || d6 || 2 || 300¥ || Worn in pairs +1 Parry | | Forearm Snap-Blades || Str+d6 || 1 || d6 || 2 || 300¥ || Worn in pairs +1 Parry | ||
|- | |- | ||
− | | Baton, Collapsible || Str+ | + | | Baton, Collapsible || Str+d4 || -- || d4 || 2 || 150¥ || -- |
|- | |- | ||
| Stun Baton || Stunned || -- || d4 || 3 || 500¥ || Touch, Stronger | | Stun Baton || Stunned || -- || d4 || 3 || 500¥ || Touch, Stronger | ||
Line 1,279: | Line 1,168: | ||
| Defiant EX Shocker || 4/8/12 || 1 || 4 || d4 || 3 || 600¥ || -- | | Defiant EX Shocker || 4/8/12 || 1 || 4 || d4 || 3 || 600¥ || -- | ||
|- | |- | ||
− | | Yamaha Pulser || 4/8/12 || 1 || | + | | Yamaha Pulser || 4/8/12 || 1 || 4 || d4 || 2 || 450¥ || -- |
|- | |- | ||
|} | |} | ||
Line 1,353: | Line 1,242: | ||
| Remington 990 || 12/24/48 || 1-3d6 || 0 || 1 || 8 || d6 || 9 || 500¥ || 2H | | Remington 990 || 12/24/48 || 1-3d6 || 0 || 1 || 8 || d6 || 9 || 500¥ || 2H | ||
|- | |- | ||
− | | Ingram White Knight LMG || 24/48/96 || 2d8+1 || 2 || 3 || | + | | Ingram White Knight LMG || 24/48/96 || 2d8+1 || 2 || 3 || 50 || d8 || 24 || 1,400¥ || 2H, snapshot |
|- | |- | ||
− | | Ares Gatlin LMG || 24/48/96 || 2d8 || 2 || 4 || | + | | Ares Gatlin LMG || 24/48/96 || 2d8 || 2 || 4 || 200 || d8 || 32 || 2,400¥ || 2H, bulk, snapshot |
|- | |- | ||
| Panther Assualt Cannon || 30/60/120 || 4d8 || 15 || 1 || 15 || d12* || 30 || 5.000¥ || 2H, bulk, HW, smart, snapshot | | Panther Assualt Cannon || 30/60/120 || 4d8 || 15 || 1 || 15 || d12* || 30 || 5.000¥ || 2H, bulk, HW, smart, snapshot | ||
Line 1,494: | Line 1,383: | ||
COMMUNICATIONS GEAR</br> | COMMUNICATIONS GEAR</br> | ||
− | '''Comlink''' (50¥, Wt. ½ lb.): a basic model cellphone, PDA, and hand held computer. Standard build has a signal strength of 100 yards (50"), a Firewall of 1, and a Hardness of 6 against Matrix damage | + | '''Comlink''' (50¥, Wt. ½ lb.): a basic model cellphone, PDA, and hand held computer. Standard build has a signal strength of 100 yards (50"), a Firewall of 1, and a Hardness of 6 against Matrix damage. Includes a pair of AR Glasses or Contacts and a pair of skin tight AR Gloves. Pretty universial although styles and fads can increase the cost with no real enhancements (excepting looking cool to your friends). |
− | :''Upgrades'' include signal boost to 1,000 yards (500") for +500¥ and Satellite Uplink (low-Earth orbit) for +750¥ and weighs +4lbs. Enhanced Firewall rating of 2 for +1,000¥ and Firewall 3 for +5,000¥. Simsense rig upgrade cost +500¥ and allows Cold Emersion (or Hot Emersion with a Dajajack implant). The comlinks’ A.I. | + | :''Upgrades'' include signal boost to 1,000 yards (500") for +500¥ and Satellite Uplink (low-Earth orbit) for +750¥ and weighs +4lbs. Enhanced Firewall rating of 2 for +1,000¥ and Firewall 3 for +5,000¥. Simsense rig upgrade cost +500¥ and allows Cold Emersion (or Hot Emersion with a Dajajack implant). The comlinks’ A.I. can also take any Knowledge skill plus the Hacking skill at the following costs – d4 - 500¥, d6 – 2,500¥, d8- 7,500¥, d10 -20,000¥. These skills can be accessed as an Action or used for Support rolls (SWA pg. 106). Threat the comlink as an Extra. A comlink can also have Persona skills of Browse and Search without requiring a Persona and program Scan as normal cost (see Matrix). |
− | '''Cyber-Deck''' (5,000¥, Wt. 1lb): this custom built comlink can better handle the rigors of Matrix Programs and combat. Basic model includes a signal strength of 100 yards (50") and a Firewall of 2 | + | '''Cyber-Deck''' (5,000¥, Wt. 1lb): this custom built comlink can better handle the rigors of Matrix Programs and combat. Basic model includes a signal strength of 100 yards (50") and a Firewall of 2. It is also a hardness of 8 vs. Matrix damage. Automatically includes Emersion. Signal Boost upgrades and Firewall 3 cost as a standard comlink. Can also increase the Hardness for Matrix combat to 9 for +500¥ or 10 for +2,500¥. Can add the various skills as a comlink (Illegal).</br> |
'''Biometric Monitor''' (250¥, Wt. ½lb, gain +2 to Healing, only for First Aid, Useable by others who can read the display): Worn on a belt or arm shelve, it monitors your vital signs and grants a bonus with First Aid. Wireless communications can also alert teammates to conditions, etc.</br> | '''Biometric Monitor''' (250¥, Wt. ½lb, gain +2 to Healing, only for First Aid, Useable by others who can read the display): Worn on a belt or arm shelve, it monitors your vital signs and grants a bonus with First Aid. Wireless communications can also alert teammates to conditions, etc.</br> | ||
'''Subvocal Microphone''' (100¥, ½lb, allows wearer to communicate by moving throat muscles not speaking out loud; if comes into question, -4 Notice to hear conversation): Throat patch.</br> | '''Subvocal Microphone''' (100¥, ½lb, allows wearer to communicate by moving throat muscles not speaking out loud; if comes into question, -4 Notice to hear conversation): Throat patch.</br> | ||
Line 1,659: | Line 1,548: | ||
= CHAPTER SIX – VEHICLES AND DRONES = | = CHAPTER SIX – VEHICLES AND DRONES = | ||
− | Vehicles and Drones are using a heavily modified version of the system found originally in the Science Fiction Companion. I kind of re-built everything and using the ideas from | + | Vehicles and Drones are using a heavily modified version of the system found originally in the Science Fiction Companion. I kind of re-built everything and using the ideas from SWAE vehicles to add me so. |
− | All 'modern' (2060's) have the following installed automatically (included in the vehicle's price already): Broadcast 50” and | + | All 'modern' (2060's) have the following installed automatically (included in the vehicle's price already): Basic Alarm System (Opposed vehicle's ''Notice'' d10 against ‘carjacker’ Thievery or alarm is set off. Can be a loud or silent and includes informing the owner wirelessly), Broadcast 50” and Firewall 1. To increase a vehicles Broadcast to 1,000" (2,000 yards) costs +500¥. Adding a Satellite Uplink costs +500¥. Improved Firewalls cost +1,000¥ for rating 2 or +5,000¥ for rating 3 |
− | Vehicles that are large size or greater have extra Wounds as large sized creatures (see table on Beastiary Size, | + | Vehicles that are large size or greater have extra Wounds as large sized creatures (see table on Beastiary Size, SWAE pg. 179) |
Vehicles with Automated Control can follow very simply commands to drive that way, go to this destination, etc. depending on the 'Skills' it processes. | Vehicles with Automated Control can follow very simply commands to drive that way, go to this destination, etc. depending on the 'Skills' it processes. | ||
Line 1,682: | Line 1,571: | ||
| Medium || 3 || 30mph || +0 || 15 (4) || 10 || 5 || 5K¥ || Mini and compact cars | | Medium || 3 || 30mph || +0 || 15 (4) || 10 || 5 || 5K¥ || Mini and compact cars | ||
|- | |- | ||
− | | Large || | + | | Large || 4 || 25mph || +0 || 20 (5) || 15 || 10 || 10K¥ || Stock car frame |
|- | |- | ||
− | | Heavy || | + | | Heavy || 6 || 20mph || -1 || 25 (6) || 20 || 15 || 25K¥ || SUV, limo |
|- | |- | ||
− | | Super Heavy || | + | | Super Heavy || 8 || 15mph || -2 || 30 (7) || 30 || 20 || 50K¥ || Assault Tank, fighter aircraft |
|- | |- | ||
− | | Titan || | + | | Titan || 10 || 10mph || -2 || 35 (8) || 40 || 60 || 100K¥ || Train engine or car, sailing yacht |
|- | |- | ||
− | | Colossus || | + | | Colossus || 12 || 10mph || -3 || 40 (9) || 50 || 100 || 250K¥ || Heavy aircraft transport, jet liner |
|- | |- | ||
− | | Goliath || | + | | Goliath || 16 || 10mph || -4 || 45 (10) || 80 || 200 || 1M¥ || Light sea carrier ship |
|- | |- | ||
|} | |} | ||
Line 1,805: | Line 1,694: | ||
'''Toyota Gopher''': A somewhat inexpensive off-road sports recreational vehicle. Cost 26,000¥, Medium - Size 3, Handling +1, Top Speed 60mph, Toughness 15 (4), Crew 1+4, Mods (+4): Automation (Drive d6, Notice d6), Handling I, Off-Road, Speed III</br> | '''Toyota Gopher''': A somewhat inexpensive off-road sports recreational vehicle. Cost 26,000¥, Medium - Size 3, Handling +1, Top Speed 60mph, Toughness 15 (4), Crew 1+4, Mods (+4): Automation (Drive d6, Notice d6), Handling I, Off-Road, Speed III</br> | ||
'''Ford Spirit 115Ti''': A fairly popular sports car. Cost 29,500¥, Medium - Size 3, Handling +0, Top Speed 90mph, Toughness 15 (4), Crew 1+3, Mods (+4): Advanced Alarm, Automaton (Drive d6, Notice d6), Speed VI</br> | '''Ford Spirit 115Ti''': A fairly popular sports car. Cost 29,500¥, Medium - Size 3, Handling +0, Top Speed 90mph, Toughness 15 (4), Crew 1+3, Mods (+4): Advanced Alarm, Automaton (Drive d6, Notice d6), Speed VI</br> | ||
− | '''Ford Phantom 3R''': A common and popular family town car. Cost 26,000¥, Large - Size | + | '''Ford Phantom 3R''': A common and popular family town car. Cost 26,000¥, Large - Size 4, Handling +0, Top Speed 55mph, Toughness 20 (5), Wounds* +1, Crew 1+7, Mods (+11): Automaton (Drive d6, Notice d6), Speed III</br> |
− | '''Mercury Comet''': A fancier and sleeker sadan. Cost 36,000¥, Large - Size | + | '''Mercury Comet''': A fancier and sleeker sadan. Cost 36,000¥, Large - Size 4, Handling +1, Top Speed 75mph, Toughness 20 (5), Wounds* +1, Crew 1+7, Mods (+8): Advanced Alarm, Automaton (Drive d6, Notice d6), Handling I, Speed IV</br> |
− | '''Chrysler-Nissan Patrol-1''': Basic armored and boosted police cruiser. Cost 70,000¥ (Restricted), Large - Size | + | '''Chrysler-Nissan Patrol-1''': Basic armored and boosted police cruiser. Cost 70,000¥ (Restricted), Large - Size 4, Handling +1, Top Speed 25mph, Toughness 20 (5), Crew 1+3, Mods (+4): Advanced Alarm, Advanced Automations (Drive d10, Notice d10), Advanced Sensors (Low-Light and Thermal Vison), Armor II (Heavy), Armored Passenger Area (for 2 back passenges barrier between Toughness 16 (4)), Fewer Crew (+1), Handling I, Reinforced Chassis I, Speed V (also Broadcast 1,000" and Firewall 3)</br> |
− | '''Mitsubishi Nightsky''': A very sleek armored limousine for the corporate or criminal elite. Cost 147,000¥, Heavy - Size | + | '''Mitsubishi Nightsky''': A very sleek armored limousine for the corporate or criminal elite. Cost 147,000¥, Heavy - Size 6, Handling +1, Top Speed 70mph, Toughness 33 (10, Heavy), Wounds* +1, Crew 1+10, Mods (+8): Advanced Alarm, Advanced Automations (Drive d10, Notice d10), Armor II (Heavy), Fewer Crew (+1), Handling II, Luxury Featuresm, Reinforced Chassis II, Speed V (also Broadcast 1,000" with Satellite Uplink and Firewall 3) </br> |
[[File:SR.D5.StepV.jpg | 350px | left]] | [[File:SR.D5.StepV.jpg | 350px | left]] | ||
− | '''GMC Bulldog Step Van''': A common light security and cargo van. Cost 64,000¥, Heavy - Size | + | '''GMC Bulldog Step Van''': A common light security and cargo van. Cost 64,000¥, Heavy - Size 6, Handling -1, Top Speed 50mph, Toughness 29 (8, Heavy), Wounds* +1, Crew 1+5, Mods (+15): Advanced Alarm, Automaton (Drive d6, Notice d6), Armor I (Heavy), Fewer Crew (+2), Reinforced Chassis I, Speed III</br> |
− | '''Ares Roadmaster''' : A very large armored urban transport occasionally used by law enforcement and corporate security forces. Cost 110,000¥, Super Heavy - Size | + | '''Ares Roadmaster''' : A very large armored urban transport occasionally used by law enforcement and corporate security forces. Cost 110,000¥, Super Heavy - Size 8, Handling -2, Top Speed 45mph, Toughness 36 (11, Heavy), Wounds* +2, Crew 1+10, Mods (+23): Advanced Alarm, Automaton (Drive d6, Notice d6), Armor II (Heavy), Fewer Crew (+2), Reinforced Chassis I, Speed III</br> |
− | '''Nordkapp Zugmaschine Tractor''': This are massive drone operated semi-tracker trucks used for hauling over long distances. Their basic fuel (or electrical) systems allows them to operate for up to 48 hours without needing to stop and refuel or recharge. Cost 249,000¥, Titan - Size | + | '''Nordkapp Zugmaschine Tractor''': This are massive drone operated semi-tracker trucks used for hauling over long distances. Their basic fuel (or electrical) systems allows them to operate for up to 48 hours without needing to stop and refuel or recharge. Cost 249,000¥, Titan - Size 10, Handling +0, Top Speed 40mph, Toughness 35 (8), Wounds* +2, Crew 1?, Mods (+40): Advanced Alarm, Advanced Automations (Drive d10, Notice d10), Advanced Sensors (Low-Light and Thermal Vison), Extra Fuel Tanks (or Batteries) VI, Fewer Crew (+15), Handling II, Speed IV (also Broadcast 1,000" with Satellite Uplink and Firewall 3). Standard Trailer pulled Tough 24 (8, heavy), Wounds* +2 and can hold up to 24 tons of cargo.</br> |
HOVERCRAFT</br> | HOVERCRAFT</br> | ||
− | '''GMC Everglades''': A light utility hovercraft transport. Cost 44,000¥, Large - Size | + | '''GMC Everglades''': A light utility hovercraft transport. Cost 44,000¥, Large - Size 4, Handling +0, Top Speed 45mph, Toughness 20 (5), Wounds* +1, Crew 2+8, Mods (+8): Automation (Drive d6, Notice d6), Hover, Speed I (also Broadcast 1,000")</br> |
− | '''GMC Beachcraft''': An armored patrol craft, normally used around seaports and the coast (standard weapon mounts include four heavy machine guns). Cost 128,000¥ (Restricted), Heavy Size - | + | '''GMC Beachcraft''': An armored patrol craft, normally used around seaports and the coast (standard weapon mounts include four heavy machine guns). Cost 128,000¥ (Restricted), Heavy Size -6, Handling -1, Top Speed 30mph, Toughness 31 (10, Heavy), Wounds* +1, Crew 6+4, Mods (+12): Advanced Alarm, Advanced Automations (Drive d10, Notice d10), Advanced Sensors (Low-Light and Thermal Vison), Armor II (Heavy), Fewer Crew (+1), Handling I, Reinforced Chassis I, Speed III (also Broadcast 1,000" and Firewall 3)</br> |
WATERCRAFT</br> | WATERCRAFT</br> | ||
− | '''Yongkang Gala Trinity''': This small, fast-moving speedboat is known as a popular smuggler’s craft. Cost 56,000¥, Large - Size | + | '''Yongkang Gala Trinity''': This small, fast-moving speedboat is known as a popular smuggler’s craft. Cost 56,000¥, Large - Size 6, Handling +0, Top Speed 75mph, Toughness 20 (5), Wounds* +1, Crew 1+4, Mods (+5): Advanced Alarm, Automation (Boating d6, Notice d6), Fewer Crew (+1), Speed X, Watercraft (also Broadcast 1,000" with Satellite Uplink)</br> |
− | '''Vulkan Electronaut''': A recreational civilian mini-submarine. Can remain submerged for around 8 hours. Cost 112,500¥ (Restricted), Large - Size | + | '''Vulkan Electronaut''': A recreational civilian mini-submarine. Can remain submerged for around 8 hours. Cost 112,500¥ (Restricted), Large - Size 4, Handling +0, Top Speed 30mph (15mph when submerged), Toughness 22 (4), Wounds* +1, Crew 4+6, Mods (+7): Advanced Alarm, Advanced Automation (Boating d10, Notice d10), Reinforced Chassis I, Sonar, Submersibe, Speed III, Watercraft (also Broadcast 1,000")</br> |
− | '''Samuvani Otter''': A mid-size craft is mainly used for pleasure boating, fishing, light hauling, and utility work. Cost 57,000¥, Heavy - Size | + | '''Samuvani Otter''': A mid-size craft is mainly used for pleasure boating, fishing, light hauling, and utility work. Cost 57,000¥, Heavy - Size 6, Handling -1, Top Speed 35mph, Toughness 25 (4), Wounds* +1, Crew 2+12, Mods (+14): Automation (Boating d6, Notice d6), Speed V, Watercraft (also Broadcast 1,000" with Satellite Uplink)</br> |
− | '''Morgan Cutlass''': A fast and armored patrol craft. Cost 207,000¥ (Restricted), Super-Heavy Size - | + | '''Morgan Cutlass''': A fast and armored patrol craft. Cost 207,000¥ (Restricted), Super-Heavy Size -8, Handling -2, Top Speed 55mph, Toughness 36 (11), Wounds* +2, Crew 12+8, Mods (+20): Advanced Alarm, Advanced Sensors (Low-Light, Thermal Vision), Armor II, Automation (Boating d6, Notice d6), Reinforced Chassis I, Sonar, Speed IX, Watercraft (also Broadcast 1,000" with Satellite Uplink, Firewall 3)</br> |
− | '''MT Sea Nymph''': A popular pleasure cruise yacht of the ultra-rich. Cost 529,000¥, Colossus - Size | + | '''MT Sea Nymph''': A popular pleasure cruise yacht of the ultra-rich. Cost 529,000¥, Colossus - Size 12, Handling -2, Top Speed 30mph, Toughness 37 (10), Wounds* +3, Crew 10+30, Mods (+4): Advanced Alarm, Advanced Automation (Boating d10, Notice d10), Fewer Crew (+15), Food Storage (2,000 mandays), Handling II, Living Space X, Luxury Features, Reinforced Chassis I, Sonar, Speed V, Watercraft (also Broadcast 1,000" with Satellite Uplink, Firewall 3)</br> |
AIRCRAFT</br> | AIRCRAFT</br> | ||
− | '''Northup Wasp''': A small, one person attack helicoper. Unused mods are generally fitted with weapon mounts (Standard is 2 missile launchers and a chin-mounted chaingun). Cost 149,000¥ (Restricted), Large - Size | + | '''Northup Wasp''': A small, one person attack helicoper. Unused mods are generally fitted with weapon mounts (Standard is 2 missile launchers and a chin-mounted chaingun). Cost 149,000¥ (Restricted), Large - Size 4, Handling -1, Top Speed 120mph, Toughness 24 (7), Wounds* +1, Crew 1, Mods (+6): Advanced Alarm, Advanced Automations (Drive d10, Notice d10), Advanced Sensors (Low-Light, Thermal Vison), Aircraft, Helicoper, AMCM, Armor I, ECCM, Fewer Crew (+2), Radar, Reinforced Chassis I, Rigger Upgrade, Speed I (also Broadcast 1,000”, Firewall 2)</br> |
− | '''Hughes Stallion''': A civilian utility helicopter. Cost 135,000¥, Super-Heavy - Size | + | '''Hughes Stallion''': A civilian utility helicopter. Cost 135,000¥, Super-Heavy - Size 10, Handling -3, Top Speed 160mph, Toughness 30 (7), Wounds* +2, Crew 2+9, Mods (+25): Advanced Alarm, Aircraft, Helicoper, Automations (Drive d6, Notice d6), Fewer Crew (+2), Speed II (also Broadcast 1,000”)</br> |
− | '''Cessna C750''': Cost 173,000¥, Super-Heavy - Size | + | '''Cessna C750''': Cost 173,000¥, Super-Heavy - Size 8, Handling -2, Top Speed 350mph, Toughness 30 (7), Crew 2+18, Mods (+23): Advanced Alarm, Aircraft, Propeller, Automations (Drive d6, Notice d6), Radar, Speed IV (also Broadcast 1,000” with Satellite Uplink)</br> |
− | '''GMC Banshee''': This is a military transport that has become popular with smugglers. Extra spece is used for cargo and weapon mounts (standard is a heavy auto-cannon turrent mount and 5 tons of cargo). Cost 502,000¥ (Military), Titan - Size | + | '''GMC Banshee''': This is a military transport that has become popular with smugglers. Extra spece is used for cargo and weapon mounts (standard is a heavy auto-cannon turrent mount and 5 tons of cargo). Cost 502,000¥ (Military), Titan - Size 10, Handling +0, Top Speed 220mph, Toughness 41 (12, Heavy), Wounds* +2, Crew 60, Mods (+20): Advanced Alarm, Advanced Automations (Drive d10, Notice d10), Advanced Sensors (Low-Light, Thermal Vison), Aircraft, Vector Thrust, AMCM, Armor II (Heavy), Fewer Crew (+10), Handling II, Reinforced Chassis I, Radar, Rigger Uplink, Speed I, Stealth System (also Broadcast 1,000” with Satellite Uplink, Firewall 3) </br> |
[[File:SR.D5.Banshee.jpg]] | [[File:SR.D5.Banshee.jpg]] | ||
− | '''Federal-Boeing Commuter''': A very-short take-off and landing super-sonic jumbo-jet. Cost 1,289,000¥ (Restricted), Goliath Size - | + | '''Federal-Boeing Commuter''': A very-short take-off and landing super-sonic jumbo-jet. Cost 1,289,000¥ (Restricted), Goliath Size -16, Handling -4, Top Speed 1,000mph, Toughness 45 (10), Wounds* +4, Crew 20+180, Mods (+66): Advanced Alarm, Advanced Automations (Drive d10, Notice d10), Advanced Sensors (Low-Light, Thermal Vison), Aircraft, Jet, Radar, Speed IV (also Broadcast 1,000” with Satellite Uplink, Firewall 3) </br> |
== DRONES == | == DRONES == | ||
− | Drones are built as Robots from the SFC | + | Drones are built as Robots from the SFC pg. 37 with the following changed: Base cost 5,000¥, Modifiers 8 and they are not Sentient (just advanced AI software). This also means that Drones use Skills normally and do not have to purchase separate systems for automated control, etc. They do however use Boating, Drive or Piloting, instead of Athletics, for such skill checks. They have a normal Pace (-1 per size penalty), Parry, Toughness. |
Drones are '''''Construct''''' (+2 to recover from being Shaken; does not breathe; immune to poison and disease; ignores one level of wound penalties) and have '''''Environmental Weakness (Electricity)''''' (Drones suffer +2 damage from electrical attacks). | Drones are '''''Construct''''' (+2 to recover from being Shaken; does not breathe; immune to poison and disease; ignores one level of wound penalties) and have '''''Environmental Weakness (Electricity)''''' (Drones suffer +2 damage from electrical attacks). | ||
Line 1,843: | Line 1,732: | ||
Drones use the Mods as found in vehicles but any drone smaller then Size 1 reduce cost by ½ for most specialized systems. Drone aircraft use the basics for helicoper (call rotor), jet, prop and VTOL systems but halve the base top speed and the Speed increase of each additional 'Mod'. Other drone movement are treated as 'walking' with a basic Pace as follows - Hover 8, Tracked 4, Watercraft 6 (and Amphibious and Sumersables as normal, half or one-quarter). | Drones use the Mods as found in vehicles but any drone smaller then Size 1 reduce cost by ½ for most specialized systems. Drone aircraft use the basics for helicoper (call rotor), jet, prop and VTOL systems but halve the base top speed and the Speed increase of each additional 'Mod'. Other drone movement are treated as 'walking' with a basic Pace as follows - Hover 8, Tracked 4, Watercraft 6 (and Amphibious and Sumersables as normal, half or one-quarter). | ||
− | Drones are always Extras, except when a Rigger is jacked-in and directly controlling it. All drones automatically come with the following systems (at no cost or mods): Broadcast 100”, | + | Drones are always Extras, except when a Rigger is jacked-in and directly controlling it. All drones automatically come with the following systems (at no cost or mods): Basic Alarm System (Opposed Notice d10 vs. Stealth of hacker or alarm sounded), Broadcast 100”, Firewall 1, and Rigger Upgrade. |
Depending on the Drone's Smarts score determines how well it can operate independently (on auto-pilot). Drones will responed to its owners commands, be they verbal or wirelessly to the best of their abilities. GM has finally say. | Depending on the Drone's Smarts score determines how well it can operate independently (on auto-pilot). Drones will responed to its owners commands, be they verbal or wirelessly to the best of their abilities. GM has finally say. | ||
Line 1,925: | Line 1,814: | ||
[[File:SR.D5.Team5.jpg | 700px]] | [[File:SR.D5.Team5.jpg | 700px]] | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− |