Whisperspace

Rules Reference

Hacking

Whether you’re trying to break into a high-security corporate database, access the security camera feed from a convenience store, or force security drones to view you and your allies as friendlies, hacking can be an incredibly powerful tool, depending on the campaign setting and goals.

Example System Tiers and DCs

Tier

System Type

Hacking DC

0

Public terminals, info kiosks

6

1

Basic civilian tech (locks, doors)

8

2

Small business systems, cameras

10

3

Corporate terminals, basic ship systems

12

4

Secure corp nodes, security drones

14

5

Military-grade systems, ship AI

16

6+

Black Ops secure servers, hostile AI

18 or above

Optional Rule: Simple Hacking

To keep things simple and gameplay quick, the GM may choose to use Simple Hacking for all (or some) Hacking skill checks.

Simple Hacking consists of making a single Hacking skill check (the DC per tier level is determined by the table above). On a success, the effect the character wished to achieve is achieved. On a failure, countermeasures kick in or the hack simply fails.

For every tier of hacking equipment a character uses to help with this hack, a character receives a +1 bonus to her roll.

Hacking Sequence

Some coders say hacking is like an intricate dance: there are specific steps to follow and, if you skip any, the results could be bad. Each step requires a Hacking skill check against the DC of the system you’re trying to break into (taking into account any modifiers from software used and previous steps in the sequence).

  1. Scan (optional)

  1. Identify nearby systems, node type, security

  2. Grants insight into System Tier of target system, its current Alert Level, as well as possible countermeasures

  1. Bypass (optional)

  1. Get around static defenses (firewalls, encryption, etc)

  2. Success reduces the DC of subsequent hacking checks by 1

  1. Spoof (optional)

  1. Trick the system into believing you’re a valid user

  2. Success grants a Bonus die for use on the Main Hack check.

  1. Main Hack

  1. Perform your goal: disable cameras, steal data, etc

  2. Determines the overall success of your hack

  1. Cover tracks (optional)

  1. Prevent or delay detection of the intrusion

Skipping Steps

Every step except the Main Hack is optional and players may choose to skip them to save time or because they do not have appropriate gear. Each skipped step adds:

  • One Penalty Die to Main Hack check

  • Increased Alert Level

Countermeasures & Alert Level

Many systems include either (or both) passive and active countermeasures to safeguard them from unwanted intrusion. These range from simple access logs that prove someone was in the system to advanced active countermeasures like Spikes, which can disrupt the hack, detect the location of the hacker, or even damage the hacker’s rig.

These countermeasures work together to keep systems safe. They only trigger when illicit activity is detected - this is known as the system’s Alert Level.

For each failed (or skipped) step, the system’s Alert Level goes up by 1. When it reaches 5, the system is fully aware it is being infiltrated and will use its countermeasures to full effect.

Some countermeasures may activate before the system’s Alert Level gets to 5, and some systems have a constant alert level higher than 0 even before the hacking begins.

Hacking Gear

Hacking gear comes in two types: hardware and software. For a full list, see the section in Equipment & Gear

Hardware (Rigs)

Rigs have tiers, just as enemy systems have tiers. To hack into a system, the hacker’s rig tier must be equal to or greater than the system’s tier. To use software on the rig, the rig tier must be equal to or greater than the software’s tier.

Rigs are limited; most can only handle a small number of programs loaded at once. Loading or unloading a program takes ten minutes, so choose your loadout carefully.

Software

Software is really the backbone of any hacking attempt. These are code snippets and scripts used to perform specific functions during a hack. To perform a hacking Scan, for example, a character is required to have software that can perform the Scan active on his rig. Many software packages allow more than one hack type, and some even provide bonuses to those hacks.

A character may attempt to use software of a lower tier than the system he is breaking into during a hack, if he wishes. Doing so increases the DC of the hack by the difference in tiers. For example, attempting to use a Tier 1 scan program on a Tier 3 system would result in a DC of 11 (base DC for hacking a Tier 3 system is 9, the difference between Tier 1 and Tier 3 is two, 9 + 2 = 11). Conversely, using software of a higher tier than the system reduces the DC by the difference in tiers.

Data Decryption

Sometimes, characters need to decrypt data. Yay!