Hack Actions

Hack Action Types:

  • Core – Requires breaking through the Core Defense to work.  These only work on AI and DNI users (both tech and magic-based).  Some are viruses while some are CyberHacks. Ones not listed as one or the other are permanent alterations.
  • CyberHack – CyberHacks are not viruses. They are direct actions one can commit on a target. CyberHacks are both offensive and defensive and can be used to strip down Barriers. For the entire duration of the effect, the portfolio slot is in constant use, so it cannot be used or swapped and the effect can not be used again while still in operation. CyberHacks cease functioning if you lose your connection to the target.
  • Surface – Surface actions are not invasive and don’t need to crack barriers to operate. They deactivate if you lose your connection to the target.
  • Virus – Not like a programmed virus, this is an action that remains in the system after the Hacker has committed said action. The hacker does not need to continually use that action for it to continue functioning. She can do other things…the virus type, after being instigated, can be ignored. Viruses can have triggers and, of course, be used in larger compilation viruses. Unlike compilation viruses, hack viruses don’t act with their own skill. The Hacker must place it in a position for it do its job. A virus can be left alone and initiated several times, so not occupying the portfolio slot. A Virus will still operate even if the you lose your connection to the target if you have successfully used the virus.

Hack DC: The Hackcraft DC the Hacker must defeat to activate the action. Success or not uses the attack slot. You may not take 10 or 20 on Hack Actions except for Surface actions, where you can take 10.

Time: How long to commit the action.

Defense Targeted: Some actions can be resisted by the target.  If a defense is targeted, your Hackcraft check to use the Action must beat the target’s defense as well as the Hack DC.

Affects: This is what can be targeted by this hack action: AI, DNI, Personal, or Systems

  • AI – This means that the action can target an Artificial Intelligence.
  • DNI – This means that the action can target someone utilizing a Direct Neural Interface, regardless of the kind of DNI.
  • Personal – This action can only effect yourself – be it yourself via DNI or the System you are using.
  • Systems – This means that the action can target hardware.  This is utilized to attack hackers who don’t use a DNI, as well as mess with actual equipment.

Satellites: Some hack actions require linking with a satellite. Many satellites have attack barriers to prevent someone from trying to hijack the system completely. However, the hack actions that use satellites are not really taking control, more like the action is using a satellites overhead to utilize its primary functions. Attempting to Hijack a specific satellite (like a military spy satellite that transmits a specific kind of data) does require hacking that satellite specifically, requiring diving and barrier penetration.

Note: Technically, one can self inflict their hack actions on themselves (ones that are not surface). They must still roll against the Hack DC.

HACK ACTIONS BY DC
14 – Barrier Stripper, Encrypt Comms, Hack Boost, Relay Text, Tacnet, Target Arrow
18 – Blur, DoS Attack, Ghost Sound, ID Scramble, Mass Target Arrow, Message, Monitor, Satellite Bounce, Virtual Environment
22 – Alarm, Electromagnetic Pulse, False Vision, Lock Out, Popup Infestation, Slow
26 – Charm, Confusion, Darkness, Disguise Self, Hijack Electronics, Infiltrate Communications, Security Wipe, Speech-Jack, Steal/Delete Program/Information, Temporary Hack Resistance
30 – Binding, Detect Invasion, Displacement, Floating Image, Satellite Detection, Silence, Surveillance
34 – Alert Barrier, Barrier Brace, Invisibility, Mind Blank, Minor Memory Alteration, Transmitter
38 – Energy Damage, Hold, Minor Modify Memory
42 – Major Modify Memory, Total Override
46 – Backdoor, Greater Modify Memory, Reality Fabrication

Alarm

    Type: Surface
    Hack DC: 22
    Time: Standard Action
    Duration: 2 hours per character level of user
    Affects: All.  Target must have a visual or audial sensor.
    An alarm alerts you (and only you) to something it is programmed to detect on a visual or audio device. This is either a specific voice, a word, or if a face crosses into a camera. There is a 50% chance that the sensor will not pick up a face however. If you are an AI or use a DNI, you note a single mental “ping” that awakens you from normal sleep but does not otherwise disturb concentration. If you use a System to activate this action, the “ping” is an alert on that system which functions the same as if you were an AI or using DNI, but it is only noticeable by you if you have an active HUD.

Alert Barrier

    Type: Surface
    Hack DC: 34
    Time: Standard Action
    Duration: 1 round per character level of the user
    Affects: Personal
    Your gains a +5 to all barrier levels for the duration.

Backdoor

    Type: Virus/Core
    Hack DC: 46
    Time: Standard Action
    Duration: 1 day per character level of the user
    Affects: DNI (must defeat Core Barrier), Systems.  Target must be wireless-capable.
    You create a hole in the target’s defenses. It allows access even if the target disconnects from wireless. It accomplishes this by simulating the wireless disconnect but in reality remaining online – however it will only accept wireless connections from you while disconnected. You still have to crack the target’s Barriers but the target cannot escape by disconnecting.

Barrier Brace

    Type: Virus
    Hack DC: 34
    Time: Standard Action
    Duration: 1 Round per character level of the user
    Affects: All
    Usually, a barrier is broken for one hacker only when they break the firewall. However, if, after breaking through the barrier, the Hacker initiates a brace virus, a hole generates, allowing anyone else to travel through that barrier as long as the virus functions.

Barrier Stripper

    Type: Virus
    Hack DC: 14
    Time: Standard Action
    Duration: 1 Round
    Affects: All
    Being able to rip apart barriers is something that all hackers learn to do on top of just being able to break through. Most get better with time. After successfully creating a Barrier stripper, the Barrier being attacked receives a 1d4–1 (min 0) penalty to its surface barrier defense for a full round.
    Note: This is a popular component in Compilation Viruses. It lasts for a full round so others can initiate them so another can utilize the decreased number. However, the reduction returns to normal when the hacker’s round is up again. This ability compounds, allowing many hackers to team up to take down a barrier. However, the barrier can only be dropped to half its total Defense. It also will only attack one barrier per attempt. Multiple barriers require multiple attempts.

Binding

    Type: Virus/Core
    Hack DC: 30
    Time: Standard action
    Duration: 1 round per character level.
    Defense Targeted: Will
    Affects: DNI (must defeat Core barrier), Systems
    This action restrains the target.  Each round, the target can attempt a Use Computer check to purge the virus from its system, the DC for this check is the result of your Hackcraft check made to activate this action.  For Systems, this locks motor systems into place, for DNI users this freezes their voluntary motor systems – however they are not considered paralyzed.

Blur

    Type: CyberHack
    Hack DC: 18
    Time: Standard Action
    Duration: 1 min per character level of the user
    Affects: All
    The Hacker denotes one target in the subject’s view. Their outline appears blurred, shifting and wavering. This distortion grants the target concealment (20% miss chance). Opponents that cannot see the subject ignore the effect (though fighting an unseen opponent carries penalties of its own).  Each round, the target can attempt a Use Computer check to purge the virus from its system, the DC for this check is the result of your Hackcraft check made to activate this action.

Charm

    Type: Virus/Core
    Hack DC: 26
    Time: Standard Action
    Duration: 1 hour per character level
    Defense Targeted: Will
    Affects: AI
    This charm makes an AI regard you as its trusted friend and ally (treat the target’s attitude as friendly). If the AI is currently being threatened or attacked by you or your allies, however, it receives a +10 bonus to its Will defense.
    The effect does not enable you to control the charmed AI as if it were an automaton, but it perceives your words and actions in the most favorable way. You can try to give the subject orders, but you must win an opposed Charisma check to convince it to do anything it wouldn’t ordinarily do. (Retries are not allowed.) An affected AI never obeys suicidal or obviously harmful orders, but it might be convinced that something very dangerous is worth doing. Any act by you or your apparent allies that threatens the charmed AI breaks the effect. You must speak the AI’s language to communicate your commands.

Confusion

    Type: CyberHack/Core
    Hack DC: 26
    Time: Standard Action
    Duration: 1 round per character level of the user
    Defense Targeted: Will
    Affects: AI, DNI
    This causes the targets to become confused, making them unable to independently determine what they will do. Roll on the following table at the beginning of each subject’s turn each round to see what the subject does in that round.
    A confused character who can’t carry out the indicated action does nothing but babble incoherently. Attackers are not at any special advantage when attacking a confused character. Any confused character who is attacked automatically attacks its attackers on its next turn, as long as it is still confused when its turn comes. Note that a confused character will not make attacks of opportunity against any creature that it is not already devoted to attacking (either because of its most recent action or because it has just been attacked).

    D% Behavior
    01-20 Act normally
    21-50 Do nothing but babble incoherently
    51-70 Flee away at top possible speed.
    71-100 Attack nearest creature

Darkness

    Type: CyberHack
    Hack DC: 26
    Time: Standard Action
    Duration: 1 minute per character level of the user
    Defense Targeted: Will
    Affects: All
    You cause remove all visual input from the target, rendering them blind.  This is obviously of little use against systems that have no use for visual input.  Each round, the target can attempt a Use Computer check to purge the virus from its system, the DC for this check is the result of your Hackcraft check made to activate this action.

Detect Invasion

    Type: Virus
    Hack DC: 30
    Time: Attack action
    Duration: 24 hours
    Affects: Personal
    You immediately become aware of any attempt to hack your system. A successful roll to operate the program means all invaders must beat a Use Computer roll of DC30 + your character level or have their hacking detected by the system, giving time for a back-hack or shutdown.

Disguise Self

    Type: Virus
    Hack DC: 26
    Time: Standard Action
    Duration: 5 minutes per character level of the user
    Affects: All
    You make yourself—including clothing, armor, weapons, and equipment—look different. You can seem 0.3 meters shorter or taller, thin, fat, or in between. You cannot change your body type. Otherwise, the extent of the apparent change is up to you. You could add or obscure a minor feature or look like an entirely different person. You get a +15 bonus on Deception checks made to disguise your appearance vs to that subject.  A single use of this hack action only affects a single target. This can also be used to fool biometric security, but you must have access to a valid set of biometrics to duplicate them with this action.  Obviously, this only works with electronic sensors.

Displacement

    Type: Virus
    Hack DC: 30
    Time: Standard Action
    Duration: 1 round per character level of the user
    Affects: All
    You appear to be about half a meter feet away from your true location. You benefit from a 50% miss chance as if having total concealment. However, unlike actual total concealment, displacement does not prevent enemies from targeting you normally. This only affects electronic sensors, and only affects one target at a time.

DoS Attack

    Type: Surface
    Hack DC: 18
    Time: Standard Action
    Duration: Instant and 1 Round
    Affects: AI, Computer, or target with a DNI
    You flood the target with an overload of information, spamming them with junk code in a rather crude, brute-force attempt to overwhelm them. If your Hackcraft check exceeds the target’s Surface defense then they cannot perform any Hackcraft actions until they spend a standard action to reconfigure their firewalls. A target can only be affected by this action once per encounter or once per minute if outside a combat encounter.

Electromagnetic Pulse

    Type: CyberHack
    Hack DC: 22
    Time: Attack action
    Area: object effected
    Target: A power source.
    Affects: Systems
    You create a power surge in the device that ruins electronic circuitry within. Any computer, telephone, television, or other device with a computer processor inside ceases to function immediately, and the contents of external memory and other storage media connected are scrambled.
    The pulse affects only devices with circuitry connected to the power source, not everything that uses electricity. Ordinarily the lights stay on, although their electronic switches might not function. Automobiles shut down if they can be hacked in externally.

    Repair Task (Example) Repair Parts Cost Repair Time
    Simple Processors (cars, elevator controls) 500 Credits 10 Minutes
    Complex Processors (computers, home theaters) 2000 Credits 1 Hour
    Data Recovery (scrambled storage media) 2000 Credits 2 Hours

    You can jury-rig repairs more quickly and cheaply, but the repairs may not last. See the description of the Mechanics skill for details. Gear with military availability is immune to this hack action, as is any hardened gear (which adds +25% to the cost of the gear).

Encrypt Comms

    Type: Surface
    Hack DC: 14
    Time: Standard Action
    Duration: 1 minute per character level of the user
    Affects: All
    Special: Two targets must roll.
    You and another target decide to go on encryption. Both you and the target must then beat the DC and then they can carry on a private communication that cannot be overheard. Not even Infiltrate Communications will pick this up.
    Normal: Usually, anyone can have a private conversation via comlinks but someone may have initiated an Infiltrate Communications action. If one is not worried about a certain individual overhearing, they can talk one on one without using this action.

Energy Damage

    Type: CyberHack/Core
    Hack DC: 38
    Defense Targeted: Fortitude
    Affects: DNI
    The neural pathways of the target are scrambled, dealing 2d4 temporary INT damage. This damage recovers over time at a rate of 1 per day (2 per day with full bed rest).
    SPECIAL: Energy Damage does not require breaking through the Barrier but each barrier not broken (including the Core Barrier) absorbs one point of damage.

False Vision

    Type: Virus/Surface
    Hack DC: 22
    Time: Standard Action
    Duration: 1 hour per character level of the user
    Affects: All
    The action creates a static image in a certain location. This can be as small as a weapon or as large as a building. The moment the target interferes with it, however, the illusion has been revealed and the virus is kicked out. The image remains static. The image must be able to fit there. If it doesn’t seem to fit (Like a car floating in mid air, a building too small for anyone to fit), then the illusion is shattered but the target can maintain the illusion of it does not interfere where their lives. If the illusion is not intentional jarring without any invasive effect, then it can be a surface action, not requiring a barrier penetration.

Floating Image

    Type: Virus
    Hack DC: 30
    Time: 1 Move Action
    Duration: 10 minutes per character level of the user
    Affects: All
    This functions like False Vision, except this creates an image that can track with an object or move on given commands when the action is initiated.  The image can be anything and will not disrupt if unrealistic, unlike False Vision. It stays there if proven real or not.

Ghost Sound

    Type: CyberHack
    Hack DC: 18
    Time: Standard Action
    Duration: 1 round per character level of the user
    Affects: All.  Target must have some form of audio sense.
    Ghost sound allows you to create a volume of sound that rises, recedes, approaches, or remains at a fixed place. You choose what type of sound ghost sound creates when committed the action and cannot thereafter change the sound’s basic character.
    The volume of sound created depends on your level. You can produce as much noise as four normal humans per character level of the user (maximum twenty humans). Thus, talking, singing, shouting, walking, marching, or running sounds can be created. The noise a ghost sound produces can be virtually any type of sound within the volume limit. A horde of rats running and squeaking is about the same volume as eight humans running and shouting. A roaring lion is equal to the noise from sixteen humans, while a roaring category three spirit beast is equal to the noise from twenty humans.

Hack Boost

    Type: Surface
    Hack DC: 14
    Time: Swift Action
    Affects: Personal
    Duration: Until the end of the user’s next turn
    After initializing this action, the hackers next Hackcraft or Use Computer roll gains a +4 insight bonus.  This bonus stacks with itself, up to +16, allowing you to use Hack Boost multiple times to boost your roll.  This bonus must be used before the end of your next turn.

Hijack Electronics

    Type: Cyberhack
    Hack DC: 26
    Time: Standard Action
    Duration: 1 minute per character level of the user
    Affects: Systems
    You take control of electronics hooked into that system. This includes machinery, gun emplacements, and cameras. You cannot make them do something they are incapable of doing. For example, with cameras you see what they see and can move the camera but you cannot short them out, turn them off, or override their visual input.

Hold

    Type: CyberHack/Core
    Hack DC: 38
    Time: Standard Action
    Duration: 1 round per character level of the user
    Defense Targeted: Fortitude
    Affects: DNI
    The subject becomes paralyzed and freezes in place. It is aware and breathes normally but cannot take any actions, even speech. Each round, the target can attempt a Use Computer check to purge the virus from its system, the DC for this check is the result of your Hackcraft check made to activate this action.

ID Scramble

    Hack DC: 18
    Type: Surface
    Time: Standard Action
    Duration: 1 round per character level of the user
    Affects: Personal
    You scramble your System ID, so back-hacks or hacks into your system or DNI do not give up your ID.

Infiltrate Communications

    Type: CyberHack
    Hack DC: 22
    Time: Standard Action
    Duration: 1 minute per character level of the user
    Affects: All
    You never dive too deep, but simply monitor outgoing communication from the target. This is better than tapping into transmission (by monitoring the frequency) as they are often scrambled. You hear all incoming and outgoing communication that target. The only communication it cannot overhear is communications protected by the Encrypted Comms action.

Invisibility

    Type: CyberHack
    Hack DC: 34
    Time: Standard Action
    Duration: 1 minute per character level of the user
    Affects: All.  Target must have some form of visual sense.
    You erase one chosen subject from the target’s optical input, vanishing from sight, even from darkvision. If you are carrying gear, that vanishes, too. Items dropped or put down while invisible become visible; items picked up disappear if tucked into the clothing or pouches worn. Of course, the subject is not silenced, and certain other conditions can render the recipient detectable (such as stepping in a puddle). The effect ends if you attack any creature. Causing harm indirectly is not an attack. Thus, an invisible being can open doors, talk, eat, climb stairs, cut the ropes holding a rope bridge while enemies are on the bridge, remotely trigger traps, open a door to release attack dogs, and so forth. If you attack directly, however, you immediately becomes visible along with all your gear.

Lock Out

    Type: CyberHack
    Hack DC: 22
    Time: Standard Action
    Duration: 1 round per character level of the user
    Affects: All
    While breaking into a system, regardless of its type, you throw a wall behind you preventing others from breaking in as well. For as long as the action lasts or until you leave or are kicked out of the target, no one else but you can access that system. This prevents rivals from trying to compete and or force you out or initiate an attack on you from inside the target. This wall is not impenetrable and is equal to the user’s highest Barrier number.

Message

    Hack DC: 18
    Type: Virus
    Time: Full Round Action
    Target: One valid target per character level of the user
    Duration: Permanent until removed or deactivated
    Defense Targeted: Will
    Affects: All
    This hack that implants a subtle program that sends out a message that’s delivered when a specified event occurs. The message, which must be 25 words or less, is delivered in a non-evasive manner into the subject’s visual cortex or in a manner appropriate to the device targeted by the spell. For example, an electronic traffic sign displays the message for all motorists to see.
    The virus functions when specific conditions are fulfilled according to your command as set in the virus. Commands can be as general or specific as desired, although only visual and audible triggers can be used such as the following: “Deliver the message when a man in a dark suit walks past with a gun drawn.” Triggers react to what appears to be the case. Audible triggers can be keyed to general types of noises (footsteps, elevator music) or to a specific noise or a spoken work. Actions can serve as triggers if they are visible or audible. For example, “Deliver the message when any creature picks up the talking doll” is an acceptable command if the creature is visible. The object, however, has to be able to detect such a occurrence. A message cannot distinguish class, level, Hit Dice, or allegiance – unless the allegiance is obvious (such as a uniform, rank insignia, or service branch insignia).  Another example condition would be “deliver this message to the first authenticated user to use this terminal.”

Mind Blank

    Type: Virus
    Hack DC: 34
    Time: Standard Action
    Duration: 1 hour per character level of the user
    Affects: Personal
    You are protected from all hack attacks that detect, influence, or read emotions or thoughts. This protects against all mind- affecting hack attacks and effects as well as information gathering by hack attacks or viruses.

Minor Memory Alteration

    Type: CyberHack/Core
    Hack DC: 34
    Time: Standard Action
    Duration: Permanent
    Affects: AI (must defeat Core barrier), System
    You alter one memory in a minor way. The memory can be anywhere in storage—any location in the external memory, or any memory in an AI’s personal memory. The memory is not deleted or radically altered. Only one aspect is slightly modified. A door can be closed when open. Someone can turn left instead of right. If someone sees and remembers a map, said map may be altered to look different (removing a hatch, adding bars, etc). Someone’s appearance can be altered. A street sign renamed. The effect must be minor enough for to not convey suspicion that one’s memory has been altered in that way.

Modify Memory, Greater

    Type: Core
    Hack DC: 46
    Time: 1 round; see text
    Duration: Permanent
    Saving Throw: None
    Affects: AI
    You reach into the subject’s mind and modify as many months as the hackers character level in one of the following ways.

    • Eliminate all memory of an event the subject actually experienced.
    • Change the details of an event the subject actually experienced.
    • Implant a memory of an event the subject never experienced.

    Initiating the action takes 1 round. You then proceed by spending as much as 5 hours visualizing the memory you wish to modify in the subject. If your concentration is disturbed before the visualization is complete, the action is lost.
    A modified memory does not necessarily affect the subject’s actions, particularly if it contradicts the their natural inclinations.

Modify Memory, Major

    Type: Core
    Hack DC: 42
    Time: 1 round; see text
    Duration: Permanent
    Affects: AI
    You reach into the subject’s mind and modify as many hours as the hackers character level in one of the following ways.

    • Eliminate all memory of an event the subject actually experienced.
    • Change the details of an event the subject actually experienced.
    • Implant a memory of an event the subject never experienced.

    Initiating the action takes 1 round. You then proceed by spending as much as 5 hours visualizing the memory you wish to modify in the subject. If your concentration is disturbed before the visualization is complete, the action is lost.
    A modified memory does not necessarily affect the subject’s actions, particularly if it contradicts the their natural inclinations.

Modify Memory, Minor

    Type: Core
    Hack DC: 38
    Time: 1 round; see text
    Duration: Permanent
    Affects: AI
    You reach into the subject’s mind and modify as many as 5 minutes of its memories in one of the following ways.

    • Eliminate all memory of an event the subject actually experienced.
    • Change the details of an event the subject actually experienced.
    • Implant a memory of an event the subject never experienced.

    Initiating the action takes 1 round. You then proceed by spending as much as 5 hours visualizing the memory you wish to modify in the subject. If your concentration is disturbed before the visualization is complete, the action is lost.
    A modified memory does not necessarily affect the subject’s actions, particularly if it contradicts the their natural inclinations.

Monitor

    Type: CyberHack
    Hack DC: 18
    Time: 1 standard round
    Duration: 1 minute per character level of the user
    Affects: All
    You don’t interfere with the target, you simply access their visual and audio sensors. You see and hear what they hear, but don’t interfere. If the target’s eyes have been hacked themselves, the Monitor sees the altered sense as well.

Popup Infestation

Reality Fabrication

    Type: Core
    Hack DC: 46
    Time: See below
    Duration: See Below
    Defense Targeted: Will
    Affects: All
    You can totally fabricate a reality for a target in real-time. You must keep concentrating and breaking that concentration break that reality. The fabrication feels totally real and even breaking the laws of reality may not dislodge to target from the illusion. You can create a solid memory without disbelief and it would be totally real forever. Little can be done to restore that memory. This can be utilized to present a false reality to sensors if targeting a system instead of an AI or DNI.  For example, you could create the illusion that a bank vault is still filled with valuables, when in reality your teammates are actively emptying it.

    If the reality is meant to cause harm, it can do one of the following (all requiring you to beat the target’s Will defense):

    • Create a destabilizing reality meant to break one’s will and grasp on normality. The world starts breaking down. This could be a sequence of repeating events that make so sense or a series of events that cannot occur in reality. The subject looses 1d4 Charisma (damage) after an hour in the reality, after which time you must make another Hackcraft check against their Will defense (but their Will defense is treated as 2 higher). This continues until the target cracks out or is reduced to a comatose stupor by having their Charisma reduced to 0, with the target’s Will defense increasing by +2 for each hour in the fabrication.
    • Create a horrific nightmare the subject cannot break out of. The world turns into a Lovecraftian story of insanity and fear. The subject looses 1d4 Wisdom (damage) after an hour in the reality, after which time you must make another Hackcraft check against their Will defense (but their Will defense is treated as 2 higher). This continues until the target cracks out or withdraws into a deep sleep filled with terrible nightmares, with the target’s Will defense increasing by +2 for each hour in the fabrication.

    Satellite Bounce

      Type: CyberHack
      Hack DC: 18
      Time: Standard Action
      Duration: 1 minute per character level of the user
      Affects: Personal
      You uplink to a satellite overhead, using it as a relay station to bounce your traffic through several other nodes in order to make back-hacking you more difficult.  While this Hack Action is active, you gain a +5 bonus to your Use Computer checks made to prevent a back-hack.

    Satellite Detection

      Type: Virus
      Hack DC: 30
      Time: Standard Action
      Duration: Concentration (swift action each round), up to 10 minutes per character level of the user
      Affects: Personal
      You uplink to a satellite overhead, giving you the birds eye view of what’s around you. You must be outside to do that and the effect nullifies if in a building. It shows everything 100 meters in every direction from the hacker. The satellite has no special eyes for darkness or x-ray. While the action is in effect, the hacker cannot be caught flat footed or surprised unless a target has a form of optical stealth or strikes from a range beyond the scope of the sensor.  Concentrating on this hack action takes a swift action each round.

    Security Wipe

      Type: Virus
      Hack DC: 26
      Time: Standard Action
      Affects: Systems
      You can suppresses all mechanical or electronic intrusion alarms and alarm sensors in the affected area (one room).  By increasing the DC by an +5 you can affect an additional room, up to a number of rooms equal to your character level.  All these rooms must be networked together for you to affect them all with a single hack action. Burglar alarms or other intrusion alarms within the affected area simply fail to function; sensors for intrusion alarm systems (such as motion detectors, IR detectors, pressure sensors, electric eyes, and so forth) also fail to function, sending no signal to monitoring stations. Video surveillance devices continue to send whatever image they were photographing the moment when the action was committed, however this may alert an attentive guard watching the video.

    Silence

      Type: CyberHack
      Hack DC: 30
      Time: Standard Action
      Duration: 1 minute per character level of the user
      Affects: All.  Target must have some form of audio sense.
      Upon initiating this action, the target cannot hear a specific sound or is deaf. All sound can be stopped. Stealth checks made against the target gain a +20 bonus.

    Slow

      Type: Virus
      Hack DC: 22
      Time: Standard Action
      Duration: 1 round per character level of the user
      Defense Targeted: Will
      Affects: AI, DNI
      An affected target moves and attacks at a drastically slowed rate. A slowed target can take only a single move action or standard action each turn (or it loses 2 swift actions if it can only make swift actions), but not both (nor may it take full-round actions). Additionally, it takes a –1 penalty on attack rolls and its Reflex and Fortitude defenses. A slowed target moves at half its normal speed (round down to the next 1-square increment), which affects the target’s jumping distance as normal for decreased speed.

    Speech-Jack

      Type: Core/ CyberHack
      Hack DC: 26
      Time: Standard Action
      Duration: 1 round per character level of the user
      Defense Targeted: Will
      Affects: All
      You hijack the target’s vocal system (or speakers), getting them to say what you want them to say. They say it without resistance and with any emotional inflection you wish convey. You also implant a minor bug that makes the speaker want to say it while he or she is saying it (if targeting a DNI). Therefore, the subject cannot stop themselves physically from saying it nor can they give physical clues that are being influenced. Only after the action wears off can one attempt to repair any damage caused by what was said.

    Steal / Delete Program / Information

      Type: CyberHack
      Hack DC: 26
      Time: Standard Action
      Duration: Instant
      Affects: Systems
      You remove or delete an operating surface action in the target. First, the target must reveal all surface actions or programs currently running. If an attempt is made to delete the program, a the target’s Will defense must be beaten. Copying the program does not require you to beat the target’s Will defense. Any benefits of the program are lost if it is deleted. Copying the program is only useful if the Hack Action contains useful information. You now have access to Satellite uplinks (if running), Target Ids, Relay Text or even Encyrption Keys or keys for the system’s Barriers. If the item being stolen or deleted is not a hack action, it may be a downloaded piece of information or something from storage attached to the target system. This includes maps or files in memory.

    Surveillance

      Type: Virus
      Hack DC: 30
      Time: Full Round Action
      Range: 30 meters per character level of the user (when doing via wireless) or Unlimited (for hardwired targets)
      Duration: 1 hour per character level of the user.
      Affects: All
      You hack into a target but do not take control. You simply sit over-top of the target’s control systems (or the DNI in the case of DNI users) and copy all visual and audio input to your system. You can see and hear everything the target is encountering but don’t encounter any physical input. You take no damage if they take it. If killed, the monitor encounters nothing, the feed is simply cut. If problems or abilities of the eyes are ears are carried as well. If a subject is colorblind, the monitor will transmit that. If the eyes are enhanced to see in darkness, that is transmitted as well. If the target was already hacked to see something else, that to is also carried over. You also overhear anything the target hears.
      Note: This is an advanced form of Monitor.

    Tacnet

      Type: Surface
      Hack DC: 14
      Time: Full Round Action
      Duration: 1 hour per character level of the user
      Affects: All
      Every combatant on one side can use a full round action (so only effective if some time is allowed to prepare before an encounter) to add a Friend-Foe signature to other members of their team. This makes all members of the team aware of your location, up to five kilometer range.  It relays information of where all the members of the team are within the visual field (even if members are behind walls, several floors above or below). All involved also can target enemies easier if attempting to fire into melee combat where another member using Tacnet is involved. The –4 penalty to fire into melee combat is reduced to –2.  For subjects with a HUD, the locations of your teammates are added to your HUD.  For the duration of this Hack Action, aid another bonuses granted by a team member to another team member are increased by +1.  If members of the team have a biomonitor, the information from the biomonitor is transmitted across the tacnet, providing a +4 bonus to Treat Injury checks made by a teammate on another teammate.  The hacker who initiates the tacnet is considered hardwired to all the gear (and DNIs and AIs) used to connect to the tacnet for the duration of it, allowing them to provide hacking assistance both offensively and defensively.

    Target Arrow

      Type: Surface<
      Hack DC: 14
      Time: Standard Action
      Duration: 1 minute per character level of the user
      Affects: Personal
      An aura surrounds and outlines the subjects. Outlined subjects can be tracked and do not benefit from the concealment normally provided by darkness, blur, displacement, invisibility, or similar effects – as long as these effects originate from a Hack Action. This effect only benefits the Hacker.

    Target Arrow, Mass

      Type: Surface
      Hack DC: 18
      Time: Standard Action
      Duration: 1 minute per character level of the user
      Affects: Any
      An aura surrounds and outlines the subjects, up to INT Modifier in subjects. Outlined subjects can be tracked and do not benefit from the concealment normally provided by darkness, blur, displacement, invisibility, or similar effects – as long as these effects originate from a Hack Action. This effect only benefits the Hacker. The hacker can then transmit the information to other willing targets as a swift action, up to 2x the hacker’s INT modifier in willing targets.

    Temporary Hack Resistance

      Type: CyberHack
      Hack DC: 26
      Time: Standard Action
      Duration: 1 minute per character level of the user
      Affects: All
      You or a chosen target you are hardwired to gain an additional defense barrier equal to 25 + your character level.

    Total Override

      Type: Cyberhack
      Hack DC: 42
      Time: Standard Action
      Duration: 1 minute per character level of the user
      Defense Targeted: Fortitude (see below)
      Affects: All
      This hack overrides all inputs (touch, audio, visual, smell) to create an environment. A Hacker can cut any of the senses or overload them. Overloading audio or tactile forces requires beating the target’s Fortitude defense to render the target be stunned for 2d4 rounds.  This Hack also allows the implantation of a Virtual Environment. By placing a virtual environment after a Total Override, the target may not know of the switch and cannot escape as long as the override is in effect.
      NOTE: If total override and virtual environment are teamed-up, they can still offer the target the illusion of free will. They can walk around and touch and see and hear but cannot willingly, break out of it. The illusion can also allow some translation to the real world (Meaning a target may think they are shooting a bad guy but accidentally shoot a good guy).
      Special: While an override is in effect, the target cannot disconnect (possibly revealing the presence of the Total Override).

    Transmitter

      Type: Virus
      Hack DC: 34
      Time: Standard Action
      Duration: 1 hour per character level of the user
      Affects: All
      The target transmits its location continuously to the hacker. Only outside interference or disconnection can sever this link and if time remains on the virus, it will resume if it can continue the connection. This is not like Tacnet, since it places a beacon forcefully on another target.

    Virtual Environment

      Type: Cyberhack
      Hack DC: 18
      Time: Standard Action
      Duration: 1 minute per character level of the user OR until voluntarily dismissed.
      Affects: All
      Create an environment. The initial roll is to create a sustained area. This detail of the environment depends on a “Design” Hackcraft roll.

      • DC20 – The image is crude and distorts itself. Only an environment can be created with no sprites. The environment is simple and obviously fake.
      • DC30 – The image is good but not great. It is obviously fake but made to give some semblance of realism. Adding sprites just hampers the realism.
      • DC35 – The reality is very good. A DC20 Perception check to reveal the truth.
      • DC40 – Almost photorealistic. Tactile sensation is rough. Smell still not great. DC25 Perception check.
      • DC45 – Photorealistic. Tactile still a little off but everything else works. DC30 Perception check.
      • DC50 – Perfect. No readily distinguishable errors. DC40 Perception check.

      The “Design” roll can be made before and pre-composite the illusion. Taking 10 or 20 can be accomplished in this case but taking 10 takes 10 minutes to create and taking 20 takes a full hour.
      Only Perception checks are required if the Hack is being made to fool a target, or if virtual environment follows a Total Override hack attack. The environment can be made to look like any place within reason. If the subject suddenly finds themselves in space (or another impossible location) then suspension of disbelief is dispelled and the environment can no longer fool the target (and thus reveal its presence). However, if the override is in effect, then the subject cannot break free.
      If the environment is meant to be hostile, however, it can possibly cause a fear effect (GM’s discretion).

Epic Space Adventures Abound!