Decking

From TheMatrix
Jump to: navigation, search

SR3.5 Decking

Introduction

Welcome to the revised set of SR3 rules used for simplified, yet expanding decking. The ultimate goal was a simpler and more consistent action resolution mechanic that still could offer a rich and varied decking experience. The following rules result in something of a compromise between the free-flowing full-world experience that SR4's AR presents with the more draconian and likely more realistic (in the case of anything sensitive) security model of SR3. The goal is to provide the decker the capacity to be an active member of the team without slowing down gameplay while empowering them to potentially still have a rich and meaningful gameplay experience. In fact in many ways this system presents the decker with expanded gameplay opportunities.


Changes from SR3

- No more utilities

- Subsystems simplified from ACIFS to ACF (Access, Control, File). Their average rating has dropped considerably.

- Active Decking skills expanded to Computers, Decking, and Programming

- The role of most persona programs changed and balanced (all are more or less equally useful now)

- IC and Agents now require a hardware component to run on.

- Security Tally has changed to a simplified implementation.

- IC and Agents now work just like a decker (they posses persona ratings, programs, and a "skill" rating).

- Smart Frames and Agents are now merged.

- TN's have been, for the most part, simplified. No more lookup tables or cryptic program descriptions.

- Host Deception/Validation has been changed significantly.

- RAS-less, wireless decking has been detailed to facilitate AR-like decking.

Operations

The list of operations has been vastly simplified, although the resolution mechanic has changed significantly. All Active Icons (Deckers, IC, Agents) all resolve their actions in the following fashion. For all operations below the term Decker can be interchanged with IC or Agent. Additionally a decker can use their hacking pool to assist with any roll.


Unresisted Operations

Scan: For this operation the Decker rolls its sensors rating in an open test. This is a complex action. This functions similar to a standard perception test with a TN equal to any other Active Icon's Evasion rating. 1 success indicates presence suspicion. 2 successes indicates presence detection. 3 successes indicates full information. So if a decker was in a host with 3 Active Icons with evasion ratings of 3, 5, 8. The decker then rolls his sensors (5), and the roll yields a 2, 3, 4, 6, and 8. The decker would know everything about the Icon with a rating 3, where it is and what it is doing and what it is doing it to. The decker would know that the Icon with the rating 5 evasion is there, but not specifically what it is doing. The decker would suspect the Icon with the rating 8 evasion is around, but would not have a lock on it. Scan tests are cumulative, meaning that in any successive test the decker would only need 1 success against the rating 5 Icon and 2 more against the rating 8 icon to have full knowledge of the Icon and its actions.

Load/Unload Program: This doesn't require a roll, just a simple action and some percentage of the Decker's I/O. If it exceeds the Decker's I/O then it is an extended action.

Jack Out: Dumpshock in all of its glory. This requires a simple action and does a fantastic amount of stun damage to the decker.

Create "one shot" Program: A Decker can use this to fabricate a "one-shot" program that the decker can use in a pinch if either they don't possess the program or don't have it loaded into active memory and don't have the time to load it for whatever reason. Creating the program is a complex action and the Decker must possess enough free Active Memory to for the program to exist. The final rating of the program cannot exceed the MPCP of the Deck. The decker rolls their Programming skill vs a TN of the program's size multiplier. The final rating of the program is equal to the total successes. The program takes up the full amount of memory equal to the normal program, but acts as though it had the "one shot" programming option, meaning it disappears out of active memory after it is used.


Resisted Operations

Deception: Deception is the operation a Decker uses to defeat a Security Access Node (SAN), typically the first Node a decker has to access to get into a new LTG/RTG and their Private variants. Deception enables the decker to sneak into the Host without a valid user credentials and is how the majority of decking occurs. The decker must roll their Decking skill vs a TN of the Host's Access rating. The Host resists using its Security Rating vs the Decker's Masking rating. The threshold for defeating a Node's authentication routine is typically 10 net successes, although this can vary in specialized systems.

Validation: Validation is another operation a Decker uses to defeat a Security Access Node (SAN), typically the first Node a decker has to access to get into a new LTG/RTG and their Private variants. Validation enables the decker to sneak into the Host by generating a set of valid user credentials and is much more difficult than Deception. The decker must roll their Decking skill vs a TN of the Host's Access rating. The Host resists using its Security Rating vs the Decker's Masking rating. The threshold for defeating a Node's authentication routine is typically 20 net successes, although this can vary in specialized systems. Validation has the advantage over Deception in that the majority of Analyze, Search, and Browse go unresisted (only in highly specialized systems will these potentially trip off alarms for a valid user). I/O, Edit, and Control operations are still resisted in the normal fashion.

Analyze: Analyze is used to get detailed information about a Host, Icon, or Active Icon. To be used on an Active Icon the decker must have already successfully "scanned" the Active Icon as per above. The Decker rolls their Computer skill vs a TN of either a Host's Access rating or the Active Icon's Evasion rating. The Host or Active Icon resists using its Security rating or Computer skill vs a TN of the Decker's Sensors. Each net success yields one piece of information about the Icon (active program, security level, datastore size, encryption level, etc etc ...). Analyze is a complex action

Search: Search is used to locate host resources (like a specific slave icon). The decker rolls their Computer skill vs a TN of a Host's Access rating. The host resists using it's Security rating vs a TN of the Decker's Sensors. Search is an extended action with a basetime specified by the GM based on the specificity of the search criteria as well as the density of the Host. Successes divide into the base time.

Browse: Browse is a specialized searched used on a Datastore or Datastream Icon. The decker rolls their Computer skill vs a TN of a Host's Files rating. The host resists using it's Security rating vs a TN of the Decker's Sensors. Browse is an extended action with a basetime specified by the GM based on the specificity of the search criteria as well as the density of the Store/Stream. Successes divide into the base time.

Edit: Edit is used by a Decker to change an Icon in a way it was not specifically intended to be. Edit cannot be used on active Icons. Edit can be used to change the appearance of an Icon (useful for graffiti-like purposes), can change the properties of an Icon (halve the speed of a datastream ), or can be used for more sinister purposes (edit a datastream from a security camera to loop an image or segment of a stream). To perform an edit the decker rolls their Programming vs a TN of the Host's Files (for file edits) or Control rating (for icon/host edits). The Host resists using its Security Rating vs a TN of the Decker's Masking. Edit is an exclusive action with a basetime specified by the GM based on the size of the edit desired. Successes divide into the basetime.

Control: Control is the sister operation to Edit used by a Decker to manipulate in Icon in a way it was designed to be. For instance you would Edit a security camera's datastream to loop an image or sequence of images. You would Control the datastream to simply disable it or reset it. Control can be used to open and close doors, manipulate security drones linked to the host, and disable datastores or datastreams. To perform a control the decker rolls their Decking vs a TN of the Host's Control rating. The Host resists using its Security Rating vs a TN of the Decker's Masking. Control is a simple action.

I/O: I/O is used by a decker to upload or download data to the file system of a Host's Datastore. It is also used to load completely new Icons or files into a Host. The decker rolls their Computer Skill vs a TN of either the Host's Files rating (for files) or Control rating (for Icons). The Host resists using Security rating vs a TN of the Decker's Masking.


Combat Operations

Attack Program: Attack programs typically have their own resolution rules but the base is the Decker rolls their Decking skill vs a TN of the Active Icon's Evasion. The Active Icons resist using their Decking vs a TN of the Attack Program's rating. Bod is used by all Active Icons to resist damage that succeeds in landing.

Defensive Program: The defensive programs all have their own resolution rules but the decker will almost always roll their Decking skills vs a TN of the Active Icon's Attack program.

Combat Maneuvers: This section isn't yet detailed.

Decking Without RAS

Deckers now have the option of using a wireless module in their deck to interface with any existing wireless hubs in their vicinity. The range of the wireless signal depends on a bunch of rules not yet invented but in general is decent enough. While it's possible for a Decker to Jack in wirelessly with their RAS enabled, there would be little advantage to this over a wired connection. Additionally for the majority of truly sensitive datastores and security grids major corporations still use wire-only access nodes. That said a large amount of logistical and security operations can be controlled through the wireless grids.


Life in 4D

Any player with a datajack and a wireless transmitter (either a headware radio or a wireless module on their cyberdeck) has the option of operating in "Enhanced Reality". For the non-decker this produces a Minority-Report like experience with easily available information about businesses they pass (menu's, specials, inventory, etc ...). For deckers who have disabled their RAS interface this presents a vast amount more potential information using the same interface. Their HUD now displays FPS-like details about their deck's persona as well as status information about loaded programs and whatnot. Additionally visible Icons are presented with whatever details their deck's sensors can pickup. Finally if the decker is under attack their UI presents them with any details they can pickup about it as well as whatever damage it's doing to the deck.


Rules

A decker now has three options for the realities they wish to possess. They can engage their RAS and go full VR. The can disable their RAS and operate using their ER HUD through their DNI connection. Or they can disable the ER HUD and go plain old 3D reality without any distractions. The following rules dictate the three options. There is no more hot/cold assist, ER is considered cold assist (decker's brain cannot be damaged), VR is considered hot assist. So the only change from SR3 is there's no potential use of Cold Assist w/ RAS, or Hot Assist w/o RAS. I've also eliminated the idea of half DNI. For both ER and VR, the decker is thought to be using full DNI. There's no keyboard, no VR gloves or suit. The only time such things are necessary is in the absence of DNI.

Plain Reality: Decker has access to basic information from their deck as if it were a PDA, but cannot actively deck. The decker uses their standard reaction and initiative.

Enhanced Reality: Decker has full access to the ER HUD. All perception and sensors tests are at +2 due to the distraction of the information overload as a percentage of the attention bandwidth is being used by the DNI connection. Decker uses physical Reaction and initiative for all actions. The decker has half hacking pool for all matrix actions. Trodes can be used in this scenario but they reduce the decker's hacking pool to 0 and add +1 to all matrix TN's.

Full VR/RAS: Decker uses Decking Initiative and Reaction. Decker has full hacking pool. All meatspace perceptions and actions are at +8. Trodes can be used instead of a datajack only the maximum level of response increase is 1 and the decker has half their effective hacking pool. Additionally with trodes users suffer a +1 to all Matrix TNs.

Agents, IC, and Frames

There is no more concept of a Smart or Dumb Frame. A smart frame from SR3 can be considered just a weak Agent in this iteration of the rules. Frames proper still exist and serve the role of Dumb Frames from SR3. Agents and IC are now no different, IC could be considered a specialized version of an Agent that's all. All three require specialized hardware to run on, although Frames are weak enough that they can piggy back on the decker's hardware if need be.


Rules ... blah blah blah. Inventing rules sucks.