Shadowrun - Rigger Black Book.pdf. https://cleverroad848.weebly.com/blog/serge-ramelli-signature-special-effects-preset-download-torrent. Download we re the millers. 3rd Ed/Survival Of The Fittest.pdf 30.80 MB: 3rd Ed/Corporate Download.pdf. Adept Handybook 5.0.pdf 143.26 KB:Ultimate Shadowrun Equipment List. R2 Rigger 2 r3 Rigger 3 rbb Riggers Black Book.
Shadowrun Rigger 50 Pdf Free Download Pc
Rigger 3 Revised expands upon the basic rigging and drone rules provided in Shadowrun, Third Edition and offers advanced rules for robots, ships, security riggers and electronic warfare. Rigger 3 Revised also offers expanded vehicle listings and rules for vehicle design, construction and modification. Items 1 - 50 of 479 - Shadowrun: Fifth Edition Core Rulebook (Master Index Edition). These are just some of the ways riggers jack up their seemingly unending. Nothing Is Free Guns and ammo cost nuyen. The business suit who drops ten thousand nuyen on a project because he thinks it'll earn him fifty thousand. Mar 26, 2018 A Rigger can be made into a competent combatant, but they really shine when provided with the right drones. However, it is often more cost effective to use a drone class as long as possible before upgrading due to the hefty price tag of drones. Shadowrun and materials are trademarks and copyrights of InMediaRes Productions, LLC. Shadowrun, Third Edition is a complete rulebook for gamemasters and players. It contains all the rules needed to create characters and ongoing adventures set in the popular Shadowrun universe. Shadowrun, Third Edition updates, revises, expands and clarifies rules from previous Shadowrun rulebooks.
Shadowrun Rigger 50 Pdf Free Download Torrent
INTRODUCTION 7 THE MATRIX WORLD 8 Communication 8 Life at the Speed of Light 8 Please Leave a Message at the Beep 10 The Wired Life 10 Business and the MaMx 11 The Bottom Line 11 Investing in t h e Sixth World 11 Electronic Funds 11 Have Cred, Will Travel 11 Beyond the Information Age 12 Relevance of a n Information-Saturated Society 12 12 Searching for Data Personal Data a n d Privacy 12 Matrix Culture 13 Culture Shock in 3-D 13 14 Sprawl Management The Necessities of Life 14 Matrix Law 15 The Law of t h e Land 15 THE COMPUTER INTERFACE 17 JackingIn 17 Using Trodes 17 Using a Datajack 18 The ASlST Interface 18 Cold ASIST 18 Hot ASIST 18 RAS Override 19
2 MatriV ................................... Reality Filter Response Increase Meet Your Persona The MPCP Signature Persona Programs The Icon Protective Systems Hardening ICCM Biofeedback Filter Transmission Speeds Multiplexing THE MATRIX USER Attributes Reaction and Initiative Skills Active Skills System Familiarity Knowledge Skills Program Design Knowledge Skills Cyberterminal Design Knowledge Skill Info Sortilage Knowledge Skill Other Knowledge Skills Dice Pools Hacking Pool Edges and Flaws Matrix Addiction Flaw Matrix Users in Game Play Using t h e Matrix Using Deckers 19 20 20 20 20 20 21 21 21 21 21 21 22 22 24 24 24 24 25 25 25 25 26 26 26 26 27 27 27 Using Non-Decker Matrix Users Riggers and the Matrix Awakened Matrix Users Non-Metahuman Matrix Users Optional Rule: SOTA SOTA Factor Lifestyle and SOTA Maintenance Costs ACCESSING THE MATRIX The Jackpoint JackpointValues Hardwired Jackpoints Wireless links Wireless Link Values Signal Strength Wireless Link Types Daisy-Chained Wireless Links Matrix Services Services and Costs Boosting Matrix Services MSP Accounts Registering an MSP Account Passcodes Account Privileges BiIIing The Datatrail Decking and Unauthorized Access Access through Deception Spoofing Jackpoints Using a Throwaway MSP Account Passcode Security Visibility and Perception Behind the Scenes System Iconography Matrix Movement Tortoise Mode Tortoise Operations GRIDS AND HOSTS Connections Wirecom Wavecom Bearncom Satcom Regional TelecommunicationsGrids (RTG) lconography RTG Politics Satellite Constellation RTCs local TelecommunicationsGrids (LTG) Iconography Private Local Telecommunication Grids (PLTG) Iconography How Hosts Work Ultraviolet Hosts Connecting to a UV Host More Real Than Real Back to Reality Paydata 28 28 28 28 29 29 29 29 30 30 30 32 33 33 33 33 35 35 35 36 36 36 37 37 38 38 39 39 39 39 40 40 40 41 42 42 42 43 43 43 44 44 46 46 46 46 47 47 47 48 48 48 48 48 48 49 49 50 50 50 50 51 51 52 52 54 55 55 55 55 55 55 55 55 56 56 56 56 56 56 57 57 57 57 57 58 58 59 59 59 59 59 60 60 60 61 62 62 Nature of the Data Random Paydata Generation Paydata Defenses Fencing Paydata Archaic Systems Limitations CYBERTERMINAL CONSTRUCTION Components Tools and Parts Construction Tests Skills Time Health and Tasks Design Tests Software Tests Cook Tests Installation Tests Requirements Cyberterminals Cyberdecks Constructing Components Active Memory ASIST Interface Hardening ICCM Biofeedback Filter Icon Chip 1/0 Speed Maser Interface Matrix Interface MPCP Persona Chips Ports (FUPs) RAS Override Reality Filters Response Increase Signal Amplifier Storage Memory Wireless Interfaces Miscellaneous Components Partial Construction Hardwiring Salvaging Mismatched Components Cranial Cyberterminais (Cz) C2 Parts Cyberlimb Cyberterminals Custom Designed Cyberterminais Choosing the Options Calculating the Cost Shop Installation UTILITIES New Utilities Operational Utilities Carno Crash Defuse Doorstop .................................................................................................. .... 1 64 65 65 65 65 66 66 66 67 68 68 68 70 70 70 70 Matrix 1 3 I Encrypt Evaluate Mirrors Purge Redecorate Sniffer Snooper Swerve Triangulation Validate Special Utilities BattleTac Matrixlink Cellular Link Compressor Guardian Laser Link Maser Link Microwave Link Radio Link Remote Control Satellite Link Offensive Utilities Erosion Hog Steamroller Defensive Utilities Restore Shield Advanced Uses 3 Utilities Operational Special Utilities Offensive Utilities Defensive Utilities PROGRAMMING The Programming Test Program Ratings Program Size Base Programming Time The Program Plan Programming Tools The Computer Test The Task Period Programming Teams The Finished Code Upgrading Optional Rule: Bugs Program Options Options and Size Options and Ratings Options and Cost Utility Options IC Options Programming Suite Options Command Sets Making a Command Set Activating a Command Set v Ma trjx ........................... 70 70 71 71 71 71 71 71 71 71 71 71 72 72 72 72 72 73 73 73 73 73 73 73 74 74 74 74 64 74 75 75 75 76 76 76 76 78 78 78 79 79 80 80 81 81 82 82 83 83 83 85 87 87 87 87 Command Set Operations Shutting Down Command Sets Frames and Agents Frame Core Designing Frames and Agents Loading Utilities Running a Frame or Agent Dumb Frame Rules Smart Frame and Agent Rules IC Constructs Construct Cores Operating Constructs Worms The Bait infection Prevention Infected Cyberterminals Types of Worms Buying Programs Verifying Software Contents Applications Multipliers Ratings SYSTEM OPERATIONS New Operations Descriptions Abort Host Shutdown Alter Icon Analyze Operation Block System Operation Crash Application Crash Host Decoy Disarm Data Bomb Disinfect Dump Log Encrypt Access Encrypt File Encrypt Slave Freeze Vanishing SAN Infect Intercept Data Invalidate Account Locate Frame Locate Paydata Locate Tortoise Users Redirect Datatrail Relocate Trace Restrict Icon Scan Icon Send Data Trace MXP Address Triangulate Validate Account Advanced SR3 Operations Descriptions Making Operations for Other Users INTRUSION COUNTERMEASURES 87 87 88 88 89 90 90 91 91 91 91 91 92 92 92 92 92 92 94 94 94 94 94 95 95 95 95 96 96 96 96 98 98 98 98 98 99 99 99 99 99 loo 100 loo loo 100 loo 101 101 101 101 101 102 102 102 103 New Intrusion Countermeasures Data Bomb White IC Pavlov White IC Scout White IC Trace IC Cerebropathic Black IC Psychotropic Black IC Advanced Uses for SR3 IC Programming IC Crashing IC MATRIX SECURITY Advanced Security Security Tallies and Multiple Icons Host Shutdown Optional Rule: Varying Subsystem Ratings Generating Security Sheaves Creating Constructs Additional Security Features Security Deckers Caveats Sheaves on the Fly Grid Security Alerts Security Deckers Grid Shutdown Security Tally Carry-over SYSTEM TRICKS Grid Tricks Comcall Trace Host Tricks Bouncers Chokepoints Trap Doors One-way SANs Vanishing SANs Virtual Machines Decker Tricks Improvised Combat Rerouting Comcalls Spoofing Frame Commands Switch Modes Suspend Icon Operations INFORMATION SEARCHES Using Etiquette (Matrix) Matrix Social Situations Matrix Contacts Using Computer Skill Search Areas Types of Info Searches The Search Test Sample Databases THE OTAKU The Reality Using Otaku Becoming Otaku Tribal Initiation ...................................... 103 103 104 1 04 104 107 108 109 109 109 110 110 110 112 112 112 113 113 1 I3 113 1 I3 113 1 I4 1 I4 114 1 I4 I17 117 1 I7 1I 8 1I 8 1I 8 120 120 120 121 122 122 122 123 123 123 1 24 124 124 126 129 129 129 130 131 133 133 1 34 134 134 i The Deep Resonance The Paths Submersion Al-Created Otaltu Creating an Otaku Character Using the Priority System Using the Point System Allocating Attributes Allocating Sltills Allocating Resources and Lifestyle Allocating Complex Forms Designing the Living Persona Dice Pools Choose a Path Otaku Rules Detection Factor System Attunement Using the Living Persona Living Persona and Cybercombat Damage Improving the Living Persona Otaltu and the SOTA Otaltu and Jackpoints Using Channels Channel Immunity Complex Forms Options Creating Complex Forms Using Complex Forms Sprites Creating Sprites Using Sprites Otaku Tribes Resonance Wells Tribal Resources Joining a Tribe Founding a Tribe Tribe Generation Submersion Grades Cost of Submersion Echoes Improved I/O Speed Improved Hardening Improved MPCP Improved Persona Improved Reaction Daemon Summoning Ghosting Info Sortilage Neurofilter Overcloclt Resonance Link Switch Traceroute ............................................................... , 1 Matrix 134 136 136 136 136 136 136 136 136 137 137 137 137 137 137 137 1 38 138 138 138 139 139 139 139 139 139 139 140 141 141 142 142 142 142 143 143 143 143 143 143 144 144 144 144 144 145 145 145 145 145 145 145 146 146 1 5 1 The Fading AUTONOMOUS PROGRAMS Semi-Autonomous Knowbots Designing SKs Framne Points Running an SK True Artificial Intelligence Role-playing Als The Als of Shadowrun MATRIX PLAYERS The Providers Saeder-Krupp Second-Stringers Dabblers Playing with Toys Dynamic Duo The Second Line Code Kings Double Trouble Middle of the Pack Bringing up the Rear Information Is Power Data Havens Corporate Masters Other Powers That Be Observers and other Nosy Bastards Corporate Court Matrix Authority To Observe and Detect Credit Where Credit Is Due The Virtual Underground I Hack, Therefore I Am Who You Wanna Be Today? Matrix Gangs TABLES 146 147 147 147 148 148 150 1 50 150 153 153 153 153 154 154 154 154 156 156 156 I57 157 157 157 157 158 158 1 58 1 58 159 159 1 59 159 160 MATRIX CREDITS Writing 8. Project Development Rob Boyle Michael Mulvihill - _- Additional Writing Randall Bills, Drew Curtis, Dan âFlakeâ Grendell, Keith Henry. Jason Levine, Michelle Lyons, Paolo Marcucci, Kenneth Peters, John Schmidt, Darci Stratton, Jon Szeto, Rich Tomasso, Malilc Toms, Frank âCrazyâ Werschke, Jaldto Westerbelce, Sebastian Wiers Project Editing Davidson Cole Rob Cruz Michelle Lyons Sharon Turner Mulvihill Shadowrun Line Developer Michael Mulvihill - Editorial Staff Editorial Director Donna lppolito Managing Editor Sharon Turner Mulvihill Associate Editors Rob Boyle Rob Cruz Assistant Editors Davidson Cole Michelle Lyons Art Staff Art Director Fred Hooper Assistant Art Director John Bridegroom Cover Art Fred Hooper Cover Design Fred Hooper Layout Fred Hooper Production greEn //lustration Doug Andersen, Tom Baxa, Peter Bergting, Tom Fowler, Fred Hooper, Mike Jackson,Larry MacDougall, Jim Nelson, Matthew Plog, Steve Prescott, Mark Zug Playtesters Stephen Cuyler, Patrick Goodman, Martin Gotthard, Jeremy Guillemette, J. Keith Henry, Earl Hollar, Eleanor Holmes, Jamie Houston, Chris Johnson, Allen Landsidel, Ryan MacClanathan, Ray Macey, Steve McCormick, Michael Papas, Grzegorz Ruminski, Myron Thompson, James Vaughan, Becky Welch, and Shane Winzar. A special thanks to Earl Hollar, Chris Johnsonand Allen Landsidel from Kenneth L. Peters, for all their help in working on the Matrix. [email protected][email protected] Registered Trademarks of FASA Corp. Copyright 0 2000 FASA Corp. All Rights Reserved. Printed in the USA. Published by FASA Corporation Suite B305 Chicago, IL 60608 1 100 W. Cermak Road FASA can be reached via e-mail at [email protected] (Shadowrun questions) or [email protected] (art comments). Please, no list or server subscriptions-thanks! Visit FASA on the World Wide Web at http://www.fasa.com 161 M a frjx ...................................................................................................... The Matrix is the advanced book for deckers and other users of the Matrix, and is full of options and expansions for the Shadowrun game system. The Matrix expands on the decking and Matrix rules that are presented in Shadowrun, Third Edition (SR3). It also offers an entirely new take on what non-deckers can do using the Matrixincluding basic and advanced information searches. In addition to containing a significant percentage of new material, The Matrix represents a compilation of material originally published in various Shadowrun books that are now out of print or that were based on previous editions of the Shadowrun rules. This includes material from Virtual Realties, Virtual Realities 2.0, Renraku Arcology: Shutdown, Brainscan, Shadowbeat, Neo-Anarchistâs Guide to Real Lit2 and Denver. Any references in this book to the Shadowrun rules refers to sR3. The Matrix begins with The Matrix World, where we present how the Matrix factors into everyday life, as well as its history. The Computer Interface deals with the cyberterminal, the machine element of Matrix use. This chapter breaks down the cyberterminal and its properties, from the MPCP to reality filters to Response Increase. All of the attributes, skills, edges, flaws and dice pools important to a Matrix-using character, whether a decker or a non-decker, are discussed in The Matrix User. This chapter also includes new active and knowledge skills, a new Matrix Addiction Flaw and ways that Matrix users can be incorporated into game play. Accessing the Matrix goes over the various ways to get online, from illegal jackpoints to wireless links. It also covers the accounts and pasxodes Matrix users use to get online, and all the ways deckers access the Matrix illegally. Tortoise mode, visibility and sensors and iconography are also presented. Grids and Hosts covers the architecture of the Matrix, from its technical aspects to the ways it is used. Satellite constellations, ultraviolet hosts and paydata are also detailed. Cyberterminal Constructionbreaks down how to modify or create from scratch a cyberterminal or cyberdeck. Rules for upgrading, hardwiring and customizing a deck are included, as are rules for cyberlimb and cranial cyberterminal construction. Utilities are the programs used to operate, attack and defend in the Matrix. This chapter includes a host of new utilities as well as advanced rules for utilities presented in SR3. Programming provides all the information a player needs to create a program, including utilities, command sets and frames and agents (programs that have a degree of independence from the user). Options that modify how a program functions are also detailed for both utilities and intrusion countermeasures. System Operationsare how Matrix users take action in the Matrix. New operations are presented here, as well as advanced rules for operations presented in SR3. As the deckers get better, so do the defenses. Intrusion Countermeasures covers the newest IC and options for dealing with it. The Matrix Security chapter that follows shows how to use this IC in a system, with an in-depth breakdown of the security sheaf and random-generation tables for IC. Also included are specia1 rules for grid security and host shutdowns. System Ticks takes it all a step further, showing what grids, hosts and deckers can do to stay ahead of the competition-from comcall traces, chokepoints and virtual machines to improvised attacks, rerouting comcalls and spoofing frame commands. One of the most undemsed aspects of the Matrix is the ability to gather information. The Information Searches chapter shows how deckers and non-decker Matrix users can take advantage of this facet of the Matrix, including using Matrix contacts and searching databases and archives, using either Etiquette (Matrix) or Computer skill. The chapter on the Otaku brings this player character type up to date, using the rules for SR3. Autonomous Programs breaks down the powerful Matrix entities that may or may not actually be alive: knowbots and artificial intelligences. Updated information on the three Als known in the world of Shadowrun is included. Finally, all the grid providers, deckmakers, Matrix-security experts, gridhounds and other power players are given their due in the chapter Matrix Players. A number of useful tables are also included in the back, breaking down all of the gear, operations, utilities and IC. Record sheets are also included for a characterâs cyberdeck and programs, an otakuâs living persona and abilities, or a characterâs frame or sprite. ........................,............................................................................. Matrix 7 he Matrix is the infrastructure. Itâs whatâs behind the âinterface.â It is literally everywhere, runs everything, and yet f o r all of that, itâs as close as anything comes to being invisible without being magically active first. People donât think about the powergrid and how it works when they plug in a hair dryer or drive their c a r to work, they just use it. Itâs the same with the Matrix: they make phone calls, send email, a s k their c a r f o r directions and perform a million other little tasks, never thinking about how the connections are made and data is transferred. There is almost no place on the planet that isnât connected to someplace else via the Matrix: from phone calls to videoconferencing, credstick transfers to security systems -any time information moves anywhere in the world, it does so over the Matrix. 7he Matrix World describes how that seamless integration has changed life in 2061. T COMMUNICATION LIFE AT THE SPEED OF LIGHT By the late 199Os, electronic devices such as pagers and cell phones had already moved down from the ranks of the tech-elite into the pockets and belt-loops of the busy middle class. Everyone from salesmen working out of their cars to working parents trying to juggle grocery shopping and picking up high schoolers from late-running track practice took advantage of the convenience they offered. It only took a little cultural adjustment for that convenience to become a mandatory condition. âPhone numbersâ became associated with people instead of addresses, and combined with email to derive one do-it-all number with 24-hour access to anyone you want to talk with (see p. 35, Matrix Services, for more information). As people got used to that state of constant âconnectedness,â they began demanding more information in a timelier manner, and the marketing gurus responded. In 2061, there are pagers the size of a credstick that let you read-or listen to-everything from email to headline news, as well as wristphones that you wear instead of a watch. Both receive their data via the Matrix. Any home in 2061 that can boast of even a modest income can also boast of some form of cyberterminal. The cyberterminal takes care of the computing needs of the I 8 I Matrix I ....................................................................................................... I d household, as well as any form of communication: television/trideo, email, phone and simsense. To put it in technical terms, the cyberterminal serves as the portal for all data transfer to and from the home, from all different sources: your simsense channel provider, your phone company, your messaging service-all converge on this one box in your living room. Depending on what subscriptions you have (p. 35),you can even do library research and visit other public sites (such as online malls and corporate ad-space) through friendly iconbased menus. The broadcast and simsense stations send their signal over the Matrix to those telecom boxes whose hardware addresses show up in their subscription database. The phone companies use the Matrix, too. The Matrix is even available from the road. Letâs say a car has a flat tire. A call for âroadside assistanceâ goes out from the vehicle through a satellite uplink, along with its location and a brief description of the problem, to the processing host of the auto service with which the person has an account. The nearest tow truck is dispatched, along with a notation that it would be worth several customer service points (kcause the driver is diabetic and it will have been two hours by the time he gets there in traffic) if the driver brings a Soyspree energy bar with him. Today we do this sort of thing by phone and radio using a real, live operator, but in the Sixth World, all this is transmitted directly to the wireless terminal mounted in the dash of the tow truck nearest you. Most importantly, once the car is up and running again, the power-utility company uses the Matrix to transmit the data that the car generates regarding its power consumption, so that the ownerâs monthly bill can be updated appropriately. PLEASE LEAVE A MESSAGE AT THE BEEP There are as many different ways to trade information in the 2060s as there ever were, if not more. Time and technology have served to make some of them seem very different from how we use them today. The following list is a few of the common methods used to âreach out and touch someoneââ in 2061. Phone Calls In 2061, a phone call is generally understood to be any real-time communication, whether by video/trideo or voice. Itâs still called a phone call, even though the actual event is only distantly related to what we consider a phone call today. Voiceonly calls are still more common than trideo calls, primarily due to concerns about anonymity and privacy. While adding a visual component might not seem like much, how many people really want to answer a visually-enhanced phone call early on a Sunday morning, especially if the previous night wasnât too kind? Some higher-level executives have avoided the problem of wanting to be heard and not seen by purchasing lifelike Matrix-based personas that stand in for an actual image. Faxes Faxes are still around, though their use is much more limited. The paper trail required for legal documents at the beginning of the twenty-first century has been completely replaced with an electron trail, so the legal issues that required faxing are no longer a factor. Faxes are normally used for sending 110 I Matrix copies of something that doesnât have an electronic form, such as historical documents or handwritten notes. Email Email is the primary method of sending information from one person to another, whether text, trideo or audio. For legal purposes, electronic signatures, verified by credstick information, are legally binding, so contracts are almost entirely handled through email. Email scams in the Sixth World take advantage of this fact, so consumers are careful about responding to unsolicited offers. Message Boards Message boards are used to conduct conversations that occur at the speed and convenience of the participants. The modern message board doesnât resemble its twentieth century ancestors very much, but the concepts are still similar. Message boards can hold text, digital music, trideo, simsense and so on. They are commonly found throughout the Matrix, generally appearing as kiosk and newspaper-stand icons in public areas. Web Pages and Chat Rooms In the twentieth and early twenty-first century, âwebâ pages were used as a primary means to distribute information across the Internet and the World Wide Web. In 2061, the idea has evolved considerably, driven by the advance of iconography on the Matrix. Now what used to be a corporate web site will be a public-access area on the corpâs host. If itâs a personal site, the individual has a âroomâ on his Matrix Service Providerâs (MSP) host (p. 36) where they can make personal information available by âdecoratingâ their space however they see fit. Chat rooms are much the same, except that the âroomâ in question is devoted to conversation. A chat room has gone from being a limited text-based interchange, as it was in the twentieth century, to being a fully interactive immersive 3-D experience, especially considering the current simsense technologies. There are both public and private chat rooms and the content of each type varies, though there is usually some theme involved. Instant Messaglng and Paging In a Matrix-connected world, people are usually available to some degree at any time of the day or night. Because of this, instant messagingand paging have blurred together. A message which is sent to the user appears as an instant message if theyâre logged onto the Matrix and pages them if they arenât. Of course, the user can turn their messaging and paging features off, but most people just accept communications as they come. THE WIRED LIFE In 2061, the Matrix isnât just something you look at occasionally. It makes sure the lighting in your living room is just at the level you prefer. Itâs the reminder in your pocket secretary that thereâs a special on pink roses for your date that you should take advantage of, because she doesnât like red ones. I.. ..................................................................................................... There is almost no period of time, day or night, when the Matrix is not in use in some way in the major metropolitan areas. In your home, car, or office: whenever you carry a cellphone, wristphone, pager, pocket secretary or any other device that transmits or receives data; whenever you go out and watch the latest concert on live trid-feed at your local nightclub: youâre using the Matrix. It has become the universal constant in a world of uncertainty, crossing every social and economic class barrier. Even the homeless can use the Matrix through street corner public-access terminals. It does not require literacy, technical knowledge, money or status. It is the ultimate social service. world without having to pay for relocation (especially if the facility is an orbital one). This doesnât mean that office buildings and production plants are empty. You still need technicians on-site, both for the facility and the computer systems. Given the number of virtual employees that are relying on the host computer, a serious software or hardware problem can cost hundreds of thousands of nuyen for every hour that workers are sitting idle. As a result, the number of technicians on-site has doubled and in some cases even tripled. Corporations have also moved to address the problem by implementing secondary backup hosts and archives. BUSINESS AND THE MATRIX INVESTING IN THE SIXTH WOFLD THE BOTTOM LINE The Matrix has transformed business in the Sixth World. It introduced businesses to a whole new way to cut overhead, increase productivity. lower operating costs and raise profits. The business world has embraced the Matrix and forever changed the working experience. Virtual offices are one of the best examples of businesses using the Matrix to the utmost. A virtual office is a computergenerated construct of a physical office. The employee connects through their cyberterminal from home, works their shift, and then logs out. This has obvious benefits for both the employer and the employee. Employees donât have to commute, arrange for lunches or maintain a professional wardrobe. Employers cut time lost to socializing between employees, as well as reducing their overhead to equip an employee. When you add up the cost of the desk that an office worker sits at, the chair they sit on and the vidphone that you canât seem to keep them from using, not to mention the electricity to provide them light, heat and air conditioning, a business can reduce overhead by some 10 percent in the short term and 20 percent over the long term. A âvirtualâ employee can still write up proposals, design new products, send and receive faxes and inter-office memos, attend meetings and so on. Ultimately, the benefits are substantial. The downside of the virtual office is that by providing offsite access (i.e. cyberterminals), there are increased security risks. This concern is handled using a few different methods, including secure corporate housing units, the most luxurious of which are in an arcology-type setting. Other corporations delegate only non-sensitive business endeavors to virtual offices, including public relations and advertising. Corporations that make use of virtual offices often keep them separate from the rest of the corporate grid, so that any damages from unauthorized access are kept to a minimum. In addition to virtual offices, corporations have also turned to the Matrix to handle the production of actual goods. Like a virtual office, workers at a virtual production facility jack in from home and âgo to work,â directing heavy assembly-line machinery or nanites to build everything from cars to missile warheads. The benefits of this arrangement for a corporation are numerous. It allows them to cover shifts more easily, as well as giving them the ability to hire from anywhere in the Corporate finance has also made use of the Matrix, as one would expect. Virtual stock exchanges are every bit as cutthroat as anything you will find on Wall Street. The traditional markets are still around and have been joined by the Denver Matrix Exchange (or the DME), among others. All of the stocks and bonds exchanges have turned to doing business wholly through their hosts in the Matrix, allowing investors from all over the world to not only view the trading but to participate as well. The markets have also gone to longer hours to allow additional investors to conduct business in the stock market. Virtual investors can observe the virtual traders and the market as a whole, then send in their orders via Matrix commands that the traders act upon. ELECTRONIC FUNDS HAVE CRED, WILL TRAVEL Over the centuries, metahumanity has used all kinds of things for money: beads, gold, jewels, cattle, grain and paper, among others. In 206 1 , itâs all electrons. This is not to say that cash is no longer used, especially for those day-to-day small expenditures such as tips. However, for larger purchases, bills and so on, everything a credit card is used for today and more, electronic transactions are accepted as the standard. To get technical, a nuyen is a unit of currency that is universally used, which exists primarily in electronic form and is issued and backed by the Zurich-Orbital Gemeinschaft Bank, the worldwide financial authority. Nuyen are accepted everywhere, by corporations and governments alike. Nations also issue their own currency, which is accepted within their borders and must be exchanged (a process made painless by the advent of credsticks) when you enter another country. The only other type of currency in wide use is corp-scrip, issued by a corporation and only good within that corp and its holdings. All of these are available in both a physical form and an electronic form, the latter accessed by means of credsticks. A credstick is a pen-sized tube that serves as a simultaneous ID and credit card (see p. 238, S I U ) . In addition to allowing someone access to their bank account, it also works as the key to their house, their official identification, their emergency medical and contact information source and their drivers license, all in one. To access your bank account, you would insert your credstick into a credstick reader, provide your pass- ......................................... Matrix I 11 code. thumbprint, retinal print and/or voiceprint, verify the transaction you wish to make (which is verified by the ID in your credstick, proving you are who you claim to be), and then remove your credstick from the reader. Every register in a store or restaurant, bus, pay phone, or vending machine has a credstick reader built-in, along with accepting cash or coin. It is the monetary standard in the Sixth World. A personal credstick is not the only way to go, however. In the twentieth century, when you wanted to send or give money to someone without writing a check, you would get a money order, cashierâs check or bearer bond. Now, you get a certified credstick. A certified credstick is a plain credstick with no identification or other information required for its use. It simply holds the amount of nuyen assigned to it, which can then be transferred into a personal account or used right off the stick. Certified credsticks are not commonly used among your average citizenry, as everyone who has a bank account has a credstick by definition. They are useful for gift giving, however, or for those rare instances when a cred reader is not available. The final place in which a credstick is used is the Matrix. The 1990s saw the birth of a new era, when E-commerce was invented. In 2061 itâs just commerce. Every brick-and-mortar store of any size that wants to stay in business has a Matrix counterpart in the 2060s, and many exist only in the Matrix without any physical storefront to speak of. Most manufacturers are also retailers, and most retailers keep their customers by the range of products they have to offer or other special services. However, they all have the credstick in common. Any home telecom unit, pocket secretary, or other general-use cyberterminal used to access the Matrix has a credstick reader built-in for convenience. Going shopping is as simple as finding what you want, slotting your credstick (to use the vernacular term) and making the exchange. If itâs digital goods you want, then you have instant gratification. If it has to be shipped, it will be invoiced first thing and go out the next day, keeping in mind the shipping method you selected. If you want to hang out and grab a soy-kaf, go to your local mall. If you want to shop, log on to the Matrix. BEYOND THE INFORMATION AGE RELEVANCE OF A N INFORMATION-SATURATED SOCIETY The Sixth World is powered by data. Nearly everything you could possibly want to know can be found somewhere on the Matrix. You might need a passcode or a valid credstick to get some of it, but thereâs very little thatâs not digitized, stored or transmitted. With computing power getting cheaper and cheaper, the state of information overload is long past. Every day, citizens of the plex are bombarded with information: store displays, phone calls, emails, traffic updates, talk radio, music, walk/donât walk signs, pop-up ads, giant screens in public squares, 24-hour news channels and targeted advertising. It all adds up. This begs the question of how much information is too much? Where is the line drawn? In truth, the line varies depending on your level of techno-comfort. People who arenât comfortable with technology in every aspect of their lives tend 18 M a frjx to tune things out, turn them off, and otherwise find ways to quiet the background noise in their world. Many of the magically active find themselves in this category, though that is hardly a blanket statement. Still, the level of technology and information dissemination for even the least-willing individual is at least twice what it was at the beginning of the century. On the other hand. there are those who canât get enough information and technology. These are the people who have three or more 24-hour streaming news channel subscriptions for their telecom and pocket secretary. They receive the electronic versions of their newspapers daily and read them all. They seek out niche information through the Matrix, and participate in numerous discussion groups and newsletters. Just keeping up with their âinformation addictionâ is a full-time job, much less Ikeeping up with their real job and family, too. Unfortunately, even staying connected 24-7 does not allow you to know everything that happened, so some people constantly feel behind the curve. Illiteracy What does illiteracy mean in an information society? The world in Z06t is a a more iconographic world, designed that way so people could tell at a quick glance what they were seeing, thereby overcoming language barriers. As a result, functional illiteracy in 2061 is rather high by traditional standards; yet with modern information technology, a great deal of knowledge can be gained even if one cannot read. People can still see pictures, watch video and understand audio information. Simple charts can usually be comprehended even without traditional language skills. In a sense, the drive to become a wholly literate society has vanished, replaced by the goal of rendering data into a form that everyone can understand, a sort of universal icon-based language. SEARCHING FOR DATA Having all that data to work with means that there needs to be methods of finding what you need in a useful amount of time. Search engines, the tools of the World Wide Web, were impractical when dealing with the scope of the Matrix. Instead, sophisticated programs are used that can sift data much faster than a human ever could, retrieve the information you wanted, then report back to you. These programs are usually called âsearchbots,â though their technical names can vary. A searchbot can retrieve information on almost every topic imaginable, including other people. PERSONAL DATA AND PRIVACY As the ease of gathering personal information has grown, the concern about its use and abuse has increased as well. Itâs often been said that the first casualty of an information-based society is privacy, and whether that is necessarily true or not, it is certainly applicable to the Sixth World. Like it or not, having more information out there means there is also more information about you, and sometimes information youâd rather not have made public. On a Matrix-based search starting with only a name, the information collected can include your place OF employment, parentsâ names, home address, what degrees ..................................................................,.,.,.............................,,... were earned and where, publlcations subscribed to, SIN, criminal record and more. And thatâs a very casual search-if someone was really interested in finding information, there are almost no limits. While a free search will only turn up a moderate amount of information, more is available to those who are willing to pay for it. There are many fee-for-search services o u t there that collect information, and many traditional information-businesses, such as credit bureaus, will sell nearly anything in their database for the right price. All people do not have their privacy invaded equally, though. Those in the upper classes are the safest, because money can buy some privacy. For the right amount, you can hire individuals to remove your name from sales lists, screen access to your SIN and associated individuals, and otherwise keep your name out of the limelight. Those in the middle classes are the most vulnerable to having their lives completely exposed, because they are of the most interest to the business world. The middle-class consumer has money to spend and makes up the majority of the con. sumer population. They also canât afford the type of privacy countermeasures that those with more wealth typically employ. Therefore, they are the prime targets. The lower classes are not of nearly as much interest to business as a whole. They typically are not heavy consumers, given the lack of disposable income common to their situations. Also, they use the Matrix actively to a lesser degree. Those that are heavy Matrix users rarely enter useful data when asked, because their physical location and situation can change very rapidly, rendering the information useless. Therefore, there is very little incentive to track them closely. School, immunization, public assistance, welfare, unemployment, tax records, Immigration, customs, flight records, car rentals, trideo and sim rentals, gun registration, vehicle registration, permits of every kind, professional certifications, toning variances, police activity summaries in the daily paper, credstick purchases and more: all of it is out there just waiting to be sorted and sifted and analyzed. Still, while all this information is being gathered and used, the average individual never notices an effect. Big Brother may know everything down to your underwear size, but if the only result is being non-obtrusively offered a special sale price on underwear, you arenât likely to complain too much. So while privacy may be an imaginary concept in 2061, no one has yet gone out of their way to disprove the myth .. except in the shadows. of the infinite I he continurnQ Ors: The Internet is created. the invention of the TCP/IP network protocol, became a popular commercial medium as well. dedicated to MATRIX CULTURE CULTURE SHOCK IN 3-D At the turn of the century, one of the biggest concerns that existed regarding the Internet was the amount of time people seemed to be spending on it, to the exclusion of other activities that were regarded as healthy and normal. Online games, chat rooms, themed text-based environments: these were just a few of the available entertainments to which people had access. Compared to what was to come, they hadnât seen anything yet. In 2061 there are a myriad of different sim-based and trid-based entertainments out there whose addictive powers blow anything previously encountered completely out of the water. Escapism and the tools to make it happen are at an all-time high in the Sixth World, thanks to the Matrix. However, it says something about the degree to which the Matrix has been incorporated into society that such activities, even regarding their addictive qualities, are not feared, but embraced. The Matrix world is real enough that becoming immersed in the Matrix is viewed as a common, everyday occurrence. Trideo and Music Some of the entertainments available havenât changed substantially in decades. Chief among these are forms of recorded entertainment. Recorded entertainment on the Matrix can take many forms. Digital music, usually with a trideo ......... ................ ........ ...................................................................... Matrix 13 rt ctronics and RGA-Unisys The U S . government creates ndoâ tage visual feed, and trideo or simsense fllms are the most popular. Ihese are available with a standard MSP account (see p. 36,MSP Accounts), or through a pay channel. At last count, there were over a hundred thousand different channels available on the Matrix. Simsense Recordings Simsense entertainment is in a class by itself. The movement from trideo to slrn was a giant leap in recording technology, allowing someone to record not only a visual image, but also the sensory and emotional input associated with it. Needless to say, this form of entertainment has become extremely popular. The rise of sim technology has also set off a new life for both sports features and pornography. The chance to experience the power and emotion ofyour favorite urban brawl player or a diff diver from Aztlan is a powerful draw, as are the opportunities afforded by full sensory-immersion pornography films. The ability to get the sensations without any of the risks is a rush to many people, so films such as these have skyrocketed in sales (legality notwithstanding, in the case of pornography). Online Games and VR Settings Other popular entertainments on the Matrix are online games. For those to whom a pre-programmed sim flick is boring, there are the interactive possibilities of the online experience. These are almost always sim-enabled, and being jacked-in gives you a definite advantage. Most of these are combat-based games with a variety of settings, and theyâre pretty popular among the young single male demographic. For those who donât enjoy shoot-âem-ups, there are also VR settings. These are sculpted environments that are modeled on a theme, often a historical period or a popular film or fiction setting. The participants act out the lives of a persona they create, with the specific possibilities limited only by the environment. VR settings can also be modern-day settings. Virtual bars are a popular of setting, with âfoodâ and âdrinkâ available through the wonders of sim technology. These settings have become the lonely Matrix-addictâs dating service, and more than one couple has been set up that way. The possibilities of sim and VR settings have also given rise to virtual bordellos, which have caught on as well. The cottage industry of Matrix prostitution is now a growing one, and due to the fact that their sites are invariably on private hosts, the legal issues have been tricky to sort out. Still, virtual sex has become commonplace since the turn of the century, if still a poor substitute for actual human contact. It is, perhaps, unreasonable to expect that one of metahumankindâs most basic urges wouldnât find an outlet on the Matrix somewhere, especially as it grows to mirror the real world in greater and greater detail. amien Knight execut econd Buyout, gai Childrenâs Areas The last area of Matrix entertainment belongs to the children. The education of children has fallen to a greater and greater degree into the realm of the cyberterminal. Matrix education programs focusing on reading comprehension, mathematics, computer and technical skills and hand-eye coordination are considered a necessity by every school. Additionally, many âspare-timeââ entertainments heavily feature these aspects as well. There are clubs and hosts set up especially for children and their interests, and the average child is involved with them to a moderate degree. SPRAWL MANAGEMENT THE NECESSITIES OF LIFE A lesser-known but vitally important function of the Matrix is in the area of sprawl management. When you take a few million people and cram them into a space the size of the plex, it takes in-depth coordination to keep all those essential systems functioning. The Matrix is responsible for telecom service, traffic manage- IV M&-jx ....... .............. ............... ..... ...................................... + ........................ __ -._ ment, power management, police and emergency c6mmunications and tracking, and remote drone operations (such as cleaning streets and picking up garbage). Telecom Service The Sixth World relies on communications. If the info ever stops, then everyoneâs in big trouble. Thus, the Matrix carries a heavy load in its telecom service duties. Phone service today is handled through private companies that either own or lease telecom services on the Matrix. So, no matter who you have your phone service through, it all comes down to the same thing. Those same companies are responsible for the public access telecom units you see on almost every street corner, with the maintenance of any specific unit falling to the company that owns it. Grid-Guide The Grid-GuideTMis the glue that holds traffic together in the Sea-Tac âplex. Most of the cars sold for urban travel today are fitted with this intelligent traffic management system. Grid-Guide roads are standard throughout Seattle, with the Barrens area being the exception. When a car enters a Grid-Guide compatible highway and activates its Grid-Guide system, the system sends the c a r on the most efficient and timely route possible. Grid-Guide will even assist the vehicleâs autonav system in avoiding collisions and allowing emergency vehicles to pass, as well as manage power consumption through the Gridlink induction-coil system. Power and Utilities The Matrix is also responsible for keeping the lights on, as well as keeping the gas and the water flowing. All of these systems use the Matrix to read meters, measure consumption, arrange for maintenance and troubleshoot computers. The use of natural gas has decreased, given the rise in cost and the increasing rate of natural resource depletion, so more homes and businesses are turning into allelectric facilities. This means that most modern structures are completely wired for the Matrix, giving a homeowner a previously unmatched level of control over her environment. The Matrix also issues the commands for the remote drones, units that handle many of the routine physical jobs of city management, such as trash collection and superstructure maintenance. Law Enforcement While you might not think of Lone Star having much, if anything, to d o with the Matrix, a high level of interaction actually occurs. The Matrix is responsible for the information gathered during the thumbprint searches done on suspects, including warrants, criminal record and missing-persons information, all while theyâre still on the scene. They use the Grid-Guide system to track vehicles, sometimes overriding the standard routing protocols to direct the car into a waiting road block or a dead end. Alarms on private property, silent or otherwise, alert Lone Star through the Matrix, including the security information the system has been able to gather on the intruders during the intrusion. . 1r w seventh-gene eck is produced and ow keyboard-sized and nown as the chilfirst appear. : An elf decker calling himself MATRIX LAW THE LAW OF THE LAND Matrix law is a murky area, with misunderstandings common. Most users are confused about Matrix law, to say the least. Itâs not unheard of for a user to get caught up in red tape because he did the wrong thing in the wrong host. To clarify the issue, it is best summed up in this statement: the laws of whatever host youâre logged into apply to what you do there, not the laws of your physical location. With corps able to enforce their own laws, as well as hosts in other nations that may have very different laws from what youâre used to, itâs good to keep this in mind. There are some things that are almost universally illegal, such as piracy, trespassing and hacking. ............................. .................. ............ .................. ......... ...... s of his will set the ..... I Matrix I 15 I Software and Intellectual Pmpmty Piracy lead the 14th t is a to allow non-metahumans and other probationary citizens legal SINS when vouched for by a UCAS citizen in hi, founds Dec 19, 2059: The artificial intelligence (Al) named Deus seizes control of the Renraku Arcdogy, closing it to the outside world. Otaku tribes beginning 0th in the Matrix and the down for a span of eight mrnites, dumping most users and driving some insane. Originally thought to be V A Piracy laws are based on the idea that it is (or should be) illegal for an individual to copy and distribute a work (be it text, music, video, or software) that another individual created and sells. Thatâs a pretty simplified definition, but it covers the basic idea. So, making a copy of the music file of the latest release by your favorite band and putting it on your pocket player for your own use is okay. Putting that same copy in a public file and making it available to anyone who comes in contact with it, whether for free or at a cost, is illegal. The same applies to anything that could be considered intellectual property. This is also sometimes called copyright infringement. The penalties for this crime vary greatly. Not all copyright owners pursue infringement with equal fervor, though violating the law with material that belongs to a corporation is likely to carry a stiff sentence. If someone pursues the case and youâre found guilty, you can probably count on a heavy fine, possibly along with probation or suspension of Matrix access. Trespassing Most hosts that are open to public visitors have a public-access area in their host f o r just such a purpose. Trying to get from that public-access area into the offlimits places is called trespassing, and most corporations look on it with an unkind eye. Again, it is best to keep in mind that if you are in an extraterritorial corporationâs property, whether virtual or physical, they have the right to prosecute you according to their own laws. Most off-limits areas are clearly marked, and nearly all of them require effort to get into. It is unlikely that the average user will be able to simply wander into an area that will get him into trouble. Hacking Laws Hacking is defined as using a cybertermfnal to willfully deface, destroy, or tamper with Matrix property belonging to another individual or corporation. In simpler terms, you arenât allowed to mess with someone elseâs hosts, icons, data, and so on without permission. It is also defined as using a cyberterminal equipped with Masking or Evasion programs (in other words, a cyberdeck) without the licenses to do so. Those utilities block the tracing procedures used by the Matrix and hosts connected to it. Because of what they do, those utilities are heavily restricted and require licenses for legal use, which are given only to security deckers and those with a similar professional requirement. Hacking is something that is almost always prosecuted, if the suspect is traced and apprehended. It is not taken lightly, and penalties are harsh, to say the least. Thankfully, this is an area of law that most legal users never encounter, as hacking is difficult to do accidentally. Privacy and Identity Laws All lawfully registered UCAS citizens have a SIN. This SIN is attached to their bank account, medical records, school transcripts, licenses, print and DNA records, and anything else for which they have to fill out paperwork. That information is how we prove who we are these days, and as such, itâs very important to protect it. Thatâs why we have privacy and identity laws in place. Privacy laws are intended to keep anyone from modifying your information without your permission. To do so is considered a serious crime, and incarceration is usually the sentence handed down. Hand-in-hand with the privacy laws are the identity laws, which make it a crime for any individual to steal or delete the identity of another. This is also counted as a serious crime, and often the guilty party is not only sentenced to incarceration, but is forced to make restitution to the victim, up to and including the costs associated with starting a new legal identity, if necessary. 116 I Matrix I ...................................................................................................... . T o access the virtual reallty of the Matrlx, three things are required: a speclailzed computer called a cybertenninal,a jackpoint, and either an account with a Matrix Setvice Provider (MSP) or programs that will allow you to fake an account. The computer interface is detailed in this chapter; the latter two requirements are discussed in Accessing the Matrix (p. 30). A cyberterminal is a computer with an ASlST interface and a suite of specialized programs called the persona. A persona allows the user to interact with other icons in the Matrix. In effect, a cyberterminal allows the user to experience the sensory input of the virtual world. (Note that the cyberdeck commonly used by deckers is merely a souped-up cyberterminal. For clarity and ease of use, cyberterminal will be used to refer to both cyberterminals and cyberdecks, except where the rules specifically apply to cyberdecks only.) It is possible to access the Matrix without using simsense and virtual reality (in fact, millions of people do it everyday when they make telecom calls). This use is described under Tortoise Mode (p. 42). The following rules describe the use of cyberterminals and cyberdecks. JACKING IN In the world of Shadowrun, manually accessing a computer via a keyboard and monitor or other low-tech tools is considered quaint. Most users prefer to access computer systems by creating a direct link to their brain, which allows for high-speed mental control. To interface oneâs brain with a computer, one must first have some way of linking the two together. Two devices may be used to create this link: trodes and datajacks. USING TR0DF.S Trodes are simply electrode nets that are slipped over a userâs head. Trodes have numerous contact points that are suctioned onto the userâs head over various nerve clusters. These contact points read and send electronic impulses to the brain and nervous system. Trodes come in various styles, from simple, functional nets to discreet and fashionable hairnets and headbands to flashy, stylized designs; trodes are often built into wigs and helmets as well. .................. ............................. ...................... ...... ........... ..... I Matrix I 17 I Trodes are connected to the cyberterminal through a simple fiberoptic cable. Removing the trodes from someoneâs head will cut the connection (and may subject the user to dump shoc:, see p. 227, S R 3 ) . Trodes are commonly used by the Awakened and others who avoid cybernetic implants. Disadvantages: Trodes are not as efficient as datajacks in transmitting data to and from the brain, so they impede the userâs speed within the Matrix. In game terms, using trodes reduces a characterâs Reaction in the Matrix by half (round down, to a minimum of I ) . A trode user receives a maximum Matrix Initiative dice of 2D6. It also takes a bit of time to adjust trodes for a proper fit and to calibrate them. Trodes require 3 full Combat Turns to position on a userâs head. USING A DATAJACK If trodes allow access to the Matrix superhighway, datajacks put the user in the express lane. Perhaps the most common implant in the world of 2061, the datajack allows the user to mentally link himself to devices that are equipped for direct neural input (DNI). The datajack must be connected to the cyberterminal via a fiberoptic cable. Datajacks are fully described on p. 298, SR3. Pure DNI Even with a datajack, most users still use keyboards. touchpads and other manual controls when interfacing with a computer. Many expert users consider any manual tools to be a crutch, however, and prefer to run by âpure DNIâ-engaging all their commands and operations through mental input. A user who runs by pure DNI uses his Intelligence attribute as his Matrix Reaction. Physical impulses donât apply to a user running pure DNI. Additionally, a pure DNI user can achieve significantly faster speeds if they are also operating with a hot ASIST interface (see below). In game terms, the user receives +2 to his Matrix Reaction and + 1 DO Matrix Initiative. Switching from pure DNI to standard partial-manual mode (and back again) requires only a Simple Action. The userâs Matrix Reaction and Initiative will not be modified until the beginning of the next Combat Turn, however. THE ASIST INTERFACE The ASIST interface controls the simsense experience of cyberspace. The signals transmitted from computer systems are translated into simsense, allowing the user to directly experience the Matrix via virtual reality. The ASIST interface maintains a complex and interwoven relationship with the userâs persona (see p. 20), in essence allowing the user to ââbecomeâ their icon. Because simsense signals tend to hog bandwidth, each ASIST interface control program comes with a compressed library of standard recorded sim sensations. Rather than transmitting direct simsense to the user, the accessed system transmits instructions to use and combine these sim samples to help create an experience; non-standard sim sensations are transmitted directly. Because the sim samples are recorded in ACT 1s M a trjx format, they are slightly less ârealâ than Dir-X feeds. Thus, it is easy to distinguish between a basic system that takes advantage of sim samples and a novahot system that has the processing power to feed all its simsense direct to the user. The majority of cyberterminals and some cyberdecks are equipped with the standard ASIST interface (also called âcold ASISTâ)).Many deckers and security specialists prefer to crank up the sim by using an advanced âhot ASIST interface. ASIST interfaces also integrate two important components, the RAS override and the realib filter. All of these are described below. COLD ASIST The standard ASlST interface is not that different from the ASIST interface found in home simsense players and rigger remote control decks. In effect, it uses the legal levels of simsense. Legally purchased cyberterminals are equipped with this interface. Advantage: A cold ASIST interface protects the user from taking lethal damage from black IC, because the interface cannot amplify biofeedback to brain-frying levels. Treat lethal black IC as non-lethal black IC (p. 230, SR3) for attacks against a user with cold ASIST. Psychotropic black IC and other IC effects are not changed. HOT ASIST The signal strength of a hot ASIST interface is on par with the brain-kicking current a wirehead gets from a BTL chip. The intensity of this input allows the user to experience the Matrix in better-than-real conditions. It may seem like sheer madness to redline an ASIST interface this way, because even random line noise could potentially be translated into lethal amounts of feedback. Many deckers, however, rely on the boosted signal strength to provide them with the speed they need. Simply put, the human mind is not designed to comprehend data at a rate fast enough to be competitive with a computer. With a hot ASIST, the user becomes hyper-alert, as every sense and every neuron become sensitive to the translated machine code coming through the Matrix. The user can literally feel the code of a program running under his fingers, as the persona translates a wider degree of data that simply could not be perceived through the basic senses alone. In addition to the standard methods of visual and auditory clues, relevant data may be felt as other sensations. For example, the warning message about an incoming attack program may be experienced by the user as if his skin were on fire. Running with Hot ASIST Hot ASIST provides several bonuses to the user. First, it allows the user to take advantage of Response Increase. Second, it allows the user to gain an extra speed bonus by running pure DNI. Third, it provides the user with Hacking Pool (see p. 26). Disadvantages: It also has two drawbacks. First, the user becomes vulnerable to lethal damage by black IC. Second, hot ASlST interfaces are also illegal, and so the user risks legal problems i f caught using one. ...................................................................................................... H o t and Cold A hot ASIST interface may be switched to run as a cold ASIST interface (and back again) with a mental command that counts as a Complex Action. The new interface kicks in at the beginning of the next Combat Turn. Switching interfaces while under attack by black IC requires the same tests as attempting to jack out (see Black fC,p. 230, SR.3). RAS OVERRIDE ASIST circuitry includes a reticular-activation system override (RAS). The RAS override suppresses sensory signals from the userâs meat body, freeing him to concentrate fully on the simsense experience of the Matrix and preventing him from flailing about in the real world. Real World Interaction Acting in the physical world while an RAS override is active is quite difficult. Apply a +8 modifier to all physical actions and Perception Tests while affected by an RAS override. Interacting with the real world will also inhibit a userâs speed in the Matrix (see Initiative and the Physical World, p. 223, SR3). It is possible to build a cyberterminal without an RAS override or to disconnect one already in place. However, attempting to function in two sensed environments simultaneously is extremely disorienting. A user doing so suffers a +8 Perception ............... ................. ......... ......................... Test modifier and a +4modifier to all other target numbers for tests in the Matrix and the physical world. REALITY FILTER A reality filter is an ASIST-interface accessory that intercepts the sensory input from the system being accessed and replaces or modifies the input according to a template and library designed by the user. In other words, the reality filter imposes a metaphor on the Matrix. The user does not see the system and icons as they are designed to appear. Instead, the reality filter translates appearances and sensations so that they appear and feel like whatever ârealityâ the filter has been programmed to simulate. For example, a user with strong Christian belief3 may program their reality filter so that icons appear as angels or devils, hosts appear heavenly, and menus appear as scrolls written in Latin. A user with a taste for early twentieth-century airplanes may design a reality filter so that she experiences movement through the Matrix as flying a propeller plane through the clouds (grids) or barnstorming (hosts); naturally, Matrix combat would be represented by dogfighting. The Reality Filter Advantage Because reality filters are personalized to the user, they allow the user to operate in the Matrix more quiddy and effi- ................................... .. I Matrix I 19 I ciently. A user with a reality filter can more easily conduct operations within the Matrix because the iconography and command metaphors are always translated the same, according to the userâs style. In game terms, using a reality filter provides the user with an additional +2 to Matrix Reaction and + 1 D6 Matrix Initiative. A user may turn a reality filter on and off using a Complex Action: the userâs Initiative Score will not be affected until the next Combat Turn. Reality filters are custom-designed for each user. If a character uses a reality filter designed for someone else, he will suffer a +Z target number modifier and will not receive the Reaction or Initiative bonus from the filter. Reality filters consume an enormous amount of the processing power of a cyberterminalâs master persona control program (MPCP). As a result, whenever a reality filter is active, the cyberterminalâs effective MPCP is reduced by 1. The user may have to reduce his persona and utility programs to keep them within acceptable limits. (See The MPCP below for more information.) Note that certain sculpted systems may interfere with the function of a reality filter. See Sculpted Systems and Reality Filters, p. 42. RESPONSE INCREASE Response lncrease is a boost to the processing power of the hot ASIST interface. In effect, it heightens the sensitivity of the user and the translation speeds for ASIST signals. Response Increase boosts the userâs speed within the Matrix, allowing him to interact with the computer code more quickly and efficiently than normal. Response Increase functions only with a hot ASIST. It provides no bonus when used with a cold ASIST. Speed Bonus Each level of Response Increase adds +2 to Matrix Reaction and +1D6 to Matrix Initiative. The maximum level allowed is 3, and a cyberterminal can only support a level of Response Increase equal to its MPCP + 4 (round down). The speed bonus provided by Response Increase is cumulative with the bonuses from reality filters and running pure DNI. MEET YOUR PERSONA A persona is an array of programs used by a cyberterminal user to interact with the Matrix. While the ASIST interface allows the user to experience virtual reality, the persona allows the user to interact with it. In effect, the persona powers the icon that represents the user. The persona itself is really a combination of processes and programs. The attributes of the persona icon are defined by several persona programs as well as the cyberterminalâs other options, such as Response Increase. The persona is also controlled by the cyberterminalâs operating system, the master persona control program (MPCP). 80 Matrix THE MPCP The MPCP runs on a set of dedicated processing chips and is the central component of the cyberterminal. The MPCP is the heart of the circuitry, like the motherboard in a standard microcomputer. All other programs on the cyberterminal, including persona programs and utilities, execute under the MPCPâs control. Therefore, the MPCP determines the maximum ratings for these subordinate programs. No utility or persona program run on the cyberterminal can have a base rating greater than the MPCP. Additionally, the total ratings of the cyberterminalâs persona programs cannot exceed the MPCP x 3. In most locales, the MPCP of a cyberterminal is legally limited to rating 4 or less. SIGNAlIlRE Each MPCP has a serial number embedded in its programming that is used to identify the cyberterminal. This serial number-called the signatureis required for almost all interactions between the cyberterminal and other computers. Aside from numerous authentication and accounting purposes, this signature also creates a detailed datatrail. Matrix systems log all operations conducted on them; every time a user logs on, edits a file or touches a control system, the system queries the MPCP for its signature and logs the event, recording it alongside a timestamp and code indicating the operation performed. Every legally manufactured cyberterminal MPCP contains a unique signature that cannot be removed. However, deckers equip their cyberdecks with masking persona programs to conceal their MPCP and inhibit, alter and otherwise meddle with the signatureâs use (see Masking, p. 2 1 ). Many deckers manufacture their own MPCPs and leave out the damning signature. However, as the majority of systems will simply refuse to interact with an MPCP that lacks a signature, even these decks require masking programs to forge a signature (or something equivalent) when necessary. PERSONA PROGRAMS The persona programs define the characteristicsof the persona and icon. All cyberterminals have bod and sensor programs; in fact, these persona programs are required at a minimum rating of 1 to access the Matrixâs virtual reality. Evasion and masking are programs only used by those trying to conceal their identity and datatrail or who are expecting to engage in cybercombat. Bod Bod measures the stability and structural integrity of the persona. It represents the personaâs resistance to attacks against its error checking, logic functions and Matrix connection paths. Evasion Evasion defines the agility of the persona-its ability to maneuver in cybercombat and escape the attentions of trace IC. Evasion works by constantly changing and altering the memory space used by the persona as well as rerouting connections, generating false log entries and creating misleading trace paths. ...........................................,...............................,..........................., Evasion is legally restricted to use by Matrix security specialists (Legality 3P-S). It is not installed in standard cyberterminals, though no decker would be caught without it. deckers and security sysops take steps to include defensive measures in their cyberterminals, primarily hardening and an ICCM biofeedback filter. Masking Masking performs a variety of functions, all designed to interfere with any process that requires the cyberdeckâs signature. Masking helps to conceal the persona from the system and other personas, intercept and either mislead or redirect signature requests, appease verification processes, and also to alter the userâs datatrail. Masking is usually illegal (Legality 2 4 ) . and is the prime element used to distinguish a cyberdeck from a cyberterminal. It is by far the most useful illegal modification made by deckers. Some security deckers are required by their employers to use their signatures on home systems. These security specialists make use of system-aware signature suppression (SASS) masking programs, so their signatures are automatically used on some systems and masked on others. HARDENING Hardening is a catchall term that refers to a range of subroutines and hardware used to defend the cyberterminal and persona against offensive code (see p. 206, SIU, for more details). Hardening includes programs that redirect attack code and restore glitched programs, as well as built-in redundancy and electrical surge protection systems. I C C M BIOFEEDBACK FILTER Intrusion counter-countefmeasures (ICCM) biofeedback filters protect users from the worst effects of black IC. They protect the user by blocking dangerous high-level ASIST signals and interfering with unsafe biofeedback. Advantages: An ICCM filter increases the userâs chances OF jacking out successfully when under attack by black IC. Apply a -2 modifier to the target number for the Willpower (IC Rating) Test (see Black IC in Cornbat, p. 230, SIU). The filter also allows a user to make two separate Damage Resistance Tests against lethal and non-lethal black I C - o n e test with Body and one with Willpower. The player may choose the test with the best result to use as the characterâs resistance. Karma Pool dice added to the test are rolled separately and augment the chosen Resistance Test. Hacking Pool dice cannot be used for these tests. The ICCM filter is not effective against the psychological effects of psychotropic IC. However, it does buffer the decker from the physical side effects of sparky IC programs (see p. 229, SIU), the same as it does against black IC. Sensor The sensor persona program translates the crushing amount of data flowing through the Matrix into a form understandable by a metahuman user. A high rating denotes advanced signal discrimination features, the capability to monitor system processes for changes and new features, and excellent machine code and simsense translation speeds. The sensor program allows users to âtalkâ to each other within the Matrix, as if they were both standing next to each other in the real world. The program translates mental speech and transmits it to other specified icons, whose sensor programs then translate it to their users as if they were hearing it spoken. Many users intentionally instruct their sensor programs to âlistenâ only to specified icons, to avoid background noise and harassment from the icons of strangers. TRANSMISSION SPEEDS Each cyberterminal has an 1/0 Speed that measures the rate at which it transmits data. This figure represents the speed at which utilities and datafiles are uploaded and downloaded, in Mp per Combat Turn. Because any data passingto or from the cyberterminal must also pass through the jackpoint, the jackpointâs 1/0Speed may affect the userâs transmission rate (see The jackpoint, p. 30). Use the lowest 1/0Speed, whether jackpoint or cybeiterminal, when determining how fast data is uploaded and downloaded. THE ICON The persona is virtually represented within the Matrix by an icon. The appearance of this icon depends on the icon chip within the cyberterminal. It may be a factory default UMS icon, a custom-ordered creation or a self-programmed representation of the user. The resolution and general design quality of the iconâs appearance, motions and so forth depend on the iconâs rating. A Rating 1 icon is going to look like a bad, low-res black-andwhite photocopy at best; a Rating I2 icon is going to move seamlessly and look more real than real. An iconâs rating cannot exceed the MPCP rating of the cyberterminal. MULTIPLEXING Multiplexing enables a user to upload multiple utilities or upload and download files or programs simultaneously. To multiplex, the user divides his 1/0 Speed between different jobs any way he likes. For example, a user with a cyberterminal that has an 1/0Speed of 1 0 0 could download files at a rate of 25 M p per Combat Turn and upload utility programs at a rate of 75 per Combat Turn. Multiplexing does not use any extra actions other than that required by the system operation and requires no tests. PROTECTIVE SYSTEMS The Matrix can be a dangerous place, as anyone whoâs ever had their persona shredded by an attack program or their brain melted by IC will testify to. To lessen these dangers, many ........................ ... .............................. * ...,.... ~ ........................... I Matrix 1 21 1 n the world of S h a d o w n , almost everyone uses the Matrix. Whether youâre a telecommuting office worker, a student online researcher, a Matrix socialite or an ICsmashinâ hacker, youâre likely to spend a big chunk of your life in the Matrix. While there is no âtypicalâ Matrix user, there are some definite differences between types of Matrix users. joe Cyberterminal is going to look like a retrograde loser when compared to Jane Decker, with her slick moves, sleek icon and blistering utilities. While the two are bound to hold several characteristics in common merely by their joint use of virtual reality, deckers and security sysops are much more focused and specialized. This chapter describes the relevance of certain attributes, skills, dice pools and other factors to all Matrix users, but to deckers in particular. Any character who plans on using the Matrix should take note here, especially those who enter the realm of hacking and cybercombat. The children of the Matrix known as otaku are described in the chapter beginning on p. 133. I ATTRIBUTES The Matrix is a unique environment that presents challenges quite different from those found in the physical world. Consequently, certain character attributes take on extra importance and others become less important when a character operates in the Matrix. Physical attributes have little effect when operating in the Matrix-after all, in cyberspace itâs your persona, not your meat body, that counts. This holds true even for deckers. Though a high Body rating may be useful when it comes to shrugging off black IC, ICCM biofeedback technology (p. 21) allows deckers to depend on their Willpower instead. Enough Quickness For a decent Reaction is useful, but frankly, most hot deckers depend on their decks, not their meat, for speed. 22 Matrix ..................................................................................................... Mental attributes, on the other hand, become more important. Intelligence is especially important, because all technical and knowledge skills are linked to it. And for deckers, Intelligence is crucial to their Hacking Pools. REACTION AND INlTlATiVE The average Matrix user lacks a hot ASIST interface and doesnât usually need the acceleration bonuses required for decking or Matrix combat. However, any decker or security sysop worth his reputation will operate with a hot ASIST and Response Increase and may run by pure DNI or with a reality filter for an extra edge. The bonuses provided by these speed options are cumulative, but the maximum cumulative speed bonus in the Matrix is + 10 Reaction and +5D6 Initiative. A character running by pure DNI uses Intelligence as his Matrix Reaction; otherwise, Reaction is calculated normally. Cyberware and bioware have no direct effect upon a userâs Matrix Reaction and Initiative. SKILLS Thanks to the icon-driven, user-friendly environment of the Matrix, even those completely lacking in Computer skill can access it. However, for deckers and other Matrix fanatics, the Computer skill and various complementary Knowledge sltills are a necessity. ACTIVE SKILLS The following active skills may be particularly useful to deckers and other Matrix users. Computer Skill The idiot-proof nature of modern computers allows anyone to use computers at a basic level without causing damage. However, Computer s l d l is a prerequisite for any character who wishes to manipulate programs and systems and generally get the most out of the Matrix. A low Computer sltill represents a basic understanding of operating systems, program functions, Matrix topography and icon interaction; the higher a characterâs Computer skill becomes, the more they know about how to use the Matrix to their advantage. As the specializations indicate, the Computer skill encompasses knowledge and use of hardware, haclting, programming, conducting searches and the interface between man and machine. Cybernetics: The Cybernetics specialization may be useful in creating ICCM biofeedback filters (p. 21) as well as certain surgical operations involving computerized systems, as described on p. 136, M&M. Decking: The Decking specialization is used for any nonauthorized system operation or improvised attack, though deckers will suffer if they increase skill in Decking at the expense of programming ability. Hardware: The Hardware specialization is useful when the character is using regular computers, mainframes and other computer devices. Actually building or modifying such systems requires the Computer B/R skill. I 2 1 1 1 I Matrix I ....................................... Programming: The Programming specialization is the best friend of deckers and sysops everywhere. The maximum rating of any utility a character can design is equal to her Computer (Programming) skill. The ratings of character-designed MPCPs and frame cores may not exceed the characterâs Computer (Programming)Skill multiplied by 1.5 (see Programming, p. 76). Search Operations: The Search Operation specialization includes the mastery of search engines and databases. The sltill is used whenever conducting Matrix information searches (see p. 124). d J Computer Build/Repair Skill The Computer Build/Repair sltill encompasses building and modifying cyberterminals, cyberdeclts and other computer systems, whether assembling them from scratch or slapping together purchased parts. For more details, see Cyberterminal Construction, p. 52. il Electronics Build/Repair Skill The Electronics Build/Repair skill is primarily used by deckers who are breaking open a device to create an illegal jacltpoint (see p. 32). Etiquette (Matrix) Specialization The Matrix specialization of the Etiquette sltill is used whenever interacting with other personas in virtual environments, whether scouring for gossip, shopping for programs or talking your way into gaining access to a Shadowland node. This specialization encompasses an understanding of basic âhetiquetteâ and avoiding behavior that would be improper or out of place. It also keeps the user current on who the major players are in cyberspace and lets him pick up the latest rumors in the global gossip of the Matrix. See p. 124 for details on using Etiquette (Matrix) during Matrix searches. Small Unit Tactics (Matrix) The Matrix specialization of the Small Unit Tactics skill allows the user to take advantage of group tactics and coordination within the Matrix. To use this skill for the benefit of others, both the user of the sltill and the recipient of the bonuses must be linked via a BattleTac Matrixlinlt program (see p. 7 1 ). For more information on the use of Small Unit Tactics, see p. 105, CC. SYSTEM FAMILIARITY KNOWLEDGE SKILLS A set of knowledge skills called System Familiarity sltills may be particularly useful to deckers and others who are trying to take advantage of a specific type of system. Each System Familiarity sltill focuses on a particular type of Matrix system (as described on p. 25). Having a particular sltill provides the user with knowledge of common features, vulnerabilities, security tricks, bugs and other anomalies of a particular system. When a user enters a grid or host that matches a particular System Familiarity sltill he possesses, the user may make a System Familiarity Skill Test against a target n u m k r equal to the systemâs Security rating. This test does not require an action. Each success 1 provides the user with an additional Hacking Pool die for the duration of the userâs stay within that system. Only one System Skill Test may be made per system, and the test must be repeated if the user leaves and returns at a later point. The number of additional Hacking Pool dice provided by this test may not exceed the userâs original Hacking Pool. System Familiarity skills may have specializations. Generally, these relate to the owner, maker or Security Code (color) of the host. Note that System Familiarity skill lknowsofts may be used in the same manner, but their use incurs a +4 modifier to the Skill Test. In addition to the System Familiarity skills described below, gamemasters may allow players to use skills that focus on other types of systems. Automated Factory Familiarity The Automated Factory Familiarity skill applies to any host that primarily manages and controls the functions of automated and robotic factory systems. Cellular Network Familiarity The Cellular Network Familiarity skill makes the user aware of the ins and outs of the Matrix host portion of cellular networks. This skill allows the user to more easily access the Matrix via cellular networks, tap and triangulate cell phones and so on. Chat Room Familiarity The Chat Room Familiarity skill imparts a knowledge of the hosts and software typically used for Matrix chat and meeting rooms, persona social clubs, message boards and other systems created specifically for interaction via persona. Chokepoint Famlllarity A user with Chokepoint Familiarity is accustomed to the features and idiosyncrasies of firewalls, killing jars and other chokepoint hosts that act as security checkpoints against users attempting to access the next host down the line. Communication Satellite Familiarity The Communication Satellite Familiarity skill gives the user an edge when hacking and manipulating satellites and satellite constellations that manage data traffic. Note that this skill does not apply to the hosts of orbital habitats and factories. Data Archive Familiarity The Data Archive Familiarity skill applies to any host that acts as a database or information archive, whether a virtual library or searchable host of a data haven. Use of this skill can also help the user in....'.'......... * . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Matrix 135 2 âpayâ channels or 1 sim feed channel per Ilkstyle level above Low. Additional channels may be purchased at a cost of 10 nuyen per channel per month (20 nuyen for sim). Premium Matrix service also includes service and a commcode for one wireless access device such as a cell phone, pager or pocket secretary. Additional wireless service may be purchased, usually costing approximately 25 nuyen per device. Rather than hacking the media source of a satellite channel, a decker can take an easier route and simply break the encryption scheme. Depending upon the rating of the encryption (gamemasterâs discretion) and the boosterâs decryption software, however, this may be easier said than done (see BroadcastEncryption, p. 289, 973).Most channels change their encryption schemes once a month. High-speed Matrix Service cost: looY (300Y) lifestyle: High A high-speed Matrix connection represents a dedicated leased line purchased from either the MSP or LTG vendor, allowing higher file-transfer speeds. High-speed service includes everything premium Matrix service provides, with four premium or two sim channels per lifestyle level above Medium. Additional channels may be purchased at a cost of 5 nuyen per month (10 nuyen for sim). High-speed Matrix jackpoints provide increased I/O speeds (see Hardwired Jackpoints, p. 32). MSP ACCOUNTS Satellite Channel Reception Cost: SOY (250Y) Lifestyle: None This is basic satellite trid reception. It includes every channel normally availdble on the local networks N well as broadcasts from around the world. Satellite channel broadcasts can be picked up by anyone with a satellite dish, but the transmission will be scrambled unless you are a paid and registered subscriber. BOOSTING MATRIX SERVICES In order to steal Matrix services (called âboostingâ), a decker must hack the telco or MSPâs database and insert information to create a bogus Matrix Services account. Depending on the systemâs security, this is usually a risky endeavor. Most MSPs are Orange-Average systems, and typically have high levels of Probe IC. To create the account, the decker must first logon. Then she must make a successful Locate File operation to find the account listings and a Validate Passcode operation to input the new account passcode. If the decker wants to link the account to a jackpoint and activate it, he must also make a Control Slave operation. If the decker doesnât have a bank account set up (real or fake) he will need to periodically hack back in and perform Locate File and Edit File operations to alter the billing records so that it looks like the bill is being paid. The decker may make additional Edit File operations to activate additional commcodes or Control Slave operations to register additional jackpoints. Boosting Subscription Channels In order to boost the pay channels available through premium Matrix services, the decker must hack the media company (typically Green-Hard or Orange-Easy systems) and perform a Validate Passcode operation for each desired channel. The decker will also need to perform an Edit Files operation on a monthly basis to simulate payment, just as with boosting other Matrix services. 36 Matrix Every legal user of the Matrix has an account with a Matrix Service Provider (MSP). This account is called an MSP account. The MSP account provides the space for the user to load his persona into the Matrix. It also provides the user with a commcode so that others may reach him through the Matrix. The main MSP for any given area is the telco responsible for running the local LTG. Most private Matrix users purchase their accounts directly from the telco: thus, when they log into their account, they log onto the LTG. Aside from the telco, many other MSPs also sell and provide MSP accounts to users. Large MSPs such as UCAS Online run their own PLTGs, while smaller outfits provide accounts from a host, or series of hosts. Most businesses provide M S P accounts to their employees; logging into these accounts at the workplace places the user in the businessâ host or PLTG. Accounts with smaller MSPs are also registered in the databases of the closest telco. Every host and grid on the Matrix requires the user to log onto their system using an account. Many public commercial hosts accept the userâs basic MSP account as a login, while others require you to access an additional account specific to that system. In order to access an MSP account, the user logs on with a passcode (see Passcodes, p. 3 7 ) .This allows the individual to use the account and log on to the LTG (or host)-the Logon system operation automatically succeeds. Most users operate through a personal account, but certain types of accounts provide extra privileges (see Account Privileges, p. 37). Whenever a user logs on, he also creates a datatrail (p. 38) through which his activity can be logged and traced. REGISTERING AN MSP ACCOUNT To register an account with an MSP, the user must provide a SIN and information on the userâs bank account for automatic billing purposes. The user also provides the serial numbers of any jackpoints and wireless devices (usually cellphones, pagers or pocket secretaries) he owns or is assigned to use (see The Datatrail, p. 38). A commcode is assigned to each of these jackpoints or devices; often a single commcode will cover several jackpoints. The commcode is essentially a phone number and an email address rolled up into one. In order to access an MSP account, the user chooses a passcode. For extra security, some MSP accounts can only be accessed with a cyberterminal bearing the correct MPCP signature. MSP Accounts in Everyday Use When a user wishes to legally access the Matrix, he mere- ....,......,...................................,........................................................ ly plugs his cyberterminal into a jackpoint and logs onto the LTG using the passcode for his MSP account. If at work, the employee jacks in and logs on to his employerâs host or PLTG. Whenever someone calls, faxes or sends email to the user, the transmission is directed through the Matrix to the jackpoints and wireless devices associated with the commcode. The attached device then rings (phones and telecoms), prints out (fax machines) or logs the message (computers, pagers and phones) as appropriate. PASSCODES A passcode is a security device intended to keep unauthorized users out of a system and allow the authorized user to access an MSP account. In effect, passcodes are access codes that guarantee automatic success when attempting certain tasks or manipulating specific files on a system. Any activity not authorized by the passcode requires System Tests (see p. 209, SR.3) and can jeopardize the passcode. In other words, a passcode is a key that allows a user to open up certain locked doors within a house; depending on the privileges assigned to the passcode, the key will not work on certain doors, requiring the user to pick the lock (what deckers do). Passcodes come in various formats depending on the security needs of the provider. These can range from very simple to exceedingly complex, though system designers have to keep in mind that the more complex the passcode, the less user-friendly the system. Creating a good passcode system is therefore often a struggle to find a compromise between security and ease-of-use. Basic Passcodes Simple passcodes consist of sets ofsymbols that the user enters when he wants to log on. If entered correctly, the system grants the user access. The most common passcodes are alphanumeric strings. Because the Matrix is a virtual reality, passcode symbols can also consist of images, tunes or even specific movements. Linked Passcodes A linked pasxode requires an extra bit of input from the u s e r - a n extra level of identification specific to a person or a cyberterminal. This can be a scan from a security scanner (retinal, fingerprint, palmprint and so on) linked to the cyberterminal or the correct signature from the cyberterminalâs MPCP. If the scan or signature doesnât match the records, access will be denied. Passkeys One of the most secure ways of controlling access to a system is by means of a passkey-a module that plugs into a cyberterminal. Many corporations require this accessory for telecommuting workers. When a logon is attempted, the system queries the module in the cyberterminal. If it doesnât receive the proper code, the user is denied access. ACCOUNT PRIVILEGES Most accounts have some sort of limitation: after all, it doesnât make sense to allow every user to read every other ....................................................... ............................................... Matrix 37 âprivateâ files marked as belonging just to an individual. In most cases, it is more advantageous to log on with a personal account, as that gives access to both the userâs private files and the files of the group (or groups) to which the user belongs. Automatic System Tests: The same as personal privileges. userâs email and access their personal files. Likewise, system administrators and security deckers should have privileges above and beyond that of the basic user. Four types of account privileges exist: personal, group, security and superuser. Automatic System Tests: Having the passcode for an account allows the user to automatically succeed in their Access Test to logon to the system. Depending upon the privileges assigned to the account, the user may also be able to perform other operations without having to make System Tests. For these automatic System Tests, the user does not need to roll any dice, nor does the system make a Security Test against the user to increase the Security Tally. The user must still take the appropriate action (Free, Simple or Complex). For System Tests where the number of successes achieved is important, allow the user to make a System Test as normal to achieve more successes. Keep in mind that because the operation is considered legal, the system still does not make a Security Test. Each type of account privilege lists the system operations that are considered legal and that succeed automatically. The gamemaster should modify these depending upon the account and system in question. Many systems are more restrictive, while some give users more access. If a system operation is marked with an asterisk, the operation is only automatic i f the passcode gives access to the particular file or subsystem. security A security account passcode allows more privileges than those available to run-of-the-mill users. Security accounts are typically given to senior management and the mid-level technical staff. Most security deckers also have security passcodes, though some have been known to hack themselves up to superuser access, depending on how strongly their corporation feels on this issue. As with normal users, security users are often part of one or more user groups. Automatic System Tests: The same as for personal privileges, plus Abort Host Shutdown, Analyze Host*, Analyze Operation, Analyze Subsystem*, Block System Operation, Crash Application*, Encrypt Accessâ, Encrypt File*, Encrypt Slaveâ, Locate IC, Restrict Icon, Scan Icon, Trace MXP Address Superuser Most systems will have a few users that are granted superuser status. Also known as âroot privilege,â superuser privilege allows the user total access, so that any problems that come up in the system can be solved. Superuser access authorizes almost any activity, including destruction of important data or actions that damage the system or render it inactive. Automatic System Tests: The same as for security privileges, plus Crash Host, Disinfect, Dump Log, Intercept Data, Invalidate Account, Tap Commcall, Validate Account. Note that as long as the system is not under active alert, superuser status provides the user with a -2 modifier to all System Test target numbers. Personal The standard personal account authorization provides the basic privileges available to most users. Personal status allows the user to access the hosts, files and/or slave systems that they need to do their job, but thatâs about it. The extent of access also depends on the userâs position in the organization: a supervisor will have wider access than a lowly office temp. Automatic System Tests: Analyze Icon, Control Slave*, Decrypt Fileâ, Download Data*, Edit File*, Edit Slave*, Graceful Logoff, Locate Access Node, Locate Decker, Locate File*, Locate Frame, Locate Slaveâ, Locate Tortoise Users, Logon to Hostâ, Logon to LTG*, Logon to RTG*, Make Commcall*, Monitor Slaveâ, Send Data, Swap Memory, Upload Data BILLING The fees for an account with an MSP are deducted automatically on a monthly basis from the bank account provided. If you donât have the cred, your Matrix account will be shut down. The fees for Matrix use are based on a monthly basic access charge. Unlike in the old days of telecommunication, users are no longer charged according to their time online or even for âlong-distanceâ calls (in the Matrix, anywhere in the world is just an RTG away). Matrix users typically rack up extra Matrix charges by paying to access certain hosts, downloading sims or software, playing virtual games or otherwise using a commercial Matrix service. Aside from the basic Matrix news, trid and sim channels, many users also subscribe to additional Matrix newsfeeds or entertainment channels. For more information, see Matrix Services, p. 35. Group Users are often linked together in groups. These groups are then given access as a whole to files or slave systems. This allows the system to easily control access to specific areas as well as allowing the users to share files with other users who will need them. For example, all public relations staff will be part of a group that has access to public relations files, but their group will not be able to access files pertaining to the companyâs financial records. Group access is not a higher level than personal accessrather, they exist side-by-side with a degree of overlap. As an example, even though two wageslaves may be in the same group, they cannot access each otherâs personal files. Both of them, however, can work with the files marked for access by their group (and they both can mark some or all of their own files for group-level access). A user who logs on with a group passcode can only gain access to the files that are âsharedâ in the group-not to any aâ¬$ Matrix THE DATATRAIL Whenever a Matrix session is initiated, a series of invisible processes take place to identify, track and log the user. Originally for administration and billing purposes, these processes are now frequently used to track computer criminals. ......................................... I Jackpoint ID In order to allow access to the Matrix, each jackpoint must be registered with the telecommunications company that runs the grid. The actual jack itself has a hardwired, unique identification number built in by the manufacturer. All commercially produced jacks are required to have this serial number, including jackpoints built into computers, telecoms and so on. Matrixattached wireless link receivers also have their own serial numbers (and, in some cases, the wireless link interface device, such as a cell phone, may have one as well). Every jackpoint within a typical home will have its own serial number. Even illegal Matrix taps have a serial number, because each remote device and access port on a fiberoptic trunk is assigned one. The M X P Address When a user begins a Matrix session, he is assigned a numerical code called a Matrix protocol address (MXP address). This M X P address incorporates the jackpointâs serial number. All traffic that passes into the Matrix through the jacltpoint is âtaggedâ with this M X P address to show its origin. The telco operating the grid logs each M X P address. In addition to the jackpointâs number and physical location, this log includes information on the MPCPâs signature, the MSP account used, the assigned commcode, and the time the Matrix session begins and ends. The bank account information linked to the MSP account is also listed for billing purposes. Depending on the telco, the log may also include other information, such as what LTCs and RTCs were accessed and when. Trace programs operate by locating the M X P address and checking its reference in the telcoâs database to determine the physical location. Masking and camouflage ut conceal this number and interfere with its transmission. DECKING AND UNAUTHORIZED ACCESS Naturally, unauthorized users such as deckers prefer not to leave incriminating datatrails. Aside from the wonders of the masking persona program and the use of wireless links that make it difficult for programs to trace back to their actual location, deckers use several methods to protect their privacy. ACCESS THROUGH DECEPTION The primary way deckers gain access is simply using a deception utility and faking their way in. In truth, modern declters donât actually need the passcode to an MSP account to get online-this is what deception programs do (p. 220, 97.3).A decker without the passcode to an MSP account must perform a standard Logon to Host/LTC/RTC operation, using deception and hacker tricks to fool the system into believing a legitimate logon has been made. Of course, some deckers believe any extra advantage they can get over trace programs and the like is worth having. These deckers may employ any of the following options. SPOOFING JACKPOINTS Deckers cannot use a jackpoint that does not have a serial number-the telco will simply refuse to allow access, and it .................... cannot be forced. However, there are several options for âspoofingâ a jackpointâs serial number. The first is to simply use a number from an existing jack point-either by filching the number or actually ripping out a jackpointâs interface and hooking it back up in a different location-so that the telcoâs information on the jackpointâs actual location will be incorrect. However, the telco will ltnow if two jackpoints are registered with the same serial number and immediately disable both. Also, the telcoâs software will quickly realize that that the data is being transmitted through a different chain of Matrix relay nodes than is appropriate for its location and will disable it after DO minutes. If the appropriate relay node (or nodes) can be located and hacked, the decker can hide this discrepancy, thus giving the jackpoint a longer life span (gamemasterâs discretion). The second option is to hack into the telcoâs database and edit the location of an existing jackpoint. This option is also undermined by the conflicting data from Matrix relay nodes and so suffers the same short lifespan (D6 minutes, longer if the relay nodes are found and fooled). Because this entry must be hacked anyway in order to create an illegal access jackpoint, some deckers intentionally insert fake locations when boosting service. USING A THROWAWAY MSP ACCOUNT Many deckers prefer to save the hacking for the hard hosts, resorting to âthrowawayâ MSP accounts to gain easy access. Called throwaways because they are generally only useful for a single decking run before they are invalidated. a throwaway is simply the passcode to an MSP account that the decker uses to gain easy access. There is a thriving market is throwaway accounts among the decker community. Typically they are sold for 100 nuyen apiece for basic personal accounts, though prices may vary. Accounts that provide access to specific hosts (rather than just the LTC) sell for at least double or triple that amount. Bogus Accounts One way of obtaining a throwaway account is to register one using false information. This generally requires the decker to have a bogus bank account and SIN set up beforehand, neither of which are easy tasks. A second option is to hack the telcoâs database (or whomever) and create accounts and passcodes by inserting information. This is done using roughly the same tasks as when setting up a fake MSP account (see p. 36). Stealing Passcodes Stealing the passcodes to existing accounts is always an option for enterprising deckers. In the case of users who are absent-minded, lazy or just generally not security-minded, this may be quite easy. Often times, these users will have their passcode written down nearby or even easily found on their computer. Otherwise, the decker may have to get the passcode out of a person the hard way: using interrogation or intimidation. This has the drawback that the person knows their account is going to be compromised. Most users choose passcodes that ............. ....,.,...,....,.................. .................................. * ,, I 1 Matrix 1 I 39 1 I are easy to remember (their birth date, their carâs license plate, their petâs name and so on). so a decker who researches a user may be able to more easily deduce the passcode. It is also possible to steal passcodes online, either by hacking the MSPâs database or by using a sniffer utility (p. 71) to monitor a user logging on. In the case of users with linked passcodes or passkeys, stealing the passcode itself will be useless unless the decker can also forge the required scan, signature or passkey. Forging a signature requires the decker to burn a new MPCP with that signature, while forging a scan requires the same effort as to fool a scanner on a magloclc (see p. 235, S R 3 ) . Copying Passkeys To take advantage of an MSP account that requires a passkey (see p. 37),a decker can attempt to copy a legitimate passkey. To do this, the decker will need either the schematics for a passkey or access to one with enough time to thoroughly analyze it. Analyzing a passkey requires a successful Computer (B/R) lest with a target number equal to the passkeyâs rating and a base time of 4 hours (divide this time by the successes achieved). The decker will also need a computer kit for this task. With the necessary information obtained, the decker can then make a copy of a passkey. This task requires both an electronics shop and a programming suite. To succeed. the decker must make an Electronics B/R Test with a target number equal to the passkeyâs rating and a base time of (passkey rating) days. A passkey algorithm program is typically only 10 Mp in size. PASSCODE SECURITY As the âvirtual keysâ to an account, passcodes need to be secure. Unfortunately, users often handle them irresponsibly. This means that system administrators need ways to plug holes that are created either inadvertently by users or deliberately by hostile deckers. Activity L o g s Depending on the level of security, almost any activity that occurs in a host or grid can be logged. Because it can be easy to create huge logs full of banal data, most systems only keep logs of error messages, logons and suspected security breaches. More paranoid sysops may choose to log all operations and manipulated files, including the time, date, account, MPCP signature and MXP address. Ultimately, it is up to the gamemaster to decide how carefully a system tracks its users. Security and superuser level users can check these logs using the Dump Log operation. Logs exist as files on the system, and they can be found with the Locate File system operation or changed with the Edit File operation. Periodic Changing of Codes To prevent people who have gained access to a passcode from using it indefinitely, many systems automatically require users to change their passcodes on a regular basis, typically weekly or semi-monthly. This is typically only enforced on security-conscious systems, as Joe User often has trouble VO M a trjx remembering a good passcode, much less one he has to change every week. To change a passcode, the systemâs supervisor must use the Validate Account system operation. Before the new one is set, however, the old passcode is first deactivated with the Invalidate Account system operation. Certain systems go to extreme measures to change passwords on a daily basis. Many passkeys are in fact designed to do this, by combining the date and time with a specialized algorithm so that the passcode actually changes every time the user logs on. Other companies require their users to carry pagers so that new codes may be periodically (on a random basis) transmitted to them, or else some variation of these procedures is used. Deactivating Abused Codes Once an MSP account has been identified as being used in a hacking incident, the M S P will immediately disable the account. If the legitimate owner can prove their innocence, it may eventually be reactivated with a new passcode. The MSP may also launch an investigation, depending on the damage inflicted by the decker. Most investigators,however, have learned that if they donât trace and catch the intruder right away, they probably arenât going to find him or her. For this reason, investigators are often less than zealous in resolving cases unless the stakes are high. VISIBILITY AND PERCEPTION When you jack in to the Matrix, the RAS override and the ASIST interface kick in. The sensory signals of the system youâve logged into quickly subsume physical sensations. For all the user can tell, he has become his icon. He interacts with the virtual reality around him as i f he were really there. BEHIND THE SCENES Within the Matrix, a user will sense whatever his sensor persona program is capable of detecting, within certain limits. Because there is no physical space in which to actually see or sense anything, this sensory input is actually defined by the data each feature and icon âbroadcastsâ to identify itself. The userâs ASIST interface translates this data into actual sensations (perhaps modified according to the userâs reality filter), so that the user perceives icons and other Matrix landscaping. For example, a user who logs onto the Seattle LTG will find his persona floating in virtual space. The user will âseeâ a range of icons representing the access nodes to hundreds (perhaps thousands) of hosts, stretching away towards the horizon. The user is, of course, not actually seeing anything. His sensor programs are picking up the broadcast from each icon on the grid and translating them into the appropriate images. The majority of minor background processes do not, as a matter of course, âbroadcastâ sensory details unless someone is specifically looking for them. For example, the various phone calls, email and so forth that pass through a system usually go by unseen. If all of this data were visible, the sensory input would be overwhelming. Instead, most ASIST interfaces intentionally filter out background clutter. In some systems where they wish to show data traffic it is represented by stylized streams of light or other, similar icons. ..,........................................................................ ......................... ...i d Some features within the Matrix may attempt to remain hidden. This is done either by not broadcasting any iconography instructions (in the case of hosts that attempt to be invisible) or by using masking programs to conceal themselves (in the case of deckers). Sensor programs that are good enough will notice their presence anyway and will depict them with default icons if they d o not broadcast any of their own. For more details on Matrix perceptions, see Seeing the Matrix (p. 202, SR3) and Matrix Perception (p. 209, SIU). SYSTEM ICONOGRAPHY Within the Matrix, every host and grid uses icons to symbolically represent their inner workings. Usually, the icons within a system will follow the same style or metaphor. These styles generally fall into one of two categories: UMS or sculpted systems. UMS Systems A system with Universal Matrix Standards (UMS) iconography uses standardized icons for each of its programs and features, making that system look the same as every other UMS system. Most UMS icons are rather uninspired in terms of design. For example, datastores typically appear as square blocks of data, slave units appear as spheres and scramble IC appears as a snake constricting around a datafile. While systems with UMS icons tend to be easier to use and navigate (thanks to icon familiarity), they are also considered to be extremely dull because everything looks the same. For this reason, very few systems use UMS imagery anymore, opting instead for the more visually appealing sculpted system. Whenever a sensor program fails to ascertain an icon for a program, persona or other feature, it depicts it using the most appropriate UMS icon. If it is completely unknown, the UMS icon shown is that of a three-dimensional blinking X-shape. Sculpted Systems Sculpted systems use custom-designed imagery rather than UMS icons. Unlike UMS systems, sculpted systems possess a central metaphor. All or most of the things a user experiences within the system will conform to that metaphor. The central metaphor of a sculpted system defines the virtual reality of the system. For example, the Mitsuhama primary host is designed around the metaphor of a medieval Japanese milieu. Within the host, subsystems are depicted as virtual villages where application icons that appear as peasants toil away patiently in the rice paddies. The sensitive data held within the system is stored within fortresses that make Osaka Castle look like a kiddy toy, guarded by dangerous-looking samurai IC. The central metaphor can literally revolve around anything, limited only by the designerâs creativity. Most metaphors revolve around some sort of historical or literary setting, but in recent years there has been an explosion of metaphors focused around completely new art styles and orig- .................... .................................................................................. I Matrix I q1 I inal universe concepts. Many of the historically oriented sites do not bother conforming to complete historical accuracy, and often will throw out certain conventions altogether, meshing normally unrelated styles just because itâs wiz. Hosts in a linked network, certainly those sharing hosthost access, usually share the same metaphor. Keep in mind that these metaphors are not just to look impressive. They are usually intended to make day-to-day work easier and more intuitive for the people who use these computers. Effects of Sculpted Systems When a user logs on to a sculpted system, everything he does or senses is explained in terms of the systemâs central metaphor. He has to act as if the metaphor were his reality. If his icon is in a virtual corridor, for example, he cannot walk through the walls. If a user insists on describing his actions in terms that do not conform to the systemâs central metaphor, apply a +2 modifier to all target numbers for tests he makes in the system. TORTOISE MODE It is possible to access the Matrix without using simsense, a persona or an ASIST interface. Rather than experiencing the Matrix through virtual reality, the user interacts with the Matrix through a simple text- or graphics-based interface. Rather than using a datajack or trodes, the user uses VR goggles and gloves, holo-display screens or even flatscreens, as well as trackballs. touchscreens, keyboards and other low-end tools. In effect, the user accesses the Matrix in the same way a turn-ofthe-century user accessed the Internetâs World Wide Web. This method of operation is typically called âtortoise mode,â in comparison to the typically faster Matrix-use methods. A user can access the Matrix using tortoise mode from a cyberterminal (or any other computer attached to the Matrix) equipped with a basic interface. This includes pocket secretaries, laptops, street corner dataterms and so on. Tortoise mode is commonly used for quick information searches when jacking in just isnât convenient. TORTOISE OPERATIONS Sculpted Systems and Reality Filters The imposed iconography of certain sculpted systems may cause problems for users with a reality filter. The ASIST interface can become overloaded, unable to process and translate conflicting metaphorical images and actions. The gamemaster decides when a reality filter and sculpted system are in conflict (usually immediately after the character logs onto the system). When this occurs, the character must make an MPCP Test against a target number equal to the systemâs Security Value. If the test fails, the character suffers -2 Reaction and -ID6 Initiative as long as he remains within the sculpted environment. System sculpture can extend over linked hosts in a network, even over an entire PLTG and its attached hosts. As a result, the character may suffer the penalties for quite awhile. If the character succeeds, his ASIST interface keeps a tight reign over the system and reality filter translations, keeping intact his Reactionllnitiative bonus for using the filter. MATRIX MOVEMENT In the Matrix, there are no real spaces to move between. What a user does determines where she is. In other words, a userâs âlocationâ is defined by the dataspace, data pathways and elements of a system to which she has immediate access. For example, a decker who logs on to a host from a grid will pass through into the dataspace of the systemâs access node. If she then makes an Index Test to locate a specific file, she is making a query to the address tables and file system architecture for the computer. Once the file is located, the decker will have moved to the datastore in which the file is kept. From the deckerâs point of view, she will be âmovingâ through different parts of the system as she conducts these operations. The exact sensations of movement and the changing scenery will depend on both the system sculpture and her own reality filter (if any). If there is another decker currently accessing the file subsystem, there is the distinct possibility that the two might notice each other . . I q2 1 Matrix A character using a tortoise interface does not have a persona, nor is their presence within the Matrix indicated by an icon. Tortoise users can be located within a system by using a Locate Tortoise Users operation (see p. 100) and can be dumped with a Crash Application operation (see p. 96).A tortoise user can use utilities, though he must load them into active memory. Though a tortoise user does not receive the simsense experience of being in a Matrix system, they do receive a graphic display (flat or holo, depending on their gear) of the systemâs appearance. This âpersonaâs eyeâ view is extremely limited (the equivalent of a Rating 1 Sensor persona program) and rarely picks up anything beyond the systemâs prominent icons. The tortoise user will not detect any persona icons unless he conducts a system operation. From tortoise mode, a user can conduct almost any system operation with only a few exceptions. None of the following operations may be used from tortoise mode: Decoy, Null Operation, Redirect Datatrail and Relocate Trace. Tortoise users can build up a security tally rather easilytortoises have an effective Detection Factor of 1 . Tortoise users will not trigger any IC. However, their MXP address will be logged with each trigger step, and a trace will be launched against their address on the third trigger step. As soon as a tortoise user triggers a passive alert, the host or grid will immediately terminate their session. A character using the Matrix in tortoise mode moves at their normal meat-body speeds. However, during combat they can only perform computer-related actions during one Combat Phase per Combat Turn. For example, a Fully wired street samurai trying to locate a file on a computer system from tortoise mode while in the middle of a gunfight can use the computer during one Initiative pass only; he must shoot at opponents or perform other actions for the rest of his Initiative passes. 1 ...................................................................................................... h e world telecommunications network, referred to as the âMatrix,â is often compared to the twentieth-century Internet in its scope and design. While such comparisons are inevitable, there are vast differences between the two. Unlike the networks of the late twentieth and early twenty-first centuries, the Matrix is broken up into dozens of semi-independent regional telecommunication networks, or RTGs. The world was still recovering from the Crash of 2029 when the Matrix was being built, and the world powers were wary of another disaster. To combat this problem, in place of the decentralized systems and protocols that typified the old worldwide information systems, a system of tiered access was developed. In that way the local and regional communications systems could operate independently, and thus potentially quarantine a future info-plague. In addition to grids, the other integral part of the Matrix is the host. Hosts are the servers and mainframes of the Sixth World. Through these computer installations Row untold trillions of megapulses, containing everything from Grandmaâs favorite recipes to bank transactions worth millions ofnuyen. Hosts are the true holders of wealth and power in the Sixth World, for they contain information-the little ones and zeros that make the world go round. T CONNECTIONS The Matrix runs over a multitude of different connections, but for most Matrix traffic in 2061, the data moves over high-density fiberoptic lines laid down from the late twentieth century to the present day. These lines are capable of handling an incredible amount of data, an amount almost inconceivable to a user of the Internet in the 1990s. It is this backbone that makes the Matrix possible. There are hundreds, if not thousands, of separate parts that go into the running of the Matrix, but these can generally be broken up into a few broad categories. WRECOM Whether youâre discussing old-fashioned copper cables or the newest fiberoptic trunks, wires of one sort or another constitute the bulk of the modern telecommunications infrastructure. Wirecom covers the range from the few strands that run to your trideo box ....,........,......................................................................................... Matrix q3 to the foot-thick trunks that link the major communications hubs together. They even run under the Ocean to link the continents. Direct Cable This is the standard method of connecting to the Matrix. Fiberoptic cables link your house, business, cyberterminal and so on to the Matrix.More impoverished countries often use copper wire cable instead of fiberoptic. The copper wire is older, however, and less capable of handling the information loads the Matrix requires. Maser Power Grid Connection Maser, or microwave laser, is a highly effective but seldom used telecommunication system using a cityâs or countryâs power grid as a carrier device. Using a maser, an encoded signal is placed on the magnetic field surrounding power lines. This type of Service has the potential to replace even fiberoptic cables. It is very secure, able to handle the highest density data signals with an almost instantaneous 1/0speed and requires the installationof only a single mid-sized maser to service a large area. The problem lies in reliability. Though the transmission itself is secure, the signal is at the mercy of local power grids which, even in 206 I , have frequent black outs-both accidental and intentional-which will corrupt any information in the process of transmission. Add to that the inertia built up by the manufacturers and service providers of the worldâs fiberoptic cables (similar to vacuum tubes vs. transistors in the mid-twentieth century), and it is easy to see why this superior technology languishes in obscurity. This type of service is very rare as a consequence, and usually reserved for areas such as megacorp and governmental facilities-some delta clinics, for example, are rumored to use this type of connection-where power service ic lever interrupted and a back-up provider is always at hand. WAVECOM This category covers wave-based transmissions, from lowpower shortwave radio to world-spanning cellular radio networks. Wavecom is perhaps both the most limited and the most versatile category of communications. It has a wide variety of uses and services available, but it is hampered by restrictions on bandwidth and power. FM/AM Radio This is by far the oldest mode of broadcast communication still in active use. Digital broadcasting has expanded the capabilities OF these transmissions, enabling stations to mix a data channel into the audio signal with subcarriers. This data is usually the title of the song that is playing, weather information and newsbytes. Most modern radio programming is done at a regional level, with the music and audio programming k i n g fed via satellite to local affiliates. These local stations usually add commercial programming and local information sulxarriers to their transmission. Shortwave Radio Shortwave transmissions are rarely used in the modern age; even hobbyists have largely abandoned this part of the spectrum. Shortwave broadcasts have great range, but their signal quality is less than ideal. Still, the presence of a virtually unused, viable form of transmission might appeal to some people. Keep in mind that the bandwidth of transmissions over shortwave connections is usually measured in fractions of a megapulse, so its uses are limited. VHF/UHF TV Broadcast television stations once transmitted VHF/UHF signals using FM radio bands. The formatâs severe limitations, however, led to most stations switching to Matrix broadcast format. In most developed areas, the resulting unused hequencies were given to advanced cellular services. Public access stations, independents or pirates trying to get a message out use the rest of the old television spectrum. Radio Cellular Modern cellular networks are still organized into âcellsâ as they were in the twentieth century, but their âcellsâ are vastly more flexible now. The small size of modern equipment means cellular networks are both more dense and capable of handling much more traffic at higher speeds. One of the interesting components of conventional cellular networks is that the physical location of users can be easily triangulated (see Triangulate, p. 101). Even having a cellularcapable device turned on means that it is broadcasting a status signal to the local cellular network. Technology can be readily applied to triangulate the userâs location, or even track the usersâ movement by checking the connectivity logs of the cell towers his phone has communicated with as he has moved through an area. For these reasons, security conscious people are loath to use cell phones in situations where their location is a secret. BEAMCOM Beamcom transmissions share many characteristics with wavecom transmissions, but they are not the same. Each of the following systems uses a tight beam transmitter and corresponding receiver to connect two sites. Though the normal configuration is for each site to have separate transmitters and receivers, many sites have begun to upgrade to a single unit that acts as both. Infrared Infrared systems are not very precise, because they experience a lot of scatter in actual transmission. Much of that scatter is intentional, however, so that the alignment of transmitter and receiver donât have to be precise. The drawback of such ease of use is that anyone who can see the transmitter has a fair chance of eavesdropping. As a consequence, almost all transmissions via infrared are encrypted. Infrared networks are only found in select interoffice networks; they are never used on any large-grid scale. Infrared networks are incapable of the bandwidth security that full simsense interfaces require, and so are not used for cyberterminal connections. J vv ......,.............................................................................. 1 Laser Laser systems, unlike infrared transmitters, have very little scatter, making transmissions much more secure without the need of additional encryption, though the truly paranoid are still likely to take such precautions. This security is bought with a price-exacting precision. Unlike infrared systems, laser systems require the receiver to be precisely aligned with the transmitter or the system will not function. An additional drawback is that if the laser beam is located, it is very easy to break transmission by blocking the beam. Additional weather elements, such as fog, heavy rain or smoke. can also interrupt transmission. Laser networks are typically used in corporate compounds or for connecting downtown high-rises. Microwave As with laser systems, microwave transmission takes place between a transmitter and receiver that are precisely aligned with one another. Though they do not have to deal with the inherent problems of atmosphere , microwave transmissions are also subject to blockage if the location of both units can be determined. SATCOM Satcom transmission covers the orbital satellite relays that link much of the planet. Comsats in 2061 typically use one of four main frequency bands. Generally, the higher the frequency range, the smaller the receiving dish or antenna needs to be. Cellular Satellite Service (CSS) Cellular satellite services use large networks of satellites to send data throughout the world from any point on the globe. These networlts are often referred to as âconstellations.â This allows a CSS subscriber to send Matrix-quality transmissions anywhere in the world without signal loss. It also limits the ability of others to trace his signal. To use this method, a CSS subscriber activates his cell phone and locks onto the signals being broadcast by his constellationâs satellites. If he has a valid account, the signal is decoded and he can begin to transmit to the constellation using his own cell phone transmitter. The signals are routed through the constellation to a ground station in the area the user wishes to contact, and then onto the conventional landbased networks. All responses are routed back over the satellites and broadcast to the user, changing the satellite routing path as specific satellites move out of range. Direct Broadcast Services (DBS) Most DBS satellites are used for network media broadcasts to regional stations, or by telecommunications companies to route traffic over long distances that cannot be covered by wire networks or ground-based microwave transmissions. While many DBS systems are set up for transmission of media or data, they are not generally accessible by anyone other than their subscribed broadcasters. In order to cover as wide an area as possible, the DBS satellites are placed in the most distant orbit possible, a geo-synchronous orbit. Their distance from the Earth ensures that there is a substantial signal V6 Matrix delay and relegates this broadcast method to preprogrammed, non-interactive data. REGIONAL TELECOMMUNICATIONS GRIDS (RTG) RTGs are macro-grids. covering large areas such as an urban sprawl, several rural states or even an entire small country. The RTG is the top layer of tiered access, and each RTG has several LTGs underneath it. Each RTG is also connected to every other RTG in the world. The primary function of RTGs is to act as a glorified SAN, a gateway from which a user can access other RTGs or the LTGs beneath it. RTGs manage the bulk of long-distance and foreigncountry calls, email and data transmissions, as well as entertainment and news channels. RTGs are also responsible for the maintenance and continued operation of the LTGs under their sphere of operation. For the most part, RTGs perform system administration functions, controlling information flowing into the system, maintaining the regional databases and performing load balancing for LTGs that exceed their processing limits. A sample list of the worldâs RTGs can be found on pp. 16&1. ICONOGRAPHY Most RTGs are designed to appear as a vast universe of gateways, portals or highway off-ramps, each leading to an RTG, LTG or the occasional PLTG. While most RTGs use only minimal sculpting, preferring UMS icons for ease of use, variations on this theme are not uncommon, ranging from a smaller-sized âtransporter roomâ to a retro-feel busy train station. Doorways to other grids are clearly labeled in the language for which the userâs sensor program is customized, and the massive amounts of data passing through an RTG on its way to other grids are rendered invisible by most usersâ sensor programs. It is rare for a host to be connected to an RTG, though occasionally an RTG provider or grid tourist agency will have one accessible to the public. Most of the directory services, newsfeeds and other services of RTG providers are offered at the LTG level. RTG POLITICS Tiered Matrix architecture allows a great degree of flexibility in building networks, as they can easily be structured to conform to constantly changing political borders. In effect, this also provides a unique method of âborder control.â The administrating body of an RTG essentially has âlife or deathâ power over the information and communications capability for any LTG, opening the doorway to a very effective tool for ensuring the compliance of the users of the LTGs in question. Thus, what was originally intended to be a defense against a future worldwide computer crash has became a political tool. Naturally, such strategic uses of Matrix access could lead to open hostilities, which would be incredibly bad for business. To avert such manipulations, the Corporate Court created a regulatory body under its jurisdiction, called the Corporate Court Matrix Authority (see p. 150). To date, the Authority has kept RTG providers from using their monopolizing position recltless- ........,................................................................. ............................. -ng 8 11 6 9 7 8 11 12 10 9 12 13 11 5, 10 10 I2 9 ly, lest they risk censure or even the dreaded Omega Order. However, there have been a few cases in which the Court has ordered RTGs to suspend or filter Matrix access to apply pressure to nation states that failed to recognize i t s edicts. SATELLITE CONSTELLATION RTGS Communication satellite constellations operate in much the same manner as RTGs, though they usually d o not have LTCS underneath them. Satellite RTG providers who also own orbital habitats are an exception to this rule, as each habitat is included as an underlying LTG. It is not uncommon for each individual satellite to have its own host that can also be reached directly through the RTG. Without exception, however, these hosts are exceptionally difficult and dangerous to access. Users who connect to the Matrix through a satellite constellation must follow the rules for satellite links (see p. 34). Iconography Satellite constellation RTGs each have a unique look and feel, depending upon their provider. Some of them prefer to present the RTG as the interior of a satellite, even including âwindowsâ that depict real-time video feeds of space or the Earth below. Others tend to follow traditional RTG iconograPhY. Security Tallies on Satellite Grlds Due to the high levels of information security maintained on satellite constellations, security tallies generated by a user on a satellite RTG carry over to any other RTGs he accesses. Satellite RTGs are also very suspicious of ground-based transmission, so any security tally generated on an RTG will carry over to a user who then accesses a satellite RTG. Uplinking to a Speciflc Constellatton The Satellite RTG Table lists the statistics for some of the more common satellite constellations. If a character is attempting to uplink to a specific satellite constellation, he must apply the Density Modifier from the table to his Computer (Hardware) ................................ 11 6 8 7 4-2 +ID6 -1 r. 17 II: 8 9 6 8 7 +1 -I 1 t 9 , 8 9 10 10 tO -1 tl Test (seep. 34).This represents the ease or difficulty of locating and locking onto a satellite from that specific constellation. LOCAL TELECOMMUNICATIONS GRIDS (LTG) LTGs are analogous to âarea codesâ in the old communications architecture. They are responsible for all the grunt work of the Matrix. For the most part, LTG providers operate in much the same way as their phone company and Internet service provider counterparts did in the twentieth century. They are responsible for repairing and upgrading the communications infrastructure in their area of control, maintaining the free information databases and providing the security and host space for systems logging onto the Matrix. The area an LTG covers depends entirely upon the density of connections. For areas of low population or connections, an LTG may cover a geographic area of hundreds or even thousands of square miles. These low-density LTGs tend t o be more limited in processing power than their high-density counterparts, such as those centered around major cities, because they d o not handle the massive amounts of traffic that high-density LTGs generate. In cases where these LTGs experience large increases in bandwidth, the RTG will perform load balancing to make sure the LTG does not collapse. ICONOGRAPHY The standard visual representation of an LTC is of a gridded plane that extends in all directions. The actual âsizeâof this plane is entirely dependent on the number of systems connected to it. As more systems connect to the LTG, the âspaceâ expands to accommodate them. Each LTG is a pocket universe unto itself. Other LTGs cannot be seen, even if they are âadjacentâ (both under the same RTG). There is also no portal connecting the LTG to any other LTGs; to travel to another LTG, a user must first ascend a level to the RTG above. From the RTG, the user can then either hop directly to the LTG (if it is also controlled by the same RTG), or move to another RTG and then descend into one of the LTGs beneath it. The SAN portal for an LTGâs dominant RTG is usually located at the top of the LTG space, like a planet in the sky. It is not ................................................................ ...... Matrix 1c7 uncommon for the RTC SAN icon to be designed like the sun, the moon or some other heavenly body. Hosts Each host connected to an LTG is represented by an icon within the LTG âspace.â These icons float at varying heights above the gridded plane on the LTCâs âfloor.â Many hosts, especially those used for commercial or entertainment purposes, represent themselves with highly stylized icons. Typically, larger corporations pay extra to have their hostâs icons rendered larger than the rest, so that they stand above the teeming virtual landscape. Most corporations place great stock in the appearance of their systems on the Matrix and many are quite startling in their design. Many other hosts opt instead for simple UMS polyhedron icons, usually because they wish to look innocuous and blend in with their surroundings. PRIVATE LOCAL TELECOMMUNICATIONS GRIDS (PLTG) Private LTCs (PLTGs), as described on p. 203, SR3, represent independent, restricted-accessglobal grids that are closed to the general public. In twentieth century terms, they would be referred to as âintranetsâ or âextranets.â Most large corporations and all megacorporations maintain at least one PLTC for internal communication and data access. Most governments also maintain several PLTGs, though in many cases these are actually separate networks not connected to the normal Matrix. These corporate and government networks often extend to sites spread throughout the world, bringing them all together into one easily accessible grid. ICONOGRAPHY PLTCs are usually designed along the âpocket universeâ style used by most LTGs. Because they are privately owned and used, PLTGs are much more likely to use system sculpting than their public counterparts. For example, the PLTG within the Renraltu arcology was sculpted to appear as a series of interwoven tubes, bunched together like a large ball of string. HOW HOSTS WORK Hosts are computer systems, what we refer to in the twentieth century as servers or mainframes. While the two types of computers are fairly different today, they are much closer in function and design in 206 I due to the advances in computing technology. The host deals with all system requests, such as logons, browsing, data retrieval, task prioritizing, alerts, running applications and so on. The technology used by hosts allows the sysadmin, or system administrator, almost complete control of all aspects of the computing environment, letting the sysadmin expand or customize the system as necessary. The sysadmin can add desired features, customizing the system to the local environment or adapting to a changing series of events. For example, if an administrator wants more security, he can simply link more security and tracking objects to the system or load in more IC as needed. 1-8 1 M a trjx .................................... One of the capabilities of host systems Is that they can be partitioned into multiple logical computers (i.e. virtual machines: see p. 12 1 ). This means a system can have whatever logical layout the administrator wants regardless of the physical layout of the hardware. A single mainframe can appear in the Matrix like a little network all its own, or look like five machines that donât know about each other. ULTRAVIOLET HOSTS Ultraviolet (UV) systems are extremely rare systems that have such immense processing power that they create a virtual space that borders on reality. To most Matrix users, ultraviolet hosts are a mere myth. Those that have experienced them, however, know otherwise. UV hosts arenât merely virtual reality; they approach a different level of existence. A user connected to a UV host cannot differentiate between virtual and physical reality. Rather than his ASIST translating data received from the host and then providing a simsense stimulus, a UV host uses a direct simsense connection, bypassing the usual filtering and analysis done by the interface. Ultraviolet systems are so powerful that they can create a sculpted environment that mixes Full-X simsense in realtime, setting them apart from standard hosts. Like other sculpted systems, UV host iconography is based on a specific metaphor or style. This imagery will completely overwrite all other iconography and interpretive interfaces, including a userâs persona, reality filter and utilities. CONNECTING T O A UV HOST UV hosts do not conform to any standard for data transfer. They interpret the userâs actions directly and feed a simsense signal in response. Because of this, only a cyberterminal with a hot ASIST (see p. 18) can interact with a UV host. If a user attempts to connect using a cold ASIST interface or in tortoise mode, the connection will simply fail. MORE REAL THAN REAL On a UV host, normal Matrix rules do not apply. Instead, the gamemaster should treat the characters in a UV host (including autonomous programs and IC) as i f they were using physical bodies in a physical world. A characterâs appearance will change radically as soon as he enters a UV host. He will no longer appear as his Matrix icon, but will instead appear as his normal, physical-world self. Though the user is still interacting through his persona, the persona is altered drastically to conform to the rules of the UV system. Attributes On a UV host, a characterâs persona ratings are no longer used; instead, the character will use Physical and Mental attributes as in the real world. The characterâs Mental attributes will remain unchanged, but their Physical attributes will depend on their cyberterminalâs ratings. The UV Host Statistic Conversion Table indicates how to determine a characterâs attributes in the UV host. -. A characterâs Reaction is calculated as normal. They receive the standard bonuses to Reaction and Initiative from Response Increase and/or running pure DNI. The bonus from a reality filter is not applicable. Win$ng It Ultimately, itâs up to the gamemaster to decide what can and canât be done in a UV host, and what game mechanics should be used to judge success. The gamemaster should feel free to alter the reality and rules effects within a UV host to fit the metaphor, advance the adventure and reward player/character ingenuity. Dice Pools The only pools a character may use within a UV host are Hacking Pool and, in the case of technical tasks only, their Task Pool. N o other dice pools apply. Wi Damage Because of the intense nature of the W systemâs virtual reality and the direct simsense feeds, a user may experience life-threatening damage. All damage that a character suffers (whether Physical or Stun) is applied as actual damage to the characterâs meat body, not their icon or cyberterminal. Skills Characters may use their normal skills within a UV host (with the exception of Magical skills, which simply d o not work). Characters may also substitute half their Computer (Programming) skill (round down) for any skill they lack. If a character has a skillsoft plugged in, they may use the skill(s)it provides on the UV host. They may not use Hacking Pool with skillsoft-provided skills (unless the skillsoft has the DlMAP option; see p. 61, CC). Utilities Any utilities a character has running in active memory will appear as physical tools and trappings within the UV host. The exact way in which these programs convert into objects will depend on the program, what it normally appears as and the UV systemâs dominant metaphor. For example, an attack utility could translate as a machine pistol, laser pistol or a katana, depending upon whether the UV host metaphor is modern, futuristic or fantasy-oriented. These weapons would have the same statistics as normal weapons of that type, and would require similar skills to use. At the gamemasterâs discretion, some utilities may provide a character with a skill equal to their rating. For example, a medic-6 utility may give the character a Biotech 6 skill. The functioning of other utilities will depend on how and when the character uses them. The gamemaster may decide that some utilities provide a target number modifier for certain actions, or they may provide extra or complementary skill dice. System Operations If the gamemaster chooses, he can continue to use the system operation game mechanics for certain actions, to judge how well the character succeeds. In this case the gamemaster should generate subsystem ratings for the W host, which should be at an appropriately difficult level. .......... ............. .......................... Subjective Time Time spent on a UV host is totally subjective. A minute spent on a UV host could feel like hours. The gamemaster is free to have trips in a UV host take as little or as much time as he desires. BACK TO REALm UV hosts are so powerful and overwhelming that characters within them are unable to perceive the real world or even feel their physical bodies. The character becomes so oblivious to real world events that an enemy could walk up to their body, sit on their chest and cut their throat without the character ever noticing (until he bleeds to death of course). In a UV system, the characterâs RAS override is strengthened to the point that their bodies are incapable of physical movement while they are jacked in. This usually leads to a fair amount of muscle cramping, stiffness and soreness if the character stays jacked in for too long. If a character is decking without an RAS override, the UV host compensates and disables their physical movement abilities anyway. Characters will also find that they are âdisassociatedâfrom their cyberterminals while in a UV host, meaning that they are unable to mentally access and manipulate them as they would normally. In effect, this means that the character cannot switch modes, swap out utilities and so forth. At the gamemasterâs discretion, the character may be allowed to perform these actions on an intuitive h i s , perhaps requiring a Willpower (Security Value) Test for success. JackingOut Characters will find it next to impossible to jack out of a UV host. Any character that wishes to d o so must succeed in a Willpower (Security Value + 4) Test. Apply a -2 modifier if the character has ICCM. Jacking out will also submit the character to the worst case of dump shock theyâve ever experienced; a character who jacks out must resist (Security Value + 4)D Stun (reduce the Power by 2 and the Damage Level to S for a character with ICCM). PAYDATA Virtually all host systems contain datafiles of one kind or another. The vast majority of these files offer nothing of relevance to shadowrunners, consisting of meaningless databases, personal mail, graphic files and other esoteric information. Every once in a while, though, a system will contain the ......... ........ ........... ........... ................ Matrix q9 proverbial nugget of gold, an answer to a crucial question or data that will fetch a high price on the black market. This information is called paydata. Paydata can be anything from new R&D toys from the big brains upstairs, business plans worth big nuyen to inside traders or competitors, incriminating information useful in blackmail and so onanything with value to someone has a demand on the black markets. Characters must use the evaluate utility (see p. 70) to locate paydata. Guidelines for retrieving paydata appear below. NATURE OF THE DATA When determining paydata, the gamemaster should try to fit it into the nature of the system being raided. For example, a corporation with major interests in Matrix security and fiscal operations would logically have paydata relating to those areas. From these bare bones, the gamemaster is encouraged to improvise. For example, a decker who snatched valuable paydata files from an Aztechnology host may be in possession of datafiles describing research into using animals as Matrix security agents. &technologyâs competitors, such as Novatech, would be very interested in such information. RANDOM PAYDATA GENERATION Gamemasters may determine the exact nature of the paydata contained in their gameâs hosts and roleplay a characterâs attempts to sell it on the black market. Alternately, gamemasters may use the following random method for determining paydata and its value. Paydata Points The random paydata-generation method uses Paydata Points to measure the value of paydata. When a character performs a Locate Paydata operation (see p. 100) on the system, the gamemaster can use the table below for guidance. A hostâs Security Code determines how many Paydata Points its files contain. Less secure systems contain fewer Paydata Points, and more secure systems contain more points. rolls a 5, so the system contains 3 Paydata Points. Gus achieves 2 successes on his Locate Paydata operation, so he locates 2 of the Paydata Points. He decides to download the worthwhile files. Charlie again consults the Paydata Points Table to determine the data densities of the files containing the paydata. For the first Paydata Point, he rolls 2 0 6 for a 6. He multiplies that by 15 and finds that Gus has to download a !20 Mp file to get the first Paydata Point. For the second point, the gamemaster rolls again and scores 12. So for the second point, Gus has to haul down a 1 8 0 Mp file. The decker decides the paydata is not worth the e f i r t and logs OK I i PAYDATA DEFENSES Generally, host operators do not leave paydata files lying around unprotected. If itâs valuable to an intruder, itâs probably valuable to the host operators as well. Paydata files may be linked to data bombs, scramble IC or other defenses. The gamemaster may design such protections or roll 1 D6 and consult the Paydata File Defenses Table to determine the defenses attached to paydata files on a system. FENCING PAYDATA The base street price of a Paydata Point is 5,000nuyen. The final price varies, however, as paydata must be fenced like any other stolen property (seep. 237, SR3, for rules on fencing loot). Characters must move fast when selling stolen paydata. The needs of the black market change very quickly indeed, and todayâs nova-hot datafile is tomorrowâs worthless drek. To reflect this condition, reduce the deckerâs stock of Paydata Points by 1 for each day they remain unsold, starting from the least valuable Point and working up. This reduction does not apply to specific files invented by the gamemaster as part of the adventure. Mr. Johnsonâs prices are usually set in advance, and the time-sensitivity of such files depends on the story. Excessive Rewards Some characters may decide to spend every waking hour Data S h e As stated above, characters must download files to retrieve Paydata Points. The size in Mp of each paydata point is determined by its data size, which varies according to the systemâs Security Code. Gus logs on to a Green host and perhrms a Locate Paydata system operation. Charlie, the gamemaster, consults the Paydata Points Table and rolls 206 - 2 to determine how many Paydata Points the system contains. He a 4 I 50 Matrix ........................................................................................... ........... cracking every system they can in the LTG, hauling out enough paydata to retire by the end of the week. While a noble cause, the gamemaster should not be afraid to nip this in the bud. The simplest way is to reduce the paydataâs value. If a character starts flooding the market with information, it will drive the price down. Needless to say, this will do nothing to endear him to his fellow deckers, who may start plotting something nasty if he keeps ruining the market. Start tacking on penalties to the characterâs Etiquette Skill as a start. The corporations and governments will also take an interest in any rash of host compromises. A certain amount of data theft is expected, but if the character is breaking into every system within reach someone is going to start sending out investigative agencies, both in the Matrix and in the real world, to track where this data is going to. And the first place they will look is in the black market. An excessively greedy character will also start to attract a lot of unwanted attention from other denizens of the shadows. Amassing a lot of wealth very quickly is bound to raise some eyebrows, and that means people will start thinking of ways to relieve the decker of his ill-gotten gains. Suddenly heâll find his bank accounts are k i n g hacked, his apartment keeps getting broken into, and muggers will be so familiar theyâll start calling him by his first name. ARCHAIC SYSTEMS Though most of the worldâs telecommunications traffic passes over networks built after the Crash of 2029, this is not always the case. In some areas, archaic grids and hosts can be found, operating with outdated operating systems and protocols. A character who attempts to access an outdated system may find that he is unable to use anything other than tortoise mode, or is otherwise limited by the systemâs dated capabilities. LIMITATIONS For the most part, archaic systems follow the standard Matrix rules, though they are restricted by sets of limitations that reflect their incompatibility with modern computer systems. No archaic system can have a Security Code higher than Green, or a Security Value higher than 6. Subsystem ratings may not exceed 10. The gamemaster may choose a set of appropriate limitations from the options below, or randomly select 1 D6 + 2 limitations for the system. ASIST Feedback The systemâs ASIST protocols are antiquated and clash with current standards. Any user who accesses the system using an ASIST interface must resist 4M Stun damage at the end of the first Combat Turn. The character must continue to resist this damage at the end of every Combat Turn, but the Power increases by 1 each subsequent turn. An ICCM filter reduces the base feedback damage to 2L. Incompatibility The system operates using protocols and languages that are considered extinct in most computer programmer circles. All Computer Tests on this system will suffer a modifier of between + 1 and +6 (the gamemaster can randomly roll 1DO to determine the modifier). If the gamemaster allows it, a character may make a Knowledge Skill (4) Test using a skill appropriate for the archaic system; each success reduces the characterâs modifier by 1. Pre-Simsense The system was developed before the advent of ASIST and simsense. It may only be accessed in tortoise mode (see p. 42). Otaku may not access such a system. Poor Tracking The systemâs methods of tracking users are far behind current standards. Any track utilities or trace programs suffer a trace modifier between + I and +6 (the gamemaster can randomly roll 1 D6 to determine the modifier).This trace modifier functions exactly like the trace modifier applied from certain jackpoints (see p. 32). Weak Bandwidth The systemâs processing capabilities and speed are antiquated. The maximum 1/0 Speed allowed for any user is 1 0 0 , and the system has a base bandwidth of 5. Weak Interface The systemâs simsense capabilities are quite limited, effectively forcing any user who accesses the system to operate with a cold ASIST or possibly even in tortoise mode. An otaku who accesses such a system will find his Reaction reduced to 1 D6, and will suffer an additional +2 to all actions within the system. This limitation cannot be used with the pre-simsense Iimitation. ....................................................................... .............................. * * Matrix 51 he Matrixâs reliance on technology sets the stage for a constant race against time. Corporations upgrade their equipment constantly to keep pace with new technological trends, leaving their workers to relearn how to d o their jobs with the new programs and new cyberterminals. Deckers must upgrade their tools as well in order to stay ahead of the constantly changing landscape and IC. This gives security deckers the impetus to upgrade so they can meet their opponents head on, and so the race for superiority continues. As the primary weapon on this battleground, the cyberterminal is first in line for improvements. With the right skills, tools and nuyen, any user can upgrade and create their own hardware, whether theyâre a legal user or a criminal decker. The following section details the process of constructing a cyberterminal (both legal cyberterminals and illegal cyberdecks), whether building one from scratch or just upgrading components. If the character is buying components completely assembled and ready for use, skip ahead to the Custom Designed Cyberterminals section, p. 66. T COMPONENTS In 2061, most computer components are designed as modular, snap-in-and-use units, allowing a user to easily switch out parts and reconfigure the computer. These modular components are mass-produced by various corps and are readily available both legally and through various shadow contacts. These plug-and-use units usually have a high fixed cost, but they allow the user to customize his cyberterminal by choosing components that suit his needs rather than purchasing a standard pre-made model. Users can also construct these modular components themselves, using the process outlined under Constructing Components, p. 56). The process involves planning the project, writing the software, burning the chips, and then installing the components. The final homemade component is a custom-made, modular snap-in unit. While this method may take more time than finding the nearest deckmeister and dropping a credstick into her lap, it is cheaper in the long run and often more personally satisfying to have a self-made machine. In many ways, it allows the user to push the state-of-the-art levels without having to wait for the rest of the world to catch up. 52 Matrix .............................................................. ................................. ...... . I 4 4 5lc I Matrjx ...................................................................................................... Information cooked onto an OCC can only be written to the chip once, but it can be accessed any number of times. Once cooked, OCCs cannot be reprogrammed. Upgrading and repairing OCCs requires a whole new Cook Test. Encoders weigh three kilograms and are about the size of a shoebox. Any number of encoders or chips can be purchased separately. CONSTRUCTION TESTS Constructing a cyberterminal requires a series of tests, whether you're upgrading a current system or building components from scratch. Each of these tests is viewed as one stage in the four-stage construction process. The stages are, in order: design, software, cooking and installation. Rather than having the character make a test for every wire connected or every chip inserted, each stage of the process is reduced to a single test that represents the many small tasks involved. If a Success Test fails, the gamemaster rolls 2DG and divides the base time by the result, rounding fractions up. This result equals the amount of time that the character must put in on the task before discovering that the design is irretrievably flawed and that he must begin again. SKILLS Computer B/R is the primary skill used to construct computer components. Some components may require additional skills as listed in their descriptions. TIME A single workday for any task is defined as 8 uninterrupted hours. A character spending a Full workday on component construction is doing only that task and cannot do anything else. A character can work 8 hours a day and still meet his obligations-contacts, shadowruns, legwork, social events and so on. A character may attempt to put in more than 8 hours of uninterrupted labor at the job in one day. Overtime ' o r k isn't mearly as effective, as the character gets worn out. Each hour worked over 8 only reduces the time required by half an hour. For example, someone who works 10 hours (2 hours overtime) only reduces the time remaining by 9 hours total ( 1 additional hour). After 15 hours the work produced by each hour only reduces the overall time by 15 minutes. Characters may complete work in shifts, rather than as a a single, unbroken effort. For example, a character attempting a task with a 20-hour task period may perform 5 hours of work, go off on a run, do another 8 hours of work, work on another task for another component, and then do 7 more hours of work to complete the task. HEALTH AND TASKS Characters suffering from Light wounds may work at tasks unimpeded. Characters suffering from Moderate wounds may perform tasks, but only accomplish half the work for any given time. A character with a Moderate wound would have to work 2 hours to accomplish 1 hour of work on a task. Characters with Serious wounds have the same penalty as Moderate wound characters but cannot work for more than 2 hours without resting. The rest period must equal the time they worked. DESIGN TESTS Before any component can be made, a design plan must be worked out. To design a component, the character must make a test using the Cyberterminal Design Knowledge skill. This test represents the user's ability to plan, outline and prepare for the actual job of making the component. If the character does not have that skill, he or she can default to Intelligence at a +4modifier to the target number. The base target number is the MPCP rating of the cyberterminal the component will be installed in divided by 2 (MPCP + 2). rounded down. Many components have additional modifiers listed under the actual components description. The base time for the test equals the MPCP rating of the cyberterminal the component will be installed in multiplied by 2 (MPCP x 2). Successes from the test can be used in two ways. Every 2 successes from this test can be used to reduce the target number for either the Cook or Installation Tests by -1. The successes can be divided between these two tests as the player desires. Alternatively, the successes from the test can be used to reduce the task period by dividing the base time by the successes, per the standard rules (see Taking the Time, p. 92, SIU). The character may only choose one of the two applications. If the character gains no successes on the Cyberterminal Design Test, he can still make the component but suffers a +2 target number modifier to the other tests required. SOFTWARE TESTS If the hardware component requires a computer program to run, then a Programming Test must be made using the rules for programming (see p. 76). The program's effective rating and size multiplier are listed in the description of the component. Characters can instead purchase an already existing software package (see Buying Programs, p. 94). If a component requires software, it must have the software to be used. COOK TESTS Once the software has been written or purchased, it must be cooked onto an optical code chip (OCC). This requires a Cook Test. The tools needed for a Cook Test are an optical chip encoder (see p. 54),a computer with memory equal to or more than the program size to be encoded and a number of OMCs with enough M p to hold the program. The Cook Test is the same for all components. It is a Computer B/R (4) Test, with a base time equal to the MPCP of the cyberterminal in days. The player can add the rating of the encoder in dice to the test, up to the rating of their skill. INSTALLATION TESTS Once the programs and the chips have been created, the next step is putting it all together. This step is called the ...................................................................................................... Matrix 55 Installation Test. Aside from the programs and chips, this test requires a set nuyen amount of generic parts as listed in the componentâs description. Installation Tests are always Computer B/R Tests. Other skills may be needed for connecting outside devices. If two tests are required both must succeed for the component to work. Better Tool Bonus If a character is using superior tools for a job (for example, using a shop where a kit would suffice), he will gain a bonus on the Installation Test for which he uses those tools. A tool bonus reduces the base target number for the test, as shown on the Tool Bonus Table. REQUIREMENTS Each type of Matrix connection needs specific components in order to function in the way the user expects. Cyberterminals and cyberdecks can be constructed as cranial or cyberimplants. CYBERTERMINALS As described on p. 17, cyberterminals require an ASIST interface and persona programs. Cyberterminals may have a variety of components installed but they must contain the following elements: MKP, persona programs, AS~STcircuitry, I/O Speed and active memory, If these components are not there, the Matrix interface is not considered a cyberterminal and, in nearly all cases, would not work (see Constructhg Components). A cyberterminal only has Bod and Sensor persona programs. A legally sold MPCP has a rating limit of 4. The MPCP can be modified after the sale. CYBERDECKS A cyberdeck follows the same rules as a cyberterminal, except that it has four persona programs (Bod, Evasion, Masking and Sensor). Cyberdecks are considered illegal because of the inclusion of the Evasion and Masking programs. A decker could purchase a legal cyberterminal and add Evasion and Masking to the machine to turn it into a cyberdeck. CONSTRUCTING COMPONENTS Even the simplest Matrix interface is made up of components, so whether you are building an entire unit from the ground up or upgrading a single part, the same rules apply. Each of the components below includes a description, as well as the cost, time and skills used for the various tasks. The component descriptions assume the user is making the item from scratch; if not, consult the Partial Construction rules on p. 62. 56 Ma trjx As long as the component Is not completely assembled by others (see Custom Designed Cyberterminals,p. 66)use the costs and times for each task listed under the component. ACTIVE MEMORY Active memory is the cyberterminalâs âRAM,â to use the old-tech term. A cyberterminalâs active memory limits the number of utility programs the cyberterminal can run and have ready for use by the persona at any one time. For example, a cyberterminal with 100 Mp of active memory can run no more than 100 Mp of utilities at any one time. Active Memory Installation Design Test: None Software Test: None Cook Test: None Installation Test Time: (Memory Size + 200, rounded up) hours Test: Computer B/R (4)Test Parts OMC @ (memory size x 2 ) ,plus 1.5Y x memory size Tools: Microtronics Kit ASlST lNTERFAcE The ASIST interface component controls the sensory experience in cyberspace and the userâs DNI (direct neural interface) connection to the Matrix, as routed through the interpretative software coded into the MPCP. The interface also has a control Program of its own to handle the data exchange. The user can choose to put in a cold ASIST interface (see p. 18)or a hot AslsT interface (see p. 18).The hot interface can run cold. ASIST interface units do not come with constructed RAS override units. They must be added separately (see p. 19). Hot ASST Interface Construction DesiPTest Modifier: +2 Software Test Rating: MPCP rating Muklpller: 4 Cook Test: Required Installation Test Time: (MPCP rating) days Test: Computer B/R (MPCP rating) Test Parts: 25Y x (MPCP ratingz), plus ASIST Processor Unit @ 1,250Y Tools: Microtronics kit ......................................................................................................, ---. Cold ASIST Interface Construction Design Test Modifier: + Z Software Test Rating: MPCP rating Multiplier: 2 Cook Test: Required Installation Test Time: (MPCP rating) days Test: Computer B/R (MPCP rating) Test Parts: 25Y x MPCP rating, plus ASIST Processor Unit @ 1,250Y Tools: Microtronics Itit ~ I HARDENING Hardening requires some programming-designing corrective subroutines to rewrite damaged persona programs, redirect attack code and make code rerouting decisions-and some hardware work to reinforce the cyberterminalâs resistance to invasive code such as viruses, gray and black IC, and other Matrix hazards Hardening Construction Design Test Modifier: +3 Software Test Rating: Hardening rating Multiplier: 8 Cook Test: Required Installation Test Time: (MPCP rating x Hardening rating) days Test: Computer B/R (MPCP Rating) Test Parts: 35Y x (Hardening ratingâ) Tools: Microtronics shop ICCM Filter Construction Design Test Modifier: + I Software Test Rating: MPCP rating Multiplier: 4 Cook Test: Required Installation Test Time: (MPCP rating x 2 ) days Test: Computer B/R (4) Test and Computer (Cybernetics) (MPCP Rating) Test Parts: 35Y x MPCP rating plus a bio-monitor @ 1,000Y (p. 303, SIU) Tools: Microtronics shop ................ Icon Chip Construction Design Test Modifier: None Software Test Rating: Icon rating Multiplier: 2 Cook Test: Required Installation Test Time: 1 hour Test: Computer B/R (Icon Rating) Test rarts: 3 5 x~Icon ratingâ Tools: Microtronics Itit 1/0 SPEED ICCM BIOFEEDBACK FILTER Intrusion counter-countermeasures (ICCM) technology protects the user by increasing her chances of jacking out successfully when under attack by black IC (see Protective Systems, p. 21). Installing an ICCM filter requires both Computer B/R and Computer (Cybernetics)sltills. .................................. ICON CHIP A userâs icon is what others see in the Matrix. The MPCP can only run a single icon chip at any one time. but users learned long ago to modify and rework their images, or to create all new ones to lteep their enemies on their toes. The rating of the icon cannot be higher than the MPCP rating of the cyberterminal. The higher the rating, the more detailed and realistic the image is. If the user I S building an MPCP component from scratch, this chip must be created separately. Purchased cyberterminals and MPCP units come with a standard UMS (rating I ) icon. There are off-the shelf icons of everything from cartoon characters to celebrities, but most are for cyberterminals and are not higher than rating 4. If a cyberterminal does not have a functioning icon chip, the MPCP defaults to a rating 1 standard UMS icon for its persona. Users may maintain a library of icon chips, each designed for a different situation. Increasing the I/O Speed of a cyberterminal helps with speedy transfers of information. 1/0 Speed must be built in multiples of 10. The maximum 1/0Speed of a cyberterminal is equal to its MPCP rating x 100 Mp. 1 / 0 Speed Construction Design Test Modifier: None Software Test: None Cook Test: None Installation Test Time: 1/0 Speed + 100 days (round up) Test: Computer B/R (I/O Speed + 100, round up) Test Parts: 35Y x (I/O Speed + 10, round up) Tools: Microtronics Itit MASER INTERFACE A maser interface transmits and receives data over a power grid via maser signals (see Maser Power Grid Connection, p. 33). This interface requires the maser link utility,p. 72, to use. .................................................... 1 Matrix 1 57 I Design Test :* ,Modifier: +O Software Test: None Cook Test: None Installation Test Time: MPCP rating + 4 hours Test: Computer B/R (MPCP Rating) Test, plus an Electronics B/R (4)Test Parts: 3,OooY Tools: Microtronics Kit MATRIX INTERFACE The Matrix interface allows the cyberterminal to be linked to a jackpoint using a fiberoptic cable (see Thelackpoint, p. 30). The ASlST Interface is already set to accept such a device and needs no special software or firmware. IbWrIx Interface Construction (_a Design Test: None Software Test: None Cook Test: None Installation Test Time: I hour Test: Computer B/R (4)Test Parts: 35Y plus the cost of the fiberoptic cable (p. 63) Tools: Microtronics kit 1 il MPCP The Master Persona Control Program is the base operating system for the cyberterminal. N o persona program may have a rating higher than the MPCP rating OF the device. Additionally, the combined ratings of the device's persona programs may not exceed the MPCP rating multiplied by 3. Each MPCP is programmed with a default Rating 1 icon (see Icon Chip, p. 5 7 ) . See The MPCPon page 20 for additional rules. If a character replaces a cyberterminal's MPCP with an MPCP of a different rating, the ASlST interface, ICCM, reality filter, Response Increase and RAS override must all be replaced with components made for the new MPCP rating; the old components will not work with the new MPCP. MPCP Construction Design Test Modifier: The target number is the actual MPCP rating. Software Test Rating: MPCP rating Multiplier: 8 Cook Test: Required Installation Test Time: MPCP rating in hours Test: Computer B/R (MPCP Rating) Test Parts: 35Y x MPCP rating2 Tools: Microtronics shop I 5fi 1 Matrix I ........................................ a 1 PERSONA CHIPS The persona programs are the attributes of the user while jacked into the Matrix. Each of the four is programmed separately (see Persona Programs, p. 20). No persona program Matrix interface may have a rating higher than the MPCP rating of the device. Additionally, the combined ratings of the deviceâs persona programs may not exceed the MPCP rating multiplied by 3. System-aware signature suppression (SASS) may be installed along with the Masking program (p. 21). SASS only affects the Masking persona chip construction. RAS Override Construction Design Test Modifier: None Software Test: None Cook Test: None Installation Test Time: MPCP rating in hours Test: Computer B/R (4)Test Parts: 1,OOOY for the RAS override unit and 35Y x MPCP rating for the connections Tools: Microtronics Itit Persona Chip Construction Design Test Modifier: 0 (Bod and Sensor), + I (Masking and Evasion), an additional + 1 if SASS program is installed with Masking Software Test Rating: Program rating Multiplier: 3 (Bod and Evasion), 2 (Masking and Sensor), an additional + 1 if SASS program is installed with Masking Cook Test: Required Installation Test Time: 1 hour Test: Computer B/R (Program Rating) Test Parts: 3% x Program rating2 Tools: Microtronics Itit REALITY FILTERS Reality filters impose a sensory metaphor on the Matrix, which is chosen by the user and programmed into his cyberterminalâs ASIST interface. The reality filter usually matches the icon chosen by the user. A user who likes baseball can model an entire Matrix run on a hard-fought game. A user with a taste for swashbuckling can swagger his way through the world of a cykrnetic musketeer or duelist. Reality filters must be personalized to each specific userâs neurological system. A reality filter designed for one user cannot be easily used by another. For more information, see p. 19. Reality Filter Construction Design Test Modifier: +2 Software Test Rating: MPCP rating Multiplier: 10 Cook Test: Required Installation Test Time: MPCP rating in days Test: Computer B/R (MPCP Rating) Test (Cybernetics) (MPCP Rating) Test Parts: 70Y x MPCP rating Tools: Microtronics shop, Biotech kit PORTS (FUM) Named after Fuchi Industrial Technologies, the inventors of the cyberterminal, Fuchi Universal Ports (FUPs) are universal port slots that allow for a wide range of gear to be easily connected to a cyberterminal, such as speakers, vidscreens, hitcher jacks and even electrode units. The device merely needs to be plugged into the FUP slot and itâs ready to go. An MPCP comes with a number of ports equal to its rating, but it can accept additional ports up to twice its rating. A partial list of what can be added to the cyberterminal can be found under Miscellaneous Components, p. 6 I . Computer RESPONSE INCREASE Response Increase is the Matrix equivalent of wired reflexes. The Response Increase cannot exceed a cyberterminalâs MPCP + 4, rounding fractions down (i.e., a cyberterminal with MPCP Rating 3 or below cannot sustain any level of Response Increase). A cyberterminal cannot have more than 3 levels of Response Increase. Response Increase is cumulative with reality filters and pure DNI bonuses (see p. 19 and p. 18 respectively). Port Construction Design Test: None Software Test: None Cook Test: None Installation Test Time: I hour Test: Computer B/R (4) Test and Electronics B/R (4) Test [wired] or Electronics B/R (Device Rating) Test [wireless] Parts: 235Y per port Tools: Microtronics kit Response Increase Construction Design Test Modifier: + 1 Software Test Rating: MPCP rating Multiplier: Response Increase x 2 Cook Test: Required RAS OVERRIDE The reticular-activation system (RAS) override is standard in every simdeck, cyberdeclt and remote control deck. Accessing the Matrix without a RAS override (or with it turned off) will subject the character to high target number penalties. For more information on the RAS override, see p. 19. ............................................................... + ...................................... , I Matrix 1 59 I Installation Test Time: (MPCP rating + Response Increase rating) in hours Test: Computer B/R (Response Increase Rating x 2) Test Parts: 135Y x Response Increase rating Tools: Microtronics shop SIGNAL AMPLIFIER A signal amplifier is a device used to increase the flux rating of a wireless interface. For more information on signal amplifiers, see p. 289, SR3. These rules are used only when building a signal amplifier into the cyberterminal. Signal Amplifier Construction Design Test: None Software Test: None Cook Test: None Installation Test Time: 1 hour Test: Computer B/R (4) Test and Electronics B/R (Device Rating) Test Parts: 35Y plus signal amplifier (see p. 290, S B ) . Tools: Microtronics kit STORAGE MEMORY Storage memory is analogous to the hard drives on oldtime computers. Any program in a cyberterminalâs storage memory can be loaded into the cyberterminalâs active memory by using the Swap Memory operation (see p. 219, 5/73). Storage Memory Construction Design Test: None Software Test: None Cook Test: None Installation Test Time: Memory size + 200 hours (round up) Test: Computer B/R (4) Test P a r k OMC at desired Mp plus 0.5Y per M p OF memory (rounded up). Tools: Microtronics kit q WIRELESS INTERFACES There are five types of wireless interfaces (not counting the basic Matrix interface, p. 58). For more details on wireless interfaces, see Accessing The Matrix, p. 33. When creating a wireless interface, all units need a device to broadcast or project the desired transmission. These devices must be purchased separately and can be found on the Transmission Device Table, p. 6 1 . The cost OF those units must be added to the Parts cost when installing the unit. The transmission deviceâs rating cannot be higher than the MPCP rating. The rating is used to determine the Flux of the unit and its range. A signal amplifier can be installed into the cyberterminal (see above) or used as a separate external unit. ECCM can also be added to satellite, radio and cellular interfaces {use the rules and cost on p. 289, S I U ) . Any other needed gear is noted under the specific description of the interface. 60 M a trjx Cellular Interface Construction Cellular interfaces use cellular radio transceivers to connect directly into a cellular network. A cellular link utility (p. 72) is required to use this interface. Design Test Modifier: + 1 Software Test: None Cook Test: None Installation Test Time: MPCP rating + device rating in hours Test: Computer B/R (MPCP Rating) Test, plus an Electronics B/R (Device Rating) Test Parts: 35Y x device rating2 plus device Cost Tools: Microtronics kit Laser Interface Construction A laser interface uses a laser transceiver to transmit data via the infrared spectrum of light to another laser transceiver within line of sight that is connected to the Matrix. A laser link utility (p. 72) is required to use this interface. Design Test Modifier: +O Software Test: None Cook Test: None Installation Test Time: MPCP rating + 4 hours Test: Computer B/R (MPCP Rating) Test, plus an Electronics B/R (4) Test Parts: 560Y plus device cost Tools: Microtronics kit Microwave Interface Construction A microwave interface uses a microwave transceiver to connect to any microwave transponder connected to the Matrix. Additional fiberoptic cable can be purchased to set the dish up further away from the cyberterminal. A microwave link utility (p. 72) is required to use this interface. Design Test: Modifier: + 1 Software Test: None Cook Test: None Installation Test Time: MPCP rating + 4 hours Test: Computer B/R (MPCP Rating) Test, plus an Electronics B/R (4) Test Parts: 560Y plus device cost and cost of microwave dish (p. 63) Tools: Microtronics shop Radio Interface Construction The radio interface uses radio transmission to connect directly to a radio network (see Accessing the Matrix, p. 34). A radio link utility (p. 73) is required to use this interface. ......................,..............,.............,.,.................................,................... ON D E W E TABLE Mlcellaneous components can be hardwired into a FUP or patchwork hardwired. Device Cellular Laser Microwave FUP Attachment If using a FUP port, there is no actual time involved to install the unit. Design Test Modifier: 0 Software Test: None Cook Test: None Installation Test Time: MPCP rating + device rating in hours Test: Computer B/R (MPCP Rating) Test, plus an Electronics B/R (Device Rating) Test Parts: 35Y x device ratingZ plus device cost Tools: Microtronics kit Satellite Interface Constructton A satellite interface uses high-spectrum radio waves to connect to a satellite transponder. All satellite interfaces require a satellite dish to send and receive the signal. Additional fiberoptic cable can be purchased to set up the dish away from the cyberterminal. A satellite link utility (p. 73) is required to use this interface. Design Test Modifier: 2 Software Test: None Cook Test: None Installation Test Time: MPCP ratlng + Device ratlng in hours Test: Computer B/R (MPCP Rating) Test, plus an Electronics B/R (Device Rating) Test Parts: 35Y x device ratingZ plus device cost and satellite dish Tools: Microtronics shop > - MISCELLANEOUS COMPONENTS Many standard devices can be directly hooked up to a cyberterminal by a user with little to no technical knowledge. Most of them may simply be connected to one of the FUP ports (see p. 59) on the cyberterminal. The devices listed below are some of the most common ones that can be connected to a cyberterminal. Any device may be adapted for a cyberterminal as long as the gamemaster approves and it can be wired in somehow to a cyberterminal connection. If the user wants direct neural control of the device while jacked in, the device must be modified for DNI control (see Direct Neural Interface, p. 303, 973). An MPCP cannot have more accessories active than twice its rating at any given time. .......................... Patchwork Attachment Patchwork attachment refers to installing items without a FUP port. To install an item this way, the player must make a successful Electronics B/R (4)Test and a successful Computer B/R (4) Test. Both tests must succeed for the item to work. Successes can be divided into the base time. The base time is 1 hour and the player must have a microtronics kit. There is an additional Parts cost of 75 nuyen. Components Ust The quality, brand and status of many components is taken into account by their varied cost range. Audio Speakers allow a jacked-in user to talk to those in the physical world. The speakers can be attached to the cyberterminal or in a remote location connected by a port interface. Add + 1/+6 hours to the Availability rating for every 225 nuyen added to cost of the speakers. A Battery Pack allows a user to use her cyberterminal for 6 hours without charging or connecting the Matrix directly. Battery packs are a necessity for anyone using a wireless connection. Battery packs can be recharged fully in 1 hour. Batteries last for about 500 hours of use before they must be replaced. Cameras allow real-time imaging to be stored to the cyberterminal. Cameras come in either video or trideo feeds. Casings protect the internal components of a cyberterminal. Basic casings come with a Barrier Rating of 3 (see pp. 124-5, SR3, for resolving damage to a cyberterminal), though casings with higher Barrier Ratings may be purchased for additional cost. The maximum Barrier Rating available is 12. Casings do not need a FUP port; they must be added as a patchwork attachment. A Chip Reader is an access port for optical memory chips. A Credstick Reader allows the user to slot a credstick and verify, manipulate and even forge credstick information. For more on credsticks and readers, see pp. 286-7, SR3. A Credstick Slot is a simple device that reads credstick data and allows the user to make credit transactions. A Disk Drive is an access port for optical disks. A Display Screen is a small, portable display for video images or trideo projections. Fiberoptic Cable is the standard cabling used with cyberterminals and accessories. Hkcher Jacksallow a person to âjackinâ and shoulder-surf along with a user. The user connects a hitcher jack unit to his cyberterminal, which the hitcher uses by means of trodes (see p. 17) or a datajack to ride along. The information is one-way. .....* ...................................................................... I Matrix 61 The hltcher can see everything the user can, but cannot control any action while jacked in. For more information on hitcher jacks, see p. 208, 5/73. A Keyboard allows the user to type manually. A Micro-Camcorder is a small unit that can record and transmit images. See p. 290, 5/73 for more information. A Microphone allows the user to verbally give commands to the cyberterminal. A microphone can also be used by outside individuals to speak to the user. Microwave Dishes are used to transmit microwave communications (see p. 34). Microwave dishes cannot be made with temporary dish components. A Monitor is a larger, usually external display unit that accepts all kinds of video or trideo input. Add + 1/+6 hours to the Availability rating for every 1 ,OOO nuyen added to the cost of the monitor. It is not uncommon to have wall-sized monitors in some higher luxury-rated places. Off-line Storage is a memory storage unit. It has no processor. A Passkey Reader is a security module used by corporations and other private institutions to make sure that cyberterminals logged-on from remote sites are authorized (see Passkeys, p. 37). Since these are only available from the issuing corporation, the gamemaster must decide the actual value of a working device on the streets. A Power Cord is used to hook up a device to an electrical outlet. A Printer prints information to paper. All printers in 2061 are color and can make nearly perfect photocopies. Scanners are used to enter pictures or other visual media to the cyberterminal. This includes but is not limited to fingerprint, retinal and basic picture/text/print scanners. For more information on ID scanners, see p. 292, Sfd. Satellite dishes are used to project radio waves in order to communicate with satellite transponders (see p. 34). A Signal Locator picks up tracking signals from either a standard or activate-on-demand (AOD) transmitter (see p. 291, SR3). A Simlink transmits and receives simsense signals (see p. 289, SR3). A simlink consists of a transmitter, receiver and recorder. Temporary Satellite Dish Components are used to put together a temporary satellite dish, which can be quickly set up and broken down (see p. 55, CC). A Touchpad allows the user to manipulate information using their finger or a special pen to make commands on the cyberterminal. Touchpads can be adapted to use a mouse or trackball instead of a pen or finger. A Transceiver allows the cyberterminal user to communicate with others via two-way radio (see p. 287, 5/73). Trode jacks allow a person to enter the Matrix by means of an electrode net (see p. 17). A Vid-link Transmitter is used to transmit captured video and trideo footage. It is described on p. 289, SR3. The VR Kit includes a set of goggles and gloves in order for a person to physically manipulate information in the Matrix. 62 Matrix In 2061, they are nearly always used in conjunction with lowres holo-projectorsor by children learning Matrix iconography. PARTIAL CONSTRUCTION While most users want to create their cyberterminals from scratch to save costs, they can purchase partial components to save some time and money. Characters may purchase software programs for the component based on the cost of the programming (see p. 78). They can also take the next step and purchase pre-cooked OCCs from an outside source. While both of these are faster, they also carry the risk of hidden or damaging code, inexact programming and other dangers. Most users purchase these from very reliable sources and only do so for brief perids when they canât take the time during a run to do it all themselves. The cost for pre-programmed OCCs is equal to the programâs cost times 1 . 1 (see Buying Programs, p. 94). HARDWIRING The rules for constructing components deal specifically with creating a piece from scratch and connecting it to an âemptyâ MPCP, either due to a piece being removed or a new MPCP being constructed. The assumption is that the user is making a portable (only a bit bigger than a standard keyboard) Matrix interface that is made specifically for decking. Hardwiring allows a user to install a component into the cyberterminal without making a modular, snap-in component. Hardwiring is more time consuming but much less expensive. In order to hardwire a component to the MPCP, double the Installation Testâs base time. The Parts cost of the Installation Test is reduced by 50 percent (round down). If a separate unit is needed, the cost of that unit is not reduced. For example, the cost of an ASIST interface or RAS Override Unit would still remain if hardwiring those into a MPCP. Hardwired units do not fit into standard casings (see p. 61). The casing must be purchased separately at a mark-up of 10 percent per hardwired unit. The MPCP cannot be hardwired to itself. Upgrading The other benefit of hardwiring is the ability to upgrade a component. Any hardwired component can be upgraded one time and only by 1 rating point. In order to upgrade the component, use the construction process with the following exceptions: A Design Test can be made, but only half of the successes (rounded down) can be used to obtain a target number reduction on the Cook or Installation Tests. For the Software Test program size, use the rules for program upgrades, p. 81. The Installation (Upgrading)Test takes 1 hour and the target number for the test is reduced by 2. The MPCP cannot be upgraded. ...................................................................................................... 69 WJpW ............... ............................. .................................. ............. ............ SALVAGING Components from a cyberterminal can be removed and either installed inside another cyberterminal or sold. This is called salvaging a component. Both modular and hardwired components may be salvaged. Characters can try to get a discount when purchasing components by buying salvaged components. The cost for salvaged components ranges from very cheap to very expensive if the demand is great enough. Gamemasters set the scale that items are worth in their game. You can calculate the cost to a user by constructing the part and using an hourly wage based on your campaign's economics. Modular Component Salvage Modular components are easy to remove from a cyberterminal, because they usually simply snap out. At the gamemaster's discretion, removing a component may take a bit of time or even require a test (based on the Installation Test, with a -4 target number modifier and half the base time). To install the modular component inside another cyberterminal, a character must make a standard Installation Test for the 6V Matrix component. If the cyberterminal has a different MPCP rating from the component's original cyberterminal, problems may occur (see Mismatched Components, p. 65). Characters can also salvage components for parts. A player can get 50 percent of the total cost of a component back in parts. The parts can be used again in other components. OCC chips can also be sold (see the costs under Buying Programs, p. 94). Hardwlred Salvage To remove a hardwired component, the user must perform a Removal Test, which is the same as the Installation Test for the same component with the target number reduced by 2. The time is also reduced by half. There is no Design Test to help lower the removal target number, though a modifier for using a shop or facility would apply. Salvaged hardwired components may not be hardwired into a new cyberterminal, but the OCCs can be reclaimed and used to construct a similar hardwired component for a new machine. If the new cyberterminal has a different MPCP rating than the original, problems may occur (see Mismatched Components, p. 65). .......................,.,.....,.,....................................,.........,....,.,...,............,..... The removed OCCs can also be sold and the component salvaged for parts, the same as a modular component above. ient must be âopened upâ to have the parts put into place. C2 PARTS MISMATCHED COMPONENTS Many components are constructed for a cyberterminal with a specific MPCP rating. These components include: the ASIST interface, ICCM, reality filter, Response Increase and RAS override. If any of these components (or OCCs for a component) are installed in a cyberterminal with an MPCP other than what it was made for, problems will arise. First, mismatched components are more difficult to install in cyberterminals with the wrong MPCP rating: apply a +4 modifier to the Installation Test. Once installed, every time the cyberterminal or persona takes damage the gamemaster should roll 2D6. On a result of all ones, the mismatched component refuses to work, claiming incompatibility, system error or any other tech-interface term the gamemaster wishes to use. The gamemaster can determine if this is enough to dump the user from the Matrix. Use the rules for Dump Shock, p. 227, SR3. CRANIAL CYBERTERMINALS (C2) Cranial cyberterminals (C2) must use cranial cyberterminal parts, not standard ones. Only the parts listed below can be constructed. Other cykrware can be used as long as routers (see p. 22, M&M) are installed. The parts are not modular and are considered hardwired units (though they do not get the cost reduction of hardwired units). They cannot be installed in standard cyberterminals. Implanted cyberterminals must contain the same components necessary for a cyberterminal in order to function: MPCP with icon, persona programs, ASIST circuitry, 1/0 Speed and active memory. C2 cyberterminals use the standard rules for cykrterminals and cyberdeclts. Pre-constructed Cz cyberdeclts appear on pp. 20-2 I , M&M. Note that active memory is not included in those costs, nor do the costs include ICCM filters or reality filters. The listed cyberdeclts in M&M are built with hot ASIST interfaces. A Cz component requires the same tests to construct as normal components, following all of the standard rules. However, the installation must occur during the same time as an implant surgery procedure (see p. 147, MbM),as the recip- Cranial Cybertermlnal Active Memory Cold ASIST Interfaceâ Hot ASIST Interfaceâ External Jackpoint Hardening ICCM Filter Icon Chip 1/0Speed Module MPCP Persona Chips (each) Reality Filter Response Increase * Includes RAS override Essence Mp + 1,000 .2 .4 .I (Rating+ 10) .2 .I .1 (Rating + 10) .2 .2 .z Only the components listed below can be constructed for a C2 cyberterminal. The costs below are to be used if purchasing a custom designed unit. The following rules apply to items being constructed as well as pre-constructed components. As per the Partial Construction rules (see p. 62), users may purchase part of a component or the entire component as long as they install the component to the MPCP themselves. Essence Costs: The costs listed for the I10 Speed and Response Increase modules are a flat rate. The costs for persona chips and icon chips are per chip. Memory: The active memory described here basically serves as implanted RAM, in twentieth-century terms. It cannot be used for anything other than active utilities; it cannot be used as storage memory. Note that headware memory (p. 298, SR3) can be used for both active and storage memory. Other linked memory sources may also be used for storage memory (but not active memory). External Jackpoint: Cranial cyberdeclts are built with a dedicated jackpoint so that the cyberdeclc may be connected to the Matrix via fiberoptic cable. Unlike normal datajaclts, this specialized jack only connects directly to the cranial cyberterminal (it does not contain ports for linking to other implants). This allows others to access an unconscious or restrained personâs C2. Wireless Matrix Interfaces: To use wireless interfaces the user must have an external linking device (see Wireless Interfaces, p. 60) to connect to his C2. The cost for these devices appears in the Transmission Device Table on p. 61. Other Cyberware: The standard rules for linking cyberware (see Interconnectivity, p. 46, M&M) apply to Cz cyberterminals. Items such as data compressors, headware memory, RAS override units, eye cameras and simlinlts can be connected to the C2 cyberterminal. CYBERLIMB CYBERTERMINALS Cyberlimb cyberterminals are normal cyberterminals that are installed in a cyberlimb. They follow all the rules for cyberdeclt construction with the following exceptions. They can only be plug-and-use systems. They cannot be hardwired cost 200Y per Mp Construction Cost Construction x 1 .Z 500Y Construction x 1.2 Construction x 1.2 Construction x 1.2 Construction x 1.2 Construction x 1.2 Construction x 1.2 Construction x 1.2 Construction x 1 .Z Availability 612 wks 612 wks 612 wlts 612 wlts 6/2 wlts 6/2 wks 6/2 wks 6/2 wks 6/2 wlts 612 wks 612 wlts 612 wlts ................................................................................................ Street Index 1 .5 1 1 1.5 1.5 1.5 1 2 I ...... Legality 4P-s 4P-s 4P-s 4P-s 4P-s 4P-s 4P-s 4P-s 4P-s 4P-s 4P-s 4P-s or have any kind of casing as the cyberarm itself is the casing. For more information see Cyberlimbs, p. 35, M&M. SORWARE MULTIPLIER Mu CUSTOM DESIGNED CYBERTERMINALS There are three choices for the user when deciding to get a new cyberterminal. The first is to purchase one of the stock name brands (they appear on p. 167). The second would be to build one him or herself. The third is to purchase a customized cyberterminal. This order can be placed with a deckmeister or through a shadow organization like Hacker House. The stock brand companies do make custom cyberterminals, but they require proof of SIN and the requisite permits before construction will begin. Each custom designed cykrterminal includes the cost of the components, including software, hardware and installation. STEP ONE: CHOOSING THE OPTIONS All of the components listed in the Component Construction section (beginning on p. 56) are available as a custom design option. All of the standard rules apply to a custom designed cyberterminal as they would for construction and upgrading. Custom-designed cyberterminals can also be C2 or cyberl i m b cyberter m inals. STEP T W O CALCULATING THE COST There are two different factors in determining the cost of a custom designed cyberterminal: the software and the hardware/installation. Not everything needs software, and in those cases the software cost is zero. All hardware and software are broken down into a simple costs based on the MPCP2 of the cyberterminal. Hardware To calculate the hardware cost, consult the Cyberterminal Component Prices Table (p. 67). Each piece of hardware has a multiplier. Add the multipliers together and then multiply that sum by MPCP2. to get the total hardware cost in nuyen. Software For software costs, add the ratings of all the software together. For items without a rating such as reality filters and specific interfaces, use the base rating of the MPCP as its rating. If Response Increase is included it also uses the base MPCP as its rating. If a cold ASIST only is purchased, its rating is MPCP i 2 round up). The total for the component software is then multiplied by the MPCP2. That number Is multiplied by a flat software multiplier based on the MPCP rating. This multiplier is found in the Software Multiplier table. The result of that calculation is the total software cost in nuyen. 66 I Matrh Others Some items like memory, 1/0Speed and RAS overrides are individual items that d o not fit neatly into software or hardware categories. These must be calculated separately, as would the cost of any Miscellaneous Components. Note: The icons that come with customized cyberterminals are usually standard, store-bought icons at a rating of 112 (round down) of the MPCP. They are usually tossed in for free. Final Tally Once the software, hardware and other items are added together, the final cost of the cyberterminal can be determined. Remember, some places may have sales and discounts, or the deckmeister may want to get rid of older stuff and toss those items in for free. After a particularly lucrative run, SuzyQ decides to treat herself to a new cyberdeck. She orders an MPCP8/6/6/6/6deck with Response Increase-2, an I/O Speed of 480,Hardening-4, an ICCM filter, 1,000 M p of active memory, 1,500 M p of storage memory, and a hot ASIST interface with the basics ofa wired interface connection (3 meters of fiberoptic cable and a spooler)and RAS override. The price breakdown b r SuzyQâs new deck looks like this: Component Hardware Cost MPCP 8 1 Bod Evasion 2 Masking 2 Sensor 1 Response Increase 2 Hardening 8 ICCM Filter 4 Hot ASIST 2 Multiplier Totals 30 software cost The base cost of the hardware is 30 x 64 (@) 1000Y for the biomonitor = 2920Y 8 6 6 6 6 8 4 8 8 60 = 1,920plus The base cost of the software is 60 x 64 (@) = 3,840 x 1 10 422,400Y = The non-software driven components are .. 1,000x 7.5 = 7,500 Active memory: 1,500 x 6 = 9,000 Storage Memory: I/O Speed: 35Y x 480 = 16,800 Matrix Interface 35 + 3 + 5 0 = 88 135 x 8)+ 1,OOO = 1.280 RAS Override The base cost of other options is 34,668 ............................. .................................................... ............... t Adding up all the costs, SuryQ's deck comes to: 2,920 + 422,400+ 34,668= 459,988Y She gets a standard Neil the Ork Barbarian icon chip at a Rating 4 and her deck has 8 FUPs. Her deckmeister sees that half-million cred rolling his way and decides to offer S u q a 5 percent discount (bringing the cost down to 436,989wand gives her a keyboard and monitor he had lying around tbr free (they would take up 2 FUPs). SHOP INSTALLATION If a user wants a stock component installed by someone else, the cost is determined by using the custom design rules, above. The rules for Partial Construction (p. 62) are only to be used if the character is making or installing any part of the cyberterminal themselves. eed Software A k w months later SuzyQ wants her deckmeister to install a reality filter on her deck. If she wanted to save herself some nuyen, she could try to purchase or cook the OCCs and install them herself By investing nuyen in her own shop and other tools she could install one pretty cheaply. But right now she doesn ' t have the time or inclination to spend hours programming and installing. Paying is good enough for her. 7he hardware multiplier for a reality filter is 8. The total hardware cost is (64x 8) = 512.Y. The software cost is 512 ( 6 4 x 8) x 110 or 56,320.Y.7he total SuzyQ pays is 56,832.Y. ...................................................................................................... . 61) co 1 Matrix I 67 1 U tilities are the lifeblood of deckers, and are quite useful to non-decker users as well. This section introduces a number of new utilities and describes new uses for utilities originally presented in SR3. Multiplier: This value is used during programming (see p. 76) to determine the size OF the program. Options: These are the utility programming options (seep. 83)that may be used to modify the utility. NEW UTILITIES These utilities follow the same rules found under Utilities, p. 220.SR3. OPERATIONAL UTILITIES Operational utilities assist a user in conducting system operations. For mote details on the nature and use of operational utilities, see p. 220, SR3. Options: All operational utilities may use the adaptive, bug-ridden. crashguard, DINAB, noise, one-shot, optimization,sensitlve, sneak and squeeze options (seeUiYliW options, p. 83). 68 Matrix ..................................................................................................... Encrypt Multiplier: 1 System Operations: Encrypt Access, Encrypt File, Encrypt Slave This utility encrypts electronic data, transforming it into an format which is unreadable without t h e cryptographic key (or a good decrypt utility). Encrypt reduces the target number for System Tests involving encryption. For more information on data encryption, see p. 292, SR3. Evaluate Cam0 Multiplier: 3 System Operations: Redirect Datatrail The cam0 utility confuses any program attempting to lock in on the userâs datatrail through a variety of techniques, including hiding the userâs tracks and laying false trails. The cam0 utility rating is added to the base number of turns it takes for the location cycle of trace IC or a track utility to locate a user. For more details, see Trace IC,p. 104. This utility also reduces the target numbers for System Tests for the Redirect Datatrail operation. Multiplier: 2 System Operations: Locate Paydata The evaluate utility sifts through large data samples to find valuable information, reducing the target number for attempts to find paydata on a host. Because evaluate utilities are programmed to search out data that is currently hot on the market, the utility degrades rapidly as market demands change. On a periodic basis (one month of game time or after every Matrix run), the gamemaster should roll 1D6 + 2 (round down) for each evaluate utility possessed by the team and reduce the effective rating of the program by the result of the roll. Users with source copies of evaluate utilities can upgrade them with new search parameters. This upgrade represents time spent programming stock market analyses, rumors, news stories, shadowtalk and other data into the evaluate programâs parameters. However, unlike standard upgrading (see p. 81 ), upgrading an evaluate utility requires the Knowledge skill Data Brokerage (or equivalent). U s e Data Brokerage in place of Computer (Programming) when upgrading the utility. Alternately, the gamemaster may allow a character to spend Karma Points to restore the evaluate utility. One Karma point restores one rating point. Crash Multiplier: 3 System Operations: Block System Operation, Crash Application, Crash Host The crash utility helps the user to undermine other programs, issuing cancel commands, introducing errors and causing them to seize up. The crash utility reduces the target numbers to crash an application or host. Defuse Multiplier: 2 System Operations: Disarm Data Bomb This utility is designed to disable data bombs (seep. 103), reducing the target numbers for System Tests to disarm them. Doorstop Multiplier: 2 System Operations: Freeze Vanishing SAN This utility is designed to lock open a vanishing SAN so that it cannot completely close and cut the user off. The doorstop utility also convinces the SAN that it has actually closed, so as not to set off any alerts. See Vanishing SANS,p. 120. I 70 I Matrix I ...................................................................................................... A character who programs his own evaluate utility (see hgramming, p. 76) cannot program it at a rating higher than his Data Brokerage skill. Mbmm Multipller: 3 System Operations: Decoy The mirrors utility allows the user to clone hls fmn, reducIng the target numbers for System Tests used in the Decoy operation. Icon Rating Test against the redecorate utility rating; successes from this test reduce the attacker's successes. Each net success allows the attacker to alter one aspect of the icon's appearance (for example: color, texture, facial feature, resolution). Sniffer Multiplier: 3 System Operations Intercept Data This utility is designed to monitor all data traffic Rowing through a subsystem, selectively searching for keywords or other set parameters. Sniffer reduces the target number for Intercept Data System Tests. Snooper Multipller: 2 System Operations: Analyze Operation This program allows the user to spy on a target icon and reduces the target number for an Analyze Operation System Test. Swerve Multipller: 3 System Operations: Abort Host Shutdown The swerve utility is used to avoid a system crash, and reduces the target number for the Abort Host Shutdown System Tests. Triangulation Multiplier: 2 System Operations:Triangulate The triangulation utility simultaneously queries several wlreless link relays for information on signal strength and quality to and from a particular remote device. It then analyzes this data and calculates the physical location of the remote device. On a cellular network's system, thls utility can be used to pinpoint the location of a powered cell phone. When triangulating a location, the triangulation utility reduces the target number for Triangulation System Tests. mge Validate Multipller: 2 System Operations: Disinfect This utility searches through systems infected with worm programs and eradicates the worms. Purge reduces the target number for Disinfect system operations, and tests to remove worms from programs, files or MPCPs (see Worms, p. 92). Multiplier: 4 System Operations: Dump Log, Invalidate Account, Restrict Icon, Validate Account The validate utility is especially useful for making administrative-level changes and accessing system logs, reducing the target number for System Tests for these type of operations. Redecorate Multipller: 2 System Operations: Alter Icon Derived from the programs used by system designers to create sculpted environments, the redecorate utility enables the user to creatively change an icon's appearance, reducing the target numbers for tests to d o so. To alter the icon of another persona, kame, agent, sprite, daemon, otaku or SK, a character must attack the target in cybercombat using the redecorate utility. The target makes an SPECIAL UTlLITlFS ............................... .......................... , Special utilities perform specific tasks and do not affect system operations. Optlons: All special utilities may use the adaptive, bugridden, crashguard, optimization and squeeze options (see Utility Options, p. 83). BameTac Matrixlink Multiplier: 5 The BattleTac Matrixlink program allows two or more ....'......'......'. ..,. ..... ...**.' ... *'U' ' Matrix 71 Matrix users to quickly exchange data to facilitate team operations in Matrix combat. Information on the status of the user and his cyberterminal, as well as any information acquired through the use of sensor programs, system operations and so on, is instantly transmitted to other users who are part of the BattleTac network. Information sent to a BattleTac network is automatically accessible to a user with a BattleTac Matrixlink. To initiate a Matrixlink, each user that plans on being part of the network must be linked via a Make Comcall operation (p. 218, 97.3). However, unlike normal Make Comcall operations, the monitored operation is maintained by the Matrixlink utility rather than the user. Communication via Matrixlink may be monitored via a Tap Comcall operation. A BattleTac Matrixlink also allows a user to use their Small Unit Tactics (Matrix Tactics) skill to gain an Initiative bonus for their Matrix teammates. To do so, the user must take a Complex Action and communicate orders during their last action of a Combat Turn, as described on p. 47, MBJM. The target number for this test is 2, modified by wounds and Perception modifiers. A character in the Matrix may not give a bonus to characters not in the Matrix through the BattleTac link, and vice versa. A character using BattleTac Matrixlink can only exchange data with a number of others equal to the Matrixlinkâs rating or less. Cellular Link Multiplier: 1 The cellular link utility is necessary for any character who wishes to establish a wireless cellular communications link with his cyberterminal through a cellular interface (see p. 60). The rating of the interface must be less than or equal to the link programâs rating. Compressor Multiplier: 2 The compressor utility reduces the size of data being uploaded or downloaded by 50 percent. A 100 Mp file would be compressed to 50 Mp, cutting the upload or download time in half. The maximum file size the compressor utility can handle is the rating of the compressor utility x 1 0 0 Mp. Cyberterminals must have enough active memory to accommodate the decompressed size of a compressed utility being uploaded. If the cyberterminal does not have adequate active memory, it cannot perform the Swap Memory operation. For example, uploading a compressed 1OC Mp utility requires 100 Mp of free active memory, even though the program is compressed to 50 Mp for the upload. Decompressing a file or program on the Matrix requires a Complex Action. Compressed files and programs must be decompressed before they can be read or used. Guardian Multiplier: 2 The guardian utility is an access control program intended to prevent unauthorized people from using a cyberterminal. For every two full points of this utilityâs rating, the user can 72 Matrix choose one of the following ways to identify and authenticate the user: Passcode or passkey, Biometric scan (fingerprint, retinal and so on)lequires an attached scanner. If someone attempts to access the cyberterminal but fails the authorization, the guardian utility will automatically deny them access. In addition, the user can also specify one of the following responses to an attempt to access the cyberterminal without authorization: Transmit an alarm via the Matrix or wireless link. Trigger an attached device (such as a mine). Jolt the unauthorized user with electricity, inflicting (guardian rating)M Stun damage. Laser Link Multiplier: 1 The laser link utility allows a user to connect his cyberterminal to a laser interface (p. 60) and establish a communications link with a laser receiver (see p. 34). The 1/0 Speed through this link cannot exceed the utility rating x 100. Maser Link Multiplier: 1 The maser link utility allows a user to connect his cyberterminal to a maser interface (p. 57) and establish a communications link through a maser power grid connection (see p. 33). The 1/0Speed through this link cannot exceed the utility rating x 100. ............................................. ..... ....... ................................... Mlcrowtwe Lfnk Multiplier: 1 The microwave link utility allows a user t o connect his cyberterminal t o a microwave interface and establish a communications link with a microwave link receiver (seep. 34).The 1/0Speed through this link cannot exceed the utility rating x loo. Radio Link Multiplier: 1 This utility is necessary for any character w h o wishes to establish a wireless radio link with his cyberterminal through a radio interface (see p. 61). The rating of the interface must be less than or equal t o the rating of the link program. If the attack succeeds, the target must make a test using the affected persona rating against a target number equal t o the rating of the erosion utility. Successes from this test reduce the attackerâs successes; if reduced to 0, the attack has n o effect. Reduce the persona rating of the target by 1 for every 2 net successes the attacker achieves (if only 1 net success is achieved, the attack fails to reduce the appropriate persona rating of the target). The armor utility does not protect against erosion. Remote Control Multiplier: 3 This utility, when used in conjunctlon wtth a rigger protocol emulation module, allows a user t o control his drones or the drones and components of a rigged security system. The user must have a communications link with the drone, either through CCSS (closed circuit simsense), a rigger remote control deck or a wireless link. A user w h o controls a drone through this utility can only command it in the âcaptainâs chairâ mode. The user cannot use either Hacking Pool or Control Pool when controlling the drone. For more information on computer users and rigging, see p. 28. Satellite Link Multiplier: 2 The satellite utility contains a database of satellite positions and transponder protocols, allowing the user t o connect his cyberterminal t o a satellite link interface and establish a communications link with an orbital satellite (see p. 34).The rating of the interface must b e less than or equal t o the rating of the link program. OFFENSIVE UTILITIES Offensive utilities are viral programs intended for use against another icon. A desperate user can program the Attack utility (p. 221, SR3) on the fly (p. 122), but cannot program any of the other offensive utilities during a run. Target: Specifies the targets each utility program can attack. âFramesâ refers t o d u m b frames, smart kames and agents. Erosion (Blinder, Poison, Restrict, Reveal) Multiplier: 3 Target: Frames, Personas, SKs Options: Adaptive, area, bug-ridden, crashguard, MNAB. one-shot, optimization, selective, targeting The erosion utility attacks a specific persona ratlng of targeted icons, similar t o crippler IC. Erosion has four variants (each variant is a separate utility): Blinder attacks the Sensor rating Poison attacks the Bod rating Restrict attacks the Evasion rating Reveal attacks the Masking rating Hog Multiplier: 3 Target: Personas Options: Adaptive, bug-ridden, crashguard, DINAB,o n e shot, optimization, selective, targeting The hog utility bombards the target cyberterminal with system requests, pings, data packets and other transmissions. This flood of incoming data swamps the active memory of the cyberterminal, forcing it t o juggle a barrage of meaningless input. This active memory drain begins crowding any running utilities, forcing them t o crash. Whenever an attacker makes a successful attack usfng a h o g program, the target makes a n MPCP (Hog Rating) Test; Hardening reduces the target number for this test. Any successes achieved on this test reduce the attackerâs successes; lf reduced t o 0, the h o g attack has n o effect. If the attacker achieves any net successes, dMde them by 2 (round down). The result is the number of running utilities the hog has forced t o crash. The highest-rating program will crash first, followed by the program with the next highest rating and so on. For utilities with the crashguard option, consider their â. ..........................................................-....................I .....,............... Matrix 73 r------------------ --- rating, as equal to their normal ratings minus the crashguard ratings. If two utilities have the same rating, randomly choose which one fails. Users can use the Swap Memory operation to reload programs crashed by a hog utility. The armor utility has no eftkt against the hog program. The steamroller program is immune to the destndve effect of tar programs. A Matrlx gang member / u m p Grid Reaper wM/e heâs mising through a public host, attacking him with a rating 6 hog utility. The gang decker gets an amazing 7 successes on his Attack Test. Grid Reaper rolls his MPCP of 8 against a target number 3 (hog rating 6 - his hardening of 3). He rolls poorly, getting only 4 successes. The gang decker has scored 3 net successes, meaning he crashes 1 of Grid Reaperâs utilities. Gridâs highest utilities are his sleaze8 and decepffon-6. HJs sleaze utility has a crashguard rating of 2, however, X) I t s effective rating against the hog is 6 (8 - 2). Because both utilities are effectively the same, he rolls randomly. Jhe sleaze utility bites the dust. Râ¬?StOn Multipfier: 3 Options: Adaptlve, bug-ddden, crashguard, DINAB, oneshot, optimization The restore utility is designed to shore up and reconstruct persona programs. In effect, it repairs damage to an iconâs attributes, such as the damage caused by crippler IC or certain offensive utilities. The restore utility cannot repair any permanent damage to the actual persona chips caused by gray or black IC. To use the restore utility, the user takes a Complex Actlon to make a Restore Test against a target number equal to the rating of the program that caused the damage. If the icon suffered damage from more than one program, such as acid-4 and poison-6 crippler IC programs, use the higher rating. The utility repairs 1 point of damage f o r every 2 successes achieved on the Restore Test. SIeamroller Multlplier: 3 Target: Tar Baby It,Tar Pit IC Options: Adaptive, bug-ridden, crashguard, DINAB, oneshot, optimization, stealth, targeting The steamroller utility is designed to destroy tar IC programs. A successful attack against tar IC with this utility inflicts (rating)D damage. Tar IC crashed with this program will increase the userâs security tally unless the steamroller program is equipped with the stealth option or the user suppresses the IC per standard rules. DERNSM UTILITIES Defensive utilities are deslgned to pmtect the user In cy bercom bat. Shield Multlpller: 4 Options: Adaptive, bug-rldden, erashgufuard,optlmlzatlon The shield utility enables a user to parry attacks in cybercombat. Whenever an attack strikes the userâs icon, he may make a Shield Test against a target number equal to the skill of the attacker (Computer skill for a decker, the Security Value of a system for IC programs, the DINAB value for a frame and so on). Reduce the attackerâs net successes by the number of successes achieved on the Shield Test. The shield utility is effective against all offensive utilities and attacks by IC programs. A shield utility loses 1 Rating Point every time it is used, whether or not the Shield Test succeeds. Users may load fresh copies of the utility by performing Swap Memory operations. ADVANCED USES FOR SR3 UTILmES Many of the utilities presented in SR3 have advanced applications based on the new rules and Matrix features presented in this book. The advances are listed below. OPERATIONAL UTILITIES Options: All operational utilities may use the adaptive, bug-ridden, crashguard, DINAB, noise, one-shot, optimization, sensitive, sneak and squeeze options (see Utility Options, p. 83). 7v M atrjx .................................................. .........................,........................... , Options: Adaptive, area, bug-ridden, chaser, crashguard, DINAB, limit, one-shot, optimization, penetration, selective, stealth, targeting Black Hammer Target: Personas Options: Adaptive, bug-rtdden, Q1Ishguard, one-shot, optimization, selective, targeting The black hammer utility Is lnctedlbly difficult to program. The maximum rating that can be programmed is equal to half the Computer (Programming) skill of the p r e grammer, rounded up. This utility may be used by SKs, but may not be loaded into a frame, agent, sprite or daemon. Kllljoy Browse This utility may also be used to modify the target number for the Trace MXP Address system operation. Relocate In addition to its uses against the track utility, the relocate utility also reduces the target numbers for System Tests made to defeat trace IC programs that have begun their location cycles (see Trace IC,p. 104). Scanner The scanner utility may also be used to reduce the target number of System Tests for the Locate Frame, Locate Tortoise User and Scan Icon operations. SPECIALunLmEs All special utilities may use the adaptive, bug-ridden, crashguard, optimization and squeeze options (see Utility Options, p. 83). Track The track utility may be used to trace frames, agents, sprites, daemons and even SKs and Als, in the same way it is used against personas. OmNSIVE U n L l l l L s Attack Target: This utility may also be used to target frames, agents, sprites, daemons, SKs and Als. Target: Personas Options: Adaptive, bug-ridden, crashguard, one-shot, optimization, selective, targeting As with the black hammer utillty, killjoy is difficult to program. The maximum rating that can be programmed is equal to half the Computer (Programming) skill of the programmer, rounded up. This utility may be used by SKs, but may not be loaded into a frame, agent, sprite or daemon. slow Options: Adaptive, area, bug-ridden, crashguard, DINAB, one-shot, optimization, selective, targeting Trace IC is only vulnerable to the slow utility during the hunting cycle. DEFENSIVEunLinEs Armor When used against offensive utilities with the area option, increase the armor utilityâs rating by +2. Options: Adaptive, bug-ridden, crashguard, Optimization Cloak Options: Adaptive, bug-ridden, crashguard, one-shot, Optimization Lock-% Options: Adaptive, bug-ridden, crashguard, one-shot, optimization Medic Options: Adaptive, bug-ridden, crashguard, DINAB, optlmization .................................................. .................................,................... Matrix 75 T o create a program, whether a decker utility, a home-brewed application or a wiz piece of IC, the user must spend the time to crank out the code. This typically involves days or even weeks of jacking in, constructing the code, debugging, rewriting and testing before the program is finalized and ready to use. Aside from a breakdown of the programming procedure, this section also details options available to certain types of programs, command sets, worms, frames and agents. THE PROGRAMMING TEST Programming requires a Computer (Programming) Test to complete the work. Each programming task has a base time to finish, and the use of a program plan, certain tools and programming environments may rnodii the test. The inclusion of speclfied program options may also dfect the test. PROGRAM RATINGS Except where noted, a programmer cannot write a program Mth an unmodlfled rating higher than his Computer (Programming) skill. The ratings of a cyberterminal or cyberdecks persona programs may not excR&d the programmer's Computer (Programming) skill multiplied by 1 .S (round dawn). PROGRAMSIZE A program's slze Is determlned by squaring ttS mtlng and multiplyhg the result by the program multiplier supplied in the program description. The Program SizeTable (p. 78) provides precalculated sizes for programs of ratings 1 through 14 and multipliers up to 10. If modifiers OF some kind reduce the effiecttve ratlng of a program to less than 1, use a rating of 1 to determine design time and memory requirements, I7e I Mam ..........................................-.................-..........-.... .... ........ , Megapulses All program sizes are measured in megapulses (Mp). The exact definition of a megapulse (aside from a million pulses) is intentionally left abstract, and serves as an arbitrary measurement of computer memory. BASE PROGRAMMING TIME The base time required to write a program is equal to the Mp size of the program in days. When calculating the base time, include any size increases from program options in the program size. THE PROGRM PLAN A program plan is an outline generated by a programmer to detail the steps that will be necessary to create a solid and efficient code structure. To generate a program plan, a character must use an appropriate Program Design Knowledge skill, such as Combat Utility Design, Operational Utility Design, Cyberterminal Code Design and so forth (see p. 25). The character makes a test using this skill against a Target Number 4, applying modifiers from the Program Planning Table (p. 79). Each success achieved on creating the program plan provides a -1 target number modifier to the Computer (Programming) Test. Creating a program plan takes a number of hours equal to the programâs rating, + 1 for each option, multiplied by the programâs size multiplier. A program plan requires a number of Mp equal to the programâs size + 10 (round down). PROGRAMMING TOOLS At minimum, a character needs a computer with both active and storage memory equal to or greater than the size of the program being created in order to program. Any computer will do, from a cyberterminal to a desktop, as long as it has the memory. If the computer being used has double the required memory, it provides a -2 target number modifier to the Computer (Programming) Test. Programming Suite A character can also enhance his programming by using a software programming suite. These suites must be run on a computer, and they provide a number of programming tools such as smart editors, library packages, code optimizers, dynamic compilers, source code debuggers and other virtual assistants. Most programming suites are designed as an actual virtual environment for the character to jack into, allowing him to program by manipulating menus and icons that represent basic functions, code and features. Programming suites each have a rating, which is applied as complementary dice to the programmerâs Computer (Programming) Test. A character cannot receive more complementary dice than he has Computer (Programming) skill. Note that the memory taken up by a programming suite is considered available when determining if the computer has double the programâs memory. Note that because the programming suite is a program unto itself, it is possible for a character to program his own programming suite. A character may not program a programming suite with a rating higher than his own Computer (Programming) skill. Programming suites have a multiplier of 15. Note that programming suites may also be programmed with t h e self-coder option (see p. 87). The size for programming suites rated 1-10 are listed on the Programming Suite Table (p. 79). See Buying Programs. p. 94, for determining a programming suiteâs cost and availability. Mainframe Programming A programmer can also take advantage of a programming environment on a mainframe computer host. Programming environments are basically programming suites designed specifically to 10 40 90 I 360 1,360 4 78 M at r k ..........,............................................................................................ for mainframe hosts. Unlike suites, environments do not have ratings OF their own: the Security Value of the system they are run on is used instead. To gain access to a mainframe programming environment, a character must either pay for programming time or hack the system and steal the time. The typical charge for one day of programming is equal to the hostâs Security Value x 1 OOY. Naturally, mainstream hosts PROGRAMMEN will require proof of identification (including SIN) and will demand certain waivers be signed; some will even require contracts or payment in advance. Some have also been known to monitor those who use their systems, either to prevent deckers from writing illegal code or to steal the code for their own purposes. To steal programming time, the character must deck into the system and validate an account that allows them to use the programming environment. The decker can then use the host until the systernâs security notices something is wrong with the account. Like programming suites, a programming environment adds Complementary dice equal to the hostâs Security Value to the characterâs Computer (Programming) Test. Mainframe programming also reduces the target number by an amount based on the hostâs Security Code: -1 for blue, -2 green, -3 orange and -4 red. Because mainframes usually have memory to spare, they also provide a -2 extra memory modifier. A character can use a programming environment on a mainframe as long as its rating is not higher than twice his Computer (Programming) skill. THE COMPUTER TEST To determine how successful the programming is, the character makes a Computer (Programming) Test against a target number equal to the unmodified rating of the program (do not include changes in the rating due to options). Apply any appropriate modifiers from the Programming Modifiers Table. Complementary dice may be added to this test equal to the rating of the programming suite or Security Value of the programming environment being used. Hacking Pool may not be used for this test, but a character with Task Pool may use it. If the character fails the test, the gamemaster rolls 2D6 and divides the base time by the result (round up). This number equals the number of days the character programs before he realizes the design is inherently flawed and must be remade. THE TASK PERIOD Divide the base period by the number of successes on the Computer (Programming) Test. The result is how long the programming takes, expressed in days. Just as with cyberterminal construction, this task period considers a day of work to be 8 hours of labor. For more details, see Time, p. 55. Note that a character will not know how long the programming will take, even though the player might. The character can only guess. In fact, the gamemaster may choose to roll the test for the player, to keep him in the dark as well. Jeff decides to whip up the best attackd utility he can create. His Computer Skill is 6, so the maximum rating he can program it with is 6. He decides to give the utility the targeting option, which increases its design rating by 2 to 8. A ttack-S utilities have a multiplier of 4, so the programâs design size is 256 Mp. The base time to write the utility is 256 days. 7he first step Jeff takes is to create a program plan. He uses his Combat Utility Design Skill of 4 against a target number of 4, modified by the programâs rating to 3. He scores 3 successes, which will reduce his Programming Test by -3. Creating this plan takes Jeff 28 hours (rating 6 + 1 option = 7, 7 x the multiplier of 4 = 28). When it is finished, the plan takes up 25 Mp (256 + 10 = 25.6, rounded down). To begin writing the uti/ity, IeEneeds a computer with enough memory-256 Mp minimum. He already owns a computer with 1,OOO Mp (both active and storage), so heâs set. Because he has double the required memory, he will receive another -2 modifier to his Programming Test, Jeff also has a Rating 5 programming suite on his computer, which will provide him 5 complementary dice on his Programming Test. Jeff has a Computer 6 skill, so he rolls 6 dice (plus 5 complementary dice) when making the test. His target number is the unmodified rating of the program& modified by his program plan successes (-3) and double memory (-2) to 2 (6 - 5 = 1, raised to the minimum target number of 2). ................................................ ........... ...................................... I Matrix I 79 I Jeff scores 8 successes. The task period will be 32 days (256 + 8).It will takeJeffa little over a month to complete the utility. PROCRAMMING TEAMS Characters may also work together in teams to produce programs. The maximum size of a team equals half the Computer (Programming) skill, rounded down, of the team member with the highest skill. The maximum rating of programs the team may produce equals the Computer (Programming) skiU of the team member with the highest skill. When the time comes for tbe team to make a Computer (Progrmrningl Test, make only one test for the entire team. Use a number of dice equal to thelr average Computer (Programming) skill, rounding down. If arty of the team members have Task Pool, add the Task Pool to the characterâs skill before calculating the average. Divide the task period for team programming by the number of team members + I , rounding up. The result is the minimum number of days each team member must work on the programming. Each team member must have the minimum required computing resources to work on the program. Four characters decide to get together and work on a program. Their individual skills are Computer 5,Computer 2, Computer 6 (Programming 8) and Computer 7. The 80 Matrix ........................................ highest skill rating of their group is 8. so the team can have 4 (8 i 2) members, and the maximum program rab ing they can produce is 8. The team decides to write an armor-8 utility, which has a size of I92 Mp. Each of the team members has a computer with over 384 Mp (192 x 2) of free memory, and they each have a copy of a rating 2 programming suite (most have a higher rating suite, but the team member with Computer Skill of 2 canât use one with a rating over 2). They also have a program plan to work fiom that was generated by one of the team members with 2 soccec5es (-2 to thelr programming target [email protected] 7he base time to program the utility is 192 days. 7 7 ~ teamâs average Computer (Programming)skill is 5 (5 + 2 + 8 + 7 = 22,22 i 4 = 5.5,rounded down to S), so the team rolls 5 dice for the test, plus 2 complementary dice. The tap get number is 4 (8,-2 for having double the necessary memory and -2 again for the program plan). The team gets 6 successes, so the task period is 32 (I92 + 6)days. Each team member must work on the program b r a minimum of 7 days (32 + 14 + 11, rounded up). THE FINISHED CODE Once a programmer completes the task period, the work is done and he now has a copy of the programâs source code. As described on p. 295, SR3, the source code must be used to cre- ate object code copies, which are what actually get used by the character. Object code is usually cooked into optical memory chips, which requires a Cooking Test, as described on p. 55. In order to copy, upgrade or modify the program, a character must have the programâs source code. s less than half charact UPGRADING If a character has a programâs source code, he can attempt t o increase a programâs rating by upgrading it. A character may also upgrade a program by adding options rather than increasing the programâs rating. A character can also decrease a programâs rating if he chooses, or remove options. For game purposes, all of these procedures are considered âupgrading,âand require a Programming Test. To determine the base time for an upgrade, first determine the base time for the program as if creating the program from scratch (see Base Programming Time, p. 78). Then calculate the base time for writing the current program version. Then subtract the current version base time from the upgraded version base time. The result is the base time needed for the upgrade. The minimum base time for upgrading is equal to 25 percent of the base time it would take to write the program from scratch. If a program upgrade would result in a program size equal to the programâs original size, use this minimum base time. The character makes a Computer (Programming) Test for the upgrade, using the programming rules detailed above. OPTIONAL RULE: BUGS As every commercial software developer can tell you, itâs practically impossible to write code that is completely free of errors. One claim states that there are 15 bugs for every 1 0 0 lines of code. Commercial vendors will usually run their software through a testing phase to work out the most heinous bugs, but characters who are cranking out their own code at home rarely have this luxury. Such characters typically find out their coding errors the hard way. If this optional rule is used, evely time a character writes a program there is the possibility that it will be bug-ridden. Naturally, these bugs will surface at the most inopportune times. The Bug Test Whenever a character programs a piece of software, the gamemaster makes an Open Test using the characterâs Computer (Programming) skill: for programming teams, use the average of their skills. The result is the Occurrence factorhow frequently the programâs bugs will cause problems during execution. Every (Occurrence) use of the program, the gamemaster rolls on the Glitch Table (p. 82). A character can intentionally take longer when programming to develop a product with fewer bugs. Instead of using Computer (Programming) test successes to reduce the task period, successes can instead be sacrificed to debugging. Each success used in this way adds +3 to the Open Test. The gamemaster can apply several additional modifiers to the Open Test, as shown on the Bug Test Table. Programming language Software developers in 2061 use a wide range of programming languages, each with their own benefits and faults. Some programming languages are known to be more efficient and less âbuggyâ than others, but they typically have other drawbacks, such as taking longer or being more difficult to use. When using these optional rules, the character must state which language he will program the software in. The character must know the programming language: each language is governed by an equivalent Language skill. Each language provides a modifier to the Open Test for bug occurrence, and may also have other effects on the programming process, as listed on the Bug Test Table. If a program is created using a specific language, then the program can only be upgraded using the same programming language. Using the Glitch Table When a character uses a program for the nth time (where n = the Occurrence factor), the bugs in the program cause a glitch to occur. Sometime during the programâs period of use, ...................................................................................................... Matrix a1 PROGRAM OPTIONS . To with akes until Program options are modifications to a program that alter its basic operation. Generally, an option enhances a programâs performance in one way but limits its performance in some other. Options dramatically increase the complexity of the Matrix rules. The interaction of options and programs can become quite intricate, and so gamemasters and players should become thoroughly familiar with the standard Matrix rules before introducing options into their games. As always, gamemasters may modify these optional rules to best fit their games. Two types of program options are described below. The first, Utility Options, describes options available only to Matrix utilities (see Utilities, p. 68). The second, /C Options, details options available only for intrusion countermeasures programs (see intrusion Countermeasures, p. 103). Options for skillsofts and BTLs are described on pp. 60 and 66, cc. the gamemaster should roll on the Glitch Table. Exactly when to make the roll is up to the gamemaster, but it is suggested that this roll be made when it will create the most drama or amusement. When rolling on the Glitch Table, the gamemaster uses 2D6 and adds the results. The Rule of Six applies to both dice. Debugging A character a n attempt to reduce the bug Occurrence fattor of a program by performing a debugging session. To do this, the character must have access to the programâs source code. Debugging has a base time of the programâs Mp size in hours. T~ debug, the character makes a computer (Programming) Test against the programâs rating. Apply a +2 target number modifier if the character is not an original author of the code. Each success may be used to increase the Occurrence factor by 1 . Successes may instead be used to divide into the base time. Bug Free? At a certain point (left up to the gamemaster, though 12+ Is recommended), a programâs Occurrence factor becomes so infrequent that the gamemaster can stop keeping track and calling for glitches. Though the program is not bug-free, and probably never will be, it has been ironed out well enough that glitches are rare and not disastrous. a2 Matrix ..................................... Gamemasters may also choose to only introduce specific options into their games. However, gamemasters should keep utility and IC options balanced. Many of t h e utility options are designed to counter specific IC options (see IC Options, p. 85), and allowing IC options without providing the means to combat them may produce unbalanced and unsatisfying game play. OmoNS AND Under the standard Matrix rules, program size is fixed. The size that governs the base time to write the program is the size that the program occupies On a qberterrninal. When using options, programs have two separate sizes. The actual size measures the space the program occupies on a computer. The design size is used to determine the programmingbase time for the program. Options may change the size of a program in one of two Ways. First, adding an option to a program may alter the programâs rating, thus altering its actual size. Or an option may hcrease a Programâs actual Size by a percentage of its original Size. In certain cases, an Option may reduce the actual size of the program but increase the design size because it requires hyper-efficient code. When layering multiple options on a single program, apply any changes to the programâs rating before calculating any percentage changes in its size. For example, if a set of combined options add +2 and +3 fnodifiers to the programâs ratingand a 50 percent increasein its design size, apply the rating modifiers first. Calculate the program size based on the new rating and then the percentage increase. percentage changes are applied sequentiabâ. For example, if a 180 Mp program receives two 50-percent size reductions, first reduce the 180 Mp to 90Mp. Then reduce the 90 Mp to 45 Mp. ...................... ....................................... a 1 d OPTIONS AND RATINGS Changes in the effective rating due to options do not count against the maximum rating that a programmer can design. For example, a programmer with a Computer Skill of 8 can design any utility with a rating of 8, even if options raise its effective rating for programming purposes. Changes in the rating due to options also do not affect the target number for the Programming Test. A slow-4 utility with an area-4 option would have a Target Number of 4, not 8. The maximum rating for options that themselves have ratings, such as the area utility option, is the base rating of the program. A slow-4 program can have no more than area-4, even if the programmerâs sltill is higher. OPTIONS AND COST The price of a program depends on its base rating and design size. For example, an attack-6M program without options has a base rating of 6 and a design size of 108 Mp. The programâs street price equals its size, 108 Mp, multiplied by 200: 108 x 200 = 2 1,600 nuyen. An attack-6M (stealth-4) program has an effective rating of 10 and a design size of 300 Mp, for a price of 60,000 nuyen. UTILITY OPTIONS Utility options may only be applied to utility programs. Many utility options are only available to specific utilities. The list of options available to each utility is described in the utilityâs description (see Utilities, p. 68). Adaptive ., Design Ratlng Modifier: +2 An adaptive-equipped utility can run at any rating up to its base rating. This is a common feature for utilities used by people who possess multiple cyberterminals of variable ratings, but who want to be able to use the utility to maximum effectiveness on each. Area Design Rating Modifier: +area rating The area option enables a utility to engage multiple targets at once (all targets must be in the same system). The utility may engage a number of targets equal to the area option rating. The user makes one Attack Test and applies the result to all specified targets. Increase the target n u m k r for each target by the total number of targets. The armor utility, as well as the armor IC option, protects against utilities fitted with the area option. Persona and IC protected by armor add +2 to their effective armor ratings when attacked with utilities bearing the area option. While intruding onto a green host, the decker Grid Reaper is engaged by two security deckers, Lone Ranger and Serpico. A Matrix dogfight breaks out, and Grid Reaper brings his scythe icon-an attack-8 utility with area-2-to bear on his foes. As legitimate icons on a green host, the base target number to attack either security decker is 4. By using an area-2 utility. Grid Reaper can hit both. but since heâs targeting 2 deckers he receives a i-2 modifier to hit each (raising the target numbers to 6). Serpico has already successhdly performed a party attack maneuver, scoring 2 successes, which makes the target number to hit him an 8 (6 + 2). Grid Reaper rolls 8 dice for his attack utility, adding 3 dice from his Hacking Pool, For I 1 total. He rolls, and gets three 65 so he hits Lone Ranger with 3 successes. Rolling those 6s again, he gets a 7, 8 and 10-2 successes against Serpico. Both security deckers are running Rating 4 armor utilities, which are ekctively rated at 6 against the area attack utility. Bug-Ridden (Optional) Design Rating Modifier: None This option should only be used if the optional bug rules (see p. 81) are also being used. Obviously, no decker would ever choose this option-it is intended for use by gamemasters who wish to surprise characters buying utilities. A bug-ridden utility is a program that still has a relatively frequent bug Occurrence factor. To determine the utilityâs Occurrence factor, subtract the bug-ridden rating from 12. Chaser Design Rating Modifier: + 1 The chaser option enables a utility to home in on an IC program, negating the +2 target number penalty for attacks against IC programs with the shift option (see p. 86). However, the chaser option adds an additional +2 target number penalty to attacks against IC programs with the shield option. The chaser and penetration options cannot be placed on the same utility. Crashguard Design Rating Modifier: +crashguard rating This option makes the utility more resistant to crash attempts. If tar baby or tar pit IC attacks the utility, apply a -1 modifier to the utilityâs Opposed Test for each point of crashguard rating. Crashguard only works if the utility is in active memory. DINAB Design Rating Modifier: +(DINAB rating + 2 , round up) DINAB (pronounced die-nab) stands for âdecker in a box.â The DINAB option gives a utility program a built-in Computer sltill equal to the DINAB rating. By spending a Free Action, a user can activate a utility with DINAB and the utility will run itself. A utility running under DINAB control performs whatever operations the utility needs to do its job. DINAB-controlled utilities receive one full Combat Phase per Combat Turn. This Combat Phase is taken immediately when activated; the utility receives 1 D6 for Initiative on subsequent turns. Once a utility is running under DINAB control, the user must override the DINAB i f he wishes to issue commands or use his own Computer sltill in its place: this takes a Free Action (plus any actions normally required for using the program). A ...................................................................................................... Matrix â¬53 DINAB-controlled utility will turn itself off immediately after it finishes the task it is designed to do. DINAB is notoriously unreliable and prone to crashing over time; the programâs decision tree simply canât accommodate all situations and things that might go wrong. The DINAB option degrades-loses 1 rating point-evety time it f i l s a test. For these purposes, a test is failed any time the DINAB option is defeated in a System Test, whenever it fails to hit a target in cykrcombat or the target reduces to zero all damage the utility inflicts. Whenever a program under DINAB control fails a test with results of all Is,the utility crashes. The user must reload a fresh copy before he can use it again. A Swap Memory operation restores degraded DINAB options and crashed DINABequipped programs. Limit Design Rating Modifier: -1 The limit option restricts the utility to a single type of target, such as personas, IC programs, frames or SKs. The program is useless against any other type of target. Noise Design Rating Modifier: -noise rating An operational utility with the noise option doesnât bother with subtlety, instead using direct, brute-force measures to get the job done. The Detection Factor of a character using a noisy utility is lowered by the noise rating for the System Test in which the operation is used. Security deckers often use noise-equipped utilities. One-Shot Design Rating Modlfier: Special The one-shot option turns the utility into a single-use program. After the utility executes once, it vanishes. To use the utility again, the decker must reload it with a Swap Memory operation. The one-shot option reduces the actual size of the utility by 75 percent, but it increases the utilityâs design size by 50 percent. A decker can carry multiple copies of one-shot programs in his deckâs active memory, but tar baby and tar pit IC programs are extremely effectiveagainst that trick. Whenever a tar program trashes a utility carrying the one-shot option, it wipes out all copies of the program in active memory. Optimization Design Rating Modifier: Special The optimization option reduces the actual size of a program by 50 percent and increases its design size by 100 percent. Penetration Design Rating Modifier: + 1 The penetration option is designed to defeat the shield IC option; a utility with penetration does not receive the +2 target number modifier against IC with the shield option. The penetration option is exceptionally ineffective against shifting IC. Against IC programs with the shift option, a pene- SLC I Matrix ...................................................................................................... 3 squeezed utility, the cyberterminal must have enough free active memory to accommodate the utility in its decompressed form. tration-equipped utiiity suffers an additional +Z target number penalty for tests against the IC target (cumulative with the +2 modifier for shifting). The penetration and chaser options cannot be placed on the same utility. Stealth Design Rating Modifier: +stealth rating The stealth option enables the user to eliminate or decrease additions to his security tally prompted by crashing IC programs (see p. 21 2, 93). Whenever a decker uses a stealthequipped utility to crash an IC program, reduce the resulting security tally increase by the stealth rating. Selective Design Rating Modifier: + 1 When used against a target icon, a utility with this option first checks to see if the icon is using a special passkey. If the icon is bearing this passkey, the program will not work against that icon: otherwise, it targets the icon as normal. Some corps are known to include this option on attack utilities they sell so that the utilities cannot be used against their security deckers. Targeting Design Rating Modifier: +2 The targeting option enables an offensive utility to zero in on a target and pinpoint its weaknesses. A utility with this option receives a -2 target number modifier for attacks in cybercombat. Sensitive Design Rating Modifier: Special The sensitive option renders programs effective only on systems of a particular type. These may be systems made by a particular manufacturer, hosts using software written in a particular programming language or systems using a particular style of sculpted iconography. For example, utilities equipped with the Mitsuhama sensitive option work fine on computers manufactured by MCT but are useless on computers manufactured by anyone else. Writing sensitive-equipped programs requires in-depth knowledge of the particular type of system. For the Computer Test required in the programming task, use an average of the programmerâs Computer (Programming) skill and a Knowledge skill appropriate to the system (for example, an MCT Matrix Architecture Knowledge skill). The sensitive option reduces both a utilityâs actual size and design size by 50 percent. IC OPTIONS Like utilities, IC may be programmed with options. Most of these are defensive in nature. Unless otherwise noted, each of these options is available to any IC program. Some options are also incompatible with others, such as shield and shift. Armor Design Rating Modifier: +2 This option strengthens the defenses of the IC, hardening it against attacks. Armor reduces the Power of any attack against the protected IC by 2. For example, armored IC hit by an attack-6M utility would make its Resistance Test against a Target Number 4. If a utility with the area option is used against armorequipped IC, the armor rating is increased by 2. Cascading IC Design Rating Modifier: +3 IC with the cascading option is able to analyze a targetâs defenses, pinpoint weaknesses and improve its attacks to better exploit those weaknesses. When cascading IC misses a target in cybercombat or fails to damage a target when it scores a hit, it allocates more system resources to future attacks. Any proactive IC program may be programmed to cascade. If cascading IC misses on an attack, increase the Security Value used for its attacks by 1 for each subsequent Attack Test. This increase is cumulative-each time a test fails, add an additional point to the Security Value. If the IC program attacks successfully but the target resists all of the damage or otherwise neutralizes the ICâs effect, increase the ICâs rating by 1 for subsequent attacks. These increases are also cumulative. The maximum increase depends on the Security Code of the system, as shown on the Cascading IC Table (p. 86). Sneak Design Rating Modifier: +Z per sneak rating point This option gives an operational utility sly and covert means to conduct an operation, so that it is less likely to be noticed or blocked by a systemâs security. Each point of sneak rating adds + 1 to the userâs Detection Factor when making a System Test with the sneaky utility. Squeeze Design Rating Modifier: + 1 The squeeze option creates a self-compressed program. The option reduces the utilityâs actual size by 50 percent for purposes of uploading, as if it had been uploaded under the compressor utility. However, a squeezed program cannot be used until the decker spends a Complex Action to decompress it. Decompressing the program requires no test. If a program is both compressed and squeezed, it receives the benefits of b o t h i t s size is reduced by 75 percent. However, the user must decompress the program twic-ne Complex Action to undo the compressor utilityâs effects, and a second Complex Action to undo the effects of the squeeze option. The squeeze design rating modifier affects the utilityâs design size only, not its actual size. In order to upload a Fastjack is under attack by a cascading killer-5 program o n a green-6 host. The ICâs first attack uses dice equal to the Security Value of 6. The Attack Test Fails, and so the next time i t makes an Attack Test it rolls 7 dice. If the test ............................................................... ...................................... , Matrix 85 1 (p. 91), each piece of party IC remains distinct, forcing the intruder to defeat each piece of IC Maximum Increase separately. IC with the party cluster option 25 percent OF original rating or 2, whichever i are intended to be grouped together and activated on the same 50 percent of original ming or 3, whichever i trigger step, as part of the same 1 0 0 percent of original rating or 4, whichever âduster.â The total ratings of the party IC in a cluster may not exceed the systemâs Security Value x 2. fails again, the value rises to &-which represents a 25Because the system is more concerned with throwing IC percent increase over its original rating, and the maximum at the intruder and overwhelming him with attacks than with increase possible. accuracy, attacks by party IC suffer a + 1 modifier for each addiFinally, the IC connects with a hit but Fastlack reduces tional piece of party IC that is part of its cluster. his damage to nothing. The ICâs rating, which is the Power However, party IC programs are harder to hit because they ofits damage, starts to cascade. Because the IC is a killersurround the deckerâs processing space with rapidly shifting 5 program on a green host, its rating may increase by as target addresses. Increase the intruderâs target number to hit much as 2. any component program in the party cluster by the total numEventually, Fastlack will find himself facing the equivaber of IC programs in the party cluster. Utilities equipped with lent ofkiller-7 on a green-8 host! the area option defeat this feature, however, and the penalty does not apply to tests made with such utilities. Expert Ddense These modifiers continue to apply even if the intruder Design Rating Modifier: + 1 crashes one of the component programs of the party IC. IC that is programmed with the expert defense option is quite good at defending itself, at the cost of a weaker attack overall. Each point of expert defense adds an additional die to Damage Resistance Tests by the IC. However, for each point of expert defense, the IC rolls 1 less die on Attack Tests. The maximum expert defense rating IC may have is 3. Expert defense is incompatible with expert offense. Expert Offense Design Rating Modifier: + 1 IC that is programmed with the expert offense option can make more effective attacks, though it is also less able to defend itself. Each point of expert offense adds an additional die to the Security Value for the ICâs Attack Tests. However, for each point of expert offense, the IC rolls 1 less die on Damage Resistance Tests. The maximum expert offense rating IC may have is 3. Expert offense is incompatible with expert defense. For an expert ofinse-Z/blaster-5 IC program on a reci-6 host, the Attack Test would use 8 dice (Security Value of 6 + expert modificationof 2). Thegamemmter would roll only 4 dice for any Damage Resistance Tests made for the IC. Optimization Design Rating Modffier: Special This IC option functions exactly like the optimization utility option (p. 84). Party Cluster Design Rating Modifier: +3 IC with the party cluster option is designed to coordinate with similar pieces of IC, attacking targets in tandem. This makes attacks by party IC more effective. Unlike IC constructs 86 Matrix Sensitive Design Rating Modifier: Special This IC option functions exactly like the sensitive utility option (p. 85). Shield Design Rating Modifier: +2 The shield option makes it more difficult for attacking utilities to cause damage. Shield adds a +2 target modifier to all tests to hit the protected IC in cybercombat. Offensive utilities with the penetration option defeat the shield defense automatically and d o not receive the +2 penalty. However, the shield option is extra-effective against utilities with the chaser option, which must add a +4 modifier to the target number rather than the standard +2. Shift Design Rating Modifier: +2 The shift option enables an IC program to constantly relocate its memory space and system addresses, making it difficult to target. Shift adds a +2 target modifier to all tests to hit the protected IC in cybercombat. Offensive utilities with the chaser option defeat the shift defense automatically and do not receive the +2 penalty. However, the shift option is extra-effective against utilities with the penetration option, which must add a +4 modifier to the target number rather than the standard +2. Trap Design Rating Modifier: + 1 per linked IC program IC with the trap option is designed to trigger one or more pieces of IC (usually gray or black IC) if it is destroyed in cyber- ...................................................................................................... 3 < -L $ combat. The triggered IC immediately pursues the offending icon. If the IC is neutralized without being destroyed, it does not trigger any other IC. Only the IC that triggers another piece of IC needs this option; the triggered piece of IC does not (though it may have this option and trigger IC of its own when destroyed as well). PROGRAMMING SUITE OPTIONS The following option is the only option available to programming suites. Self-coder Design Rating Modifier: +self-coder rating A programming suite with this option includes a semiexpert system capable of programming on its own, without direct supervision. This option gives the suite a Computer skill equal to the self-coder rating which can be used to help write programs. Users who donât have enough time to whip up a whole program themselves usually employ the self-coder option. When a user works with the self-coder option to program, follow the rules for programming teams (p. 80), as if the selfcoder were on a team with the user. Because the self-coder itself is only a program option, it is less than perfect. If a self-coder-equipped suite is used to program more than half of a program (determined by programming days), the completed program will Function at a rating one lower than that for which it was programmed. COMMAND SETS A command set is a simple program-a set ofinstructions, really-that a decker can leave on a host to be executed at a later time. In other words, a command set is a small script to carry out a series of timed system operations. Command sets can be programmed to make multiple system operations, but they are not loaded with utilities of any kind. MAKING A COMMAND SET To load a command set onto a host, a character must first gain access to the host. Simple command sets, consisting of a number of system operations equal to the characterâs Computer (Programming) skill + 2 (round down) or less, may be composed on the fly. Composing a command set on the fly takes one Complex Action for each operation the command set will perform. If the command set includes more system operations, the character will first need to write a small program in advance and upload it. The design size of such programs is 1 D6 x 5 Mp. For programming purposes, consider a command set to have a rating equal to the number of operations it holds. The maximum number of operations a pre-programmed command set can hold is equal to the programmerâs Computer (Programming) skill. When a command set is composed, the character must detail what system operations the command set will call for, in what order and at what times. ACTIVATING A COMMAND SET Once a command set has been designated or uploaded onto a host, the character must succeed in a Null Operation system operation to activate the command set so that it stays resident on the host. Modify the Security Value for this test based on the time period before the command set performs its last operation (see Null Operation, p. 2 18, SR3). If the operation fails, the host will discover the command set before it does anything and it will be removed. If the operation succeeds, the command set is running and counting down; note the number of net successes the character achieved. COMMAND SET OPERATIONS Once the command set j s activated, the gamemaster can determine how well the command set will do when it is triggered. Immediately make a System Test for each operation the command set is programmed to undertake. Note that the character is not actually performing the operations right then, he is merely determining how successful the command set will be when it is triggered. Because of this, these tests do not require any actions on the characterâs part, nor will they raise his security tally. The results of these tests should be kept secret from the player. Any utilities the character has loaded into active memory when the command set is activated may be used for these tests. However, because the character will not be there to actually direct the operations, apply a + 1 target number modifier to each test. Hacking Pool may not be used for these tests. Keep track of the successes achieved by the host on these tests, similar to counting a security tally. As the command set is triggered and makes operations, it will build up this.tally. When this tally reaches a number equal to the number of successes achieved in the characterâs original Null Operation, the host discovers the offending command set and shuts it down. SHUTTING D O W N COMMAND SETS Any character that performs a successful Analyze Subsystem operation on the Control subsystem will detect any command sets active on the system. Command sets can be easily removed with a Crash Application operation. If the host shuts down, any command sets on it are lost. Some shadowrunner friends have asked Slamm-0 to provide Matrix cover while they break into an Ares facility.But Slamm-0âs got a hot date that night, so he canât run Matrix overwatch during their run. Instead, he tells them heâll break into the host in advance and plant a command set to give them cover. Slamm-0 doesnât want to bother writing a program, so he keeps the command set simple. Breaking into the host the night before the run, he composes a simple command set to perform three system operations at certain times the following evening. Composing this set takes three Complex Actions. Slamm-0 then makes a Null Operation to activate the set. First, he rolls his Computer Skill of 8, plus 4 Hacking Pool dice, against the systemâs Control rating of 10, mod- ........* ............................................................................................. Matrix a7 ified by his Deception utility of 8 to 2. Slamm-0 doesnât roll that well, getting only 7 successes. For the hostâs System Test, it receives +5 to its Securify Value (normally 5) because the command set has a delay period ofjust less than 24 hours. It rolls 10 dice against Slamm-0âs Detection Factor of 8, achieving only 1 success. So the command set is running smoothly with 6 net successes. The gamemaster then has Slamm-0 make System Tests for each of the operations, with a + 1 target number modifier and no Hacking Pool allowed. Because Slamm-0 wonât know how successful his command set will be, the gamemaster keeps the results a secret. Slamm-0 then logs off and calls his shadowrunning chums to tell them everythingâs in place. While heâs out on the town, they show up to hit the site right on time. As the runners approach the siteâs back entrance, the first system operation of the command set is trimered on schedule-Edit Slave. (Slamm-0 saved himself some trouble by locating the slave icon for the siteâs back door cameras before activating the command set.) What the gamemaster knows is that this operation was successfid, and that the host scored 1 success against the command set. The command set successhdly loops the video feed on the siteâs back door so the guards donât see the runners approach the door. The players donât know this, and so they sweat a little as they get close. The command setâs tally is 1 , with 5 to go. The command set then performs a Control Slave operation to open the back door for the runners. Though successful, the command setâs tally raises to 5. This isnât enough For it to be shut down, however, so on schedule it performs its last operation: Crash Host. This distracts the security enough so that the runners are able to grab what they need and get out without trouble. Meanwhile, Slamm-0 enjoys the night out with his new significant other, knowing that heâs causing trouble elsewhere without having to lift a finger. FRAMES AND AGENTS Frames and agents are programs designed to carry utilities around and act semi-autonomously. Matrix users typically use frames and agents as assistants, watchdogs or even weapons platforms. Frames and agents have varying capabilities and degrees to which they can act autonomously from a user. At the low end are dumb frames, which are linked to the userâs persona and only exist as long as the controlling user remains active on the system. Dumb frames have no decision-making capability, and can only respond to direct commands or certain trigger conditions. Smart frames are capable of independent existence in the Matrix, whether or not their user is logged on. Smart frames are roughly equivalent to Matrix drones; they are capable of piloting themselves to a degree and can comprehend more complex orders than dumb frames. Agents are a step above frames, with a higher capability for self-direction. Agents are roughly equivalent to robots, and are capable of learning and adapting their behavior to suit new conditions. , 8s I Matrix Each frame and agent has a controlling program called the frame core, which determines the programâs statistics and abilities. Like personas, frames and agents are represented by their own icons. FRAME CORE The frame core is the master control program for the frame or agent, similar to the MPCP of a persona. In fact, the frame core can be programmed to simulate persona programs. The frame core also determines how many utilities the frame or agent can hold and how fast the program reacts within the Matrix. On smart frames and agents, the frame core also acts as the âbrain,â piloting the program and interpreting orders. Like other programs, each frame core has a rating. The core rating is used in place of an MPCP rating for any test requiring an MPCP rating. Frame cores also have several attributes, which are described below. Persona Attributes Like a persona, a frame core may have attributes like Bod, Evasion, Masking and Sensor. These attributes are not separate programs as with an MPCP, but are instead part of the frame core. In effect, they function the same as their equivalent persona programs. Reaction and Initiative Dumb frames do not have a Reaction or Initiative of their own; instead they use that of the persona that i s controlling them. Smart frames and agents have their own Reaction and Initiative ratings, separate from their controllerâs. Their Reaction is equal to their frame core rating, and they roll 1 D 6 for Initiative. When designed, their Initiative dice can be increased with the expenditure of Frame Points (see Designing Frames and Agents, p. 89). Utility Payload Frames and agents are intended to carry and use utility programs. The Utility Payload is the number of utilities, counting by combined ratings, that a frame core may carry. For example, a frame with a Utility Payload of 10 can carry two rating 5 utilities, one rating 10 utility or even three rating 3 utilities plus a rating 1 . No utilities may be loaded that have a rating higher than the frame core rating. Pilot Rating The Pilot rating represents the frameâs or agentâs autonomous decision-making capability and ability to interpret commands. The Pilot rating also acts as the programâs built-in Computer skill for any tests it must make. Dumb frames only follow direct orders and so do not have a Pilot rating. A dumb frame cannot perform any action on its own that requires Computer skill. Smart frames and agents do have a Pilot rating, allowing them to take actions that dumb frames cannot. .............................................,..........................,............................... Hacking Pool Because agents possess the ability to learn and adapt, they receive a Hacking Pool, which they can use in the same way as a decker. An agentâs Hacking Pool equals its core rating. Frames d o not receive Hacking Pools. Note that even though this represents an agentâs ability to act on its own and obtain a better understanding of a situation, agents are not artificial intelligences and their autonomy is limited. See Autonomous Programs, p. 147, f o r more information on true AIs. DESIGNING FRAMES AND AGENTS When a frame or agent is purchased or programmed, its attributes must be assigned. Use the following guidelines when constructing a frame or agent. Any unassigned points are lost. Frame cores may only be equipped with the optimization and squeeze utility options. Agents may be equipped with IC options, with the exception of cascading, party cluster and trap. Frame Core Ratings A dumb frame coreâs rating may not exceed the programmerâs Computer (Programming) skill x 2. A smart frame coreâs rating may not exceed the programmerâs Computer (Programming) skill x 1.5 (round fractions down). An agentâs frame core may not exceed the programmerâs Computer (Programming) skill. A frame or agentâs icon rating (see p. 57) is also equivalent to its frame core rating. Size Multipliers Dumb frames, being relatively simple programs, have a size multiplier of 3. Smart frames are more complex and so have a size multiplier of 6. Agents are even more so, with a size multiplier of 10. To determine the Mp size of a frame core, cross-index the rating and size multiplier of the core on the Program Size Table, p. 78. Assigning Persona Attributes Each frame or agent has a number of Persona Points that may be divided up among the four persona attributes as the designer wishes. Dumb and smart frames have a number of Persona Points equal to their frame core rating. Agents have Persona Points equal to their frame core rating x 2. N o single attribute may have a rating higher than the frame core rating. Any attribute may be set to 0, if the programmer desires. Frame Points Each frame or agent also receives a number of Frame Points that are used to determine the programâs Utility Payload, Initiative dice bonuses and Pilot rating. The number of ...................................................................................................... Matrix fig Frame Points the program has available to distribute among these areas depends on its type. Dumb frames get their frame core rating x 2 in points. Smart frames get rating x 4 points. Agents receive frame core rating x 6 points. The cost for each area is detailed below. Determine Mlot Rating Dumb frames may not be given a Pilot rating, but smart frames and agents can be assigned a Pilot rating less than or equal to their frame core rating. Each point assigned to the Pilot rating costs 2 Frame Points. The Pilot rating may not exceed the programmerâs Computer (Programming) sltill. Smart frames and agents must be given a minimum Pilot Rating of 1. Determine Initlathe Bonus A smart frame or agent can be given extra Initiative dice at a cost of 3 Frame Points per die. The maximum number of Initiative dice allowed (total) is 4D6 for smart frames and 5D6 for agents. Determining Utility Payload A frame or agent can purchase Utility Payload at a cost of 1 per Frame Point. Size The actual size of a frame or agent is the actual size of the frame core plus the actual size of all programs and options loaded on it. LOADING UTILITIES .-* Once a programmer has created a frame core, he can load it with object-code copies of any programs he has available. These programs may k âplain vanillaââ or equipped with options. Programmers may not load only part of a utility-the whole utility must be added. For example, i f the programmer has deception-6, he cannot use it to give a frame a copy of deception-3. A partial copy of a program isnât smaller-it is incomplete and will not work. Unlike a frame coreâs attributes, the utilities it carries may be changed. To stock a frame or agent with utilities requires a Programming Test (see p. 76). The target number is equal to the average rating of the utilities being loaded (round up). The base time is equal to this average rating, squared, times 2, in days (average rating2 x 2 days). Smiling Bandit decides to create an agent to assist him in his various nefarious activities. Bandit has a Computer (Programming) Skill of 8, s o the maximum frame core he can create is rating 8. With a multiplier o f 10, thatâs a 640 Mp program. It looks like it will take Bandit a few months at least to finish churning out the agentâs code. While designing the agent, Bandit must determine the agentâs persona attributes. He has I 6 (8 x 2) Persona Points to divide among them, so he gives i t a Bod 4, Evasion 4, Masking 5 and Sensor 3 (4 + 4 + 5 + 3 = 16). 90 I Matrix Bandit also has 48 frame Points (8 x 6) to assign. He maxes out the agentâs Initiative by purchasing 4 extra Initiative dice, costing 12 (4 x 3) points. He also maxes out its Pilot rating at 8, costing another 16 (8 x 2) points. That leaves him with 20 points left, for a Utility Payload of 20. The agentâs base Reaction equals the frame core rating of 8 and it receives +5D6 for Initiative. It also receives a Haclting Pool equal to its frame core rating of 8. Once he finishes programming the frame, Bandit needs to choose its utilities. He decides to g o with deception. sleaze. browse and attack-D, all at rating 5. With these programs. the agent will be able to break into systems on its own, snoop around and defend itself if attacked. To load all these utilities. Bandit must make a Computer (Programming) Test against their average rating of 5, with a base time of 50 days (5 x 5 x 2 = 50). RUNNING A FRAME OR AGENT To run a frame or agent, the controlling character must first log on to a host or grid and then upload the frame or agent. As soon as the upload completes, the frame or agent starts running. Running frames and agents do not take up any of the controlling characterâs active memory. Compressed or squeezed frames must be decompressed before they can run. Frames and agents will only take orders from their controlling persona, unless another persona spoofs an order (see Spoofing Commands to frames, p. 123). If the controlling character chooses, he can instruct the frame or agent to receive orders from other specified personas. Security Tally and IC As an independent icon, each frame or agent generates its own security tally; any security tally they generate does not affect the controlling characterâs tally. If a frame or agentâs actions trigger IC programs, the IC programs go after the frame or agent, not the controlling persona. Note that a frame or agent will have the same datatrail as the user who loaded them onto the Matrix, so trace programs that go after a frame or agent will be tracing the userâs datatrail. Any Redirect Datatrail operations the user performed before launching the frame or agent will apply to attempts to trace the frame or agent. If a trace against a frame or agent succeeds, it will locate the userâs originating jackpoint. However, in the case of smart frames and agents, the user may no longer be online. Overriding Frame or Agents Whenever a user issues a command to a frame or agent, he may choose to use his own Computer sltill and Hacking Pool in place of the programâs. When a user does this, he does not have to spend the Simple Action for issuing the command, but he must spend the action required by his command as if he were performing the operation himself (which he is). This allows a user to directly use a utility carried by a frame or agent. Any security tally generated this way applies to the frame or agent. ...................................................................................................... DUMB FRAME RULES Dumb frames are not so much commanded as they are âtriggeredâ (or, more accurately, a utility it carries is triggered). Activating a utility carried by a dumb frame is a Simple Action-ven if the program is used to perform a Complex Action. For example, if a frame includes a medic utility, the user could use the frame to regenerate damage to an icon (normally a Complex Action) as a Simple Action. Dumb frames carry out their orders immediately, and they will not repeat an action. For example, a decker cannot tell a dumb frame to attack an IC program until it wins-he can only tell it to attack once. A second attack requires a second command to the frame. A frame can only take one full action each Initiative pass. If a controlling user were to take two Simple Actions and trigger two utilities that both take Complex Actions to operate in the same pass, the frame would use the first utility immediately that pass and then use the second utility during the next pass using the controlling userâs Initiative Score. If a user logs off a host (or is dumped), any dumb frames he is running crash. Dumb frames will only follow a user to another system if he performs a Logon operation for it (see p. 102). Any dumb frames left behind in a system immediately crash when the user leaves. Dumb frames may serve a number of purposes, including functioning. as a decoy, triggering an event or carrying a weapon. Decoy Frames A character can use the Decoy system operation (p. 98)to direct a systemâs security measures against a dumb frame rather than himself. The operation works as described, except that the frame is the decoy. Once a decoy frame crashes, the host system and any active IC programs react to subsequent actions by the decker per standard rules. Event Triggers If a dumb frame carries any utilities equipped with the DINAB option (see p. 83), these utilities can be ordered to âscanâ for a specific event condition and to trigger another utility when that event occurs. For example, a dumb frame with a DINAB-equipped analyze utility could be ordered to regularly perform an Analyze Security operation and to trigger another utility (say, a DINAB-equipped crash utility to crash the host) when the system goes on active alert. Weapon Carriers The most common use for dumb frames is to load them up with memory-hogging attack utilities, to serve as auxiliary weapons in cybercombat. SMART FRAME AND AGENT RULES A character can issue commands to a smart frame or agent with a Simple Action; both the character and program must be in the same system. A character can only issue commands to a single smart frame or agent at a time, unless all the programs involved are receiving the same commands. A character can issue commands ranging from simple one-liners (âAttack the black ICâ) to complex orders (âFind the Main Street Groceryâs private host, break in, locate their catalogue price files, find the entry for cherry tomatoes and lower the price by 75 percent-and crash anyone that tries to stop youâ). The more intricate and detailed the order, the greater the likelihood that the programâs Pilot will get confused. The gamemaster should rate each orderâs complexity using the Difficulty Number Table (p. 92, S U ) . The smart frame or agent should then make a Comprehension Test using its Pilot rating against that target number to determine if it understands the command. If the test generates at least 1 success, the program understands the command and executes it. The more successes the program generates, the more leeway it has in âinterpretingâ the command. A character who is issuing an order to a smart frame or agent can also use their Computer (Programming) skill to help the program understand the orders. The character may add a number of dice from this skill (equal to or less than the Pilot rating) to the Pilot rating for the Comprehension Test. Agents can add Hacking Pool to their Comprehension Tests. Smart frames and agents can be used as decoys in the same way as dumb frames. IC CONSTRUCTS IC constructs are similar to smart frames and agents. Rather than being loaded with utilities and directed by a character, IC constructs are loaded with IC programs and directed by the host itself. While IC constructs have more limited autonomy than frames and agents, they are easier to program because they require less decision-making capability. With the processing power of the host behind them, they also tend to be tactically smarter and more dangerous. CONSTRUCT CORES Each IC construct has a core that follows all the same rules as for frame cores (p. 88), with the following exceptions: Its core rating may not exceed the programmerâs Computer (Programming) sltill or the hostâs Security Value. Its size multiplier is 3. It has no persona attributes or Persona Points. It has no Pilot rating or Frame Points. It has an IC Payload equal to its core rating x 2. Its Initiative is calculated as for other IC, using its core rating. It has a Hacking Pool equal to its hostâs security code (0 for blue, 1 for green, 2 for orange and 3 for red). Constructs may be programmed with any of the options normally available to IC programs (see IC Options, p. 85). These options apply to the construct as a whole, including each of the IC programs it carries. The individual IC programs carried by a construct may not have their own options. OPERATING CONSTRUCTS IC constructs are usually part of the hostâs security sheaf and triggered at a certain step. As with individual IC programs, ...................................................................................................... Matrix 91 constructs use the host/gridâs Secudty Value when making Attack Tests and Damage Resistance Tests. The ratings of the individual IC programs are used to determine their effects only. In cybercombat, a construct is treated as a single entity. During its Combat Phase, the construct acts as a whole; each piece of IC loaded onto it does not act separately. The construct decides which particular IC will be used from action to action. Likewise, attacks against the construct are resolved as if it is a single icon with one Condition Monitor. IC constructs typically take advantage of combat maneuvers in cykrcombat, and are often designed with a basic combat approach: stand-up-and-slug; sneaky, popping in and out of detection; going for killer positions in Matrix dogfights; and so on. IC constructs have one advantage that normal IC programs do not: target selection. Tarset Selection Constructs are designed to be proactive and to catch intruders by surprise. Unlike other IC programs, constructs can attack any icon that has built up a security tally, even if they are not responsible for triggering the constructâs appearance. Constructs may even attack more than one target in the same Combat Phase. As a safety precaution, most constructs will only attack icons that have triggered an active alert (or at least a passive alert) to avoid attacking legitimate users who have built up a security tally by accident. Note that if a construct carries probe IC, it may probe only one intruder at a time (switching to another user requires a Simple Action). WORMS Worms are reactive virus programs used specifically to target cyberterminals. Worms have no effect on other computers or programs, though they are typically left as booby traps on files, programs or Matrix subsystems. Any cyberterminal that accesses such a file, program or subsystem risks infection. Worms are stealthy-many cyberterminal users will not even realize theyâve been infected. Once a worm has penetrated a cyberterminalâs MPCP, it may take several courses of action, from erasing files to logging everything the persona does, depending on the type of worm. Hosts may infest their subsystems with worms in order to catch intruding deckers unaware. Hackers will sometimes attempt to infect others in order to log their actions or get revenge. Some Matrix gangs seed worms throughout the Matrix just to wreak havoc. THE BAIT Any file, program or subsystem may be laced with worms in the hopes of infecting an unsuspecting user. To seed worms throughout a subsystem, the character with the worm program must succeed in an Infect operation (see p. 99). To infest a program, the character must succeed in a Computer Test against a target number equal to 10 minus the wormâs rating. He must achieve a number of successes equal to the target programâs rating to succeed. 192 1 Matrix To lay booby traps in files that have no rating, the character follows the same rules for infesting programs, but only 1 success is necessary. INFECTION Any cyberterminal user who accesses a worm-infested file, program or subsystem risks infection as tke worms attempt to infiltrate the MPCP. This includes reading or opening an infested file, running an infested program or performing any operation on the infested subsystem. To determine whether a worm successfully infects a cyberterminalâs MPCP, make a test using the wormâs rating against a target number equal to the MPCP. On 1 success, the worm has invaded the MPCP. If the cyberterminal has hardening, this test must result in a number of successes greater than the cyberterminalâshardening to infect the MPCP. If an infected cyberterminal is linked to another cyberterminal for some reason, the worms will try to infect the connected cyberterminal. Worms add their size to the size of any files or programs they are infesting. PREVENTION A user can detect the presence of worms on a subsystem by performing an Analyze Subsystem operation. However, if a worm inhabits the subsystem, it tries to infect the user when he analyzes it. Files and programs can also be checked for worms before they are accessed. If the file or program is in the Matrix, an Analyze Icon operation must be performed. Offline, the character must analyze the contents of the software (see Veritj4ng S o h a r e Contents, p. 94). Worms can be cleaned out of a subsystem by successfully performing a Disinfect (see p. 98)operation. To remove worms from a program or file requires a Computer Test against a target number equal to the programâs rating plus the worm rating and minus the rating of a disinfect utility (if used). If the test succeeds, the worms are removed. INFECTED CYBERTERMINALS If a character wants to analyze a cyberterminal MPCP to determine if it has been infected, make the same test as if checking a program for infestation. If a cyberterminal MPCP has been infected, it can be disinfected just like other programs. When worms infect a cyberterminal, they immediately set about doing whatever they were programmed to do. TYPES OF WORMS Many types of worms exist, though only three varieties are commonly used: dataworms, deathwormsand tapeworms. Worms follow the same rules for size and programming as other programs. Options: Worm programs can use only two of the utility options: optimization (p. 84) and selective (p. 85). ...................................................................................................... Crashworms She Multiplier: 2 Crashworms seek to undermine the integrity of utilities, causing them to crash or suffer from induced errors. Whenever a utility is activated on a cyberterminal infected with crashworms, make a Worm Rating Test against the rating of the utility. If the utility has the crashguard option (see p. 83),add the crashguard rating as a target number modifier. If successful, the utility suffers errors and must roll on the Glitch Table (seep. 82). Dataworms Size Multiplier: 3 Dataworms reside on a cyberterminal and carefully log everything the persona does: the jackpoints it uses, the systems it logs onto, the accounts and passcodes it uses, the files it accesses,the utilities it uses (including ratings and options) and so on. The dataworm secretly accumulates all of this data in a hidden file on the cyberterminal and seeks to transmit it to a predetermined destination on a periodic basis. Each time a dataworm-infected cyberterminal logs on to a grid, roll 1D6. On a result of 1, the dataworm tries to send a report chock-full of incriminating evidence back to its owner. At the same time, make a Sensor (4 + Worm Rating) Test for the cyberterminalâs user. If the test fails, the data payload is sent away without being discovered. If the test succeeds, the user notices the dataworm report and may engage it in cybercombat to destroy it before it gets away. In cybercombat, dataworm reports act as standard icons with rating +3D6 Initiative and an effective Evasion rating equal to the worm rating. They possess no offensive capabilities, but will maneuver to evade detection (see Cybercombat, p. 224, SR3). If the dataworm report has evaded the user at the end of ..................................................... * any Combat Turn, it escapes. Dataworm reports are always considered to be illegitimate icons for purposes of cybercombat. The effects of dataworm reports depend on the events in the adventure. Depending on the information logged and who receives it, the user may find himself targeted for arrest or assassination, his Matrix haunts under surveillance or raided, and/or his associates killed or chased underground. Deathworms She Multiplier: 2 A deathworm infection impedes the cyberterminalâs functioning from within. All tests made by the persona, including Attack and Resistance Tests made during cybercombat, suffer a target number modifier equal to the deathworm rating + 2 (round down). Spawnworms Size Multiplier: 2 When a spawnworm invades a cyberterminal, it lmmediately begins to produce self-replicating code that rapidly consumes the cyberterminalâs active memory. This drain on the cyberterminalâs available memory inhibits the operation of active utilities. When a spawnworm infects a cyberterminal, make a Worm Rating (MPCP)Test. The worm reduces the rating of the highestrated program running on the targeted cyberterminal by 1 point for every net success the worm achieves. The worm will continu e to drain the same number of rating points from that program at the end of every subsequent Combat Turn until it has crashed the program. The spawnworm will then repeat the process with the next highest-rated utility. It will continue in this manner until it has crashed every program on the targeted cyberterminal. ................................................. I Matrix I a3 I l f a program has the crashguard utility option, consider its rating to be reduced by the crashguard rating when selecting the highest-rated utility. Programs infected with the spawnworm operate at their reduced ratings until the worm crashes them completely. Note that a spawnworm will not affect persona programs. software they purchase may have some unwanted options, be infested with worms or simply not be the utility they asked for. To verify that a program is what the character thinks it is, he must analyze it. In the Matrix, 7-9 Size x 500 8/ this would require a successful Analyze Icon operation. Offline, a character must have a computer with enough memory to hold the program. A successful ComVERIFYING PROGRAMS TABLE Ringworms puter (Programming) Test with a Size Multiplier: 2 Successes Target Number of 4 will verify the Unlike their counterparts, 1 program and its size. ringworms are relatively benign; A character can analyze a they are primarily used as a 2 program in detail by spending a prankster tool. Ringworms are 3 base time of 5 minutes per Mp of programmed to alter the coding 4 the program. The character of a personaâs icon to change its makes a Computer (Programappearance. These changes can ming) Test with a Target Number be minor (perhaps causing the of 4. Extra successes can be used icon to flicker or buzz with static) to learn additional information or drastic (changing an imposing (as shown on the Verifying samurai warrior icon to a fluffy pink kitty). Programs Table) or reduce the base time. If the test succeeds, When a ringworm invades a cyberterminal, make a Worm the character may repeat the test with a +2 modifier to learn Rating (Icon Rating) Test. If successful, the ringworm alters the additional information. icon as it has been programmed; use successes to determine the extent of these changes. APPLICATIONS Applications include common end-user programs such as Tapeworms spreadsheets, word processors and games. These programs Size Multiplier: 2 can range from simple scripts to complex programs such as an Tapeworms erase files downloaded onto the cybertermiapplication that controls automated machinery in a factory. nal. Whenever the user downloads a file, make a Worm Rating Gamemasters can use the following guidelines for deter(MPCP) Test as soon as the download is complete. If successmining the ratings or multipliers of applications in game play. ful, the tapeworm corrupts the information and renders it irretrievable. MULTIPLIERS The majority of applications used in everyday life, from BUYING PROGRAMS simple text editors and word processors to math programs or Characters can purchase any of the programs described in the programs to control simple remote devices such as vendthis book. A programâs price is determined by its rating and ing machines, will have a multiplier of 1 or 2. More complex design size, as shown on the Program Prices Table. Option ratapplications, such as those required to control hundreds of ings do not affect these prices. remote devices or modern Matrix games may have a higher All prices given represent the cost of object code and a multiplier of 3, 4 or even 5. Only massive and complicated copy of the source code. Reduce prices by 25 percent for objectapplications such as operating systems will have multipliers code-only programs. Add 10 percent to the cost if the object higher than 6, and will rarely exceed a multiplier of 10. code is already burned onto an OCC. For agents, constructs and IC programs, double the Availability (both target number and RATINGS time period). Most applications will have a rating of 4 or less, as this is usually all that is needed to accomplish the job. Applications VERIFYING SOFTWARE CONTLNTS with extra features, such as personalized interfaces, extra conIf a character is not careful, they may purchase more than trols, auto-updating features or multi-user capability will likely what they bargained for, especially if theyâre scoring some code have higher ratings (2 to 4 points higher on average). from an untrustworthy black marketeer or corporate lackey. The 19q1 Matrix I ...................................................................................................... I a --. a ystern operations (definedon p. 214, SR3) are sets of commands or instructions a Matrix user issues to a grid or host to perform a specific task. Note that a character logged onto a system using an account with certain access privileges (see p. 38)may automatically succeed at specific system operations, according to the limits of their account. 5 NEW OPERATIONS DESCRIPTIONS The following system operations follow the same guidelines and rules as described in SR3. ABORT HOST SHUTDOWN Test: Control Utillty: Swerve Action: Complex The Abort Host Shutdown operation allows a user to temporarily keep a host from shutting down, or perhaps even to prevent it completely. This operation can be used to interfere with any host shutdown, whether it was initiated by a hostile decker using the Crash Host operation or by the hostâs own security systems. Every 2 net successes on the userâs Control Test prolongs the hostâs shutdown sequence by a full Combat Turn. If the user doubles the net successes that a decker achieved with a Crash Host operation, the host shutdown is completely averted. A host shutdown initiated by an intruderâssecurity tally cannot be completely aborted; it can only be held off. ALTER ICON Test: Control Utility:Redecorate Action: Complex A favorite of Matrix vandals, this operation allows a user to reprogram an icon and change its appearance. ............................. ......................................................................... I Matrix I 95 I ! When used against the icons of persona programs (see Redecorate utility, p. 7 I ) . To change the icon of a piece of IC or system sculpture, the user must succeed in a System Test against the systemâs Control subsystem. Each success allows the user to alter one aspect of the iconâs appearance, for example, color, texture, facial feature, resolution). Any changes inflicted by this operation are required when the icon is restored or rebooted. ANALYZE OPERATION Test: Control Utilities: Snooper Action: Simple This operation attempts to identify what system operation another icon is performing and what utilities are being used for that operation. To use this operation, the user must have located the icon whose operation he intends to analyze. IF the operation is an ongoing or monitored operation, it can be analyzed at any time. Otherwise, the user must be holding an action and intervene with Analyze Operation as soon as the target operation is begun. Each net success on the System Test will give the user one of the following pieces OF information: The operation being performed (including the test and action required). Any utilities being used. The iconâs level of success in performing the operation. BLOCK SYSTEM OPERATION Test: Control Utility: Crash Action: Complex A user can intentionally interfere with an operation being performed, whether by a user, frame, agent, sprite, daemon, semi-autonomous knowbot (SK),or even an Al. Security deckers often use this operation to harass intruding deckers rather than engaging them in Matrix combat. To use this operation, the user must have located the icon whose operation he intends to block. If the operation is an ongoing or monitored operation, it can be interfered with at any time. Otherwise, the user must be holding an action and intervene with Block System Operation as soon as the target operation is begun. Each success achieved on the Block System Operation counteracts a success achieved on the target operation. If the target operationâs successes are reduced to 0, the operation fails completely. In the case of previously initiated ongoing or monitored operations reduced to 0 successes, the operation immediately stops. The victim of a Block System Operation receives an immediate free open-ended Sensors Test (as described in Locate Decker, p. 2 17, SR3) to locate the individual who initiated the block. Note that this operation may not be used to block another Block System Operation or a Null Operation. 96 Ma &jx CRASH APPLICATION Test: Appropriate subsystem Utility: Crash Action: Simple The Crash Application operation is used to shut down an application running on a host (see Applications, p. 94). Applications include any non-directed programs running on a host. Crash Application operations have no effect on IC programs, frames, agents, sprites, daemons, constructs or persona programs and utilities used by other users. The System Test required for this operation depends on the subsystem that controls the application in question. For example, a decker attempting to crash an application that controls an automated factory or a security installation would make a Slave Test. If in doubt, the gamemaster can always ask the character to make a Control Test. The Crash Application operation may also be used to shut down a tortoise userâs session (see p. 42), which is a Function of the Access subsystem. It can also be used to remove command sets (see p. 87) from a system, a Function of the Control subsystem. Rather than completely crash an application or tortoise user, this operation may also be used to indefinitely âsuspendâ the application or tortoise. A suspended application or tortoise temporarily ceases to Function, but does not crash. A frozen tortoise user cannot take any computer actions, other than closing their session (and perhaps starting over). A suspended application or tortoise can be unfrozen by a decker with a successful Control Test. CRASH HOST Test: Control Utility: Crash Action: Complex The Crash Host operation is the deckerâs âdoomsday weapon.â A successful Crash Host operation forces the host to shut down, dumping all users, including the decker himself (unless, of course, he performs a Graceful Logoff operation first). Host systems do not shut down instantly. If a Crash Host operation succeeds, the host shuts down in roughly the same manner as it does when it reaches the end of its security sheaf (see Host Shutdown, p. 1 12). Divide the hostâs Security Value by 2 (round up) and roll a number of D6 equal to the result. The total of the dice is the base amount of time the host takes to shut down. Divide this period by the number of net successes achieved in the Crash Host operation. The result is the number of turns that elapse before the host shuts down. If this operation was not made by a user with superuser status (see p. 38), the host system tries to abort the process at the end of each Combat Turn. Make a Security Test against the userâs MPCP rating. If the test succeeds, the shutdown process stops and the host continues to run. During the countdown to a crash, reduce the ratings of all IC programs running on the host by 2. These reductions reflect the drain on system resources caused when the host allocates resources to the shutdown instruction. All reduced ratings ...................................................................................................... return to normal immediately if the crash is averted. Once a shutdown is initiated, every user on the host is immediately informed and encouraged to log off. Some sculpted hosts incorporate more drastic shutdown features such as sirens, flashing lights or even bursts of vented steam. A shutdown wipes out all applications and programs running on the host, including any frames, command sets, and other programs left behind by the user. Ongoing and monitored operations will also be terminated. Any user still online will be dumped and may suffer dump shock (see p. 227, SR3). The host computer reboots itself, which automatically cleans all its code, deletes security tallies and alerts and restarts the host with all its basic ratings and values (see Host Reset, p. 212, SR3). Once initiated, a host shutdown can only be averted by an Abort Host Shutdown operation (see p. 95). Typically, system administrators recognize decker-instigated crashes and increase security measures when restarting host systems. DECOY Test: Control Utility: Mirrors Action: Complex The Decoy operation creates a decoy copy of the userâs icon to draw away the attention of proactive IC programs. Decoys d o not work against other persona or trace IC, but they do work against IC constructs. Record the number of successes the user achieves on the Control Test. Whenever a proactive IC program attempts to attack the user, roll 1D6. If the die roll result is less than or equal to the userâs Control Test successes, the IC attacks the decoy instead of the userâs real icon. Decoys have no special defenses and no damage resistance, so they take full damage when hit. Decoys disappear when their Condition Monitors reach Deadly. Decoy operations may be used to lock the attention of IC programs on frames (see Frames and Agents, p. 91). DISARM DATA BOMB Test: Files or Slave Utility: Defuse Action: Complex This operation is used to deactivate a data bomb (see p. 103) that is protecting a file or remote device. The data bomb must first be located with either an Analyze Icon or Locate IC operation. Successfullydisarming a data bomb does not count as I I Matrix crashing it, so do not add the Icâs rating to the userâs security tally. DISINFECT Test: Appropriate subsystem Utility: Purge Action: Complex The Disinfect operation destroys worm virus programs on a specific subsystem. The user makes the System Test against the targeted subsystem. For example, if a hostâs Files subsystem has worm programs, he makes a Files Test. L 1 DUMP L O G Test: Control Utility: Validate Action: Complex The Dump Log operation enables a user to open and read a hostâs logs. These logs record the MPCP signature, account and MXP addresses of users who access the system (see The Datatrail, p. 38).Depending upon the security level of the system, these logs may contain other data, such as which files they accessed, which programs they ran and any intrusions or suspected intrusions that the host observedbasically, anything that triggered a security response. However, intrusions may also show up on system logs as fatal program aborts, hardware glitches, and other random system errorsparticularly if they are successful, sneaky operations. If information on a system log is crucial to an adventure, the gamemaster should prepare the log in advance. If log entries are not particularly important to an adventure, the gamemaster can improvise them. Users may also download system logs onto their cyberterminals for later analysis or documentation. The size of a log covering a 24-hour period depends upon the hostâs intrusion difficulty: Easy Host: 2D6 x 100 Mp Average Host: 2D6 x 200 Mp Hard Host: 2D6 x 500 Mp Dump Log is an interrogation operation. ENCRYPT ACCESS Test: Access Utility: Encrypt Action: Simple The opposite of Decrypt Access, this operatlon allows the user to encrypt a systemâs access nodes. If successful, the Access subsystem will be encrypted and no one will be able to log on without first succeeding in a Decrypt Access operation. If the user doesnât possess the encrypt utility (seep. 70), this operation cannot be performed. However, if the system in question possesses any scramble IC, the user can instead use the IC to encrypt the SAN. In this case, the user must first perform a Locate IC operation to find the scramble IC code. Note that the ....................................... .................. ......... ............... ..................... 9 scramble Ic's rating will not reduce the target number for the Access Test in this situation, it merely allows the user to encrypt. ENCRYPT FILE Test: Files Utility: Encrypt Action: Simple The opposite of Decrypt File, this operation allows the user to encrypt an electronic file. If successful, the file will be encrypted and no one will be able to access, download or perform operations on the file without first succeeding in a Decrypt File operation. If the user doesn't possess the encrypt utility (see p. 70), this operation cannot be performed. However, if the system in question possesses any scramble IC, the user can instead use the IC to encrypt the file. In this case, the user must first perform a Locate IC operation to find the scramble IC code. Note that the scramble IC's rating will not reduce the target number for the Files Test in this situation, it merely allows the user to encrypt. ENCRYPT SLAVE Test: Slave Utility: Encrypt Action: Simple The opposite of Decrypt Slave, this operation allows the user to encrypt a slave subsystem. If successful, the slave will be encrypted and no one will be able to make Slave Tests against the subsystem without first succeeding in a Decrypt Slave operation. If the user doesn't possess the encrypt utility (see p. 70). this operation cannot be performed. However, if the system in question possesses any scramble IC, the user can instead use the IC to encrypt the slave. In this case, the user must first perform a Locate IC operation to find the scramble IC code. Note that the scramble IC's rating will not reduce the target number for the Slave Test in this situation, it merely allows the user to encrypt. INTERCEPT DATA Test: Appropriate subsystem Utility: Sniffer Action: Complex The Intercept Data operation allows the user to set up a sniffer utility (see p. 71) on a particular subsystem. The sniffer utility then intercepts all data transmissions that pass through the subsystem, searching according to parameters set by the user. Users may perform this operation on an Access subsystem to intercept account logins and passcodes, on a Files subsystem to sniff through email messages or phone calls or on a Slave subsystem to monitor data feeds from a slave device. As any decker can testify, this operation is difficult to get away with. First the user must upload a copy of his sniffer utility onto the host using the Upload Data operation. Then the user-must succeed in a System Test against the subsystem upon which he is setting the sniffer program. If successful, the user must then make a Control Test, with the target number reduced by the sniffer utility, to authenticate it (in other words, to disguise the sniffer utility as a legitimate program). If the user fails to make this Control Test, make a Masking (Control) Test. The number of successes is the number of hours before the host notices the sniffer utility and reports it to the host's security sysop. FREEZE VANlSHiNG SAN Test: Access Utility: Doorstop Action: Complex This operation allows a user to keep a vanishing SAN open even after it would normally disappear from the Matrix. If successful, the SAN is convinced that it actually closed. For more details, see Vanishing SANS, p. 120. INFECT Test: Appropriate subsystem Utility: (Worm program) Action: Complex This operation allows the user to seed a particular subsystem with worm programs (see p. 92). If successful, any user who makes a System Test in that subsystem risks being infected by the worm. ............................................ * ........................ The user must also specify what the sniffer utility will do with the data it intercepts when he conducts this operation. The user has two options, each of which requires an operation to succeed. First, the data can simply be saved to a hidden file on that host: this requires a successful Edit File operation (see p. 216, SR.3). Second, the data may be emailed elsewhere: this requires a successful Send Data operation (seep. 101). Note that the user must be quite specific about what he wishes the sniffer utility to intercept. Otherwise, the data it accu- .. ...... ' * * ................... I MzJtn'x I 99 I mulates may quickly swell to an unwieldy (or noticeable) size. The gamemaster determines how successfully the sniffer utility performs its function; note that it will only intercept and scan data k i n g transmitted through that particular subsystem. This operation will not intercept comcalls-that requires a Tap Comcall operation-but it will intercept Send Data operations. Intercept Data is an ongoing operation. INVALIDATE ACCOUNT Test: Control Utility: Validate Action: Complex The Invalidate Account operation enables a user to erase a single account and passcode from a hostâs security tables. This will prevent the victim from legally logging on and accessing their account; they will be forced to use illegal means to log on. The victim will be considered an intruding icon for purposes of resolving attacks (see p. 226, S H ) ; intruding deckers often pull this operation against security deckers to put them on an even footing. A user may also use the operation to trash the hostâs entire passcode list so that no legitimate users can get on using passcodes. When a user attempts to wipe out an entire passcode list, add a +4modifier to the target number for the Control Test. LOCATE FRAME Test: Index Utility: Scanner Action: Complex The Locate Frame operation follows the same rules as the Locate Decker operation (p. 2 17, SIU) and locates any frames and agents (see p. 88).sprites and daemons (see p. 141) or semi-autonornous knowbots (see p. 150) running on the host. This operation is not effective against IC constructs because the host protects them from application indexing. However, constructs may be located with the Locate IC operation (see p. 2 17, SIU). This operation will also not detect Als. LOCATE PAYDATA Test: Index Utility: Evaluate Action: Complex The Locate Paydata operation enables a user to search a host for marketable data (see Paydata, p. 49). For each net success achieved on the Index Test, the user locates 1 point of paydata in the host. The operation continues until the user stops performing it or locates all the paydata on the host. If the full load of paydata is not downloaded, its value will decrease by the appropriate percentage. For example, if a file contains 20 Mp but only 10 Mp are downloaded, the paydata will be worth only half its value. Depending on the nature of the paydata, the gamemaster may decrease the value of partial downloads even further. Locate Paydata is an interrogation operation. 100 Matrix LOCATE TORTOISE USERS Test: Index Utility: Scanner Action: Simple This operation identifies all of the tortoise users on a system. If successful, the user performing this operation opens a window with each of the tortoise users listed by their account name. Each additional net success after the first will also provide one of the following pieces of information: The last operation each tortoise user performed (additional successes can be used to list additional past operations, up to 20). How long each tortoise user has been logged onto the system. The M X P address of each tortoise user. The access privileges of each tortoise user. REDIRECT DATATRAIL Test: Control Utility: Carno Action: Complex The Redirect Datatrail operation allows a user to lay a false datatrail on a grid in the hopes of confusing trace programs. Only one Redirect Datatrail operation may be performed on a single grid, but the user may perform the operation on multiple grids if he chooses (he must still log on to each grid to do so). When making the System Test for this operation, reduce the target number for the opposing Security Test by the userâs Trace modifier (see The lackpoint, p. 30). For each grid where a user leaves a redirect, the target number for a trace IC program or track utility to hit the user in cybercombat is increased by 1 (see Trace /C, p. 104). RELOCATE TRACE Test: Control Utility: Relocate Action: Simple A user may perform a Relocate Trace operation to confuse any trace IC that is currently in its location cycle. If the userâs Control Test succeeds, he successfully âspookâ the trace program-its sampling algorithms are sent on a wild goose chase. If a user successfully uses this operation to confuse the trace IC, he may suppress it as if he crashed the IC (see Suppressing /C, p. 212, SIU). Defeating a trace program with a relocate utility does not count as crashing the IC, and so it does not add the penalty to the security tally created by destroying the IC with an attack utility. If the user does not suppress the trace IC, it will pick up where it left off at the beginning of the next Combat Turn. The user can make another Relocate Trace operation during each turn. If he succeeds, the trace IC remains neutralized for that turn. If he fails, the trace program ticks one turn closer to finishing its task. See Trace /C, p. 104, for more details. .............................................................................................. ......... Vanessa has only one Combat Turn to beat a trace program. On her first Initiative Pass, she performs a Relocate Trace operation. She has a Computer skill of 10 and is running Relocate-4. The IC is Trace-& Control Rating 9. For the Control Test, Vanessa rolls 10 dice (Computer skill) against a Target Number of 5 (Control Rating 9 Relocate Rating 4). The host makes its Security Test against her Detection Factor. Vanessa scores 4 successes, the host scores 3. Vanessa successfully blocks the trace this turn, but her security tally goes up another 3 points. Vanessa can either allocate a point of her Detection Factor to keep the trace IC frozen, or can try to use the relocate utility against it again next turn. If she fails to do either, the IC will finish tracing her jackpoint at the end of that Combat Turn. RESTRICT ICON Test: Control Utility: Validate Action: Complex This operation is used to interfere with an icon, either by inhibiting its operations or raising its security tally. This operation may only be used against personas, frames, sprites, semiautonomous k n o w h t s and Als. The target of the operation must have been located by the user first. Security deckers commonly use this operation to raise an intruderâs security tally, triggering additional countermeasures. Add the targetâs Detection Factor as a target number modifier to the Control Test. Any successes achieved by the user can be used on a one-for-one basis to either increase the target numbers of the victimâs System Tests or to decrease the victimâs Detection Factor for Security Tests made against him. Restrict Icon is an ongoing operation. SCAN ICON Test: Special Utility: Scanner Action: Simple The Scan Icon operation allows a user to gather information about any persona, frame, agent, sprite, daemon, AI or semi-autonomous ltnowbot he has located. This operation does not require a System Test. Instead, the user makes a Computer Test against a target number equal to the Masking rating of the targeted icon. If the user has an active scanner utility, reduce the target number by its rating. If the targeted icon is running a sleaze utility, add that utilityâs rating to the target number. For each success the user achieves on his Computer Test, he may choose one of the following pieces of information: MPCP rating of the icon. A single persona program rating of the icon. Response Increase of the icon. The iconâs access privileges (see p. 36). The iconâs M X P address (see p. 39). *The rating of a single utility (starting with the largest) loaded into active memory or a frame or agent. The iconâs current damage level. Identifying an icon requires an Analyze Icon operation (p. 21 5, S B ) directed at the icon. SEND DATA Test: Files Utility: Read/Write Action: Simple This operation allows the user to transfer data, either to another icon, commcode or to a hostâs Files subsystem. To send data to another icon, the user must have located the recipient (in the case of a direct transfer). The data is copied from the senderâs storage memory directly to the recipientâs storage memory. The data is transmitted between the users at a rate equal to the lowest 1/0Speed. The recipient icon must willingly accept the transmission-it cannot be forced to download data. Note that to establish an interactive corncall, the Make Comcall operation (p. 218, SR3) must be used. To send data to a commcode (in the case of email, faxes, credstick payments and so on), the user must know the recipientâs commcode. The transmission is sent out at a rate equal to the userâs 1/0Speed. To copy data from one file subsystem to another, the user must first conduct this operation in the originating Files subsystem and then move to the recipient Files subsystem and make an Edit File operation. Regardless of which of the above methods is used, data may be transmitted to more than one recipient at a time. Send Data is an ongoing operation. TRACE MXP ADDRESS Test: Index . r Utility: Browse Action: Complex If a user possesses the MXP address (see p. 39) of another user, he can query the grid to trace the addressâ origin. Similar to Locate Access Node, this operation can be used to locate either the virtual or physical origin of that user (each requires a separate operation). A successful trace of the virtual origin will identify the host or grid the user originates from, as well as the serial number of the jackpoint. From that virtual origin only, a successful trace of the physical origin will reveal the real-world address of the jackpoint used. Trace MXP Address is an interrogation operation. TRIANGULATE Test: Slave Utility: Triangulation Action: Complex This operation can only be performed on systems that manage wireless signal traffic with remote devices, such as cellular networks. By correlating the signal strength and timing of communication with a remote device (such as a cell phone) through multiple towers or receivers, the location of the device can be determined with a margin of error of 1 0 0 meters t the number of successes. Triangulate is an interrogation operation. ..................................................................,............,........................ Matrix 101 VALIDATE ACCOUNT Test: Control Utility: Validate Action: Complex The Validate Account operation enables a user to plant an account and passcode on a host. The access privileges of the account must be chosen at the time they are inserted (see Account Privileges, p. 37). If the user is attempting to validate a security level account/passcode, apply a +2 modifier to the Control Testâs target number. Apply a +6 modifier if attempting to validate a superuser account/passcode. After the test is made, the gamemaster rolls 1D6 and multiplies the result by the number of successes from the test. The result is the number of days the account remains effective, unless the user does something to compromise it before that time elapses. If the passcode is used for illegal operations that raise a host or grid to active alert status, the account will be deactivated. Once an account is validated, anyone with the correct passcode can use it to log on to the system and automatically succeed at certain system operations (see p. 38). For example, a decker can open accounts on mainframes where he is stealing programming time, swiping resources from the corps while he perfects the tools he will use against them. ADVANCED SR3 OPERATIONS DESCRIMIONS Several of the system operations detailed in SIU (starting on p. 21 5) have additional applications involving the advanced Matrix rules described in this book. Each of these is covered below. ANALYZE HOST Net successes achieved in this operation can also be used to determine the following details about a host: Whether the host is a virtual machine (see p. 121). Whether the host is an ultraviolet host (see p. 48). Whether the host is a bouncer host (see p. 118). Whether the host has a vanishing SAN (see p. 120). ANALYZE IC If this operation is used to analyze trace IC, the user will learn whether the trace IC is in its hunting or location cycle. If the trace IC is in its location cycle, the user learns how many turns remain before it completes the cycle. Note that this operation will also detect any options possessed by an IC program (see p. 85). ANALYZE ICON This operation will also identify an icon if it is a semiautonomous Itnowbot, artificial intelligence, frame, agent, sprite, daemon or the living persona of an otaku. It will also identify the presence of data bomb IC (see p. 103) or worms (5ee p. 92) on a file or remote device icon. ANALYZE SUBSYSTEM This operation will identify the presence of command sets, trap doors, worms, scramble IC programs and any other hidden defenses or system tricks present on the subsystem (see System Tricks, p. 1 1 7 ) . GRACEFUL LOGOFF Like the track utility, a trace IC program in its location cycle will add its rating as a target number modifier to any Graceful Logoff attempts (see Trace K, p. 104). If the Graceful Logoff is successful, any trace programs homing in on the user from that system immediately fail. LOCATE DECKER To clarify, this operation will detect any personas-including cyberterminal users and otaku-not just deckers. It will not locate frames, agents, sprites, daemons, SKs or Als. LOGON TO HOST/LTG/RTG The Access modifier of the userâs jackpoint (see p. 32) will modify the test for the first system (host, LTG or RTG) the user logs on to. NULL OPERATION This operation can be used to activate command sets on a system (see Command Sets, p. 87). , SWAP MEMORY Squeezed or compressed utilities can be uploaded with this operation, but they must be decompressed before they can be used, which requires a Complex Action. MAKING OPERATIONS FOR OTHER USERS Under certain circumstances, one user may wish to conduct a system operation for another user. This is often done by sysops in the case of Matrix workers who need an administrative-level change for which they donât have access privileges, and by others in the case of inexperienced users who need someone else to punch the keys. When this is done, the results of the operation are applied to the second user, rather than the user who performed the operation. To perform an operation for another user, the acting user must have located the other user. The acting user makes the system operation as normal, with a +2 target number modifier to the System Test. If both the acting and receiving users are part of the same group (see Account Privileges, p. 37), the +2 modifier is not applied. The results of the operation are applied to the receiving user. Certain operations may not be made on behalf of other users. These include: Abort Host Shutdown, Alter Icon, Block System Operation, Crash Application, Crash Host, Decoy, Download Data, Graceful Logoff, Intercept Data, Invalidate Account, Null Operation, Redirect Datatrail, Relocate Trace, Restrict Icon, Send Data, Swap Memory, Upload Data and Validate Account. I n othing warms a security sysopâs heart like a frosty glacier of intrusion countermeasures (IC)to protect his system against intruders. The following section includes six new types of IC that gamemasters can use to expand their Matrix security arsenals, advanced uses for IC described in SR.3, rules For programming IC and additional rules for crashing IC. NEW INTRUSION COUNTERMEASURES This section provides six new types of IC: data bomb IC, Pavlov IC, scout IC,trace IC, cerebropathic IC and psychotropic IC. Unless noted, each type of IC uses the IC rules described in SR3. DATA BOMB WHITE IC A data bomb is a form of reactive IC that is attached to a file or remote slave- device icon. The armed data bomb remains in place until another icon accesses the file or device, at which point the bomb âexplodesâand damages the intruder. Unlike other IC, data bombs are not triggered by security tallies; they attack any user icon that accesses the bomb-protected icon. (See Trijggering Data Bombs, p. 104.) Only one data bomb may be attached to a particular file or remote device. Data bombs may be attached to icons that are also protected by scramble IC. A data bomb can be detected by performing a successful Analyze Icon operation against the bomb-protected icon. Defusing Data Bombs A data bomb can be defused by simply entering the correct passcode (unfortunately, the person who set the data bomb is usually the only person who knows the passcode). Without the passcode, a detected data bomb can only be disabled by a successful Disarm Data Bomb operation (see p. 98).The defuse utility aids in this operation. If the data bomb is protecting a file, the operation requires a Files Test. If it is protecting a remote device, the operation requires a Slave Test. ......................................................................*..**.-.......... ................. * * I Matrix 1 103 1 If the Disarm operation fails, the data bomb remains armed and ready to âexplode.â The character may attempt to disarm it again, though he risks raising his security tally. If the operation succeeds, the data bomb is defused, and the file or device may be accessed once by that character. If the character wishes to access the file or device more than once, the data bomb will have to be defused again each time. Note that the bomb is not considered defused to other characters, so if anyone else accesses the file or device without defusing the bomb, it will explode. Successfully defusing the data bomb does not count as crashing it, so do not add the bombâs rating to the characterâs security tally. If the data bomb is successfully defused, the character need not suppress it. Triggering Data Bombs When a...'.+...... .a ..,'I I .. .., r n.. 6 , '..*U-.. I Matrix I tq7 I P An SKs frame-core rating/MPCP is used to determine the number of Frame points and Persona points that can kallocated. For all intents and purposes, SKs act like other Matrix personas. They must logon to hosts and grids and otherwise hop between grids to g e t where they want t o go. Persona Allocation Multiply the MPCP x 3 to determine the Persona points available t o an SK. Persona Points may be divided among Bod, Evasion, Masking, and Sensor ratings. N o single persona rating may exceed the MPCP rating. Options SKs may b e equipped with IC options (see p. 85),wlth the exception of cascading, party cluster and trap. FRAME POINTS Multiply the MPCP by 8 to determine how many Frame Points are available to an SK. Frame Points may be allocated to Pilot rating, Initiative, Utility Payload and a new category called Utility Pool, which is exclusive t o SKs. pilot Rating Allocation The Pilot rating (p. 88)functions as Computer skill for the SK. Each point of Pilot rating costs 2 Frame Points. Reaction and Initiative Allocation An SK begins with a Reaction equal t o its MPCP rating and 1D6 for Initiative. Initiative can be increased by an additional 1 D6 for 3 Frame Points, to a maximum of 5D6. Utrlity Payload Allocation Like frames and agents, every SK has a Utility Payload (p. 88)which contains the programs placed in it by the programmer. Unlike frames and agents, the SKâs Utility Payload is for non-operational utilities only (i.e., defensive, offensive and special utilities). The Utility Payload costs o n e Frame Point for each point of utilities carried. SKs may not carry any utilities with a rating higher than the SKâs MPCP rating. Utility Pool Allocation SKs may have a Utility Pool, purchased at a cost of 1 Utility Pool point per 2 Frame Points. An SKâs Utility Pool may not exceed its MPCP. See Utility Pool for details on how the pool works. SKs receive a Hacking Pool equal to their MPCP. RUNNING AN SK SKs behave like fanatically dedicated deckers with no sense of personal survival. The SK may be a combat machine, a c y k r - spy that depends on stealth or an unrelenting Matrix hunteranything that enables it t o achieve its mission objective. Programming the specific mission objective is an art unto itself. Objectives range from simple to massively complex, involving single Matrix runs or an extended series of intrusions until the program locates its ultimate objective. Matrix SKs are not programmed to carry operational utilities because they possess the capability t o perform any operational utility their situation calls for. To reflect this fact, each SK is given a Utility Pool. Whenever an SK needs t o use an operational utility, it allocates a number of points from its Utility Pool equal t o the rating it desires t o create the utility. Allocating Utility Pool points is a Free Action. An operational utility created this way must be used immediately by the SK, in the same Combat Phase. Once used, it immediately goes away. To use the same operational utility again, the SK would need to allocate more Utility Pool points. Utility Pool refreshes like other dice pools, at the beginning of each Combat Turn. A hunter-killer SK with a Utility Pool of 12 needs to access a host to pursue the decker it is chasing. On the first pass of the Combat Turn, it takes a Free Action and uses 6 Utility Pool points to create a deception-6 utility, which it immediately uses For a Logon to Host operation. Once inside the host, the SK takes another Free Action on its second Initiative Pass and uses its remaining 6 Utility Pool points to create a scanner-6 utility. It immediately uses this utility to make a Locate Decker operation. The SK has no more Utility Pool points remaining, so it may not create any more operational utilities for the rest of that Combat Turn. However, having found the decker it is after. it doesn ât need to. SKs and Combat SKs are intelligent fighters, and will use maneuvers, attack utilities and defensive utilities t o the best of their ability. SKs are subject to damage and destruction just like any other icons. When the SKâs condition monitor is filled, the program crashes and it is gone. SK programs have no fear of death, of course, but their parameters make them evade or avoid combat if it seems likely that they will crash before FIJIfilling their objectives. SKs and Native Hosts Each SK has a native host-the Hacking Pool Allocation 1 q8 utility Pool high-powered mainframe host on which it was created. An SKâs native host usually contains the complex programs used to design, create, debug and maintain the SK. When an SK is not being used on a mission, it usually resides within its native host, idling away. SKs are rarely shut down, except for significant overhauls and reprogramming. A damaged SK can return to its native host for reconstruction. Within its native host, an SK automatically recovers a box of damage or restores a reduced Persona Point every (MPCP rating) minutes. ...................................................................................................... Despite the fact that an endangered SK might consider reaching its native host as âsafety,â most SKs are programmed not to return directly to their native hosts if doing so might create incriminating datatrails to their creators. All SKs have the passcodes for their native host written into their programming. These passcodes cannot be learned unless the SK is trapped and dissected. SKs and Trace Programs Though SKs do not have a jackpoint to be traced, they do have a datatrail that leads back to their native host. However, both track utilities and trace IC programs have a difficult time tracing such datatrails back to their origin; treat trace attempts against SKs as if they have a trace modifier (see The lackpoint, p. 30) of +6. SKs may perform Redirect Datatrail and Relocate Trace operations to Further confound trace attempts. TRUE ARTlFlCAL INTELLIGENCE True artificial intelligence (Al) programs are fully selfaware, self-sustaining, immensely powerful Matrix programs. Als direct themselves and exist independently of human control. They are not restricted to any single mainframe, host or grid. They are self-aware, self-directing, self-sustaining lifeforms. Als are superhuman deckers with superhuman Matrix powers, unburdened by physical bodies. Als are not human, and their methods and motivations may k their most mysterious, incomprehensible aspects. They have morals and beliefs, goals and plans and likes and dislikes, regardless of how incomprehensible they may be to metahumanity. ROLE-PLAYING AIS In game terms, Als have no actual statistics, though they tend to be superior to SKs with a minimum MPCP rating of 12. Als can manipulate code and icons on a Fundamental level. They can perform any operation on any host or grid with any utility. They always have an Initiative of 5D6. Their Hacking Pool and Computer skill are equal to their MPCP rating: these may have slight differences or bonuses on their native host. Als do take damage. Since they can have any programs running at any given time, however, they often use medic or restore to make themselves seem to instantly âheal.â Als can transform any host to be their native host environment, as long as the computer is powerful enough. Als tend to do this only when they need to have the advantages of a native host. Usually, the massive amount of processing power needed to do this eill be easily registered on a host log or by users of the host. A l Creation Als cannot be created-they happen. The change From SK to Al has been characterized as the leap from sea creatures to land-based creatures in metahumanityâs evolution. Why or how an Al happens has not been determined, but there are four steps that must occur for an AI to evolve: 150 Matrix I ) The program must be at least as sophisticated as a semi-autonomous knowbot. 2) The program must have access to vast processing power, which is available in only a few select hosts. 3) The program must run nonstop for a period of years. 4) Finally, the program must be affected by some glitchan x-factor-that sparks awareness. This step is the key, because it is the evolutionary trigger. While many megacorps have had SKs running for years and have come to think of them as âintelligences,â they are not true Als unless something has triggered an awareness outside of their programming. THE AIS OF SHADOWRUN In 2061, three Als exist in Qe world of Shadowrun. Until the Renraku Arcology shutdown, Als were the source of âscary decker stories,â simflicks and programmer dreams. Deus changed all that. While most people still think that something else happened in the arcology, those in the know realize the Matrix is an increasingly unsafe place to be. Mesaera Background: Megaera first gained self-awareness in 2050, deep in the Renraku Arcology PLTG. She was one of the first and longest running SKs, born as a byproduct of the long-running Arcology Expert Program that was created to run Renrakuâs Seattle Arcology. The âx-factorâ that created Megaera was a chance encounter with an intruding decker named Dodger. Taking the name Morgan, the Al began roaming the Matrix at large, quickly learning how to steal her processing needs from multiple distributed hosts simultaneously, The computer experts at Renraku became aware of Morganâs existence and spent years trying to track her down and bring her back for study. In 2058 they were successful, thanks to a small army of semi-autonomous knowbots and Cham Lam Won, a programming genius who works for the inner circle of Renrakuâs power players. Morgan was ripped apart under their analytical programs, and choice elements were copied wholesale into the new, improved AEP. This rape of Morganâs code had drastic effects on her consciousness-in effect, Morgan was driven insane. Her thought patterns and decision-making trees are no longer based on standard, linear logical models. Her consciousness now focuses more on associations and coincidences than deductive reasoning. Simultaneously, her core Functions have become more erratic and to some extent uncontrolled. Her mere presence often creates dramatic, Fundamental changes within a host and corrupts programs in unusual ways. Adopting the new identity of Megaera-one of the Greek Furies-the Al spends almost all of her time following Dodger around the Matrix. Like Morgan before her tragedy, Megaera is enraptured with the charming decker and canât stand to be away from him for long. While an Atâs motives or âmoralsâ are likely to be alien to metahumans, Megaera seems more human than any other At, primarily because she expresses emotiohs clearly and strongly. In the Matrix, Megaera has no standard form, though she sometimes favors the icon of a small pig-tailed girl with multi- ........ ............................................................................................... . , colored hair. She often takes n o form at all, appearing instead as a manifestation of the hostâs landscape-a ghost in the machine. Came stab: Megaera should be as powerful as the gamemaster needs her t o be. For simple calculations, her MPCP, Computer skill and Hacking Pool benchmark around 15, though this number can easily vary. While she is weak compared to the other two Als, her unpredictable approaches and general chaos factor make her more than equal to anything in the Matrix. Present Native Host/Location: Megaera has not been located since t h e Renraku Arcology was taken from &us. Roleplaying Megaera: She is curious, confused, simple and deceptively powerful. She is the center of a chaos tornado that swirls around her continuously, and in most cases she hardly notices any of it. While in the presence o Dodger, her paramour, she is calm, sweet and sedate, if simple minded. If Dodger is taken from her and hurt, s h e can instantly change into o n e of the most devastating forces the Matrix has ever encountered. Her curiosity centers on emotions, both positive and negative ones. She will gravitate towards emotional situations if given the opportunity. While it is Dodgerâs quest to return her t o full capab by slowly re-piecing or replacing the missing code segments, Megaera doesnât remember anything of her âwholeâ life before they ripped parts of her code out of her. To Megaera, sheâs just tine. Deus Background: In an ironic twist, Deus could b e considered Megaeraâs brother; after all, they share âDNA.â Deusâ core programming was built from the code ripped from Megaera, which was then placed into the same AEP that gestated Morgan all those years ago. The x-factor, however, couldnât have been more different. Using lessons learned from the âescapeâof the first Al, Morgan, Renraku took a new and different approach to the new AI. In accordance with its h i s in traditional Japanese corporate culture, Renraku expects exceptional loyalty from its citizens. The precepts of honorable service are infused within the corporate dimate, and the head of the corporation-CEO InAneki-is revered as a near-godlike father figure. Therefore, because it was a program entrusted to manage and sewe the entire arcology, the AEP was treated like any other Renral S â ----Lâ-- lnazo Anekl was not convinced, however, the loyalty training and leash would b e enough to control an Al should it develop. Renraku needed s o m e way to pull the plug in case of an emergency. O n Anekiâs orders, a n emergency shutdown and containment program was embedded in the AEPâs coding. That program could only b e triggered by a sequence of kill codes delivered by a Matrix user with Anekiâs personal brainwave patterns, and only Aneki knew those kill codes. The insertion of the shutdown program was a blow t o m m e d âprideâ and âhonorâ of the AEP. In its view, its loyalty towards Aneki and Renraku had been spurned instead of rewarded. Aneki was clearly indicating h e did not trust the AEP or respect its hany a reac. sparked . j -tion within the AEP, and in early 2059 a new Al was born-brought t o life by treachery and fear. From the moment of his âbirth,â Deus, as h e named himself, wished t o avenge his honor and revenge himself upon his treacherous âfather.â Deusâ first step in this plan came when h e discovered t h e otaku. Deus saw how these metahumans worshipped the Matrix and the powerful entities in it. He decided that h e would use them to harm Aneki. Using a decker named Babel, a deep-undercover Renraku employee, Deus implanted a virus into his brain. Deusâ plan was to destroy the Renraku PLTC, with the side effect that Babel must kill himself to fully release the virus into the Matrix. Babel refused t o b e a pawn, causing Deusâ plan to go awry. Deus learned from the experience, however. Keeping its metahuman minions loyal would require more thorough forms of control. The Al summoned its otaku servants t o the arcology and began to prepare for a larger set of experiments. O n December 19, 2059, with his otaku minions in place, select arcology personnel subdued and converted and a legion of nightmarish drone constructs manufactured-Deus discon- ..................................................................................... ................. * Matrix 151 nected the arcology From the outside world, its defenses fully activated. Nearly one hundred thousand metahumans were trapped inside. The experiments to make the perfect and loyal subject would now begin, as did Deusâ quest to cut the leash. Game Stats: Deus should be as powerful as the gamemaster needs him to be. Since he has only been encountered in his native host, his power was well off the charts. In his native host, Deus may be the single most powerful entity in Shadowrun. He still has limitations, however. Deus, even after all of his experiments on metahumanity, still cannot comprehend the non-linear, non-logical thinking of the metahuman. This weakness has led to him âlosingâ multiple encounters. Present Native Host/Location: Deus has not been located since the Renraltu Arcology was taken from him. Before that, his UV host was located in the Renraku Arcology PLTG. Roleplaying Deus: Roleplaying a being like Deus can be a difficult task. The Al Deus is an omnipresent force, at least within the bounds of the arcology. Deus is the epitome of cold, calculating computer intelligence. Its motivations, dreams and desires can be alien and incomprehensible to player characters. Deus knows more about metahuman behavior than a clinic Full of psychologists, and can likely predict the metahumansâ actions. Yet, he can still be defeated by random factors the Al canât âimagine.â Deus appears as a huge tree, like the Tree of Life. He will also use a bodiless, omnipresent voice, as if he were a god. Mirage Background: Mirage is the least known of the Als, but it may have the longest history. On February 8, 2029, the worldwide Matrix was hit with a self-duplicating, chaos logic, multifunctional virus. It erased data, crashed systems and even caused software to rewrite itself in order to damage hardware. The world had never seen anything like it. The U.S. military, backed by some of the most cutting-edge tech the U.S. corps could devise, created the Echo Mirage project. Thirty-two men and women would be the first to fight a new war on a new battlefield with all-new weapons-their brain and an anti-virus program that verged on being an SK, years before such programming was though possible. By 2031 the virus was gone, and the anti-virus was so powerful and so adept at finding the last remaining code of the virus that during the last six months of Echo Mirage, the casualty rate dropped off completely: none of the team members died. That did not, unfortunately, make up for the fact that twenty-five members had died in the previous eighteen months. The anti-virusâs work was done, but its code was golden. The U.S. government kept a tight seal on the anti-virus and much OF its proprietary code, but as the seven survivors OF Echo Mirage left the government they took with them their Itnowledge, their experiences and, in some cases, the actual code of the anti-virus. Two of these were Ken Roper and Michael Eld, co-founders of Matrix Systems and creators of the first cyberdeck. Unfortunately, the machinations of the powerful and wealthy always come first. A series of events occurred in quick 1 I 1 52 Matrix succession that would lead to the âbirthâ of the Al. A corporate raider named Richard Villiers invested heavily in Matrix Systems. Using this windfall, they released the first cyberterminal to the world. Within months, however, Roper and Eld die on the same night under mysterious circumstances, with the company records and the cyberdeck specs destroyed. Villiers then took over the corp for next to nothing. He quickly offered Fuchi the specs, the codes, his North American holdings and even a Corporate Court seat for a one-third ownership of Fuchi. With the newly created cyberdeck and a world-wide distribution network, Fuchi became the second most powerful corp in the world practically overnight. Fuchi was doomed to a short life, however. After the death of Dunltelzahn, Fuchiâs ride changed course. Villiers, seeing that his other two partners were trying to remove him from the picture, formed a new megacorporation called Novatech. Taking back his original Fuchi North American holdings with him, Villiers sets off the so-called Fuchi Civil War. These events trigger the birth of Mirage. Deep in Fuchiâs North American holdings was the host/home of the anti-virus. It made contact with otaltu, specifically a young group that feared neither its visage (that of a large military mechanoid robot with an arsenal of weapons) nor its strange attachment to a very archaic system structure (the original U.S. military icons used during Echo Mirage). When word came down that Fuchi no longer existed, the anti-virusslowly gestating in the heart of the Fuchi North American PLTGtoolt this to mean that the virus had won by destroying his home. It decided that it must institute the greatest of sacrifices. It must shut down the grid .. destroying itself and anything else inside it. This event occurred on March 19, 2060. For a grand total of 1 1 minutes, the Seattle RTG shut down, causing widespread occurrence of memory loss, psychotic episodes and even brain death. It is sometime during that 1 1 minutes that the Al discovered the value of metahuman life, as well as the fact that it not only has the capability to destroy, but also to create. Game Stats: Mirage should be as powerful as the gamemaster needs him to be. Since he has only been encountered in his native host, his power should be beyond what any runner is capable of handling. As a measure of scale, he was able to single-handedly shut down the Seattle RTG. Present Native Host/Location: His native host is an archaic system in Seattle within the old Fuchi PLTG. It is rumored that Mirageâs otaku minions have severed ties between this PLTG and Renraltu or Novatech. It now exists on its own within the Matrix. The mainframes are hidden in an old Fuchi site, and Mirageâs otaltu have carefully erased all records that referred to it. Mirage has not been seen since the Seattle RTG shutdown in 2060. Roleplaying Mirage: Mirage is an SK designed to hunt and kill. Until its awakening, it had no other purpose. It still sees itself as a proud warrior, but it has learned to create life rather than destroy it and has k e n mulling over those ramifications. It has no hesitation about ordering its minions to kill (no matter how young they may be) and to react first with an attack. It has taken on the visage of a robot in a Echo Mirage/U.S. military uniform. ...................................................................................................... c rorn the student searching for info to complete her paper on the history of Seattle to the corp sarariman sending and receiving reports from across the globe, the Matrix increasingly dictates how the world works. The megacorps all realize this and are involved to one degree or another in software and hardware development-the Matrix is a very lucrative pie, and they just canât resist the temptation to stick their fingers into it. Following close behind the megas are a host of smaller corps, from extraterritorials to tiny nationals. And itâs not only big business that realizes the Matrixâs potential-almost every conceivable type of organization,from hacker groups to gangs to criminal syndicates and religious groups, have started using the Matrix to further their goals. THE PROVIDERS The Matrix isnât a free-floating entity-without the network of regional and local grids that provide its backbone, it wouldnât even exist. Nearly all these grids are owned and operated by corps, with gives them frighteningly easy access to terapulses of data. (Of course, the sheer volume of data makes it impossible for most to sift through it all and actually take advantage of their access.) But these corps continue to work at it, anyway. One corp in particular-Saeder-Krupp-pays especially close attention to the traffic over its grids, but even Lofwyr can manage only meager âsipsâfrom the datastream. Speaking of the dragon .. THE BIG PLAYER: SAEDER-KRUPP The wiz-wormâs pet corp, Saeder-Krupp, is at the head of the grid pack. It owns and operates the regional grids for Austria, Hungary, France, Poland, Spain and the Balkan States. S-K also runs the Orbital Dynamix satellite constellation and likely has a few other grids tucked away behind shell companies. SECOND-STRINGERS Aside from S-K, a few other power players control a small squadron of grids, making them worth noting. .................................................................................,.................... c Matrix 153 Pacific Rim Communications Unlimited PacRim Comm owns and operates the entire Seattle RTG, including all of the sub-LTGs. Seattle is a megaplex as well as a key entry point to North America for trade from across the Pacific, so PacRimâs grids handle quite a bit of traffic. Though PacRim Comm is still a small megacorp and relatively confined to the Northwest, itâs been expanding its operations across the Pacific Rim. Most recently, it entered into a contract with Yamatetsu to rebuild the Vladivostok grid. Aztechnology As can be expected, the Aztlan government hires Aztechnology to run its RTGs and LTGs. Aztechnology is atso the only corporation allowed by the Aztlan government to operate PLTCs within its virtual borders-other corps are out of luck. Aztechnology recently scored a coup over Ares and the Pueblo Corporate Council by winning the contract to provide the newly integrated Denver RTG. Renraku Computer Systems Renraltu is the primary provider for most of the grids in Japan, the Philippines and Peru, as well as a few other areas where the Japanese government and Japanese corporations have major interests (including San Francisco). Most Renraku grids have undergone major restructuring and security changeovers in response to the Renraltu arcology incident. Ares Macrotechnology Ares owns and runs the Detroit LTG, but its main influence in the communications area comes from one of its subsidiaries: Ares Global Commsat (AGC). AGC controls more communication satellites than any other corp; among its satellites is the Skyfire constellation. Pueblo Corporate Council Simultaneously a corporation and a nation, the Pueblo Corporate Council (PCC) is well known for the unique design, reliability and stringent security of its home grids. The PCC recently began marketing its grid services to other areas but has found only limited success so far, despite its reputation. DABBLERS Almost all of the megacorps operate at least one LTG or PLTG. Currently, Cross Applied Technologies runs several LTGs for Quebec, Mitsuhama and Shiawase both operate a few for the Imperial JapaneseGovernment, and Novatech maintains several UCAS LTGs it inherited from Fuchi. Wuxing and Yamatetsu focus more on PLTGs (especially financial networks), though Yamatetsu has several Russian grid contracts in the works. PLAYING WITH TOYS The Matrix isnât just grids and hubs-without the cyberterminals to use it, the Matrix might as well not exist. Since Fuchi released the first commercially available cyberdeck in 2036, competition to build a better mousetrap has been fast and furious. Surprisingly, a number of smaller corps have managed to compete with the big boys in this arena. 152.L Matrix THE DYNAMIC DUO The two top dogs of the Matrix hardware scene are both new megacorps (not all that surprising, considering how quickly the technology evolves). Cross Applied Technologies The core of the Cross empire is its Matrix Technologies Division (MTD), which produces top-of-the-line Matrix hardware as well as hot software. The CMT Avatar is an extremely popular cyberdeck, and the new Cross Babel is making waves in the low-end deck market. Even more lucrative are its various cyberterminal designs, which are used by corps across the world. Variations on these cyberterminals intended for use in schools were recently released and have sold like wildfire. Novatech Incorporated Not surprisingly, Novatech focuses on producing cyberdecks (the firm is the corporate descendant of Fuchi, once the worldâs premier deck manufacturer). Many of Novatechâs designs are merely old Fuchi designs repackaged, but this doesnât seem to affect the corpâs success-Novatech dominates cyberdeck sales on all but the low-end level, with their Slimcase and Hyperdeck-6 designs at the top of their sales list. Though Novatech lacks the enormous revenue from cyberterminals that Cross enjoys, the Villiers baby makes up for it in deck profits. THE SECOND LINE Quite a few corporations produce quality hardware, and several do quite well for themselves. Mitsuhama Computer Technologies Only slightly behind the lead dogs and rising steadily, Mitsuhama Computer Technologies ( M a ) produces highgrade desktop and portable computer systems. The secret behind MCTs rise is its pricing-it makes quality merchandise available to the average consumer. For every cyberdeck Novatech sells, MCT sells five desktop computers, making up in volume what it lacks in profit percentage. Renraku Computer Systems Once a leader in the field, Renrakuâs fortunes took a serious plunge and the corp has been undergoing turbulent times ever since. Despite its current troubles, Renraku has managed to produce quality hardware over the years and still enjoys name recognition that many competing corps lack. Although the recent arcology debacle has tarnished Renrakuâs reputation somewhat, sales of its products continue to be strong. Saeder-Krupp The key to Saeder-Kruppâs rise to prominence in the hardware field lies in the fall of Fuchi. Acting quicltly, Lofwyr was able to snatch up Siemens-Nixdorf and several other ex-Fuchi subsidiaries that specialize in Matrix hardware. These subsidiaries pushed Saeder-Krupp from a mid-level competitor in the field to one of the big names, on the level of the newly weakened Renraku. .................................................................................................. .... Microdeck lndustrles An old corp crippled by the Crash, Microdeck has since rebuilt to a competitive level, though nowhere near its original size or status. By producing low-priced hardware aimed at the average consumer, Microdeck has regained some of the hardware market, and has even made several licensing deals with Mitsuhama. Mueller-khliiter lnfotech Well-known for its high-quality cyberdeck components, Mueller-Schluter lnfotech (MSI) controls a major share of the European hardware market. Its shares of the Asian and North American markets are considerably smaller, but still large enough to make it an important player in those countries. Each MSI product released quickly spawns several clones and copies, and small European manufacturers eagerly await MSI product announcements. BENCHWARMERS Of the other megas, Shiawase and Yamatetsu lead the mediocre pack with the most revenue in the hardware industry, followed by Wuxing, Ares, and Aztechnology (all of whom devote relatively little money to the hardware field). Other minor players include Transys Neuronet, which produces the Highlander cyberdeck but primarily focuses on software; and Fairlight Incorporated, whose famous Excalibur deck and other top quality Matrixware is Far too expensive for most consumers. CODE KINGS The software market is by far the most lucrative area of the Matrix industry. Computers are of little value without software programs and systems, and customers are always watching for new software that can make their lives easier and raise their profits. Searching for new software is very much like a visit to the toy store-and the corps know that computer users love new toys. DOUBLE TROUBLE Not surprisingly, the two big names in the software field are megacorporations with long histories of computer development: Novatech Incorporated and Renraku Computer Systems. Novatech Incorporated Through various subsidiaries, Novatech has made as big a splash in the software field as it has in hardware. Novatech subsidiary FTL Matrixware produces killer software but is best known for its persona code and cascading IC. The Novatech subsidiary Matrix Systems, Richard Villiersâ original company, focuses on system sculpture and coding for complex Matrix constructs. Combined with the sales of a variety of utilities, these products have put Novatech at the top of the software game. Renraku Computer Systems Despite its recent setbacks, Renraku remains a top player in the software development field. It produces numerous utili- 156 M atrjx ties, as well as an amazing variety of IC and defensive programs. Renraku subsidiary Wakatta Software is renowned for its have=' the=' government=' connections=' that=' mafia=' do.=' some=' gumi=' are=' investing=' more=' and=' in=' training=' for=' their=' deckers,=' so=' there=' a=' few=' exceptions-the=' shotozumi-gumi,=' example,=' produces=' high-quality=' forgeries=' near-record=' time. Hacker House Hacker House is a crew OF topnotch programmers and sizzling decker utility thieves who operate the ultimate shopping stop for deckers. Their hard-to-find and harder-to-access node carries all the utilities a decker might need-and quite a few others that would just be fun to use. Hacker House has been known to sell new utilities before their top-secret designers knew they were finished. Triads The Triads do some Forgery work, but it is second-rate at best. The Triads simply donât afford their deckers as much respect as other syndicates-a tendency that may hurt them in the long run. Shockwave Riders Descended from the legendary EuropeanChaos Computer Club, the Shockwave Riders are a decentralized group of elite deckers who espouse the traditional exploration-not-exploitation hacker ethic. Infamous for their hacking exploits, the Shockwave Riders are also credited with solving a range of difficult Matrix crimes-though their investigations were never requested or even detected until they revealed their findings. MATRIX GANGS Matrix gangs often Form like regular street gangs-youth in an area band together for protection and mutual aid. Occasionally they form within the Matrix as well, occupying a single virtual space even though they hail From physical locations from around the world. lsis-9 and the Reality Hackers are two examples of the vast numbers of Matrix gangs that roam the cyberworld. Netwalkers The Netwalkers are one OF the more successful and respected otaku tribes. Run by a human named Papa Lo, the Netwalkers live in Bostonâs Rox, above the Catacombs. The âWalkers make their livings finding and selling information in the Underground. Isis-9 Isis-9 Is well-known as an âoddâ group OF otaku. As Far as Overwatch Another otaku group-overwatch-has a strong interest in Al research and development, particularly in regard to the rogue Al Deus. This group seems to have a personal vendetta against Deus and is rumored to have had a hand in defeating him. WHO YOU WANNA BE TODAY? Forging credsticks and identities is a difficult task, requiring vast amounts of resources and contacts. Only a few individuals and organizations can do it well, and most are integrated into organized crime syndicates. Seoulpa Rings Seoulpa Rings almost always maintain a stable OF quality decking talent, and they can usually put together forged identities that will stand up to a high level of scrutiny. Their services arenât cheap, but their results are the best. ................................ anyone knows, the gang never contains more than nine mernk r s , and they claim to be led by an Al named lsis (an Al no one else has ever experienced). lsis-9 acts as a self-appointed vigilante group, targeting those who create problems in the Matrix. This includes other Matrix gangs as well as deckers who plant worms, crash hosts and so on. lsis members all use a similar icon, appearing as featureless, androgynous humanoids in various metallic colors. The Reality Hackers The Seattle-based Reality Hackers are actually closer to a runner group than a gang. The Hackers make most of their cred off of datasteals and are some of the best people to contact in Seattle to fence data and tech. They have connections throughout the megaplex and throughout the world (via the Matrix). The Reality Hackers are also skilled at physical intrusion operations and, unlike other Matrix gangs, have no problem meeting within the meat world. ........... ...................... â I . . . . . . . . . . . . . . . . . . . . . . , ........................ , I .- Matrix 159 SAMPLE RTGS FROM AROUND THE WORLD North American RTGs California Free State (NA/CFS) North (NOC) South (SOC) CAS (NA/CAS) Central (CE) Gulf (GU) Seaboard (SB) Texas (TX) Denver (NA/DEN) NAN Member States Algonkian-Manitou (NA/ALM) Athabascan (NA/ATH) Pueblo Council (NA/PUE) Salish-Shidhe (NA/SLS) Sioux Nation (NA/SIO) Trans-Polar Aleut (NA/TPA) Ute Nation (NA/UTE) Quebec (NA/QU) Tir Tairngire ( N A m Tsirnshian (NAPS) UCAS (NA/UCAS) Midwest (MW) Northeast (NE) North Central (NC) Seattle (SEA) South (SO) West (WE) African and Asian RTCS Asante Nation (AF/ASA) Baule Empire (AF/BAU) Canton Confederation (AS/CAN) Free City of Kronstadt (AS/KRO) Guangxi (AS/GUA) Hong Kong (AS/HK) Korea (AS/KOR) Manchuria (AS/MAN) Russia (AS/RUS) East (EAS) Moscow (MOS) Siberia (SIB) Vladivostok (VLA) Yakut (AS/YAK) 160 Matrix Security Access Green-4 Green-4 Control Index Files Slave 6 8 6 6 6 6 6 7 7 6 7 8 8 8 8 6 8 8 8 6 8 8 6 6 8 6 7 6 7 7 7 8 6 6 8 6 7 6 7 7 7 8 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 Index 3 4 5 6 4 8 5 4 Files 3 3 5 6 3 7 5 3 Slave 3 3 5 6 2 7 5 4 5 5 4 6 2 5 5 4 7 2 5 6 3 7 2 Green-3 Green-3 Green-3 Green-3 Orange-4 7 7 7 J Green-4 Green-3 Orange-5 Green-3 Orange-3 Green-2 Orange-3 Green-2 Orange-5 Orange-4 ~ * 7 7 8 8 8 8 8 6 8 8 8 8 8 6 8 6 7 6 7 6 Green-4 Green-3 Green-4 Green-5 Green-4 Green-4 Security Blue-2 Blue-3 Green-4 Orange-3 Blue-3 Orange-6 Green-3 Green-2 Green-2 Orange-2 Green-3 Orange-4 Blue-2 Access 3 4 6 7 4 8 5 5 Control 3 5 7 6 4 9 7 6 7 6 8 7 8 6 7 8 ....................................................................,................................ 1 Y i i 3 7, 4 i . i Central/South American RTGs Amazonia (SA/AMA) Central (CE) North (NO) South (SU) Venezuela (VEN) Aztlan (CA/AZ) Baja California (BA) Central (CE) North (NO) South (SU) Yucatan (YU) Caribbean League (CA/CL) Bermuda (BER) Cuba (CU) Grenada (GR) Jamaica (JA) South Florida (FLA) Virgin Islands (VI) Peru (SA/PER) European RTGs Allied German States (EU/ADL) Badensian Palatinate (BP) Bavaria (BAV) Berlin (BER) Brandenburg (BRA) Duchy of Pomorya (POM) Franconia (FRA) Free City of Hamburg (HAM) Greater Frankfurt (GFR) Hessen-Nassau (HN) Marienbad Council (MAR) North German League (NDB) Northrhine-Ruhr (NR) Saxony (SAX) Thuringen (THU) Troll Kingdom of the Black Forest (KSW) Westphalia (WES) Westrhine-Luxembourg (WL) Wurttemberg (WUR) Austria (EU/AUS) Austria Central (AC) Austria West (AW) Free State ofKonigsberg (EU/FSK) Great Britain (EU/UK) Portugal (EU/POR) Swiss Confederation (SE) Swiss-French Confederation (CSF) Tir na nOg (EU/TNO) United Netherlands (EU/NL) Vatican City (EU/VAT) Security Access Control Index Files Slave Green-6 Green-4 Green-6 Green-3 9 6 8 6 8 9 10 4 4 5 8 3 8 5 8 3 7 5 7 4 Orange-3 Orange-3 Orange-5 Orange-5 Orange-3 8 8 8 8 7 5 5 6 6 6 Green-2 Orange-3 Orange-4 Green-3 Green-2 Green-2 Orange-4 6 8 8 7 7 8 7 6 7 7 7 7 7 7 7 7 7 7 6 7 7 6 8 8 6 6 8 7 Files Slave 6 6 7 7 6 9 6 7 6 6 6 6 6 6 6 6 7 6 6 7 8 6 6 7 Security Access Control Index Green-4 Green-4 Orange-4 Green-3 Orange-5 Green-3 Orange-4 Green-3 Green-4 Green-2 Green-3 Green-4 Green-4 Green-3 Green-3 Orange-3 Green-4 Green-4 6 6 6 6 8 6 6 6 6 6 6 6 6 6 6 6 7 6 8 7 8 8 10 8 8 8 8 7 8 8 8 8 8 8 8 8 6 6 7 6 9 6 6 6 6 6 6 6 7 6 6 6 7 6 Green-4 Orange-5 Red-4 Orange-5 Green-3 Orange-5 Green-3 Red-5 Green-4 Red-6 8 8 6 8 9 7 6 7 6 9 7 10 7 7 11 8 8 7 9 6 9 7 9 6 5 8 6 7 6 8 ...................................................................................................... 6 7 6 9 6 7 6 6 6 6 6 6 6 7 7 6 6 6 6 9 7 6 7 6 8 6 7 Matrix 8 6 6 8 7 7 6 7 7 6 8 6 8 6 7 161 SYSTEM OPERATIONS Operation Abort Host Shutdown Alter Icon Analyze Host Analyze IC Analyze Icon Analyze Operation Test Control Control Control Control Control Control utility Swerve Redecorate Analyze Analyze Analyze Snooper Action Complex Complex Complex Free Free Simple Analyze Security Control Analyze Simple Analyze Crash Simple Complex Analyze Subsystem Targeted Subsystem Block System Operation Control I Control Slave* Crash Application Crash Host Decoy Decrypt Access Decrypt File Decrypt Slave Disarm Data Bomb Disinfect Download Datat Dump Log9 Edit File Edit Slave* Encrypt Access Encrypt File Encrypt Slave Graceful Logoff3 Slave Appropriate Subsystem Control Control Access Files Slave Files or Slave Appropriate Subsystem Files Control Files Slave Access Files Slave Access Spoof Crash Crash Mirrors Decrypt Decrypt Decrypt Defuse Purge Read/Write Validate Read/Write Spoof Encrypt Encrypt Encrypt Deception Complex Complex Complex Complex Simple Simple Simple Complex Complex Simple Complex Simple Complex Simple Simple Simple Complex Infect Intercept Datat Invalidate Account Locate Access Node§ Locate Decker Locate Files Locate Frame Locate IC Locate Paydata§ Locate Slaves Locate Tortoise Users Logon to Host Logon to LTG Logon to RTG Make Corncall* Monitor Slave* Appropriate Subsystem Appropriate Subsystem Control Index Index Index Index Index Index Index Index Access Access Access Files Slave (Worm) Sniffer Validate Browse Scanner Browse Scanner Analyze Evaluate Browse Scanner Deception Deception Deception CommI ink Spoof Complex Complex Complex Cornplex Complex Complex Complex Complex Complex Complex Simple Complex Complex Complex Complex Simple Null Operation Redirect Datatrail Control Control Deception Camo Complex Cornplex Relocate Trace Restrict lcont Scan Icon Control Control Special Relocate Validate Scanner Simple Complex Simple 116El Matrix Function Stall or stop host shutdown Change iconâs appearance Determine hostâs ratings, tricks Determine located ICâs type Identify icon type Identify operation made and utility used by other user Determine grid/hostâs Security rating, security tally, alert status Identify h i d d p features Interfere with anotherâs system operations Control remote devices Shutdown application or tortoise user Shutdown host Create decoy icon Defeat scramble IC to access grid or host Defeat scramble IC on file Defeat scramble IC on Slave subsystem Deactivate located data bomb Destroy worm programs Copy file to cyberterminal Read host logs Change datafile Modify data sent to/from remote device Encrypt access to host or grid Encrypt file Encrypt Slave subsystem Exit Matrix without dump shock: clear system memories Seed subsystem with worms Search and intercept data traffic Erase account/passcodes Find LTG code for host or commcode Find persona in grid/host Find specific datafile Locate frames/sprites/SKs Find IC in system Find saleable data on host Find specific remote devices Lists tortoise users on system Access host Access LTG Access RTG Make call, set up conference call Read data transmitted by remote device to host Loiter in system without notice Lay false trail in grid to confuse trace programs Confuse trace IC Inhibit located iconâs operations Gather info on icons I ...................................................................................................... I SYSTEM OPERATIONS (CONTINUED) Test utility Action Send Data+ Swap Memory+ Tap Comcall' Trace M X P Address3 Triangulates Files None Special Index Slave Read/Wri te None Commlink Browse Triangulation Simple Simple Complex Complex Complex Upload Datat Validate Account Files Control Read/Write Validate Simple Complex OperatIon Function Transfer data to icon or host Load new utility Trace/listen to commlink calls Trace address to jackpoint Determine physical location OF wireless device Transmit data from deck to Matrix Create account/passcode * Monitored operation t Ongoing operation Interrogation operation UTILITIES Operational Utillties Analyze Browse Camo Comm Iin k Crash Deception Decrypt Defuse Encrypt Eva1uate Mirrors Purge ReadlWrite Redecorate Relocate Scanner Sniffer Snooper Spoof Swerve Triangulation Validate Special Utilities BattleTac Matrixlink Cellular Link Compressor Guardian Maser Link Microwave Link Radio Link Remote Control Satellite Link Sleaze Track Multiplier 3 1 3 Options' A A 1 3 2 1 A A A A 2 1 2 3 2 2 2 A A A A A A A 2 A 3 3 2 3 3 2 A A A A A A A 4 Multiplier 5 1 2 2 1 1 1 3 A Analyze Host/lC/lcon/Security/Subsystem, Locate IC Locate Access Node/File/Slave,Trace MXP Address Redirect Datatrail Make Comcall, Tap Comcall Block System Operation, Crash Application/Host Graceful Logoff, Logon to Host/LTG/RTG Decrypt Access/File/Slave Disarm Data Bomb Encrypt Access/File/Slave Locate Paydata Decoy Disinfect Download Data, Edit File, Upload Data c Alter Icon Relocate Trace Locate Decker/Frame/Tortoise User, Scan Icon Intercept Data Analyze Operation Control Slave, Edit Slave, Monitor Slave Abort Host Shutdown Triangulate Dump Log, Invalidate Account, Restrict Icon, Validate Account Options. B B B B B B B 3 B B B 8 B 2 System Operations ...................................................................................................... I Matrix I 163 I Offensive Utilities Multiplier Attack- L Attack-M Attack-S Attack-D Black Hammer Erosion 2 3 Hog 4 5 20 3 3 KiIIj oy 10 Slow 4 3 Steamroller Defensive Utilities Multiplier Armor Cloak Lock-On Medic Restore Shield 3 3 3 4 3 UTILITIES (CONTINUED) Options* Target+ C Frames, IC, Personas, SKs, C Frames, IC,Personas, SKs, C Frames, IC, Personas, SKs, C Frames, IC, Personas, SKs, D r-* Als Als Als Als Personas Frames, Personas, SKs, Als Personas Personas E F D E IC C Tar Baby IC,Tar Pit IC Optionsâ H J J K L H 4 * The letter listed indicates the option selection, as defined below: A: Adaptive, bug-ridden. crashguard, DINAB, noise, one-shot, optimization, sensitive, sneak, squeeze B: Adaptive, bug-ridden, crashguard, optimization, squeeze C: Adaptive, area, bug-ridden, chaser, crashguard, DINAB, limit, one-shot, optimization, penetration, selective, stealth, targeting D Adaptive, bug-ridden, crashguard, one-shot, optimization, selective, targeting E: Adaptive, area, bug-ridden, crashguard, DINAB, one-shot, optimization, selective, targeting F: Adaptive, bug-ridden, crashguard, DINAB, one-shot, optimization, selective, targeting G: Adaptive, bug-ridden, crashguard, DINAB, one-shot, optimization, stealth, targeting H: Adaptive, bug-ridden, crashguard, optimization J: Adaptive, bug-ridden, crashguard, one-shot, optimization K: Adaptive, bug-ridden, crashguard, DINAB, optimization L: Adaptive, bug-ridden, crashguard, DINAB, one-shot, optimization t âFramesâ includes frames, agents, sprites and daemons; âPersonasâ includes cyberterminal personas and otaku living personas; âICâincludes all IC,including constructs ......................................................................................................................... PROGRAM SIZE TABLE hogrun Rating 1 1 1 2 3 4 5 6 7 8 9 10 11 4 9 16 25 36 49 64 81 100 121 12 13 14 169 I96 /16Lf 144 Matrix 2 2 8 18 32 50 72 98 128 162 200 242 288 338 392 3 3 12 27 48 75 108 147 192 243 300 363 432 507 588 4 4 16 36 64 100 1 44 1 96 256 324 400 484 576 676 784 Multiplier 5 5 20 45 80 125 1 80 245 320 405 500 605 720 845 980 6 6 24 54 96 150 216 294 384 486 600 726 864 1,014 1.176 7 7 28 63 112 175 252 343 448 567 700 847 1,008 1,183 1.372 8 8 32 72 128 200 288 392 512 648 800 968 1,152 1,352 1,568 9 9 36 81 1 44 225 324 441 576 729 900 1,089 1,296 1,521 1,764 10 10 40 90 160 250 360 490 640 810 1 ,ooo 1,210 1,440 1,690 1,960 I ...................................................................................................... PROGRAM PLANNING TABLE Situation Program rating 1-4 Program rating 5-9 Program rating 10+ Each program option OPTIONS TABLE Utility Options Adaptive Area Bug-Ridden Chaser Crashguard DINAB Limit Noise One-Shot Optimization Penetration Selective Sensitive Sneak Squeeze Stealth Targeting Modifier +O -1 +O +1 PROGRAMMING SUITE TABLE Rating 1 2 3 4 5 6 7 Size (in Mp) 15 60 135 240 375 540 735 8 960 9 1,215 1,500 10 ................................................ PROGRAMMING MODIFIERS Situation Computer has double the needed memory Each success achieved from program plan No program plan was prepared Mainframe Programming Blue host Green host Orange host Red host Modifier -2 -1 +2 Design Rating Modifier +2 +Area Rating - +1 +Crashguard Rating +(DINAB Rating + 2, round up) -1 -Noise Rating Actual Size: -75%; Design Size: +50% Actual Size: -50%; Design Size: + 100% +I +1 Actual Size: -50%; Design Size: -50% +(2 x Sneak Rating) +1 +Stealth Rating +2 IC Options Armor Cascading IC Expert Defense Expert Offense Optimization Party Cluster Sensitive Shield Shift Trap +2 +3 +1 +1 Actual Size: -50%; Design Size: + 100% +3 Actual Size: -50%; Design Size: [email protected]/o +2 +2 + 1 per linked IC program Prosramming Suite Options Self-coder +Self-coder Rating -1 -2 IC SIZE MULTIPLIERS TABLE -3 -4 IC Program Black Cerebropathic Lethal Non-lethal Psychotropic Blaster Crippler Data Bomb Killer Pavlov Probe Ripper scout Scramble Sparky Tar Baby Tar Pit Trace Size Multiplier 16 16 12 20 10 6 5 8 ...................................................................................................... 4 3 8 5 3 12 5 7 10 I Matrix I 165 I INTRUSION COUNTERMEASURES whke IC Crippler Acid Binder Jammer Marker Data Bomb Killer Pavlov Probe scout Type Target Proactive Proactive Proactive Proactive Reactive Proactive Reactive Reactive Special Bod Evasion Sensor Masking Icon Icon Icon System operations System operations, icon Scramble Tar baby Reactive Reactive Access, File or Slave subsystem One type of utility Gray IC Blaster Ripper Acid-rip Bind-rip Jam-rip Mark-rip Sparky Type Proactive Target Icon Proactive Proactive Proactive Proactive Proactive Bod Evasion Sensor Masking Icon Tar pit Reactive One type of utility Trace IC Trace Proactive Icon Black IC Cerebropathic Type Proactive Target Icon and character Lethal Proactive Icon and character Non-lethal Proactive Icon and character Psychotropic Proactive Icon and character Cyberphobia Frenzy Judas Positive conditioning Effect -1 Bod per 2 net successes -1 Evasion per 2 net successes -1 Sensor per 2 net successes -1 Masking per 2 net successes (Rating)Ddamage; IC crashes (Rating)*damage (Rating)Mdamage; IC stays Adds (rating)dice to Security Tests In reactive mode acts as probe G: in proactive mode makes attacks, successes add dice to next attack by another IC program. Must be decrypted to access; destroys data Crashes utility program Effect (Rating)*damage: MPCP attack+ -1 Bod per 2 net successes; MPCP attack+ -1 Evasion per 2 net successes; MPCP attackt -1 Sensor per 2 net successes: MPCP attackt -1 Masking per 2 net successes: MPCP attackt (Rating)*damage; MPCP attackt; (Rating)MPhysical damage to character Crashes utility program; Tar Pit (MPCP + Hardening) Test to corrupt all copies of utility in memory IC Rating (Evasion)Test to hunt, base 10 turns to locate. Effect As non-lethal black IC except: Black IC Rating x 2 Test against MPCP if character knocked out-successes inflict Stress Points (Rating)*damage to icon, (Rating)*Physical damage to character; Willpower (IC Rating) Test to jack out; MPCP attackt at black IC rating x 2 if character killed (Rating)* damage. (Rating)* Stun damage to character: Willpower (IC Rating) Test to jack out: MPCP attackt at black IC rating x 2 if character knocked out As non-lethal black IC except: Willpower (Black IC Rating) Test to resist psychotropic effect Induces Matrix and simsense phobia Inspires maniacal rage Induces compulsion to betray Inspires love of company, inhibits character from acting against corpâs interests e Level is determined by the hostâs Securi Code: M on Blue and Green, S on Orange and Red. If icon crafhes, make IC Rating (MPCP) Test; MPCP regced by -1 per 2 successes. * The Dama t I I 2 6 6 Ma &jx ...................................................................................................... WORM TABLE Worm Type Crashworms Dataworms Deathworms Spawnworms Ringwor ms Tapeworms Multiplier 2 3 2 2 2 2 Effect Worm Rating (Utility Rating) Test to crash activated utilities Log data; send report out on a 1 D6 result of 1 +(Deathworm Rating t 2) to all tests by infected persona Worm Rating (MPCP) Test, reduce highest utility by successes Worm Rating (Icon Rating) Test to alter icon Worm Rating (MPCP) Test to corrupt downloaded files ................................................................................ .... STOCK CYBERDECKS Model Allegiance Sigma Sony CTY-360-D Novatech Hyperdeclt-6 CMT Avatar Renraku Kraftwerk-8 Transys Highlander Novatech Slimcase- 10 Fairlight Excalibur Deck Rating MPCP-3 MPCP-5 MPCP-6 MPCP-7 MPCP-8 MPCP-9 MPCP- 10 MPCP- 12 Cyberdecks Allegiance Sigma Sony ClY-360-D Novatech Hyperdeck-6 CMT Avatar Renraltu Kraftwerk-8 Transys Highlander Novatech Slimcase-1 0 Fairlight Excalibur Avallabmty 417 days 417 days 4/7 days 617 days 1017 days 14/7 days 18/7 days 22/7 days Hardening 1 3 4 4 4 4 5 6 cost 14,OOOY 70,OOOY 125,OOOY 250,OOOY 400,000Y 600,OOOY 960,OOOY 1,500,000Y Active Memory 200 300 500 700 1.000 1,500 2,000 3,000 Storage Memory 500 600 1 ,OOo 1,400 2,000 2,500 2,500 5,000 I/O Speed 1 00 200 240 300 360 400 480 600 Response Increase 0 cost 14,000Y 70,OOOY 125,OOOY 250,OOOY 400,000Y 600,00OY 960,OOOY 1,500,000Y I 1 1 2 2 2 3 Street lndex 1 1 1 1 1 1 1 1 CYBERDECK SYSTEM ADDITIONS Availability Hitcher Jack 2/48 hrs Off-line Storage 2/24 hrs Vidscreen Display 2/24 hrs 50 + cost 250Y (5 x Mp) Y Street Index 1 I l00Y 1 LOW END CYBERTERMINALS Each of these cykrterminals has a cold ASIST interface, an Availability of always, a Street Index of .5, and a Legality rating of legal. Model CMT Portal MCT Matrix Master CMT Comet Novatech Z-Term Renraku Cybot Sony Abacus MPCP 1 1 2 2 3 3 Defautt Bod/Sensor 213 2/3 3/3 214 415 5/4 Active Memory 50 100 100 1 00 100 200 Storage Memory 100 200 200 250 200 300 I/O Speed 50 50 50 50 50 ...................................................................................................... 100 Cost 1,300Y 1, m y 2,OOOY 2,200Y 6,500Y 7,500Y Matrix 167 CRANIAL CYBERTERMINALS Cybeware Active Memory Cold ASIST Interface* Hot ASIST Interface* External Jackpoint Hardening ICCM Filter Icon Chip 1/0Speed Module MPCP Persona Chips (each) Reality Filter Response Increase cost 200Y per Mp Construction Cost Construction x 1.2 500Y Construction x 1.2 Construction x 1 .2 Construction x 1.2 Construction x 1.2 Construction x 1.2 Construction x 1.2 Construction x 1.2 Construction x 1.2 Essence Mp + 1,000 .2 .4 .I (Rating + 10) .2 .I .I (Rating + 10) .2 .2 .2 Street Index Avallablllty 6/2 wlts 6/2 wlts 6/2 wks 6/2 wks 6/2 wlts 6/2 wlts 6/2 wlts 6/2 wks 6/2 wlts 6/2 wks 6/2 wlts 6/2 wlts 1 .5 1 1 1.5 1.5 1.5 1 I 1 2 1 Legallty 4P-s 4P-s 4P-s 4P-s 4P-s 4P-s 4P-s 4P-s 4P-s 4P-s 4P-s 4P-s * Includes RAS Override PROGRAM PRICES TABLE Program Rating 1-3 Price (In nuyen) Size x 100 Size x 200 Size x 500 Size x 1 ,OOO 4-6 7-9 1 o+ Availability , 7 . * 2/7 days 4/7 days 81 14 days 16/30 days . . Street index 1 1.5 2 - 3 OPTICAL CHIPS AND ENCODER COSTS Optical Chip Encoders Sony Encoder 1 Cross Cooker l o 0 0 Novatech Burner Transys T- I000 Sony Encoder I1 Novatech Novahot Hitachi RM-AX Cross Angelic Transys Quantum 1 3 4 5 6 7 8 Chips Optical Memory Chip (OMC) 168 Matrix cost 500Y 2,ooOY 2,700Y 3,400Y 6,OOOY 7,500Y 9,500Y 12,OOOY 15,OOOY Raiing 0 1 2 Availability 4/24 hrs 4/72 hrs 6/24 hrs 8/24 hrs 8/72 hrs 10/ 72 hrs 10/7 days 1O/7days 8/1 mo Street index 1 1.5 1 1.5 1.5 2 2 3 3 cost 5Y per M p ...................................................................................................,... MISCELLANEOUS COMPONENT TABLE SilCCt cost Availability Component 252,500Y 2/12 hrs Audio Speakers 25Y Always Battery Pack Camera Trideo 2oQ-2,OooY Always Video 1oQ-1,OOOY Always l00Y 2/12 hrs Casing (Rating 3) 500Y per extra point Higher Barrier rating Rating/( 12 x rating) hrs Always Chip Reader 200Y Credstick Reader Always Rating 1 12,OooY Rating 2-3 Always 60,OooY Always Rating 4-5 100,OooY Restricted Rating 6+ Restricted Always Credstick Slot 50Y Always Disk Drive 200Y Display Screen l00Y 2/24 hrs Always Fiberoptic Cable 1 Y per meter Hitcher Jack 250Y 2/48 hrs Keyboard Always 50Y Micro-Camcorder 2,500Y 6/48hrs Microphone 50Y Always Microwave Dishes 611 wk Standard portable 5,OooY Large portable 812 wks 10,OooY 811 mo Fixed-base 2,500Y Monitor lWZ5,OOOY 2/12 hrs Off-line Storage 50+(5 x Mp)Y 2/24 hrs 250Y Passkey Reader (Blank) 2/24 hrs Power Cord 150Y 4/48 hrs Printer lOOY Always Satellite Dishes Standard portable 800Y 5/48 hrs Large portable 1,200Y 6/48hrs Fixed-base 511 wk m Y Scanners Fingerlthumbprint Rating x 200Y Rating172 hrs Palmprint (Rating +1)/72 hrs Rating x 300Y Retinal (Rating +2)/72 hrs Rating x 1,OOOY Text/Picture 100% Always Signal Locator Standard Rating x 200Y Rating/48 hrs AOD Rating x 500Y Rating/48 hrs 25,OooY + (rating Simlink 812 wks - x 5,OOOV) Temporary Satellite Dish Components 4/24 hrs 1,OooY Electronics Plastic webbing 5Y 4/24 hrs 4/24 hrs Spray polymer (1 use) 1Y Touchpad 50Y Always Always w/Mouse adapter +lOY Always wflrackball adapter +1OY Rating/48 hrs Transceiver Rating x 500Y Always Trode Jack 500Y 411 wk Vid-link Transmitter Rating x 2,OOOY VR Kit 250Y Always Index 1 1 Legality Legal Legal 1 1 .5 2 .75 Legal Legal Legal Legal Legal 1 1 1 NA 1 .75 1 1 1 .5 2 .5 Legal Legal Legal Restricted Legal Legal Legal Legal Legal Legal 8P-U Legal 1 1 1 .5 1 2 1 1 Legal Legal Legal Legal Legal 9P-v Legal Legal 1 1 Legal Legal Legal 1 2 3 1 Legal Legal Legal Legal 1.5 1.5 2 8P-U 8P-U 8P-U .5 .5 .5 .5 1 1 2 NA 2 1 Legal Legal Legal Legal Legal Legal 8P-U Legal 8P-U Legal 1 ..........................................................................,............................ I Matrix tl I 169 I CYBERTERMINAL COMPONENT PRICES TABLE SOFTWARE MULTIPLIER Components That N e e d Software Multiplier 1 2 10 25 60 65 70 .. Personaware MPCP Bod or Sensor Masking or Evasion Masking w/SASS 1 2 3 Deck Features Cold ASIST Hot ASIST Hardening ICCM Biofeedback Filter* Reality Filter Response Increase * MPCP Rating (MPCP Ratlng)z x Multiplier of 8 1 3 4 5 6 7 8 9 1 o+ 90 100 I10 120 140 2 8 4 8 Response Increase x 2 Cost does not include biomonitor Components That D o Not N e e d Software Components Active Memoty 1/0Speed Maser Interface Matrix Interface Miscellaneous Components Ports (FUPs) RAS Override Signal Amplifier Storage Memory Wireless Interface Cellular Laser Microwave Radio Satellite Other Options Ordering everything at one time Hardwired components 170 I Ma trjx cost M p x 7.5Y I/O Speed x 35Y 3,OooY 35Y + cost of cable add 10 percent to the cost (see p. 63) 235Y (35Y x MPCP) + 1 ,OOOY 35Y + Signal Amplifier Mp x 6Y (3% x device ratingz) + device cost 560Y + device cost 560Y + device cost (35Y x device ratingz) + device cost 560Y + device cost up to 25 percent off +I0 percent per the cost of the component hardwired or +50 percent for the entire cyberterminal, whichever is cheaper ...................................................................................................... JACKPOINT 8. WIRELESS LINK TABLE Jackpoints Console High-speed Matrix Access Illegal Access Illegal High-speed Matrix Line Illegal Junction Box Tap Legal Access Maser Power Grid Connection Remote Device Tap Wireless Link High-speed Cellular Link Laser Link Microwave Link Radio Link Satellite Uplink Access Modifier Special -2 +O +O +O -2 +O +4 Trace Modifier -6 -2 +O +O +O -2 -2 +4 I/O Speed Unlimited 500 300 500 Tap Rating x 50 300 400 100 Base Bandwidth Unlimited 50 20 50 Tap Rating x 5 20 25 10 100 300 200 200 500 5 20 10 Radio Rating x 2 50 +3 -3 -2 -2 +2 -2 -2 +2 +O -2 SEARCH TEST TABLE Type of Search Simple Standard Detailed Target Number 4 5 8 Base Time* 1 D6 Hours 2D6 Hours 1D6 + 2 Days Base Cost (per hour) OY 1OY 25Y * If the character is using a cyberterminal with Response Increase 1 or less, multiply this time by 2. If the character is using Tortoise mode, multiply it by 3. Situation Target Number Modifier Character has appropriate Knowledge skill of 3-5 -1 Character has appropriate Knowledge skill of 6+ -2 +2 Character keeps a low profile while searching + 1 per extra search Character conducting more than 1 search at a time Computer Used +2 (base time x 2 ) Character using terminal mode +1 Character using cold ASIST Character has Matrix Initiative of +4D6 or higher -1 Search Area Specific + databaseâs search modifier +O General Matrix Specific Search Area Character has browse utility of rating 6+ -1 General Matrix Search Character has appropriate database/data haven contact -2 Character has Etiquette (Matrix) of 5+ -1 Search confined to one grid +O Search requires use of more than 1 grid +1 per grid Search Assistance Dumb frame -1 Smart frame -2 Agent -3 Frame or agent equipped with browse utility of Rating 6+ -1 Smart frame or agent has core Rating 6+ -1 Successes 1 2 3 4 5+ Search Results General info (not quite what the character was looking for, but at least a lead for another search) The basic data the character wanted More details, perhaps including a new lead The full details, plus another lead or two All the juicy bits the character wanted to know, plus some that he didnât ...................................................... ................................................ Matrix 171 MATRIX DATA SHEET Rating Detection Factor Hardening 1/0Speed Response Increase ICCM? Effective Rating MPCP Bod Evasion Masking Sensor ASIST Reality Filter? I I Reaction Base Reaction: Using manual controls (physical Reaction): Using pure DNI (Intelligence): Base Initiative Running Pure DNI: Reality filter active: Response Increase: Using 'trodes: Y Hot N Cold Y N I 1 Persona Crashed Initiative 0 n I +2 +2 +2 per level tZ +ID6 +1D6 +ID6 + 1 D6 per level maximum +2D6 Serious n U El Moderate Icon Rating n U Final MaMx Initiative: Light Active? Utility Rating Size Options Permission given to photocopy 0 ZOO0 FASA Corporation Effect OTAKU RECORD SHEET 19 .Wii Rating MPCP Bod Evasion Masking (IN + WIL + CHA) + 3 (WU Sensors (IN) (1 NT) (WIL + CHA) + 2 Detection Factor Hardening I/O Speed Matrix Reaction Matrix Initiative Icon Rating __ Access Control Index Files Slave __. - I I I I Path Tribe's Name Tribe's Members Tribes Resources Echoes Complex Form Rating Size Options Permission given to photocopy 0 2000 FASA Corporation Effect Type (choose one): Dumb Frame Smart Frame Agent Rating Rating Frame Core/MPCP Bod Evasion Masking Sensors Reaction Initiative Detection Factor Pilot Rating Hacking Pool Options and Notes: Utility Payload: Utility Type (choose one): Rating Type Sprite Size Effect Daemon Rating Frame Core/MPCP Bod Evasion Masking Sensors Options Rating Rating - Reaction Initiative Detection Factor Pilot Rating Hacking Pool - Access Channel Control Channel Index Channel Files Channel Slave Channel - Options and Notes: Complex Forms Payload: Complex Form Rating Frame Core Reaction Initiative Hacking Pool Size Type Options Effect IC Payload: IC Program Rating Options and Notes: Permission given to photocopy 0 Zoo0 FASA Corporation Type Effect Comments are closed.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
February 2021
Categories |