Slicing
About Slicing Gear
Some form of Slicing tool is required to attempt Slicing at all. This can be a temporary tool like a Dataspike, but is more commonly a permanent set of slicer gear.
At the GM's discretion, an experienced Slicer might be able to break into a relatively unsecured system with little more than a datapad and some ingenuity, although attempting the job with limited resources could impose one or more on the check.
Slicing Gear
Item | Price | Encum. | Rarity |
---|---|---|---|
p. 182 | |||
Slicer Gear | 500 | 2 | 4 |
p. 186 | |||
Data Breaker | (R) 1000 | 1 | 6 |
T-SM p. 51 | |||
Dataspike | (R) 100 | 1 | 3 |
Signature Modulation Pad | (R) 250 | 2 | 7 |
Tracing Console | 3000 | 12 | 6 |
Slicer Gear
p. 179
Slicers use their formidable talents to gain access and control of computers, and items such as these are their main tools. Their main weapons are highly customized (usually to illegal degrees) computers of their own, filled with the latest decryption software, codebreakers, and data probes. Other items might include false credit chips for accessing the accounts of others or modifying monetary levels. But like slicers themselves, their tools are unique; often a slicer can identify another slicer simply by inspecting the electronic fingerprints their tools leave behind.
Data Breaker
p. 186
Most Data Breakers are also recording devices, and can pull vast amounts of information from ill-guarded systems in seconds.
Droid slicers can choose to have a Data Breaker (or equivalent systems) installed internally at the same cost.
Data Breakers add to any Computers check made to slice computers (as opposed to the usual one for having the right tools for the job).
Dataspike
T-SM p. 50
Dataspikes, also known as slicers' spikes or computer spikes, are a common tool for bypassing computer security. While expert Slicers sometimes craft advanced examples to break into particular systems, a typical Dataspike can be put together to work with any computer. Once installed in a system, a Dataspike releases a barrage of junk data that overwhelms security, allowing the user a window in which to access the secured systems. Dataspikes are typically designed to burn out after use, leaving behind minimal evidence.
Once per round, a character with a Dataspike may expend it to attempt to disable a security program as a Maneuver (rather than as an Action). This can include the use of the Disable Security Program action. Reduce the difficulty of the subsequent Computers check to disable the program by 2, to a minimum of Simple (—). After one use, the Dataspike burns out and becomes useless.
Signature Modulation Pad
T-SM p. 51
A Signature Modulation Pad is a datapad that endlessly reroutes its signal through its modified circuitry, distorting the electronic fingerprint of the slicing tools used alongside it.
Add to checks attempting to acquire the user's slicing signature, such as the Trace User action.
Tracing Console
T-SM p. 51
Tracing Consoles are most commonly found within espionage agencies and other sensitive installations, but they could be used by any group concerned about the security of its electronic systems. These devices keep a constant watch over the systems to which they are linked, logging all attempts at access and monitoring for unusual activity Once irregularities are logged, the console can be used to assist in following the disturbance to its source.
A Tracing Console can be installed to monitor a single system, such as a building's data network or a ship's computer. Computers checks to slice a system protected in this way suffer due to the difficulty of avoiding notice. A defending slicer using the console gains to Computers checks to identify any intruder, such as by the Trace User action.