Slicing Actions



T-SM p. 86


Slicing Action List

Characters in a Slicing Encounter can use the following Slicing Actions (in addition to normal Actions, at the GM's discretion):


Access System

  • Difficulty: Simple (—) (with key)
  • Available To: Defender, Intruder

For a character to interact with a computer system, that individual must be able to get it to recognize basic commands. For most computers, some sort of identity verification is required — a code, a key, or some other, more esoteric access token.

As an Action, if the system has no verification system, or the character possesses legitimate means of access (such as a code cylinder or passcode), a character may make a Simple (—) Computers Check to gain access to it.

If the system's security is more advanced, see the System Security table for suggestions on the difficulty of breaking its verification protocols.


Activate Security Program

  • Difficulty: Average () Computers check
  • Available To: Defender, Intruder

Security Programs are the main impediment to interlopers in a computer system. As such, anyone trying to subvert a system's intended purpose wants to disable such programs, while anyone protecting the system endeavors to keep them operational.

As an Action, a slicer may activate a Security Program with an Average () Computers check. While one or more Security Programs are active on a computer, Intruders cannot take certain Slicing Actions.


Disable Security Program

  • Difficulty: (varies)
  • Available To: Defender, Intruder

Typically, bringing down the Security Programs protecting a system is an intruding slicer's first job. If there is an administrator aware of the slicer and actively managing the system, however, keeping the system security suppressed is likely to be an ongoing task.

As an Action, a slicer may attempt to shut down a Security Program with a Computers check. The difficulty of this check is based on the quality of the Security Program, for which the GM can consult the guidelines on the System Security table.


Enact Command

  • Difficulty: (varies)
  • Available To: Defender, Intruder (if no Security Programs are active)

The slicer issues a single command to the system they have sliced. Commands are single-purpose requests that fall within the scope of the system. "Loop the past ten seconds of footage on the cameras in this facility that are facing the alley to the north," or "Access all information in this system on (character)'s slave trading." would be valid commands, assuming the system included control of those routines.

The difficulty of the Computers check is up to the GM's discretion, and depends how similar the slicer's command is to the intended use or the system. Unlocking a door controlled by a computer system might require an Easy () Computers check, while getting a door's locking mechanism to physically jam might require a Daunting () Computers check instead, as the system is designed to open and close the door, but not to break it.


Expel User

  • Difficulty: Opposed Computers vs Computers Check
  • Available To: Defender, Intruder (if no Security Programs are active)

Once a slicer is aware of another user on the system, the slicer can cause that user to lose access and even impede future access.

As an Action, a slicer may make an Opposed Computers vs Computers check to cause another user to lose access to the system. If the slicer has identified that user's Slicing Signature, increase the difficulty of the user's Computers checks for the Access System Action by two for this computer until the end of the encounter.


Lockdown

  • Hard () Computers check
  • Available To: Defender, Intruder (if no Security Programs are active)

A user with control of a system can usually shut it down with relative ease. For a slicer attacking a system, this is often the goal, leaving the enemy unable to act until they are able to reset the system. For a slicer on the defensive, it is an option of last resort.

As an Action, a slicer may make a Hard () Computers check to shut down the system, blocking access to all users. Any character with physical access to the system can restart it with an Average () Computers check that takes one hour to complete.


Trace User

  • Difficulty: Opposed Computers vs Computers Check
  • Available To: Defender, Intruder (if no Security Programs are active)

A slicer in a system can attempt to find more information about another user, such as that person's slicing signature or location.

As an Action, a slicer may make an Opposed Computers vs. Computers check against another user in the system. If they succeed, they learn the other user's physical location, a portion of the slicer's signature, or a full list of the Actions the user has taken on the system this encounter.