NEWS

Expectations when creating a "Matrix Specialist"

  • 0 Replies
  • 1011 Views

SoulGambit

  • *
  • Omae
  • ***
  • Posts: 370
« on: <05-05-17/2147:54> »
Matrix Specialist
This is not a character sheet per say, but I want to make sure I am covering people's general expectations when you go into a run claiming to be a "Matrix Specialist," whether that is the team Decker or the team Technomancer. This list is meant to be reasonably comprehensive. I am trying to list the general goal and the dicerolls and actions required to get to that goal.

1) Do Legwork related to the Matrix. Primarily this will be Matrix Searches and identifying traffic.
Matrix Search (INT + Computer [Data Processing]), possibly some pre-run hacking to get floorplans and patrol routs (Varies). Snoop (INT + Electronic Warfare [Sleaze], requires 1 mark) on someone's chatter. You are also probably expected to have Matrix Security as a knowledge skill.

2) Identify security systems hooked in to the Matrix. This includes cameras, drones, sensors, alarms,  guards (via their communications).
Matrix Perception (INT + Computer [Data Processing])

3) Enter Hosts.
Place mark on host. Hack on the Fly (LOG + Hacking [Sleaze]) -> Run Silently (LOG + Sleaze) -> Enter Host -> Matrix Perception (Int + Computer [Data Processing]) to get bearings

4) Interact with files
Enter Host or Access Terminal the hard way if necessary -> Matrix Search (INT + Computers [Data Processing]) *or* FAQ (INT + Computers [Level]) -> Matrix Perception on the file (INT + Computers [Data Processing]) -> Disarm Databomb (INT + Software [Firewall]) if required -> Crack File (LOG + Hacking [Attack]) -> Edit File (LOG + Computers [Data Processing]) *or* Editor (Resonance + Software [Level])

5) Bypass security systems, such as cameras, sensors, drones, sensors, alarms, guards, etc.
Enter Host (if applicable) -> Place Mark on Device -or- Owner (LOG + Hacking [Sleaze]) -> One of...
- Spoof Command (INT + Hacking [Sleaze[)
- Edit File (LOG + Computer [Data Processing]) (see Interact with Files, above)
- Control Device (INT + Electronic Warfare [Sleaze], need variable number of marks)
- Dataspike (LOG + Cybercombat [Attack], need 0 marks)
- Editor (Resonance + Software [Level], requires 0 marks); Level-1 Fade
- Resonance Spike (Resonance + Software [Level], requires 0 marks); Level-3 Fade
- Resonance Veil (Resonance + Software [Level], requires 0 marks); Level-3 Fade
- Puppeteer (Resonance + Software [Level], requires 0 marks); Level+1 Fade

6) Protect the runner's gear
Requires Firewall, Sleaze, and a high enough Device Rating to get everything. Technomancers are going to need a commlink.

7) Track someone
Get two marks (LOG + Hacking [Sleaze]) then use Trace Icon (INT + Computer [Data Processing])

8 ) Be creative with the environment
Varies, but usually some manner of Spoof Command, Control Device, Edit File, Editor, Resonance Veil, or Puppeteer.'

-----
Dicepools

Your average Host will be defending with Rating * 2 + 3 dice, while ICE will be acting with a Rating * 2 Dicepool.
Your average security spider will be defending with 12-15 dice and acting with 12-17.
Agents will defend with Rating + 8 dice and act with Rating * 2.
Things you are directly connected to will generally be defending with 4 or 6 dice.

Rating 4 hosts are side attractions. Rating 6 hosts are probably what you are going to face in the beginning. Rating 8 hosts are main events, or times when the ST wants to challenge their matrix players.

Observations:
This lets you generally know what your character can deal with based on their dicepools. A Logic 8 + Hacking 6 + Specialty 2 + Codeslinger 2 = 18 dice Decker can break into Rating 5 Hosts reliably, and can probably go up to Rating 10 Hosts with Edge and a little teamwork from Agents, assuming their Sleaze can keep up with that.

A Logic 5 + Hacking 6 + Specialty 2 + Codeslinger 2 = 15 dice Technomancer can reliably break into Rating 4 hosts, but can probably go up to Rating 8 by spending Edge, so long as their Sleaze can keep up or they have a high enough Edge. Teamwork from Sprite(s) helps increase this further.

If you can get a Direct Connection, then hacking most things is child's play, including getting in to hosts. It's okay to have a monster host in a run so long as someone can slap a datatap on to something in the Host's WAN.
« Last Edit: <05-05-17/2212:21> by SoulGambit »