| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | AA | AB | AC | AD | AE | AF | AG | AH | AI | AJ | AK | AL | AM | AN | AO | AP | AQ | AR | AS | AT | AU | AV | AW | AX | AY | AZ | BA | BB | BC | BD | BE | BF | BG | BH | BI | BJ | BK | BL | BM | BN | BO | BP | BQ | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Configurator Configurator V1.2 | Matrix Actions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2 | Type | Action | Action Type | Skill | Marks Required | Attribute | Resisted With | Apply Spec? | Booster Cloud? | Dice Pool | Limit | Macro | Desc | Programs - Limit | Attribute | Skill | Specialization | Running Silent | Hot-Sim | Noise | Public Grid | Programs - Dice | Logic Pool Bonus | Intuition Pool Bonus | Mecury-Alpha Booster (Offensive) | AVRse | Codeslinger | Buddy System | Frostbite | Rootkit | I C U | Malware Infection | Incompetent (Cracking) | Incompetent (Electronics) | Wound Penalty | Edge Dice | Smoke And Mirrors Penalty | Booster Cloud Dice | Booster Cloud Limit | ECM Warrior | Mentor Spirit | Trying for multiple marks | Reckless Hacking | Background Count | Sustaining Penalty | Analyze Device | Heightened Concentration Max Malus | Heightened Concentration | Adept Centering Total Possible Malus Removed | Adept Centering | Technomancer | AR + Worldtree | |||||||||||||||||
3 | Deck Attributes | Configuration Selector | Attack | Brute Force | Complex | Cybercombat | 0 | LOG | WIL+FW | - | 23 | 9 | &{template:default} {{name=Brute Force @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k9]]=[Attack 9] vs. WIL+FW}} {{Desc= Place a mark and you may deal half net hits round down in matrix damage, resisted with WIL+FW. Take -4 for 2 marks, -10 for 3}} | Place a mark and you may deal half net hits round down in matrix damage, resisted with WIL+FW. Take -4 for 2 marks, -10 for 3 | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||||||
4 | Device Rating | 5 | Matrix Condition Boxes | 11 | Phase 1 | Crack File | Complex | Hacking | 1 | LOG | Rating*2 | - | 23 | 9 | &{template:default} {{name=Crack File @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k9]]=[Attack 9] vs. Rating*2}} {{Desc= Remove the protection from a file}} | Remove the protection from a file | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||||
5 | Thread 1 | Thread 2 | Thread 3 | Thread 4 | Pre-Edge | Crash Program | Complex | Cybercombat | 1 | LOG | INT+FW | - | 23 | 9 | &{template:default} {{name=Crash Program @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k9]]=[Attack 9] vs. INT+FW}} {{Desc= Name a program; if active, that program ends and cannot be loaded again until the device it was running on is rebooted}} | Name a program; if active, that program ends and cannot be loaded again until the device it was running on is rebooted | 0 | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||
6 | Cyberdeck | 8 | 7 | 6 | 5 | Data Spike | Complex | Cybercombat | 0 | LOG | INT+FW | - | 23 | 9 | &{template:default} {{name=Data Spike @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k9]]=[Attack 9] vs. INT+FW}} {{Desc= Deal matrix damage equal to Attack + 2 per mark + net hits, resisted with WIL+FW}} | Deal matrix damage equal to Attack + 2 per mark + net hits, resisted with WIL+FW | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||
7 | Allocation | Attack | Firewall | Data Processing | Sleaze | Limit Bonus | Denial of Service | Simple | Cybercombat | Varies | LOG | WIL+FW | - | 23 | 9 | &{template:default} {{name=Denial of Service @ ?{Situational Modifier|0}}} {{Act=Simple}} {{[[(23+?{Situational Modifier|0})d6>5k9]]=[Attack 9] vs. WIL+FW}} {{Desc= The net hits on this test are applied as a dice pool malus to any actions performed using that device until the start of the next combat turn. If performed multiple times on the same device, only the greatest penalty applies. This action is not subject to the normal rules about making multiple attacks.}} | The net hits on this test are applied as a dice pool malus to any actions performed using that device until the start of the next combat turn. If performed multiple times on the same device, only the greatest penalty applies. This action is not subject to the normal rules about making multiple attacks. | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||
8 | Overclocked | 0 | 0 | 0 | 0 | 0 | Erase Mark | Complex | Computer | Special | LOG | WIL+FW | - | 23 | 9 | &{template:default} {{name=Erase Mark @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k9]]=[Attack 9] vs. WIL+FW}} {{Desc= Erases a mark on an icon you have 3 marks on. You can take -4 or -10 to remove a stack of 2 or 3.}} | Erases a mark on an icon you have 3 marks on. You can take -4 or -10 to remove a stack of 2 or 3. | 0 | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||
9 | Program Bonuses | 1 | 1 | 1 | 5 | PI-Tac Rating | Haywire | Complex | Cybercombat | 0 | LOG | WIL+FW | - | 23 | 9 | &{template:default} {{name=Haywire @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k9]]=[Attack 9] vs. WIL+FW}} {{Desc= Disables all PAN-related functions / wireless bonuses. Lasts until they succeed at Computer+Logic [DP] vs. hacker's net hits as a simple action. Glitches add to the threshold, critical glitch formats all devices.}} | Disables all PAN-related functions / wireless bonuses. Lasts until they succeed at Computer+Logic [DP] vs. hacker's net hits as a simple action. Glitches add to the threshold, critical glitch formats all devices. | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||
10 | PI-Tac Bonus | 0 | 0 | 0 | 0 | 0 | Jam Signals | Complex | Electronic Warfare | Owner | LOG | ― | - | 23 | 9 | &{template:default} {{name=Jam Signals @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k9]]=[Attack 9] vs. ―}} {{Desc= Add raw hits to noise within 100m, not selective}} | Add raw hits to noise within 100m, not selective | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||
11 | Optimized Thread | 0 | 0 | 0 | 0 | Apply BGC Penalty | Squelch | Complex | Electronic Warfare | 0 | LOG | INT+SLZ | - | 23 | 9 | &{template:default} {{name=Squelch @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k9]]=[Attack 9] vs. INT+SLZ}} {{Desc= Prevents target from calling or sending messages for Net Hits minutes.}} | Prevents target from calling or sending messages for Net Hits minutes. | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||
12 | Total | 9 | 8 | 7 | 10 | Sleaze | Check Overwatch Score | Simple | Electronic Warfare | 0 | LOG | 6 dice | - | 23 | 10 | &{template:default} {{name=Check Overwatch Score @ ?{Situational Modifier|0}}} {{Act=Simple}} {{[[(23+?{Situational Modifier|0})d6>5k10]]=[Sleaze 10] vs. 6 dice}} {{Desc= Learn OS prior to adding the grid's hits}} | Learn OS prior to adding the grid's hits | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||
13 | Control Device | Variable | Electronic Warfare | Varies | INT | INT+FW | - | 21 | 10 | &{template:default} {{name=Control Device @ ?{Situational Modifier|0}}} {{Act=Variable}} {{[[(21+?{Situational Modifier|0})d6>5k10]]=[Sleaze 10] vs. INT+FW}} {{Desc= Test is for controlling a device you don't have another test for.}} | Test is for controlling a device you don't have another test for. | 8 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||||||
14 | Format Device | Complex | Computer | 3 | LOG | WIL+FW | - | 23 | 10 | &{template:default} {{name=Format Device @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k10]]=[Sleaze 10] vs. WIL+FW}} {{Desc= Next time the target reboots, it doesn't start until someone replaces its boot code (Software+Logic [Mental] (12, 1 hour)). Device can still be used mechanically if applicable.}} | Next time the target reboots, it doesn't start until someone replaces its boot code (Software+Logic [Mental] (12, 1 hour)). Device can still be used mechanically if applicable. | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||||||
15 | Persona Settings | Wound Penalty | IC active | Garbage In/Garbage Out | Complex | Software | 3 | LOG | LOG+FW | - | 23 | 10 | &{template:default} {{name=Garbage In/Garbage Out @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k10]]=[Sleaze 10] vs. LOG+FW}} {{Desc= Change one input to correspond to one 'wrong' output. e.g. fire command -> eject clip, or go to 23rd floor instead of lobby, or invert friend/foe. Rebooting restores the device.}} | Change one input to correspond to one 'wrong' output. e.g. fire command -> eject clip, or go to 23rd floor instead of lobby, or invert friend/foe. Rebooting restores the device. | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||||||
16 | Interface Mode | Hot-sim VR | Icon Running Silent? | Visible | 0 | Hack on the Fly | Complex | Hacking | 0 | LOG | INT+FW | - | 23 | 10 | &{template:default} {{name=Hack on the Fly @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k10]]=[Sleaze 10] vs. INT+FW}} {{Desc= Get a mark on the target & 1 matrix perception per 2 net hits (round down). Take -4 for 2 marks, -10 for 3}} | Get a mark on the target & 1 matrix perception per 2 net hits (round down). Take -4 for 2 marks, -10 for 3 | 0 | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||
17 | Hide | Complex | Electronic Warfare | Owner | INT | INT+DP | - | 21 | 10 | &{template:default} {{name=Hide @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(21+?{Situational Modifier|0})d6>5k10]]=[Sleaze 10] vs. INT+DP}} {{Desc= Target loses spotting on you if they don't have a mark}} | Target loses spotting on you if they don't have a mark | 8 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||||||
18 | PC Attributes | PC Skills | Masquerade | Complex | Hacking | 2/Persona | INT | LOG+FW | - | 21 | 10 | &{template:default} {{name=Masquerade @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(21+?{Situational Modifier|0})d6>5k10]]=[Sleaze 10] vs. LOG+FW}} {{Desc= Need 2 marks on the Model (persona) and 2 on the Buttmonkey (any icon). Buttmonkey resists. For each net hit, Buttmonkey believes you are the model for 1 minute. With this you can impersonate them online, intercept calls, use social media, email, etc. but not change owners or perform financial transfers.}} | Need 2 marks on the Model (persona) and 2 on the Buttmonkey (any icon). Buttmonkey resists. For each net hit, Buttmonkey believes you are the model for 1 minute. With this you can impersonate them online, intercept calls, use social media, email, etc. but not change owners or perform financial transfers. | 8 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||||
19 | Base | Augmentation | Total | Computer | 10 | Popup | Simple | Hacking | 1 | LOG | WIL+FW | - | 23 | 10 | &{template:default} {{name=Popup @ ?{Situational Modifier|0}}} {{Act=Simple}} {{[[(23+?{Situational Modifier|0})d6>5k10]]=[Sleaze 10] vs. WIL+FW}} {{Desc= Target must be a persona not running in VR and has sensory enhancement. They are flooded with AR spam, taking -Net Hits to all actions until the end of the combat turn. Also gives matrix damage or perception as Brute Force/HotF.}} | Target must be a persona not running in VR and has sensory enhancement. They are flooded with AR spam, taking -Net Hits to all actions until the end of the combat turn. Also gives matrix damage or perception as Brute Force/HotF. | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||||
20 | BOD | 5 | 0 | 5 | Cybercombat | 10 | Probe Encryption | Special (2m) | Hacking | 3 | LOG | DRating*2 | - | 23 | 10 | &{template:default} {{name=Probe Encryption @ ?{Situational Modifier|0}}} {{Act=Special (2m)}} {{[[(23+?{Situational Modifier|0})d6>5k10]]=[Sleaze 10] vs. DRating*2}} {{Desc= You may spend two minutes attempting to quietly break a file's encryption, at the end rolling Hacking + Logic [Sleaze] vs. Protection Rating x2 to see if you succeed. If you do the encryption is removed without alerting the file's owner.}} | You may spend two minutes attempting to quietly break a file's encryption, at the end rolling Hacking + Logic [Sleaze] vs. Protection Rating x2 to see if you succeed. If you do the encryption is removed without alerting the file's owner. | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||
21 | INT | 6 | 2 | 8 | Electronic Warfare | 10 | Set Data Bomb | Complex | Software | 1 | LOG | DRating*2 | - | 23 | 10 | &{template:default} {{name=Set Data Bomb @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k10]]=[Sleaze 10] vs. DRating*2}} {{Desc= Set a data bomb. Choose rating, up to net hits. Choose delete behaviour. Choose password. Bomb will do (Rating)d6 matrix damage (resisted normally) to the icon that tripped it, then deletes the file if set that way, then deletes itself.}} | Set a data bomb. Choose rating, up to net hits. Choose delete behaviour. Choose password. Bomb will do (Rating)d6 matrix damage (resisted normally) to the icon that tripped it, then deletes the file if set that way, then deletes itself. | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||
22 | LOG | 6 | 3 | 9 | Hacking | 10 | Snoop | Complex | Electronic Warfare | 1 | INT | LOG+FW | - | 21 | 10 | &{template:default} {{name=Snoop @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(21+?{Situational Modifier|0})d6>5k10]]=[Sleaze 10] vs. LOG+FW}} {{Desc= Intercept matrix traffic sent to/from the target for as long as you have it marked. You can listen to, view, or read the data live, or save it for later.}} | Intercept matrix traffic sent to/from the target for as long as you have it marked. You can listen to, view, or read the data live, or save it for later. | 8 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||
23 | WIL | 6 | 0 | 6 | Hardware | 10 | Spoof Command | Complex | Hacking | 1 | INT | LOG+FW | - | 21 | 10 | &{template:default} {{name=Spoof Command @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(21+?{Situational Modifier|0})d6>5k10]]=[Sleaze 10] vs. LOG+FW}} {{Desc= Make target think owner sent it a command. Need 1 mark on the owner icon you imitate, none on the target. Target device/agent (nothing else) resists.}} | Make target think owner sent it a command. Need 1 mark on the owner icon you imitate, none on the target. Target device/agent (nothing else) resists. | 8 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||
24 | REA | 4 | 0 | 4 | Software | 10 | Subvert Infrastructure | Complex | Electronic Warfare | 1 | INT | INT+FW | - | 21 | 10 | &{template:default} {{name=Subvert Infrastructure @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(21+?{Situational Modifier|0})d6>5k10]]=[Sleaze 10] vs. INT+FW}} {{Desc= Targets a host. Control one simple device (lights, vending machines, home appliances, etc) slaved to the host for each net hit. No attacking. Sustain each turn with a complex action.}} | Targets a host. Control one simple device (lights, vending machines, home appliances, etc) slaved to the host for each net hit. No attacking. Sustain each turn with a complex action. | 8 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||
25 | CHA | 6 | 0 | 6 | Watchdog | Complex | Electronic Warfare | 0 | LOG | LOG+FW | - | 23 | 10 | &{template:default} {{name=Watchdog @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k10]]=[Sleaze 10] vs. LOG+FW}} {{Desc= Place a mark and become aware of target's matrix actions before they use them, so you can interrupt with Haywire (-10), Popup (-10), or Squelch (-5). Awareness lasts as long as the mark.}} | Place a mark and become aware of target's matrix actions before they use them, so you can interrupt with Haywire (-10), Popup (-10), or Squelch (-5). Awareness lasts as long as the mark. | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||
26 | AGI | 3 | 0 | 3 | Data Processing | Calibration | Complex | Electronic Warfare | 1/Persona | LOG | ― | - | 23 | 7 | &{template:default} {{name=Calibration @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. ―}} {{Desc= Increase initiative score of up to [DP] personas on whom you have marks by 1 per 2 hits (round down).}} | Increase initiative score of up to [DP] personas on whom you have marks by 1 per 2 hits (round down). | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||||
27 | MAG/RES | 0 | Edge | 3 | Initiate Grade | 0 | Edit File | Complex | Computer | 1 | LOG | INT+FW | - | 23 | 7 | &{template:default} {{name=Edit File @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. INT+FW}} {{Desc= Create, change, copy, delete, or protect any kind of file. Defender is either the host or the owner (if it's not on a host). Each action can edit 1 detail (short paragraph, one detail of an image, two or three seconds of video or audio). Penalties for particularly tricky edits. To edit a continuous feed, do one per combat turn. If you copy a file, you are the new owner. Unresisted if using it to create encryption; raw hits determine the protection rating.}} | Create, change, copy, delete, or protect any kind of file. Defender is either the host or the owner (if it's not on a host). Each action can edit 1 detail (short paragraph, one detail of an image, two or three seconds of video or audio). Penalties for particularly tricky edits. To edit a continuous feed, do one per combat turn. If you copy a file, you are the new owner. Unresisted if using it to create encryption; raw hits determine the protection rating. | 0 | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||
28 | Matrix Initiative | Matrix Damage Resistance | I Am the Firewall | Complex/Interrupt (-5) | Computer | 0 | INT | ― | - | 21 | 7 | &{template:default} {{name=I Am the Firewall @ ?{Situational Modifier|0}}} {{Act=Complex/Interrupt (-5)}} {{[[(21+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. ―}} {{Desc= Add hits to defense pools of 7 allies with an AR feed until end of your next IP.}} | Add hits to defense pools of 7 allies with an AR feed until end of your next IP. | 8 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||||
29 | Matrix | Biofeedback | Data Bombs | Intervene | Interrupt (-5) | Computer | 0 | INT | ― | - | 21 | 7 | &{template:default} {{name=Intervene @ ?{Situational Modifier|0}}} {{Act=Interrupt (-5)}} {{[[(21+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. ―}} {{Desc= Only works if the device making the attack is wireless on and the hacker is aware of it. Add hits to a single ally's defense test.}} | Only works if the device making the attack is wireless on and the hacker is aware of it. Add hits to a single ally's defense test. | 8 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||||||
30 | 15+5D6 | &{template:default} {{name=Matrix Initiative}}{{[[15+5D6sd]]}} | 13 | 14 | 13 | Matrix Perception | Complex | Computer | 0 | INT | LOG+SLZ | - | 21 | 7 | &{template:default} {{name=Matrix Perception @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(21+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. LOG+SLZ}} {{Desc= Simple test or opposed if target running silent. One fact per net hit. SR5 p.235 for list of example facts.}} | Simple test or opposed if target running silent. One fact per net hit. SR5 p.235 for list of example facts. | 8 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||||
31 | Matrix Search | Special (1m, 30m, 12h) | Computer | 0 | INT | Threshold | - | 21 | 7 | &{template:default} {{name=Matrix Search @ ?{Situational Modifier|0}}} {{Act=Special (1m, 30m, 12h)}} {{[[(21+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. Threshold}} {{Desc= Search matrix or host for a topic. On the grid: (1, 1min) for General/Public; (3, 30mins) for Limited Interest/Not Publicized; (6, 12hr) for Hidden or Actively Hunted and Erased. For data protected by a host, you have to dive the host. Inside the host, (X, 1min), threshold set by GM.}} | Search matrix or host for a topic. On the grid: (1, 1min) for General/Public; (3, 30mins) for Limited Interest/Not Publicized; (6, 12hr) for Hidden or Actively Hunted and Erased. For data protected by a host, you have to dive the host. Inside the host, (X, 1min), threshold set by GM. | 0 | 8 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||||
32 | Noise | Reboot Device | Complex | Computer | 3 | LOG | WIL+FW | - | 23 | 7 | &{template:default} {{name=Reboot Device @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. WIL+FW}} {{Desc= Device shuts down and either immediately reboots, or stays offline for a set delay or until the power button is pressed. Either way, it comes back online at the end of the following Combat Turn. Dumpshock if in VR (p. 229). Only works on devices and your own persona, not other personas. Doesn't work if target is link-locked.}} | Device shuts down and either immediately reboots, or stays offline for a set delay or until the power button is pressed. Either way, it comes back online at the end of the following Combat Turn. Dumpshock if in VR (p. 229). Only works on devices and your own persona, not other personas. Doesn't work if target is link-locked. | 0 | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||||
33 | Noise Reduction | Noise Summary | Tag | Simple | Computer | 0 | LOG | INT+SLZ | - | 23 | 7 | &{template:default} {{name=Tag @ ?{Situational Modifier|0}}} {{Act=Simple}} {{[[(23+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. INT+SLZ}} {{Desc= Tag up to Net Hits devices on one PAN. Negates 2 dice of penalties from Visibility and Light/Glare, and allows one additional Take Aim as a fre action each IP. Sustain as a simple action each combat turn. Add PI-TAC level to number of targets. Allies must have AR to receive the bonus.}} | Tag up to Net Hits devices on one PAN. Negates 2 dice of penalties from Visibility and Light/Glare, and allows one additional Take Aim as a fre action each IP. Sustain as a simple action each combat turn. Add PI-TAC level to number of targets. Allies must have AR to receive the bonus. | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||||
34 | Antennae (Cyberears) | 3 | Datajack | Noise | 0 | Trace Icon | Complex | Computer | 2 | INT | WIL+SLZ | - | 21 | 7 | &{template:default} {{name=Trace Icon @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(21+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. WIL+SLZ}} {{Desc= You know the target persona or device's location for as long as you have at least one mark on them.}} | You know the target persona or device's location for as long as you have at least one mark on them. | 0 | 8 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||
35 | Fresnel Fabric (Rating) | 0 | Silence is Golden | Noise Reduction | 6 | Trackback | Extended (30m) | Computer | Owner | INT | 10+SLZ | - | 21 | 7 | &{template:default} {{name=Trackback @ ?{Situational Modifier|0}}} {{Act=Extended (30m)}} {{[[(21+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. 10+SLZ}} {{Desc= Once you've spotted a mark, you can trace it to its owner with a (10+Slz, 30min) test. If the target's sleaze rating changes, the number of hits changes too. If they are running silent, the trail will end in their vicinity, letting them know a silent icon is nearby.}} | Once you've spotted a mark, you can trace it to its owner with a (10+Slz, 30min) test. If the target's sleaze rating changes, the number of hits changes too. If they are running silent, the trail will end in their vicinity, letting them know a silent icon is nearby. | 8 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||||
36 | Vectored Signal Filter | Modified Noise | 0 | Change Icon | Simple | ― | Owner | ― | ― | - | 0 | - | &{template:default} {{name=Change Icon @ ?{Situational Modifier|0}}} {{Act=Simple}} {{[[(0+?{Situational Modifier|0})d6>5k-]]=[Data Processing -] vs. ―}} {{Desc= Changes the target's icon to one that you have a copy of or designed yourself. Doesn't fool matrix perception, but might fool personas who don't take the time to inspect}} | Changes the target's icon to one that you have a copy of or designed yourself. Doesn't fool matrix perception, but might fool personas who don't take the time to inspect | - | - | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||||||
37 | Signal Scrub | 2 | Quiet | Enter/Exit Host | Complex | ― | 1 | ― | ― | - | 0 | - | &{template:default} {{name=Enter/Exit Host @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(0+?{Situational Modifier|0})d6>5k-]]=[Data Processing -] vs. ―}} {{Desc= }} | - | - | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||||
38 | Grid Hop | Complex | ― | 0 | ― | ― | - | 0 | - | &{template:default} {{name=Grid Hop @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(0+?{Situational Modifier|0})d6>5k-]]=[Data Processing -] vs. ―}} {{Desc= }} | - | - | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||||||||
39 | Resist Matrix Actions | Invite Mark | Complex | ― | Owner | ― | ― | - | 0 | - | &{template:default} {{name=Invite Mark @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(0+?{Situational Modifier|0})d6>5k-]]=[Data Processing -] vs. ―}} {{Desc= }} | - | - | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||||||
40 | Full Matrix Defense | Send Message | Simple | ― | N/A or 1 | ― | ― | - | 0 | - | &{template:default} {{name=Send Message @ ?{Situational Modifier|0}}} {{Act=Simple}} {{[[(0+?{Situational Modifier|0})d6>5k-]]=[Data Processing -] vs. ―}} {{Desc= }} | - | - | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||||||
41 | Switch Interface Mode | Simple | ― | Owner | ― | ― | - | 0 | - | &{template:default} {{name=Switch Interface Mode @ ?{Situational Modifier|0}}} {{Act=Simple}} {{[[(0+?{Situational Modifier|0})d6>5k-]]=[Data Processing -] vs. ―}} {{Desc= }} | - | - | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||||||||||
42 | Attack | Sleaze | Data Processing | Break Target Lock | Simple | Electronic Warfare | 0 | INT | - | 21 | 7 | &{template:default} {{name=Break Target Lock @ ?{Situational Modifier|0}}} {{Act=Simple}} {{[[(21+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. }} {{Desc= }} | 8 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||||||||
43 | Brute Force (WIL+FW) | 14 | Control Device (INT+FW) | 16 | Edit File (INT+FW) | 16 | Confuse Pilot | Complex | Electronic Warfare | 0 | LOG | - | 23 | 7 | &{template:default} {{name=Confuse Pilot @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. }} {{Desc= }} | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||
44 | Crash Program (INT+FW) | 16 | Format Device (WIL+FW) | 14 | Matrix Perception(LOG+SLZ) | 19 | Detect Target Lock | Free | Computer | Owner | LOG | - | 23 | 7 | &{template:default} {{name=Detect Target Lock @ ?{Situational Modifier|0}}} {{Act=Free}} {{[[(23+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. }} {{Desc= }} | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||
45 | Data Spike (INT+FW) | 16 | Garbage In/Garbage Out (LOG+FW) | 17 | Reboot Device(WIL+FW) | 14 | Jump into Rigged Device | Complex | Electronic Warfare | 3 | LOG | WIL+FW | - | 23 | 7 | &{template:default} {{name=Jump into Rigged Device @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. WIL+FW}} {{Desc= Unresisted if owner gives permission. Can't jump in if someone else is already jumped in. Your persona fuses with the device's icon.}} | Unresisted if owner gives permission. Can't jump in if someone else is already jumped in. Your persona fuses with the device's icon. | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||
46 | Denial of Service (WIL+FW) | 14 | Hack on the Fly (INT+FW) | 16 | Tag(INT+SLZ) | 18 | Suppress Noise | Complex | Electronic Warfare | Owner | LOG | - | 23 | 7 | &{template:default} {{name=Suppress Noise @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. }} {{Desc= }} | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||
47 | Erase Mark (WIL+FW) | 14 | Masquerade(LOG+FW) | 17 | Trace Icon(WIL+SLZ) | 16 | Target Device | Complex | Electronic Warfare | 0 | LOG | - | 23 | 7 | &{template:default} {{name=Target Device @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(23+?{Situational Modifier|0})d6>5k7]]=[Data Processing 7] vs. }} {{Desc= }} | 9 | 10 | 0 | 0 | 2 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||
48 | Haywire (WIL+FW) | 14 | Popup(WIL+FW) | 14 | Firewall | Disarm Data Bomb | Complex | Software | 0 | INT | Rating * 2 | - | 21 | 8 | &{template:default} {{name=Disarm Data Bomb @ ?{Situational Modifier|0}}} {{Act=Complex}} {{[[(21+?{Situational Modifier|0})d6>5k8]]=[Firewall 8] vs. Rating * 2}} {{Desc= If you score any net hits, the data bomb is disarmed and deactivated. If not, it explodes, dealing (rating)d6 matrix damage (resisted normally) and destroying the file if set that way.}} | If you score any net hits, the data bomb is disarmed and deactivated. If not, it explodes, dealing (rating)d6 matrix damage (resisted normally) and destroying the file if set that way. | 8 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |||||||||||||||||||
49 | Popup(WIL+FW) | 14 | Snoop(LOG+FW) | 17 | Full Matrix Defense | Interrupt (-10) | ― | Owner | ― | ― | - | 0 | - | &{template:default} {{name=Full Matrix Defense @ ?{Situational Modifier|0}}} {{Act=Interrupt (-10)}} {{[[(0+?{Situational Modifier|0})d6>5k-]]=[Firewall -] vs. ―}} {{Desc= Add willpower to defense against Attack actions until next Combat Turn.}} | Add willpower to defense against Attack actions until next Combat Turn. | - | - | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||
50 | Squelch(INT+SLZ) | 18 | Spoof Command(LOG+FW) | 17 | Jack Out | Simple | Hardware | Owner | WIL | LOG+ATK | - | 18 | 8 | &{template:default} {{name=Jack Out @ ?{Situational Modifier|0}}} {{Act=Simple}} {{[[(18+?{Situational Modifier|0})d6>5k8]]=[Firewall 8] vs. LOG+ATK}} {{Desc= Jack out and reboot. Suffer dumpshock if in VR. Only resisted if link-locked; if so, you have to beat all link-lockers with a single roll.}} | Jack out and reboot. Suffer dumpshock if in VR. Only resisted if link-locked; if so, you have to beat all link-lockers with a single roll. | 6 | 10 | 0 | 0 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||||||||||
51 | Firewall | Subvert Infrastructure(INT+FW) | 16 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
52 | Jack Out(LOG+ATK) | 18 | Watchdog(LOG+FW) | 17 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
53 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
54 | Special Effects | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
55 | Smoke and Mirrors Strength | 5 | PuSHeD | Mercury-Alpha Booster | - | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
56 | Multidimensional Coprocessor | Overdrive | Trance | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
57 | Public Grid | Neocortical Nanites | 2 | Optimize Thread (Shadow Warrior, etc) | - | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
58 | Analyze Device | 0 | Heightened Concentration | Adept Centering | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
59 | Technomancer | Qualia | Limbic Nanites | 2 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
60 | Background Count | 0 | # of Marks to try for | 1 | Reckless Hacking | 0 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
61 | Sustaining Penalty | 0 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
62 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
63 | Tac-Apps | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
64 | Shield Wall | ECM-Warrior | Mobile CNC | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
65 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
66 | Qualities | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
67 | Codeslinger | - | Malware Infection | aVRse | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
68 | Impenetrable Logic | Sloppy Code | Incompetent | - | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
69 | Frostbite | - | Data Anomaly | Buddy System | - | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
70 | Rootkit | I C U | Mentor Spirit Bonus | - | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
71 | Trust Data, Not Lore | Trust Lore, Not Data | World Tree | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
72 | Go Big or Go Home | Hi-Rez | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
73 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
74 | Programs | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
75 | Location | Slot | Name | Description | Configured | Override | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
76 | Deck | 1 | Lockdown | Damaging a persona link-locks. | Lockdown | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
77 | 2 | Hammer | Improves Matrix damage. | Hammer | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
78 | 3 | Decryption | Improves Attack. | Decryption | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
79 | 4 | Smoke and Mirrors | Improve Sleaze, but across-the-board penalty for Matrix actions. | Smoke and Mirrors | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
80 | 5 | Agent | Is an agent. | Agent | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
81 | 6 | - | - | - | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
82 | Virtual Machine | 7 | - | - | - | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
83 | 8 | - | - | - | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
84 | MOS/DJ+ | 9 | Signal Scrub | Reduces noise. | Signal Scrub | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
85 | 10 | Toolbox | Improved Data Processing. | Toolbox | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
86 | 11 | Configurator | Store configs, recall them later. | Configurator | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
87 | MOS | 12 | - | - | - | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
88 | Program Carrier | 13 | Encryption | Improves Firewall. | Encryption | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
89 | 14 | - | - | - | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
90 | 15 | - | - | - | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
91 | S&M Strength | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
92 | Action Reference | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
93 | Action | Page Reference | Short Description | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
94 | Brute Force | CRB pg. 238 | Mark an icon illegally. Alerts upon success. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
95 | Crack File | CRB pg. 238 | Remove encryption from a File. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
96 | Crash Program | CRB pg. 238 | Crash a program the target is running. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
97 | Data Spike | CRB pg. 239 | Deal Matrix damage. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
98 | Denial of Service | KC pg. 37 | Penalize rolls for a wireless-on device. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
99 | Erase Marks | CRB pg. 239 | Erase marks from an icon. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
100 | Haywire | KC pg. 38 | Disable the wireless/PAN functionality for a persona's PAN. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||