Implant Data
Implant Data
Implant Data (3 Dice)
Action, Check (any Ship Deck, Communications Devices, Computing Devices)
Putting data where it shouldn’t be without leaving a digital fingerprint is a tricky task, but when you cover your tracks most people simply believe what’s on their screens.
You implant data within a device, such as adding names to a company roster or falsifying records. The result of your hacking tools check is also used as the DC of Investigation checks made to determine that the information you implanted is inaccurate and has been tampered with.
Freeze Engines
Freeze Engines
Freeze Engines (4 Dice)
Action, Check (Engine Decks, Starfighters, Vehicles)
Engines are so complex that all it takes is bypassing the internal safety protocols to make something go wrong.
The device’s engines cease to function while you are hacking it. Devices hacked in this way cannot move, perform any starfighter maneuvers, or make any system maneuvers that require movement. If the hacked device is currently within a planet’s atmosphere or gravity well it begins falling downward at a rate of 500 feet per round. Once your hack ends, the engine regains full functionality.
Drop Shields
Drop Shields
Drop Shields (3 Dice)
Action, Check (Construct Creatures, Forcefields, Shielding Devices, Shield Generation Decks, Starfighters)
Shields and forcefields are excellent defenses in the physical world but of little use in the digital realms.
Any temporary hit points the target has gained from a shield or forcefield are immediately lost. Devices hacked in this way cannot gain temporary hit points from their shields or forcefields while you are hacking the device. If the hacked device is forcefield armor, the AC provided by the hacked armor is reduced to 10 + the wearer’s Dexterity modifier while it is being hacked. Once your hack ends, the forcefield regains full functionality.
Disable Deck
Disable Deck
Disable Deck (3 Dice)
Action, Check (any Ship Deck)
Most ship systems have internal lockouts to prevent hacking—it’d be a shame to trigger that intentionally to lockout the intended users.
No actions or ship maneuvers can be made using the device while you are hacking it. Once your hack ends, the device regains full functionality.
Digital Filter
Digital Filter
Digital Filter (4 Dice)
Action, Save (Camera Systems, Construct creatures)
You can use high speed editing viruses to literally strip content out of mechanical eyes.
The device makes a Wisdom saving throw or you make any number of creatures and objects unseen to it. The device treats your selected creatures and objects as invisible, and cannot visually perceive them so long as you are hacking the device. Any visual information the device transmits appears as normal, except your chosen creatures and objects are unseen so do not appear within them.
Digital Pickpocket
Digital Pickpocket
Digital Pickpocket (2 Dice)
Action, Check (Communications Devices, Computing Devices)
Most accounts lock up tight when an attempt is made to empty them out so the smartest thieves collect their ill–gotten gains in little innocuous bits.
Transfer up to 5% of the credits in an account linked to the hacked device into an account of your own. Software on a monied account is usually very tight however, and when you begin this hack your hacking countdown becomes a fast countdown (dice are removed from the pool on a result of 4, 5, or 6).
Delete Data
Delete Data
Delete Data (1 Die)
Action, Check (any Ship Deck, Camera Systems, Communications Devices, Computing Devices)
With professional subterfuge sometimes you just need to wipe the records clean.
You remove data within a device, such as wiping recent camera footage or erasing the contents of a ship’s manifest. The result of your hacking check is also used as the DC of Investigation checks made to determine that the information was deleted by a hacker and isn’t simply missing or corrupted.
Copy Database
Copy Database
Copy Database (3 Dice)
Action, Check (Communications Devices, Computing Devices)
Passwords, dates, names, bank accounts—all sorts of data is yours for the taking once you’ve cracked a system.
You completely copy and download the data contained within the device into your hacking tools. If the Narrator determines that the databases of the device are too massive to be stored on a personal device, you may instead download all information regarding a certain subject. If the data is encrypted, this maneuver does not also decrypt it.
Bug The Line
Bug The Line
Bug the Line (1 Die)
Action, Check (any Ship Deck, Communications Devices)
You subtly patch yourself into lines of communication thought to be secure.
So long as you are hacking the device you are able to see and hear anything transmitted through it. If you hack a ship’s deck in this way, you are instead able to see and hear everything transmitted through that ship’s comms (including correspondence between it and any starfighters launched from it).
Blackout
Blackout
Blackout (2 Dice)
Action, Save (Camera Systems, Construct creatures)
Crashing a visual feed is one of the oldest tricks in a hacker’s book.
The device makes a Wisdom saving throw or is blinded and cannot transmit visual information so long as you are hacking the device.