Hacker

Hacker

Hacker

The Hacker can occasionally seem like a one-trick Pony, doing dedicated Matrix runs to grab research or screw with facility security. That’s a mistake: the Matrix shouldn’t be any less important to your game world than the internet is today, right? Social gatherings should be all-online affairs, or augmented reality events: imagine a room full of people, all wearing their Google Glass contact lenses, using it to immediately recognize the names, faces, and relevant biographies of everyone in the room… and the Hacker slipping in misinformation, creating discord and tension (e.g., the corp exec refers to the Governor’s wife by his mistress’ name). Street signs probably don’t exist anymore; AR overlays identify streets, as well as the least trafficky route to your current designation. Crowd-sourced restaurant reviews float up as you walk past them, and HealthNow (privatized public health inspection co.) ratings for restaurant cleanliness appear alongside. It shouldn’t take 5 rolls to turn a diarrhea-dump into a 5-star restaurant, right?

All of these things are opportunities for Hacker involvement, in ways small and large, and shouldn’t be ignored – they’re little bits of fun, add color and punk to the setting. They’re best implemented with minimum security – a login gate and no ICE, for instance, both to make it a breeze for a Hacker to play with on the fly, and to let Infiltrators and Techs have a chance at making a Matrix-based contribution to play.

Console Cowboy: The ‘standard’ Hacker, whose focus is on getting into systems and getting out again. The moves you’ll be making most often are Login, Manipulate Systems, and Compromise Security – requiring you to be competent across Synth, Mind, and Edge, which asks for a lot compared to what other playbooks need to excel in their niche’s. Part of the difficulty arises from the fact that we picture Hackers as both “getting data”, “manipulating systems,” and “breaking ICE.” There’re are a few roads forward, then: specialize in one or the other, or settle for being a jack of all trades. Accordingly:

* #Data Jockey:* Search Optimisation is probably your first choice of move, since you will never return empty-handed, and the Reporter’s Filthy Assistants will help make the most of the results, magnifying it into a team-wide +1forward rather than just an individual one. The way forward from here is open-ended, but in a world where information is money, I’d consider picking up the Fixer’s Hustling for data-infiltration jobs and getting your 2 Crew (less-expert hackers than you), and progressing towards a career as a data broker. If you go that route, make sure to grab Zeroed and start building yourself a false identity to work with. Your early program choices likely include Sift and Identity Protection.

* #Security Specialist: * Whether it’s to improve networked building security when you’re playing at white-hat, or you’re running an op, you focus getting into places you shouldn’t be and subverting their Matrix-controlled security systems. Your focus here is in Compromise Security and Manipulate Systems, requiring a high Mind and Synth. Accordingly, you’re likely best off grabbing the programs Lockdown and Manipulate, and the move Programming on the Fly – between those three elements, your successful moves come with 2 free hold, in effect turning all of your 7-9s into 10+s (and your 10+s become ridiculous). You may also consider getting a Remote Control Module; if a crew-member runs into a security drone, sure, you can probably hack it to just target its own people, but an RCM will allow you to run it with more nuance (oh, we need a distraction on the other side of the facility? Sure, I can activate a routine on a drone there, but maybe I want to be more subtle, and have it move an unsecured gun into a particular desk drawer – effectively using it to plant evidence, which isn’t how you ordinarily picture a Hacker running an op.) Tech Support looks like it would be appropriate for someone who’s actively running interference on building security for his team, but you’re on their comms channel, aren’t you? Grab the soldier’s Steady Presence instead.

If you’re not playing a one-shot, you might want to get the Soldier’s Slippery, too, for editing security monitor data to get out cleanly. Aside: in my group’s play this has become a Basic Move rather than a Soldier Move, it was a thing our crew tried to do from the get-go, every time. Who doesn’t try to cover up their involvement, unless they specifically want to leave a calling card, and how is it unique to a playbook? We just changed the Soldier move to turn the 7+ result into “no increase in corporate clocks in retaliation phase and reduce a corporate clock by one” and the 10+ result adds “If the target being blamed has a Threat or Corporate Clock against you, reduce it by 1; you fall under their radar as they deal with the consequences of “their” recent run.”

#ICE* Breaker:* Some Hackers focus on getting stuff out of a system; others about screwing with a building. You, though; your specialty is going where you’re rea-ea-eally not wanted, and you have to come prepared to fight. You might also be a member of a hacking collective, or partnered with an Infiltrator with Jack-In: in other words, you might just be the heavy artillery. Throw your +2 at Mind, and +1 on Edge; though you need Edge to break ICE, you’ll be rolling Mind for Console Cowboy, so it’s worth emphasizing. You’ll be using a Defensive Deck (Hardening 2, Firewall 2, Processor 1, Stealth 1), with Efficiency Routines (+2 Processor), Defend (+2 Firewall), and Identity Protection (+2 Stealth). Your early move choices involve Neural Scars, Black ICE Vet, and Ice Breaker. I’d recommend ICE Breaker first – it’s literally 3x more potent than Black ICE Vet (ICE Vet kills 1 option; the Breaker kills the routine, which is 3 options), followed by Black ICE Vet (there are too many choices for Black ICE to screw with you besides Harm, so Neural Scars just tells the MC to use Traces and goons instead). That said, I’d aim pretty soon to get the Tech’s Expertise: Breadboarder, which will give you a back-up deck (Hardening 1, Firewall 1, Processor 2, Stealth 1), and an extra 3 programs (Identity Protection, Alert, Eject). The latter is a board you can use to get in and Assess a network; you can come in with your original deck to do your actual damage. With money and upgrades, you can really build up a pair of specialized tools to run with – but more importantly, you can now do deck repairs, which you’ll need to do on a regular basis if you’re running against Black ICE. I wouldn’t want to give a third party the opportunity to plant bugs in my hardware by outsourcing repairs.

I honestly find the ICE Breaker a kind of boring character: Black ICE will either be too rare to build your character around or, if it’s common enough to be an ongoing issue, you should basically be starting with several advances under your belt already, and already be capable as one of the previous types of Hackers. It’s weird in that any other character can basically be good at what they do, and assume they’re good at “easier version” of what they do, for free. Hackers, on the other hand, have their moves divided pretty sharply between “violating security in the Matrix” and “surviving security measures in the Matrix.” It’s odd for the two to seem parallel rather than appear in logical progression. IMO, the best way for an MC to make this work, is to save ICE until later in the campaign (so that it is a logical progression), but throw lots of Blue ICE around, to make the ICE Breaker feel reasonably efficacious). At the same time, make sure there are plenty of low-stakes targets that have no ICE at all: a reminder that this character is built for swimming with Sharks, not Guppies.

Idoru: Some Hackers focus on breaking into machines and networks, on riding the neon roads of mass hallucination. Others appreciate the art of Social Engineering, though; with so much of modern communication and interaction now occurring through virtual or augmented reality, a competent hacker can insinuate himself into all sorts of places – for data, for persuasion, for misdeeds. Rep needs a recognizable avatar – but it doesn’t have to be your avatar; use it for slipping into Matrix-mediated gatherings you don’t belong in. Word on the Street can be useful for Legwork done in this way (just because it’s “street level” doesn’t mean it happened in a bar, right?), and the Hunter’s Human Terrain and Eye For Detail may also allow for oppo research on virtual gatherings.

6 thoughts on “Hacker”

  1. If anyone has any criticisms, disagreements, addendums, etc. it’s all to the better. I wouldn’t be against incorporating people’s comments and consolidating the results into a player resource.

  2. I think it can be important whether your cyberpunk world is one where:

    A)The hacker can sit in a basement on the other side of the world and hack the most important data in the world (but still be at risk when they’re traced and a corporate tac team air drops in)

    Or

    B) If the corporations of your world take reasonable precautions like keeping anything worth the hacker’s time on a network she needs to physically access on-site or close to on-site.

    I think the later is much more interesting. Now part of the mission is getting the hacker to an access point and keeping a security guard from putting a bullet through the hacker’s deck or the hacker’s meat. Now they’re part of the game in a larger capacity than the basement mushroom hacker. The mushroom hacker should just be an NPC.

  3. J Stein I was literally just thinking “Is this guy making an advanced player guide?”

    I think you are making an advance players guide… 🙂

    Curious to hear you thoughts on the playbooks you haven’t written up yet

  4. Matt Petruzzelli

    Matt, a couple of great points!

    I think there’s really room for both, having to do more with targets than the type of campaign. For instance, I’ve been working recently on writing up government entities as corporations – I feel like corps wouldn’t want to take over, say, sanitation, but that our dying governance institutions would probably outsource sanitation to KwiqKuddlyKleaners, Inc. This allows you to turn a single city’s sanitation into a massive, sprawling corp., but one that also probably doesn’t have the sort of data that merits significant data security. So, if your run isn’t against MegaTech, but against KKK Inc. to find out why a particular neighborhood has had its clean water cut off (turns out they’ve been paid off to push out the people living there, because it’s cheaper than settling a suit over the toxic waste dumping from the factory next door)… well, that’s totally the sort of thing to be done from home. Street-lights? Totally do-able from anywhere.

    (But, in fairness, I like my cyberpunk less “3 corps rule the world with 500 subsidiaries,” to “500 corps are fucking each other with switchblades for control of the world, with a dozen chainsaw-armed zombie sharks swimming among them.” Fundamentally, relationship maps are fun and give the world texture.)

    OTOH, a run against MegaTech’s military hardware R&D? Air-gapped as fuck; you’re going in personally. And, of course, there’s stuff in between: maybe the Infiltrator has a satellite relay for you, and your goal is to get the infiltrator in so that they can hook it up and let the Hacker work remotely. I’d probably see a lot more runs like that if we had an Infiltrator w/ Jack-In working alongside a Hacker. Heck, maybe if you’re that Hustler Hacker, you’re going in personally to un-air-gap the network and break down the ICE, and your Crew are going in after you to bat cleanup w/ Research rolls so you have a little extra [credit] to rake in subsequently.

  5. +Omari Brooks Hah!

    I don’t know about “advanced,” but I do like to see what kind of texture we can create with the playbooks. I feel like seeing a couple of move combinations turned into an archetype can really help get a feel for the role the playbook fulfills in the game and in the setting; I know that Arvid did that for me with his AW playbook write-ups.

    I’ll keep writing these up, and maybe after I get more feed-back take a second pass at a more tightly edited version.

    I’m definitely very, very open to people contributing on the Reporter, Tech, and Hunter though. The former is one I haven’t really seen played in my groups, and I can’t envision it as anything but Spider Jerusalem. Reporter doesn’t really feel like anyone that should be going on an op.

    The Hunter I’ve seen in play a few times, but they never really had a strong common thread that I think of as “Hunter”; the playbook seems both very multi-faceted and weak on core concept, so it just seems to get amorphous. That may just be my group’s experience, though, so like I said; I’m very open to input from folks.

    As for the Tech; he hasn’t been attractive enough for anyone in my groups to play, and on naked reading he looks like he should just be an NPC. His moves boil down to basically three categories: “Should be an infiltrator move”, “Weaker version of someone else’s shtick,” and “Should hire an NPC for that.” I’ll give them the best write-up I can, but I’d love to hear input from people that have had success with them in play rather than in theory.

    Edit: For clarity, when I say “successful,” I mean “fictionally successful.” Any playbook can be mechanically effective, but like… the Hacker has a strong fictional presence, right? People want to play Hackers and when they do, they get a capital H. You don’t play a Hacker and pick up a bunch of Soldier moves (usually), because it’s a deviation from the fictional and mechanical niche of the Hacker.

    Same goes for Killers, say. But if your Hunters and Techs don’t have coherent fictional standing – if they’re just a collection of playbook moves – and they become some non-specific idiosyncratic thing every time they’re played, that ends up aligning with some other playbook’s niche… well, I don’t think of that as “successful.” I think “those are a couple of moves that should be moved to another playbook.” I hope I’m being reasonably articulate there? I guess the short version is: “I haven’t seen a successful niche for these playbooks in practice.” I do believe the “in practice” part is really important; I can formulate crap in theory, but the play’s the thing.

Comments are closed.