comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Matrix phenoMena . . . . . . . . . . . . . . . . . . . . . . . . . . .<br />
168<br />
Programs: Analyze (R), Attack (R – 1), Browse (R), Command<br />
(R), Edit (R), Exploit (R), Homeground (R), Stealth (R)<br />
Qualities: Code Flux, Corruptor, Real World Naivete, Rootkit<br />
Predators: For many years, predator AIs were a digital urban<br />
legend. More recently, however, their existence has been confirmed.<br />
It is speculated that some predators evolved from offensive<br />
software and IC programs, whereas others developed their codedevouring<br />
abilities as a way of sustaining themselves. Whatever the<br />
case, predator AIs have been blamed for a number of attacks on<br />
persona and software in the Matrix—some of them lethal.<br />
CHA INT LOG WIL EDG Matrix INIT IP<br />
R – 1 R + 1 R R R + 1 INT + Response + 2 3<br />
Skills: Computer (R), Cybercombat (R + 2), Hacking (R)<br />
Programs: Analyze (R), Armor (R), Attack (R + 1), Blackout or<br />
Black Hammer (R), Cascading (1), Exploit (R), Stealth (R), Track<br />
(R)<br />
Qualities: Codivore, Real World Naivete, Redundancy, Snooper<br />
xenosapient ais<br />
The rarest and most<br />
alien of the AIs, the personal<br />
agendas of<br />
xenosapients differ<br />
extremely from<br />
any metahuman<br />
way of thinking.<br />
In most cases, their<br />
former programming is<br />
no longer recognizable.<br />
These species show<br />
a high level of intelligence,<br />
but they are<br />
often incapable of communicating<br />
with other<br />
Matrix users due to their<br />
alien way of thinking.<br />
Archivists: Archivists are<br />
collectors, hoarders, and scavengers—<br />
they have an insatiable appetite for<br />
data. Some seek to copy and collect data<br />
of all sorts, where others are only interested<br />
in information applying to a very specific interest. Rumors exist of<br />
huge hidden data archives created by these AIs. Some corps have established<br />
high bounties for captured archivist AIs, while others seek<br />
to employ them. Archivists are rarely interested in interacting with<br />
other users in the Matrix, beyond the fact that they might be carrying<br />
useful data.<br />
CHA INT LOG WIL EDG Matrix INIT IP<br />
R – 2 R + 1 R + 2 R R INT + Response 3<br />
Skills: Computer (R), Data Search (R + 2), Hacking (R)<br />
Programs: Analyze (R), Browse (R + 2), Decrypt (R + 2), Defuse<br />
(R), Edit (R), Encrypt (R), Exploit (R), Homeground (R), Purge<br />
(R), Stealth (R)<br />
Qualities: Code Flux, Real World Naivete, Redundancy,<br />
Rootkit<br />
Assemblers: Likely born from programming suites, software<br />
compilers, operating system kernels, and boot programs, assemblers<br />
seem only to be interested in starting and maintaining other<br />
software. Even more than other xenosapients, assembler AIs are<br />
oblivious to most Matrix user activity, though their interest in<br />
other programs ranges from obsessive to flighty.<br />
CHA INT LOG WIL EDG Matrix INIT IP<br />
R – 2 R – 2 R + 3 R + 1 R + 1 INT + Response 3<br />
Skills: Cracking skill group (R), Electronics skill group (R +1)<br />
Programs: Analyze (R), Browse (R), Command (R), Edit (R),<br />
Expert Defense (2), Exploit (R – 1), Homeground (R + 2), Medic<br />
(R + 2), Purge (R), Spoof (R), Stealth (R)<br />
Qualities: Authority, Emulate, Real World Naivete, Spawn<br />
Sculptors: Sculptors are interested in one thing: designing<br />
and remodeling the virtual world. They program or rewrite the<br />
iconography of chosen nodes into abstract metaphors that only<br />
make sense to them, sometimes becoming more efficient, sometimes<br />
not.<br />
CHA INT LOG WIL EDG Matrix INIT IP<br />
R + 1 R + 2 R R + 1 R INT + Response 3<br />
Skills: Computer (R), Hacking (R), Software (R + 1)<br />
Programs: Analyze (R + 1), Browse (R), Command (R), Edit (R<br />
+ 2), Exploit (R), Homeground (R), Medic (R), Reality Filter (R),<br />
Stealth (R)<br />
Qualities: Code Flux, Designer, Improved Realignment, Real<br />
World Naivete<br />
poSitive ai QUaLitieS<br />
These are just a sampling of the qualities that some AIs are<br />
known to have; gamemasters are encouraged to create their own.<br />
authority<br />
The AI is adept at convincing programs and devices that its<br />
orders are coming from a trusted and privileged source. It receives<br />
a +2 modifier on Spoof Command Tests (p. 224, SR4) and the<br />
modifier for hacking security or admin accounts is reduced by 2<br />
(so +1 for security and +4 for admin).<br />
code flux<br />
Like agents and other autonomous programs, AIs have a<br />
built-in access ID (see p. 110). The access code of an AI with this<br />
quality, however, fluctuates on a semi-random basis when it moves<br />
between nodes. This can make the AI exceptionally difficult to<br />
track, as its datatrail will only lead up to the point where its access<br />
ID fluxed into a new one.<br />
codivore<br />
The AI can “devour” the code of defeated agents, personas,<br />
IC, and even other AIs, by ripping these other programs apart,<br />
cannibalizing useful subroutines, and incorporating them into its<br />
own source code. After defeating its opponent in cybercombat,<br />
the AI makes a Rating x 2 (opponent’s Pilot or System, 1 Initiative<br />
Pass) Extended Test. Once successful, the AI receives a dice pool<br />
modifier equal to half of the defeated icon’s Pilot/System (whichever<br />
is higher) for its next Medic or Healing Test.<br />
designer<br />
Some AIs are masters of restructuring nodes to achieve maximum<br />
hardware efficiency. Their self-designed home node (see My<br />
Home is My Castle, p. 166) grants them an additional +2 modifier<br />
to the Response and Signal attributes.<br />
Unwired<br />
Simon Wentworth (order #1132857) 9