20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Matrix phenoMena . . . . . . . . . . . . . . . . . . . . . . . . . . .<br />

168<br />

Programs: Analyze (R), Attack (R – 1), Browse (R), Command<br />

(R), Edit (R), Exploit (R), Homeground (R), Stealth (R)<br />

Qualities: Code Flux, Corruptor, Real World Naivete, Rootkit<br />

Predators: For many years, predator AIs were a digital urban<br />

legend. More recently, however, their existence has been confirmed.<br />

It is speculated that some predators evolved from offensive<br />

software and IC programs, whereas others developed their codedevouring<br />

abilities as a way of sustaining themselves. Whatever the<br />

case, predator AIs have been blamed for a number of attacks on<br />

persona and software in the Matrix—some of them lethal.<br />

CHA INT LOG WIL EDG Matrix INIT IP<br />

R – 1 R + 1 R R R + 1 INT + Response + 2 3<br />

Skills: Computer (R), Cybercombat (R + 2), Hacking (R)<br />

Programs: Analyze (R), Armor (R), Attack (R + 1), Blackout or<br />

Black Hammer (R), Cascading (1), Exploit (R), Stealth (R), Track<br />

(R)<br />

Qualities: Codivore, Real World Naivete, Redundancy, Snooper<br />

xenosapient ais<br />

The rarest and most<br />

alien of the AIs, the personal<br />

agendas of<br />

xenosapients differ<br />

extremely from<br />

any metahuman<br />

way of thinking.<br />

In most cases, their<br />

former programming is<br />

no longer recognizable.<br />

These species show<br />

a high level of intelligence,<br />

but they are<br />

often incapable of communicating<br />

with other<br />

Matrix users due to their<br />

alien way of thinking.<br />

Archivists: Archivists are<br />

collectors, hoarders, and scavengers—<br />

they have an insatiable appetite for<br />

data. Some seek to copy and collect data<br />

of all sorts, where others are only interested<br />

in information applying to a very specific interest. Rumors exist of<br />

huge hidden data archives created by these AIs. Some corps have established<br />

high bounties for captured archivist AIs, while others seek<br />

to employ them. Archivists are rarely interested in interacting with<br />

other users in the Matrix, beyond the fact that they might be carrying<br />

useful data.<br />

CHA INT LOG WIL EDG Matrix INIT IP<br />

R – 2 R + 1 R + 2 R R INT + Response 3<br />

Skills: Computer (R), Data Search (R + 2), Hacking (R)<br />

Programs: Analyze (R), Browse (R + 2), Decrypt (R + 2), Defuse<br />

(R), Edit (R), Encrypt (R), Exploit (R), Homeground (R), Purge<br />

(R), Stealth (R)<br />

Qualities: Code Flux, Real World Naivete, Redundancy,<br />

Rootkit<br />

Assemblers: Likely born from programming suites, software<br />

compilers, operating system kernels, and boot programs, assemblers<br />

seem only to be interested in starting and maintaining other<br />

software. Even more than other xenosapients, assembler AIs are<br />

oblivious to most Matrix user activity, though their interest in<br />

other programs ranges from obsessive to flighty.<br />

CHA INT LOG WIL EDG Matrix INIT IP<br />

R – 2 R – 2 R + 3 R + 1 R + 1 INT + Response 3<br />

Skills: Cracking skill group (R), Electronics skill group (R +1)<br />

Programs: Analyze (R), Browse (R), Command (R), Edit (R),<br />

Expert Defense (2), Exploit (R – 1), Homeground (R + 2), Medic<br />

(R + 2), Purge (R), Spoof (R), Stealth (R)<br />

Qualities: Authority, Emulate, Real World Naivete, Spawn<br />

Sculptors: Sculptors are interested in one thing: designing<br />

and remodeling the virtual world. They program or rewrite the<br />

iconography of chosen nodes into abstract metaphors that only<br />

make sense to them, sometimes becoming more efficient, sometimes<br />

not.<br />

CHA INT LOG WIL EDG Matrix INIT IP<br />

R + 1 R + 2 R R + 1 R INT + Response 3<br />

Skills: Computer (R), Hacking (R), Software (R + 1)<br />

Programs: Analyze (R + 1), Browse (R), Command (R), Edit (R<br />

+ 2), Exploit (R), Homeground (R), Medic (R), Reality Filter (R),<br />

Stealth (R)<br />

Qualities: Code Flux, Designer, Improved Realignment, Real<br />

World Naivete<br />

poSitive ai QUaLitieS<br />

These are just a sampling of the qualities that some AIs are<br />

known to have; gamemasters are encouraged to create their own.<br />

authority<br />

The AI is adept at convincing programs and devices that its<br />

orders are coming from a trusted and privileged source. It receives<br />

a +2 modifier on Spoof Command Tests (p. 224, SR4) and the<br />

modifier for hacking security or admin accounts is reduced by 2<br />

(so +1 for security and +4 for admin).<br />

code flux<br />

Like agents and other autonomous programs, AIs have a<br />

built-in access ID (see p. 110). The access code of an AI with this<br />

quality, however, fluctuates on a semi-random basis when it moves<br />

between nodes. This can make the AI exceptionally difficult to<br />

track, as its datatrail will only lead up to the point where its access<br />

ID fluxed into a new one.<br />

codivore<br />

The AI can “devour” the code of defeated agents, personas,<br />

IC, and even other AIs, by ripping these other programs apart,<br />

cannibalizing useful subroutines, and incorporating them into its<br />

own source code. After defeating its opponent in cybercombat,<br />

the AI makes a Rating x 2 (opponent’s Pilot or System, 1 Initiative<br />

Pass) Extended Test. Once successful, the AI receives a dice pool<br />

modifier equal to half of the defeated icon’s Pilot/System (whichever<br />

is higher) for its next Medic or Healing Test.<br />

designer<br />

Some AIs are masters of restructuring nodes to achieve maximum<br />

hardware efficiency. Their self-designed home node (see My<br />

Home is My Castle, p. 166) grants them an additional +2 modifier<br />

to the Response and Signal attributes.<br />

Unwired<br />

Simon Wentworth (order #1132857) 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!