Matrix Decoded

The Matrix Decoded


Matrix Actions

Free Actions

Name Note
Load Program Load a program onto your Cyberdeck/Commlink
Switch Two Matrix Attributes Reconfigure Cyberdeck
Swap Two Programs Switch one Loaded Program for Another
Unload Program Turn off a Running Program

Simple Actions

Name Marks Test
Change Icon Owner N/A
Check Overwatch Score - Electronic Warfare + Logic [Sleaze] vs. 6 Dice
Invite Mark Owner N/A
Jack Out Owner Hardware + Willpower [Firewall] vs. Logic + Attack
Send Message - N/A
Switch Interface Mode Owner N/A

Complex Actions

Name Marks Test
Format Device 3 Computer + Logic [Sleaze] v. Willpower + Firewall
Reboot Device 3 Computer + Logic [Data Processing] vs. Willpower + Firewall
Spoof Command 1 Hacking + Intuition [Sleaze] vs. Logic + Firewall
Crack File 1 Hacking + Logic [Attack] vs. 2 * Protection Rating
Disarm Data Bomb - Software + Intuition [Firewall] vs. 2 * Data Bomb Rating
Edit File 1 Computer + Logic [Data Processing] vs. Intuition + Firewall
Set Data Bomb 1 Software + Logic [Sleaze] vs. 2 * Data Bomb Rating
Matrix Perception - Computer + Intuition [Data Processing] (vs. Logic + Sleaze)
Snoop 1 Electronic Warfare + Intuition [Sleaze] vs. Logic + Firewall
Trace Icon 2 Computer + Intuition [Data Processing] vs. Willpower + Sleaze
Brute Force - Cybercombat + Logic [Attack] vs. Willpower + Firewall
Erase Mark 3 Computer + Logic [Attack] vs. Willpower + Firewall
Hack on the Fly - Hacking + Logic [Sleaze] vs. Intuition + Firewall
Crash Program 1 Cybercombat + Logic [Attack] vs. Intuition + Firewall
Data Spike - Cybercombat + Logic [Attack] vs. Intuition + Firewall
Enter/Exit Host 1 N/A
Grid Hop - N/A
Hide 0 Electronic Warfare + Intuition [Sleaze] vs. Intuition + Data Processing
Jam Signals Owner Electronic Warfare + Logic [Attack]
Jump into Rigged Device 3 Electronic Warfare + Logic [Data Processing] vs. Willpower + Firewall
Garbage In/Garbage Out 3 Software + Logic [Sleaze Limit] vs. Logic (or Device Rating) + Firewall

Interrupt Actions

Name Initiative Cost Bonus
Full Matrix Defense 10 Add Willpower to defense

Variable Actions

Name Note Test
Control Device Control a device as it is described Electronic Warfare + Intuition [Sleaze] vs. Intuition + Firewall
Matrix Search Hits Above Threshold Divide Search Time Computer + Intuition [Data Processing] (Variable, Variable)


The Matrix in Practice

Editing Files


Corrupting/Editing/Copying a datafile (quick, but there may be backups)
Step 1: (Optional, if Server is Running Silent): Matrix Perception to locate the server
Step 2: Matrix search to find the specific file (house rule, 1 round per threshold, excess hits can knock rounds off search time)
Step 3: Mark the File (Hack on the Fly or Brute Force) – One Mark is Required for Step 4-5
Step 4 (optional): Disarm data bombs and crack file
Step 5: Edit File to corrupt/delete the file
Result: Locate, Find, and Corrupt or Delete a file

Crack the protection on a file and checking for data bombs, before stealing it
Step 1: Matrix Perception (1 Hit required to safely proceed to Step 2)
Step 2: Disarm Data Bomb
Step 3: Mark the File (Hack on the Fly or Brute Force) – One Mark is Required for Step 4-5
Step 4: Crack File
Step 5: Edit File to copy it
Result: Safely Crack and Steal a protected file

Add biometric data to HR database (temporarily)
Step 1: Mark the File (Hack on the Fly or Brute Force) – One Mark is Required for Step 2-3
Step 2: Crack File
Step 3: Edit File to add a user
Result: Add an entry to an HR file

Spoof a Camera Feed
Step 1: Mark the Camera (Hack on the Fly or Brute Force) – One Mark is Required for Step 2
Step 2: Edit File on the Camera
Result: 3 Seconds of looped video coming from that camera. (Repeat each round for a continuous edit)

Steal paydata from the archives
Step 1: (Optional, if Server is Running Silent): Matrix Perception to locate the server Step 2: Matrix search to locate any useful paydata (house rule, 1 round per threshold, excess hits can knock rounds off search time)
Step 3: Mark the File (Hack on the Fly or Brute Force) – One Mark is Required for Step 4-5
Step 4 (Optional): Disarm Data Bombs and Crack File
Step 5: Edit File to copy the file
Result: Locate and find useful information from the archives and copy the files (an additional Edit File can be added to erase the original)

Bypass containment protocols
Step 1: Matrix Perception to locate the containment controls
Step 2: Mark the containment controller (One Mark is Required for Step 3)
Step 2: Edit file to modify the protocols
Result: The containment procedure is altered


Special – Spoof a Camera Feed after someone is already in-view (to edit them out)
Step 1: Mark the Camera (Hack on the Fly or Brute Force) – One Mark is Required for Step 2
Step 2: Edit File
Step 3: Repeat Edit File each Combat Turn to continually scrub the images of any people or objects.
Result: Sustained edited images. With proper preparation, could be used to create a trap.

Control Device


Open a Door’s Maglock
Step 1: Mark the Door (Hack on the Fly or Brute Force) – Two Marks is Required for Step 2
Step 2: Control Device (simple action) to unlock the door
Result: The door is unlocked and can be opened.

Hacking a smartlinked gun [Clip Ejection]
Step 1: Mark the Gun (Hack on the Fly or Brute Force) – One Mark is Required for Step 2
Step 2: Control Device (free action) to eject the clip
Result: The smartlinked gun immediately ejects it’s clip. The owner will probably disable Wireless access at this point.

Disable a laser grid/pressure sensors/security feature
Step 1 (Optional): Matrix Perception to locate the icon.
Step 2: Mark the Device (Hack on the Fly or Brute Force) – Two Marks are Required for Step 3
Step 3: Control Device (simple action) to “turn off” the security feature.
Result: Security feature is disabled

Hacking a smartlinked gun/cyberware [Continuous Control]
Step 1: Mark the Gun/Cyberware (Hack on the Fly or Brute Force) – Required Marks vary by action (1: Free, 2: Simple, 3: Complex) is Required for Step 2
Step 2: Control Device each time you wish to use it
Result: Until your marks are removed or the device is taken off line, you can make a Control Device on each of their initiative passes.

Matrix Attacks


Bricking a Smartgun (Data Spikes)
Step 1: Data Spike
Step 2: Repeat Step 1 until the weapon’s Matrix Condition Monitor is filled, or the device is brought offline.
Result: Spectacular and dynamic gun failure, rendering it unable to fire until repaired.

Taking down an IC
Step 1: Data Spike
Step 2: Repeat Step 1 until the weapon’s Matrix Condition Monitor is filled, or the IC is brought offline.
Result: The IC is destroyed. Better Hide or Erase the Marks the host has quick, or the next one will know right where you are.

Format Device


Shut down the power to a building
Step 1: Mark the Circuit Breakers (Hack on the Fly or Brute Force) – Three Marks are Required for Step 2
Step 2: (Optional, to make it permanent): Format Device
Step 3: Reboot device
Result: Either a power cycle, or a permanent shut down of the power system (this may cause emergency systems to activate or go haywire, use caution)

Hacking cyberware [Bricking the Device]
Step 1: Mark the Cyberware (Hack on the Fly or Brute Force) – Three Marks are Required for Step 2
Step 2: Format Device
Step 3: Reboot Device
Result: The cyberware has its controlling software/firmware rewritten, and when it reboots, it goes offline and becomes unusable, requiring extensive rewrites per Format Device before it can be used again (not this combat – it takes hours to do).

Hide


Escape from enemy IC
Step 1: Hide

Matrix Perception


Tracing the last timestamp on when a file was copied to physical media
Step 1: Matrix Perception

Snoop


Hacking into the comms system of the host to eavesdrop on guards
Step 1: Mark the PAN (Hack on the Fly or Brute Force) – One Mark is Required for Step 2
Step 2: Snoop

Snoop (Complex, Ongoing)


Disabling / Rerouting / Delaying communication between guards
Step 1: Mark the PAN (Hack on the Fly or Brute Force) – One Mark is Required for Steps 2 and 3. Two Marks for Step 4.
Step 2: Snoop the Comms
Step 3: Edit File
Step 4: Repeat Edit File each Combat Turn to continually reroute communications to a destination of your choice.
Result: This will allow you to snoop security comms and redirect them. Sustaining this action could potentially raise alarms if the responses do not match.

Shut Down communication to and from a Host (from within)
Step 1: Mark the Host (Hack on the Fly or Brute Force) – One Mark is Required for Steps 2 and 3. Two Marks for Step 4.
Step 2: Snoop the Host
Step 3: Trace Icon (Communications Hub)
Step 4: Format Device
Step 5: Reboot Device
Result: This will permanently disable any and all communications from being routed through the host. This isn’t the same as causing a communications blackout – they can still connect to the public/private grids to make calls, but it will stop any and all devices that were linked through the host to stop communicating with each other – alarms, passkey authentications, encrypted communications and video routed through the host.

Reboot Device


Hacking someone’s DNI and shutting down their PAN
Step 1: Mark the Icon (Hack on the Fly or Brute Force) – 3 Marks are Required for Step 2
Step 2: Reboot Device
Result: PAN reboots, unslaving all devices.

Garbage In/Garbage Out


Swap or Link device functions (Single Function Swap)
Step 1: Mark the Device (Hack on the Fly or Brute Force) – Three Marks are Required for Step 2
Step 2: Garbage In/Garbage Out
Result: Two binary functions are switched within a single device – on a smartgun, you may switch the trigger / fire command to eject the clip every time the fire command is issued. You could alternately invert the Friend/Foe target recognition system. The changes persist until the device is rebooted.

Trace Icon


Tracking down backups of a file (may require going off-site to track them down in other runs)
Step 1: Mark the Database (Hack on the Fly or Brute Force) – One Mark is Required for Step 2 and 3. Two Marks for Step 4.
Step 2: Crack the File
Step 3: Snoop the Database
Step 4: Trace Icon (Remote Server)
Result: This will allow you to snoop and see if there are any backups that were made from the file, and where they are stored in the world.

Finding and Removing security footage
Step 1: Mark a Security Camera (Hack on the Fly or Brute Force) – One Mark is Required for Step 2. Two Marks for Step 3.
Step 2: Snoop the Camera
Step 3: (Optional) Trace Icon (Security Server)
Step 4: Mark the Security Server (Hack on the Fly or Brute Force) – One Mark is Required for Step 5
Step 5: Edit File (Delete)
Result: This will allow you to trace a security camera back to the security server, then find and delete the security footage.

Finding the location of a room based on security footage/electronic signatures
Step 1: Matrix Perception Test (Hidden Icon)
Step 2: Mark the Icon (Hack on the Fly or Brute Force) – Two Marks are Required for Step 3.
Step 3: Trace Icon (Security Feature)
Result: This will let you see and determine the device you are looking for and pinpoint it’s location inside the host.

Matrix Decoded

Emerald Echoes gaaran