# Hacking Hacking in *Interface Zero* is meant to be kept fast, furious, and fun. At its core, most situations call for a single Hacking skill roll against a TN of 4, with penalties according to the quality of the target's IDS. In this case however, how well you do on the Hacking roll determines how easy it is for the IDS to detect your presence. ## Degrees of Success These rules only apply when the hacker is trying to gain access to a system. After they have gained access, the [[Sprite]] monitoring may only make a Notice roll every time the hacker fails a skill check. (On a Crit Fail, the Sprite automatically detects their presence). Anyhow, here are the possible results when gaining access. - **Critical Failure** - Automatic lockout. May not attempt to hack system for another day. - **Failure** - Automatic alert of the IDS. Hacker may attempt again, but Hacking rolls are made as if the IDS is one tier higher. - **Success** - Access to the system, but the monitoring Sprite gets to make an opposed Notice roll to detect you. (TN for Notice roll is the number you rolled to gain access to the system). Success allows them to conduct any of the maneuvers under [[Sprite#Sprite Actions|Sprite Actions]]. - **Success with Raise** - You have ghosted into the system. Sprite does not make a Notice roll, and is oblivious to your presence. ## Counter Hacking If you have detected someone on your TAP or network, you can force them out. Make an opposed roll pitting your Hacking against their Hacking. If you win, they're gone. Otherwise, they're still around to wreak havoc. ## Hacking Commands You can affect compromised systems in a number of ways. Each of these are an action, but you can take Multi-Action penalties to do multiple at once. ###### Create Back Door If you have access to a computer system you can create a back door by making a Hacking skill roll. If you do not have the Programming Hacking skill specialization (see the Skills section for more information), you subtract 2 from the total as per the Savage Worlds rules on Skill Specializations. If you succeed, you have created a back door into the system. This backdoor lasts 24 hours, and will let you bypass the Hacking roll for getting into the system. You still need to roll normally for other tasks in the system. It does not prevent the Sprite from rolling Notice on failures. ###### Datamine When you datamine, you are scanning the system for files, images, video or other sensitive information. Oftentimes, this is the entire purpose of a hack, or even an entire mission. Datamining is accomplished by making a Research skill roll. Because computer systems (even Tendril Access Processors) are capable of holding vast amounts of data, the process takes a number of rounds equal to the IDS rating of the system. Raises on the Research skill roll cut the number of rounds down by 1 per raise. Datamining is a command which runs in the background. Your character can perform other actions (including multiple actions) while datamining. ###### Disable Device Once you have gained access to a computer system (including the Tendril Access Processor) or network you can see what devices are linked to it. With a successful Hacking skill roll, you can disable the device, rendering it inoperative. This command works well in situations where you want to do things like turn off a security camera, stop an elevator in between floors, cut off communications systems, disable an adversary’s smart gun or an even more complicated weapon system controlled by a sprite operating on a defense network. The device will remain disabled until the character or NPC spends an action to enable it. Because the authors don't want reams of pages describing what might happen when a piece of cybertech is disabled, they instead offer the following loose guidelines. It takes a single action to restore the Cybertech to working order. - If the Hacker successfully targets the enemy’s cybernetic legs, the enemy falls prone. - If the Hacker successfully targets the enemy’s cybernetic arm, they suffer the One Armed Hindrance. - If the Hacker successfully targets the enemy’s cybernetic arm that is holding a weapon, they drop that weapon. - If the hacker successfully targets a cyber eye or ear, the opponent gains the appropriate Hindrance (Blind, Hard of Hearing, One Eye). - If the Hacker successfully targets Cybertech that modifies a skill in some fashion, the target of the attack loses the benefit the Cybertech granted until it is reactivated. ###### Edit File or Device Sometimes you need to edit a computer system in some fashion. Maybe you’re prepping for an infiltration of Kenta Cyberdynamics, and rather than go in guns blazing, you opt to fake it till you make it and go in dressed as corporate executives or janitors. A good hacker can edit the biometrics and personnel databases and BAM! Now you can stroll right in through the employee entrance. That’s a sample of what you can do with the edit file or device command. Make a Hacking skill roll. If you are successful, the device has been edited in the manner you choose. If you need to make multiple edits, you must make individual Hacking rolls for each document. Certain Edges and Cybertech can help reduce the number of rolls you need to make, however. ###### Log GISP Oftentimes, it’s good to log the Geographic Information System Protocol (GISP) address of a person just in case you need to track them down later in an adventure. You don’t need to have access to the person’s TAP or a computer network to do it; you just need to succeed on a Hacking skill roll at a penalty equal to the Tier of the system’s IDS. Succeed, and you have logged the address and gain a +1 to [[#Trace GISP|tracing]] attempts for 24 hours. Gain a raise, and you gain a +1 to trace attempts for 36 hours. Fail the Hacking roll and the sprite running on the Intrusion Defense System gets to make a Notice roll to see if it detected your activity. If the sprite does detect your activity it may attempt to log your GISP in return, or simply inform the system admin (or owner of the TAP) of the activity. ###### Operate Device If a system controls a device (like drone or weapon system), you can attempt to operate it by using the Control Device command. To control a device, you must have the appropriate skill specialization (you can’t remotely fly a drone if you don’t have the Piloting skill with a Drone specialization) and make a successful skill roll. If you fail, the sprite monitoring the system can make a Notice roll to see if it detects your activity in the system. If it succeeds, it can perform any action as outlined in the section on sprites. **NOTE:** You cannot under any circumstances use this to control a typical Extra or Wild Card. ###### Trace GISP If you wish to trace the location of someone, you must do so by succeeding on a Dramatic Task. The IDS of the GISP address you are trying to trace determines the task rating of the Dramatic Task. See the Trace Difficulties Table to find the complexity of the Dramatic Task. Hacking skill rolls to trace a GISP address impose normal penalties based on the Tier of the Intrusion Defense System. If you succeed, you have successfully traced the target’s location.