Hacking & Computing

Common skills: computers, cryptology.

Hacking is a non-opposed quick or hourly extended task. Three checks are made against a difficulty benchmark set by the GM. The time required varies, but 1-minute increments are usually appropriate for common civilian systems, and 1-hour increments for hardened or military systems. Hacking gains access to a computerized system, allowing the hacker to obtain information, conduct surveillance, or to control electronic systems.

Hacking does not enable control of mechanoid creatures unless that creature’s description specifically indicates otherwise.

Hacking can also not be used to access bank accounts or gain funds. Funds in the far future are usually carried in cred-chips rather than centralized systems after it was discovered in the 21st Century that the latter were far too vulnerable, especially in the face of advanced technology.

Suggested difficulty benchmarks for hacking computer systems are shown below. Note that starship control computers (see Space) have their own e-DEFENSE scores which are used as the difficulty number to attack the system. The difficulty benchmarks below are the e-DEFENSE scores of common computer types.

Computer System Difficulty Benchmark (e-DEFENSE)

Civilian personal computer Routine [10]

Commercial computer system Challenging [13]

Typical security system Difficult [16]

Military security system Strenuous [25]

Maximum security system Herculean [33]