View previous topic :: View next topic |
Author |
Message |
shootingwomprats Rear Admiral
Joined: 11 Sep 2013 Posts: 2690 Location: Online
|
Posted: Thu Feb 13, 2014 8:02 pm Post subject: How to Deal With a Hacker? |
|
|
I have a character who has Computer Programming/Repair 6D+1 and is a slicer. He consistently cracks security on just about everything. Even when I set difficulties at 31+.
I am wondering if perhaps Slicing should be a specialization of the Computer skill? Suggestions on how to better implement mechanics for this type of game? I am open to suggestions.
At this time I am naming tasks, giving them a time, make him roll after the time has elapsed and depending on his roll give him the information, etc.
Has anyone else had a player like this? _________________ Don Diestler
Host, Shooting Womp Rats
The D6 Podcast
http://d6holocron.com/shootingwomprats
@swd6podcast, Twitter |
|
Back to top |
|
|
griff Captain
Joined: 16 Jan 2014 Posts: 507 Location: Tacoma, WA
|
Posted: Thu Feb 13, 2014 8:37 pm Post subject: |
|
|
(A) Slicing
Computer Prog/Rep. minimum 5D
Difficult varies on complexity of system. datapad Easy, Imperial Star Destroyer encoded security overrides Defficult _________________ "EXECUTE ORDER 67. Wait a minute, that doesn't sound like order 67..... No, wait. Yes, yes it does. EXECUTE ORDER 68" Palpatine's last moments - robot chicken. |
|
Back to top |
|
|
shootingwomprats Rear Admiral
Joined: 11 Sep 2013 Posts: 2690 Location: Online
|
Posted: Thu Feb 13, 2014 8:37 pm Post subject: |
|
|
Thinking of setting some difficulties for gaining access to a system:
Civilian [Moderate (11-15)]: hotel, motel, gas station, etc.
Civic [Difficult (16-20)]: courthouse, local power plant, traffic control, etc.
Local Government/Military [Very Difficult (21-30)]: air traffic control, income taxes.
Galactic Government/Military [Heroic (31+)]: Holonet access, Death Star, etc
One the the hacker has gained access he must search for what he is looking for. This would probably best done using the Search skill.
Making an opposed Slicing roll every round to hide his tracks?
Modifiers:
Familiarity with the system
Type of information looked for
Is there a SysOp and if so does he have an advantage in his home network?
Just brainstorming. _________________ Don Diestler
Host, Shooting Womp Rats
The D6 Podcast
http://d6holocron.com/shootingwomprats
@swd6podcast, Twitter |
|
Back to top |
|
|
griff Captain
Joined: 16 Jan 2014 Posts: 507 Location: Tacoma, WA
|
Posted: Thu Feb 13, 2014 8:40 pm Post subject: |
|
|
Other Modifiers could include access codes, but that would only get you into the system, not the knowledge to navigate the system. Difficulties look great. _________________ "EXECUTE ORDER 67. Wait a minute, that doesn't sound like order 67..... No, wait. Yes, yes it does. EXECUTE ORDER 68" Palpatine's last moments - robot chicken. |
|
Back to top |
|
|
Luwingo_Spince Commander
Joined: 10 Oct 2008 Posts: 357 Location: California
|
Posted: Thu Feb 13, 2014 8:41 pm Post subject: |
|
|
Slicing probably could be a specialization of Comp/repair but you don't want to go down that path since he will just up his skill even faster.
How is the pc getting to all these secure locations? Is he doing it remotely? if so start by making him actually having to get to the mainframe in order to hack it. This might help him to diversify his skills in stealth, combat, con and dodge skills.
Maybe make it into a puzzle game so that he has to actually apply himself instead of rolling his skill every time perhaps his skill roll gives him more time or hints.
Common GM trope: if his skill is so good perhaps this gets the attention of certain organizations that he doesn't want to associate with or gets a bounty placed on him. |
|
Back to top |
|
|
griff Captain
Joined: 16 Jan 2014 Posts: 507 Location: Tacoma, WA
|
Posted: Thu Feb 13, 2014 9:12 pm Post subject: |
|
|
A word on difficulty, R2-D2 able to interpret the entire imperial networt in episode 4 just by plugging into a terminal onboard the Death Star. Was that because of physical contact with the system, was it because R2 is a droid, or was it because he's R2? But we only see him find the location of the terminal to deactivate the tractor beam, learn that Leia was on board and was scheduled to be exicuted, and shut down the garbage smashers. None of this seems to be top secret or critical. _________________ "EXECUTE ORDER 67. Wait a minute, that doesn't sound like order 67..... No, wait. Yes, yes it does. EXECUTE ORDER 68" Palpatine's last moments - robot chicken. |
|
Back to top |
|
|
Lane Arroway Lieutenant Commander
Joined: 02 Feb 2013 Posts: 153 Location: Taris, Outer Rim
|
Posted: Fri Feb 14, 2014 12:18 am Post subject: |
|
|
You should consider having a systems monitor, like a droid, watching for slicers. Then you could see if he's able to "sneak" by the monitor. If not you could do opposed rolls as the player tries to either blow through the defenses or get out of there without revealing himself. Either way, he's detected so now their's alarms, closing blast doors and security guards on the way. _________________ "This job is 90% talking to people and 10% shooting at them." |
|
Back to top |
|
|
Centinull Lieutenant Commander
Joined: 30 Sep 2013 Posts: 156 Location: The Outer Rim Territories
|
Posted: Fri Feb 14, 2014 1:47 am Post subject: |
|
|
I have one player currently who tried to slice everything. My solution was to limit access points.
Star Wars is 70's scifi, there is not an ever present wifi connection.
Want to hack the ships registration information ?[/b] Sure, fine. Find and infiltrate a BOSS registry office.
Want Imperial Files ? Be prepared to go undercover |
|
Back to top |
|
|
shootingwomprats Rear Admiral
Joined: 11 Sep 2013 Posts: 2690 Location: Online
|
Posted: Fri Feb 14, 2014 10:09 am Post subject: |
|
|
I have looked at the idea of making a new skill called (A) Slicing placed under TEC. The problem with it, is that at the beginning of character creation the best a player could have is 2D, hardly useful at all.
Perhaps splitting Computer Programming/Repair into Computer Tech (TEC) and Computer Ops (KNO). Hacker would use Search (PER) to find the information he wants on a system before he can hack it.
Thoughts? _________________ Don Diestler
Host, Shooting Womp Rats
The D6 Podcast
http://d6holocron.com/shootingwomprats
@swd6podcast, Twitter |
|
Back to top |
|
|
CRMcNeill Director of Engineering
Joined: 05 Apr 2010 Posts: 16281 Location: Redding System, California Sector, on the I-5 Hyperspace Route.
|
Posted: Fri Feb 14, 2014 11:05 am Post subject: |
|
|
You might also want to institute some non-skill conditions, such as only allowing the roll has access to a specific pass code (which is almost impossible to acquire). Hacking isn't just about knowing what to type into a keyboard; a lot of the best hackers are also con men who know how to get information out of people, and researchers who know how to look up obscure details in a persons background in the hunt for passwords. _________________ "No set of rules can cover every situation. It's expected that you will make up new rules to suit the needs of your game." - The Star Wars Roleplaying Game, 2R&E, pg. 69, WEG, 1996.
The CRMcNeill Stat/Rule Index
|
|
Back to top |
|
|
lurker Commander
Joined: 24 Oct 2012 Posts: 423 Location: Oklahoma
|
Posted: Fri Feb 14, 2014 12:43 pm Post subject: |
|
|
Hmmmmm I wonder if I can guess the name of the character you are talking about .... As he is in the Monday night group I say the rule should be he knows everything in the computer just by looking at the computer
Ok seriously, I like
Quote: |
I have one player currently who tried to slice everything. My solution was to limit access points.
Star Wars is 70's scifi, there is not an ever present wifi connection.
Want to hack the ships registration information ?[/b] Sure, fine. Find and infiltrate a BOSS registry office.
Want Imperial Files ? Be prepared to go undercover
|
Make him/us use sneak, con more (after I get another D in con any way) for us to find an access point. Plus it will feed into my habit of having to sneak the humans into areas the aliens can't go, do the hacking and then sneak out
I also like
Quote: |
Once the hacker has gained access he must search for what he is looking for. This would probably best done using the Search skill.
|
Just because he can get into the system doesn't mean he 'knows' what to look for. *** I'm not sure how good at search he is, so this could slow him down big time.
Also, you could give him tooooooo much when he succeeds with the high rolls Harris is always jealous of ... Kind of a 'yeah, you go the info, it is 2 gig with of data. Now take the time to find the 1 needle in the stack of needles you need' - That is assuming it is data snatch & grab. Now if he does make the good search roll, he has it limited down to info he can go through in 1 - 2 min instead of 30 - 40 min.
I also like the
Quote: |
Making an opposed Slicing roll every round to hide his tracks?
|
Keep the hacking process an 'active' event. Just because he makes it into the system doesn't mean someone won't notice the back door is open. If he wants to hid the tracks, now that is another roll (with either time being taken that he may be noticed, or an associated MEP for 2 actions in 1 round. Does he think they might be on his track, now make him make another roll to see it, then a second to throw them off track.
For
Quote: |
Other Modifiers could include access codes, but that would only get you into the system, not the knowledge to navigate the system
|
getting the codes etc could be a life saver, but also that will put the onus back on you to have a support system we can get them from, or at least tell us who to talk to too start tracking them down. So, it is a mixed bag that you might not want opened. That chases the rabbit back around to is the team alone or does it have support (form rebel intel, contacts in the crime cartels etc) _________________ "And so I am become a knight of the Kingdom of Dreams and Shadows!" - Mark Twain
Forgive all spelling errors. |
|
Back to top |
|
|
shootingwomprats Rear Admiral
Joined: 11 Sep 2013 Posts: 2690 Location: Online
|
Posted: Fri Feb 14, 2014 1:07 pm Post subject: |
|
|
Currently his Search defaults to his PER 3D+2. So not much a slow down. I started implementing time per action. Kind of hard to say is not successful when he is rolling freakin 27s and 28's and immediately spends a Character Point to make sure he rolls 31+, Heroic.
I really need some help coming up with logical rules for hacking computer/systems to include situational modifiers and such. _________________ Don Diestler
Host, Shooting Womp Rats
The D6 Podcast
http://d6holocron.com/shootingwomprats
@swd6podcast, Twitter |
|
Back to top |
|
|
DougRed4 Rear Admiral
Joined: 18 Jan 2013 Posts: 2272 Location: Seattle, WA
|
Posted: Fri Feb 14, 2014 2:12 pm Post subject: |
|
|
I hear you, SWR, and your post is fortuitously timed, as I am adding a new player to my group, and we just made his character (a slicer).
In our Star Trek campaign, I had the same exact problem with one PC, who was a hacker. His skill with computers was such that he could literally shut down the shields of any opposing ship (remember how they did that with access codes in Star Trek II: The Wrath of Khan?)!!! It really became a challenge to keep him from being a GM's worst nightmare, especially in the world of Trek, where technology is more of a 'wireless'-type.
OTOH, I agree that the tech in Star Wars tends to be less 'wireless' and more "I access files by sticking something into a scomp link". There's been some great ideas tossed out here already regarding making him learn actual passcodes, stealth places, and other obstacles.
I think an important thing to remember is to let this 'ultimate hacker' type be a god of slicing under most circumstances. When it's not relevant to the plot or major plans of the bad guys, let him get away with hacking into whatever he needs to. He'll end up getting plenty of enemies on his trail soon enough that way anyway. But then when a pivotal moment in the campaign happens, despite his capabilities to get 31+ on his rolls, there's still a 1 chance in 6 that something bad will happen. If you do what has been suggested, and make him have to succeed on a roll to get back out of the system (and hide his tracks), the odds are now that 1 in 3 that he could be spotted! _________________ Currently Running: Villains & Vigilantes (a 32-year-old campaign with multiple groups) and D6 Star Wars; mostly on hiatus are Adventures in Middle-earth and Delta Green |
|
Back to top |
|
|
Quetzacotl Commander
Joined: 29 Jan 2013 Posts: 281 Location: Germany
|
Posted: Fri Feb 14, 2014 2:18 pm Post subject: |
|
|
Well, you can simply limit the amount of information he can get from one station.
Might be that on the Hardware level something prevents that station to acces information above a certain level. Maybe it's not even connected to the full net, only a part of it.
If it's on the hardware level, he can't just "hack" through that.
There is a reason why in most stories you hear that they need to go to the mainframe, because that is the only place where they can get all the information they want... if the information is in that compley at all.
And, btw. consider making it more difficulty. The + on the 31+ for Heroic is there for a reason, there is no real upper limit. If the information is so extremely secure and protected, make it a 50 or higher for difficulty.
Of course you shoudln't do that on a regular basis, but as I said, you can simply regulate how much information there are accessible from a certain station.
Perhaps it's not a station that can access anything because it's a one way connection. Sopmething sends Information to that station but the station itself can't send anything back (or anything send from there is simply dumped and not processed at all).
There is no way you then that you can get more information then the terminal receives. |
|
Back to top |
|
|
garhkal Sovereign Protector
Joined: 17 Jul 2005 Posts: 14168 Location: Reynoldsburg, Columbus, Ohio.
|
Posted: Fri Feb 14, 2014 3:00 pm Post subject: Re: How to Deal With a Hacker? |
|
|
shootingwomprats wrote: | I have a character who has Computer Programming/Repair 6D+1 and is a slicer. He consistently cracks security on just about everything. Even when I set difficulties at 31+.
I am wondering if perhaps Slicing should be a specialization of the Computer skill? Suggestions on how to better implement mechanics for this type of game? I am open to suggestions.
At this time I am naming tasks, giving them a time, make him roll after the time has elapsed and depending on his roll give him the information, etc.
Has anyone else had a player like this? |
Routinely hitting 30+ on 6d+1? What is he using, loaded dice? Always popping a force point?
One easy way to reign it in, is actually have him have to physically gain access to something to crack in, requiring security, and have enemies who are also slicers run 'intruder counter measure programs' so it makes it into opposed rolls. BUT since they are familiar with their systems they gain a +10 or so bonus to their checks (that way they don't need 8d and higher to beat him)..
Quote: | Just because he can get into the system doesn't mean he 'knows' what to look for. *** I'm not sure how good at search he is, so this could slow him down big time. |
Rather than using search, have him roll investigations to correlate the data he is getting.
Quote: | Kind of hard to say is not successful when he is rolling freakin 27s and 28's and immediately spends a Character Point to make sure he rolls 31+, Heroic. |
Continually hitting that high on 6d+1? I smell something fishy.
As an aside for the remote accessing. If he IS doing that a lot, start having him actually have to MAKE communications rolls to access the systems. _________________ Confucious sayeth, don't wash cat while drunk! |
|
Back to top |
|
|
|