The Rancor Pit Forum Index
Welcome to The Rancor Pit forums!

The Rancor Pit Forum Index
FAQ   ::   Search   ::   Memberlist   ::   Usergroups   ::   Register   ::   Profile   ::   Log in to check your private messages   ::   Log in

How to Deal With a Hacker?
Post new topic   Reply to topic    The Rancor Pit Forum Index -> Gamemasters -> How to Deal With a Hacker? Goto page 1, 2  Next
View previous topic :: View next topic  
Author Message
shootingwomprats
Rear Admiral
Rear Admiral


Joined: 11 Sep 2013
Posts: 2690
Location: Online

PostPosted: Thu Feb 13, 2014 8:02 pm    Post subject: How to Deal With a Hacker? Reply with quote

I have a character who has Computer Programming/Repair 6D+1 and is a slicer. He consistently cracks security on just about everything. Even when I set difficulties at 31+.

I am wondering if perhaps Slicing should be a specialization of the Computer skill? Suggestions on how to better implement mechanics for this type of game? I am open to suggestions.

At this time I am naming tasks, giving them a time, make him roll after the time has elapsed and depending on his roll give him the information, etc.

Has anyone else had a player like this?
_________________
Don Diestler
Host, Shooting Womp Rats
The D6 Podcast
http://d6holocron.com/shootingwomprats
@swd6podcast, Twitter
Back to top
View user's profile Send private message Visit poster's website
griff
Captain
Captain


Joined: 16 Jan 2014
Posts: 507
Location: Tacoma, WA

PostPosted: Thu Feb 13, 2014 8:37 pm    Post subject: Reply with quote

(A) Slicing

Computer Prog/Rep. minimum 5D

Difficult varies on complexity of system. datapad Easy, Imperial Star Destroyer encoded security overrides Defficult
_________________
"EXECUTE ORDER 67. Wait a minute, that doesn't sound like order 67..... No, wait. Yes, yes it does. EXECUTE ORDER 68" Palpatine's last moments - robot chicken.
Back to top
View user's profile Send private message Send e-mail
shootingwomprats
Rear Admiral
Rear Admiral


Joined: 11 Sep 2013
Posts: 2690
Location: Online

PostPosted: Thu Feb 13, 2014 8:37 pm    Post subject: Reply with quote

Thinking of setting some difficulties for gaining access to a system:

Civilian [Moderate (11-15)]: hotel, motel, gas station, etc.
Civic [Difficult (16-20)]: courthouse, local power plant, traffic control, etc.
Local Government/Military [Very Difficult (21-30)]: air traffic control, income taxes.
Galactic Government/Military [Heroic (31+)]: Holonet access, Death Star, etc

One the the hacker has gained access he must search for what he is looking for. This would probably best done using the Search skill.

Making an opposed Slicing roll every round to hide his tracks?

Modifiers:
Familiarity with the system
Type of information looked for
Is there a SysOp and if so does he have an advantage in his home network?

Just brainstorming.
_________________
Don Diestler
Host, Shooting Womp Rats
The D6 Podcast
http://d6holocron.com/shootingwomprats
@swd6podcast, Twitter
Back to top
View user's profile Send private message Visit poster's website
griff
Captain
Captain


Joined: 16 Jan 2014
Posts: 507
Location: Tacoma, WA

PostPosted: Thu Feb 13, 2014 8:40 pm    Post subject: Reply with quote

Other Modifiers could include access codes, but that would only get you into the system, not the knowledge to navigate the system. Difficulties look great.
_________________
"EXECUTE ORDER 67. Wait a minute, that doesn't sound like order 67..... No, wait. Yes, yes it does. EXECUTE ORDER 68" Palpatine's last moments - robot chicken.
Back to top
View user's profile Send private message Send e-mail
Luwingo_Spince
Commander
Commander


Joined: 10 Oct 2008
Posts: 357
Location: California

PostPosted: Thu Feb 13, 2014 8:41 pm    Post subject: Reply with quote

Slicing probably could be a specialization of Comp/repair but you don't want to go down that path since he will just up his skill even faster.

How is the pc getting to all these secure locations? Is he doing it remotely? if so start by making him actually having to get to the mainframe in order to hack it. This might help him to diversify his skills in stealth, combat, con and dodge skills.

Maybe make it into a puzzle game so that he has to actually apply himself instead of rolling his skill every time perhaps his skill roll gives him more time or hints.

Common GM trope: if his skill is so good perhaps this gets the attention of certain organizations that he doesn't want to associate with or gets a bounty placed on him.
Back to top
View user's profile Send private message
griff
Captain
Captain


Joined: 16 Jan 2014
Posts: 507
Location: Tacoma, WA

PostPosted: Thu Feb 13, 2014 9:12 pm    Post subject: Reply with quote

A word on difficulty, R2-D2 able to interpret the entire imperial networt in episode 4 just by plugging into a terminal onboard the Death Star. Was that because of physical contact with the system, was it because R2 is a droid, or was it because he's R2? But we only see him find the location of the terminal to deactivate the tractor beam, learn that Leia was on board and was scheduled to be exicuted, and shut down the garbage smashers. None of this seems to be top secret or critical.
_________________
"EXECUTE ORDER 67. Wait a minute, that doesn't sound like order 67..... No, wait. Yes, yes it does. EXECUTE ORDER 68" Palpatine's last moments - robot chicken.
Back to top
View user's profile Send private message Send e-mail
Lane Arroway
Lieutenant Commander
Lieutenant Commander


Joined: 02 Feb 2013
Posts: 153
Location: Taris, Outer Rim

PostPosted: Fri Feb 14, 2014 12:18 am    Post subject: Reply with quote

You should consider having a systems monitor, like a droid, watching for slicers. Then you could see if he's able to "sneak" by the monitor. If not you could do opposed rolls as the player tries to either blow through the defenses or get out of there without revealing himself. Either way, he's detected so now their's alarms, closing blast doors and security guards on the way.
_________________
"This job is 90% talking to people and 10% shooting at them."
Back to top
View user's profile Send private message
Centinull
Lieutenant Commander
Lieutenant Commander


Joined: 30 Sep 2013
Posts: 156
Location: The Outer Rim Territories

PostPosted: Fri Feb 14, 2014 1:47 am    Post subject: Reply with quote

I have one player currently who tried to slice everything. My solution was to limit access points.

Star Wars is 70's scifi, there is not an ever present wifi connection.

Want to hack the ships registration information ?[/b] Sure, fine. Find and infiltrate a BOSS registry office.

Want Imperial Files ? Be prepared to go undercover
Back to top
View user's profile Send private message
shootingwomprats
Rear Admiral
Rear Admiral


Joined: 11 Sep 2013
Posts: 2690
Location: Online

PostPosted: Fri Feb 14, 2014 10:09 am    Post subject: Reply with quote

I have looked at the idea of making a new skill called (A) Slicing placed under TEC. The problem with it, is that at the beginning of character creation the best a player could have is 2D, hardly useful at all.

Perhaps splitting Computer Programming/Repair into Computer Tech (TEC) and Computer Ops (KNO). Hacker would use Search (PER) to find the information he wants on a system before he can hack it.

Thoughts?
_________________
Don Diestler
Host, Shooting Womp Rats
The D6 Podcast
http://d6holocron.com/shootingwomprats
@swd6podcast, Twitter
Back to top
View user's profile Send private message Visit poster's website
CRMcNeill
Director of Engineering
Director of Engineering


Joined: 05 Apr 2010
Posts: 16320
Location: Redding System, California Sector, on the I-5 Hyperspace Route.

PostPosted: Fri Feb 14, 2014 11:05 am    Post subject: Reply with quote

You might also want to institute some non-skill conditions, such as only allowing the roll has access to a specific pass code (which is almost impossible to acquire). Hacking isn't just about knowing what to type into a keyboard; a lot of the best hackers are also con men who know how to get information out of people, and researchers who know how to look up obscure details in a persons background in the hunt for passwords.
_________________
"No set of rules can cover every situation. It's expected that you will make up new rules to suit the needs of your game." - The Star Wars Roleplaying Game, 2R&E, pg. 69, WEG, 1996.

The CRMcNeill Stat/Rule Index
Back to top
View user's profile Send private message Send e-mail Visit poster's website
lurker
Commander
Commander


Joined: 24 Oct 2012
Posts: 423
Location: Oklahoma

PostPosted: Fri Feb 14, 2014 12:43 pm    Post subject: Reply with quote

Hmmmmm I wonder if I can guess the name of the character you are talking about .... As he is in the Monday night group I say the rule should be he knows everything in the computer just by looking at the computer Laughing

Ok seriously, I like

Quote:


I have one player currently who tried to slice everything. My solution was to limit access points.

Star Wars is 70's scifi, there is not an ever present wifi connection.

Want to hack the ships registration information ?[/b] Sure, fine. Find and infiltrate a BOSS registry office.

Want Imperial Files ? Be prepared to go undercover



Make him/us use sneak, con more (after I get another D in con any way) for us to find an access point. Plus it will feed into my habit of having to sneak the humans into areas the aliens can't go, do the hacking and then sneak out

I also like

Quote:



Once the hacker has gained access he must search for what he is looking for. This would probably best done using the Search skill.




Just because he can get into the system doesn't mean he 'knows' what to look for. *** I'm not sure how good at search he is, so this could slow him down big time.

Also, you could give him tooooooo much when he succeeds with the high rolls Harris is always jealous of ... Kind of a 'yeah, you go the info, it is 2 gig with of data. Now take the time to find the 1 needle in the stack of needles you need' - That is assuming it is data snatch & grab. Now if he does make the good search roll, he has it limited down to info he can go through in 1 - 2 min instead of 30 - 40 min.


I also like the

Quote:


Making an opposed Slicing roll every round to hide his tracks?



Keep the hacking process an 'active' event. Just because he makes it into the system doesn't mean someone won't notice the back door is open. If he wants to hid the tracks, now that is another roll (with either time being taken that he may be noticed, or an associated MEP for 2 actions in 1 round. Does he think they might be on his track, now make him make another roll to see it, then a second to throw them off track.

For

Quote:


Other Modifiers could include access codes, but that would only get you into the system, not the knowledge to navigate the system



getting the codes etc could be a life saver, but also that will put the onus back on you to have a support system we can get them from, or at least tell us who to talk to too start tracking them down. So, it is a mixed bag that you might not want opened. That chases the rabbit back around to is the team alone or does it have support (form rebel intel, contacts in the crime cartels etc)
_________________
"And so I am become a knight of the Kingdom of Dreams and Shadows!" - Mark Twain

Forgive all spelling errors.
Back to top
View user's profile Send private message
shootingwomprats
Rear Admiral
Rear Admiral


Joined: 11 Sep 2013
Posts: 2690
Location: Online

PostPosted: Fri Feb 14, 2014 1:07 pm    Post subject: Reply with quote

Currently his Search defaults to his PER 3D+2. So not much a slow down. I started implementing time per action. Kind of hard to say is not successful when he is rolling freakin 27s and 28's and immediately spends a Character Point to make sure he rolls 31+, Heroic.

I really need some help coming up with logical rules for hacking computer/systems to include situational modifiers and such.
_________________
Don Diestler
Host, Shooting Womp Rats
The D6 Podcast
http://d6holocron.com/shootingwomprats
@swd6podcast, Twitter
Back to top
View user's profile Send private message Visit poster's website
DougRed4
Rear Admiral
Rear Admiral


Joined: 18 Jan 2013
Posts: 2286
Location: Seattle, WA

PostPosted: Fri Feb 14, 2014 2:12 pm    Post subject: Reply with quote

I hear you, SWR, and your post is fortuitously timed, as I am adding a new player to my group, and we just made his character (a slicer).

In our Star Trek campaign, I had the same exact problem with one PC, who was a hacker. His skill with computers was such that he could literally shut down the shields of any opposing ship (remember how they did that with access codes in Star Trek II: The Wrath of Khan?)!!! It really became a challenge to keep him from being a GM's worst nightmare, especially in the world of Trek, where technology is more of a 'wireless'-type.

OTOH, I agree that the tech in Star Wars tends to be less 'wireless' and more "I access files by sticking something into a scomp link". There's been some great ideas tossed out here already regarding making him learn actual passcodes, stealth places, and other obstacles.

I think an important thing to remember is to let this 'ultimate hacker' type be a god of slicing under most circumstances. When it's not relevant to the plot or major plans of the bad guys, let him get away with hacking into whatever he needs to. He'll end up getting plenty of enemies on his trail soon enough that way anyway. But then when a pivotal moment in the campaign happens, despite his capabilities to get 31+ on his rolls, there's still a 1 chance in 6 that something bad will happen. If you do what has been suggested, and make him have to succeed on a roll to get back out of the system (and hide his tracks), the odds are now that 1 in 3 that he could be spotted!
_________________
Currently Running: Villains & Vigilantes (a 32-year-old campaign with multiple groups) and D6 Star Wars; mostly on hiatus are Adventures in Middle-earth and Delta Green
Back to top
View user's profile Send private message Visit poster's website
Quetzacotl
Commander
Commander


Joined: 29 Jan 2013
Posts: 281
Location: Germany

PostPosted: Fri Feb 14, 2014 2:18 pm    Post subject: Reply with quote

Well, you can simply limit the amount of information he can get from one station.

Might be that on the Hardware level something prevents that station to acces information above a certain level. Maybe it's not even connected to the full net, only a part of it.
If it's on the hardware level, he can't just "hack" through that.

There is a reason why in most stories you hear that they need to go to the mainframe, because that is the only place where they can get all the information they want... if the information is in that compley at all.


And, btw. consider making it more difficulty. The + on the 31+ for Heroic is there for a reason, there is no real upper limit. If the information is so extremely secure and protected, make it a 50 or higher for difficulty.
Of course you shoudln't do that on a regular basis, but as I said, you can simply regulate how much information there are accessible from a certain station.
Perhaps it's not a station that can access anything because it's a one way connection. Sopmething sends Information to that station but the station itself can't send anything back (or anything send from there is simply dumped and not processed at all).
There is no way you then that you can get more information then the terminal receives.
Back to top
View user's profile Send private message
garhkal
Sovereign Protector
Sovereign Protector


Joined: 17 Jul 2005
Posts: 14215
Location: Reynoldsburg, Columbus, Ohio.

PostPosted: Fri Feb 14, 2014 3:00 pm    Post subject: Re: How to Deal With a Hacker? Reply with quote

shootingwomprats wrote:
I have a character who has Computer Programming/Repair 6D+1 and is a slicer. He consistently cracks security on just about everything. Even when I set difficulties at 31+.

I am wondering if perhaps Slicing should be a specialization of the Computer skill? Suggestions on how to better implement mechanics for this type of game? I am open to suggestions.

At this time I am naming tasks, giving them a time, make him roll after the time has elapsed and depending on his roll give him the information, etc.

Has anyone else had a player like this?


Routinely hitting 30+ on 6d+1? What is he using, loaded dice? Always popping a force point?

One easy way to reign it in, is actually have him have to physically gain access to something to crack in, requiring security, and have enemies who are also slicers run 'intruder counter measure programs' so it makes it into opposed rolls. BUT since they are familiar with their systems they gain a +10 or so bonus to their checks (that way they don't need 8d and higher to beat him)..

Quote:
Just because he can get into the system doesn't mean he 'knows' what to look for. *** I'm not sure how good at search he is, so this could slow him down big time.


Rather than using search, have him roll investigations to correlate the data he is getting.

Quote:
Kind of hard to say is not successful when he is rolling freakin 27s and 28's and immediately spends a Character Point to make sure he rolls 31+, Heroic.


Continually hitting that high on 6d+1? I smell something fishy.

As an aside for the remote accessing. If he IS doing that a lot, start having him actually have to MAKE communications rolls to access the systems.
_________________
Confucious sayeth, don't wash cat while drunk!
Back to top
View user's profile Send private message
Display posts from previous:   
Post new topic   Reply to topic    The Rancor Pit Forum Index -> Gamemasters All times are GMT - 4 Hours
Goto page 1, 2  Next
Page 1 of 2

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum


Powered by phpBB © 2001, 2005 phpBB Group


v2.0