Star Wars D6
(A) Slicing
Time Taken: Minutes or Hours or Days, customized to the circumstances.
Specializations: A particular mode of slicing code cracking, information gathering, etc.
Advanced Skill: Requires Computer Programming/Repair of 4D, Forgery of 4D.
This is the actual skill that the majority of code slicers employ when cracking into a system. Whereas the computer programming skill allows a character to retrieve information (if he knows where to look), this skill uses software and the slicer's knowledge of computer systems to override and affect complex databases and simple computerized structures. With this skill, a slicer can break into a system and steal/alter files and data packets, leave false trails, implant computer viruses, and perform other general computer altering operations.
In an urban setting, the slicer has a lot more opportunities to be effective. His slicing skills can call in backup, reroute police forces, activate building security systems, create distractions, and many other tactics. He may choose to hack into building security cameras to monitor his enemy's progress, or seal off all exits with the building's emergency fire doors.
The point is that a creative slicer will, rather than engage in head to head
combat; use the items and resources available to him in order to aid the party, both in combat and out.
Proximity: a target that is far away is harder to affect than one that is nearby.
slicer and target system are:-------------------------Add to Difficulty:
Slicing Styles
Code Descrambling
Difficulty: Difficult Slicing(1day), or opposed roll vs. encoder
Time to Use: Minutes to Hours
Result: Use of this style allows a slicer to decode documents which have been encrypted somehow. The slicer must have access to the file in its entirety, which he will then search for patterns by which to translate the document. This can be used with written, aural, and video data types, though the latter two require a Moderate communications roll as well.
Hardware Slicing
Difficulty: Moderate Slicing, with modifiers by complexity
Time to Use: Minutes to Hours
Result: Hardware slicing is the act of modifying the basic commands sent between the elements of different pieces of hardware. This can be used on objects that contain computer elements that execute direct commands, such as blasters, cybernetics, comlinks, and the like.
Information Gatherers
Difficulty: Moderate Slicing (1 hour), with modifiers by obscurity
Time to Use: Minutes to Hours
Result: Unlike the basic computer programming/repair attempt at gathering information, this is an active search through a multitude of systems and files for any mention of a subject. This can be used to track an individual, do research, or one of many other functions. It is a more generalized style, and depending on the time put into it the information yield will be much, much greater than with the standard file retrieval. This style can also be used to alter references to certain individuals, places, etc. as well.
Datafile creation
slicing diffulty: difficult (1day)
size roll
1D datafile : difficult (16)
2D datafile : very difficult (21)
3D datafile : heroic (31)
+1d to datafile per +10
the slicer can use his abilities and programs to search and gather information on a certain topic organizing it in a file for later access and referral.
Password Cracking
Difficulty: Moderate (1hour) Slicing, with modifiers by computer security
Result: This slicing style is used, through trial-and-error, to find a password on an encrypted system. A Warning to Slicers: Many computer systems will have security measures against password cracking, so attempt with caution.
Remote System Operation
Difficulty: Moderate Slicing, with modifiers by distance
Time to Use: Minutes to Hours
Result: This style allows a slicer to remotely manipulate a computer or piece of hardware he has access to through some sort of network. Examples of use would be logging into a computer terminal remotely, manipulating robotic arms in a factory from a datapad, operating a vehicle by remote, or any other type of control over a computer from a secondary location.
Resource Alteration/Procurement
Difficulty: Moderate(1hour) Slicing, Moderate Forgery (1hour)
Time to Use: Min 2 hours
Result: This style allows a slicer to enter into a database and alter quantities and orders for certain resources, going directly to the source of the information as opposed to end-of-the-line alterations. This can be anything from bank account transactions, to food & supply requests, to passenger manifests, and more. GM should make the necessary opposing roll for forgery to make sure that no one notices anything amiss.
Virus insertion
Difficulty: Moderate Slicing, with modifiers by complexity & security of target system
Writing Software
A slicer may write software to help him do his dirty work. This takes a computer programming/repair roll,
with a base difficulty of difficult (1day)
Roll Result is difficult +1pip, VD +2 pips, heroic +1D , additional +10 additional +1D max 3D
Possible software ideas
BOSS certification creation and insertion
False ID creation suite
facial recog software
Manifest alteration
Browse, info gathering (datafile collection)
Code descrambling (decryption by type imperial, rebel, hutt, blacksun,etc.)
Encryption suite
War dialer (system access)
Password cracking tools buy type (droid, lock, bank account, communications, etc)
Executable file compression. (Virus insertion tool)
Data Routing software (increase difficulty tracking hack)
Signal analysis software (decrease difficulty tracking incoming hack)
Remote operations (repulsor lift, walker, starfighter, space transport, capital ship, computer) each a different program
Virus by system affected (ship comm, capital weapons systems, starfighter engines
the Slicer in Combat Situations
By no means is a slicer limited to his computer terminal for usefulness. Many times the slicer's resourcefulness can be a weapon unto itself, and woe to the enemy who underestimates the man with the datapad. There are many techniques that can be used by a slicer in order to make himself a formidable foe in combat, and below are listed only a few. A slicer should not limit himself to the ideas found here, but rather use them as a jumping off point.
-- Slice (Google Search) the local HoloNet for any Information on Local Important People
-- Slice a Vendor's systems to cover up a potential heist (changing warehouse stock records)*
-- Slice another Vendor's system to create a purchase receipt and Transfer of Ownership papers (another potential heist suddenly made easier)*
-- Slice Port Authority and issue a False Distress Call "The Imperials are attacking Port Authority"*
-- Slice Port Authority and issue "Arrest On Sight" and "Armed and Dangerous" orders pertaining to enemy
-- Slice several sets of blast doors lock closed
--slice vehicles
--Electronic sabotage insert virus code to disrupt computerized equipment (increases user tg buy virus result)
--Defend groups computer systems
-- slicer their comms
-- slice into vehicle and temp shut down one system.
--set off fire alarm
--set off security alarm
--slice into ship and insert virus into a system
TerexComm slicer Gauntlet-Computer
Type: Portable computer workstation Scale: Character Skill: Depends on model, see Game Notes
Weight: 1-3 kg Cost: 75-250 credits, depending on model
Availability: 1 (can differ depending on model's resources)
Description: Originally developed by the Amtech Consortium shortly before its collapse, Gauntlet-Comps were designed to replace the dataslate and datapad as the primary means of computing. Worn over the forearm and hands, all gauntlets feature touch-pads on the upper forearm and on the palm, a thinscreen on the back of the hand, holographic projection technology, and various jacks for connecting the gauntlet to a computer interface mechanism much in the same manner as utilized by R2 units. Unfortunately, the gauntlets were disliked for a variety of reasons, many of which were founded on rumor; the most popular misconception of the time was that the concentrated radiation often led to cancer of the arm - this was later proved to be a rumor planted by one of Amtech's most prominent competitors.
Although Amtech dissolved decades ago, the Gauntlet-Comp has made a recent reappearance with the purchase of the license by TerexComm. Hoping to create a new market for the Gauntlet-Comp, TerexComm has unleashed a marketing blitz unseen in modern times, focusing on the younger generation. It is curious to note that the best market so far is suspected slicers.
Game Notes: Gauntlet-Comps come in a variety of different models, each with a different role. Below are some examples; GM should be final arbiter about whether a Gauntlet-Comp can or cannot accomplish a goal.
Select Variations:
Standard Gauntlet: Is a standard datapad with holographic projection capability, minimal computer interface, and communications link-up. Combines best elements of a comlink, holonet capable computer, and digital holocam.
Slicer-Gauntlet: Allows Slicer remote access to most standard computer systems. Generally grants a +1D to slicing rolls, although this can be modified by the actual system or hardware. This gauntlet is always illegal.
Time Taken: Minutes or Hours or Days, customized to the circumstances.
Specializations: A particular mode of slicing code cracking, information gathering, etc.
Advanced Skill: Requires Computer Programming/Repair of 4D, Forgery of 4D.
This is the actual skill that the majority of code slicers employ when cracking into a system. Whereas the computer programming skill allows a character to retrieve information (if he knows where to look), this skill uses software and the slicer's knowledge of computer systems to override and affect complex databases and simple computerized structures. With this skill, a slicer can break into a system and steal/alter files and data packets, leave false trails, implant computer viruses, and perform other general computer altering operations.
In an urban setting, the slicer has a lot more opportunities to be effective. His slicing skills can call in backup, reroute police forces, activate building security systems, create distractions, and many other tactics. He may choose to hack into building security cameras to monitor his enemy's progress, or seal off all exits with the building's emergency fire doors.
The point is that a creative slicer will, rather than engage in head to head
combat; use the items and resources available to him in order to aid the party, both in combat and out.
Proximity: a target that is far away is harder to affect than one that is nearby.
slicer and target system are:-------------------------Add to Difficulty:
- Touching-------------------------------------------------(0)
- In line of sight but not touching ----------------------(+2)
- Not in line of sight, but 1-100 meters away --------(+5)
- 101 meters to 10 km away ----------------------------(+7)
- 11 to 1,000 km away -----------------------------------(+10)
- Same planet but more than 1,000 km away ---------(+15)
- Same system but not on the same planet ------------(+20)
- Not in the same star system ---------------------------(+30)
Slicing Styles
Code Descrambling
Difficulty: Difficult Slicing(1day), or opposed roll vs. encoder
Time to Use: Minutes to Hours
Result: Use of this style allows a slicer to decode documents which have been encrypted somehow. The slicer must have access to the file in its entirety, which he will then search for patterns by which to translate the document. This can be used with written, aural, and video data types, though the latter two require a Moderate communications roll as well.
Hardware Slicing
Difficulty: Moderate Slicing, with modifiers by complexity
Time to Use: Minutes to Hours
Result: Hardware slicing is the act of modifying the basic commands sent between the elements of different pieces of hardware. This can be used on objects that contain computer elements that execute direct commands, such as blasters, cybernetics, comlinks, and the like.
Information Gatherers
Difficulty: Moderate Slicing (1 hour), with modifiers by obscurity
Time to Use: Minutes to Hours
Result: Unlike the basic computer programming/repair attempt at gathering information, this is an active search through a multitude of systems and files for any mention of a subject. This can be used to track an individual, do research, or one of many other functions. It is a more generalized style, and depending on the time put into it the information yield will be much, much greater than with the standard file retrieval. This style can also be used to alter references to certain individuals, places, etc. as well.
Datafile creation
slicing diffulty: difficult (1day)
size roll
1D datafile : difficult (16)
2D datafile : very difficult (21)
3D datafile : heroic (31)
+1d to datafile per +10
the slicer can use his abilities and programs to search and gather information on a certain topic organizing it in a file for later access and referral.
Password Cracking
Difficulty: Moderate (1hour) Slicing, with modifiers by computer security
Result: This slicing style is used, through trial-and-error, to find a password on an encrypted system. A Warning to Slicers: Many computer systems will have security measures against password cracking, so attempt with caution.
Remote System Operation
Difficulty: Moderate Slicing, with modifiers by distance
Time to Use: Minutes to Hours
Result: This style allows a slicer to remotely manipulate a computer or piece of hardware he has access to through some sort of network. Examples of use would be logging into a computer terminal remotely, manipulating robotic arms in a factory from a datapad, operating a vehicle by remote, or any other type of control over a computer from a secondary location.
Resource Alteration/Procurement
Difficulty: Moderate(1hour) Slicing, Moderate Forgery (1hour)
Time to Use: Min 2 hours
Result: This style allows a slicer to enter into a database and alter quantities and orders for certain resources, going directly to the source of the information as opposed to end-of-the-line alterations. This can be anything from bank account transactions, to food & supply requests, to passenger manifests, and more. GM should make the necessary opposing roll for forgery to make sure that no one notices anything amiss.
Virus insertion
Difficulty: Moderate Slicing, with modifiers by complexity & security of target system
- Time to Use: Minutes
Writing Software
A slicer may write software to help him do his dirty work. This takes a computer programming/repair roll,
with a base difficulty of difficult (1day)
Roll Result is difficult +1pip, VD +2 pips, heroic +1D , additional +10 additional +1D max 3D
Possible software ideas
BOSS certification creation and insertion
False ID creation suite
facial recog software
Manifest alteration
Browse, info gathering (datafile collection)
Code descrambling (decryption by type imperial, rebel, hutt, blacksun,etc.)
Encryption suite
War dialer (system access)
Password cracking tools buy type (droid, lock, bank account, communications, etc)
Executable file compression. (Virus insertion tool)
Data Routing software (increase difficulty tracking hack)
Signal analysis software (decrease difficulty tracking incoming hack)
Remote operations (repulsor lift, walker, starfighter, space transport, capital ship, computer) each a different program
Virus by system affected (ship comm, capital weapons systems, starfighter engines
the Slicer in Combat Situations
By no means is a slicer limited to his computer terminal for usefulness. Many times the slicer's resourcefulness can be a weapon unto itself, and woe to the enemy who underestimates the man with the datapad. There are many techniques that can be used by a slicer in order to make himself a formidable foe in combat, and below are listed only a few. A slicer should not limit himself to the ideas found here, but rather use them as a jumping off point.
-- Slice (Google Search) the local HoloNet for any Information on Local Important People
-- Slice a Vendor's systems to cover up a potential heist (changing warehouse stock records)*
-- Slice another Vendor's system to create a purchase receipt and Transfer of Ownership papers (another potential heist suddenly made easier)*
-- Slice Port Authority and issue a False Distress Call "The Imperials are attacking Port Authority"*
-- Slice Port Authority and issue "Arrest On Sight" and "Armed and Dangerous" orders pertaining to enemy
-- Slice several sets of blast doors lock closed
--slice vehicles
--Electronic sabotage insert virus code to disrupt computerized equipment (increases user tg buy virus result)
--Defend groups computer systems
-- slicer their comms
-- slice into vehicle and temp shut down one system.
--set off fire alarm
--set off security alarm
--slice into ship and insert virus into a system
TerexComm slicer Gauntlet-Computer
Type: Portable computer workstation Scale: Character Skill: Depends on model, see Game Notes
Weight: 1-3 kg Cost: 75-250 credits, depending on model
Availability: 1 (can differ depending on model's resources)
Description: Originally developed by the Amtech Consortium shortly before its collapse, Gauntlet-Comps were designed to replace the dataslate and datapad as the primary means of computing. Worn over the forearm and hands, all gauntlets feature touch-pads on the upper forearm and on the palm, a thinscreen on the back of the hand, holographic projection technology, and various jacks for connecting the gauntlet to a computer interface mechanism much in the same manner as utilized by R2 units. Unfortunately, the gauntlets were disliked for a variety of reasons, many of which were founded on rumor; the most popular misconception of the time was that the concentrated radiation often led to cancer of the arm - this was later proved to be a rumor planted by one of Amtech's most prominent competitors.
Although Amtech dissolved decades ago, the Gauntlet-Comp has made a recent reappearance with the purchase of the license by TerexComm. Hoping to create a new market for the Gauntlet-Comp, TerexComm has unleashed a marketing blitz unseen in modern times, focusing on the younger generation. It is curious to note that the best market so far is suspected slicers.
Game Notes: Gauntlet-Comps come in a variety of different models, each with a different role. Below are some examples; GM should be final arbiter about whether a Gauntlet-Comp can or cannot accomplish a goal.
Select Variations:
Standard Gauntlet: Is a standard datapad with holographic projection capability, minimal computer interface, and communications link-up. Combines best elements of a comlink, holonet capable computer, and digital holocam.
Slicer-Gauntlet: Allows Slicer remote access to most standard computer systems. Generally grants a +1D to slicing rolls, although this can be modified by the actual system or hardware. This gauntlet is always illegal.