New Operations
Edit Host
Test: Control (See Below)
Utility: Root
Action: Complex
This operation allows a user to temporarily alter the basic functions of a host by manipulating the link libraries that make up its operations. It has one of three effects, chosen by the user when the test is made: it can enable or disable a system operation; it can change the function of a system operation; or it can embed a command set so that it will not be erased upon host shutdown. A user who changes the function of an operation can impair it so that one aspect of that operation is impossible to accomplish; for instance, removing the ability to create new files with the Edit Data operation. Alternatively, a user could lock an operation into performing only one aspect of its function; disabling everything but the audio feed on Monitor Slave operation would be one example. A user could even switch one system operation with another, so long as the two operations fall under the same subsystem. A user attempting a switched operation automatically employs the appropriate utility, if he has it. In any case, a user gets a free Sensor test against the host's Security Value to notice that a system operation has been altered, before he attempts the altered operation.
To use the Edit Host operation, a user must make a Control test at +6 TN. On a Blue host, the operation is successful if the decker scores a single net success; on a Green host, the test has a threshold of 2; on an Orange, 4; and on a Red, 6. Altered operations remain in place for 1d6 x 10 hours per net success; at the end of this time, the host's self-tests note the change, and reset them to their original configuration. A user who notices an altered operation can restore with another Edit Host operation, reducing the original user's successes with his own. Successive tests in pursuit of a common end result accumulate results, to a maximum number of results equal to twice the hacker's Computer (Decking) specialization.
The Edit Host operation is limited in scope. The list of system operations that Edit Host can affect is: Abort Host Shutdown, Analyze Host, Analyze Icon, Analyze Operation, Analyze Security, Analyze Subsystem, Control Slave, Crash Host, Decrypt Access, Decrypt File, Decrypt Slave, Disarm Data Bomb, Download Data, Edit File, Edit Slave, Encrypt Access, Encrypt File, Encrypt Slave, Graceful Logoff, Locate Access Node, Locate Decker, Locate File, Locate Frame, Locate Slave, Locate Tortise Users, Make Comcall, Monitor Slave, Send Data.
Edit Security
Test: Control (See Below)
Utility: Root
Action: Complex
This operation allows a user to directly manipulate the security sheaf, changing what type of IC activates at a given trigger step, or changing the security tally at which a trigger step activates. It is up to the GM what IC might be stored on the system but not linked to a trigger step, but at the very least, a user can select from the IC listed in the security sheaf. A user cannot raise a trigger step higher than its normal maximum value for a host; for instance, the third trigger step on an Orange host cannot be higher than 15 (6/2+3, see SR3 p.211 for details). Each trigger step must have IC associated with it; the maximum security tally on a host is equal to the maximum trigger step value times the host's security value; at that point, the host automatically attempts to shut itself down every turn. A user can also move the trigger step of the Passive Alert, Active Alert, or System Shutdown up or down one step at a time. A successful Edit Security operation can also lower the user's security tally by one point per two net successes.
To use the Edit Security operation, a user must make a Control test at +6 TN. On a Blue host, the operation is successful if the decker scores a single net success; on a Green host, the test has a threshold of 2; on an Orange, 4; and on a Red, 6.
Subvert Host
Test: Control (See Below)
Utility: Slash
Action: Complex
This operation introduces viral software into operating system of the host, degrading its error-checking and intrusion detection functions and lowering the effectiveness of the host. To do this, a user makes a Control test at +6 TN; on a Blue host, the operation is successful if the decker scores a single net success; on a Green host, the test has a threshold of 2; on an Orange, 4; and on a Red, 6. For every two net successes on the test, lower the security value of the host by 1. The user's security tally automatically goes up by the same amount that the security value goes down, in additon to any successes scored by the host on the system test. If the security value is brought to 0, the host immediately goes offline and shuts down. All connected users are dumped, and suffer dumpshock with a power of 2. The security value is fully restored when the host is restarted.
Subvert Subsystem
Test: Targeted Subsystem (See Below)
Utility: Slash
Action: Complex
This operation introduces viral software into a targeted subsystem--Access, Control, Index, Files, or Slave--degrading its error-checking and intrusion detection functions, lowering the effectiveness of the subsystem. To do this, a user makes a test against the targeted subsystem at +6 TN; on a Blue host, the operation is successful if the decker scores a single net success; on a Green host, the test has a threshold of 2; on an Orange, 4; and on a Red, 6. Every net success on the test lowers the subsystem's value by 1; every two successes automatically raises the user's security tally by 1, in addition to any successes scored by the host on the system test. If a subsystem is brought to 0, no system operations related to that subsystem are possible until the host is shut down and restarted, at which point all damaged subsystems are fully restored.
Destroy Host
Test: Control (See Below)
Utility: Burn
Action: Complex
This operation sends a power surge through the host's processor, damaging or burning it out completely. To do this, a user makes a Control test at +6 TN; on a Blue host, the operation is successful if the decker scores a single net success; on a Green host, the test has a threshold of 2; on an Orange, 4; and on a Red, 6. For every two net successes on the test, permanently lower the security value of the host by 1. The user's security tally automatically goes up by the number of net successes scored on the test, in addition to any successes scored by the host on the system test. The damage to the host's security value can only be remedied by replacing the processor. Because the host is If the security value is brought to 0, the host immediately goes offline and shuts down. All connected users are dumped, and suffer dumpshock with a power of 2.
Destroy Node
Test: Control or Slave(See Below)
Utility: Burn
Action: Complex
This operation can destroy almost any external hardware connected to the system, generally by sending a barrage of high-voltage jolts through it. Vulnerable hardware includes cyberterminals and anything controlled by a slave node. To do this, a user makes a Control test at +2 TN. On a Blue or Green host, the operation is successful if the user scores a single net success; on an Orange host, the test has a threshold of 2; and on a Red, 3. For every net success (past the threshold) on the test, permanently reduce the rating of the connected hardware by one point; if the hardware does not have a rating, a user can destroy it by building up a number of successes equal to half the host's Slave rating over the course of as many tests as are required. Massive hardware, such as factory machinery, generally requires a total number of successes equal to the host's Slave rating. Only one piece of hardware can be targeted per test; for instance, a decker attempting to destroy all of the cameras in a facility would have to destroy each camera. individually.
New Utilities
Root
Multiplier: 5
Options: A
System Operations: Edit Host, Edit Security
This program creates a temporary root hack, allowing the user to access a host's basic functions.
Slash
Multiplier: 10
Options: A
System Operations: Subvert Host, Subvert Subsystem
This program studies the host or subsystem, searching out areas in the code which can be manipulated to damage the host or subsystem's effectiveness.
Burn
Multiplier: 20
Options: A
System Operations: Destroy Host
This program studies a piece of hardware, searching out connections which can be used to physically damage the target.