Documente Academic
Documente Profesional
Documente Cultură
Host Systems [SR3 p205]: A host is a computer system made up of 5 subsystems (Access, Control,
Index, Files and Slave, denoted ACIFS). Each subsystem has a rating that acts as a base TN for System
Operations. In addition to Subsystem Ratings the host has a Security Code (Blue, Green, Orange or
Red) and a Security Value (a number which is rolled to resist System Operations).
E.g. Red 6 (8 / 9 / 6 / 9 / 9) = Security Code, Security Value (ACIFS Ratings)
The Decker [MTX p18]: A decker usually accesses the Matrix using a cyberdeck with the simsense
interface boosted to dangerous levels, this is known as a Hot ASIST and allows access to the benefits of
Response Increase and Hacking Pool. Most deckers connect to their cyberdeck via a datajack.
MPCP and Persona Programs [SR3 p206 & MTX p20]: The MPCP (Master Persona Control
Program) is the central processing unit of the cyberdeck. Persona Programs are the deck’s “attributes”.
Legal cyberterminals use only two Persona programs, Sensor and Bod. Illegal cyberdecks also use
Masking and Evasion. The total ratings of the Persona programs cannot exceed 3 x MPCP rating.
Switching Modes [MTX p123]: A decker may bolster one Persona program at the expense of another,
increase one by 50% (rd) whilst reducing another by 50% (rd). Persona ratings may exceed the MPCP
in this manner. Changing modes requires a Complex Action.
Detection Factor [SR3 p207]: Detection Factor is used as the TN for a Host’s resistance rolls on
System operations. It is calculated as: (Masking + Sleaze) / 2 round up.
Detection Factor may have to be decreased in order to suppress crashed IC [SR3 p212].
As an Optional Rule, Detection Factor may be increased by sacrificing Hacking Pool dice (on a 2 for 1
basis) for the duration of the increase (maximum of +3) [MTX p26].
System Operations [SR3 p209]: In order to accomplish actions in the Matrix the decker will make
System Operations. All System Operations follow the same format and involve a resisted test:
Decker Rolls: Computer Skill + Hacking Pool (maximum of skill [SR3 p44])
[SR3 p210] TN: Appropriate subsystem rating – Utility rating
Host Rolls: Security Value
[SR3 p210] TN: Decker’s Detection Factor
• Interrogation Operations [SR3 p214]: When searching for a file, access node, etc a total of 5 net
successes need to be obtained, though these can be accumulated over several tests. If the data or
device does not exist on the Host this is revealed after obtaining 3 successes. Locate Slave
operations [SR3 p217] only require 3 net successes.
• Ongoing Operations [SR3 p214]: These take time, mostly dependent on the I/O Speed of the
cyberdeck. For example downloading 200 Mp of data with an I/O speed of 50 Mp per Turn will
take 4 Combat Turns.
• Monitored Operations [SR3 p215]: The decker needs to keep control by spending a Free action
each Initiative Pass in which the Decker acts. If this is not done the operation aborts.
The Security Tally [SR3 p210]: Whenever a System Operation is made the host may recognize that
an illegal intruder has performed it. Every success the host rolls on the test adds to a Security Tally
(even if the decker actually got more successes).
When the Security Tally reaches certain levels (known as Trigger Steps) the host will initiate certain
defensive action ranging from activating Intrusion Countermeasures (IC) to raising an Internal or
External Alert. Your GM will notify you when these defenses come into effect.
Tips and Tricks: The key thing in decking is to avoid cybercombat – it is time consuming, opens up
the possibility of the icon, and possibly the decker himself, getting injured, and also increases the
Security Tally quickly.
In order to avoid this it is recommended that a decker have a high Masking persona program and a high
Sleaze utility. Switch into Masking Mode at the expense of Bod to increase the Masking rating, and
thus the Detection Factor, even further.
If you are targeted by a piece of IC attempt to use the Evade Detection combat maneuver so as to avoid
cyber combat and prevent increasing the security tally by crashing the attacking IC.
Common System Operations
Operation Test Utility Action
Actions [SR3 p223]: The following list describes the actions a decker can take in cybercombat, in
addition to System Operations.
Free Actions: Simple Actions:
• Delay Action • Attack.
• Jack Out - unless successfully attacked by • Perform Combat Maneuver.
Black IC • Improvise an Attack [MTX p122] (see below)
• Speak a Word (reduces Initiative by D6)
• Buffer message to the real world. Less than Complex Actions:
100 words, received at the end of the turn. • Change deck modes [MTX p123].
• Terminate or Suspend an up / download. • Jack Out if successfully attacked by Black IC
• Erase a program from Active memory. [SR3 p230].
• Unsuppress IC.
Attack [SR3 p224]: Roll: Offensive utility rating + Hacking Pool (max of skill [SR3 p44])
OR Security Value
TN: See table below, modified per Combat Maneuvers.
Security Code TN to Hit TN to Hit
[SR3 p226] Intruding Target Legitimate Target
Blue 6 3
Green 5 4
Orange 4 5
Red 3 6
Shield Parry [MTX p74]: When the decker with a Shield utility is attacked they may attempt to parry:
Roll: Shield utility rating
TN: Attacker’s Computer skill
OR the Security Value if attacked by IC
Each success cancels an Attack success. A Shield utility degrades by 1 point each use (whether it was
successful or not). New copies can be loaded into memory if needed.
Improvised Defense [MTX p122]: Deckers can also put up an improvised defense,
Roll: Hacking Pool (max of Computer skill)
TN: Half the attacker’s Computer skill
OR Half the Security Value if attacked by IC
Each success cancels an Attack success. If all Attack successes are cancelled the Attack is blocked.
Damage [SR3 p226]: If the attack inflicts damage, the base damage level is staged up by one level per
2 net Attack successes.
The victim resists damage:
Target Roll: Bod OR Security Value
[SR3 p226] TN: Power of attack OR IC rating, less Armour utility
Simsense Overload [SR3 p226]: If a decker’s icon takes damage from White or Grey IC he takes a
Light stun wound if he fails a Willpower test:
Decker Roll: Willpower
[MTX p122] TN: 2 if icon took Light damage
3 if icon took Moderate damage
5 if icon took Serious damage
Dump Shock [SR3 p227]: When the decker’s icon crashes, or if he jacks out without performing a
Graceful Logoff, he takes stun damage, resisted with Willpower.
Power: Host/ Grid’s Security value
Level: Light if Blue
Moderate if Green
Serious if Orange
Deadly if Red.
Improvising an Attack [MTX p122]: A one-shot Attack program can be improvised using a Simple
action (a separate Simple action is required to use the program).
To determine the improvised attack rating the decker must allocate Hacking Pool dice on a 1 for 1
basis, to a maximum of Computer (Programming).
To determine the Damage level of the improvised attack the decker must make the following test,
compare the successes to the chart below:
Decker Roll: Computer (Decking)
[MTX p122] TN: Security Value of host system
Successes Damage Level of
[MTX p122] Improvised Attack
1 Light
2 Moderate
3 Serious
4+ Deadly
Combat Maneuvers [SR3 p224]: To perform a combat maneuver the icon must win an opposed test:
Maneuver Roll: Evasion OR Security Value, plus Hacking Pool
[SR3 p224] TN: Opponent’s Sensor OR Security Value, less Cloak utility
Opposed By Roll: Sensor OR Security Value, plus Hacking Pool
[SR3 p224] TN: Opponent’s Evasion OR Security Value, less Lock On utility
• Evade Detection [SR3 p224]: If the maneuver is successful the opponent needs to make a Locate
Decker, IC etc. operation to re-detect the evading icon.
IC will re-detect an evading decker in a number of turns equal to the net successes in the maneuver
test, less additions to the Security Tally which occur during that period. The IC shows up at the
end of last turn of the evasion period.
• Parry Attack [SR3 p225]: Increase the opponent’s TN to attack the parrying decker or IC by the
net successes on the maneuver test. The bonus lasts till the next attack by the opposing icon, or
until either party performs an Evade Detection maneuver.
• Position Attack [SR3 p225]: If successful, the positioning icon can either receive a reduction to
his attack TN equal to the net successes, or an increase to the Power of his attack equal to the net
successes. If the test fails the opposing icon receives the bonus. The bonus lasts until the next
attack.
Suppressing IC [SR3 p212]: When a piece of IC has been destroyed, or relocated in the case of Trace
IC [MTX p100], it must be suppressed from alerting the Host or continuing its trace. Each piece of IC
suppressed either reduces the decker’s Detection Factor or Hacking Pool [MTX p26] by 1 point.