| View previous topic :: View next topic | 
	
	
		| Author | Message | 
	
		| shootingwomprats Vice Admiral
 
  
  
 Joined: 11 Sep 2013
 Posts: 3274
 Location: Online
 
 | 
			
				|  Posted: Thu Feb 13, 2014 8:02 pm    Post subject: How to Deal With a Hacker? |   |  
				| 
 |  
				| I have a character who has Computer Programming/Repair 6D+1 and is a slicer. He consistently cracks security on just about everything. Even when I set difficulties at 31+. 
 I am wondering if perhaps Slicing should be a specialization of the Computer skill? Suggestions on how to better implement mechanics for this type of game? I am open to suggestions.
 
 At this time I am naming tasks, giving them a time, make him roll after the time has elapsed and depending on his roll give him the information, etc.
 
 Has anyone else had a player like this?
 _________________
 Don Diestler
 Host, Shooting Womp Rats
 The D6 Podcast
 http://d6holocron.com/shootingwomprats
 @swd6podcast, Twitter
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		| griff Captain
 
  
  
 Joined: 16 Jan 2014
 Posts: 508
 Location: Tacoma, WA
 
 | 
			
				|  Posted: Thu Feb 13, 2014 8:37 pm    Post subject: |   |  
				| 
 |  
				| (A) Slicing 
 Computer Prog/Rep. minimum 5D
 
 Difficult varies on complexity of system. datapad Easy, Imperial Star Destroyer encoded security overrides Defficult
 _________________
 "EXECUTE ORDER 67. Wait a minute, that doesn't sound like order 67..... No, wait. Yes, yes it does. EXECUTE ORDER 68" Palpatine's last moments - robot chicken.
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		| shootingwomprats Vice Admiral
 
  
  
 Joined: 11 Sep 2013
 Posts: 3274
 Location: Online
 
 | 
			
				|  Posted: Thu Feb 13, 2014 8:37 pm    Post subject: |   |  
				| 
 |  
				| Thinking of setting some difficulties for gaining access to a system: 
 Civilian [Moderate (11-15)]:  hotel, motel, gas station, etc.
 Civic [Difficult (16-20)]: courthouse, local power plant, traffic control, etc.
 Local Government/Military [Very Difficult (21-30)]: air traffic control, income taxes.
 Galactic Government/Military [Heroic (31+)]: Holonet access, Death Star, etc
 
 One the the hacker has gained access he must search for what he is looking for. This would probably best done using the Search skill.
 
 Making an opposed Slicing roll every round to hide his tracks?
 
 Modifiers:
 Familiarity with the system
 Type of information looked for
 Is there a SysOp and if so does he have an advantage in his home network?
 
 Just brainstorming.
 _________________
 Don Diestler
 Host, Shooting Womp Rats
 The D6 Podcast
 http://d6holocron.com/shootingwomprats
 @swd6podcast, Twitter
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		| griff Captain
 
  
  
 Joined: 16 Jan 2014
 Posts: 508
 Location: Tacoma, WA
 
 | 
			
				|  Posted: Thu Feb 13, 2014 8:40 pm    Post subject: |   |  
				| 
 |  
				| Other Modifiers could include access codes, but that would only get you into the system, not the knowledge to navigate the system. Difficulties look great. _________________
 "EXECUTE ORDER 67. Wait a minute, that doesn't sound like order 67..... No, wait. Yes, yes it does. EXECUTE ORDER 68" Palpatine's last moments - robot chicken.
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		| Luwingo_Spince Commander
 
  
  
 Joined: 10 Oct 2008
 Posts: 357
 Location: California
 
 | 
			
				|  Posted: Thu Feb 13, 2014 8:41 pm    Post subject: |   |  
				| 
 |  
				| Slicing probably could be a specialization of Comp/repair but you don't want to go down that path since he will just up his skill even faster. 
 How is the pc getting to all these secure locations? Is he doing it remotely? if so start by making him actually having to get to the mainframe in order to hack it. This might help him to diversify his skills in stealth, combat, con  and dodge skills.
 
 Maybe make it into a puzzle game so that he has to actually apply himself instead of rolling his skill every time perhaps his skill roll gives him more time or hints.
 
 Common GM trope: if his skill is so good perhaps this gets the attention of certain organizations that he doesn't want to associate with or gets a bounty placed on him.
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		| griff Captain
 
  
  
 Joined: 16 Jan 2014
 Posts: 508
 Location: Tacoma, WA
 
 | 
			
				|  Posted: Thu Feb 13, 2014 9:12 pm    Post subject: |   |  
				| 
 |  
				| A word on difficulty, R2-D2  able to interpret the entire imperial networt in episode 4 just by plugging into a terminal onboard the Death Star. Was that because of physical contact with the system, was it because R2 is a droid, or was it because he's R2? But we only see him find the location of the terminal to deactivate the tractor beam, learn that Leia was on board and was scheduled to be exicuted, and shut down the garbage smashers. None of this seems to be top secret or critical. _________________
 "EXECUTE ORDER 67. Wait a minute, that doesn't sound like order 67..... No, wait. Yes, yes it does. EXECUTE ORDER 68" Palpatine's last moments - robot chicken.
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		| Lane Arroway Lieutenant Commander
 
  
  
 Joined: 02 Feb 2013
 Posts: 153
 Location: Taris, Outer Rim
 
 | 
			
				|  Posted: Fri Feb 14, 2014 12:18 am    Post subject: |   |  
				| 
 |  
				| You should consider having  a systems monitor, like a droid, watching for slicers.  Then you could see if he's able to "sneak" by the monitor.  If not you could do opposed rolls as the player tries to either blow through the defenses or get out of there without revealing himself.  Either way, he's detected so now their's alarms, closing blast doors and security guards on the way. _________________
 "This job is 90% talking to people and 10% shooting at them."
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		| Centinull Lieutenant Commander
 
  
  
 Joined: 30 Sep 2013
 Posts: 156
 Location: The Outer Rim Territories
 
 | 
			
				|  Posted: Fri Feb 14, 2014 1:47 am    Post subject: |   |  
				| 
 |  
				| I have one player currently who tried to slice everything. My solution was to limit access points. 
 Star Wars is 70's scifi, there is not an ever present wifi connection.
 
 Want to hack the ships registration information ?[/b] Sure, fine. Find and infiltrate a BOSS registry office.
 
 Want Imperial Files ?  Be prepared to go undercover
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		| shootingwomprats Vice Admiral
 
  
  
 Joined: 11 Sep 2013
 Posts: 3274
 Location: Online
 
 | 
			
				|  Posted: Fri Feb 14, 2014 10:09 am    Post subject: |   |  
				| 
 |  
				| I have looked at the idea of making a new skill called (A) Slicing placed under TEC. The problem with it, is that at the beginning of character creation the best a player could have is 2D, hardly useful at all. 
 Perhaps splitting Computer Programming/Repair into Computer Tech (TEC) and Computer Ops (KNO). Hacker would use Search (PER) to find the information he wants on a system before he can hack it.
 
 Thoughts?
 _________________
 Don Diestler
 Host, Shooting Womp Rats
 The D6 Podcast
 http://d6holocron.com/shootingwomprats
 @swd6podcast, Twitter
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		| CRMcNeill Director of Engineering
 
  
  
 Joined: 05 Apr 2010
 Posts: 16427
 Location: Redding System, California Sector, on the I-5 Hyperspace Route.
 
 | 
			
				|  Posted: Fri Feb 14, 2014 11:05 am    Post subject: |   |  
				| 
 |  
				| You might also want to institute some non-skill conditions, such as only allowing the roll has access to a specific pass code (which is almost impossible to acquire). Hacking isn't just about knowing what to type into a keyboard; a lot of the best hackers are also con men who know how to get information out of people, and researchers who know how to look up obscure details in a persons background in the hunt for passwords. _________________
 "No set of rules can cover every situation.  It's expected that you will make up new rules to suit the needs of your game." - The Star Wars Roleplaying Game, 2R&E, pg. 69, WEG, 1996.
 
 The CRMcNeill Stat/Rule Index
 
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		| lurker Commander
 
  
  
 Joined: 24 Oct 2012
 Posts: 423
 Location: Oklahoma
 
 | 
			
				|  Posted: Fri Feb 14, 2014 12:43 pm    Post subject: |   |  
				| 
 |  
				| Hmmmmm I wonder if I can guess the name of the character you are talking about .... As he is in the Monday night group I say the rule should be he knows everything in the computer just by looking at the computer   
 Ok seriously, I like
 
 
  	  | Quote: |  	  | 
 I have one player currently who tried to slice everything. My solution was to limit access points.
 
 Star Wars is 70's scifi, there is not an ever present wifi connection.
 
 Want to hack the ships registration information ?[/b] Sure, fine. Find and infiltrate a BOSS registry office.
 
 Want Imperial Files ? Be prepared to go undercover
 
 
 | 
 
 Make him/us use sneak, con more (after I get another D in con any way) for us to find an access point. Plus it will feed into my habit of having to sneak the humans into areas the aliens can't go, do the hacking and then sneak out
 
 I also like
 
 
  	  | Quote: |  	  | 
 
 Once the hacker has gained access he must search for what he is looking for. This would probably best done using the Search skill.
 
 
 
 | 
 
 Just because he can get into the system doesn't mean he 'knows' what to look for. *** I'm not sure how good at search he is, so this could slow him down big time.
 
 Also, you could give him tooooooo much when he succeeds with the high rolls Harris is always jealous of ... Kind of a 'yeah, you go the info, it is 2 gig with of data. Now take the time to find the 1 needle in the stack of needles you need' - That is assuming it is data snatch & grab. Now if he does make the good search roll, he has it limited down to info he can go through in 1 - 2 min instead of 30 - 40 min.
 
 
 I also like the
 
 
  	  | Quote: |  	  | 
 Making an opposed Slicing roll every round to hide his tracks?
 
 
 | 
 
 Keep the hacking process an 'active' event. Just because he makes it into the system doesn't mean someone won't notice the back door is open. If he wants to hid the tracks, now that is another roll (with either time being taken that he may be noticed, or an associated MEP for 2 actions in 1 round. Does he think they might be on his track, now make him make another roll to see it, then a second to  throw them off track.
 
 For
 
 
  	  | Quote: |  	  | 
 Other Modifiers could include access codes, but that would only get you into the system, not the knowledge to navigate the system
 
 
 | 
 
 getting the codes etc could be a life saver, but also that will put the onus back on you to have a support system we can get them from, or at least tell us who to talk to too start tracking them down. So, it is a mixed bag that you might not want opened. That chases the rabbit back around to is the team alone or does it have support (form rebel intel, contacts in the crime cartels etc)
 _________________
 "And so I am become a knight of the Kingdom of Dreams and Shadows!" - Mark Twain
 
 Forgive all spelling errors.
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		| shootingwomprats Vice Admiral
 
  
  
 Joined: 11 Sep 2013
 Posts: 3274
 Location: Online
 
 | 
			
				|  Posted: Fri Feb 14, 2014 1:07 pm    Post subject: |   |  
				| 
 |  
				| Currently his Search defaults to his PER 3D+2. So not much a slow down. I started implementing time per action. Kind of hard to say is not successful when he is rolling freakin 27s and 28's and immediately spends a Character Point to make sure he rolls 31+, Heroic. 
 I really need some help coming up with logical rules for hacking computer/systems to include situational modifiers and such.
 _________________
 Don Diestler
 Host, Shooting Womp Rats
 The D6 Podcast
 http://d6holocron.com/shootingwomprats
 @swd6podcast, Twitter
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		| DougRed4 Rear Admiral
 
  
  
 Joined: 18 Jan 2013
 Posts: 2301
 Location: Seattle, WA
 
 | 
			
				|  Posted: Fri Feb 14, 2014 2:12 pm    Post subject: |   |  
				| 
 |  
				| I hear you, SWR, and your post is fortuitously timed, as I am adding a new player to my group, and we just made his character (a slicer). 
 In our Star Trek campaign, I had the same exact problem with one PC, who was a hacker.  His skill with computers was such that he could literally shut down the shields of any opposing ship (remember how they did that with access codes in Star Trek II: The Wrath of Khan?)!!!  It really became a challenge to keep him from being a GM's worst nightmare, especially in the world of Trek, where technology is more of a 'wireless'-type.
 
 OTOH, I agree that the tech in Star Wars tends to be less 'wireless' and more "I access files by sticking something into a scomp link".  There's been some great ideas tossed out here already regarding making him learn actual passcodes, stealth places, and other obstacles.
 
 I think an important thing to remember is to let this 'ultimate hacker' type be a god of slicing under most circumstances.  When it's not relevant to the plot or major plans of the bad guys, let him get away with hacking into whatever he needs to.  He'll end up getting plenty of enemies on his trail soon enough that way anyway.  But then when a pivotal moment in the campaign happens, despite his capabilities to get 31+ on his rolls, there's still a 1 chance in 6 that something bad will happen.  If you do what has been suggested, and make him have to succeed on a roll to get back out of the system (and hide his tracks), the odds are now that 1 in 3  that he could be spotted!
 _________________
 Currently Running: Villains & Vigilantes (a 32-year-old campaign with multiple groups) and D6 Star Wars; mostly on hiatus are Adventures in Middle-earth and Delta Green
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		| Quetzacotl Commander
 
  
  
 Joined: 29 Jan 2013
 Posts: 281
 Location: Germany
 
 | 
			
				|  Posted: Fri Feb 14, 2014 2:18 pm    Post subject: |   |  
				| 
 |  
				| Well, you can simply limit the amount of information he can get from one station. 
 Might be that on the Hardware level something prevents that station to acces information above a certain level. Maybe it's not even connected to the full net, only a part of it.
 If it's on the hardware level, he can't just "hack" through that.
 
 There is a reason why in most stories you hear that they need to go to the mainframe, because that is the only place where they can get all the information they want... if the information is in that compley at all.
 
 
 And, btw. consider making it more difficulty. The + on the 31+ for Heroic is there for a reason, there is no real upper limit. If the information is so extremely secure and protected, make it a 50 or higher for difficulty.
 Of course you shoudln't do that on a regular basis, but as I said, you can simply regulate how much information there are accessible from a certain station.
 Perhaps it's not a station that can access anything because it's a one way connection. Sopmething sends Information to that station but the station itself can't send anything back (or anything send from there is simply dumped and not processed at all).
 There is no way you then that you can get more information then the terminal receives.
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		| garhkal Sovereign Protector
 
  
  
 Joined: 17 Jul 2005
 Posts: 14382
 Location: Reynoldsburg, Columbus, Ohio.
 
 | 
			
				|  Posted: Fri Feb 14, 2014 3:00 pm    Post subject: Re: How to Deal With a Hacker? |   |  
				| 
 |  
				|  	  | shootingwomprats wrote: |  	  | I have a character who has Computer Programming/Repair 6D+1 and is a slicer. He consistently cracks security on just about everything. Even when I set difficulties at 31+. 
 I am wondering if perhaps Slicing should be a specialization of the Computer skill? Suggestions on how to better implement mechanics for this type of game? I am open to suggestions.
 
 At this time I am naming tasks, giving them a time, make him roll after the time has elapsed and depending on his roll give him the information, etc.
 
 Has anyone else had a player like this?
 | 
 
 Routinely hitting 30+ on 6d+1?  What is he using, loaded dice?  Always popping a force point?
 
 One easy way to reign it in, is actually have him have to physically gain access to something to crack in, requiring security, and have enemies who are also slicers run 'intruder counter measure programs' so it makes it into opposed rolls.  BUT since they are familiar with their systems they gain a +10 or so bonus to their checks (that way they don't need 8d and higher to beat him)..
 
 
  	  | Quote: |  	  | Just because he can get into the system doesn't mean he 'knows' what to look for. *** I'm not sure how good at search he is, so this could slow him down big time. | 
 
 Rather than using search, have him roll investigations to correlate the data he is getting.
 
 
  	  | Quote: |  	  | Kind of hard to say is not successful when he is rolling freakin 27s and 28's and immediately spends a Character Point to make sure he rolls 31+, Heroic. | 
 
 Continually hitting that high on 6d+1?  I smell something fishy.
 
 As an aside for the remote accessing.  If he IS doing that a lot, start having him actually have to MAKE communications rolls to access the systems.
 _________________
 Confucious sayeth, don't wash cat while drunk!
 |  | 
	
		| Back to top |  | 
	
		|  | 
	
		|  |