Thursday, December 7, 2023

OOC - SR3 Simplified Decking Rules

These are the simplified rules I use with decker player characters. 

The base rules are from the Shadowrun 3rd edition book, as well as the Matrix and Target: Matrix sourcebooks. Where the rules do not conflict, the rules from these base books should be used.

Layout of the matrix

In almost every situation, an LTG flows smoothly into a RTG, or another LTG. Only truly restrictive, or paranoid, countries would restrict access to a LTG or RTG. Once a decker accesses a public RTG or LTG, they should be able to move through the matrix without difficulties.

Accessing most RTGs and LTGs can be done wirelessly with a cellular link. No decking checks are needed with accessing an RTG or LTG when using a legit account. Checks are only needed if the decker is attempting to bypass the logon process.

Accessing the matrix.

All around us are wireless signals, flying through the air. These can be accessed by any decker using a radio link. These connections connect to a host and must be accessed as if using a jackpoint connected to that host. These wireless signals have a limited range, which may be tens of feet to as much as several hundred feet of range.

Sometimes, valuable information will be stored in hosts not accessible by wireless signals. Very paranoid governments or corporations will only have basic, freely available information stored in their wireless hosts. More secure servers are hard lined, with fiber optic cables. These may only be accessed by terminal hosts or jack points within that host's facility.

Alternatives to fiber optic cables

Jack points may be accessed using a decker's own fiber optic cable, or any other wireless link that can be used for the same purpose, such as a cellular or radio link wireless system. These systems can be used as described on page 33 of the matrix sourcebook, but they may also be used to bypass the need for a fiber optic cable.
When the equipment for the wireless connection is purchased, it may come with a wireless jackpoint adapter. These adapters allow a decker to plug in a wireless adapter into a jackpoint and then use their wireless link to access the jackpoint, as if they were plugged into it with a fiber optic cable.
These adpaters are exceptionally useful, if the jackpoint is in a public area, or behind a heavy filing cabinet. They can also be useful, if the decker needs to find a place to hide, or cover. The danger of using a wireless adapter is the same as a fiber optic cable. If anyone unplugs the adapter, while in use, the decker suffers dumpshock.

Running the Matrix and System Operations

Unfortunately, unless all of the player characters are deckers, it is wise to skip the detailed iconography information and jump straight into the system operation tests. It is important for the PCs to know that icons can be designed with crazy color schemes and flaming logos, but attempting to describe each one would take too much precious game time.

The same ratings are used to access and manipulate a host. The security rating is used as the number of dice used to roll against the intruding decker for the security sheaf tally. The other ratings, access, control, Index, Files, and Slave are the difficulty numbers for the decker used to manipulate the systems.

For example: A decker attempts to accesses an Orange-5 System with an Access rating of 8. The decker would roll their computer skill with a difficulty of 8. In truth, the difficulty might be lower passed upon the decker's available programs.

Because this is a simpler system, it gives the decker an advantage. If it seems too easy for the decker, increase the difficulties of the systems by 3 to 5. Or, you may have every 1 rolled on the decker's test automatically add to their security sheaf tally. I use the latter rule in my game.
Whenever the decker attempts to manipulate the host, the Game Mater rolls dice equal to the host's security rating against the decker's detection factor. Every success is added to the security sheaf tally. If the non-decker players are not doing much, have them make these rolls for you.

I do not reference the rulebook, nor have I memorized it, when a decker wants to perform a system operation. I just have the decker make a system check that corresponds to the system they are affecting. All system operation checks are simple actions. It is up to the decker's player to remember if they have a utility that would aid them in the system operation test.

Interrogations and Noticing New Icons

I do not use the interrogation rules on page 214 of the SR3 rulebook. I allow deckers to find what they need by using Index tests and locate utilities. These tests add to the decker's security sheaf tally, just like every other system operation test the decker makes.
Unless a decker is trying to be sneaky, I do not use the Noticing New Icons rules found on page 209 of the SR3 rulebook. All icons are automatically noticed.

Matrix combat

If the non-decker PCs are not engaged in combat themselves, allow the non-decker players to roll for the enemy deckers and IC.

Complex and simple actions are all simple actions. Some free actions are simple actions as well. Basically, if it requires a roll, other than using a knowledge skill, it's a simple action.

Roll initiative as normal. For every factor of 10 rolled on initiative, the decker gets a standard action and a dodge action. This is the same for IC. So, if a decker or IC rolls an initiative of 22, they would get three standard and three dodge actions.
The maneuvers found on page 224 of the SR3 rulebook are not used. During matrix combat, the decker has a few options available. Fight, dodge, parry, leave the system, and jack out.

Fighting is handled very simply. Initiative is rolled. The decker or IC with the highest initiative attacks with a target number of 4. If a defender has a dodge available, the may use it.

Dodge is accomplished by rolling a number of dice equal to the decker's relocate utility. For every 4 rolled, the decker subtracts a success from the attack rolled by the IC or enemy decker. IC uses its rating for dodge tests.

Parry tests are handed like dodge tests, except an attack action is used to counter the attack action of the attacking IC or decker. I never have IC use parry tests, as they are never afraid to crash.
Damage is handled the same as is on page 226 of the SR3 rulebook. I generally use Killer, Probe, Sparky, and Lethal Black IC, as they are the easiest for me to use.

I changed the cloak ultilty to make it more difficult for IC, or another decker, to successfully hit a decker with the cloak utility. The attacker's difficulty to hit a decker, in combat, is increased by the cloak utility's rating. The cloak ultility loses a point of rating after every attack made by the attacker, even if the attack misses. Once the cloak utility rating equals zero, the utility will not help the decker for the rest of that combat. If more attackers arrive before the combat is resolved, it will not assist against those new attackers.

Leave the system is the equivalent of running away. The decker will use all actions, during the combat round, as dodge actions, effectively getting two dodge actions per initiative phase. They may not attack. If the decker survives the full combat round, they have left the host and, unless the decker is in a PLTG, the IC will not follow. If the decker has been hit with black IC, a willpower roll is required to leave the system, as if the decker were jacking out, see page 230 in the SR3 rulebook.

Jacking out is handled as outlined on page 224 of the SR3 rulebook, with the exception that it is a simple action.

A simple run would look like this: Decker PC jacks into a RTG using valid account information and proceeds to a host they want to crack. They arrive at the host and make an access test, using the deception utility to lower their difficulty. At the same time, the system rolls it's security rating against the decker's detection factor. Once the host is accessed, the decker then makes a locate file operation to find the file they need. The system rolls it's security rating against the decker's detection factor. Once the file is located, the decker makes a access test to access the file. The system rolls it's security rating against the decker's detection factor. After the decker accesses the file, they roll a files test to download the file. The system rolls it's security rating against the decker's detection factor. Once the file is secured, the decker rolls a access test to gracefully log off. The system rolls it's security rating against the decker's detection factor one more time.
This is the way a decker's run would go, if the security sheaf did not activate IC or additional surprises. If the security sheaf indicated IC or an enemy decker, they would be able to engage the decker immediately.

What do you think of my simplified rules? Are they too simple or too complex? Let me know.

No comments:

Post a Comment