I ran into this the other day and wasn’t sure how to handle it.
Let’s say a player is undercover and he wants to use the commlog of a couple guards to snoop and use as a repeater for the area.
The normal Infowar rules say that to do this the player must inflict a breech on the commlog in question. This introduces a couple of problems if the guard in question is just a Trooper.
- The Guard probably only has a few points of Firewall. Inflicting a breech will do so much damage that that guard’s commlog will go down.
- We’re trying to be stealthy here. The guard will likely notice that his commlog has been fried.
- A commlog that is down isn’t going to be very useful as a Repeater, which is why we inflicted the Breech in the first place.
Solutions I can see for this:
- If it’s not a full Infowar scene, allow a player to do what he wants to do (Tag a commlog, Snoop on commlog traffic, etc) without actually inflicting a breech. Just make it a D2 hacking check instead.
- The player in question should spend momentum to add “Nonlethal” to the breech so that it doesn’t bring down the network they are trying to hack.
- Since the guard in question is a Trooper and can only suffer one breech for being effectively removed from the scene, then inflicting a breech should be enough for the player to essentially conquer the guard’s commlog and do whatever he wants with it. For example, the player can make the commlog appear to the guard as if it’s functioning perfectly well, even though the player has full control of it. At this point the player could do anything on the commlog that would normally require a breech, but he doesn’t actually have to inflict breeches anymore. Essentially admin access. Depending on what the player is doing this could be considered a “Noisy” action and the player might have to make a Stealth roll for his hack to go unnoticed. This could also be applied to Elite NPCs if two breeches are inflicted on their networks.
I’d appreciate your thoughts. Thanks!