Net.Guide to Slicers

The slicer is an often-overlooked character type in the Star Wars RPG, for many reasons. Often one of the problems is the conception of the slicer in the eyes of most players. When drafting up a character, most envision the daring smuggler, powerful Jedi, gruff soldier, or one of the many other hero archetypes. The slicer, however, has far more potential than to simply be the party’s computer hacker. The role of the slicer is valuable, both in information gathering and furthering the party’s goals, but he is far from limited to sitting in front of the computer terminal the entire adventure.

The slicer is a master of all things computerized. What some players don’t realize, however, is that in the Star Wars universe there is some form of computer in almost everything technological, from starfighters to blasters to comlinks. The difference is simply the interface, and how complex the computers are inside a given object. A mainframe computer is going to be far more complex than a blaster, and will also use a different type of interface. So many times, though, characters will forget that there is information and tools to be had in everything containing a computer. Downloading ship logs, examining a droid’s recent activity history, and even researching news articles are many times forgotten by the slicer. But, a well-equipped and versatile slicer could make use of either piece of equipment in any given situation.

The purpose of this Net.Guide is to show the possibilities of playing a slicer character, showing the right methods and tools for slicing, as well as opening up new doors and situations where a slicer would be valuable. It is meant mainly for players, but GM’s should also read before allowing any PCs to use any equipment or techniques listed herein.

What is the Holonet?

The Holonet is the highest level of computer connection in the Star Wars universe. It is a structured set of connections that forms a web of communications over the Galaxy, and has a variety of functions: news services, holographic communications, information and data transfer, among others that both civilians and government officials utilize on a daily basis. The Holonet itself is not relatively small; it is the information hubs which it connects which contain the majority of available data. The Holonet is simply the router by which data travels from system-to-system. However, when one speaks of the Holonet, he is usually referring to the Galaxy-wide network as a whole, not simply the connections at the top level. Slicing the Holonet is an incredibly daunting task, due to not only the unfathomable volume of data on the Holonet, but also the tight security which is placed upon it.

Below the Holonet itself are three different “hubs.” The term “hub” is merely used to classify the grouping of different systems into one major connection. The three hubs are separated to prevent overlap of data transfer, as well as external tampering for the system. A hub has no central computer, but rather flows through routers specifically designated to handle the data and transactions for its individual type of information.

The System Hubs are merely the groupings of public and private computer systems throughout each star system. For highly populated worlds, multiple system hubs may be necessary, but for worlds with small data transfer, several systems may be grouped into a single hub. The next level down from the System Hub is the actual public and private communications systems. This encompasses everything from private computers connecting to the Holonet, to news broadcasts and holographic transmissions, commercial and entertainment transmissions, and other data transactions that the public-at-large has access to.

Government Hubs are also done by system, but also connect to an overall government system (Galactic Republic, Empire, or New Republic depending on the era). These handle all government transactions, and are highly encoded and secure. A Government Hub is one of the most highly guarded computer banks in the Galaxy due to the number of official and top secret information articles transmitted via these hubs every day. Some government information is available to the public, and is usually transmitted from a Government Hub, to the Holonet, and back down through a System Hub when a data request is sent from an unauthorized civilian source. Below the Government Hub is the Military branch, which handles everything from supply requests & transactions, to fleet orders, to top-secret military documents. Additionally, the Government Hub contains Administrative branches, which take up all non-military government functions, from official communications to government commerce. The Government Hub also connects to the System Hubs for better interaction with the citizens.

The final of the three hubs is the Corporate Hub. Unlike the Government and System Hubs, the Corporate Hub is not organized by system or sector, but rather by the type of business. Trade Companies, Weapons Manufacturers, Transport Providers, and the like all fall into different categories. All the transactions and communications of any commercial or private business of sufficient size travels through the Corporate Hub on private encoded lines. The Corporate Hub also connects to the Administrative branch of the Government Hub, for all commerce-related communications.

Below is a simple outline to give you a good idea of how the system works.

A Slicer’s Skills

A slicer is no ordinary programmer, and thus has skills which other computer users would find unfathomable. Below are a pair of Advanced Skills for slicer characters to use when writing software or cracking a system.

Slicing
Time Taken: Minutes or Hours or Days, customized to the circumstances.
Specializations:
A particular mode of slicing—code cracking, information gathering.
Advanced Skill – Requires computer programming/repair of 5D, forgery of 4D.
This is the actual skill that the majority of code slicers employ when cracking into a system. Whereas the computer programming skill allows a character to retrieve information (if he knows where to look), this skill uses software and the slicer’s knowledge of computer systems to override and affect complex databases and simple computerized structures. With this skill, a slicer can break into a system and steal/alter files and data packets, leave false trails, implant computer viruses, and perform other general computer altering operations.

Artificial Intelligence
Time Taken: Hours or Days or Weeks, customized to the circumastances.
Specializations:
A particular type of AI—droid brain, virus.
Advanced Skill – Requires computer programming/repair of 5D, droid programming of 5D.
This skill allows a talented programmer to effectively create or alter artificial intelligence in its varying forms. This ranges from creating a program which can learn from its mistakes, to writing a droid personality from scratch. The latter, of course, takes much much longer, but as with any skill the more complex the task, the more time it will take. Uses for this skill include adding thinking AI to a software package, creating a better interface for human-computer communications, and improving current droid and computer protocols.

The Slicer in his Element: Software & Slicing

There is no better environment for a slicer than to be stationed at a computer terminal with time to work and the right equipment. In the case of a slicer, his best “equipment” is actually his software. Whether self-written or purchased, with the right software at his disposal a good slicer can be more valuable than any other member of the party. There are many types of software for many different roles; sometimes a program is needed, other times all that is needed is a few well placed commands by the slicer. The slicing styles listed herein are only suggestions; it is up to the creativity of the player and the GM to come up with as many new ideas and combinations as are needed!

Optional Rule: Machine Language vs. Programming Language
Should the GM Wish to go into detail, he could separate the type of code used by software from that used by hardware. This difference would be seen in trying to hack into a database, as opposed to tinkering with a blaster’s programming. He may also allow the slicer to take slicing: machine language or slicing: programming language as a specialization, but only if the GM feels it necessary to differentiate between hardware and software slicing.

Writing Software

A slicer may write software to help him do his dirty work. This takes a computer programming/repair roll, with a difficulty depending on the type of software. GM’s discretion is used to determine how long it takes to write the software, and how difficult it is to do so. If the slicer has the Artificial Intelligence skill, he can also roll that skill and add some degree of AI to the software, with a difficulty level determined by how complex the AI needs to be.

Using Software

When a character writes a piece of software, he rolls his computer programming/repair skill to determine how effective the new software is. This is seen in the form of a bonus which is added onto the slicing skill when used for its intended purpose. (Note: if the roll comes up “No bonus” the software is not useless; it can still be set to run while the slicer performs other tasks) Consult the following chart for how effective the software is.

Roll

Result

0-10 No Bonus
11-15 +1D
15-25 +2D
25+ +3D

For example, Rupert decides that during this hyperspace trip he’s going to work on his code descrambling software. The GM assigns him a time length and difficulty level (in this case a time length of 1 week, and a Moderate roll due to the type of codes it will descramble), which Rupert passes. Once the software is completed, he rolls a 16 on his computer programming/repair roll, which gives him a +2D bonus to code descrambling when using this software.

Slicing Styles

Code Descrambling
Difficulty
: Difficult Slicing, or opposed roll vs. encoder.
Time to Use: Minutes to Hours
Result: This use of this style allows a slicer to decode documents which have been encrypted somehow. The slicer must have access to the file in its entirety, which he will then search for patterns by which to translate the document. This can be used with both written, aural, and video data types, though the latter two require a Moderate communications roll as well.

Hardware Slicing
Difficulty
: Moderate Slicing, with modifiers by complexity
Time to Use
: Minutes to Hours
Result
: Hardware slicing is the act of modifying the basic commands sent between the elements of different pieces of hardware. This can be used on objects that contain computer elements that execute direct commands, such as blasters, cybernetics, comlinks, and the like.

Information Gatherers
Difficulty
: Moderate Slicing, with modifiers by obscurity
Time to Use
: Minutes to Hours
Result: Unlike the basic computer programming/repair attempt at gathering information, this is an active search through a multitude of systems and files for any mention of a subject. This can be used to track an individual, do research, or one of many other functions. It is a more generalized style, and depending on the time put into it the information yield will be much, much greater than with the standard file retrieval. This style can also be used to alter references to certain individuals, places, etc. as well.

Password Cracking
Difficulty: Moderate Slicing, with modifiers by computer security
Time to Use
: Minutes to Hours
Result
: This slicing style is used, through trial-and-error, to find a password on an encrypted system. A Warning to Slicers: Many computer systems will have security measures against password cracking, so attempt with caution.

Remote System Operation
Difficulty
: Moderate Slicing, with modifiers by distance
Time to Use
: Minutes to Hours
Result
: This style allows a slicer to remotely manipulate a computer or piece of hardware he has access to through some sort of network. Examples of use would be logging into a computer terminal remotely, manipulating robotic arms in a factory from a datapad, operating a vehicle by remote, or any other type of control over a computer from a secondary location.

Resource Alteration/Procurement
Difficulty
: Moderate Slicing, Moderate forgery
Time to Use
: Minutes to Hours
Result
: This style allows a slicer to enter into a database and alter quantities and orders for certain resources, going directly to the source of the information as opposed to end-of-the-line alterations. This can be anything from bank account transactions, to food & supply requests, to passenger manifests, and more. GM should make the necessary opposing roll for forgery to make sure that no one notices anything amiss.

Virus
Difficulty
: Moderate Slicing, with modifiers by complexity & security of target system
Time to Use
: Minutes
Result
: Viruses are a malicious way to attack a computer system with relative ease, though depending on the results the attempt becomes much more difficult. This style requires that the virus software be written beforehand. This style merely represents the actual insertion of the virus into the system.

The Slicer in Combat Situations

By no means is a slicer limited to his computer terminal for usefulness. Many times the slicer’s resourcefulness can be a weapon unto itself, and woe to the enemy who underestimates the man with the datapad. There are many techniques that can be used by a slicer in order to make himself a formidable foe in combat, and below are listed only a few. A slicer should not limit himself to the ideas found here, but rather use them as a jumping off point.

One valuable technique for a slicer in combat is to use the tools at hand to make a more nonstandard weapon out of what he has. The slicer is the character who will combine two objects to make a new one, routing their hardware and basic software together to make a useful item in a pinch. A slicer will often be found with his blaster broken open, tinkering with the weapon firing systems to transform a mundane blaster into a fully automatic handheld weapon by removing the single-shot protocols. Or perhaps he pulled the hardware out of his datapad and replaced it with the internal components from his holdout blaster, with the discharge coming from the infrared sensor port. Or maybe he altered an explosive by attaching his comlink to it, with a designated signal used to detonate it set to the frequency of an Imperial Stormtrooper’s helmet. Combining objects on hand can often be the most effective way for a slicer to create something out of few materials.

Other times the slicer can alter the programming of a droid, or remote-operate a speeder for the best results. The best way past a barricade is to break the barricade down, and certainly none of the party members want to drive the kamikaze speeder into the heart of their opponents. A droid gone haywire can be a great distraction, or even a dangerous enemy depending on how the programming is altered. Even weapons can be hotwired and set to fire at a regular interval, while the party beats a hasty retreat in the opposite direction.

In an urban setting, the slicer has a lot more opportunities to be effective. His slicing skills can call in backup, reroute police forces, activate building security systems, create distractions, and many other tactics. He may choose to hack into building security cameras to monitor his enemy’s progress, or seal off all exits with the building’s emergency fire doors.

The point is that a creative slicer will, rather than engage in head-to-head combat, use the items and resources available to him in order to aid the party, both in combat and out.

Index 1: Equipment of a Slicer

Item

Location

Audio Activated Datapad Fantastic Technology p. 29
Borg Construct Cracken's Rebel Field Guide p. 31
Comlink Revised and Expanded p. 226
Computer Spike Cracken's Rebel Field Guide p. 12
Cryptographic Coder Fantastic Technology p. 29
Cyborg/Computer Datalink Cracken's Rebel Field Guide p. 32
Cyborg/Droid Datalink Cracken's Rebel Field Guide p. 33
Cyborg Knowledge Cartridge Cracken's Rebel Field Guide p. 34
Datapads Revised & Expanded p. 226
Datasearch Gundark's Personal Gear p. 93
DimSim Holographic Projector Galaxy Guide 11 p. 85
Drogue Repulsorlift Skill Galaxy Guide 11 p. 86
Implant Communicators Fantastic Technology p. 87
Portable Computer Cracken’s Rebel Field Guide p.10
Portable Message Tranciever Fantastic Technology p. 67
Point-to-Point Transceiver Gundark’s Personal Gear p. 90
Remote Text Data Scanner Fantastic Technology p. 45
UniTech "Patch" Gundark's Personal Gear p. 94
Universal Computer Interface Fantastic Technology p. 32

Index 2: Slicer Template

DEXTERITY 2D+2
KNOWLEDGE 3D+2
MECHANICAL 2D
PERCEPTION 3D+2
STRENGTH 2D
TECHNICAL 4D
Equipment:
Street clothing, DimSim holographic projector, electronic lockpicking kit, hol-out blaster (3D), drogue repulsorlift skiff, comlink, datapad.