The Hacker Kit 1.1 is a hacker tool kit that allows someone to break past any computer controlled lock or check point as well as access any information available on the computer by deciphering pass words. It's very difficult to use but also very effective when done properly. To interact with it there is a keyboard and a small screen. The hacker kit is a supplement but not a replacement to the hacker. It cannot accomplish it's tasks without someone to carry out the physical aspect. Because of all the neccesary tasks required in it's use it was proven impracitcal to make it a droid.
The kit comes with a hydrospanner, screw driver, laser cutter, universal computer jack, specialized comlink, retinal projector and card decoder along with a level one droid brain and a keyobard view screen interface. (note if a player is as good with computers as he should be to acquire this machine, he can put in a voice unit to the computer with only an easy computer prog/repair roll)
When the kit is activated it requires a Security skill of 4D to use. Even then if it is a new user and not the previous one, all past files are deleted and randomized. as well, no Hacker Kit will Hack another, so all Kits are completely safe from ever having their doings used against their owners.
This device can crack through any computer security measure and then copy the data inside. It will also unlock all computer controlled locks and blind any computer controlled check points. Below are a list of the counter measures employed to keep people out and the counter counter measures the Hacker Kit 1.1 will use to get in.
Locks:
Password - If any pssword is required either audio or touch pad, the hacker need only remove the panel meant to receive the password and connect the built in computer on the Hacker Kit 1.1 to both the receiver and the verifier.. Then the GM can roll a Easy difficulty roll to have the Hacker Kit 1.1 take the expected password from the verifying component and putting it through the receiver. The computer cannot tell the difference and the only evidence of the Hackers presence is the removed panel, which is easily rectified by putting the panel back in place.
Key Card - This is laughably easy. Take the card decoder from the equipment rack above the monitor and place it in the appropriate slot. The delicate instrument then reads the incoming interogation (through either laser, x-ray, magnetic or mechanical means) and gives the sought after response. The Kit rolls it's individual roll of 4D to a moderate difficulty to have the desired effect.
Hand Scan - This is a more difficult task in that the hacker can never touch the receiver. Instead he must find the power source to the receiver and disconnect the power to it. Then he must find the connection between the receiver and the objective and splice this (moderate difficulty on the computer prog/repair skill) then connect the spliced wire to the Hacker Kit 1.1. Then the Hacker Kit rolls it's individual roll of 4D to order the objective to respond in the desired fashion. (moderate difficuly)
Retinal Scan - This is the most difficult lock to crack. Have the hacker remove the panel around the lense of the retinal scanner. Upon finding the verifier unit atach this to the Kit (difficult computer prog/repair) then attach the retinal projector hanging on the equipment rack above the screen to the hard drive and place it in front of the lense. Then both may roll their collective roll of 8D to acheive a very difficult Security Roll.
Security Monitors
Camera and holorecorders - Your Hacker won't get very far in life if he breaks into a facility to copy secret and restricted information only to be seen on film and alert the secuirty troops. To avoid this result, as soon as possible link the Kit up to a secuirty relay junction (they're not too hard to find. About as common as a light switch. Say a moderate perception roll) and tap it in.
Use the retinal recorder to scan your image and that of the kit then transfer this information onto the Kit's hard drive. It will then have the security system copy the image as old data and it will be ignored from all scans. This is not 100% fool proof. A thermal sensor will still show up along with a shadow but there are other ways to handle that.
Thermal Image - When you remove your image from the system type in ^^^***%comm#1 into the Kit. Even with a voice synthesizer installed this command must be typed. This is done to insure that not even the Kit knows the Hackers secret ace in the hole. The command is immediatly translated by the droid brain and activates the comm unit at the same time sending a command over the security lines to ignore anything that would trigger their preset orders to alert security within 6 feet of this wide band signal that will read in any electronic device focusing in it's direction. The only way to detect the signal is to monitor all comm channels inside the facility and if that is the case it's the hackers own dumb luck.
Meanwhile the memory of the event is deleted and randomized automatically by the droid brain. It will never understand why it's master is so casual about what to it is an obvious short coming in it's protection of it's master. There is no roll involved as long as the player states that he/she is using the code.
Electric Security
Password - Hook the unit up to the computer and let them blabber back and forth. The Hacker Lit 1.1 is fluent in all known computer languages and has the ability to trace program origins. This means that any computer from the known galaxy can have it's passwords traced back to their point of origin copied and then given to the password receiver within 4 turns at a moderate difficulty level for the Kit.
Presence Recorder - This is much more difficult in that you must actually remove files. A presence detector records who or what is inside it's assigned area at what time. The best thing (and easiest) to do is allow it to record then delete the file and randomize the spot where the file used to exist. This is a difficult task and must be done for three consecutive rounds before safety is 100% assured.
Copyright © 1997 Geoff Micks