Thanks to visit codestin.com
Credit goes to www.scribd.com

100% found this document useful (1 vote)
116 views15 pages

Comprehensive Matrix Action List

This document provides a summary of key rules and actions for the Matrix system in Shadowrun 4th Edition without replacing the core rulebooks. It includes disclaimers about being an unauthorized work for player convenience. Tables summarize cybercombat resolution, matrix perception tests, common programs and their actions. Descriptions of matrix actions like analyzing, browsing, running programs, and firewall defenses are also presented. The intent is to simplify the complex Matrix system in Shadowrun without requiring constant rulebook lookups.

Uploaded by

Dan Horning
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODS, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
116 views15 pages

Comprehensive Matrix Action List

This document provides a summary of key rules and actions for the Matrix system in Shadowrun 4th Edition without replacing the core rulebooks. It includes disclaimers about being an unauthorized work for player convenience. Tables summarize cybercombat resolution, matrix perception tests, common programs and their actions. Descriptions of matrix actions like analyzing, browsing, running programs, and firewall defenses are also presented. The intent is to simplify the complex Matrix system in Shadowrun without requiring constant rulebook lookups.

Uploaded by

Dan Horning
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODS, PDF, TXT or read online on Scribd
You are on page 1/ 15

Sheet1

Disclaimer
this is my own work and unauthorized by Catalyst Game Labratories
this was made for players to use as a companion to Shadowrun 4th ed Rules presented in
the Shadowrun 4th ed Core Rule Book and Unwired
Not as a replacment to those books
any Mistakes are mine and mine alone and not the mistakes of CCG or its affiliates

While some of the powers, Matrix actions, and tables have been Printed here in Great Detail, or
even word for word from the source material this document is designed for use with Shadowrun 4th ED
not as a replacement to the source books The intent of this Document is to simplify one of the
complex Aspects of the game of Shadowrun 4th Ed by compiling everything a person need
know in order to work within the Wireless world of the matrix without wasting time
flipping through books looking for particular matrix actions Located in some obscure
location and holding the game up with the spirit of previous editions
This Document is Made with the utmost respect for CGL's Product and is in no way
Designed to Undermine their work

Cybercombat Summary Chart


Attack Persona Cybercombat + offensive program
Agent, IC, sprite Rating + offensive program

DEFENSE: Response + Firewall


Full Defense + Hacking (persona) or rating (agents, IC, sprites)

DAMAGE VALUE: Offensive program + net hits

DAMAGE RESISTANCE Attack System + Armor, hits reduce damage

Blackout/Black Hammer Willpower + Biofeedback Filter, hits reduce damage

Matrix Perception information List


• Access ID of a user or independent agent
• Alert status of node
• Edit date of a fle
• Function of a control icon
• Hidden access to another node
• Matrix damage taken by icon
• Presence of a data bomb
• Programs run by persona or agent
• Rating of one Matrix attribute
• Type (fle, user, agent, program type, etc.)
• Whether a fle or node is encrypted
• Whether a Trace is running

Page 1
Sheet1
Active Subscriptions <= System * 2 Programs Cannot Exceed System which cannot Exceed Response
-1 Response for every (Response) programs running Matrix Condition Modifier = 8 + System / 2

Actions By Programs
Common Use Programs

System
Alter/Swap Icon Free Action
You change a detail of an icon representing your persona or one of the programs, fles, or nodes
own, or switch the icon to a pre-rendered icon you have stored

Change Linked Device mode Free Action


Change the mode of a device linked to your persona
Detect Active/Passive Wireless Nodes Free Action

Jackout Free if in AR Complex in VR


Jacking out triggers Dump Shock, and requires a test when Black IC damage has been taken.
Switch Interface mode Free Action
Switch perception between AR and VR,Cannot Change mode if your connection is
Jammed open by Black IC
Terminate Data Transfer Free Action
Stop the transfer of data that you began
Transmit Phrase Free Action
Technomancer Reboot Free Action
Logic + Willpower(10,1 hour)
Matrix Connection is severed , but rebooting the Persona takes time for it to come back up
Log off Simple Action
your Persona logs off of a node severing the subscription and connection to that node
you may also use this to gracefully log off when you are in VR, avoiding dumpshock
Observe in Detail Simple Action
You look at one of the nodes to which your persona is connected automatically percieving
all Icons not running stealth because your commlink catalogs them
Transfer Data Simple Action
you transfer a ffile or set of files from 1 node to another most transactions last until the end of the
combat turn
Deactivate Program Simple Action
Switch a Programs Status from Running to Loaded
May also be used on an Agent in which case all its programs stop running
Decrypt Simple Action
if you have the key to a particular encryption you use this action
Jump into a Drone/Vehicle/Device Simple Action
You jump into a Drone, Vehicle, or device via VR
Log on Complex Action
You open a subscription to a node and your Icon appears there. This requires no test But does
Require Proper authentication to an account, or a hacked account

Page 2
Sheet1

Reboot Complex Action


System+Response (10,1 combat turn)
This is the time till the system shuts down and logs everyone off. System resets the next Combat Turn
following
Restart
Combat turns equal to the System rating
Node Respawns at the end of a System+Response(10,1 combat turn)
Run Program Complex Action
You run a program,agent,or IC that is loaded in a device which you have access and the
appropriate privileges. Change the programs status from Loaded to running
Firewall
Matrix Defense
Response + Firewall
Defende against incomming Matrix attacks, Reduces the hits on the initial attack Test
Terminate Connection no action or Complex Action
Firewall + System
the Node attempts to Log off the hacker with an extended test(Hackers Exploit) The system adds Dice pool modifier
of +1 for each IC Launched following the alert. The Hackers Exploit is modified by +2 if he is using a security account
and +4 if using an Admin
Alternativly anyone with an admin account on the node may spend a complex action to have the node attempt to
terminate the connection this may be done without an alert but also without the bonus's
Analyze
Matrix Perception test Simple Action
Analyze Node/Icon Simple Action
Computer + Analyze
Examine AR or VR Items, Hits Determine how many questions you can ask
vs. Hacking + Stealth (Stealth+Firewall for programs or nodes)
Can be set to automatically scan a node as soon as you log in
Determine wearther someone has tapped wired Matrix traffic through the node
Notice come tricks that Sprites can preform
Spot Trace Simple Action
Computer + Analyze
(1) Or Opposed vs Stealth + Track
Verify Program
Software+Analyze (pg. 109 Unwired)
Hits Determine how successful it was
Detect Downloaded Virus No Action or Simple Action
Firewall + Analyze
vs. Virus Rating x2
Post detection requires an Observe in detail vs Virus Rating x2
Detect Intrusion No Action
Firewall + Analyze(Hackers stealth) each time he attempts to hack on the fly
(Hackers stealth) each time he attempts to hack on the fly
(Hackers stealth) vs Probing
Detect Botnet Compromise
Hacking + Analyze
Opposed test vs the Hackers Hacking + Stealth success allows you to cut of the compromised bots and
deny the intruding hacker the use of the rest of the botnet.
Noticing a VPN Simple Action

Page 3
Sheet1

Computer + Analyze
in order to notice a hacker running a VPN make an opposed test vs the opponents Firewall + Stealth
Browse
Find information Extended Test
Data Search + Browse
**Find information on a Certain topic with a variable interval and variable threshold
**Used to find Pirate Networks (8,1day)
**Used to Find Pirated Programs (Availability+ Desired Rating, 1 combat turn
**Spot Hidden accounts and Access points Data Search + Browse (Lowest stealth of of hacker
Using the account or Access point x2,1 day)
**Locate Hacked accounts or Reusable exploit (lowest Stealth rating of hacker using exploit
or account, 1 day) ,may be fixed immediately with a Software+ Edit (firewall 1 minuite)
Command
Control Device Complex Action
Command + (Skill)
**Conbtrol a Device through the matrix. Note actions are Complex even if they were simple
Remote Control a Drone Complex Action
Command + Skill
all actions while controlling drones Except for Perception Tests while not jumped in
Issue Command Simple Action
You give a short list of commands to an Agent, Drone, or device that accepts your accesss ID as
authorized to do so, you may send the same commands to multiple recipients
Command Cyberware Simple Action
Command + Hacking
Vs. System + Firewall once hacked into the master node
Command Smartlink Simple Action or Free action
Computer + Command(1) OR Opposed Computr + Command
Free Action if commanding from the smartlink, Simple if command from commlink
Threshold (1) if un controlled Opposed if 2 people are controlling it
Edit
Create your Own Icon
Software + Edit (10, 1 day)
Edit File Complex Action
Computer + Edit
Variable Threshold Determined by the GM
Continuous edit of a device each IP for the duration Simple Action
Edit Trafic after a successful Sniffer Test
Certified Data Complex Action
Hacking + Edit(4) Wipe log on a certified datachip with out corrupting the data
Forgery Extended Test
Forgery + Edit Choose Rating of the forgery (1-6) then apply DP penalties
The Forgery Table is on pg. 95 and 205 in unwired
PFF Files Complex Action
Logic + Software if the character has a valid Corprate SIN that matches the OS
Hacking + Edit(3) if the Character does not have a valid corp SIN to Mach his OS

Fake SIN Extended Test


Series of system intrusions and Hacking + Edit (System,1 hour)

Page 4
Sheet1

the GM May play these intrusions out or Sumerize them quickly with a
Hacking + Edit ( Rating of Fake SIN x System), 1 hour Extended Test
Legitimate Account Complex Action
If you have Security privileges
Software + Edit
If you do not have security privileges
Hacking + Edit(2) User
Hacking + Edit(3) Security
Hacking+ Edit(4) Admin
DOS Attack Complex Action
Instructig a node to Block future connection requests From a particular node or
or Access ID (or a Range of Nodes/Access ID's)
With Security or Admin privileges
Computer + Edit
Without Security or admin privileges
Hacking + Edit(2)
Deleting Accounts
Software+Edit (1) with Security or admin privileges Hacking + Edit(2) if you dont
If Active the Users Connection must be Terminated first
Hacked Cyberware Complex Action
Computer + Edit
Insert Pre Recorded or Self Created Sensory Input to the appropriate Sensory Receptors
Hacking + Edit
Shut Character out of controling his own implants by deactivating DNI or alter account privileges
Cyberware information Complex Action
Software + Edit Various Thresholds
Change Personal data on cyberware (Owner, License number)
Hacking + Edit
Changing any other information on cybernetics
Proxy Server Extended Test
Computer + Edit With admin Edit + Hacking without
Change Node into a Proxy Node
Track Thresholds +4 and Response -1 per Proxy Used
Trojans Extended Test
Hacking + Edit (10, 1 initiative Pass)
Manually Load a Trojan on a Compromised System
Encrypt
Encrypt Simple Action
you encrypt a file,set of files,nodem or Communications link, Choose passcode
that you or another user can use to decrypt it, you may encrypt multiple files
together into a single Archive file, you may also attach a Data Bomb, or Corrupt
Threshold Sets Threshold of Ratingx2 against decryption
Strong Encryption 1-24 hours
interval for Decryption is equal to the time spent to perform the Stong encryption
May not be used to encrypt Signals encryption

Dynamic Encryption Complex Action


Requires awareness of an attacker through Matrix Perception test

Page 5
Sheet1

Computer + Encrypt vs. Attackers Electronic Warfare + Decrypt


Net hits increase the threshold for the attackers attempt to break the encryption
Incompatible with Strong encryption
Restore Encryption after its been broken
Signal Log off action then Log on Action then Re-encrypting the subscription
File Encryption Encrypt the now Decrypted File
Node Encryption Rebooting the node (Complex + Reboot time) Re-encrypting it ( a Simple Action)
Reality Filter
Reality Filter No Action
Reality Filter + Response vs Nodes System + Response
if the Filter wins then your preprogrammed paradigm, Overrides the nodes signals giving you a +1
response while in that node
if the node wins or Ties then you suffer a -1 Response
AI's
AI's Reality Filter + Intuition (10, 1 day)
The AI Harmonizes with the node Subconciously once the extended test is complete the systems Ratings are
increased by a modifier equal to the AI's Rating divided by 2(Round up)
Scan
Detect Hidden Node Complex or Extended
Scan + Electronic Warfare (4)
if you believe there is a Hidden node and have an Idea where it is
Scan + Electronic Warfare 15+(1 combat Turn)
Find all devices in hidden mode within mutual signal range
Scan for Smart Links in mutual Signal Range
Data search + Scan
Purge
Disinfect Complex Action
Computer + Purge
Remove the Virus and all copies of the Virus in the node
If More than one Virus exists in the node, a seperate test must be made (part of the same complex action)

Hacking Programs
Armor
Resist System Damage
System + Armor
Armor Programs Add their Rating in Dice to defend the User from any attact that causes Matrix Damage
Attack
Matrix Attack Action Complex Action
Cybercombat + Attack
You Engage an Icon in Cybercombat
Damage Value
Sets the Base Damage Value of matrix Damage

Biofeedback Filter

Page 6
Sheet1

Resist Damage from Simsense Overload


Willpower + Biofeedback Filter
Used to resist Damage from Black IC, Dumpshock and BTL's
Jackout after being Hit by Black IC Complex Action
Willpower + Biofeedback Filter
Opposed Test Vs. The Black IC Rating + Response to Sever the Connection
Drone Damage
Willpower + Biofeedback Filter
When “Jumped into“ a drone and the drone takes damage the rigger must resist ½ the total damage
done as Stun Damage with his Biofeedback Filter
Black Hammer
Matrix Attack Action Complex Action
Cybercombat + Attack
you engage an Icon in Cybercombat, if you hit a VR User in Hot SIM you Deal Physical damage to the Icons Controller
If the user is using Cold SIM then you deal Stun Damage, you also Jam the connection open preventing the user from
Jacking out forcing the opposing hacker to make an opposed test of Willpower+ Biofeedback
vs. Program Rating + Response, Ineffective against Programs,Agents,IC,Sprite or AR Users
Blackout
Matrix Attack Action Complex Action
Cybercombat + Attack
You Engage an Icon in Cybercombat if you hit a VR User you do Stun Damage to another VR user Jamming
their Connection open Forcing A Willpower + Biofeedback vs. Blackout Rating + Respoonse in order to
Jack out of the Matrix. Only Effective against People Using VR
Corrupt
Corrput Data Extended Test
Hacking + Corrupt
you unleash the Corrupt program in a node to seek out and destroy a particular piece of information with a
Hacking + Corrupt (1 combat turn) the GM Sets the threshold based on the complexity of the data, Size of the node,
and the abundance of data listed on the Corruption Table. The GM may also modify the Dice Pool or
Threshold to account for hidden factors like Encryption and protection of files
The Corruption Table is on pg. 112 and 206 in Unwired
Set Corrupt Program Complex Action
you may set a corrupt Program on a file Like a Data Bomb
Data Bomb
Set Data Bomb Complex Action
you set a data bomb on a Node, File. If the node or file is accesses before a defuse acion is taken then the dadabomb
detonates dealing 1d6 x rating theb deleting itsself and possibly erasing the file or crashing the node
at the owners instruction at the owners instruction A data bomb may be detected with a matrix perception test
Only 1 Data bomb may be attached to a particular Node or file
Decrypt
Initiate Cryptanalysis Complex Action
Electronic Warfare + Decrypt
you have your decrypt program start working on an Encryption to which you have access by making a a
test vs. the Encryption ratingx2 (1 combat turn) when you Reach the threshold the encryption is broken
once you have started cryptanalysis the Decrypt program takes over and runs autonomously using
your Electronic warfare Rating A Running Decrypt program can only work on 1 Icon at a time but
mutiple decrypt programs can be used on different files
Defuse
Disarm Data Bomb or Corrupt Complex Action

Page 7
Sheet1

Hacking + Defuse
if the Databomb is detected with use of a matrix perception test
make an opposed Test vs. Databomb/Corrupt rating x2, If Successful the Databomb/Corrupt program is
disarmed if not the Databomb/Corrupt program is set off and causes its damage
(or deletes the file in case of corrupt) and possibly deleting the file
Disarm
Disarm Program Extended Test
Hacking + Disarm 1 initiative pass
To Disarm a program the hacker must make an extended test with a threshold equal to (Firewall + System)
when the threshold is reached the targeted software can no longer be used against the hacker. The
Disarmed software still functions normally against others. Likewise the hacker is still vulnerable to
similar software used by others. Disarmed software remains neutralized until the software is reloaded
or until the hacker logs off the node
Firewalls may also be disarmed but in doing so make an extended test Analyze + Firewall (Stealth)
Each time the disarm attempt is made. If it meets the threshold before the disarm test succeeds then an alert is triggered
and the firewall immediately reconfigures its self so that the disarm attempt must be restarted
ECCM
ECCM Passive if Active
Add ECCM Rating to your Signal Rating when defending against Jamming
Exploit
Hack on the Fly Complex Action
Hacking + Exploit
you make a (Targets Firewall, Complex action) extended test when you reach the threshold you gain a user
account on that node. Adding +3 to the threshold gets you Security and +6 grants Admin. When you Beat the threshold and
gain the account you are automatically Logged onto the node with that level of access and do not need to use the Log on action
Each time you make a Hack on the fly attempt the target node makes a free analyze + firewall(Hackers stealth) Extended test
If the node detects you an alert is triggered even if you have succeeded
Mass Attacks
A mass attack is functionaly the same as Probing the target (see below) with a teamwork test Hackers and Technomancers
may work together on mass attacks, If successful all hackers involved gain access to the node. Agents and Sprites
cannot participate directly in the teamwork tests , but add a +1 die to the prim Characters Dice pool for each Agent or Sprite
assisting (Maximum +5)
Probing the target Extended Test
Hacking + Exploit 1 hour
Probing the target is an extended test (1 hour) with a threshold of the target nodes System + Firewall, once the threshold is
reached you have found a crack in the system’s defenses that you can exploit to gain access.
You do not automatically gain access; you have found the chink in the armor, but have not used it yet.
These Exploits do not last forever and may be removed if found by the nodes security or the node reboots
As Long as it remains on the node you may use the Log on action to enter the node with the hacked account
the Process grants you a user account +3 for Security +6 for Admin
When you first Log on the node gets 1 free analyze + Firewall (Hackers stealth) If the node detects you an alert is triggered
Crash Node Complex Action
Hacking + Exploit
Make an extended test (System + Firewall, Complex Action) when the threshold is reached the node is crashed and the
system reboots.
The Node issues a restricted alert (+4 Firewall against the offending Icon) Any Users in VR when the nodecrashes
must resist dumpshock when the node crashes, Including the hacker
Crash Program Complex Action
Hacking + Exploit

Page 8
Sheet1

Make an Opposed test vs. the targets System + Firewall. If you succeed you crash the program changing its status to loaded
Create Reusable Exploit Extended Test
Software + Exploit 1 initiative pass
Make an extended (Firewall+ system, 1 initiatiave) pass if you have at least security access on the node
Once Created this grants a +6 Dice pool modifier to gain access using the Exploit program
This can be sold or traded to other Hackers
Create Hidden Access point Extended Test
Hacking + Exploit 1 minuite
Make an extended test (Firewall + System, 1 minuite) to create a hidden access point. The advantage is that such hidden
access points make it very easy to penetrate the system, requiring only a simple Hacking + Exploit (1) Test,
and the Firewall gets no test to detect the intruder. As no account is being used, access won’t be noticed as long as the
intruding hacker remains under the radar of patrolling IC. Sinbce no passcodes have been have been obtained
the hacker must rely on hacking for all tests. Note that all actions taken by the hacker are recorded in the access log
but they are obscured and confusing because they are not tied to an account , the hackers Data trail can still be tracked
Mass Probing Extended Test
Hacking + Exploit (4) 1 day 1 day
Make the test Every hit beyond the threshold is equivilant to a reusable exploit in 5 nodes, For a legitimate account
For a legitimate account with personal access privilages add +3 to the threshold; Security +9 Admin + 16
Glitches indicate that one of the nodes is a honeypot
The GM decides what these specifc nodes are; more ofen then not they are poorly defended systems without
much to ofer, such as low-rating commlinks, public terminals, and minor workstations.
Unlike Standard hacking when the hacker makes the intrusion the node gets 2 free analyze + Firewall (Hackers stealth
BotNets with an exploit program can assist in a mass probe by adding 1 die for every bot used in the mass probing
to a max of the Hackers Hacking skill
Medic
Repair Icon Damage Extended Test
Computer + Medic Complex Action
Make a test vs (Damage Taken x2, Complex action) When the threshold is reached all damage is repaired
Nuke
Matrix Attack Action Complex Action
Cybercombat + Nuke
Nuke is a combat program that does not imflict matrix damage but instead hogs system recourses in an attempt
to freeze the target user Treat Nuke damage similar to a Matrix attack from an attack program however each box of
damage instead deducts 1 point from the targets Response or system/pilot in the case of agents or sprites
with appropriate effects on initiative, processor limit and subscription limits. The attacker determines which attribute
is affected by each point of nuke damage if Nuke reduces both values to 0 the targets persona freezes.
The User or Agent can take no matrix actions until he reboots
Sniffer
Capture Wireless Signal Complex Action
Electronic Warfare + Sniffer(3)
you evesdrop on wireless traffic going to and from a device you must succeed in a test to start the capture
then you may copy, record, or forward the trafic without another test as long as you remain in mutual signal range
and keep the sniffer program running.There is no way for other parties to detect your capture
(without access to your commlink)If the traffic is encrypted you must break the encryption before it van be captured

Intercept Traffic Complex Action


Hacking + Sniffer

Page 9
Sheet1

you intercept traffic between 2 nodes you must have access to a node through which all all trafic passes
if the traffic is being split between intermediate nodes (see Matrix Topology, p. 216), you cannot
intercept it unless you have an icon in all nodes through which the trafc is routed
to Evesdrop on the traffic you must make a test, the hits on this test is the threshold for others to
detect the snooping with a matrix perception test
Hacking + Sniffer
The traffic may be copied and recorded or forwarded to a third party with no additional tests. If you want
to block or alter some of the traffic before sending it along, you must use the Edit action. To insert fake traffic,
you must succeed in an Opposed Test vs. the recipient’s Firewall + System.
Spoof
Redirect Trace Complex Action
Hacking + Spoof
Make an oppsed test vs tracking Icons Computer + Track. The Number of hits are added to the threshold that the
tracking Icon Needs . You may take this action multiple times on the same Icon
Spoof Command
Hacking + Spoof
you send a command to a device or agent. You must have the access ID from which the target accepts commands
(usually by making a matrix perception testor by tracing the its Icon. To Spoof the targetChoose a command
(See issuing command)and make a test vs the targets Pilot + Firewall (System + firewall for peripherial devices)
(Usually Device Rating x2) if you succeed the target acceots the command as legitimate, Each Spoof
command action only works for1 command Multiple commands require multiple spoof commands
Spoofing Commands from a user that has Security or Admin privilages is more difficult Apply a dicepool modifier
of -3 if the useer has Security access or a -6 if the user has admin acess
Spoof Access ID Complex Action
Hacking + Spoof(2)
change your access ID before you access other nodes
Spoofing Datatrail online Complex Action
Hackign + Spoof(2)
this action will automatically close your connection to othert nodes(after all you are no longer who you said you were)
if Black IC has Jammed your connection open then this requires an opposed test vs. the IC Rating + Response
Spoofing Protection Complex Action
Hacking + Spoof
if you are up against a user with an offensive program with the limitation option you may attempt to spoof the persona
so that the offensive program will not work against yo, this is an opposed test vs the opponents Analyze + Response
Spoofing Life Extended Test
Hacking + Spoof 1 day
A hacker can improve his life for 1 month by making an extended test (1 day) with a Varying threshold
The Spoofing Life Table is on page 99 and 206 in Unwired
Stealth
Matrix Perception test
Hacking + Stealth (Users) or Firewall + Stealth(Programs or nodes)
A stealth program turns the matrix perception test into an opposed test
Against Track Passive if Active
Stealth Rating is used as a negative dice pool modifier for a Track program
When Hacking
Stealth is the threshold for the systems firewall to detect intrusion

Decoys
by using a stealth program on a node or file it can appear Larger or smaller, filled with a high rating data bomb,

Page 10
Sheet1

Archived with strong Icor anything else that can be invented


The node can also run stealth on its self masking its true attributes, running programs, or other
pieces of information garnered by a matrix perception test
When a node is running a decoy the GM should roll an opposed test using the normal rules for matrix perception tests.
If the observer gets no hits then the observer gains 1 piece of fictional information that the stealth program is
instructed to give this technique can only be used with nodes and files
Hiding a Legitimate Account
Hacking + Stealth
After creating a legitimate account the Hacker makes a (Firewall,10 minuits) extended test
Track
Trace User Extended Test
Computer + Track(10) Complex Action
you trace an Icon back to its originating node with an extended test with a negative Dice pool penalty
equal to the targets stealth rating when you reach the threshold you have successfully traced the
target Learning the targets Access ID and the Device housing the originating node (usually the
users commlink. If the target is using a wired connection you learn the exact location , if he is using
wireless you are able top triangulate his position to within 50 meters
you can also use this action to trace a subscription to the other end
(e.g. the Drone to the rigger controlling it)

Technomancers
E- Sensing Table
1 hit Presence and direction of the electrical feld’s source; whether the source acttively
projects any electromagnetic signals

2 hits Relative size and type of the source (metahuman vs. electrical device);.
Signal rating of any emitting devices; presence of cyberware implants

3 hits Type and model of node (RFID tag, commlink, cofee machine, drone, sensors);
determine whether person is a technomancer; location of cyberware implants.

4 hits Rating of sensors; System rating of nodes; presence of nanites


on the exterior; obvious vehicle/drone modifcations.

5 + hits Firewall rating of node; presence of nanites in the bloodstream; whether a node is
slaved; presence of stealth tags.

Living Persona Ratings


Ratings may not exceed the Technomancers Resonance
persona attributes rating

Page 11
Sheet1

Firewall Willpower
Response Intuition (+1 in full VR)
Signal Resonance ÷ 2, round up
System Logic

Biofeedback Filter Charisma


VR Matrix Initiative (Intuition x 2) + 1
VR Matrix 3 Initiative Passe

Technomancers use Complex forms instead of programs


there is a complex form for every program listed above
Technomancers have no Matrix condition moniter any matrix damage
they sustain is treated as Stun damage

Technomancers gain an innate +2 to matrix perception tests

Fading Compulsory Action


Stats Vary based on stream
Fading is the mental stress incurred by a technomancer when he pushes himself too hard
It happens when the technomancer threads complex forms or Compiles or registers sprites
For threading the DV of the fading is the hits he scored on the threading test if the
final rating of the complex forms exceeds his resonance he takes physical damage instead of stun
For compiling, decompiling or registering sprites the Fading DV equals twice the hits
Generated by the sprite on the opposed test
If the Sprites rating is greater than the technomancers resonance the fading is
physical rather than stun
Threading
Thread Complex Form No Action
Software + Resonance
To Thread a complex form the technomancermakes a test and each hit on the test improves the complex form
By 1 point, If the Technomancer does not know the complex form then it starts at 0, The Technomancer
may choose to discard some of his hits he scores. No threaded complex form can have a rating greater
than twice his resonance
Threaded Complex forms must be sustained similar to how a magician sustains a spell Sustaining
requires effort and imposes a -2 to all actions not using the threaded form
Threading is an exhaustive process and causes fading
Sprites
Call Sprite Simple Action
you call a sprite that was on standby you may call mutiple sprites of the same type with the same action
Command Sprite Complex Action
you command a sprite, you may issue a command to mutiple sprites if they are the same type
and the command is the same

Compiling sprites Complex Action


Compiling + Resonance
You create a Sprite First Choose a sprite from the 5 available sprites the technomancer can summon

Page 12
Sheet1

based on his stream, then Choose the rating preform a compile sprite test making an opposed test
vs the Sprites rating each net hit is 1 service owed the technomancer
this process brings an unregistered sprite to the technomancer
Compiling sprites causes Fading
Registering a sprite Rating in hours
Registering + Resonance
Make an opposed test vs the sprites rating x2 the technomancer needs at least one hit to register the sprite
additional net hits are added to the number of tasks the sprite owes the technomancer, a registered sprite
will not vanish after 8 hours but will remain on calluntill the last of its tasks are used. A Technomancer
may have a number of registered sprites equal to his charisma
Decompile Sprite Complex Action
Decompiling + Resonance
A technomancer may attempt to decompile a sprite (his or not) back into the bits of data that formed it
make a test vs the Sprites rating (+ the controllers resonance if registered) if the decompiling
technomancer wins then he reduces the tasks owed by 1 per net hit, if the tasks are reduced to 0 the sprite
will dissappear on its next action, any technomancer on hand may attempt to recompile the sprite before it leaves
bringing it under their control
Win or Loose the technomancer must resist fading as if he comhad compiled the sprite

Sample Technomancer streams are presented in Unwired on


Pages 138 to 140

Sprites are on Page 242 in the Core book and pages 154-156
in Unwired

Sprite Powers
Assult
The sprite with this power makes 2 attacks as if it were using 2 weapons in ranged combat
instead of splitting the Dice pool in half however the only the sprites pilot rating is halved
adding each attack complex form to 1 half or the other(it must have 2 Attack complex forms)
Assult is a single attack and can only be executed once against an Icon for the duration of the combat
Casteling
A sprite with this power using a complex action can redirect damage targetd at the technomancer to
its self by mimicing the technomancers access ID
Cookie Complex Action
the Sprite “Tags” an Icon with a hidden piece of code that can be used to track a matrix Icons ativities
the Sprite makes an opposedtest between the sprites rating x2 vs. the targets firewall +stealth if the sprite
succeeds the cookie is imbedded in the Icon and will log every place the Icon goesand everything it does
use the net hits to benchmark the depth of the information the cookie accumulates
Cookies may be detected with a matrix perception test(4) and removed with a computer + edit(2) test
(with or without resonance) once identified

Diagnostics Complex Action


The Diagnostics power allows the sprite to evaluate the inner workings of an electronic device
the sprite must be present in the node of the device in question. The sprite can then assist
someone in using or repairing the device with a teamwork test Make a Sprite rating x2

Page 13
Sheet1

Test with each hit adding 1 die to the character's test to use or repair the device up to a
maximum of of the characters Skill
Electron Storm Complex Action
This attack allows the sprite to engulf the Icon in a sustained barrage of corrupted signals
when the sprite successfully hits the target in cybercombat, it swallows the target in a
Hail of digital pulses. With the first attack and on each of the sprites action phases it
inflicts (Rating)DV Matrix damage with an AP of -2, Resisted as normal while engulfed
the target suffers a -2 to all matrix actions. The target may break free of the storm by
Taking a complex action and beatign the sprite in an opposed Response x2 test
Gremlins
this power causes devices to mysteriously malfunction, the sprite must be in the node of the device
or in another node to which the device is subscribed. Make an opposed test between the sprites
rating x2 and the devices system + Firewall. If the sprite succeeds then the device suffers a glitch
the GM Chooses the malfunction appropriate to the device and situation. If the Sprite scores 4
or more hits it is a Critical Glitch
if used against a Drone or Vehical the power can be used to force the driver to make a crash test
the Sprites Rating serves as a negative dice pool to the crash test
Hardening
a Sprite with this power can temporarily empower its armor complex form to function like
Hardened Armor allowing the sprite to soak damage from most sources as long as it
continues to use this power. Using this power counts as a complex action much like
going on full defense
Hash
Ths power allows the sprite to temporarily encrypt a file with a unique resonance algorithm
in such a way that only the sprite can encrypt it. The sprite must remain with the hashed file
if it leaves the file reverts to normal. If the sprite is destroyed the file is corrupted and becomes worthless
Info Sortilege
Functions like the Echo (pg. 146 Unwired)except that it uses rating instead of resonance
Probability Distribution
a sprite with this power can change the probability distribution of a Matrix action by Raising or Lowering
the ammount of of system resources allocated to preform it. To use this power the sprite makes a
test of Rating x2 against ½ the nodes response(Round up) as the threshold. If it succeeds either
increase or decrease the dice pool of the targeted test by a number of dice equal to ½ the sprites
rating (round up)
As this Requires a complex action the sprite must have delayed its action to use this power in order to affect anothers test
power in order to affect anothers test
Proficency
Tutor sprites possess Skillsofts that grant them understanding of one or more Technical, Vehical,or
Knowledge skills. It can teach these skills to anyone as well as assist a person in AR or VR like a
Virtual assistant, Similar to an autodoc or an Autosoft for Humans, when the sprite guides a user
through a complex task who does not posses the skill in question , the character may preform the skill
without any modifiers, counting ½ the sprites Rating(Round up)as the level of skill
Assisting someone in this way is generally more time consuming than normal and therefor requires a
Complex or Extended testdepending on the situation

Steganography
The Sprite can conceal a file (or other piece of Datawithin another file in such a way as to make it invisible
to searches and datamining. Concealed files cannot be found with a standard data search the only way
to find the file is with a successful Matrix Perception(4)Test. Even the Sprite must make this test in order

Page 14
Sheet1

To find and extract the File


Stability
A sprite using stability on a device Prevents normal Malfunctions or accidents from affecting the device
Stability also reduces a Critical Glitch to a standard Glitch
Suppression Passive if Active
Any time a sprite with this power triggers an alert, the alert is delayed by (Rating / 2, Round up) Combat turns
Traceroute
The Traceroute power allows the Sprite to sniff out the data trail left by an individual's daily interactions
with the virtual world. To use Traceroute the Sprite “sniffs”some data relating to the to the target and makes
and makes an extended test pitting its rating + Track against a variable threshold determined by the
Traceroute table with a base time of one hour. If it succeeds the Sprite can Locate the node the Target
is currently in, if that person remains online, or the most recent physical location from which the target
interacted with the matrix
Traceroute Table is on pg. 157 of Unwired
Transfer
The sprite grants use of one of its powers to the subject. The sprite does not loose the use of the power
While the subject gains it, and the sprite can grant a power to a number of subjects equal to its rating
No Character may gain more than one power from a sprite in this way at a time
Watermark
The sprite tags a node or Icon with an invisible marking that only resonnce driven entitys can see
this allows the sprite to leave messages within the matrix or otherwise mark matrix objects A sprite can
overwrite a “Watermark” with a new one

Page 15

You might also like