<Cybercore>

Electronics - Programming

The Electronics - Programming skill is the tool for those who seek control over the digital world. With a flick of a finger, you can bend software to your will and rewrite networks to suit your needs. You can alter the fundamental digital systems underlying the the behavior of robots and machines, making them your obedient servants, improving there skills sets and expanding there capabilities.

The power of this skill doesn't stop there. With it, you can craft custom software and create programs that outmatch any other in the cyber realm. Once you have hacked in you can subvert the programming of AI systems and bend them to your will. In the heat of battle, you can take control of or unleash your own combat drones and turn the tide in your favor.

The Electronics - Programming skill is the masterful tool in the digital age, giving you control over the most powerful systems and machines in the universe. With it, you can dominate the battlefield or just have them reshape the world to your liking.

This skill is primarily used to control and re-purpose software, alter networks, re-purpose doors etc as well as programming, subverting and rewriting AI systems, robots, and automated equipment. You can also use this skill for creating software patches for hacking, e-hem, I mean improving network sharing performance.

Using Programming

Each programming task you attempt will have a difficulty rating based on the complexity of the software or system you're working with. The more complex the code or advanced the AI, the higher the difficulty.

When you attempt to program, reprogram, or control systems, you will make an Electronics - Programming skill check against the task's difficulty rating. The GM may apply Boons or Banes based on various factors, such as the quality of your development tools, time pressure, or your familiarity with the target system.

  • A Critical Success creates flawless code that exceeds expectations, granting additional functionality or discovering optimization opportunities. When controlling drones, you can command +2 additional units beyond your normal maximum.
  • A Regular Success allows you to complete your programming task or establish control over your target systems. The software works as intended or the drones respond to your commands.
  • A Failure means your code has bugs, the AI resists your commands, or drones become unresponsive. You may need to debug or reestablish control under duress.
  • A Critical Failure results in catastrophic errors: software crashes, AI goes rogue, or drones attack randomly. Your code may corrupt other systems or trigger security alerts.

Programming Tricks

Rather than spending skill points to move up skill levels, You may instead spend skill points to purchase any of the following tricks.

Remote Reboot:

Cost: 2 Skill points
Requires: Tactical Training
Frequency: Once per Lockdown
Effect: You have a dormant script in the system already. You can activate it to reboot the security AI or system, canceling any active alarms and resetting security protocols. Takes one action to activate remotely.

Backdoor Access:

Cost: 2 Skill points
Requires: Tactical Training
Frequency: Once per Lockdown
Effect: You can create a backdoor access point in any system you have successfully programmed or accessed. This backdoor allows you to bypass initial security on future access attempts, granting a +1d6 Boon to reconnect to this specific system.

Adaptive Code:

Cost: 2 Skill points
Requires: Tactical Training
Frequency: Once per Lockdown
Effect: You can write code that adapts to its environment in real-time. When your software encounters unexpected system conditions or countermeasures, make a Programming check - on success, your code automatically adjusts and continues functioning.

AI Mod Chip:

Cost: 6 Skill points
Requires: Expert Training
Frequency: Once per Op
Effect: You carry custom AI modification chips. You can overwrite the AI core on any robot you have hacked or control. You gain complete control of that Robot, and it gains +2 to all checks for one hour, at which point the watchdog controller restores the original AI.

Expert Debugging:

Cost: 6 Skill points
Requires: Expert Training
Frequency: Once per Op
Effect: You can quickly identify and fix critical programming errors and glitches. When any software fails or malfunctions (yours or an ally's), you can spend 10 minutes debugging to restore full functionality and optimize performance, granting +1d4 Boon to its next use.

Virtual Machine Manipulation:

Cost: 6 Skill points
Requires: Expert Training
Frequency: Once per Op
Effect: You can create and manipulate virtual machines within target systems. This allows you to sandbox dangerous code, test exploits safely, or create isolated environments that give you a +1d8 Boon when analyzing system vulnerabilities or testing programs.

Neural Net Programming:

Cost: 10 Skill points
Requires: Master Training
Frequency: Once per Mission
Effect: You can program advanced neural networks and self-learning AI systems. You can create an AI assistant that learns from your actions and provides tactical support, granting you and your squad +1d6 Boon to all Electronics checks for the remainder of the mission.

Quantum Code Injection:

Cost: 10 Skill points
Requires: Master Training
Frequency: Once per Mission
Effect: You can write quantum-level code that exists in superposition states until observed. When you successfully program or hack a system, you can inject quantum code that allows you to retroactively change one programming decision or command you issued earlier in the mission.

System Agnostic Architecture:

Cost: 10 Skill points
Requires: Master Training
Frequency: Once per Mission
Effect: You can write universal code compatible with any system architecture. For the duration of one operation, ignore all penalties from unfamiliar systems, alien technology, or incompatible platforms. Your code works seamlessly across all devices and networks you encounter.

Crafting

Two-Stage Creation Process

Stage 1: Design Software (Blueprint)

  • Requires: Electronics - Programming check (DC varies by software complexity)
    • Simple Program (DC Easy): Basic utility (file manager, calculator, automation script)
    • Advanced Program (DC Medium): Specialized software (encryption tool, AI assistant, diagnostic suite)
    • Elite Program (DC Hard): Cutting-edge application (advanced AI, quantum code, neural interface software)
  • Time: 2-10 days of design and architecture per program
  • Resources: Development environment, programming references, testing systems

Stage 2: Code and Debug (Crafting)

  • Requires: Source code + testing + optimization
  • Time: 1-7 days depending on program complexity
  • Materials:
    • Development Tools: Compiler, debugger, testing suite (Free if terminal equipped)
    • Processing Time: Computing resources for compilation and testing (Free to Cheap)
    • Libraries: Code libraries and frameworks (Free to Moderate)
  • Workshop: Computer terminal, development workstation, or programming environment

Benefits: Stacking Boons and Functional Advantages

Each custom program grants a stacking Boon when used for its intended purpose:

  • 1 Program: +1d4 Boon
  • 2 Programs: +1d6 Boon
  • 3 Programs: +1d8 Boon
  • 4 Programs: +1d10 Boon
  • 5+ Programs: +1d12 Boon (then +1d4 for each additional)

Boons apply when:

  • Running the custom program for its designed task
  • Using specialized software tools
  • Leveraging AI subroutines you created
  • Operating systems enhanced by your programs
  • Controlling devices via custom control software

Types of Custom Software

Utility Programs:

  • File Recovery Tool: Data recovery and restoration
  • Automation Script: Repetitive task automation
  • Diagnostic Suite: System analysis and troubleshooting
  • Encryption Tool: Secure communication and data protection

Combat & Tactical:

  • Combat Drone AI: Enhanced drone control and tactics
  • Targeting Assistant: Weapon accuracy improvement
  • Tactical Coordinator: Team communication and planning
  • Security Override: Rapid door and lock bypass

Intelligence Gathering:

  • Data Mining Tool: Information extraction and analysis
  • Network Mapper: System topology and vulnerability scanning
  • Stealth Logger: Covert activity monitoring
  • Pattern Recognition: AI-driven analysis software

System Control:

  • Robot Controller: Enhanced robot programming and coordination
  • Environmental Manager: Building system control
  • Resource Optimizer: Efficiency improvement software
  • Subsystem Interface: Custom hardware control

Maintenance Requirements

Custom software requires ongoing support:

  • Bug Fixes: Patches for discovered issues (Cheap)
  • Updates: Compatibility with new systems (Cheap to Moderate)
  • Documentation: User guides and technical specs
  • Distribution: Programs can be copied, shared, or sold
  • Duration: Permanent (until obsoleted by new technology)

Example: Combat Programmer's Drone Suite

"Binary" Kim creates tactical drone control software:

  1. Design Programs (DC Medium): Binary spends 6 days designing, rolls Electronics - Programming (success)
  2. Code Software: Creates 3 custom combat programs:
    • Advanced drone AI: Improved autonomous targeting
    • Swarm coordinator: Multi-drone tactical control
    • Electronic warfare suite: Jamming and countermeasures
  3. Cost: Cheap for development tools and libraries
  4. Benefit: When controlling combat drones, gains +1d8 Boon (3 programs)
  5. Duration: Permanent; occasional patches for compatibility

Example: Corporate Programmer's Security Suite

Tech Officer "Firewall" Chen develops enterprise security:

  1. Multiple Programs: Firewall has developed 5 integrated security applications:
    • Intrusion detection system
    • Automated response protocol
    • Access control manager
    • Security audit tool
    • Incident logging database
  2. Benefit: When managing corporate security systems, gains +1d12 Boon
  3. Investment: Each program required 5-10 days development
  4. Commercial Value: Security suite licensed to multiple corporations (Expensive)

Example: Hacker's Toolkit

"Ghost" creates infiltration utilities:

  1. Quick Development (DC Easy): Ghost codes simple password cracker in 2 days
  2. Lightweight: Basic brute-force tool with dictionary attack
  3. Cost: Free using open-source libraries
  4. Benefit: +1d4 Boon when cracking simple passwords
  5. Disposable: Tool easily modified to avoid detection

GM Notes

  • Limit to 5 active programs in character's toolkit
  • Compatibility: Programs may not work on all systems
  • Story Opportunities: Developing software can drive missions to acquire specs or test data
  • Economic Value: Custom programs can be sold or licensed
  • Piracy: Programs can be stolen or reverse-engineered
  • AI Ethics: Advanced AI programming may have moral implications
  • System Requirements: Complex programs may need powerful hardware

The Programming skill can be used to reprogram robots and when you are controlling robots in stressful situations, i.e Combat Drones.

When controlling droids in combat refer to the following table.

  • At the start of combat, it takes one action to establish secure combat coms with the Droids under your control.
  • Roll on the table below to determine the number of Droids you can control.
  • It takes one action to issue commands to a single droid.
  • All droids act at the end of your turn unless commanded otherwise.
  • You can spend one Action on your turn scrambling the Droid Comms encryption codes.
    • Effect: Anyone attempting to usurp your control rolls with disadvantage.
  • You can spend one Action attempting to take control of an Enemy Droid (Hack vs Programming)
    • Make an opposed Hacking check against the AI or the Droid Controllers Programming Skill.
Programming RollMax # Droids Controlled
1Glitch, Droid goes Nuts, GM Controlled.
2 – 5Mistarget Droid Attacks Randomly then Reboots
6 – 10Reboot required 1 Droid Idle for 2 Turns
11 – 151
16 – 202
21 – 253
26 – 304