<Cybercore>

Electronics - Hardware & Security

Electronics - Hardware & Security allows those who possess it to navigate and manipulate the physical security systems and networks that protect valuable information and assets. Whether it's bypassing locks and security doors manually or rewiring electronics to gain access, those skilled in Hardware & Security can physically breach even the most complex security measures.

Electronics - Hardware & Security are used to access and jack in with systems wirelessly or directly. Its about knowing what wires and frequencies are safe to tap or cut while avoiding detection.

In addition to bypassing physical security, Hardware & Security also covers installing and maintaining automated fixed-in-place security systems, allowing individuals to create a defensive perimeter to protect valuable assets from outside threats.

This skill is often used in conjunction with Electronics - Hacking, providing the means to survey and analyze the security measures in place in order to find weak points and vulnerabilities. This allows you to connect and disable security systems, gain access, and analyze a system for weaknesses before beginning a hack, and subverting the running code that lies within.

With the increasing reliance on technology and the ever-present threat of cyberattacks, the ability to navigate and manipulate security systems has become a valuable skill for those looking to make their way in the world. Whether working as a mercenary or a thief, the ability to bypass physical security and gain access to restricted areas can mean the difference between success and failure.

Breaking into or 'Analyzing' Security often requires special tools, it's the GM's call whether or not you can use this skill in any given instance without a Hardware and Security Kit.\

This skill can complement investigation when trying to survey the security of a building. If the Hacker can't sort it remotely, there not much you can't open or disable with a pair of side cutters and finding the right wire.

Using Hardware & Security

Each security system you attempt to bypass will have a difficulty rating based on its complexity and quality. The more advanced the lock, alarm, or security measure, the higher the difficulty.

When you attempt to bypass physical security, you will make an Electronics - Hardware & Security skill check against the system's difficulty rating. The GM may apply Boons or Banes based on various factors, such as the quality of your tools, time pressure, environmental conditions, or whether you have blueprints or insider knowledge.

  • A Critical Success is a flawless bypass, granting you silent access with no trace of tampering. You may also identify hidden security measures or discover alternative access points. The system remains functional and unaware of your intrusion.
  • A Regular Success allows you to bypass the security system and gain access. The lock opens, the alarm is disabled, or the security door yields to your expertise.
  • A Failure means you were unable to bypass the system's protections, or you have triggered a silent alarm. You may need to try a different approach or work under the pressure of incoming security.
  • A Critical Failure triggers loud alarms, permanently damages the lock mechanism (making it obvious), electrocutes you (taking damage), or alerts security forces to your exact location.
Electronic LocksDifficulty
No special protection4
Regular security system8
High-quality system14
Bank20
High-security complex25
Cutting-edge security measures30
Picking Mechanical LocksDifficulty
Simple key lock6
Complex key lock12
Combination lock18

You may use Engineering – Rigging for picking Mechanical Locks.

Lock ConditionDC Modifier
Poorly constructed-4
Well constructed+4
Military or security style+6
High-security style+9
Lock blueprints and diagrams-4

Hardware & Security Tricks

Rather than spending skill points to move up skill levels, You may instead spend skill points to purchase any of the following tricks.

Maglock Cracker:

Cost: 2 Skill points
Requires: Tactical Training
Frequency: Once per Lockdown
Effect: You can quickly crack standard magnetic locks with minimal sound and no visible damage. Make your Hardware & Security check with a +1d4 Boon, and the bypass takes half the normal time.

Magnesium Strips:

Cost: 2 Skill points
Requires: Tactical Training
Frequency: Once per Lockdown
Effect: You carry magnesium cutting strips. You may spend an action to burn through a door lock or security panel, automatically bypassing it. This creates bright light, heat, and obvious damage, but always succeeds.

Electronic Jammer:

Cost: 2 Skill points
Requires: Tactical Training
Frequency: Once per Lockdown
Effect: You can deploy a portable jammer that disables wireless security devices (cameras, alarms, motion sensors) in a 50-foot radius for up to 10 minutes. Takes one action to activate.

Hardware Expert:

Cost: 6 Skill points
Requires: Expert Training
Frequency: Once per Op
Effect: You can repair, modify, or jury-rig any electronic device or security system in the field. Spend 15 minutes working - you can restore functionality to damaged electronics, disable security permanently, or even improve device performance for a +1d6 Boon to its next use.

Surveillance Installation:

Cost: 6 Skill points
Requires: Expert Training
Frequency: Once per Op
Effect: You can rapidly install a complete covert surveillance system (cameras, audio, network tap) in a target location. The system is extremely difficult to detect (opposed check at Disadvantage for security sweeps) and transmits data to you remotely.

Security Bypass Protocol:

Cost: 6 Skill points
Requires: Expert Training
Frequency: Once per Op
Effect: You have developed a sophisticated bypass protocol that works on most security systems. When attempting to bypass alarms, access controls, or security doors, you may treat the difficulty as one category easier (High-security becomes Bank-level, Bank becomes High-quality, etc.).

Access Control Mastery:

Cost: 10 Skill points
Requires: Master Training
Frequency: Once per Mission
Effect: You can take complete control of an entire facility's access control system. Spend 10 minutes at a security terminal - you can lock or unlock any door, grant or revoke access permissions, and monitor all entry/exit throughout the facility for the remainder of the mission.

Defensive System Installation:

Cost: 10 Skill points
Requires: Master Training
Frequency: Once per Mission
Effect: You can rapidly deploy a military-grade defensive perimeter around your position. Spend 30 minutes installing - the system includes motion sensors, automated defenses, alarms, and even shield generators if available. The perimeter alerts you to any intrusion and provides a +1d8 Boon to defend against attackers.

Ghost Protocol:

Cost: 10 Skill points
Requires: Master Training
Frequency: Once per Mission
Effect: You can bypass any security system without leaving any trace whatsoever. For the duration of one operation, your tampering is completely undetectable - logs show no anomalies, physical evidence disappears, and even AI security analysis finds nothing suspicious. The perfect crime.

Crafting

Two-Stage Creation Process

Stage 1: Design Security Device (Blueprint)

  • Requires: Electronics - Hardware & Security check (DC varies by device complexity)
    • Simple Device (DC Easy): Basic lock picks, door wedges, simple alarms
    • Advanced Device (DC Medium): Electronic bypass kits, surveillance jammers, biometric spoofers
    • Elite Device (DC Hard): Military-grade access tools, quantum lock crackers, adaptive security systems
  • Time: 2-10 days of design and testing per device
  • Resources: Security schematics, electronics components, testing facilities

Stage 2: Build and Calibrate (Crafting)

  • Requires: Components + assembly + field testing
  • Time: 1-7 days depending on device complexity
  • Materials:
    • Components: Electronics, circuitry, specialized parts (Cheap to Moderate)
    • Tools: Soldering equipment, testing gear (Free if workshop equipped)
    • Calibration: Fine-tuning and testing (Cheap)
  • Workshop: Electronics lab, security testing facility, or well-equipped workspace

Benefits: Stacking Boons and Security Advantages

Each custom security device grants a stacking Boon when used for its intended purpose:

  • 1 Device: +1d4 Boon
  • 2 Devices: +1d6 Boon
  • 3 Devices: +1d8 Boon
  • 4 Devices: +1d10 Boon
  • 5+ Devices: +1d12 Boon (then +1d4 for each additional)

Boons apply when:

  • Bypassing locks and security systems the tool targets
  • Installing security measures using custom equipment
  • Jamming or disabling electronics with specialized jammers
  • Spoofing biometric or access control systems
  • Analyzing security vulnerabilities with custom scanners

Types of Custom Security Devices

Bypass Tools:

  • Universal Lock Pick Set: Works on multiple lock types
  • Maglock Decoder: Magnetic lock bypass device
  • Biometric Spoofer: Fake fingerprints, retina patterns
  • RFID Cloner: Duplicate access cards and keychips

Detection & Jamming:

  • Signal Jammer: Disable wireless alarms and cameras
  • RF Scanner: Detect hidden electronics and bugs
  • Motion Sensor Mapper: Identify sensor coverage patterns
  • EM Pulse Device: Temporarily disable local electronics

Installation Tools:

  • Portable Alarm System: Quick-deploy perimeter security
  • Surveillance Package: Hidden cameras and audio bugs
  • Access Control Module: Custom keycard reader system
  • Intrusion Detection Grid: Laser/motion detection network

Maintenance Requirements

Security devices require ongoing upkeep:

  • Battery Replacement: Power cells for electronic devices (Cheap)
  • Calibration: Regular tuning for optimal performance (Cheap)
  • Updates: Counter-countermeasures as security evolves (Moderate)
  • Repairs: Fix damaged components after field use (Cheap to Moderate)
  • Duration: Permanent (until damaged or obsoleted)

Example: Infiltrator's Bypass Kit

"Phantom" assembles a comprehensive security bypass toolkit:

  1. Design Devices (DC Medium): Phantom spends 8 days designing, rolls Hardware & Security (success)
  2. Build Tools: Creates 3 custom bypass devices:
    • Universal maglock decoder: Works on most electronic locks
    • Signal jammer: Disables wireless alarms and cameras
    • Biometric spoofer: Fake fingerprints for common scanners
  3. Cost: Moderate for components and testing equipment
  4. Benefit: When bypassing electronic security, gains +1d8 Boon (3 devices)
  5. Duration: Permanent; occasional recalibration needed

Example: Corporate Security Installer

Security Chief "Ironwall" designs facility protection:

  1. Multiple Systems: Ironwall has designed 5 integrated security systems:
    • Perimeter intrusion detection
    • Multi-layer access control
    • Surveillance network with AI analysis
    • Emergency lockdown system
    • Anti-tamper alarms
  2. Benefit: When installing or maintaining corporate security, gains +1d12 Boon
  3. Investment: Each system required 7-12 days development
  4. Commercial Value: Security package licensed to multiple facilities (Expensive)

Example: Street Tech's Quick Hack

"Sparky" builds improvised bypass tools:

  1. Fast Development (DC Easy): Sparky cobbles together basic lockpick from scrap in 2 days
  2. Improvised: Simple mechanical picks and tension wrenches
  3. Cost: Free using salvaged materials
  4. Benefit: +1d4 Boon when picking simple mechanical locks
  5. Fragile: May break after several uses

GM Notes

  • Limit to 5 active devices in field kit (weight and complexity)
  • Detection Risk: Using obvious tools may alert security
  • Legality: Possession of bypass tools often illegal
  • Compatibility: Devices may not work on alien or exotic systems
  • Story Opportunities: Building devices can drive missions to acquire schematics or test systems
  • Black Market: Custom security tools are valuable to criminals
  • Counter-Security: Guards may have detection equipment