Instant Netrunning A Fuzion Plug-In by Christian Conkle (
[email protected],
http://www.europa.com/~conkle)
Introduction
All computers connected to the Net are assigned LDL. This LDL serves as a kind of telephone number for
This is a system of rules expanding the hacking rules
that computer, to which other computers know where
for Fuzion and Interlock.
to send information.
These rules draw heavily on
In a futuristic setting, a Virtual
Cyberpunk 2020's Netrunning rules and are intended
Construct or Icon may substitute for the LDL. The Net
to be native in a Cyberpunk environment where neural
User connects their computer to a Virtual Reality Inter-
cyber-interfaces are standard, though they are written
face, within which companies pay for space and create
generically enough to be useable in a modern setting as
elaborate virtual constructs to represent their LDL, the
well.
VR equivalent of Internet Portal Sites such as Infoseek or Yahoo! today. The Net User may now tour the
These rules were designed to use existing Cyberpunk
bustling 3D Virtual City regardless of gravity or speed.
2020 equipment and software with little modication.
Corporate virtual constructs are like giant 3D advertise-
There are several dierences from the original rules, how-
ments, attempting to entice the average Net User into
ever, that are intended to speed play and optimize sim-
their Virtual Realities to sell products or services. Some
plicity. First, these rules lack a grid. Movement within
Virtual Realities actually provide useful services such
the virtual environment of cyberspace is conceptual. To
as information or online software applications. The VR
convert applications that give ranges, simply apply a
equivalent to modern Websites. These Virtual Realities
percentage chance of eectiveness based on range. Sec-
are housed on Dataservers maintained by the respec-
ond, these rules incorporate the Power attribute from
tive corporations or institutions.
other Fuzion games, essentially the equivalent to a com-
housed on these Dataservers that isn't readily available
puter's Intelligence from CP2020.
to the public that draws the Hacker.
Third, software and
It is the information Normally, a cor-
memory no longer needs to be assigned to specic CPUs.
porate dataserver is openly accessible to the Net public,
If the GM wishes, each MU of application and datale
providing information either to the public or its employ-
can be assigned to specic CPUs such that if that CPU
ees through a variety of interfaces: text-only, text and
fails, the application or datale is no longer available.
graphics (the Web), audio/video, or fullsensory virtual
This process was removed to eliminate extra bookkeep-
reality (the Net).
ing. These rules assume a 3d6 die-rolling mechanic option of Fuzion. If you're playing Interlock, or the Fuzion
However, the value of information available on public
option of 1d10, simply replace the 3d6 with a 1d10 die
dataserver sites is poor and bland. In addition, access to
roll. You won't achieve the same kind of bell curve, but
remote software applications is limited to public-domain
the results will be suciently randomized.
applications.
Datafortresses
are
the
restricted
hidden
levels
of
a
dataserver providing remote access to restricted data or
The Net
software applciations to authorized users.
Security is
The Net is a global computer network allowing fast
maintained through the datafortress' DataWall program.
and convenient access to millions of computers from
The level of security restriction depends on the value of
any other computer on earth or beyond. Any computer
the information or application. Secure information may
connected to this network has the capability to access
be housed on the same dataserver as public information,
information from any other computer connected to this
only hidden in restricted directories, eectively invisible
network regardless of distance or time of day. Whether it
from those who lack proper authorization. Authorization
is called the Internet, the Web, the Cybernet, the Face,
comes with proper identication.
or the Net, all use dierent special eects and technolo-
come in many forms: Authorized Net LDLs, passwords,
gies to describe the same thing. This plug-in assumes a
proper interface software, or even biometric data.
near-future setting which makes use of a Virtual Reality
It is a hacker's goal in life to gain unrestricted access
interface and gives exciting names to actions and tasks
to restricted information, uncover secrets, make unau-
which can be easily modied to t a more mundane
thorized changes to data, or to use a restricted software
modern setting.
application.
Instant Netrunning Netrunning Softwares
Identication
can
1/25
When attempting to gain unauthorized access to a corporate datafortress, the hacker establishes a legal connection to the company's dataserver.
Once connected,
The SysAdmin
the hacker has normal access to the free services. Normally, an authorized user will then use an interface pro-
The
gram to gain access to the datafortress. The datafortress'
Dataserver/Datafortress. It is their primary job to pre-
Code Gate program veries authorization and allows ac-
vent Hackers from illegally gaining unauthorized access
cess.
to restricted data.
The hacker attempts to fool the code gate into
authorizing entry. Should that fail, the hacker may at-
SysAdmin
is
in
charge
of
security
for
a
It is their secondary job to catch
hackers who have already have.
tempt to gain entry by disabling the DataWall program protecting the information.
SysAdmins use their own computers connected to a Dataserver/Datafortress to execute software applica-
Once past security, the Datafortress constantly re-checks
tions. The Dataserver/Datafortress itself uses software
authorization through the use of Detection software. De-
such as Codegates, Datawalls, and Detection software
tection software double-checks the authorization of all
deter and identify hackers, yet allow authorized users in.
the users connected to the datafortress.
If it nds a
discrepancy or error, it noties the Datafortress System
A Datafortress is also characterized by its Power and its
Administrator (SysAdmin) who will either attempt to
Speed. A Datafortress is also rated by a Security Level
disconnect the hacker, determine the hacker's location
from 1 to 10. This number is added as a skill would to
with a Trace application, disable the hacker's software
the computer's Power when executing software applica-
with an Anti-ICE application, disable the hacker's com-
tions.
puter with Anti-System software, or physically injure the
Value if being used to chain connections. A SysAdmin
hacker with Anti-Personnel software.
The hacker uses
can't do anything to catch a Hacker if he doesn't know
Stealth software to fool detection software into either
they're there, so the SysAdmin relies heavily on De-
authorizing or ignoring the hacker's connection. If dis-
tection software to notify them of unauthorized access.
covered, the hacker may ght back against the SysAdmin
Once detected, the SysAdmin can run Anti- Personnel
with Anti-ICE, Anti-System, or Anti-Personnel software
software against the intruder, or opt to trace the hacker
of their own.
and run Anti-System software against the Hacker's com-
The computer's Security Level is also it's Trace
puter. Should the hacker gain access to the Datafortress' directories, they may view, copy, or alter data.
Data
The Computers
comes in the form of online applications for remote use, inter-oce communication, public display data (text, audio-video, or VR), databases, or records.
Computers, whether they are Palmtops, Desktops, Minis, or mainframe supercomputers, exist to execute software applications. The computer is characterized by its Power and its Speed and its Security Level.
The Hacker
The Power is used like the computer's Body and it's Reexes, it determines it's resiliency to attack and its
The Hacker's arsenal includes a computer, specialized
base chance to perform an action. Power is based on the
hacking software, and, foremost, a way to connect to
number of Central Processing Units driving a computer.
a remote target computer, usually via the Net though
One CPU has a Power of 3, each additional CPU adds
direct connections, however unwise, can be made.
an additional 3. Each CPU costs $10,000. A Computer may have up to 7 CPUs for a Power of 21. Additional
A Hacker's access to the Net is very important. To con-
CPUs increase processing capacity and provide backups
nect to the Net, the Hacker must have an LDL. LDL's
in case one CPU should fail due to Anti-System soft-
cost 50 euro a month from the Internet Corporation,
ware.
though they, too, can be hacked. Connections between computers are relatively easy to trace. Each computer
A Computer's CPU also determines how much software
connection has a corresponding Trace Value from 1 to
it can run and data it can store.
10.
are stored in Memory Units. A Computer can store as
Hackers generally make a chain of several connec-
Software and Data
A
many MU's as it's CPU x 40. Memory can be improved
SysAdmin wishing to trace the ultimate origin of the
for $250 per MU. CPUs also determines the starting
Hacker must trace every connection to nd the source.
level of system Datawall. A Datafortress' base Datawall
tions before they proceed to their target computer.
strength is equal to the number of CPUs driving it. 2/25
Instant Netrunning Netrunning Softwares
Computers with Powers higher than 10 are Articial
Cyberdecks vs. Computers
Intelligences with complete personalities and full interactivity.
Power can be decreased for a cost reduction
In games where cybernetic interfaces are common and
of $3000 per level. A Computer may also possess skills
older manual interfaces are uncommon, simply apply a
like a character.
Memory can be put aside to use as
2 to all actions taken by manual-interface computers. In
skills at a rate of 1 MU per Skill Level. In this way, a
games where cybernetic interfaces are uncommon, such
computer can devote 5 MU to have a Security Skill of 5.
as the modern world, apply a +2 to all actions taken by
All computer skills use Power as the primary statistic.
cybernetic interface computers.
The Speed is used to determine initiative. If using the
Successful attacks made against Cyberdecks using Anti-
Speed Chart, it can be used to determine the number
System software will cause the brain to disconnect and
and order of actions in a turn. Speed can be increased
become unconscious for 1d6 rounds in lieu of the CPU.
for $2000 per bonus up to +5. The Security Level is the SysAdmin's Security skill, added to its Power when resisting attacks. The Security Level is also used to determine a server's Trace Value
The Menu
when using it to chain connections in preparation for a To simplify using a computer in a game context, a simple
run.
set of commands has been devised. These commands are A Computer can respond to hacker's automatically.
called The Menu. A Hacker simply chooses his action
Once Detection software has identied an unauthorized
based on the list available in the Menu.
intruder, the Computer can automatically execute Anti-
The Menu
Personnel software against the Hacker, or trace the signal and run Anti-System software against the Hacker's computer.
•
Log On/O :
Legally gain access to an unre-
stricted Dataserver through proper authorization
A Computer can also be dened as a Cyberdeck.
berdecks or Cybermodems are small devices that are similar to computers in that they execute programs, but are dierent in that they are connected to the user's living brain and use it's neurological wiring to act as its Central Processing Unit.
techniques (password, LDL authentication, or bio-
Cy-
The Cyberdeck, modern
terms, is little more than a hard drive and network con-
metrics).
•
Copy File:
Copy a le from a remote location to
in a le history.
Edit File:
Edit the contents of a datale above.
Warning, a record is kept of each modication in a le history, including the modication of the le
Neural Interface and Cybermodem processor installed in Cyberdecks provide 10 MU,
View the contents of a datale, be it
a local one. Warning, a record is kept of each copy
Cyberdecks do not have CPUs, but the user must have a
and $500 for the surgery.
Read File:
Text, Graphics, Audio/Video, or Virtual Reality.
•
•
their brain, the cost of which is $1100 for the hardware
Run either a local or remote soft-
ware application.
•
nection. All input and output is processed by the user's brain.
Run Program:
history.
•
Erase File:
Erase a datale above.
Warning, a
a Speed of 0, and have a Data Wall strength of 2. The
record is kept of each erasure in a le history, in-
basic parts of a cyberdeck costs $1000 for the external
cluding the erasure of the le history.
hardware, though this is often marked down to as low
+1 CPU
Establish a connection to a Dataserver.
stealth roll was unsuccessful, the SysAdmin can
Computer Hardware Price List $10,000
LDL:
Warning, if disconnecting from datafortress, if the
as $500 for a used model.
1 CPU 1 Cyberdeck
•
still do a trace on your LDL.
(Power 3, 40 MU, Data Wall Strength of 1)
$1000
(Power 0, 10 MU, Data Wall Strength of 2)
$10,000
(Power +3 each, +40 MU each, Data Wall Strength of +1 each, maximum 7 CPUs)
+1 MU
$250
(no maximum)
+1 Speed
$2,000
(maximum of +5)
-1 Power
-$3,000
(no maximum, but at more than -2 you may as well buy fewer CPUs)
Instant Netrunning Netrunning Softwares
3/25
The Software Software applications are measured by their Strength, which act as a sort of Weapon Accuracy which is added to all tasks performed with that application. Software Strength is rated from 1 to 10. Software is also measured by how many Memory Units it uses on its host computer. This is cumulative. A computer with 30 Memory Units can run one 15MU program and three 5MU programs simultaneously. Switching out a program takes one action. Software applications can have very specic eects, depending on the application being used. The most common and broadly-dened applications are as follows:
Type Decryption
Eect
Strength MU
Cost
Defeats Codegates and File Locks.
4
2
400
Defeats Datawalls.
4
1
400
Defeats Detection Software.
3
1
300
Defeats Anti-Personnel Software.
3
1
150
Causes system to crash.
3
2
570
Does 1d6 damage to target software's STR.
2
5
1320
Anti-Personnel
Does 1d10 Hits directly to target's body if connected via a
4
4
6750
(Hellbolt)
cyber-jack. POW
+1
+1
+1000
2
1
2000
+1
+1
+2000
4
5
720
(Wizard's Book)
Intrustion (Hammer)
Stealth (Invisibility)
Protection (Shield)
Anti-System (Flatline)
Anti-ICE (Killer II)
Firewall
Prevents all access to restricted information.
(Datawall)
Authentication
Allows access to restricted information to authorized users
(Codegate)
Detection
Detects unauthorized users, traces signal, and alerts SysAd-
(Guard Dog)
min.
Other software found in Cyberpunk 2020 is fully compatible with this system.
4/25
Instant Netrunning Netrunning Softwares
Utilities Utilities are programs that help the Hacker in between runs. Though most don't provide any practical application during the run, they're nonetheless essential applications for the upkeep and preparation of a hacker's computer.
Type Restore Utility
Eect
Strength MU
Cost
Recompiles and restores destroyed programs.
3
1
130
Records activities of current Hack for replay later.
8
2
180
Detects and destroys Virus programs.
5
1
150
Locks datales as a Strength 3 Code Gate.
7
2
170
Reduces program size by 1/2. Takes 2 turns to unpack.
4
1
140
Creates copies of most programs on chip.
4
1
140
Supplies complete system map of VR interface.
6
3
200
All of the above in one package. Saves MU and money.
5
10
1000
(ReRezz)
Recorder Utility (Instant Replay)
Virus Protection Utility (Gatemaster)
File Protection Utility (Electrolock)
Compression Utility (Packer)
Backup Utility (Backup)
VR Map Utility (Cartographer)
Utility Package
The Goods
CPU's house applications for online use as well. Applisecurity
cations range from simple spreadsheets and word proces-
(Datawalls, Codegates, and Detection software), he now
sors to VR Simulations and computer-controlled robotic
has access to the Datafortress' CPU. The Hacker may
systems such as security video surveillance, elevators,
now view stored les (text, video, audio, VR) or run
building climate-control, assembly robots, etc.
Once
a
successful
Hacker
has
bypassed
online software applications. Be warned, individual les may have further security measures attached to them. For example, a le marked Black Ops:
Top Secret
might have another Detection application attached to it which the Hacker must bypass. Or it may be le-locked. Tampering with any ICE applications automatically requires the Hacker bypass a File Protection Utility and any Detection Software.
Note on making copies:
In the Cyberpunk future,
all les have a le-history, recording all modications to the le.
Though modications can be made to the
le-history, the File-history now has a record of the modication. This feature is used to determine the propriety of data. For instance, a hacker nds a le in the Arasaka database called Black Ops: Top Secret. The
Common datales found on corporate datafortresses include:
File History for that le will indicate how many times it's been viewed, by what User, and when. Our Hacker decides to make a copy. The original now records that a copy was made at this date by this user. The new Copy
1. Inter-Oce Memos (E-Mail)
records that it was copied from an original on this date
2. Promotional Material(such as VR advertising sims and Web Pages)
by this user. Every time the hacker views the material, the record shows that the le was viewed on this date by
3. Business Records (including databases)
this user. If the hacker wishes to sell this information, a
4. Financial Transactions
prospective buyer can view the le-history and see how
5. Grey Ops
many times the le has been seen, modied, and copied
6. Black Ops
and by whom.
Diluted data will lower the le's value.
Instant Netrunning Netrunning Softwares
5/25
Virgin data will raise it's value. The enterprising Hacker
Sample Computers
can easily change the File-History, but a record is made that the lehistory has been changed, thus lowering the
1.
Minor business or personal system (grey info)
value even more. The Hacker can then try to delete the
Statistics:
record of the change, but the deletion of the change is
Speed 0, $4000
recorded in the le-history.
Example:
It never ends.
The safest
POW 1 (1 CPU, -2 POW) , MU 40, DataTerms, Minor Personal Informa-
tion, Palmtops, Portable Computers.
bet is to just own one copy and not view it. 2.
Standard Hacker Software
Major business (grey info) or personal system (black info) Statistics:
Decryption (Strength 4, MU 2, $400)
POW 3 (1 CPU), MU 40, Speed 3,
$16,000
Intrusion (Strength 4, MU 1, $400)
Example: Business Accounts, Secret Personal In-
Stealth (Strength 3, MU 1, $300)
formation
Protection (Strength 3, MU 1, $150)
3.
Anti-ICE (Strength 2, MU 5, $1320) Total (MU 10, $2570)
Major business (black info) or Megacorp system (grey info) Statistics:
POW 6 (2 CPU), MU 80, Speed 6,
$32,000 Example:
Standard Datafortress Software 1.
2.
4.
Mundane Systems
Government (grey info), Megacorp (black info) or Criminal system (grey info)
Detection (Strength 4, MU 5, $720)
Statistics:
Total (MU5, $720)
$48,000
Grey Systems
POW 9 (3 CPU), MU 120, Speed 9,
Example:
Police
Files,
Sabotage
Information,
Holdings Information
Detection (Strength 4, MU 5, $720) tems Only
Government (black info), Orbital (grey info), or Criminal system (black info)
Total (MU 7, $1290)
Statistics: POW 10 (4 CPU, -2 POW), MU 160,
Anti-System (Strength 3, MU 2, $570) Grey Sys-
3.
Alternative Accounts, Customer Sales
Information
5.
Black Systems
Speed 10, $54,000
Detection (Strength 4, MU 5, $720)
Example: Black Op Files, Internet Account Hold-
Anti-System (Strength 3, MU 2, $570) Grey Sys-
ers, Face Bank Accounts 6.
tems Only
Orbital system (black info)
Anti-Personnel (Strength 4, MU 4, $6750) Black
Statistics: POW 12 (4 CPU), MU 160, Speed 12,
Systems Only
$64,000
Total (MU 11, $8040)
Example:
Agora
Mecca,
Cyber
Circle
Lunar,
Ishima Orbital Databases, Articial Intelligences.
Steps in Cracking a Datafortress: 1.
Library Research (Intelligence
+
Library Research
+
3d6 vs. Diculty Number )
to determine little facts
about the corporation. The margin of success is granted as a bonus to the Decryption roll in step 2.
Bonus: The Hacker loads up a good selection of software. Necessary applications include one Decryption, one Intrusion, one Stealth, one Anti-ICE, and one Protection. 2.
LDL (Roll over LDL Security Level on 1d10 ).
The Hacker has connected to a remote server and may use it
to connect (LDL) to another remote server, making a chain of connections to their target. SysAdmins must trace each connection to determine the Hacker's LDL. Once a chain of connections has been established, the Hacker may use the same chain indenitely unless access is revoked by the remote server's Net Access Provider. If unsuccessful, the remote server has refused to connect the Hacker. The Hacker must then make a nal connection to the target server. 3.
Decryption vs. Codegate (Intelligence + Hacking + Decryption Program Str + 3d6 vs. Power + Security +
Codegate Str
+
3d6 ).
If successful, the Hacker has fooled the Code Gate into allowing unauthorized access
to the server. The Hacker is still susceptible to Detection software, proceed to step 4. 6/25
Instant Netrunning Netrunning Softwares
If unsuccessful, the Hacker still has no access to the server. Repeated failed attempts(3d6) will cause any Detection Software to alert the SysAdmin to the attempt who may use Detection software to initiate a trace to locate and/or monitor the possible Hacker. Continue to Step 4. 4.
Intrusion vs. Datawall (Intelligence Datawall Str
+
3d6 ).
Hacking
+
+
Intrusion Program Str
+
3d6 vs. Power
+
Security
+
If successful, the Datawall has been circumvented and the hacker now has access to
the server. The Hacker is still susceptible to Detection software, however. Proceed to step 5. If unsuccessful The Hacker still has no access to the server but may have been noticed. If unnoticed, try again. If noticed, either a SysAdmin or an Anti-Personnel Program has been notied of the Hacker's presence and will attempt to apprehend or discourage him, proceed to Combat! 5.
Stealth vs. Detection (Power Str
+
3d6 ).
+
Security
+
Detection Str
+
3d6 vs. Intelligence
+
Hacking
+
Stealth
If successful, the Detection Software has detected no unauthorized activity but may attempt to
re-validate the user after an interval of time (3d6 rounds), proceed to step 6. If unsuccessful, the Detection Program has detected unauthorized activity and may notied either a SysAdmin or an Anti-Personnel Program to apprehend or discourage the Hacker, proceed to Combat! 6.
You now have access to the CPU. The computer thinks you are logged on as an ocial authorized user. You may access datales and software applications available on that server. Some datales and applications may contain further security measures. If so, repeat step 3.
7.
Cover your tracks.
Failing to log o or being cut from the line means that the SysAdmin can still trace
your location. Be sure to always log o properly. View the contents of any le you download, but be wary of the lehistory: don't dilute your data!
Combat! 1.
2.
Initiative.
Human Intelligence
+
Computer's Speed
+
Loser declares rst, Winner acts rst.
3d6
versus
Computer's Power
+
Speed
+
3d6
Therefore, if the loser is launching an Anti-Personnel Program
towards the intruder, the winner may either activate a suitable defense or take a chance and attack the loser rst. 3.
Combat Options: a Intruder attacks ICE. (Intelligence Power
+
Security
+
Program Str
+
+
3d6 ).
Hacking
+
Anti-ICE Program Str
+
3d6 vs. Computer's
If successful, the target software application has crashed and
erased from the server. If unsuccessful, the attack has failed to crash the application. Detection Software automatically traces the Hacker's connection and alerts the SysAdmin to the attempt who may attempt to discourage the Hacker. b
Intruder attacks SysAdmin or SysAdmin attacks Intruder. + +
Intelligence Intelligence
(
Anti-Personnel Program Str + 3d6 vs. Protection Program Str + 3d6 ) If successful, the Anti-Personnel program has done damage directly to
+ +
Hacking/Security Hacking/Security
the user's brain (STR
Protection STR in Hits), only if connected via a cyber-modem. On older non-cyber connections, treat attack as an Anti-System attack. If unsuccessful, the attack has failed to do any damage. c
Defending CPU attacks Intruder (Computer's Power +
3d6 vs. Intelligence
+
Hacking
+
+
Protection Program Str
Security + Anti-Personnel Program Str 3d6 ) If successful, the Anti-Personnel
+
program has done damage directly to the user's brain (STR Protection STR in Hits), only if connected via a cyber-modem. On older non-cyber connections, treat attack as an Anti-System attack. If unsuccessful, the attack has failed to do any damage. d
Intruder attacks System.
Intelligence + Hacking + Program Str + 3d6 vs. Computer's Power + Security + DataWall Str + 3d6 ) If successful, the Anti-system software has caused a CPU to crash, (
ceasing all activity until the CPU can be re-initialized using a Restore Utility. The Intruder is immediately disconnected, but not logged o. Once the CPU is re-initialized, the SysAdmin may attempt the trace the connection. If the target is using more than 1 CPU, all CPUs must be neutralized for the target to crash.
Instant Netrunning Netrunning Softwares
7/25
If unsuccessful, the attack against the CPU failed. Detection Software automatically alerts the SysAdmin to the attempt who may initiate a trace to locate and/or monitor the possible Hacker. e
Detection Software Traces Intruder (Power +
Hacking
+
Trace Value
+
3d6 )
+
Security
+
Program Str
+
3d6 vs. Intelligence
If successful, the Detection Software has located the origin of the
Hacker's connection and informed the SysAdmin. A Detection Program must trace each connection in the event of chained connections (see above) to determine the origin. Once determined, the SysAdmin may notify the Hacker's Net Access Provider in an attempt to have their access revoked. In addition, any further attempts to connect from any server on a traced chain will automatically alert the SysAdmin's Detection Software of the unauthorized access. If a connection was severed without spending an action Logging O, the SysAdmin can still perform a Trace on that severed connection. If unsuccessful, the trace has failed. The Detection Program may attempt to trace a connection each round. 4.
Damage.
Damage is allocated to aected systems or programs (or Hits in the case of Black ICE).
Glossary
how the Datafortress is set up.
Euro:
Anti-ICE Software:
software meant to crash and
delete other software applications.
Anti-Personnel Software:
damage to the actual Netuser.
software meant to do Only works in mileu
software meant to crash or an advanced computer ca-
pable of full interaction and decision-making.
Black Info/System:
Grey Info/System:
Top Secret information. Infor-
mation that someone is willing to kill to keep secret.
InforA
Datafortress with non-lethal countermeasures such as
Hacker:
A generic term for anyone attempting to
applications.
Hacking:
Skill used by Hackers.
In game terms,
Hacking and Security are the same skill used for dierent purposes.
A Datafortress with deadly countermeasures such as
ICE:
Anti-Personnel software.
passing any software applications designed to prevent
Codegate:
a Cyberpunk 2020 term for an au-
Intrusion Countermeasure Electronics, encom-
unauthorized access to a Datafortress.
thentication mechanism or Firewall. Codegates could
Icon:
check namepassword combinations, computer location
refers to a 3D representation of a computer object.
(LDL), ngerprints, retinas, voice-prints, DNA, etc.
A le might be represented by an icon that, once
CPU:
A visual representation. In Cyberpunk 2020,
Central Processing Unit, the brain of a com-
clicked/grabbed/pushed/opened, will display the con-
puter. Many computers have multiple redundant CPUs
tents of that le. Often, events are represented by an
that increase processing power. Also, if one fails, the
icon.
computer can keep operating at a reduced level.
presence on the server with an icon of a knight in ar-
Cyberdeck:
or Cybermodem, a computer device that
uses the operator's living brain as a CPU.
Datale:
any le that contains information. Datales
can be text, graphics, video, audio, or full sensory VR simulations.
Datafortress:
A Dataserver that restricts informa-
tion to authorized users.
Dataserver:
A futuristic term for a server, a com-
puter which provides data upon request.
Datawall:
A Cyberpunk 2020 term for a Firewall,
a Datawall without a Codegate simply doesn't provide access to it's protected information and must be defeated with Intrustion Software.
Decryption Software:
Software designed to bypass
Codegates by fooling it into providing access.
Detection Software:
Software that periodically re-
checks users on a server to authenticate access. If unauthorized access is discovered, the Detection Software
mor.
For instance, a SysAdmin might represent his If the Hacker sees a knight in armor, then he
knows the SysAdmin is logged onto the server.
Internet Corporation:
A Cyberpunk 2020 creation
meant to be a conglomerate of Net Access Providers. In the modern world, these would be comprised of several companies such as MCI, ATT, UUNet, etc. Intrusion Software: Software meant to temporarily disable Datawalls, allowing access to the server.
The disad-
vantage is that their use may alert Detection Software applications.
LDL:
A Cyberpunk 2020 equivalent of the modern
IP address.
In Cyberpunk 2020, the LDL also serves
as an allpurpose phone number, e-mail address, and voice-mail box.
Memory Unit: Megabytes.
A Cyberpunk 2020 equivalent to
It has no real-world conversion and was
used in lieu of actual future memory sizes which can become dated quickly.
noties the SysAdmin or automatically deploys AntiPersonnel or Anti-System applications depending on
8/25
Secret information.
mation no one is willing to kill to keep secret.
gain unauthorized access to restricted information of
immobilize another computer's CPU.
Articial Intelligence:
For
Anti-System software.
that use Cybernetic interfaces.
Anti-System Software:
The Cyberpunk 2020 unit of currency.
modern settings, simply replace with dollars.
Instant Netrunning Netrunning Softwares
Mundane Info/System:
Condential information,
In Cyberpunk 2020, VR Sims can be interactive games,
but hardly a secret. Information that is restricted but
advertisements, network conference areas, or fantasy
isn't guarded by countermeasures. Datafortresses that
playgrounds. Any situation that requires being some-
employ Detection Software only.
place you can't actually physically be can be solved
The Net: ternet.
The Cyberpunk 2020 equivalent of the In-
with a VR Sim.
The Cyberpunk 2020 Net is represented by a
3D fullsensory
Virtual Reality:
Other names for the Net include
the Face, the Cybernet, the Interface, the Web, etc.
Net Access Provider:
References
A company that rents tem-
porary LDL's to Netusers. The Internet Corporation is
For more information on other Hacking and Netrunning sys-
a large Net Access Provider. NAP's generally cooper-
tems, see:
ate with SysAdmins in discouraging Hacker activity. If an NAP is notied that one of their Netusers is possibly a Hacker, they will discontinue that Netuser's service. The futuristic equivalent of modern day Internet Service Providers.
Netuser:
Anyone using the Net legally. The equiva-
lent of the modern Net surfer.
Power:
A Fuzion game mechanic meant to be a rel-
ative measure of a computer's ability.
Security Level:
A Fuzion game mechanic meant to
represent the skill used by either a SysAdmin or Com-
Cyberpunk 2020
by Mike Pondsmith, R.Talsorian
Games.
Bubblegum Crisis RPG by Benjamin Wright, R.Talsorian Games.
NETRUNNING RULES by
[email protected] Skyre Master Force by Gary Townsend, HERO Games.
How Hackers Break In... and How They Are Caught by Carolyn P. Meinel, Scientic American, October 1998.
puter CPU to deter or capture Hackers. In game terms, Security and Hacking are the same skill used for dierent purposes.
Server:
A computer connected to the Net. The server
acts as a middle-man between the person requesting information and the memory storing the information. Your computer sends a request to the server, the server nds it, the server sends the information to your computer.
Speed:
A Fuzion game mechanic meant to be a rela-
Cyberpunk:2020 and Fuzion are a Registered Trademarks of R.Talsorian Corporation. Original Cyberpunk:2020 material Copyright 1994, 1995 by R.Talsorian Corporation. All Rights Reserved. Used without permission. Any use of R.Talsorian Corporation's copyrighted material or trademarks in this archive should not be viewed as a challenge to those copyrights or trademarks.
tive measure of a computer's speed. Stealth Software: Software that attempts to fool Detection Software into authenticating or ignoring an unauthorized Hacker.
Strength:
A Fuzion game mechanic meant to be a
relative measure of a program application's ability.
SysAdmin:
System Administrator.
The person in
charge of maintaining a Datafortress' security.
System:
A collection of computer components that
work together.
A group of computers attached to a
single network would be a system. The Net as a whole might be considered a very large system. Trace Value: The relative diculty in tracing a connection's origin.
Virtual Reality Interface:
Much like a modern
Graphic User Interface (GUI), the VR Interface displays the computer's Desktop as a 3D interactive universe around the user. In Cyberpunk 2020, the Net can be accessed in such an interface, displaying Net LDL's as Icons around the user. The user moves freely about in this space, choosing the icon they wish by coming into contact with it with their hands. Their bodies are displayed to them as whatever the user wishes and programs much like a modern cursor, their hands acting as a mouse in space.
VR Construct:
A 3D Icon in a VR Interface. A VR
construct can be anything, limited only by the imagine of the creator. It's size is determined by how much memory it requires.
VR Sim:
A VR Simulation. A tiny virtual universe.
Instant Netrunning Netrunning Softwares
9/25
10/25
Instant Netrunning Netrunning Softwares
4
2
3
Hammer
Jackhammer
Jap
Tor-
1
which
res
a
2
Worm
3
6
1-8
5
...
Codecracker
Cyfermaster
Dupre
Raes
...
Decryption
1
...
3
4
3
2
5
2
...
560
900
700
380
660
160
600
...
Opens Code Gates & File Locks
Opens Code Gates & File Locks
Stronger version of Raes
Opens Code Gates
Opens Data Wall in 2 turns, no alert
1D6 to Data Wall STR
3D6 to Data Wall STR, alerts programs within 15 spaces
spaces
nuclear
powered
battering
ram,
as
rows into Wall.
blue eyes. Emits low-pitched bleeps as it bur-
Brown, st-sized, fractal insect with bright
Glowing white Sledgehammer.
drawn by Jack Kirby.
Huge
ner.
so.
the locked Gate, and takes notes as he does
Elegant middle-aged Victorian. He speaks to
tion.
Fractal image of a man oating in lotus posi-
the Code Gate.
...
....
vanishes.
of the 1990's.
He speaks to the door then
CP20 Dapper young man wearing evening clothes
Chr3
BB
the Netrunner's hands and spreads through
CP20 Thin beam of white light, which shoots from
eyes.
CP20 Gold-metal, robotic worm, with green neon
Chr1
Chr3
BB
Data Wall then swings open for the Netrun-
Metallic door that slowly meshes with the
blowing up.
Termite
2
5D6 to Data Wall STR, "audible" to anything within 50
NET
6
900
Opens door in Data Wall, takes 3 turns, no alert
Sledgehammer
3
750
10
6
Ramming Piston
Tiny, random drops of glowing "water" strike
Wall.
2
Chr3
jackhammer,
Portal
4D6 to Data Wall STR, alerts progs in 30 spaces, & Netwatch
BB
red
stream of white hot energy bolts at the Data
CP20 Glowing
Steam-powered pile driver on the verge of
800
through the Wall.
Swarm of puke-green grubs that eat their way
Small, quiet digging machine.
CP20 Glowing red hammer.
BB
BB
the Wall, causing ripples.
4
Min of 2 turns, each additional turn adds +1 STR (max 7)
1D6 to Data Wall STR
2D6 to Data Wall STR, alerts programs within 10 spaces
Weaker version of Worm
Stronger version of Worm
8
260
360
400
210
230
From Icon
Pile Driver
4
2
1
3
3
MU Cost(eb)Function
ture
Water
3
Grubb
Str
Dwarf
Intrusion
Type / Name
Netrunning Softwares
Instant Netrunning Netrunning Softwares
11/25
3
4/6
Wizard's Book
3
4
3
5
1-6
5
3/5
2
Fetch 4.01.1
Guard-Dog
Hidden Virtue
Hunter
Looking Glass
Mouse
Netspace Inverter
Pit Bull
...
5
...
4
...
6
4
5
3
5
1
5
5
6
6
Detects entry, traces, alerts master
Detects "real" things in VR
Invisible; detects entry, alerts master
Detects entry, traces, alerts master
Detects entry, traces, disconnects target until destroyed
Detects entry, traces, disconnects target until destroyed
...
780
540
350
...
Detects entry, traces, disconnects target until destroyed
and les
Travels through a fort at 2 subgrids/turn IDing programs
Creeps into forts and makes a record of what's inside
250+20/str Detects disguised Icons
900
280
720
700
1600
1300
Detects entry, traces, alerts master whenever target appears
periphery of vision.
hound, other wise it is a slight icker at the
Detected it appears as a standard Blood-
Chrome greyhound with glowing blue collar.
Robotic pit bull with a red head.
Glowing green pit bull.
Metal-plated black bird.
icon has none.
blue, or a pair of glowing eyes appear if the
The eyes of the Netrunner's icon glow ery
screaming.
Flying eyeball; turns invisible when activated.
Small, innocuous mouse.
get icon.
Netrunner, passing over and through the tar-
Series of mirrors appears in front of the
Hound head lunging down the target's line.
through.
...
....
red eyes and wears a circlet of red neon.
CP20 Short, heavily built, steel dog. It has glowing
BB
BB
Chr3
BB
CP20 Glowing green ring which the Netrunner looks
Chr1
BB
BB
BB
BB
Chr3
Fang 2.0
1000
grids
SeeYa 3.0, detects and IDs Icons (+invisibles) within 2 sub-
Fang
6
720
5
4
baby, hanging around the Netrunner's neck,
Data Raven
Large steel statue of a dog/a computerised
nine jaws.
4
Chr3
A
glowing visor is situated above snarling, ca-
Short, burly humanoid in metal armour.
neon.
Clairvoyance
"Tags", adds 4 to traces when copied
BB
Chr1
blue eyes and wears a thick circlet of blue
CP20 Large, gun-metal grey hound. It has glowing
hand.
incredible speed from the Netrunner's open
None until activated, then it appears as a
430
Detect entry, alerts owner
Shifty-eyed character with an insincere smile.
CP20 Stream of blazing white symbols, owing at
BB
From Icon
...
chihuahua.
4
610
Detects entry, alerts master, disconnects intruder
Detects entry, traces, alerts master
Opens Code Gates & File Locks
Sneaky decryptor
...
4
5
660
700
400
300
...
Cry Baby
4
Canis
6
5
2
4
...
MU Cost(eb)Function
...
jor/Minor
6
Bulldog
Ma-
3
Bloodhound
Detection/Alarm
Str
Tinweasel
...
Type / Name
...
12/25
Instant Netrunning Netrunning Softwares
3
3
4
3
4
4
See Ya
Shadow
Smarteye
Speedtrap
Watchdog
chose
new
bottle, pies, etc.
cus clown, complete with slapstick, seltzer
Annoying, loud, obnoxious, white-faced cir-
Floating ball of energy.
sorbed on contact.
sules sprays the target's icon and are ab-
Shower of random neon-coloured pods & cap-
Glowing golden snake.
Netrunner's ngertips.
Beam of orange neon which shoots from the
...
2
...
600 ...
Causes system to randomly activate programs
disembodied st which burns with
...
....
CP20 You never know...
zling fuse.
CP20 Large, cartoon anarchist bomb, with a siz-
it in blue ames.
blue, fractal re, grabs onto target, engulng
Giant,
rounding it.
...
Huge white electrical arc that strikes the tar-
Netrunner's ngertips.
3
Crashes closest CPU for 1D6+1 turns
Chr3
Chr4
BB
CP20 Beam of yellow neon which shoots from the
I.3
CP20 Cartoon stick of dynamite with fuse.
BB
BB
Chr3
BB
eyes and a spiked metal collar.
CP20 Large, black, metal dog. It has glowing red
appear.
...
570
Destroys target CPU
Distorts I-G algorithms
Kills system RAM
Kills cyberdeck interface
Kills deck's interface and "jams" 'runner plugs
Crashes 'deck for 1D6 turns
Initiative
appropriate icon appears within.
Murphy
2
1000
20K
1000
Decks
humanoid
3
5
8
3
570
changes.
long,
Krash
4
Fragmentation
2
960
program
a
6
3
Flatline
3
600
that
Disrupts data transmission, progs are -1 STR, 'runners -1
prog/turn
chance
gains
HellBurner
4
Feedback
2
1130
20%
icon
Spinning crystal ball; the ball stops and the
shadow.
Netrunner's
CP20 Flat, glowing plate of glass, in which images
Chr1
Chr3
Black sphere with twisting light waves sur-
4
DecKRASH
5
800
Erases 2D6 MU of random memory
Kills cyberdeck interface
teeth.
Rather nasty, metal plated dog with really big
CP20 Shimmering silver screen.
BB
From Icon
...
get and follows his line back to his deck.
3
Clown
2
900
800
Detects entry, alerts owner
Detects attack programs within 10 spaces
Detects progs within 10 spaces, IDs attack progs
Degrades evasion programs
Detects Invisible Icons
Detects entry, traces, disconnects target until destroyed
...
7
3
Cascade II
4
2
610
600
620
540
280
1000
...
Grid Wave
7
Cascade
5
4
4
3
1
6
...
MU Cost(eb)Function
...
Storm
4
Asp
Anti-System
Str
Rex
...
Type / Name
...
Instant Netrunning Netrunning Softwares
13/25
5
2
5
4
4
1
6
2
5
4
4
Poison Flatline
Poltergeist
Pox
Scatter Shot
Swarm
Typhoid Mary
Weed
Vacuum
Virizz
Viral 15
...
...
7
Spore
...
7
4
...
2320
600
...
produce
AI suicide-replication, sends multiple copies into Net to re-
'Runner looks like he's jacked out and is invisible for 5 turns
Adds 4 to Trace Diculty
...
NET
I.3
BB
millions
holo-
....
Each spore looks like a small mote of light.
Looks as it the Netrunner has jacked out.
Signpost with signs pointing in all directions.
graphic images of the Netrunner.
creating
of
6
300
sphere
Bugs Bunny variants around. CP20 Chrome
Also
Blue sphere surrounded by two stylized light-
Silhouette
1
Confuses attacking ICE with millions of false signals
BB
BB
4
180
Draws o "Dog" programs, +2 Initiative when released
Adds another LDL to make traces harder when activated
the Netrunner.
CP20 Flickering, iridescent sheet, which drapes over
directions.
Cartoon signpost with signs pointing in all
Depends on the data fort.
Signpost
2
360
330
Makes cybersignal invisible
Chr3
BB
Makes the user's Icon invisible.
Anything programmed into it.
3/4
2
5
300
Adds 4 to Trace Diculty
Makes your Icon look like one common to the locale
BB
NET
DNA helix embedded in the centre.
CP20 Swirling metallic blue fog with a white neon
neon.
Replicator
4
Open-Ended
1
300
1500
ner's Icon out of the data fort.
Series of hexagonal frames that suck the 'run-
tem's CPU(s).
Tangled weeds growing on the icon of the sys-
Female Killer robot.
stinging it.
Cartoon-y bee that ies towards a CPU,
Shotgun shooting fractal shot.
wash of sickly coloured globules.
Floating ball of energy that explodes into a
wiping data and les.
Random ashes of energy from everywhere,
Netrunner's ngertips.
CP20 Glittering DNA shape made of lights and
BB
Chr4
Chr3
Chr4
BB
BB
BB
Fractal rabbit going like the blazes.
3
Invisibility
1
3
Powerful variant of Invisibility
Large cartoon pie, for throwing.
CP20 Beam of green neon which launches from the
Chr3
From Icon
...
ning bolts.
4
George
2000
200/STR Makes your Icon look like something/one else
Randomly erases one le each turn
Ties up 1 system action until turned o or destroyed
tered fort
Attacks location algorithms, forces 'runner to where he en-
-1 target speed per successful attack
Inltrates 'runner and deletes les
Causes target system to replicate Swarm programs
Kills system RAM
Causes a glitch in ambush ICE, 30% chance of derezzing
Randomly erases one le each turn
Kills system RAM
Makes CPU calculate Pi
...
5/1
5
Domino
2
3-4
590
600
1200
630
2400
3000
660
800
660
540
800
...
Rabbit
5
Cloak
2
2
3
3
8
7
3
2
3
2
4
...
MU Cost(eb)Function
...
Mileage
1-5
Black Mask
Evasion/Stealth
Str
Pi in the Face
...
Type / Name
...
14/25
Instant Netrunning Netrunning Softwares
4
3
4
Superballs
Vewy Vewy Quiet
2
5
3
OutJack
Reector
Shield
4
1
7
4
4
4
3
...
Aardvark
Banpei
Black Dahlia
Bunnies
Chameleon
Codeslinger
D'Arc Knight
...
Anti-Program
3
Joan of Arc
4/2
Flak
4
6
DeckShield One
Force Shield
4
Armor
Protection
Str
Stealth
...
Type / Name
...
...
5
3
6
3
7
5
3
1
2
4
2
2
2
2
2
2
4
3
...
1360
2500
1650
440
2000
1280
1000
150
160
150
190
160
180
320
170
400
500
480
...
...
1D6 to program STR
Killer written to t less MU. 1D6 damage
Killer IV with active Disguise
Overloads Vampyres
Interactive, super-realistic Killer. 2D6 damage
1D6 to program STR
Detects and destroys Worms
Stops attacks to 'runner
Reects Stun, Hellbolt, Knockout attacks
Jacks 'runner out of Net if he's taken Critical damage
gram
Remains "active" and takes damage meant for current pro-
Stops attacks against 'runner
grams
Creates static Wall to blind attackers; STR 2 vs Dog pro-
Adds +3 to deck's Data Walls
Reduces attacks from Stun, Hellbolt, Zombie, etc by 3 points
Concentrates on avoiding detection
Distracts targets, causing -3 Initiative
Mutes cybersignal, making detection harder
...
MU Cost(eb)Function
...
'runner
translucent.
The
glass cube. makes
no
sound
and
turns
bouncing around target's square, as if in a
Thousands of primary-coloured rubber balls
data
fort/position
in
None.
Woman's face that grimaces in pain.
...
BB
BB
NET
Chr1
BB
BB
seductive
woman
in
a
black
....
Svelte knight in armor.
Cowboy with six-shooter codeguns.
the Icon of the program it is attacking.
Killer with a polished mirror face that reects
ears" antennae.
metal coloured bubbles, with classic "rabbit
Rapidly-multiplying bunch of burnished gun-
evening dress.
Incredibly
Robotic samurai.
trapped.
around the Worm, then dematerialise with it
CP20 Matrix of thin yellow neon lines, which close
front of the Netrunner.
CP20 Shifting circular energy eld appearing in
mirrored bowl.
CP20 Flare of blue green light, coalescing into a
Chr3
is multicoloured
lights, swirling in all directions.
glowing,
CP20 Flickering silver energy barrier. BB
netspace
sheathed in fractal armor-plating.
Deck's
CP20 Cloud of blinding,
Chr4
CP20 Glowing golden armor in a high tech design.
BB
Chr4
ner's Icon.
CP20 Sheet of black energy draped over the Netrun-
...
From Icon
...
Instant Netrunning Netrunning Softwares
15/25
1
2
5
5
7
Loony Goon
Manticore
Mirror
Ninja
Orion
...
6
Killer VI
...
4
Killer IV
4
Exorcist
2
8/5
Eradicator
Killer II
4
Dropp
2
4
Dragon
Ice Pick Willie
10
Dogcatcher
3
6
Hydra
Str
Data Naga
...
Type / Name
...
...
7
5
4
3
4
5
5
5
5
3
3
7
4
3
7
5
...
6240
1520
1200
880
900
1480
1400
1320
1320
920
600
1600
800
960
1176
1480
...
...
Tracks Spores, 'runners, & programs. Destroys Spores
Invisible Killer
Rebounds Hellbolts
Attacks and derezzes Demons
1D6 damage. Strength 0 to defend against other Killers
1D6 to any program STR
1D6 to any program STR
1D6 to any program STR
1D6 to program STR
Attacks and derezzes Demons
Removes eects of Possession
Acts as Killer V, destroys AI Spores
1D6 damage, and jacks the 'runner out of the system
Attacks and derezzes Demons
Chases and destroys tracing "Dogs"
1D6 to program STR
...
MU Cost(eb)Function
...
ing a net on a pole.
Basic male or female humanoid shape carry-
and six arms.
Exotic woman with a serpentine lower torso
religious symbol.
Fractal priest in full regalia, carrying a large
Glowing amoeba with huge jaws.
in a pond.
A ripple across the immediate area like a drop
Classic '30s gangster hitman.
and dematerializes it.
His eyes glow red and he carries
His eyes glow red and he carries
...
I1.3
Chr4
Chr4
drawn
in
red
neon
The bolt goes in then comes out
....
radiance.
platform or an angel with wings and divine
Powerful man or woman with bow and ying
glowing sword.
When seen it appears as a ninja carrying a
again.
'runner.
Large, square mirror oating in front of the
A large scorpion tail arcs
shape, over one shoulder.
schematic lines.
lionlike
Cartoon character of the 'runner's choice. CP20 Huge,
BB
His eyes glow red and he carries a glowing Katana.
samurai.
CP20 Large manlike robot, dressed as a metallic
a glowing Katana.
samurai.
CP20 Large manlike robot, dressed as a metallic
a glowing Katana.
samurai.
CP20 Large manlike robot, dressed as a metallic
BB
CP20 Glittering blue fog that encircles its target
Chr3
NET
BB
eyes.
trical discharges. Laser beams shoot from it's
CP20 Great golden dragon robot, wreathed in elec-
Chr3
BB
...
From Icon
...
16/25
Instant Netrunning Netrunning Softwares
3
4
3
6
6
5
3
3
7
...
Ball and Chain
Bolter Cluster
Brainwipe
Cerebus
Cinderella
Code Corpse
Cortical Scrub
Data Darts
Fatal Attractor
...
Anti-Personnel
...
7
4
4
4
4
8
4
4
3
6
...
10750
5500
6500
7500
9000
9500
6500
8000
5000
1500
1400
1480
1280
Destroys target if used in the round when program was
active
1D6 damage, +2 STR for each program it destroys while
...
Attractively disguised Hellhound
Hellbolt variant that does 3D6 damage
Reduces INT by 1D6/turn, killing 'runner
Reduces INT by 1D6/turn, making 'runner mindless
High-powered Firestarter
Pit Bull that shoots Hellbolts
Reduces INT by 1D6/turn, killing 'runner
Powerful Hellbolt that does 4D6 damage
Slows 'runners movement to 1 square for 1D6+3 turns
Killer disguised as Watchdog
1D6 to program STR
4
3
5
5
3000
1D6 to program STR
1D6 to program STR
Wolf
4
Start-Up Immola-
5
1400
1440
1
2+
Snowball
5
5
"Blinds" any programs
2
Wildcard
4
Shaka
1000
Killer that strikes at range, 1D6 damage. +80eb/level over
1D6 to program STR
5
Sentinels Prime
4
1900
"Possesses" programs
rezzed up
5
Raven
3
1000
4
2-6
Raptor
3
...
MU Cost(eb)Function
...
Triggerman
4
...
tor
Str
Possessor
...
Type / Name
...
the target.
Wicked looking turret springs forth to blast
some part of the target icon.
Classic prisoner's ball and chain clamped to
it will ash entirely red as it attacks.
Identical to the Watchdog icon, except that
"Wild Card".
Representation of the old Capone ganger
Film noire-style detective.
mouth and burns the target program to ash.
Bolt of ame that shoots from the 'runner's
it destroys.
Snowball that grows in size for each program
Zulu warrior with spear and shield.
Golden humanoid with a big gun.
the target.
Raven that attempts to peck out the eyes of
prey.
Realistic falcon which swoops down upon it's
hood.
cover another Icon, which can be seen in the
Hooded robe, with nothing inside. Robe will
...
Chr1
BB
BB
BB
BB
NET
One res
....
suit. DIFF Sys Know to recognise her.
Attractive young woman in a skintight body-
Swarm of red globes that strike at the target.
Green globe that send out electrical arcs.
target.
Skeleton in a cloak with a scythe attacks the
ignites.
18th century ball gown, Anything she touches
Lovely woman with green glowing eyes, in
pursues target.
Hellbolts from its eyes, the other howls as it
Dark, metallic dog with 2 heads.
the oor and engulfs and kills the 'runner.
CP20 Acid-green electrical arc, which leaps from
BB
Chr3
Chr1
BB
BB
BB
BB
BB
BB
Chr3
BB
Chr3
...
From Icon
...
Instant Netrunning Netrunning Softwares
17/25
5
3
6
4(5)
5
4
6
4
Masti
Neural Blade
Pepe Le Pue
Psychodrome
Red-Out
Shock.r
Sleeper
Spazz
...
4
Liche
...
4
5
Homewrecker
Knockout
6
Hellhound
3
4
Hellbolt
King Trail
5
Glue
3
4
Jack Attack
Str
Firestarter
...
Type / Name
...
...
3
4
5
4
11
5
4
6
4
3
2
3
4
6
4
4
4
...
6250
7250
6300
6750
14000
7750
6750
12000
7250
6250
3500
6000
8000
10,000
6250
6500
6250
...
...
Halves 'runners REF for 1D6 turns
resist)
Non-lethal Brainwipe, makes target do a task (di 20-30 to
Freezes 'runner for 1D6 turns
Paralyses 'runner for 1D6 turns
Unconscious for 1D6 hours, scares victim
Reduces 'runners INT and REF for 1D6+1 turns
1D6 physical damage to target
1D6
Tracks & tags target, does 1D6 damage and reduces INT
Erases 'runners memory and over-writes personality
Causes coma for 1D6 hours
Leaves glowing trail behind 'runner for 3D6 turns
'Runner can't log o for 1D6 turns
High-powered Firestarter
Tracks target, waits, causes heart attack
1D10 physical damage to 'runner
Locks 'runner in place for 1D10 turns
Power surge electrocutes 'runner
...
MU Cost(eb)Function
...
of in
re, a
the
booming
speaks
hissing,
which
of
crimson
re
launched
from
the
eyes.
Fiery electrical arc that shoots at the target's
'runner's name.
Repeats the
Glowing yellow banana slug.
cling the Netrunner's wrists.
dressed
in
black
robes.
on
the
Netrunner;
changing
the
engulfs the 'runner.
Electrical arc, which leaps from the oor and
Golden bolt from the Netrunner's palm.
colour of his Icon.
descend
Shifting contextural haze of red pixels that
ing torture.
tual room of faceted, mirrored walls display-
Disguised as system. 'Runner is placed in vir-
ner's Icon.
Cartoon skunk the wraps around the Netrun-
Glowing, rune-etched broadsword.
lar.
Glowing blue masti with a huge spiked col-
under the oor.
...
....
target.
CP20 Nimbus of electrical energy surrounding the
I.3
BB
Chr4
Chr1
NET
BB
BB
skeleton
Grabs the 'runner in its grasp and drags him
CP20 Metallic
strikes out at the Netrunner's Icon.
CP20 Yellow neon schematic boxer appears and
NET
CP20 Pair of glowing schematic handcus encir-
BB
and re ripples over its body.
CP20 Huge, black, metal wolf. It's eyes glow white,
Netrunner's raised hand.
CP20 Bolt
the oor to entangle the Netrunner.
CP20 Shifting pattern of red shapes ickering across
voice, then leaps at him.
name
pillar
Netrunner's
CP20 Blazing
...
From Icon
...
18/25
Instant Netrunning Netrunning Softwares
4
3
3
5
5
4
6
5
Stun
Sword
The Audio Virus
Threat
TKO 2.0
Werewolf
Zombie
2
1D6
5
5
1
8
4
2
...
A Picture's Worth
Al Boon
Black Sky
Blink
Dummy
Evil Twin
IGOR
Lightning Bug
...
Multi-Purpose
Str
Stationery
...
Type / Name
...
...
6
7
7
2
7
8
7
6
4
6
3
6
5
4
3
6
...
1540
4800
2700
450
1500
4480
3600
1200
7500
13,000
6250
7000
8000
6750
6000
10000
...
...
6 "bugs" that kill ICE before it can attack
On-line unky
Combination Shield/Krash
Fake, disguisable program
50% rel
1D6 damage to Walls and programs, goes through Gates.
ning"
Hides 'runner in a cloud which attacks programs with "light-
Goes through Gates, does 1D6 damage to Walls & programs
Hides data within VRs
Reduces INT 1D6/turn, making 'runner mindless
Invisible Hellhound
Causes coma for 1D6 hours
Makes 'runner so nervous he jacks out
Reduces INT and REF until 'runner destroys program
1D6 physical damage to target
Freezes 'runner for 1D6 turns
Prevents 'runner from moving for 5 turns
...
MU Cost(eb)Function
...
on
the Netrunner.
them, appears in a sort of snowstorm over
Pieces of paper, with 'You're Nicked!'
stereo
system,
which
will
when rezzed.
None normally, but a stylish wolf in a suit
nasty left hook.
Chrome boxer who smacks the target with a
Set at time of purchase.
Any minor oensive or defensive program.
tremble and vibrate from the noise it makes.
Photo-realistic
...
NET
Chr4
Chr3
Chr3
BB
Chr3
BB
Chr4
It lunges out and rips the
Data ows in though coin
....
Netrunner.
red and white.
The motes lazily circle the
6 motes of light that slowly alternate between
with lab coat and hunchback.
Classic "mad-scientist's" assistant; complete
large arcs.
The Netrunner's Icon seems to y around in
the Icon of any program it encounters.
Small spinning chrome pyramid that reects
Or blows up.
into a random fractal solid (when it works).
Swirling cloud of fractal code that coalesces
program and the runner.
Black cloud which forms between the enemy
into a fractal solid.
Stream of fractal code that rapidly coalesces
pours into MU.
slot, machine spins a jackpot, scrambled data
Slot machine.
Netrunner's head o.
ing grey mist.
CP20 Shrouded, skeletal form, enveloped in stink-
NET
BB
Chr3
Chr4
CP20 Glowing energy katana.
ner's open palm.
CP20 Bolt of blue ame streaking from the Netrun-
Chr3
...
From Icon
...
Instant Netrunning Netrunning Softwares
19/25
3
8
6
6
Satchel Charge
Scribe
Wolfpack
5
3
4
4
3
5/2
4
4
4
4
2
Genie
Hotwire
Knevil
News At 8
Open Sesame
Phone Home
Rockerbit
Soundmachine
Terminator
Viddy Master
WAD Controller
2
Baedeker's
...
...
4
Backup
Map
6
Alias
Net
3
Dee-2
Utility
4
Crystal Ball
Controller
Str
Omnivore
...
Type / Name
...
...
1
1
2
1
1
2
1
2
1
1
1
3
1
1
1
1
8
8
7
8
...
130
140
160
150
140
260
140
200
150
130
140
220
130
150
130
140
15200
NA
18500
18500
...
...
Know
Routes calls public 2 or 3 dataterm numbers.
Used to copy programs
Replaces le name with false one
Diculty 10-35 to patch into signal
Allows control of videoboards
Control terminals
Controls mikes, speakers, vocoders, etc
set time
+3 System
Limited AI microphone/voxbox controller, broadcast at pre-
STR 2
Can place/receive calls while in the Net, can intercept at
Weaker program to operate doors, elevators
Allows access to Data Terms & Screamsheets via the Net
Limited AI vehicle controller, no safeguards
Operates remote vehicles
Operates doors, elevators
Operates robots, cleaning machines, autofactories, etc
Operates video cameras, remote sensors, etc
'runners
Does 1D6 damage to ICE/Demon STR, 1D10 damage to
47+
Stops and disassembles programs for copying. Program roll
& Gates
5D6 damage to 'runner & progs in 1 subgrid, 3D6 to Walls
2D6
Derezzes programs, fries CPUs, temporarily reduces INT by
...
MU Cost(eb)Function
...
apart.
begins moving it.
priate.
speaker remote and 'yells' into it as appro-
None.
...
BB
....
A green line extending across a Net map.
CP20 None.
CP20 None.
Chr3
CP20 None.
tion.
ing, or drawing on the remote icon in ques-
A disembodied cyberarm begins typing, writ-
CP20 None. Chr3
madly
Cartoonish Rocker that hangs around the
CP20 None.
CP20 None.
Chr3
with
glinting eyes. He grabs the remote's icon and
Wildly-dressed
CP20 None.
Chr3
CP20 None.
CP20 None.
CP20 None.
motorcyclist,
which pounce upon their target, ripping it
Pack of electrically-charged wolike forms
Cowled chrome monk with feather pen.
A bomb in a backpack.
mangles it.
which careens into its target and thoroughly
Whirring, buzzing, screeching ball of blades
CP20 None.
Chr3
Chr4
SW
Chr3
...
From Icon
...
20/25
Instant Netrunning Netrunning Softwares
4
3
6
8
3
Breadcrumbs
Butcher Boy
Cartographer
Databaser
Dolphin
4
4
2
10
10
5
4
8
2
File Packer
Flare Gun
Flip Switch 2.0
Flip Switch 3.0
GateMaster
Guest Book
Instant Replay
Mictotech AI In-
4
4
4
3
4
NetMap
Newsgroup Filter
Padlock
Re-Rezz
R&D
...
...
5
Mystery Box
Protocol
5
Multi-Tasker
Files
10
Multinetter
terface
4
Filelocker
An
7
Expert
Schedule
ElectroLock
grams
3
Pro-
Str
Bakdoor
...
Type / Name
...
...
3
1
2
4
1
4
6
20
4
2
2
1
0
0
2
1
1
3
2
5
2
3
7
4
2
...
250+
130
160
200
140
300
1140
2000
330
180
200
150
250
225
300
140
140
250+
170
310
180
200
550
290
600+
...
...
Skims R&D les at 1MU per turn. Shelf life of two weeks
Recompiles damaged programs and les
Access code needed to log onto deck
info
Goes out and skims news and interest groups for specied
Major region locator map, +2 to System Knowledge
Searches for and copies programs from les
Extra actions on mainframes
Allows multiple 'runners to run through one computer
Pseudo-AI that scans les looking for keywords
Records 'runners trip
Detects 'runners within 2 squares, treat as STR 3 Code Gate
Anti-virus, detects & destroys Virizz & Viral 15
Flip Switch glogo controller, 3 settings
Flip Switch controller, -5 Net Initiative when active
Message travels 3 spaces per turn for 2D6 turns
1/2 MU size, 2 turns to unpack
Locks les with code word, equal to STR 5 Code Gate
Skims les at 1MU per turn. Shelf life of a month
Locks les at STR 3
Clean Pacica of junk data
Stores up to 10,000 pages per le
the fort
STR vs CPU INT/2 for map of data fort, must be run inside
Creates a paper trail, whilst funnelling funds elsewhere
LDL
Finds new LDL link routes (legally), 1 round per uplink or
Routes link through at least one private system
...
MU Cost(eb)Function
...
None.
program.
Takes the appearance of a system accounting
Line of glowing sparks forming a trail.
A green line extending across a Net map.
Sleek, chrome dolphin.
requested.
manoid icon that leads you to the les you
None needed, but might appear as a hu-
None.
None.
Big-barrelled are gun.
An old-style hotel guest book and quill.
on each surface.
Cartoon box with strange gears and widgets
None.
None.
Floating hollow mask.
A simple Icon of the user's choice.
...
BB
....
requested.
manoid icon that leads you to the les you
None needed, but might appear as a hu-
CP20 None.
CP20 None.
BB
CP20 None.
BB
NET
Chr3
BB
CP20 None.
Chr4
CP20 None.
BB
Chr3
Chr3
CP20 None.
CP20 None.
BB
CP20 None.
NET
CP20 None.
Chr3
BB
NET
BB
...
From Icon
...
Instant Netrunning Netrunning Softwares
21/25
5
4
1
Translator 2000
Zetatech Installer
5
7
4
3
6
Reaper
Soulkiller 3.0
Succubus II
Thug
Vampyre II
7
3
Cream Pie
Deep Thought
...
5
Cockroach
...
3
Boardwalk
Daemons
3
5
Balron II
Imp II
3
Afreet II
Demons
Str
Shredder Uplink
...
Type / Name
...
...
7
7
7
7
7
6
4
4000+
45-
7
3
5
4
1
2
3
...
1080
1715
1600
1080
2300
10440
1200
NA
12500
1000
1240
1160
300
240
250
...
1D6 to 'run-
messages
and
conversation
in
admin/budget
...
Records messages and conversation in research database
Carries 3 programs (Poison Flatline, Killer IV, & Murphy)
Eats les, turns them into more cockroaches
database
Records
Can absorb up to 6 programs
ners
Permanent subroutines, 1D6 damage to programs and 'run-
Carries 4 programs
actions
1D6 INT loss/ to Data Walls & programs, -4 to detect, 3
ners/progs
Seeks out & destroys users in a set area.
Carries 2 programs
Carries 4 programs
Carries 3 programs
Compresses programs to half size but reduces Speed by 1
Takes pictures to make virtual objects
Reconstructs les in the Trash buer
...
MU Cost(eb)Function
...
base.
round metallic base, who feeds programs into
'Tronnic humanoid upper body mounted in a
None.
inside a trash can and pulls out complete les.
Janitor program who ries through the pieces
sphere
of
light,
with
two
talline voice, and sucks the 'runner into it.
Swirling vortex that speaks in a high crys-
sickle and cloak made of outer space.
Classic Grim Reaper, complete with aming
pings.
...
BB
BB
BB
BB
Chr1
Chr3
....
all).
way into the database (when it's visible at
Dark depression/hole that slowly works it's
A cream pie.
across the face of the database.
Small cockroach-like image that multiplies
database.
Stylized porcupine-like shape that invades the
solves other icons.
fangs. Transforms into misty cloud that dis-
Figure in grey robes, with golden eyes, &
Generic cartoon thug.
blue eyes.
shiny chrome metal. Has large batlike wings,
CP20 Voluptuous, nude, hairless female, made from
SW
SW
orange
amused looking red eyes. Beeps, whistles, &
CP20 Small,
armor. Carries a red glowing energy blade.
CP20 Huge, male gure. Dressed in futuristic black
deep voice.
clothes, wears a fez and speaks in a formal,
CP20 Tall, powerful black man, dressed in evening
BB
Chr4
BB
...
From Icon
...
22/25
Instant Netrunning Netrunning Softwares
3
3
2
4
3
2
6
4
Fait Accompli
False Echo
Gremlins
I Spy
Incubator
Pattel's Virus
Skivviss
4
4x3
Soulkiller 1.0
Trap!
6
5
4
8
4
3
...
CloakMore
Dazzler
Monitor
Panzer
Pocket VR
Too Many Doors
...
Systemware
5
Chimera
Ambushes
Str
Eavesdropper
...
Type / Name
...
200,000
500,000
100,000
1320
2200
760
400+
7000
380
570
1365
Records messages and conversation in
tected
3 Asp programs hidden in a le or node that attack if unde-
matrix
Drains target's intellect, etc (1D6 INT/turn) into a data
Invisible anti-demon. If undetected it gets a free turn to act
Inates project costs, so that they get cancelled
Weakens 1 type of ICE
Reproduces other programs
Commercial version of Eavesdropper
Produces more gremlins and randomly shoots o programs
Triggers false system alerts
Subtly messes up project les
system
Carries Databaser.
...
...
3
13
7
7
14
...
1000
13000
20000
950
14800
...
chosen
Gives 'runner a choice of doors, disconnected if wrong one
detect
Disguised VR "cell" with trace, di 15-25 Interface roll to
Monitor that does 1D6 damage to 'runners and programs
Roving internal Net security
detect
Disguised VR "cell" with trace, di 15-25 Interface roll to
5/cpu 4000/cpu Cloaks an entire data fort. Neutralizes 1 INT/CPU
NA
NA
4
7
7
6
6
7
6
7
6
...
MU Cost(eb)Function
...
...
BB
BB
BB
NET
Chr3
NET
BB
BB
BB
BB
BB
BB
BB
BB
BB
BB
BB
The vortex sucks the 'runner
Often cus-
These
....
cally, or wrongly.
"doors" can be unlabelled, labelled identi-
Junction of 3 or more access routes.
tecture or simple defence program.
Usually disguised as a piece of system archi-
tomised by in Corp data forts.
Big computer generated tank.
None.
tecture or simple defence program.
Usually disguised as a piece of system archi-
None.
Three Asps owing out of the le/node.
into it.
talline voice.
Swirling vortex that speaks in a high crys-
and choking gas at the target demon.
Fully animated chimera which breaths re
data.
act as a nder subroutine while corrupting
Bulbous chrome robot with four arms that
Swirl of hundreds of crystalline fragments.
other program always growing inside it.
Translucent pyramid with the nucleus of an-
Hollow mask with piercing light-beam eyes.
monkey wrenches.
Little green men running around carrying
'runner.
Shimmering "hologram" mirror image of the
a sinister smirk under the hood.
Cloaked and hooded man, with a glimmer of
None specic, it's supposed to blend in.
...
From Icon
...
Instant Netrunning Netrunning Softwares
23/25
+1
+2
+3
+4
+4
+5
Data Wall 2.0
Wall of Static
Crystal Wall
Fire Wall
Reinforced Wall
Rock is Strong
4
+1
Endless Corridor
Encryp
variations
exist
(Brainware
...
tion
...
...
...
...
If you fail to get past it launches Psychodrome (STR 6)
Tighter coding makes them stronger, dierence easily noted
Requires two passwords. +3 di to crack second password
...
BB
BB
BB
BB
....
whatever your worst nightmare is.
Then it's
Upgraded Code Gates have a tight matrix wo-
going on and on and on.
The Gate looks like a corridor that just keeps
Keyhole that scans your Icon.
monplace (see Brainware Blowout).
CP20 Normal Code Gate, but variations are com-
ven into them.
Upgraded Data Walls have a tight matrix wo-
programming.
Normal Gate until it activates.
80000
Many
Uses a brainwave ID scanner. 3 Interface rolls needs to pass
Gates.
BB
Wall to bombard the 'runner with spheres of
Huge, brain-like image emerges from the Data
feedback.
at which the Wall will re a burst of neural
An aimpoint appears on the 'runner's Icon,
to attack the 'runner.
Data Walls that can sprout buzzsaw blades
the 'runner.
ven into them.
8
250,000
8000
20000
Code
Blowout)
1000/levelBasic
Tighter coding makes them stronger, dierence easily noted
BB
BB
BB
Mesh of laser light that reaches out to engulf
Looks like a standard Data Wall.
Looks like a standard Data Wall.
Huge stone wall.
Very sturdy looking concrete wall.
Wall of ame.
Crystalline wall.
fort.
Shifting wall of static surrounding the data
Picket fence.
Haunting Inquisi-
-
4
-
-
300,000
4D6 damage to 'runner (STR 6), goes inert after 3 rounds
2D6 damage to 'runner (STR 5), goes inert after 3 rounds
2D6 damage to 'runner (STR 3), goes inert after 3 rounds
BB
NET
NET
BB
BB
BB
BB
BB
BB
CP20 Standard Data Wall.
...
From Icon
...
through
8/6
5
Cortical Scanner
Break-
1-10
Code Gates
Code Gates
rier
-
44000
40000
36000
+1
-
-
-
Superior Net Bar-
Hellbolt,
+6/6
5
Wall of Ice
Spazz,
+5/5
4
Shotgun Wire
Stun,
+3/3
2-3
Razor Wire
34000
'runners,
1D6 damage to 'runner (STR 2), goes inert after 3 rounds
-
Attacks
Attacks Intrusion programs as Killer, +160eb/STR
+2/2
30000+
4800+
Flashy Data Wall. STR = CPUs+5
Flashy Data Wall. STR = CPUs+4
Flashy Data Wall. STR = CPUs+4
Flashy Data Wall. STR = CPUs+3
Flashy Data Wall. STR = CPUs+2
Flashy Data Wall. STR = CPUs+1
Laser Wire
-
-
5000
4000
4000
3000
2000
1000
1000/levelBasic Data Wall. STR = CPUs+0 to +9 (max 10)
...
+1000eb/STR
1-5
1-5
-
-
-
-
-
-
-
...
MU Cost(eb)Function
...
Wall
Anti-Personnel
Wall
Anti-Program
UpgradedDataWalls
1-10
Str
...
Data Wall
Data Walls
Type / Name
...
24/25
Instant Netrunning Netrunning Softwares
7
6/4
1-10
3/5
Nerve Labyrinth
Shrouded Gate
Tutor
7
Succubus III
...
...
...
...
'runner
...
145000
Compiler (assassin to kill it), 1D6 physical damage to the
7
3
Converts 'runner to electronic entity, roll 1D10+4 for max
Compiler, carries 2 programs. 2D6 anti-personnel damage
Allows you to walk on the sides of the Olympia sidewalks
+1 to Net movement, -50% deck MU
Lunch Moneyâ¢
NA
NA
NA
NA
INT
30
4
3
2+
Prog 15+. IDs Icon as either prog, 'runner, or AI
Construct
EmergencySelf-
4
3
SideWalker
Specials
2
NA
Alerts LDLs to presence of illegal calls
Rice Burner
2
NA
6
Rache's SeeYa
7
5
Pirate Uplink
270
Hold 4 programs like a Demon, but each program has full Attracts "Dog" programs from all over
4
1500
Up to 3 'runners can combine INT, REF, and Interface
4
2
5600
+4 to INT, +2 speed
Doubles remaining memory (MU-4), Speed=1
Adds 20% extra MU, Speed -1
(STR 5)
Easy to crack, but tags 'runner so that ICE can break link
Makes a Code Gate invisible. +1000eb/1 STR
(STR 4)
If you fail to get past it does 4D6 damage to the 'runner
Code Gate variant
Bone
6
7
4500
500
300
50000
3000+
50000
7000
...
strength
ICE-
9
6
4
3
NA
4
NA
-
...
MU Cost(eb)Function
...
breaker
Memorial
Rache Specials
Gestalt
Brain Buster
4
1
18-Wheeler
Enhancement
1
Trailer Hitch
Transportation
Str
Mazer
...
Type / Name
...
...
BB
BB
SW
NET
NET
NET
NET
NET
BB
I.3
I.3
NET
NET
BB
NET
BB
BB
shows
nothing sawtooth
....
the 'runner.
then gets an evil look in it's eyes and attacks
Super-realistic little girl that plays innocent,
later emerges.
the 'runner's Icon into it; if successful the Icon
Swirling vortex of blue lightning that sucks
anime girl.
busty, curvaceous, rendition of a red-headed
Very close variant on Spider Murphy's Icon, a
None.
Japanese-style racing motorcycle.
(human),
screen, wave
silver sine
wave (AI/Pseudo Int).
(program),
Shimmering
None.
Rubber dog Bone.
A non-Euclidean corkscrew.
telligence.
Whatever it wants, after all it is a super in-
diates an aura of great intellect.
User's head looks as it's steroids, and he ra-
icon on the sides of the trailer.
An 18-wheeler trailer with the Netrunner's
An open-topped, single-exit trailer.
which other ICE can yank.
Regular Code Gate that gives your Icon a tail
Invisible or disguised as a Data Wall.
'runner and squeeze his brain.
Green labyrinth that seems to draw in the
Looks like a maze.
...
From Icon
...
Instant Netrunning Netrunning Softwares
25/25
Str
...
All system data is encrypted (STR 10 Gate), 1-2 hrs to de-
Circa 2013 interface. All 'runner Initiative rolls at -2
NA
100,000
Escher style data fort, -3 to 'runner Initiative until use to it
[email protected]
New collation by Gaby Wald + Amael Assour 07/09/2012.
Collated by Andrew James 25/11/98.
c R.Talsorian Games Inc. All rights reserved. Information
TesseractConstruction NA
300,000
10000
50000
INT 6 pseudo-AI, STR 5 attacks vs 'runners and programs
NA
NA
NA
code
10/5
NA
NA
...
Blood Cat
Encryp-
Rou-
...
MU Cost(eb)Function
...
tion
Bizzare
tines
Antiquated
SystemConstruction
Type / Name
...
BB
BB
BB
BB
and
sideways
constantly
walls at impossible angles.
down
up, changing,
Fort Fort's interior dees orientation,
and mouth.
Dead-black panther with glowing red eyes
None.
Older-style and more primitive Net imagery.
...
From Icon
...