SavRS Tech 03.031: Hacking into the Netz

SavRS Tech 03.031: Hacking into the Netz

Hacking is very common way to gather information in the setting of Reich Star and in many ways, it should be similar to a Networking task. In this setting, there are two main uses of Hacking.

  • Accomplishing a very specific task like setting the self destruct, stealing sensitive data that you already know the location of, or taking control of the security camera system.
  • General data gathering like finding dirt on a corporate executive, finding the location of that sensitive data (above), or looking for strange information about an town

In either case, Security plays a roll in how successful the attempt is.


Security is not a property of the system as much as a property of the task. How hard should the task me? There are four levels of Security in the Hacking world.

Extreme (Top Secret)4-4

Security on the Netz is a constantly changing and adapting thing. There are monitoring bots that try to catch and stop hackers from accomplishing their nefarious actions on the netz and there are firewalls and other cyber defenses that make it difficult to accomplish those same nefarious actions.

Security like the tools the Hackers have, are somewhat variable depending on the situation. Some tools are more effective against a system security while others are not. Some Security measures are more effective against a hackers methods than others.

Accomplish a Task

To accomplish a specific task, the level of security depends on the Task the character wishes to accomplish. Also the type of skill test depends on the complexity of the task. If it is a single task like turning on the sprinklers in a single room, then it should be a single test against Hacking and the GM can determine how long it will take. Something like that would probably have a low level of security which effects the test. Meanwhile, a task that is a little more complex may require a Dramatic Task. You can easily follow those rules for this kind of task.

However, in either case, the constant fluctuating security measures and counter measures as well as the varying degrees hacking tools creates a chaotic world for the hacker to navigate. AI security systems try to counter cyber-jacked rogues who try to be faster and obfuscate their presence. Sometimes, the security measures are overwhelming and other means of getting in must be found, while other times, the hacker has the perfect tool for the job.

Gather Data

Many times, the Hacker is tasked with finding as much data as possible on a particular subject – data that is not easily obtained. The Research skill can cover the basic publicly known information however, it is hard to really sort through the propaganda to get the truth. In many cases, a Hacker has to dig deeper. Once the data is obtained however, a Research skill test may still be needed to sort through the data to determine what is relevant and what is not.

This task is more like a Networking attempt and instead of Persuasion or Intimidation, the character uses Hacking as the skill. Security depends on the level of information one wants – how deep do they want to dig. Suspicion also applies to this as there are trackers and bots always watching the hacker’s every move. A hacker has to be good at covering his own tracks to avoid suspicion.

Hacking the Netz

Hacking the Netz is no simple task, regardless of the type of task you are trying. In Savage Reich Star, there is at least two rolls involved in Hacking the Netz. Each type of task is very similar with differing effects.

Simple Task/Trait Roll

Hacking the Netz for a simple task involved 2 rolls:

  1. Defeat Security
  2. Accomplish Task

Defeating Security

  1. The GM draws a number of cards face up equal to the security level related to the task being attempted.
  2. The Player makes a Hacking rolls to defeat the security. For each Success and Raise, the player gains a card.
  3. The player matches each card with the GMs card, attempting to place beat every card the GM lays down, War-style.
  4. If there are any unopposed

Complex Task/Dramatic Task

Gather Data/Networking


Leave a Reply

Your email address will not be published. Required fields are marked *