New Target
New Target
New Target (1 Die)
Bonus Action, Check (Construct creatures, Starfighters, Vehicles, Weapon Decks)
In the chaos of battle it can be easy to miss a few subtle tweaks to the targeting system.
The next time the device makes an attack, it or its operator makes an Intelligence saving throw or you select a new target for that attack. New targets must be eligible within reach or range of the triggering attack.
Jam Comms
Jam Comms
Jam Comms (2 Dice)
Action, Save (any Deck, Communications Systems, Construct creatures)
Information and coordination are key to any battle—turn those off and it’s chaos.
The device or its operator makes a Wisdom saving throw. On a failed save, while you are hacking it the device is deafened, it cannot transmit audio information, and any signals it’s connected to are jammed and cannot send or receive data transmissions. If you hack a capital ship deck in this way this effect applies to all of those ship’s comms and ship comms held by creatures crewing it. Once your hack ends, the communications system regains full functionality.
Evade Security
Evade Security
Evade Security (0 dice)
Action, Check (any device)
Sometimes you just need a little more time with system access and that means evading digital security measures.
You add one additional hacking countdown die to the hacking countdown. If you critically succeed on this check, instead add 1d4 hacking countdown dice to the hacking countdown.
Freeze Engines
Freeze Engines
Freeze Engines (4 Dice)
Action, Check (Engine Decks, Starfighters, Vehicles)
Engines are so complex that all it takes is bypassing the internal safety protocols to make something go wrong.
The device’s engines cease to function while you are hacking it. Devices hacked in this way cannot move, perform any starfighter maneuvers, or make any system maneuvers that require movement. If the hacked device is currently within a planet’s atmosphere or gravity well it begins falling downward at a rate of 500 feet per round. Once your hack ends, the engine regains full functionality.
Implant Data
Implant Data
Implant Data (3 Dice)
Action, Check (any Ship Deck, Communications Devices, Computing Devices)
Putting data where it shouldn’t be without leaving a digital fingerprint is a tricky task, but when you cover your tracks most people simply believe what’s on their screens.
You implant data within a device, such as adding names to a company roster or falsifying records. The result of your hacking tools check is also used as the DC of Investigation checks made to determine that the information you implanted is inaccurate and has been tampered with.
Drop Shields
Drop Shields
Drop Shields (3 Dice)
Action, Check (Construct Creatures, Forcefields, Shielding Devices, Shield Generation Decks, Starfighters)
Shields and forcefields are excellent defenses in the physical world but of little use in the digital realms.
Any temporary hit points the target has gained from a shield or forcefield are immediately lost. Devices hacked in this way cannot gain temporary hit points from their shields or forcefields while you are hacking the device. If the hacked device is forcefield armor, the AC provided by the hacked armor is reduced to 10 + the wearer’s Dexterity modifier while it is being hacked. Once your hack ends, the forcefield regains full functionality.
Disable Deck
Disable Deck
Disable Deck (3 Dice)
Action, Check (any Ship Deck)
Most ship systems have internal lockouts to prevent hacking—it’d be a shame to trigger that intentionally to lockout the intended users.
No actions or ship maneuvers can be made using the device while you are hacking it. Once your hack ends, the device regains full functionality.
Digital Filter
Digital Filter
Digital Filter (4 Dice)
Action, Save (Camera Systems, Construct creatures)
You can use high speed editing viruses to literally strip content out of mechanical eyes.
The device makes a Wisdom saving throw or you make any number of creatures and objects unseen to it. The device treats your selected creatures and objects as invisible, and cannot visually perceive them so long as you are hacking the device. Any visual information the device transmits appears as normal, except your chosen creatures and objects are unseen so do not appear within them.
Digital Pickpocket
Digital Pickpocket
Digital Pickpocket (2 Dice)
Action, Check (Communications Devices, Computing Devices)
Most accounts lock up tight when an attempt is made to empty them out so the smartest thieves collect their ill–gotten gains in little innocuous bits.
Transfer up to 5% of the credits in an account linked to the hacked device into an account of your own. Software on a monied account is usually very tight however, and when you begin this hack your hacking countdown becomes a fast countdown (dice are removed from the pool on a result of 4, 5, or 6).
Delete Data
Delete Data
Delete Data (1 Die)
Action, Check (any Ship Deck, Camera Systems, Communications Devices, Computing Devices)
With professional subterfuge sometimes you just need to wipe the records clean.
You remove data within a device, such as wiping recent camera footage or erasing the contents of a ship’s manifest. The result of your hacking check is also used as the DC of Investigation checks made to determine that the information was deleted by a hacker and isn’t simply missing or corrupted.