Instant Netrunning  A Plug-In  by Christian Conkle

([email protected], http://www.europa.com/~conkle)

Introduction All computers connected to the Net are assigned LDL. This LDL serves as a kind of telephone number for This is a system of rules expanding the hacking rules that computer, to which other computers know where for Fuzion and Interlock. These rules draw heavily on to send information. In a futuristic setting, a Virtual 2020's Netrunning rules and are intended Construct or Icon may substitute for the LDL. The Net to be native in a Cyberpunk environment where neural User connects their computer to a Virtual Reality Inter- cyber-interfaces are standard, though they are written face, within which companies pay for space and create generically enough to be useable in a modern setting as elaborate virtual constructs to represent their LDL, the well. VR equivalent of Internet Portal Sites such as Infos- eek or Yahoo! today. The Net User may now tour the These rules were designed to use existing Cyberpunk bustling 3D Virtual City regardless of gravity or speed. 2020 equipment and software with little modication. Corporate virtual constructs are like giant 3D advertise- There are several dierences from the original rules, how- ments, attempting to entice the average Net User into ever, that are intended to speed play and optimize sim- their Virtual Realities to sell products or services. Some plicity. First, these rules lack a grid. Movement within Virtual Realities actually provide useful services such the virtual environment of cyberspace is conceptual. To as information or online software applications. The VR convert applications that give ranges, simply apply a equivalent to modern Websites. These Virtual Realities percentage chance of eectiveness based on range. Sec- are housed on Dataservers maintained by the respec- ond, these rules incorporate the Power attribute from tive corporations or institutions. It is the information other Fuzion games, essentially the equivalent to a com- housed on these Dataservers that isn't readily available puter's Intelligence from CP2020. Third, software and to the public that draws the Hacker. Normally, a cor- memory no longer needs to be assigned to specic CPUs. porate dataserver is openly accessible to the Net public, If the GM wishes, each MU of application and datale providing information either to the public or its employ- can be assigned to specic CPUs such that if that CPU ees through a variety of interfaces: text-only, text and fails, the application or datale is no longer available. graphics (the Web), audio/video, or fullsensory virtual This process was removed to eliminate extra bookkeep- reality (the Net). ing. These rules assume a 3d6 die-rolling mechanic op- tion of Fuzion. If you're playing Interlock, or the Fuzion However, the value of information available on public option of 1d10, simply replace the 3d6 with a 1d10 die dataserver sites is poor and bland. In addition, access to roll. You won't achieve the same kind of bell curve, but remote software applications is limited to public-domain the results will be suciently randomized. applications.

Datafortresses are the restricted hidden levels of a The Net dataserver providing remote access to restricted data or software applciations to authorized users. Security is The Net is a global computer network allowing fast maintained through the datafortress' DataWall program. and convenient access to millions of computers from The level of security restriction depends on the value of any other computer on earth or beyond. Any computer the information or application. Secure information may connected to this network has the capability to access be housed on the same dataserver as public information, information from any other computer connected to this only hidden in restricted directories, eectively invisible network regardless of distance or time of day. Whether it from those who lack proper authorization. Authorization is called the Internet, the Web, the Cybernet, the Face, comes with proper identication.  Identication can or the Net, all use dierent special eects and technolo- come in many forms: Authorized Net LDLs, passwords, gies to describe the same thing. This plug-in assumes a proper interface software, or even biometric data. near-future setting which makes use of a Virtual Reality It is a hacker's goal in life to gain unrestricted access interface and gives exciting names to actions and tasks to restricted information, uncover secrets, make unau- which can be easily modied to t a more mundane thorized changes to data, or to use a restricted software modern setting. application.

Instant Netrunning  Netrunning Softwares 1/25 When attempting to gain unauthorized access to a cor- porate datafortress, the hacker establishes a legal con- nection to the company's dataserver. Once connected, The SysAdmin the hacker has normal access to the free services. Nor- mally, an authorized user will then use an interface pro- The SysAdmin is in charge of security for a gram to gain access to the datafortress. The datafortress' Dataserver/Datafortress. It is their primary job to pre- Code Gate program veries authorization and allows ac- vent Hackers from illegally gaining unauthorized access cess. The hacker attempts to fool the code gate into to restricted data. It is their secondary job to catch authorizing entry. Should that fail, the hacker may at- hackers who have already have. tempt to gain entry by disabling the DataWall program protecting the information. SysAdmins use their own computers connected to a Dataserver/Datafortress to execute software applica- Once past security, the Datafortress constantly re-checks tions. The Dataserver/Datafortress itself uses software authorization through the use of Detection software. De- such as Codegates, Datawalls, and Detection software tection software double-checks the authorization of all deter and identify hackers, yet allow authorized users in. the users connected to the datafortress. If it nds a discrepancy or error, it noties the Datafortress System A Datafortress is also characterized by its Power and its Administrator (SysAdmin) who will either attempt to Speed. A Datafortress is also rated by a Security Level disconnect the hacker, determine the hacker's location from 1 to 10. This number is added as a skill would to with a Trace application, disable the hacker's software the computer's Power when executing software applica- with an Anti-ICE application, disable the hacker's com- tions. The computer's Security Level is also it's Trace puter with Anti-System software, or physically injure the Value if being used to chain connections. A SysAdmin hacker with Anti-Personnel software. The hacker uses can't do anything to catch a Hacker if he doesn't know Stealth software to fool detection software into either they're there, so the SysAdmin relies heavily on De- authorizing or ignoring the hacker's connection. If dis- tection software to notify them of unauthorized access. covered, the hacker may ght back against the SysAdmin Once detected, the SysAdmin can run Anti- Personnel with Anti-ICE, Anti-System, or Anti-Personnel software software against the intruder, or opt to trace the hacker of their own. and run Anti-System software against the Hacker's com- puter. Should the hacker gain access to the Datafortress' di- rectories, they may view, copy, or alter data. Data The Computers comes in the form of online applications for remote use, inter-oce communication, public display data (text, Computers, whether they are Palmtops, Desktops, Mi- audio-video, or VR), databases, or records. nis, or mainframe supercomputers, exist to execute soft- ware applications. The computer is characterized by its Power and its Speed and its Security Level.

The Hacker The Power is used like the computer's Body and it's Reexes, it determines it's resiliency to attack and its The Hacker's arsenal includes a computer, specialized base chance to perform an action. Power is based on the hacking software, and, foremost, a way to connect to number of Central Processing Units driving a computer. a remote target computer, usually via the Net though One CPU has a Power of 3, each additional CPU adds direct connections, however unwise, can be made. an additional 3. Each CPU costs $10,000. A Computer may have up to 7 CPUs for a Power of 21. Additional A Hacker's access to the Net is very important. To con- CPUs increase processing capacity and provide backups nect to the Net, the Hacker must have an LDL. LDL's in case one CPU should fail due to Anti-System soft- cost 50 euro a month from the Internet Corporation, ware. though they, too, can be hacked. Connections between computers are relatively easy to trace. Each computer A Computer's CPU also determines how much software connection has a corresponding Trace Value from 1 to it can run and data it can store. Software and Data 10. Hackers generally make a chain of several connec- are stored in Memory Units. A Computer can store as tions before they proceed to their target computer. A many MU's as it's CPU x 40. Memory can be improved SysAdmin wishing to trace the ultimate origin of the for $250 per MU. CPUs also determines the starting Hacker must trace every connection to nd the source. level of system Datawall. A Datafortress' base Datawall strength is equal to the number of CPUs driving it.

2/25 Instant Netrunning  Netrunning Softwares Computers with Powers higher than 10 are Articial Cyberdecks vs. Computers Intelligences with complete personalities and full inter- activity. Power can be decreased for a cost reduction In games where cybernetic interfaces are common and of $3000 per level. A Computer may also possess skills older manual interfaces are uncommon, simply apply a  like a character. Memory can be put aside to use as 2 to all actions taken by manual-interface computers. In skills at a rate of 1 MU per Skill Level. In this way, a games where cybernetic interfaces are uncommon, such computer can devote 5 MU to have a Security Skill of 5. as the modern world, apply a +2 to all actions taken by All computer skills use Power as the primary statistic. cybernetic interface computers.

The Speed is used to determine initiative. If using the Successful attacks made against Cyberdecks using Anti- Speed Chart, it can be used to determine the number System software will cause the brain to disconnect and and order of actions in a turn. Speed can be increased become unconscious for 1d6 rounds in lieu of the CPU. for $2000 per bonus up to +5.

The Security Level is the SysAdmin's Security skill, added to its Power when resisting attacks. The Security Level is also used to determine a server's Trace Value The Menu when using it to chain connections in preparation for a run. To simplify using a computer in a game context, a simple set of commands has been devised. These commands are A Computer can respond to hacker's automatically. called The Menu. A Hacker simply chooses his action Once Detection software has identied an unauthorized based on the list available in the Menu. intruder, the Computer can automatically execute Anti- Personnel software against the Hacker, or trace the signal The Menu and run Anti-System software against the Hacker's com- • Log On/O: Legally gain access to an unre- puter. stricted Dataserver through proper authorization techniques (password, LDL authentication, or bio- A Computer can also be dened as a Cyberdeck. Cy- metrics). berdecks or Cybermodems are small devices that are Run Program: Run either a local or remote soft- similar to computers in that they execute programs, but • ware application. are dierent in that they are connected to the user's Read File: View the contents of a datale, be it living brain and use it's neurological wiring to act as • Text, Graphics, Audio/Video, or Virtual Reality. its Central Processing Unit. The Cyberdeck, modern terms, is little more than a hard drive and network con- • Copy File: Copy a le from a remote location to nection. All input and output is processed by the user's a local one. Warning, a record is kept of each copy brain. in a le history. • Edit File: Edit the contents of a datale above. Cyberdecks do not have CPUs, but the user must have a Warning, a record is kept of each modication in Neural Interface and Cybermodem processor installed in a le history, including the modication of the le their brain, the cost of which is $1100 for the hardware history. and $500 for the surgery. Cyberdecks provide 10 MU, • Erase File: Erase a datale above. Warning, a a Speed of 0, and have a Data Wall strength of 2. The record is kept of each erasure in a le history, in- basic parts of a cyberdeck costs $1000 for the external cluding the erasure of the le history. hardware, though this is often marked down to as low • LDL: Establish a connection to a Dataserver. as $500 for a used model. Warning, if disconnecting from datafortress, if the stealth roll was unsuccessful, the SysAdmin can Computer Hardware Price List still do a trace on your LDL.

1 CPU $10,000 (Power 3, 40 MU, Data Wall Strength of 1) 1 Cyberdeck $1000 (Power 0, 10 MU, Data Wall Strength of 2) +1 CPU $10,000 (Power +3 each, +40 MU each, Data Wall Strength of +1 each, maxi- mum 7 CPUs) +1 MU $250 (no maximum) +1 Speed $2,000 (maximum of +5) -1 Power -$3,000 (no maximum, but at more than -2 you may as well buy fewer CPUs)

Instant Netrunning  Netrunning Softwares 3/25 The Software

Software applications are measured by their Strength, which act as a sort of Weapon Accuracy which is added to all tasks performed with that application. Software Strength is rated from 1 to 10.

Software is also measured by how many Memory Units it uses on its host computer. This is cumulative. A com- puter with 30 Memory Units can run one 15MU program and three 5MU programs simultaneously. Switching out a program takes one action.

Software applications can have very specic eects, depending on the application being used. The most common and broadly-dened applications are as follows: Type Eect Strength MU Cost Decryption Defeats Codegates and File Locks. 4 2 400 (Wizard's Book) Intrustion Defeats Datawalls. 4 1 400 (Hammer) Stealth Defeats Detection Software. 3 1 300 (Invisibility) Protection Defeats Anti-Personnel Software. 3 1 150 (Shield) Anti-System Causes system to crash. 3 2 570 (Flatline) Anti-ICE Does 1d6 damage to target software's STR. 2 5 1320 (Killer II) Anti-Personnel Does 1d10 Hits directly to target's body if connected via a 4 4 6750 (Hellbolt) cyber-jack. Firewall Prevents all access to restricted information. POW   (Datawall) +1 +1 +1000 Authentication Allows access to restricted information to authorized users 2 1 2000 (Codegate) +1 +1 +2000 Detection Detects unauthorized users, traces signal, and alerts SysAd- 4 5 720 (Guard Dog) min. Other software found in Cyberpunk 2020 is fully compatible with this system.

4/25 Instant Netrunning  Netrunning Softwares Utilities

Utilities are programs that help the Hacker in between runs. Though most don't provide any practical application during the run, they're nonetheless essential applications for the upkeep and preparation of a hacker's computer.

Type Eect Strength MU Cost Restore Utility Recompiles and restores destroyed programs. 3 1 130 (ReRezz) Recorder Util- Records activities of current Hack for replay later. 8 2 180 ity (Instant Replay) Virus Protec- Detects and destroys Virus programs. 5 1 150 tion Utility (Gatemaster) File Protection Locks datales as a Strength 3 Code Gate. 7 2 170 Utility (Electrolock) Compression Reduces program size by 1/2. Takes 2 turns to unpack. 4 1 140 Utility (Packer) Backup Utility Creates copies of most programs on chip. 4 1 140 (Backup) VR Map Util- Supplies complete system map of VR interface. 6 3 200 ity (Cartographer) Utility Package All of the above in one package. Saves MU and money. 5 10 1000

The Goods CPU's house applications for online use as well. Appli- Once a successful Hacker has bypassed security cations range from simple spreadsheets and word proces- (Datawalls, Codegates, and Detection software), he now sors to VR Simulations and computer-controlled robotic has access to the Datafortress' CPU. The Hacker may systems such as security video surveillance, elevators, now view stored les (text, video, audio, VR) or run building climate-control, assembly robots, etc. online software applications. Be warned, individual les may have further security measures attached to them. Note on making copies: In the Cyberpunk future, For example, a le marked Black Ops: Top Secret all les have a le-history, recording all modications might have another Detection application attached to it to the le. Though modications can be made to the which the Hacker must bypass. Or it may be le-locked. le-history, the File-history now has a record of the Tampering with any ICE applications automatically re- modication. This feature is used to determine the pro- quires the Hacker bypass a File Protection Utility and priety of data. For instance, a hacker nds a le in the any Detection Software. Arasaka database called Black Ops: Top Secret. The File History for that le will indicate how many times Common datales found on corporate datafortresses in- it's been viewed, by what User, and when. Our Hacker clude: decides to make a copy. The original now records that a copy was made at this date by this user. The new Copy 1. Inter-Oce Memos (E-Mail) records that it was copied from an original on this date 2. Promotional Material(such as VR advertising sims by this user. Every time the hacker views the material, and Web Pages) the record shows that the le was viewed on this date by 3. Business Records (including databases) this user. If the hacker wishes to sell this information, a 4. Financial Transactions prospective buyer can view the le-history and see how 5. Grey Ops many times the le has been seen, modied, and copied 6. Black Ops and by whom. Diluted data will lower the le's value.

Instant Netrunning  Netrunning Softwares 5/25 Virgin data will raise it's value. The enterprising Hacker Sample Computers can easily change the File-History, but a record is made that the lehistory has been changed, thus lowering the 1. Minor business or personal system (grey info) value even more. The Hacker can then try to delete the Statistics: POW 1 (1 CPU, -2 POW) , MU 40, record of the change, but the deletion of the change is Speed 0, $4000 recorded in the le-history. It never ends. The safest Example: DataTerms, Minor Personal Informa- bet is to just own one copy and not view it. tion, Palmtops, Portable Computers. 2. Major business (grey info) or personal system Standard Hacker Software (black info) Statistics: POW 3 (1 CPU), MU 40, Speed 3, Decryption (Strength 4, MU 2, $400) $16,000 Intrusion (Strength 4, MU 1, $400) Example: Business Accounts, Secret Personal In- Stealth (Strength 3, MU 1, $300) formation Protection (Strength 3, MU 1, $150) 3. Major business (black info) or Megacorp sys- Anti-ICE (Strength 2, MU 5, $1320) tem (grey info) Total (MU 10, $2570) Statistics: POW 6 (2 CPU), MU 80, Speed 6, $32,000 Example: Alternative Accounts, Customer Sales Standard Datafortress Software Information 4. Government (grey info), Megacorp (black info) 1. Mundane Systems or Criminal system (grey info) Detection (Strength 4, MU 5, $720) Statistics: POW 9 (3 CPU), MU 120, Speed 9, Total (MU5, $720) $48,000 2. Grey Systems Example: Police Files, Sabotage Information, Detection (Strength 4, MU 5, $720) Holdings Information Anti-System (Strength 3, MU 2, $570) Grey Sys- 5. Government (black info), Orbital (grey info), or tems Only Criminal system (black info) Total (MU 7, $1290) Statistics: POW 10 (4 CPU, -2 POW), MU 160, 3. Black Systems Speed 10, $54,000 Detection (Strength 4, MU 5, $720) Example: Black Op Files, Internet Account Hold- Anti-System (Strength 3, MU 2, $570) Grey Sys- ers, Face Bank Accounts tems Only 6. Orbital system (black info) Anti-Personnel (Strength 4, MU 4, $6750) Black Statistics: POW 12 (4 CPU), MU 160, Speed 12, Systems Only $64,000 Total (MU 11, $8040) Example: Agora Mecca, Cyber Circle Lunar, Ishima Orbital Databases, Articial Intelligences.

Steps in Cracking a Datafortress:

1. Library Research (Intelligence + Library Research + 3d6 vs. Diculty Number) to determine little facts about the corporation. The margin of success is granted as a bonus to the Decryption roll in step 2. Bonus: The Hacker loads up a good selection of software. Necessary applications include one Decryption, one Intrusion, one Stealth, one Anti-ICE, and one Protection. 2. LDL (Roll over LDL Security Level on 1d10 ). The Hacker has connected to a remote server and may use it to connect (LDL) to another remote server, making a chain of connections to their target. SysAdmins must trace each connection to determine the Hacker's LDL. Once a chain of connections has been established, the Hacker may use the same chain indenitely unless access is revoked by the remote server's Net Access Provider. If unsuccessful, the remote server has refused to connect the Hacker. The Hacker must then make a nal connection to the target server. 3. Decryption vs. Codegate (Intelligence + Hacking + Decryption Program Str + 3d6 vs. Power + Security + Codegate Str + 3d6 ). If successful, the Hacker has fooled the Code Gate into allowing unauthorized access to the server. The Hacker is still susceptible to Detection software, proceed to step 4.

6/25 Instant Netrunning  Netrunning Softwares If unsuccessful, the Hacker still has no access to the server. Repeated failed attempts(3d6) will cause any Detection Software to alert the SysAdmin to the attempt who may use Detection software to initiate a trace to locate and/or monitor the possible Hacker. Continue to Step 4. 4. Intrusion vs. Datawall (Intelligence + Hacking + Intrusion Program Str + 3d6 vs. Power + Security + Datawall Str + 3d6 ). If successful, the Datawall has been circumvented and the hacker now has access to the server. The Hacker is still susceptible to Detection software, however. Proceed to step 5. If unsuccessful The Hacker still has no access to the server but may have been noticed. If unnoticed, try again. If noticed, either a SysAdmin or an Anti-Personnel Program has been notied of the Hacker's presence and will attempt to apprehend or discourage him, proceed to Combat! 5. Stealth vs. Detection (Power + Security + Detection Str + 3d6 vs. Intelligence + Hacking + Stealth Str + 3d6 ). If successful, the Detection Software has detected no unauthorized activity but may attempt to re-validate the user after an interval of time (3d6 rounds), proceed to step 6. If unsuccessful, the Detection Program has detected unauthorized activity and may notied either a SysAdmin or an Anti-Personnel Program to apprehend or discourage the Hacker, proceed to Combat! 6. You now have access to the CPU. The computer thinks you are logged on as an ocial authorized user. You may access datales and software applications available on that server. Some datales and applications may contain further security measures. If so, repeat step 3. 7. Cover your tracks. Failing to log o or being cut from the line means that the SysAdmin can still trace your location. Be sure to always log o properly. View the contents of any le you download, but be wary of the lehistory: don't dilute your data!

Combat!

1. Initiative. Human Intelligence + Computer's Speed + 3d6 versus Computer's Power + Speed + 3d6 2. Loser declares rst, Winner acts rst. Therefore, if the loser is launching an Anti-Personnel Program towards the intruder, the winner may either activate a suitable defense or take a chance and attack the loser rst. 3. Combat Options: a Intruder attacks ICE. (Intelligence + Hacking + Anti-ICE Program Str + 3d6 vs. Computer's Power + Security + Program Str + 3d6 ). If successful, the target software application has crashed and erased from the server. If unsuccessful, the attack has failed to crash the application. Detection Software automatically traces the Hacker's connection and alerts the SysAdmin to the attempt who may attempt to discourage the Hacker. b Intruder attacks SysAdmin or SysAdmin attacks Intruder. (Intelligence + Hacking/Security + Anti-Personnel Program Str + 3d6 vs. Protection Program Str + Intelligence + Hacking/Security + 3d6 ) If successful, the Anti-Personnel program has done damage directly to the user's brain (STR  Protection STR in Hits), only if connected via a cyber-modem. On older non-cyber connections, treat attack as an Anti-System attack. If unsuccessful, the attack has failed to do any damage. c Defending CPU attacks Intruder (Computer's Power + Security + Anti-Personnel Program Str + 3d6 vs. Intelligence + Hacking + Protection Program Str + 3d6 ) If successful, the Anti-Personnel program has done damage directly to the user's brain (STR  Protection STR in Hits), only if connected via a cyber-modem. On older non-cyber connections, treat attack as an Anti-System attack. If unsuccessful, the attack has failed to do any damage. d Intruder attacks System. (Intelligence + Hacking + Program Str + 3d6 vs. Computer's Power + Security + DataWall Str + 3d6 ) If successful, the Anti-system software has caused a CPU to crash, ceasing all activity until the CPU can be re-initialized using a Restore Utility. The Intruder is imme- diately disconnected, but not logged o. Once the CPU is re-initialized, the SysAdmin may attempt the trace the connection. If the target is using more than 1 CPU, all CPUs must be neutralized for the target to crash.

Instant Netrunning  Netrunning Softwares 7/25 If unsuccessful, the attack against the CPU failed. Detection Software automatically alerts the SysAd- min to the attempt who may initiate a trace to locate and/or monitor the possible Hacker. e Detection Software Traces Intruder (Power + Security + Program Str + 3d6 vs. Intelligence + Hacking + Trace Value + 3d6 ) If successful, the Detection Software has located the origin of the Hacker's connection and informed the SysAdmin. A Detection Program must trace each connection in the event of chained connections (see above) to determine the origin. Once determined, the SysAdmin may notify the Hacker's Net Access Provider in an attempt to have their access revoked. In addition, any further attempts to connect from any server on a traced chain will automatically alert the SysAdmin's Detection Software of the unauthorized access. If a connection was severed without spending an action Logging O, the SysAdmin can still perform a Trace on that severed connection. If unsuccessful, the trace has failed. The Detection Program may attempt to trace a connection each round. 4. Damage. Damage is allocated to aected systems or programs (or Hits in the case of Black ICE).

Glossary how the Datafortress is set up. Euro: The Cyberpunk 2020 unit of currency. For Anti-ICE Software: software meant to crash and modern settings, simply replace with dollars. delete other software applications. Grey Info/System: Secret information. Infor- Anti-Personnel Software: software meant to do mation no one is willing to kill to keep secret. A damage to the actual Netuser. Only works in mileu Datafortress with non-lethal countermeasures such as that use Cybernetic interfaces. Anti-System software. Anti-System Software: software meant to crash or Hacker: A generic term for anyone attempting to immobilize another computer's CPU. gain unauthorized access to restricted information of Articial Intelligence: an advanced computer ca- applications. pable of full interaction and decision-making. Hacking: Skill used by Hackers. In game terms, Black Info/System: Top Secret information. Infor- Hacking and Security are the same skill used for dier- mation that someone is willing to kill to keep secret. ent purposes. A Datafortress with deadly countermeasures such as ICE: Intrusion Countermeasure Electronics, encom- Anti-Personnel software. passing any software applications designed to prevent Codegate: a Cyberpunk 2020 term for an au- unauthorized access to a Datafortress. thentication mechanism or Firewall. Codegates could Icon: A visual representation. In Cyberpunk 2020, check namepassword combinations, computer location refers to a 3D representation of a computer object. (LDL), ngerprints, retinas, voice-prints, DNA, etc. A le might be represented by an icon that, once CPU: Central Processing Unit, the brain of a com- clicked/grabbed/pushed/opened, will display the con- puter. Many computers have multiple redundant CPUs tents of that le. Often, events are represented by an that increase processing power. Also, if one fails, the icon. For instance, a SysAdmin might represent his computer can keep operating at a reduced level. presence on the server with an icon of a knight in ar- Cyberdeck: or Cybermodem, a computer device that mor. If the Hacker sees a knight in armor, then he uses the operator's living brain as a CPU. knows the SysAdmin is logged onto the server. Datale: any le that contains information. Datales Internet Corporation: A Cyberpunk 2020 creation can be text, graphics, video, audio, or full sensory VR meant to be a conglomerate of Net Access Providers. simulations. In the modern world, these would be comprised of sev- eral companies such as MCI, ATT, UUNet, etc. Intru- Datafortress: A Dataserver that restricts informa- sion Software: Software meant to temporarily disable tion to authorized users. Datawalls, allowing access to the server. The disad- Dataserver: A futuristic term for a server, a com- vantage is that their use may alert Detection Software puter which provides data upon request. applications. Datawall: A Cyberpunk 2020 term for a Firewall, LDL: A Cyberpunk 2020 equivalent of the modern a Datawall without a Codegate simply doesn't provide IP address. In Cyberpunk 2020, the LDL also serves access to it's protected information and must be de- as an allpurpose phone number, e-mail address, and feated with Intrustion Software. voice-mail box. Decryption Software: Software designed to bypass Memory Unit: A Cyberpunk 2020 equivalent to Codegates by fooling it into providing access. Megabytes. It has no real-world conversion and was Detection Software: Software that periodically re- used in lieu of actual future memory sizes which can checks users on a server to authenticate access. If unau- become dated quickly. thorized access is discovered, the Detection Software noties the SysAdmin or automatically deploys Anti- Personnel or Anti-System applications depending on

8/25 Instant Netrunning  Netrunning Softwares Mundane Info/System: Condential information, In Cyberpunk 2020, VR Sims can be interactive games, but hardly a secret. Information that is restricted but advertisements, network conference areas, or fantasy isn't guarded by countermeasures. Datafortresses that playgrounds. Any situation that requires being some- employ Detection Software only. place you can't actually physically be can be solved The Net: The Cyberpunk 2020 equivalent of the In- with a VR Sim. ternet. The Cyberpunk 2020 Net is represented by a 3D fullsensory Virtual Reality: Other names for the Net include the Face, the Cybernet, the Interface, the Web, etc. References Net Access Provider: A company that rents tem- porary LDL's to Netusers. The Internet Corporation is For more information on other Hacking and Netrunning sys- a large Net Access Provider. NAP's generally cooper- tems, see: ate with SysAdmins in discouraging Hacker activity. If Cyberpunk 2020 by , R.Talsorian an NAP is notied that one of their Netusers is possibly Games. a Hacker, they will discontinue that Netuser's service. Bubblegum Crisis RPG The futuristic equivalent of modern day Internet Ser- by Benjamin Wright, R.Talsorian Games. vice Providers. NETRUNNING RULES by [email protected]. Netuser: Anyone using the Net legally. The equiva- Skyre Master Force by Gary Townsend, HERO lent of the modern Net surfer. Games. Power: A Fuzion game mechanic meant to be a rel- How Hackers Break In... and How They Are ative measure of a computer's ability. Caught by Carolyn P. Meinel, Scientic American, Oc- Security Level: A Fuzion game mechanic meant to tober 1998. represent the skill used by either a SysAdmin or Com- puter CPU to deter or capture Hackers. In game terms, Security and Hacking are the same skill used for dier- ent purposes. Server: A computer connected to the Net. The server acts as a middle-man between the person requesting Cyberpunk:2020 and Fuzion are a Registered Trademarks of R.Talsorian information and the memory storing the information. Corporation. Original Cyberpunk:2020 material Copyright 1994, 1995 Your computer sends a request to the server, the server by R.Talsorian Corporation. All Rights Reserved. Used without per- nds it, the server sends the information to your com- mission. Any use of R.Talsorian Corporation's copyrighted material or puter. trademarks in this archive should not be viewed as a challenge to those Speed: A Fuzion game mechanic meant to be a rela- copyrights or trademarks. tive measure of a computer's speed. Stealth Software: Software that attempts to fool Detection Software into authenticating or ignoring an unauthorized Hacker. Strength: A Fuzion game mechanic meant to be a relative measure of a program application's ability. SysAdmin: System Administrator. The person in charge of maintaining a Datafortress' security. System: A collection of computer components that work together. A group of computers attached to a single network would be a system. The Net as a whole might be considered a very large system. Trace Value: The relative diculty in tracing a connection's origin. Virtual Reality Interface: Much like a modern Graphic User Interface (GUI), the VR Interface dis- plays the computer's Desktop as a 3D interactive uni- verse around the user. In Cyberpunk 2020, the Net can be accessed in such an interface, displaying Net LDL's as Icons around the user. The user moves freely about in this space, choosing the icon they wish by coming into contact with it with their hands. Their bodies are displayed to them as whatever the user wishes and pro- grams much like a modern cursor, their hands acting as a mouse in space. VR Construct: A 3D Icon in a VR Interface. A VR construct can be anything, limited only by the imag- ine of the creator. It's size is determined by how much memory it requires. VR Sim: A VR Simulation. A tiny virtual universe.

Instant Netrunning  Netrunning Softwares 9/25 10/25 Netrunning Softwares

Type / Name Str MU Cost(eb)Function From Icon Intrusion Dwarf 3 3 230 Stronger version of Worm BB Small, quiet digging machine. Grubb 1 3 210 Weaker version of Worm BB Swarm of puke-green grubs that eat their way through the Wall. Hammer 4 1 400 2D6 to Data Wall STR, alerts programs within 10 spaces CP20 Glowing red hammer. Jackhammer 2 2 360 1D6 to Data Wall STR CP20 Glowing red jackhammer, which res a stream of white hot energy bolts at the Data Wall. Jap Water Tor- 3 4 260 Min of 2 turns, each additional turn adds +1 STR (max 7) BB Tiny, random drops of glowing "water" strike ture the Wall, causing ripples. Pile Driver 8 4 800 4D6 to Data Wall STR, alerts progs in 30 spaces, & Netwatch Chr3 Steam-powered pile driver on the verge of ntn ernigNtunn Softwares Netrunning  Netrunning Instant blowing up. Portal 2 6 750 Opens door in Data Wall, takes 3 turns, no alert NET Metallic door that slowly meshes with the Data Wall then swings open for the Netrun- ner. Ramming Piston 10 3 900 5D6 to Data Wall STR, "audible" to anything within 50 BB Huge nuclear powered battering ram, as spaces drawn by Jack Kirby. Sledgehammer 6 2 600 3D6 to Data Wall STR, alerts programs within 15 spaces Chr3 Glowing white Sledgehammer. Termite 1 2 160 1D6 to Data Wall STR Chr1 Brown, st-sized, fractal insect with bright blue eyes. Emits low-pitched bleeps as it bur- rows into Wall. Worm 2 5 660 Opens Data Wall in 2 turns, no alert CP20 Gold-metal, robotic worm, with green neon eyes. Decryption Codecracker 3 2 380 Opens Code Gates CP20 Thin beam of white light, which shoots from the Netrunner's hands and spreads through the Code Gate. Cyfermaster 6 3 700 Stronger version of Ra es BB Fractal image of a man oating in lotus posi- tion. Dupre 1-8 4 900 Opens Code Gates & File Locks Chr3 Elegant middle-aged Victorian. He speaks to the locked Gate, and takes notes as he does so. Ra es 5 3 560 Opens Code Gates & File Locks CP20 Dapper young man wearing evening clothes of the 1990's. He speaks to the door then vanishes...... Type / Name Str MU Cost(eb)Function From Icon Tinweasel 3 4 300 Sneaky decryptor BB Shifty-eyed character with an insincere smile. Wizard's Book 4/6 2 400 Opens Code Gates & File Locks CP20 Stream of blazing white symbols, owing at incredible speed from the Netrunner's open hand. Detection/Alarm Bloodhound 3 5 700 Detects entry, traces, alerts master CP20 Large, gun-metal grey hound. It has glowing blue eyes and wears a thick circlet of blue neon. Bulldog 6 6 660 Detects entry, alerts master, disconnects intruder Chr1 Short, burly humanoid in metal armour. A glowing visor is situated above snarling, ca- nine jaws. ntn ernigNtunn otae 11/25 Softwares Netrunning  Netrunning Instant Canis Ma- 4 5 610 Detect entry, alerts owner BB Large steel statue of a dog/a computerised jor/Minor chihuahua. Cry Baby 4 4 430 "Tags", adds 4 to traces when copied Chr3 None until activated, then it appears as a baby, hanging around the Netrunner's neck, screaming. Clairvoyance 4 4 720 SeeYa 3.0, detects and IDs Icons (+invisibles) within 2 sub- Chr3 The eyes of the Netrunner's icon glow ery grids blue, or a pair of glowing eyes appear if the icon has none. Data Raven 5 6 1000 Detects entry, traces, alerts master whenever target appears BB Metal-plated black bird. Fang 4 6 1300 Detects entry, traces, disconnects target until destroyed BB Glowing green pit bull. Fang 2.0 5 6 1600 Detects entry, traces, disconnects target until destroyed BB Robotic pit bull with a red head. Fetch 4.01.1 3 5 700 Detects entry, traces, alerts master BB Chrome greyhound with glowing blue collar. Guard-Dog 4 5 720 Invisible; detects entry, alerts master Chr1 Detected it appears as a standard Blood- hound, other wise it is a slight icker at the periphery of vision. Hidden Virtue 3 1 280 Detects "real" things in VR CP20 Glowing green ring which the Netrunner looks through. Hunter 5 5 900 Detects entry, traces, alerts master BB Hound head lunging down the target's line. Looking Glass 1-6 3 250+20/strDetects disguised Icons Chr3 Series of mirrors appears in front of the Netrunner, passing over and through the tar- get icon. Mouse 5 5 350 Creeps into forts and makes a record of what's inside BB Small, innocuous mouse. Netspace Inverter 3/5 4 540 Travels through a fort at 2 subgrids/turn IDing programs BB Flying eyeball; turns invisible when activated. and les Pit Bull 2 6 780 Detects entry, traces, disconnects target until destroyed CP20 Short, heavily built, steel dog. It has glowing red eyes and wears a circlet of red neon...... 12/25 ...... Type / Name Str MU Cost(eb)Function From Icon Rex 3 6 1000 Detects entry, traces, disconnects target until destroyed BB Rather nasty, metal plated dog with really big teeth. See Ya 3 1 280 Detects Invisible Icons CP20 Shimmering silver screen. Shadow 4 3 540 Degrades evasion programs Chr3 Netrunner's icon gains a long, humanoid shadow. Smarteye 3 4 620 Detects progs within 10 spaces, IDs attack progs Chr1 Spinning crystal ball; the ball stops and the appropriate icon appears within. Speedtrap 4 4 600 Detects attack programs within 10 spaces CP20 Flat, glowing plate of glass, in which images appear. Watchdog 4 5 610 Detects entry, alerts owner CP20 Large, black, metal dog. It has glowing red eyes and a spiked metal collar. Anti-System

ntn ernigNtunn Softwares Netrunning  Netrunning Instant Asp 4 2 800 Kills cyberdeck interface BB Glowing golden snake. Cascade 7 4 900 Erases 2D6 MU of random memory Chr3 Shower of random neon-coloured pods & cap- sules sprays the target's icon and are ab- sorbed on contact. Cascade II 3 2 800 20% chance that program changes. Decks chose new BB Floating ball of energy. prog/turn Clown 3 5 1130 Disrupts data transmission, progs are -1 STR, 'runners -1 BB Annoying, loud, obnoxious, white-faced cir- Initiative cus clown, complete with slapstick, seltzer bottle, pies, etc. DecKRASH 4 2 600 Crashes 'deck for 1D6 turns CP20 Cartoon stick of dynamite with fuse. Feedback 4 3 960 Kills deck's interface and "jams" 'runner plugs I.3 Beam of orange neon which shoots from the Netrunner's ngertips. Flatline 3 2 570 Kills cyberdeck interface CP20 Beam of yellow neon which shoots from the Netrunner's ngertips. Fragmentation 4 3 1000 Kills system RAM BB Huge white electrical arc that strikes the tar- Storm get and follows his line back to his deck. Grid Wave 7 8 20K Distorts I-G algorithms Chr4 Black sphere with twisting light waves sur- rounding it. HellBurner 6 5 1000 Destroys target CPU Chr3 Giant, disembodied st which burns with blue, fractal re, grabs onto target, engulng it in blue ames. Krash 3 2 570 Crashes closest CPU for 1D6+1 turns CP20 Large, cartoon anarchist bomb, with a siz- zling fuse. Murphy 3 2 600 Causes system to randomly activate programs CP20 You never know...... Type / Name Str MU Cost(eb)Function From Icon Pi in the Face 5 4 800 Makes CPU calculate Pi Chr3 Large cartoon pie, for throwing. Poison Flatline 2 2 540 Kills system RAM CP20 Beam of green neon which launches from the Netrunner's ngertips. Poltergeist 5 3 660 Randomly erases one le each turn BB Random ashes of energy from everywhere, wiping data and les. Pox 4 2 800 Causes a glitch in ambush ICE, 30% chance of derezzing BB Floating ball of energy that explodes into a wash of sickly coloured globules. Scatter Shot 4 3 660 Kills system RAM BB Shotgun shooting fractal shot. Swarm 1 7 3000 Causes target system to replicate Swarm programs Chr4 Cartoon-y bee that ies towards a CPU, stinging it. Typhoid Mary 6 8 2400 Inltrates 'runner and deletes les Chr3 Female Killer robot. ntn ernigNtunn otae 13/25 Softwares Netrunning  Netrunning Instant Weed 2 3 630 -1 target speed per successful attack Chr4 Tangled weeds growing on the icon of the sys- tem's CPU(s). Vacuum 5 3 1200 Attacks location algorithms, forces 'runner to where he en- BB Series of hexagonal frames that suck the 'run- tered fort ner's Icon out of the data fort. Virizz 4 2 600 Ties up 1 system action until turned o or destroyed CP20 Glittering DNA shape made of lights and neon. Viral 15 4 2 590 Randomly erases one le each turn CP20 Swirling metallic blue fog with a white neon DNA helix embedded in the centre. Evasion/Stealth Black Mask 1-5 3-4 200/STR Makes your Icon look like something/one else NET Anything programmed into it. Cloak 5 2 2000 Powerful variant of Invisibility BB Makes the user's Icon invisible. Domino 5 3 1500 Makes your Icon look like one common to the locale BB Depends on the data fort. George 4 1 300 Adds 4 to Trace Diculty Chr3 Cartoon signpost with signs pointing in all directions. Invisibility 3 1 300 Makes cybersignal invisible CP20 Flickering, iridescent sheet, which drapes over the Netrunner. Open-Ended 4 5 330 Adds another LDL to make traces harder when activated BB Blue sphere surrounded by two stylized light- Mileage ning bolts. Rabbit 5/1 2 360 Draws o "Dog" programs, +2 Initiative when released BB Fractal rabbit going like the blazes. Also Bugs Bunny variants around. Replicator 3/4 2 180 Confuses attacking ICE with millions of false signals CP20 Chrome sphere creating millions of holo- graphic images of the Netrunner. Signpost 4 1 300 Adds 4 to Trace Diculty BB Signpost with signs pointing in all directions. Silhouette 6 4 600 'Runner looks like he's jacked out and is invisible for 5 turns I.3 Looks as it the Netrunner has jacked out. Spore 7 7 2320 AI suicide-replication, sends multiple copies into Net to re- NET Each spore looks like a small mote of light. produce ...... 14/25 ...... Type / Name Str MU Cost(eb)Function From Icon Stealth 4 3 480 Mutes cybersignal, making detection harder CP20 Sheet of black energy draped over the Netrun- ner's Icon. Superballs 3 4 500 Distracts targets, causing -3 Initiative Chr4 Thousands of primary-coloured rubber balls bouncing around target's square, as if in a glass cube. Vewy Vewy Quiet 4 2 400 Concentrates on avoiding detection BB The 'runner makes no sound and turns translucent. Protection Armor 4 2 170 Reduces attacks from Stun, Hellbolt, Zombie, etc by 3 points CP20 Glowing golden armor in a high tech design. DeckShield One 6 2 320 Adds +3 to deck's Data Walls Chr4 Deck's data fort/position in netspace is sheathed in fractal armor-plating. Flak 4/2 2 180 Creates static Wall to blind attackers; STR 2 vs Dog pro- CP20 Cloud of blinding, glowing, multicoloured

ntn ernigNtunn Softwares Netrunning  Netrunning Instant grams lights, swirling in all directions. Force Shield 4 2 160 Stops attacks against 'runner CP20 Flickering silver energy barrier. Joan of Arc 3 2 190 Remains "active" and takes damage meant for current pro- BB Woman's face that grimaces in pain. gram OutJack 2 4 150 Jacks 'runner out of Net if he's taken Critical damage Chr3 None. Reector 5 2 160 Reects Stun, Hellbolt, Knockout attacks CP20 Flare of blue green light, coalescing into a mirrored bowl. Shield 3 1 150 Stops attacks to 'runner CP20 Shifting circular energy eld appearing in front of the Netrunner. Anti-Program Aardvark 4 3 1000 Detects and destroys Worms CP20 Matrix of thin yellow neon lines, which close around the Worm, then dematerialise with it trapped. Banpei 1 5 1280 1D6 to program STR BB Robotic samurai. Black Dahlia 7 7 2000 Interactive, super-realistic Killer. 2D6 damage BB Incredibly seductive woman in a black evening dress. Bunnies 4 3 440 Overloads Vampyres Chr1 Rapidly-multiplying bunch of burnished gun- metal coloured bubbles, with classic "rabbit ears" antennae. Chameleon 4 6 1650 Killer IV with active Disguise NET Killer with a polished mirror face that reects the Icon of the program it is attacking. Codeslinger 4 3 2500 Killer written to t less MU. 1D6 damage BB Cowboy with six-shooter codeguns. D'Arc Knight 3 5 1360 1D6 to program STR BB Svelte knight in armor...... Type / Name Str MU Cost(eb)Function From Icon Data Naga 6 5 1480 1D6 to program STR BB Exotic woman with a serpentine lower torso and six arms. Dogcatcher 10 7 1176 Chases and destroys tracing "Dogs" Chr3 Basic male or female humanoid shape carry- ing a net on a pole. Dragon 4 3 960 Attacks and derezzes Demons CP20 Great golden dragon robot, wreathed in elec- trical discharges. Laser beams shoot from it's eyes. Dropp 4 4 800 1D6 damage, and jacks the 'runner out of the system BB A ripple across the immediate area like a drop in a pond. Eradicator 8/5 7 1600 Acts as Killer V, destroys AI Spores NET Glowing amoeba with huge jaws. Exorcist 4 3 600 Removes eects of Possession Chr3 Fractal priest in full regalia, carrying a large ntn ernigNtunn otae 15/25 Softwares Netrunning  Netrunning Instant religious symbol. Hydra 3 3 920 Attacks and derezzes Demons CP20 Glittering blue fog that encircles its target and dematerializes it. Ice Pick Willie 2 5 1320 1D6 to program STR BB Classic '30s gangster hitman. Killer II 2 5 1320 1D6 to any program STR CP20 Large manlike robot, dressed as a metallic samurai. His eyes glow red and he carries a glowing Katana. Killer IV 4 5 1400 1D6 to any program STR CP20 Large manlike robot, dressed as a metallic samurai. His eyes glow red and he carries a glowing Katana. Killer VI 6 5 1480 1D6 to any program STR CP20 Large manlike robot, dressed as a metallic samurai. His eyes glow red and he carries a glowing Katana. Loony Goon 1 4 900 1D6 damage. Strength 0 to defend against other Killers BB Cartoon character of the 'runner's choice. Manticore 2 3 880 Attacks and derezzes Demons CP20 Huge, lionlike shape, drawn in red neon schematic lines. A large scorpion tail arcs over one shoulder. Mirror 5 4 1200 Rebounds Hellbolts Chr4 Large, square mirror oating in front of the 'runner. The bolt goes in then comes out again. Ninja 5 5 1520 Invisible Killer Chr4 When seen it appears as a ninja carrying a glowing sword. Orion 7 7 6240 Tracks Spores, 'runners, & programs. Destroys Spores I1.3 Powerful man or woman with bow and ying platform or an angel with wings and divine radiance...... 16/25 ...... Type / Name Str MU Cost(eb)Function From Icon Possessor 4 3 1000 "Possesses" programs Chr3 Hooded robe, with nothing inside. Robe will cover another Icon, which can be seen in the hood. Raptor 2-6 3 1900 Killer that strikes at range, 1D6 damage. +80eb/level over BB Realistic falcon which swoops down upon it's 2 prey. Raven 5 4 1000 "Blinds" any programs Chr3 Raven that attempts to peck out the eyes of the target. Sentinels Prime 5 5 1440 1D6 to program STR BB Golden humanoid with a big gun. Shaka 4 5 1400 1D6 to program STR BB Zulu warrior with spear and shield. Snowball 2+ 5 3000 1D6 damage, +2 STR for each program it destroys while BB Snowball that grows in size for each program active it destroys. Start-Up Immola- 4 5 1280 Destroys target if used in the round when program was BB Bolt of ame that shoots from the 'runner's

ntn ernigNtunn Softwares Netrunning  Netrunning Instant tor rezzed up mouth and burns the target program to ash. Triggerman 4 5 1480 1D6 to program STR BB Film noire-style detective. Wildcard 1 3 1400 1D6 to program STR BB Representation of the old Capone ganger "Wild Card". Wolf 4 6 1500 Killer disguised as Watchdog Chr1 Identical to the Watchdog icon, except that it will ash entirely red as it attacks. Anti-Personnel Ball and Chain 3 3 5000 Slows 'runners movement to 1 square for 1D6+3 turns Chr3 Classic prisoner's ball and chain clamped to some part of the target icon. Bolter Cluster 4 4 8000 Powerful Hellbolt that does 4D6 damage BB Wicked looking turret springs forth to blast the target. Brainwipe 3 4 6500 Reduces INT by 1D6/turn, killing 'runner CP20 Acid-green electrical arc, which leaps from the oor and engulfs and kills the 'runner. Cerebus 6 8 9500 Pit Bull that shoots Hellbolts NET Dark, metallic dog with 2 heads. One res Hellbolts from its eyes, the other howls as it pursues target. Cinderella 6 4 9000 High-powered Firestarter BB Lovely woman with green glowing eyes, in 18th century ball gown, Anything she touches ignites. Code Corpse 5 4 7500 Reduces INT by 1D6/turn, making 'runner mindless BB Skeleton in a cloak with a scythe attacks the target. Cortical Scrub 3 4 6500 Reduces INT by 1D6/turn, killing 'runner BB Green globe that send out electrical arcs. Data Darts 3 4 5500 Hellbolt variant that does 3D6 damage BB Swarm of red globes that strike at the target. Fatal Attractor 7 7 10750 Attractively disguised Hellhound Chr1 Attractive young woman in a skintight body- suit. DIFF Sys Know to recognise her...... Type / Name Str MU Cost(eb)Function From Icon Firestarter 4 4 6250 Power surge electrocutes 'runner CP20 Blazing pillar of re, which speaks the Netrunner's name in a hissing, booming voice, then leaps at him. Glue 5 4 6500 Locks 'runner in place for 1D10 turns CP20 Shifting pattern of red shapes ickering across the oor to entangle the Netrunner. Hellbolt 4 4 6250 1D10 physical damage to 'runner CP20 Bolt of crimson re launched from the Netrunner's raised hand. Hellhound 6 6 10,000 Tracks target, waits, causes heart attack CP20 Huge, black, metal wolf. It's eyes glow white, and re ripples over its body. Repeats the 'runner's name. Homewrecker 5 4 8000 High-powered Firestarter BB Fiery electrical arc that shoots at the target's ntn ernigNtunn otae 17/25 Softwares Netrunning  Netrunning Instant eyes. Jack Attack 3 3 6000 'Runner can't log o for 1D6 turns CP20 Pair of glowing schematic handcus encir- cling the Netrunner's wrists. King Trail 3 2 3500 Leaves glowing trail behind 'runner for 3D6 turns NET Glowing yellow banana slug. Knockout 4 3 6250 Causes coma for 1D6 hours CP20 Yellow neon schematic boxer appears and strikes out at the Netrunner's Icon. Liche 4 4 7250 Erases 'runners memory and over-writes personality CP20 Metallic skeleton dressed in black robes. Grabs the 'runner in its grasp and drags him under the oor. Masti 5 6 12000 Tracks & tags target, does 1D6 damage and reduces INT BB Glowing blue masti with a huge spiked col- 1D6 lar. Neural Blade 3 4 6750 1D6 physical damage to target BB Glowing, rune-etched broadsword. Pepe Le Pue 6 5 7750 Reduces 'runners INT and REF for 1D6+1 turns NET Cartoon skunk the wraps around the Netrun- ner's Icon. Psychodrome 4(5) 11 14000 Unconscious for 1D6 hours, scares victim Chr1 Disguised as system. 'Runner is placed in vir- tual room of faceted, mirrored walls display- ing torture. Red-Out 5 4 6750 Paralyses 'runner for 1D6 turns Chr4 Shifting contextural haze of red pixels that descend on the Netrunner; changing the colour of his Icon. Shock.r 4 5 6300 Freezes 'runner for 1D6 turns BB Golden bolt from the Netrunner's palm. Sleeper 6 4 7250 Non-lethal Brainwipe, makes target do a task (di 20-30 to I.3 Electrical arc, which leaps from the oor and resist) engulfs the 'runner. Spazz 4 3 6250 Halves 'runners REF for 1D6 turns CP20 Nimbus of electrical energy surrounding the target...... 18/25 ...... Type / Name Str MU Cost(eb)Function From Icon Stationery 4 6 10000 Prevents 'runner from moving for 5 turns Chr3 Pieces of paper, with 'You're Nicked!' on them, appears in a sort of snowstorm over the Netrunner. Stun 3 3 6000 Freezes 'runner for 1D6 turns CP20 Bolt of blue ame streaking from the Netrun- ner's open palm. Sword 3 4 6750 1D6 physical damage to target CP20 Glowing energy katana. The Audio Virus 5 5 8000 Reduces INT and REF until 'runner destroys program Chr4 Photo-realistic stereo system, which will tremble and vibrate from the noise it makes. Threat 5 6 7000 Makes 'runner so nervous he jacks out Chr3 Any minor oensive or defensive program. Set at time of purchase. TKO 2.0 4 3 6250 Causes coma for 1D6 hours BB Chrome boxer who smacks the target with a nasty left hook.

ntn ernigNtunn Softwares Netrunning  Netrunning Instant Werewolf 6 6 13,000 Invisible Hellhound NET None normally, but a stylish wolf in a suit when rezzed. Zombie 5 4 7500 Reduces INT 1D6/turn, making 'runner mindless CP20 Shrouded, skeletal form, enveloped in stink- ing grey mist. It lunges out and rips the Netrunner's head o. Multi-Purpose A Picture's Worth 2 6 1200 Hides data within VRs Chr4 Slot machine. Data ows in though coin slot, machine spins a jackpot, scrambled data pours into MU. Al Boon 1D6 7 3600 Goes through Gates, does 1D6 damage to Walls & programs BB Stream of fractal code that rapidly coalesces into a fractal solid. Black Sky 5 8 4480 Hides 'runner in a cloud which attacks programs with "light- Chr3 Black cloud which forms between the enemy ning" program and the runner. Blink 5 7 1500 1D6 damage to Walls and programs, goes through Gates. BB Swirling cloud of fractal code that coalesces 50% rel into a random fractal solid (when it works). Or blows up. Dummy 1 2 450 Fake, disguisable program Chr3 Small spinning chrome pyramid that reects the Icon of any program it encounters. Evil Twin 8 7 2700 Combination Shield/Krash Chr3 The Netrunner's Icon seems to y around in large arcs. IGOR 4 7 4800 On-line unky Chr4 Classic "mad-scientist's" assistant; complete with lab coat and hunchback. Lightning Bug 2 6 1540 6 "bugs" that kill ICE before it can attack NET 6 motes of light that slowly alternate between red and white. The motes lazily circle the Netrunner...... Type / Name Str MU Cost(eb)Function From Icon Omnivore 3 8 18500 Derezzes programs, fries CPUs, temporarily reduces INT by Chr3 Whirring, buzzing, screeching ball of blades 2D6 which careens into its target and thoroughly mangles it. Satchel Charge 8 7 18500 5D6 damage to 'runner & progs in 1 subgrid, 3D6 to Walls SW A bomb in a backpack. & Gates Scribe 6 8 NA Stops and disassembles programs for copying. Program roll Chr4 Cowled chrome monk with feather pen. 47+ Wolfpack 6 8 15200 Does 1D6 damage to ICE/Demon STR, 1D10 damage to Chr3 Pack of electrically-charged wolike forms 'runners which pounce upon their target, ripping it apart. Controller ntn ernigNtunn otae 19/25 Softwares Netrunning  Netrunning Instant Crystal Ball 4 1 140 Operates video cameras, remote sensors, etc CP20 None. Dee-2 3 1 130 Operates robots, cleaning machines, autofactories, etc CP20 None. Genie 5 1 150 Operates doors, elevators CP20 None. Hotwire 3 1 130 Operates remote vehicles CP20 None. Knevil 4 3 220 Limited AI vehicle controller, no safeguards Chr3 Wildly-dressed motorcyclist, with madly glinting eyes. He grabs the remote's icon and begins moving it. News At 8 4 1 140 Allows access to Data Terms & Screamsheets via the Net CP20 None. Open Sesame 3 1 130 Weaker program to operate doors, elevators CP20 None. Phone Home 5/2 1 150 Can place/receive calls while in the Net, can intercept at CP20 None. STR 2 Rockerbit 4 2 200 Limited AI microphone/voxbox controller, broadcast at pre- Chr3 Cartoonish Rocker that hangs around the set time speaker remote and 'yells' into it as appro- priate. Soundmachine 4 1 140 Controls mikes, speakers, vocoders, etc CP20 None. Terminator 4 2 260 Control terminals Chr3 A disembodied cyberarm begins typing, writ- ing, or drawing on the remote icon in ques- tion. Viddy Master 4 1 140 Allows control of videoboards CP20 None. WAD Controller 2 1 150 Diculty 10-35 to patch into signal Chr3 None. Utility Alias 6 2 160 Replaces le name with false one CP20 None. Backup 4 1 140 Used to copy programs CP20 None. Baedeker's Net 2 1 130 Routes calls public 2 or 3 dataterm numbers. +3 System BB A green line extending across a Net map. Map Know ...... 20/25 ...... Type / Name Str MU Cost(eb)Function From Icon Bakdoor 3 2 600+ Routes link through at least one private system BB A green line extending across a Net map. Breadcrumbs 4 4 290 Finds new LDL link routes (legally), 1 round per uplink or NET Line of glowing sparks forming a trail. LDL Butcher Boy 3 7 550 Creates a paper trail, whilst funnelling funds elsewhere BB Takes the appearance of a system accounting program. Cartographer 6 3 200 STR vs CPU INT/2 for map of data fort, must be run inside Chr3 None. the fort Databaser 8 2 180 Stores up to 10,000 pages per le CP20 None. Dolphin Pro- 3 5 310 Clean Pacica of junk data NET Sleek, chrome dolphin. grams ElectroLock 7 2 170 Locks les at STR 3 CP20 None. Expert Schedule 4 3 250+ Skims les at 1MU per turn. Shelf life of a month BB None needed, but might appear as a hu-

ntn ernigNtunn Softwares Netrunning  Netrunning Instant An manoid icon that leads you to the les you requested. Filelocker 4 1 140 Locks les with code word, equal to STR 5 Code Gate CP20 None. File Packer 4 1 140 1/2 MU size, 2 turns to unpack CP20 None. Flare Gun 2 2 300 Message travels 3 spaces per turn for 2D6 turns Chr3 Big-barrelled are gun. Flip Switch 2.0 10 0 225 Flip Switch controller, -5 Net Initiative when active Chr3 None. Flip Switch 3.0 10 0 250 Flip Switch glogo controller, 3 settings BB None. GateMaster 5 1 150 Anti-virus, detects & destroys Virizz & Viral 15 CP20 None. Guest Book 4 2 200 Detects 'runners within 2 squares, treat as STR 3 Code Gate Chr4 An old-style hotel guest book and quill. Instant Replay 8 2 180 Records 'runners trip CP20 None. Mictotech AI In- 2 4 330 Pseudo-AI that scans les looking for keywords BB Floating hollow mask. terface Multinetter 10 20 2000 Allows multiple 'runners to run through one computer Chr3 None. Multi-Tasker 5 6 1140 Extra actions on mainframes NET None. Mystery Box 5 4 300 Searches for and copies programs from les BB Cartoon box with strange gears and widgets on each surface. NetMap 4 1 140 Major region locator map, +2 to System Knowledge CP20 None. Newsgroup Filter 4 4 200 Goes out and skims news and interest groups for specied BB A simple Icon of the user's choice. info Padlock 4 2 160 Access code needed to log onto deck CP20 None. Re-Rezz 3 1 130 Recompiles damaged programs and les CP20 None. R&D Protocol 4 3 250+ Skims R&D les at 1MU per turn. Shelf life of two weeks BB None needed, but might appear as a hu- Files manoid icon that leads you to the les you requested...... Type / Name Str MU Cost(eb)Function From Icon Shredder Uplink 5 3 250 Reconstructs les in the Trash buer BB Janitor program who ries through the pieces inside a trash can and pulls out complete les. Translator 2000 4 2 240 Takes pictures to make virtual objects Chr4 None. Zetatech Installer 1 1 300 Compresses programs to half size but reduces Speed by 1 BB 'Tronnic humanoid upper body mounted in a round metallic base, who feeds programs into base. Demons Afreet II 3 4 1160 Carries 3 programs CP20 Tall, powerful black man, dressed in evening clothes, wears a fez and speaks in a formal, deep voice. Balron II 5 5 1240 Carries 4 programs CP20 Huge, male gure. Dressed in futuristic black ntn ernigNtunn otae 21/25 Softwares Netrunning  Netrunning Instant armor. Carries a red glowing energy blade. Imp II 3 3 1000 Carries 2 programs CP20 Small, orange sphere of light, with two amused looking red eyes. Beeps, whistles, & pings. Reaper 5 7 12500 Seeks out & destroys users in a set area. 1D6 to 'run- SW Classic Grim Reaper, complete with aming ners/progs sickle and cloak made of outer space. Soulkiller 3.0 7 45- NA 1D6 INT loss/ to Data Walls & programs, -4 to detect, 3 SW Swirling vortex that speaks in a high crys- 4000+ actions talline voice, and sucks the 'runner into it. Succubus II 4 4 1200 Carries 4 programs CP20 Voluptuous, nude, hairless female, made from shiny chrome metal. Has large batlike wings, blue eyes. Thug 3 6 10440 Permanent subroutines, 1D6 damage to programs and 'run- Chr3 Generic cartoon thug. ners Vampyre II 6 7 2300 Can absorb up to 6 programs Chr1 Figure in grey robes, with golden eyes, & fangs. Transforms into misty cloud that dis- solves other icons. Daemons Boardwalk 3 7 1080 Records messages and conversation in admin/budget BB Stylized porcupine-like shape that invades the database database. Cockroach 5 7 1600 Eats les, turns them into more cockroaches BB Small cockroach-like image that multiplies across the face of the database. Cream Pie 7 7 1715 Carries 3 programs (Poison Flatline, Killer IV, & Murphy) BB A cream pie. Deep Thought 3 7 1080 Records messages and conversation in research database BB Dark depression/hole that slowly works it's way into the database (when it's visible at all)...... 22/25 ...... Type / Name Str MU Cost(eb)Function From Icon Eavesdropper 3 6 1365 Carries Databaser. Records messages and conversation in BB None specic, it's supposed to blend in. system Fait Accompli 3 7 570 Subtly messes up project les BB Cloaked and hooded man, with a glimmer of a sinister smirk under the hood. False Echo 2 6 380 Triggers false system alerts BB Shimmering "hologram" mirror image of the 'runner. Gremlins 4 7 7000 Produces more gremlins and randomly shoots o programs BB Little green men running around carrying monkey wrenches. I Spy 3 6 400+ Commercial version of Eavesdropper BB Hollow mask with piercing light-beam eyes. Incubator 2 6 760 Reproduces other programs BB Translucent pyramid with the nucleus of an- other program always growing inside it. Pattel's Virus 6 7 2200 Weakens 1 type of ICE BB Swirl of hundreds of crystalline fragments.

ntn ernigNtunn Softwares Netrunning  Netrunning Instant Skivviss 4 7 1320 Inates project costs, so that they get cancelled BB Bulbous chrome robot with four arms that act as a nder subroutine while corrupting data. Ambushes Chimera 5 4 100,000 Invisible anti-demon. If undetected it gets a free turn to act BB Fully animated chimera which breaths re and choking gas at the target demon. Soulkiller 1.0 4 NA 500,000 Drains target's intellect, etc (1D6 INT/turn) into a data BB Swirling vortex that speaks in a high crys- matrix talline voice. The vortex sucks the 'runner into it. Trap! 4x3 NA 200,000 3 Asp programs hidden in a le or node that attack if unde- BB Three Asps owing out of the le/node. tected Systemware CloakMore 6 5/cpu 4000/cpu Cloaks an entire data fort. Neutralizes 1 INT/CPU NET None. Dazzler 5 14 14800 Disguised VR "cell" with trace, di 15-25 Interface roll to Chr3 Usually disguised as a piece of system archi- detect tecture or simple defence program. Monitor 4 7 950 Roving internal Net security NET None. Panzer 8 7 20000 Monitor that does 1D6 damage to 'runners and programs BB Big computer generated tank. Often cus- tomised by in Corp data forts. Pocket VR 4 13 13000 Disguised VR "cell" with trace, di 15-25 Interface roll to BB Usually disguised as a piece of system archi- detect tecture or simple defence program. Too Many Doors 3 3 1000 Gives 'runner a choice of doors, disconnected if wrong one BB Junction of 3 or more access routes. These chosen "doors" can be unlabelled, labelled identi- cally, or wrongly.

...... Type / Name Str MU Cost(eb)Function From Icon Data Walls Data Wall 1-10 - 1000/levelBasic Data Wall. STR = CPUs+0 to +9 (max 10) CP20 Standard Data Wall. Data Wall 2.0 +1 - 1000 Flashy Data Wall. STR = CPUs+1 BB Picket fence. Wall of Static +2 - 2000 Flashy Data Wall. STR = CPUs+2 BB Shifting wall of static surrounding the data fort. Crystal Wall +3 - 3000 Flashy Data Wall. STR = CPUs+3 BB Crystalline wall. Fire Wall +4 - 4000 Flashy Data Wall. STR = CPUs+4 BB Wall of ame. Reinforced Wall +4 - 4000 Flashy Data Wall. STR = CPUs+4 BB Very sturdy looking concrete wall. Rock is Strong +5 - 5000 Flashy Data Wall. STR = CPUs+5 BB Huge stone wall. UpgradedDataWalls Anti-Program 1-5 - 4800+ Attacks Intrusion programs as Killer, +160eb/STR NET Looks like a standard Data Wall. ntn ernigNtunn otae 23/25 Softwares Netrunning  Netrunning Instant Wall Anti-Personnel 1-5 - 30000+ Attacks 'runners, 2-3 Stun, 4 Spazz, 5 Hellbolt, NET Looks like a standard Data Wall. Wall +1000eb/STR Laser Wire +2/2 - 34000 1D6 damage to 'runner (STR 2), goes inert after 3 rounds BB Mesh of laser light that reaches out to engulf the 'runner. Razor Wire +3/3 - 36000 2D6 damage to 'runner (STR 3), goes inert after 3 rounds BB Data Walls that can sprout buzzsaw blades to attack the 'runner. Shotgun Wire +5/5 - 40000 2D6 damage to 'runner (STR 5), goes inert after 3 rounds BB An aimpoint appears on the 'runner's Icon, at which the Wall will re a burst of neural feedback. Wall of Ice +6/6 - 44000 4D6 damage to 'runner (STR 6), goes inert after 3 rounds BB Huge, brain-like image emerges from the Data Wall to bombard the 'runner with spheres of programming. Superior Net Bar- +1 - 300,000 Tighter coding makes them stronger, dierence easily noted BB Upgraded Data Walls have a tight matrix wo- rier ven into them. Code Gates Code Gates 1-10 - 1000/levelBasic Code Gates. Many variations exist (Brainware CP20 Normal Code Gate, but variations are com- Blowout) monplace (see Brainware Blowout). Cortical Scanner 5 - 20000 Uses a brainwave ID scanner. 3 Interface rolls needs to pass BB Keyhole that scans your Icon. Endless Corridor 4 4 8000 Requires two passwords. +3 di to crack second password BB The Gate looks like a corridor that just keeps going on and on and on. Encryp Break- +1 - 250,000 Tighter coding makes them stronger, dierence easily noted BB Upgraded Code Gates have a tight matrix wo- through ven into them. Haunting Inquisi- 8/6 8 80000 If you fail to get past it launches Psychodrome (STR 6) BB Normal Gate until it activates. Then it's tion whatever your worst nightmare is...... 24/25 ...... Type / Name Str MU Cost(eb)Function From Icon Mazer 7 - 7000 Code Gate variant BB Looks like a maze. Nerve Labyrinth 6/4 NA 50000 If you fail to get past it does 4D6 damage to the 'runner BB Green labyrinth that seems to draw in the (STR 4) 'runner and squeeze his brain. Shrouded Gate 1-10 4 3000+ Makes a Code Gate invisible. +1000eb/1 STR NET Invisible or disguised as a Data Wall. Tutor 3/5 NA 50000 Easy to crack, but tags 'runner so that ICE can break link BB Regular Code Gate that gives your Icon a tail (STR 5) which other ICE can yank. Transportation Trailer Hitch 1 3 300 Adds 20% extra MU, Speed -1 NET An open-topped, single-exit trailer. 18-Wheeler 1 4 500 Doubles remaining memory (MU-4), Speed=1 NET An 18-wheeler trailer with the Netrunner's icon on the sides of the trailer. Enhancement Brain Buster 4 6 4500 +4 to INT, +2 speed I.3 User's head looks as it's steroids, and he ra-

ntn ernigNtunn Softwares Netrunning  Netrunning Instant diates an aura of great intellect. Gestalt 9 7 5600 Up to 3 'runners can combine INT, REF, and Interface I.3 Whatever it wants, after all it is a super in- telligence. Rache Specials Memorial ICE- 6 2 1500 Hold 4 programs like a Demon, but each program has full BB A non-Euclidean corkscrew. breaker strength Bone 4 4 270 Attracts "Dog" programs from all over NET Rubber dog Bone. Pirate Uplink 5 7 NA Alerts LDLs to presence of illegal calls NET None. Rache's SeeYa 6 2 NA Prog 15+. IDs Icon as either prog, 'runner, or AI NET Shimmering silver screen, shows nothing (program), sine wave (human), sawtooth wave (AI/Pseudo Int). Rice Burner 2 2+ NA +1 to Net movement, -50% deck MU NET Japanese-style racing motorcycle. SideWalker 3 3 NA Allows you to walk on the sides of the Olympia sidewalks NET None. Succubus III 7 4 NA Compiler, carries 2 programs. 2D6 anti-personnel damage SW Very close variant on Spider Murphy's Icon, a busty, curvaceous, rendition of a red-headed anime girl. Specials EmergencySelf- 4 30 NA Converts 'runner to electronic entity, roll 1D10+4 for max BB Swirling vortex of blue lightning that sucks Construct INT the 'runner's Icon into it; if successful the Icon later emerges. Lunch Money™ 3 7 145000 Compiler (assassin to kill it), 1D6 physical damage to the BB Super-realistic little girl that plays innocent, 'runner then gets an evil look in it's eyes and attacks the 'runner.

...... Type / Name Str MU Cost(eb)Function From Icon SystemConstruction Antiquated Rou- NA NA 50000 Circa 2013 interface. All 'runner Initiative rolls at -2 BB Older-style and more primitive Net imagery. tines Bizzare Encryp- NA NA 10000 All system data is encrypted (STR 10 Gate), 1-2 hrs to de- BB None. tion code Blood Cat 10/5 NA 300,000 INT 6 pseudo-AI, STR 5 attacks vs 'runners and programs BB Dead-black panther with glowing red eyes and mouth. TesseractConstructionNA NA 100,000 Escher style data fort, -3 to 'runner Initiative until use to it BB Fort Fort's interior dees orientation, up, down and sideways constantly changing, walls at impossible angles. ntn ernigNtunn otae 25/25 Softwares Netrunning  Netrunning Instant Information c R.Talsorian Games Inc. All rights reserved. Collated by Andrew James 25/11/98. [email protected] New collation by Gaby Wald + Amael Assour 07/09/2012.