FudgeSRD >Psi-punk >When Worlds Diverge >

Security Programs

For rules about how to use these security programs in your game, see The ‘Net.

Contents

Brain Virus

Attributes

Security: Superb

Skills

Technical [Security]: Superb

 

Specialization: Computer Security

Gifts

 

 

Infect Ghost

 

Faults

 

 

Can be manipulated

Psionic Powers

 

Mind Control [Security]

Threat Level Track

Damage

1-2

3-4

5

6

7+

Wound

Red

Orange

Yellow

Blue

Green

 

O O

O

O

O

O

 

The brain virus has but one function: to infect the minds of ghosts. These programs are commonly employed on personal devices owned by other ghosts, but a few corporate security systems employ them as well.

Brain viruses have also been used offensively. A brain virus never attacks a ghost directly. Instead, it constantly attempts to use mind control to gain access to the ghost’s brain and manipulate its victim.

Brain viruses are programmed to force victims into performing pre-defined tasks. For instance, the brain virus may tell its victim to disconnect from the system or it may trick the victim into believing it has become part of the system itself. The virus’ degree of success on its mind control check determines how much control it has over the victim, and for how long. 

Because the brain virus’ commands are pre-programmed, they may need to achieve a high enough degree of success to have any effect at all. For example, the mere suggestion to exit the system is a simple command that requires little control, but forcing someone to believe they are part of the collective and maintaining a hold on their mind would require a much higher result.

Because brain viruses have enough AI to use psionic powers, they are also susceptible to being manip- ulated by psionics and magic.

Ghost Hunter

Attributes

Security: Superb—Phenomenal (depends on

system’s Security Level)

Skills

Technical [Security]: Superb—Phenomenal (de- pends on system’s Security Level)

 

Specialization: Computer Security

Gifts

 

Faults

Can be manipulated

Magic Powers

Electrokinesis [Security]

 

 

Threat Level Track

Damage

1-2

3-4

5

6

7+

Wound

Red

Orange

Yellow

Blue

Green

 

O O O

O

O

O

O

 

The ghost hunter is a basic attack program designed to deal with low-level threats in a very forceful manner. Ghost hunters are capable of attacking using their Computer Security skill as normal for Ghosting Combat or by activating an electrokinesis protocol which deals a physical electrical shock to the ghost.

When using the electrokinesis power, add the program’s Security level to the attack (instead of the Focus attribute that would be used by a human). If the attack is successful, the ghost takes physical damage instead of mental damage.

Ghost hunters do have one drawback: because they have just enough artificial intelligence to activate a psionic power, they are also capable of being mentally manipulated. Ghosts who also have a means of using mind control or other similar psionic powers may do so normally against the ghost hunter.

Ghost Trap

Attributes

Security: Superb—Phenomenal

Skills

Technical [Security]: Superb – Phenomenal

 

Specialization: Computer Security

Gifts

Prevent Escape, Suspicious

Faults

 

Psionic Powers

 

 

Threat Level Track

Damage

1-2

3-4

5

6

7+

Wound

Red

Orange

Yellow

Blue

Green

 

O O

O O

O O

O O

O O

 

Ghost traps are designed specifically to keep unwanted outsiders locked inside the system. These programs are built to be highly suspicious, making it extremely difficult for anyone without the proper passwords to use brute force attacks against them; ghosts must reduce the trap’s Threat Level to Green twice before the program allows passage.

If a ghost tries to leave the system by any means, the ghost trap attempts to block them from doing so. The trap makes a Technical (Computer Security) check opposed by the ghost’s Mind attribute. If successful, the ghost remains in the system. The trap performs this action for free in reaction to any ghost attempting to flee; it does not use up the trap’s turn.

Pandora Protocol

Attributes

Security: Phenomenal

Skills

Technical [Security]: Phenomenal

 

Specialization: Computer Security

Gifts

Appears as another program, system-wide alert

Faults

 

Psionic Powers

 

 

Threat Level Track

Damage

1-2

3-4

5

6

7+

Wound

Red

Orange

Yellow

Blue

Green

 

O O O

O O

O O

O

O

 

Pandora protocols are designed to mask themselves as another program in an attempt to trick ghosts into behaving differently when facing them. When a ghost attempts to identify a Pandora Protocol using the Computer Security skill, he receives misinformation about the program on any failure, regardless of how close he was to succeeding.

For example, a Mediocre failure would provide misinformation even if it would normally just result in a failure to identify the program. The Pandora protocol acts identically to the program it is mimicking but uses its own Computer Use and Security traits, as well as its own Threat Level track, in place of those assigned to other programs.

If the ghost fails to bypass the protocol’s Threat Level within three rounds, it sends out a silent, system-wide alert signal that fetches other programs and brings them into play. Characters may wind up facing one or more programs in addition to the Pandora protocol when this happens.

These protocols are almost always used in lieu of a spectral firewall to protect a system’s most high- ly-confidential or secure data.

Spectral Firewall

Attributes

Security: Superb

Skills

Technical [Security]: Superb

 

Specialization: Computer Security

Gifts

Lockout Protocol

Faults

Cannot Attack

Psionic Powers

 

 

Threat Level Track

Damage

1-2

3-4

5

6

7+

Wound

Red

Orange

Yellow

Blue

Green

 

O

O

O

O

O

 

Traditional firewalls are no match for a ghost, so these so-called “spectral firewalls” were developed as a means to prevent unwanted entry by would-be hackers. Spectral firewalls are the most basic form of anti-ghost protection.

They cannot attack a ghost directly, so there is little initial harm in attempting to bypass such a system. However, a spectral firewall keeps track of the number of attempts a person has made to bypass it and alert the system’s other security programs if a ghost fails to bypass it in time.

Each round a ghost spends trying to defeat the spectral firewall’s Threat Level counts against the attempts he may make before the system’s other programs are alerted. If the ghost fails to reduce the spectral firewall’s Threat Level to Green within three rounds, the firewall will immediately call in another program to forcibly eject the user.

When this happens, the spectral firewall’s Security attribute and Technical skill both increase to Phenomenal and its Threat Level resets to Red (it effectively “heals” all damage done to it). It also calls in another program to join the fight. Select any other program and add it to the combat.