Template: Slicer

Character Name: The Name Chart can be used
Gender: [M][F]
Species: Human
Age:
Height: m
Weight: kg
Force Sensitive: [Yes][No]
Force Points: 1 or 2
Dark Side Points: 0 or up to 5 (based on background)
Character Points: 10
Extra Character Points: 20+ (+5-10 based on background, 10 per Dark Side Point, 5 per Cyber point)
Cyber Points: 0 or up to 6 (based on background)
Move: 10 (varies if not human)
Place of Birth:
Homeworld:

Background: Required
Physical Description: Required
Personality: Required
Objective(s): Required
Quote(s): At least one is required


Dexterity 2D+2: blaster, dodge, pick pocket, running
Perception 3D+2: bargain, con, forgery, hide, sneak
Strength 2D: climbing/jumping, lifting, stamina, swimming
Knowledge 3D+2: business, streetwise, technology, value
Mechanical 2D: computer ops, repulsorlift ops, sensors, swoop ops
Technical 4D: (A) Artificial Intelligence (see below), computer program/repair, droid programming, droid repair, repulsorlift repair, security, (A) Slicing (see below)

Equipment:
Hold-Out Blaster: Damage: 3D, Range: 3-4/8/12, Ammo: 6 (extra clip)
DimSim holographic Projector (GG11 pg 85)
Electronic Lockpicking Kit
Secure Comlink
Mobquet Flare-S Swoop (see below)

Credits: 2500 or variable if chart is used

Special Slicer Skills

Slicing
Time Taken: Minutes or Hours or Days, customized to the circumstances.
Specializations: A particular mode of slicing-code cracking, information gathering.
Advanced Skill: Requires Computer Programming 4D, Computer Repair of 4D, Forgery of 4D.
This is the actual skill that the majority of code slicers employ when cracking into a system. Whereas the computer programming skill allows a character to retrieve information (if he knows where to look), this skill uses software and the slicer's knowledge of computer systems to override and affect complex databases and simple computerized structures. With this skill, a slicer can break into a system and steal/alter files and data packets, leave false trails, implant computer viruses, and perform other general computer altering operations.

Artificial Intelligence
Time Taken: Hours or Days or Weeks, customized to the circumstances.
Specializations: A particular type of AI-droid brain, virus.
Advanced Skill: Computer Operations 5D, Computer Programming/Repair 5D, Droid Programming 5D.
This skill allows a talented programmer to effectively create or alter artificial intelligence in its varying forms. This ranges from creating a program which can learn from its mistakes, to writing a droid personality from scratch. The latter, of course, takes much, much longer, but as with any skill the more complex the task, the more time it will take. Uses for this skill include adding a thinking AI to a software package, creating a better interface for human-computer communications, and improving current droid and computer protocols.

Slicer Notes

The Slicer in his Element: Software & Slicing
There is no better environment for a slicer than to be stationed at a computer terminal with time to work and the right equipment. In the case of a slicer, his best "equipment" is actually his software. Whether self-written or purchased, with the right software at his disposal a good slicer can be more valuable than any other member of the party. There are many types of software for many different roles; sometimes a program is needed, other times all that is needed is a few well placed commands by the slicer. The slicing styles listed herein are only suggestions; it is up to the creativity of the player and the GM to come up with as many new ideas and combinations as are needed!

Writing Software
A slicer may write software to help him do his dirty work. This takes a computer programming/repair roll, with a difficulty depending on the type of software. GM's discretion is used to determine how long it takes to write the software, and how difficult it is to do so. If the slicer has the Artificial Intelligence skill, he can also roll that skill and add some degree of AI to the software, with a difficulty level determined by how complex the AI needs to be.

Using Software
When a character writes a piece of software, he rolls his computer programming/repair skill to determine how effective the new software is. This is seen in the form of a bonus which is added onto the slicing skill when used for its intended purpose. (Note: if the roll comes up "No bonus" the software is not useless; it can still be set to run while the slicer performs other tasks) Consult the following chart for how effective the software is.

Roll Result
0-10 No Bonus
11-15 +1D
15-25 +2D
25+ +3D

For example, Rupert decides that during this hyperspace trip he's going to work on his code descrambling software. The GM assigns him a time length and difficulty level (in this case a time length of 1 week, and a Moderate roll due to the type of codes it will descramble), which Rupert passes. Once the software is completed, he rolls a 16 on his computer programming/repair roll, which gives him a +2D bonus to code descrambling when using this software.

Slicing Styles

Code Descrambling
Difficulty: Difficult Slicing, or opposed roll vs. encoder
Time to Use: Minutes to Hours
Result: Use of this style allows a slicer to decode documents which have been encrypted somehow. The slicer must have access to the file in its entirety, which he will then search for patterns by which to translate the document. This can be used with written, aural, and video data types, though the latter two require a Moderate communications roll as well.

Hardware Slicing
Difficulty: Moderate Slicing, with modifiers by complexity
Time to Use: Minutes to Hours
Result: Hardware slicing is the act of modifying the basic commands sent between the elements of different pieces of hardware. This can be used on objects that contain computer elements that execute direct commands, such as blasters, cybernetics, comlinks, and the like.

Information Gatherers
Difficulty: Moderate Slicing, with modifiers by obscurity
Time to Use: Minutes to Hours
Result: Unlike the basic computer programming/repair attempt at gathering information, this is an active search through a multitude of systems and files for any mention of a subject. This can be used to track an individual, do research, or one of many other functions. It is a more generalized style, and depending on the time put into it the information yield will be much, much greater than with the standard file retrieval. This style can also be used to alter references to certain individuals, places, etc. as well.

Password Cracking
Difficulty: Moderate Slicing, with modifiers by computer security
Time to Use: Minutes to Hours
Result: This slicing style is used, through trial-and-error, to find a password on an encrypted system. A Warning to Slicers: Many computer systems will have security measures against password cracking, so attempt with caution.

Remote System Operation
Difficulty: Moderate Slicing, with modifiers by distance
Time to Use: Minutes to Hours
Result: This style allows a slicer to remotely manipulate a computer or piece of hardware he has access to through some sort of network. Examples of use would be logging into a computer terminal remotely, manipulating robotic arms in a factory from a datapad, operating a vehicle by remote, or any other type of control over a computer from a secondary location.

Resource Alteration/Procurement
Difficulty: Moderate Slicing, Moderate Forgery
Time to Use: Minutes to Hours
Result: This style allows a slicer to enter into a database and alter quantities and orders for certain resources, going directly to the source of the information as opposed to end-of-the-line alterations. This can be anything from bank account transactions, to food & supply requests, to passenger manifests, and more. GM should make the necessary opposing roll for forgery to make sure that no one notices anything amiss.

Virus
Difficulty: Moderate Slicing, with modifiers by complexity & security of target system
Time to Use: Minutes
Result: Viruses are a malicious way to attack a computer system with relative ease, though depending on the results the attempt becomes much more difficult. This style requires that the virus software be written beforehand. This style merely represents the actual insertion of the virus into the system.

The Slicer in Combat Situations

By no means is a slicer limited to his computer terminal for usefulness. Many times the slicer's resourcefulness can be a weapon unto itself, and woe to the enemy who underestimates the man with the datapad. There are many techniques that can be used by a slicer in order to make himself a formidable foe in combat, and below are listed only a few. A slicer should not limit himself to the ideas found here, but rather use them as a jumping off point.

One valuable technique for a slicer in combat is to use the tools at hand to make a more nonstandard weapon out of what he has. The slicer is the character who will combine two objects to make a new one, routing their hardware and basic software together to make a useful item in a pinch. A slicer will often be found with his blaster broken open, tinkering with the weapon firing systems to transform a mundane blaster into a fully automatic handheld weapon by removing the single-shot protocols. Or perhaps he pulled the hardware out of his datapad and replaced it with the internal components from his holdout blaster, with the discharge coming from the infrared sensor port. Or maybe he altered an explosive by attaching his comlink to it, with a designated signal used to detonate it set to the frequency of an Imperial Stormtrooper's helmet. Combining objects on hand can often be the most effective way for a slicer to create something out of few materials.

Other times the slicer can alter the programming of a droid, or remote-operate a speeder for the best results. The best way past a barricade is to break the barricade down, and certainly none of the party members want to drive the kamikaze speeder into the heart of their opponents. A droid gone haywire can be a great distraction, or even a dangerous enemy depending on how the programming is altered. Even weapons can be hotwired and set to fire at a regular interval, while the party beats a hasty retreat in the opposite direction.

In an urban setting, the slicer has a lot more opportunities to be effective. His slicing skills can call in backup, reroute police forces, activate building security systems, create distractions, and many other tactics. He may choose to hack into building security cameras to monitor his enemy's progress, or seal off all exits with the building's emergency fire doors.

The point is that a creative slicer will, rather than engage in head-to-head combat; use the items and resources available to him in order to aid the party, both in combat and out.

Slicer Equipment

Item Location
Audio Activated Datapad Fantastic Technology p. 29
Borg Construct Cracken's Rebel Field Guide p. 31
Comlink Revised and Expanded p. 226
Computer Spike Cracken's Rebel Field Guide p. 12
Cryptographic Coder Fantastic Technology p. 29
Cyborg/Computer Datalink Cracken's Rebel Field Guide p. 32
Cyborg/Droid Datalink Cracken's Rebel Field Guide p. 33
Cyborg Knowledge Cartridge Cracken's Rebel Field Guide p. 34
Datapads Revised & Expanded p. 226
Datasearch Gundark's Personal Gear p. 93
DimSim Holographic Projector Galaxy Guide 11 p. 85
Drogue Repulsorlift Skiff Galaxy Guide 11 p. 86
Implant Communicators Fantastic Technology p. 87
Portable Computer Cracken's Rebel Field Guide p.10
Portable Message Tranciever Fantastic Technology p. 67
Point-to-Point Transceiver Gundark's Personal Gear p. 90
Remote Text Data Scanner Fantastic Technology p. 45
UniTech "Patch" Gundark's Personal Gear p. 94
Universal Computer Interface Fantastic Technology p. 32

Mobquet Flare-S Swoop
Type: Racing Swoop
Scale: Speeder
Length: 2.5 meters
Skill: Swoop Ops Crew: 1
Passengers: 0
Cargo Capacity: 1 kg
Cover: 1/4
Move: 225; 650 kmh
Maneuverability: 4D+2
Body: 1D+1
Altitude Range: Ground - 350 meters


S-Swoop

S-Swoop Details