Control

#hacking #Rules

Control (Single-Execution)
Default: Computer Hacking-2 or Computer Operation-3.
Base Complexity: 4.

Take over function of the target computer.

A successful roll allows the Blackhat to cause a compromised computer to carry out any function known to him of which it’s normally capable – shut down, erase or transfer data, run or halt installed programs, etc. It can also allow remote control of a networked device (security cameras, machine-gun sentries, etc.), in which case the program defaults to the appropriate Electronics Operation specialty.

This roll is only contested if another user is trying to Control the same computer to make it do something different. An individual program, device, or database that is protected by its own layer of ICE cannot be Controlled (or otherwise accessed) until the ICE protecting it is defeated. Each instance of internal ICE on a computer (protecting a particular program, database, or system) protects itself from tampering, and cannot be Controlled until it’s been individually Breached or Spoofed.

This is one of the Hacking Programs.

skill_defaults:: "Computer Hacking-2 or Computer Operation-3"
complexity:: 4