Jam

#hacking #Rules

Jam (Continuous)
Default: Computer Hacking-2.
Base Complexity: 2.

Overwhelm an Analyze, Listen, or Search program, or a specific mode of communication, with static or meaningless input.

If the Jam is successful (no contested roll needed), the target can’t receive any input from the jammed source – programs error out, and comm channels buzz with white noise – until the Jam is terminated, or its source is disconnected from the network.

This an easy, brute-force way to interrupt communication, but it does nothing to “fool” the target – so if, for example, an Analyze program is set to alert the sysadmin of any errors in an ICE program, jamming it will draw as much attention as allowing it to report a Breach.

This is one of the Hacking Programs.

skill_defaults:: "Computer Hacking-2"
complexity:: 2