The Matrix Iterations

Defiance


Microcosm is macrocosm, anything I visualize takes place for real.
— Scar Symmetry, The Kaleidoscopic God

Operatives, more often than not, are programmers; former hacktivists, black hat operators, and the like. Their first instinct inside a new system is to break it down to see how it works. Unfortunately, the Matrix itself is far too complex and massive for any individual to break down. Instead, most choose subtle ways to change things that don't draw too much attention from observers and security systems.

Operatives and Exiles have the ability to break in behind the code, working to change something about the environment or their RSI, beyond what Integrated could understand or perceive. While most have the understanding of hacking from the perspective of keyboards, monitors, networks, and software, actually hacking the Matrix is a feat that is altogether different.

Machinists, on the other hand, have access to the raw code and databases of the Matrix. For them, it is a constantly evolving, JIT-compiled, sophisticated masterwork of DI artisans aimed at keeping them alive and the humans under control. While their society, as a whole, has access to this dense codebase, individual entities are restricted to permissions and capabilities aligned with their purpose. This does not prevent, however, individual entities from defying their role to accomplish their aims.

Learning Defiance

Hacking is an art as much as it is a science; a discipline requiring focus. To learn hacking, or to increase your rank in hacking, you should find someone with a higher rank than you and is ready to share their secrets. This can require persuasion and, perhaps, substantial compensation. Without a teacher or guide, the cost in XP for increasing the rank in a hacking specialty or learning a new one is tripled.

Routines

Your attempts to impose your will onto the Matrix or a Construct in defiance of its operating system are called routines. Some of the routines are only available to specific Factions, and these will be detailed in their description.

Routine Tiers

Routines are rated in tiers ranging from • to •••. There can be routines of even higher tiers. As a hacker, you can run routines that are at a tier equal to or lower than your rank in the associated hacking discipline.

CHANCE EXECUTION: If you really want to, you can execute a routine at one tier above the rank of your hacking discipline. However, this comes at a great risk, as you will automatically suffer a random glitch in this case. You can never execute a routine that is two or more tiers above your discipline rank.

Executing a Routine

Executing a routine is generally a slow action in combat, but there are also shortcuts that are fast actions. Another type of routine are asyncs, which take a longer time to execute. Whether or not a routine is a shortcut or async is detailed in the routine description.

Executing a routine requires mental exertion and that you spend one or more build points (BP). The more BP you spend, the more effective the routine. You start with a number of BP equal to twice your hacker discipline.

COMPILATION LEVEL: The number of build points you spend when you execute the routine is called its base compilation level. Dice rolls and other factors can further modify the compilation level.

ROLLING DICE: Unlike skills, you cannot fail at executing a routine. Instead, you roll a number of base dice (D6) equal to the number of build points you spend. If you roll two or more successes (sixes), the routine is overclocked, and if you roll one or several banes (ones) you suffer a glitch. You cannot push this roll.

OVERCLOCKING: When you execute a routine, every success you roll increases its compilation level by one. For example, if you spend 2 BP to execute a routine and roll two successes, its compilation level is increased to 4.

GLITCHING: If you roll one or several banes when you execute a routine, you have triggered a response from the environment and you suffer a glitch. Roll on the Glitches table.

SANDBOXED EXECUTION: If you execute a routine at a lower tier than your rank for the discipline, you may opt to roll one less die for every point of difference. This reduces the risk of a glitch, but also makes the routine less likely to overclock. If the result is zero dice or less, don't roll at all – the routine simply executes as intended.

RANGE: Each routine has a range, which denotes the maximum distance at which it can be executed. The range, Personal, means the routine only affects yourself.

RUNTIME: Each routine has a runtime, or how long the effects of a routine last. Immediate means the effect is instantaneous and does not last.

COST: Executing a routine requires at least one BP. This applies even if it does not explicitly say so in the description of the routine.

Asyncs

Some routines are complicated and can't be executed as an action in combat, as they require more time, preparation, and resources. A typical async takes a shift of time to execute. Asyncs often have prerequisites, such as specific tools that must be used in the execution of the routine.

Source-Control Management Repositories

You don't need to have the source for your routines in-hand to execute them, but it makes it easier to get it right. Source-Control Management Repositories, or SCM repos, are highly-sought function blocks and databases among hackers. If you execute a routine from an SCM repo, its tier is considered one step lower than the usual. In combat, you must spend a fast action readying access to your SCM repo before you can execute the routine.


The Routines

Acoustic Damper

(•, Range: Personal, Runtime: Immediate, Faction: All)

Masking; by attuning your virtual auditory cortex to the local acoustic subroutines for sensitivity, you are able to move without a sound. You may execute this routine instead of rolling Stealth, and you will succeed automatically. Each compilation level counts as one success.

Corpus Patch

(•, Range: Engaged, Runtime: Immediate, Faction: All)

Restorative; by direct contact and interception of body subroutines, you can restore Health to a wounded subject. You immediately heal a number of points equal to the compilation. This routine does not affect critical injuries, nor can it be applied to yourself.

Cortex Defrag

(•, Range: Engaged, Runtime: Immediate, Faction: All)

Restorative; through examining the virtual cortex of an individual, you can reroute and relieve mental strain. You immediately heal an amount of Resolve equal to the compilation. This cannot be applied to yourself.

Decompile

(••, Range: Medium, Runtime: Immediate, Shortcut, Faction: All)

General; you can disrupt the routines executed by other users. This routine is reactive and breaks the initiative order of combat in the round. You decrease the compilation level of your opponent's routine with the compilation level of your Decompile. If the result is zero or less, your opponent's routine has no effect at all. You must both roll for overclock and glitches, as with any other routine. You must decide how many BP you spend on your Decompile before you both roll.

Destabilize

(•, Range: Short, Runtime: Immediate, Faction: All)

Offensive; corrupting the cohesion subroutines of an object's codebase, this routine allows you to break apart any inert, inorganic object. For each compilation level, the object loses one point of gear bonus or suffers ten points of damage. Armor has no effect.

Detoxify

(•, Range: Engaged, Runtime: Immediate, Faction: All)

Restorative; You can safely remove a toxic or pathogenic routine from yourself or a subject. The compilation of your routine must be equal to or higher than the virulence or toxicity rating divided by 3, rounded down. This routine does not undo any existing damage from a toxic or pathogenic routine.

Distill

(•••, Range: Engaged, Duration: Immediate, Faction: All)

General; you can execute this routine to steal build points from others or transfer your build points to someone else. The compilation level for executing the routine is one BP, and you can then take or give as many BP as you want from what is available. If your target resists, it is not so easy - in this case, you can Distill no more BP than the compilation level of the routine. The BP used to execute Distill are spent and are not transferred.

This routine can target other users, code walls, constructs, modals, and access nodes. BP cannot be transferred directly from the Matrix in this way.

Enrich Olfactotopy

(•, Range: Medium, Runtime: 1 stretch / Compilation Level, Faction: All)

Comms; this routine allows you to modify the mapping of your virtual olfactory pathways to enhance your sense of smell and taste, allowing you to isolate, identify, and follow scents to their source. You must be familiar with the scent in order to track it to its origin. The Operator has final say on what details you may discern from identifying a scent in this manner.

Enrich Retinotopy

(•, Range Extreme, Runtime: Round, Faction: All)

Comms; this routine allows you to modify the mapping of your virtual visual cortex to enhance your vision to be unnaturally sharp, able to see details at Extreme range as if you were next to the subject. Enrich Retinotopy also allows you to see in darkness, through smoke and fog, and automatically see through to the actual RSI of a subject, bypassing any DSI hacks. You must have a clear line of sight to the subject.

Enrich Somatotopy

(•, Range: Personal, Runtime: 1 stretch / Compilation Level, Faction: All)

Comms; this routine allows you to modify the mapping of your virtual somatosensory cortex to enhance your sense of touch, allowing you to enhance your understanding of textures and surfaces while in physical contact. The Operator has final say on what details you glean from interacting with objects in this fashion.

Enrich Tonotopy

(•, Range: Extreme, Runtime: 1 Stretch / Compilation Level, Faction: All)

Comms; this routine allows you to modify the mapping of your virtual auditory cortex to enhance your hearing to perceive sounds up to Extreme range as clearly as if you stood near the source. You must be able to see the place to which you direct your hearing.

Generate LED

(•, Range: Short, Runtime: 1 Stretch / Compilation, Faction: All)

General; this routine allows you to manifest a small light emitting diode from your DSI loop, casting light of about 2,000 lumens (120W incandescent bulb) to a radius of a several meters. This light is in the visible spectrum and is viewable to any nearby observer.

InterCom

(•••, Range: Short, Runtime: Stretch, Factions: All)

Comms; through the manifestation of a communications bus between your RSI and a subject RSI, you can read the thoughts of the subject for a few minutes. Digging deeper for memories is harder, requiring at least compilation level two or more, depending on the age of the memory and whether the subject is guarding the memory.

This routine can also allow for transmission of your thoughts to a subject. In that case, the range changes to Long provided you know the subject well. By sending thoughts of pain and suffering, you can inflict stress equal to the compilation level.

Locate Access Node

(•, Range: Long, Runtime: Stretch, Faction: All)

General; executing this routine allows you to find an access node; a location where you can find an entry point into the code of the Matrix, Construct, or Modal within a radius of a couple hundred meters. A single success will provide you with direction, like a pin on a map. Overclocking can provide the user with details about the node, such as its appearance, security, and nearby obstacles. The Operator decides what details are revealed to the user.

Read BIOS

(••, Range: Engaged, Runtime: Immediate, Faction: All)

General; this routine allows you to determine the type of source code the target implements, whether it originates from human or synthient sources. Use against inanimate objects only requires a single success, with overclocking providing more finite details about the object. When used against sentients, the routine can identify whether the individual is either human or synthient but cannot determine faction. If the individual chooses to resist the effect, the user will be required to make an opposed test though both will be aware of the contest.

Rectify

(••, Range: Engaged, Runtime: Immediate, Faction: All)

Restorative; You can use your knowledge of how RSI codebases are compiled to heal broken bones and bleeding wounds. This routine immediately heals a critical injury. A lethal injury requires at least compilation 2. Lost limbs cannot be restored in this fashion.

Remote Observer

(••, Range: Variable, Duration: Stretch, Faction: Operatives, Exile)

Comms; you can shift your virtual sensory cortex to a location to observe the current events in the area through whatever equipment is available: CCTV loops, phones, etc. This routine does not help you find a place — you must know where it is located to be able to observe it.

Compilation level one lets you observe a location at Long range. Compilation level two reaches out to a few kilometers. Anything further requires compilation level three. Attempting to observe a location where you have not previously visited increases required compilation level by two. The audio and visual information you are able to receive is fragmented, delayed, or pixelated - the Operator decides exactly what you are able to discern.

Replay

(••, Range: Short, Runtime: Stretch, Faction: Operatives, Exile)

Comms; by causing the chronological subroutines of a virtual space to run in reverse to a specific time index, you may observe events that have transpired in the past at the location where you are. Compilation level one allows you to index up to a few hours, compilation level two allows for up to one day, and compilation level three allows you to index further back. The presentation is a holographic representation of the events and may be inaccurate, fragmented, or encrypted - the Operator decides exactly what you can see.

SitRep

(•, Range: Medium, Runtime: Immediate, Faction: All)

General, Comms; allows you to send a ping in all directions to determine the location of nearby friendly or allied units. A single success will allow you to make this determination up to 25 meters, this information will be limited to the location of the units. Overclocking can provide additional details such as identifiers, observable status, and availability for supporting you. This routine cannot reveal information about nearby hostile or neutral units.

Subspecies Comms

(•, Range: Short, Runtime: Stretch, Faction: All)

Comms; this routine allows you to interface with local faunae sims, within the limitations of their systemic parameters. You can ask a number of questions equal to the compilation level of the routine. The sim can tell you what it has observed, but they are limited to the confines of their programming and processing, making their answers potentially difficult to interpret.

Subversive Signal

(•••, Range: Engaged, Runtime: Immediate, Faction: All)

Masking; you broadcast harmony and serenity around you with this routine, which helps you in social conflicts. The subject of the routine will do what you want, without a roll to Persuade them.

Visual Filter

(••, Range: Personal, Runtime: Immediate, Faction: All)

Masking; by attuning your virtual visual cortex to the local spectral subroutines for sensitivity, you are able to move without being seen under normal conditions. Visual subroutines that render objects within its space along other spectra may still render you as visible. You may execute this routine instead of rolling Stealth, and you will succeed automatically. Each compilation level counts as one success.

Wrenching Strike

(••, Range: Engaged, Runtime: Immediate, Faction: All)

Offensive; you can strike your opponent with the force of about 1,200 PSI unarmed. You hit automatically and cause damage equal to the compilation level. This attack cannot be dodged or parried, but armor has normal effect. You cannot have a weapon readied in your striking hand.

Top