Star Wars - Episode III.V - Rebellion Ascendant
Hyper Transceiver Tapping
If someone wants to tap into a HyperTransceiver to use it for their own goal, the following guidelines are applied:
1) Locate a vessel or installation with an operational HT
There are several tell-tale signs of operational HT’s on a vessel or installation. If someone knows what to look for, complex antenna and transmission arrays can reveal the operation of such a device.
2) Locate the frequencies in which an HT operates.
This is a complex process that requires a lot of expensive hardware (essentially, devices similar to HSI’s), some careful positioning and aiming and a lot of computer skill. Once a location with an HT has been identified, two steps are needed, Installing the HSI and Scanning the Frequencies.
- Installing the HSI
A Computer Programming / Repair (Difficulty: Difficult) is required to properly aim the HSI to
“intercept” the signals leaving the HT. If no tools are used, apply a +20 to the difficulty. If it is done in space with vacuum suits, apply a +5 to the difficulty. Success indicates the proper positioning. If the roll fails by more than 10, the aiming is completely wrong, making it impossible to utilize the HSI. For failures of 1 to 10 less than the difficulty, note the margin of failure, to be used as a modifier elsewhere. This operation takes 2 hours, plus one hour per aiming attempt (minimum of 3 hours).
- Scanning the Frequencies
Once properly set up, the HSI can be used to scan frequencies emitted from the HT. This is a mundane process in which the HSI simply “records” frequencies. However, a competent slicer can filter the clutter of emitions and keep only the frequencies that are being accelerated into hyperspace. This is a complex computer task, requiring several hours of scanning in order to discern the actual frequencies from the fake ones. One Communications check can be made every four hours. Apply the appropriate computer program rating as a bonus and the aiming failure margin (from above, if it was from 1 to 10) as a negative modifier to this roll. The Difficulty is Very Difficult. Success indicates that the frequencies are obtained.
3) Locate Access Codes
Once the proper frequencies have been detected, it is possible to transmit messages to the HT’s location by using them to access the HT and, if the proper authorization codes are supplied, use that particulat HT to transmit a message to those frequencies. Finding the codes might require several ways. Either slicing a mainframe, bribing an official or stealing a physical record that contains them. Generally, the codes are requested at the initiation of communication and they are not transmitted as part of the message.
4) Tap in Hyper-Transceiver
Once the access codes are secured, one must connect to the HT. Trying to do so without the proper codes is a Heroic+20 Communications roll. With the access codes, the situation is different. If the access is taking place outside the HT’s location, a moderate roll is required. If the sender is trying to keep the originating location masked then it is a Very Difficult roll. If the transmission is taking place from within the same location of the HT, it is an easy roll, modified to Difficult for masking the originating room. This is called the tapping roll.
Opposing HT operators get a single roll to detect the intruder at each tapping attempt. If the intruder fails his roll, consider the detection roll automatically successful, otherwise use the intruder’s total as the Difficulty of the detection roll. With a successful detection roll (Communications skill), the HT operator knows the HT is being tapped and whether this is happening from within the HT’s installation or from the outside. A second detection roll will determine the exact location of the intruder’s terminal. Difficulty for this roll is the same as the modified intruder’s tapping roll. E.g. Moderate outside an installation, modified to Very Difficult if he’s trying to mask his location. Or Easy, for within an installation modified to Difficult if the intruder is masking its location.
Once an active tap has been secured, the intruder may begin broadcasting their message. A single Communications roll is required, with the additional computer bonus of the intruder’s program rating. The total is the Difficulty for any attempt to detect that the HT is being tapped. Broadcasting is simply that. Relaying one piece of information from one end to the other. Whether a message is encoded or not, has nothing to do with the actual broadcast and any encryption or other safety measures are traits of the message itself.