Design and utilise - or counter - hostile surveillance and tracking software, infecting both computers, gadgets and even tech modules.
Roll d100 + skill bonus vs. DR 100
Plant software in a target unit, enabling you to track it and monitor its functions. The Spyware Design skill can also be used to set up firewalls or similar to protect devices and tech modules.
If you have successfully infected a device you can track it and monitor its use. You gain a +20 bonus to defend against any tracked tech module.
For every 2 ranks in this skill you gain a free rank in the Hacking skill.
+20 DR for military or heavy duty security software
+10 DR under time pressure (in battle situations)
-20 DR against unsuspecting or friendly targets
-10 DR against inferior technology
When targeting tech modules modify DR with target's Resilience bonus + Tech Category Bonus.
While your envoy colleague is negotiating with Themis the Cybermancer, you infect his Cybernetics-module enabling you to track him and counter his Claw Implant attacks (since you know exactly when they're coming) with +20. Roll d100 + skill bonus against DR 100 + resilience bonus + Themis' cybernetics category bonus.
You plant a trojan horse surveillance malware in a clan comrades computer - enabling you to physically track his movements. DR 80 (100 -20 for friendly target).
The Design Spyware skill represents a character’s expertise in creating, deploying, and countering advanced surveillance and tracking software. This skill is not merely about writing code—it’s about understanding the intricate dance of infiltration, deception, and digital warfare. Characters proficient in this skill can craft malicious software capable of infiltrating secure systems, monitoring targets undetected, and extracting or manipulating data. They can also design countermeasures to detect, neutralize, or even reverse-engineer hostile spyware deployed by adversaries.
A master of Design Spyware knows how to exploit vulnerabilities in both hardware and software, tailoring their creations to specific targets—whether it’s a corporate mainframe, a personal gadget, or even the tech modules embedded in cybernetic implants. They understand the importance of stealth, ensuring their software operates silently, evading detection by firewalls, intrusion detection systems, and even skilled cybersecurity professionals.
Beyond creation, they can also analyze and dismantle enemy spyware, turning the tables on those who seek to monitor or sabotage their allies.
May be sequenced with for example Pick Pockets, Sleight of Hands, Eavesdrop or even a Hide skill. Makes for good Signature Moves.
Spyware Design as well as Hacking - reversed - can be used to counter Spyware Design. Roll opposed skill rolls.