Difference between revisions of "SR5:Security:Device"
(Created page with "{{SR5:List Navigation}} {{SR5:Gear Navigation}} {{SR5:Security Navigation}} <center> {| class="sortable wikitable" style="text-align:center;" !TYPE!!NAME!!AVAIL!!COST!!SOURCE...") |
m (→Maglocks) |
||
(One intermediate revision by the same user not shown) | |||
Line 14: | Line 14: | ||
|} | |} | ||
</center> | </center> | ||
+ | |||
==Key/Combination lock (Rating 1-6)== | ==Key/Combination lock (Rating 1-6)== | ||
Line 24: | Line 25: | ||
Transponder-embedded keys contain a calibrated resistor that completes a circuit in the lock. In order to pick such a lock by hand, an electronics kit is needed to generate the appropriate electrical characteristics. This requires a successful Hardware + Logic [Mental] (Lock Rating, 1 minute) Extended Test at the same time the lock is picked. If the same character is picking the lock and calibrating the electrical feed, apply a –2 dice pool modifier to both tests. | Transponder-embedded keys contain a calibrated resistor that completes a circuit in the lock. In order to pick such a lock by hand, an electronics kit is needed to generate the appropriate electrical characteristics. This requires a successful Hardware + Logic [Mental] (Lock Rating, 1 minute) Extended Test at the same time the lock is picked. If the same character is picking the lock and calibrating the electrical feed, apply a –2 dice pool modifier to both tests. | ||
+ | |||
+ | |||
+ | ==Maglock== | ||
+ | {{SR5:Special Item Template | ||
+ | |Availability=Rating | ||
+ | |Cost= Rating x 100 | ||
+ | }} | ||
+ | |||
+ | Powered magnetic locks, maglocks, are widespread in 2075 and come in a wide range of sophistication. Maglock “keys” can be physical (keypad, swipe card, proximity card, memory string), biometric (see below), or any combination thereof. Maglocks are often accessible via the local network (wired or wireless) and may be monitored by a security hacker/rigger. Maglock systems often log all usages, keeping track of the time, date, and identity of each user. The first step to bypassing a maglock is to remove the case and access the maglock’s electronic guts. This requires a successful Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test. If all else fails, the case can be smashed or shot off; treat the case as if it has a Barrier rating equal to the maglock rating. Overzealous attempts to break the case may harm the electronics inside. Re-assembling the case afterwards requires the same test. | ||
+ | |||
+ | ===Anti-tamper circuits (Rating 1-4)=== | ||
+ | {{SR5:Special Item Template | ||
+ | |Availability=+Rating | ||
+ | |Cost= +Rating x 250 | ||
+ | }} | ||
+ | |||
+ | Some maglock systems come equipped with anti-tamper systems, rated between 1 and 4. In order to bypass the anti-tamper circuits, an additional Locksmith + Agility [Physical] (anti-tamper system rating) Test must be made. If this fails, an alarm is triggered. | ||
+ | |||
+ | ===Keypad or card reader=== | ||
+ | {{SR5:Special Item Template | ||
+ | |Cost= +50 | ||
+ | }} | ||
+ | |||
+ | Keypads utilize an access code (often different access codes for different users). Unless the code is known, defeating a keypad requires rewiring the internal electronics. This means cracking open the case (see above) and then rewiring the circuits-another Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test. A [[SR5:Security:B&E Gear#Sequencer (Rating 1-6)|maglock sequencer]] may also be used instead; make an Opposed Test between the sequencer and maglock ratings. If the sequencer wins, the maglock opens. (Note that the case must still be opened for a sequencer to be applied.) | ||
+ | |||
+ | Cardreaders verify the authenticity of swipe cards or RFID proximity cards. They can be defeated using the same method as for keypads—by removing the case and tampering with the works. [[SR5:Security:B&E Gear#Maglock Passkey (Rating 1-4)|Maglock passkeys]] may also be used to defeat cardreaders and don’t require breaking the case open. If a valid keycard is acquired, it can be copied with a [[SR5:Security:B&E Gear#Keycard copier (Rating 1-6)|keycard copier]] in order to create a forged keycard. Make an Opposed Test between the passkey/forged keycard rating and the maglock rating. If the passkey/forged keycard wins, the maglock opens. | ||
+ | |||
+ | ===Biometric Reader=== | ||
+ | {{SR5:Special Item Template | ||
+ | |Availability= +4 | ||
+ | |Cost= +200 | ||
+ | }} | ||
+ | |||
+ | Print scanners scan fingerprints, palm prints, retinal prints, or even the pattern of blood vessels in the face or palm. One method to defeat a print scanner is to coerce an authorized user to apply their prints. Alternately, a synthetic print glove-like membrane (a “sleeve”) can be manufactured for fingerprints and thumbprints with a [[SR5:Security:B&E Gear#Cellular glove molder (Rating 1-4)|cellular glove molder]] (an authorized print is necessary to copy from). Retinal prints may also be duplicated with the [[SR5:Cyberware:Eye#Retinal Duplication (Rating 1-6)|retinal duplication cybereye accessory]]. If a fake print is used, make an Opposed Test between the duplicate and the maglock rating; if the fake wins, the maglock accepts it. | ||
+ | |||
+ | Voice recognition systems require a vocal response from an approved user’s voice, usually within a certain amount of time. If the response is not given within the time limit, or someone not approved answers, the system sounds an alarm. Characters can only defeat voice recognition systems by “speaking” with the voice of an approved user—by using a recording, some other simulation, or the real voice. [[SR5:Cyberware:Head#Voice Modulator (Rating 1-6)|Voice modulator cyberware]] can also be used. An Opposed Test must be made between the voice recognition system and the equipment used to bypass it; whichever generates more hits, wins. | ||
+ | |||
+ | Breath, cellular, and DNA scanners collect a sample of the user’s cells, either off the finger/palm, via hair suction, through exhaled particles, or something similar, and analyze the genetic material. In order to fool such a system, you need a sample of the correct genetic material, preserved in a specially formulated enzyme bath. The enzyme bath can be synthesized in a chemistry shop with a Chemistry + Logic (5, 1 hour) Extended Test. | ||
+ | |||
+ | Facial recognition scanners use imaging lasers, thermographic, and/or ultrasonic waves to map a person’s face. These are one of the least intrusive, but also least accurate, biometric recognition systems. Facial recognition systems are useful not just for letting authorized people in, but also for identifying unwanted people and keeping them out. Prosthetic makeup and biosculpting can be used with varying degrees of effectiveness against facial recognition; make an Opposed Test pitting Disguise + Intuition [Mental] against the Device rating. Apply a +2 dice pool modifier to the character if the system is picking the disguised character out of a crowd. |
Latest revision as of 23:18, 13 October 2017
5th Edition Lists |
---|
Gear // Magic // Hacking // Skills // Qualities // Packs // Creatures |
Armor/Clothing // Cyberware // Magical // Vehicles/Drones // Vehicle Mods // Weapons // Electronics // Security // Medical // Others |
Devices | Restraints | B&E Gear | Grapple Guns | Communications | Battering Rams |
---|
TYPE | NAME | AVAIL | COST | SOURCE |
---|---|---|---|---|
Device | Key/Combination lock (Rating 1-6) | Rating | Rating x 10¥ | Core |
Device | Maglock | Rating | Rating x 100¥ | Core |
Device | Keypad or card reader | - | +50¥ | Core |
Device | Anti-tamper circuits (Rating 1-4) | +Rating | +(Rating x 250)¥ | Core |
Device | Biometric reader | +4 | +200¥ | Core |
Contents
Key/Combination lock (Rating 1-6)
| ||||||||
Key locks are the simplest kind, involving the use of tumblers and metal keys or combination code dials to open doors instead of cards or some other device. They are also not in very common use due to reliance on more sophisticated means of security, but some places (like private safes or low-end businesses) may still use them out of nostalgia, because they can’t afford better, or because rarity equates to better security. Defeating a key lock requires a Locksmith + Agility [Physical] (Lock Rating, 1 Combat Turn) Extended Test. Autopickers add their Rating in dice to this test; you may also roll their Rating in place of the Locksmith skill.
Transponder-embedded keys contain a calibrated resistor that completes a circuit in the lock. In order to pick such a lock by hand, an electronics kit is needed to generate the appropriate electrical characteristics. This requires a successful Hardware + Logic [Mental] (Lock Rating, 1 minute) Extended Test at the same time the lock is picked. If the same character is picking the lock and calibrating the electrical feed, apply a –2 dice pool modifier to both tests.
Maglock
| ||||||||
Powered magnetic locks, maglocks, are widespread in 2075 and come in a wide range of sophistication. Maglock “keys” can be physical (keypad, swipe card, proximity card, memory string), biometric (see below), or any combination thereof. Maglocks are often accessible via the local network (wired or wireless) and may be monitored by a security hacker/rigger. Maglock systems often log all usages, keeping track of the time, date, and identity of each user. The first step to bypassing a maglock is to remove the case and access the maglock’s electronic guts. This requires a successful Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test. If all else fails, the case can be smashed or shot off; treat the case as if it has a Barrier rating equal to the maglock rating. Overzealous attempts to break the case may harm the electronics inside. Re-assembling the case afterwards requires the same test.
Anti-tamper circuits (Rating 1-4)
| ||||||||
Some maglock systems come equipped with anti-tamper systems, rated between 1 and 4. In order to bypass the anti-tamper circuits, an additional Locksmith + Agility [Physical] (anti-tamper system rating) Test must be made. If this fails, an alarm is triggered.
Keypad or card reader
| ||||||||
Keypads utilize an access code (often different access codes for different users). Unless the code is known, defeating a keypad requires rewiring the internal electronics. This means cracking open the case (see above) and then rewiring the circuits-another Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test. A maglock sequencer may also be used instead; make an Opposed Test between the sequencer and maglock ratings. If the sequencer wins, the maglock opens. (Note that the case must still be opened for a sequencer to be applied.)
Cardreaders verify the authenticity of swipe cards or RFID proximity cards. They can be defeated using the same method as for keypads—by removing the case and tampering with the works. Maglock passkeys may also be used to defeat cardreaders and don’t require breaking the case open. If a valid keycard is acquired, it can be copied with a keycard copier in order to create a forged keycard. Make an Opposed Test between the passkey/forged keycard rating and the maglock rating. If the passkey/forged keycard wins, the maglock opens.
Biometric Reader
| ||||||||
Print scanners scan fingerprints, palm prints, retinal prints, or even the pattern of blood vessels in the face or palm. One method to defeat a print scanner is to coerce an authorized user to apply their prints. Alternately, a synthetic print glove-like membrane (a “sleeve”) can be manufactured for fingerprints and thumbprints with a cellular glove molder (an authorized print is necessary to copy from). Retinal prints may also be duplicated with the retinal duplication cybereye accessory. If a fake print is used, make an Opposed Test between the duplicate and the maglock rating; if the fake wins, the maglock accepts it.
Voice recognition systems require a vocal response from an approved user’s voice, usually within a certain amount of time. If the response is not given within the time limit, or someone not approved answers, the system sounds an alarm. Characters can only defeat voice recognition systems by “speaking” with the voice of an approved user—by using a recording, some other simulation, or the real voice. Voice modulator cyberware can also be used. An Opposed Test must be made between the voice recognition system and the equipment used to bypass it; whichever generates more hits, wins.
Breath, cellular, and DNA scanners collect a sample of the user’s cells, either off the finger/palm, via hair suction, through exhaled particles, or something similar, and analyze the genetic material. In order to fool such a system, you need a sample of the correct genetic material, preserved in a specially formulated enzyme bath. The enzyme bath can be synthesized in a chemistry shop with a Chemistry + Logic (5, 1 hour) Extended Test.
Facial recognition scanners use imaging lasers, thermographic, and/or ultrasonic waves to map a person’s face. These are one of the least intrusive, but also least accurate, biometric recognition systems. Facial recognition systems are useful not just for letting authorized people in, but also for identifying unwanted people and keeping them out. Prosthetic makeup and biosculpting can be used with varying degrees of effectiveness against facial recognition; make an Opposed Test pitting Disguise + Intuition [Mental] against the Device rating. Apply a +2 dice pool modifier to the character if the system is picking the disguised character out of a crowd.