Results 1 to 10 of 14

Thread: Infinity Starter League Week 1 Scenario

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Senior Member
    Join Date
    Feb 2011
    Posts
    545

    Infinity Starter League Week 1 Scenario

    101 Data Retrieval

    Mission Objectives
    Each player must attempt to hack computer terminals and transmit the data back to their side. Each system is self-contained. The data must be hacked from one terminal and then transmitted back from another terminal.

    Forces:
    Players must agree on a force size. The force must contain at least 1 hacker. Players do not have to pay the SWC cost for a single hacker for their force.

    Deployment:
    Roll for first turn/deployment as normal.

    Scenario Set-Up:
    Deploy terrain as normal. Five Counters will be used to represent terminal locations. The terminal should be at least the size of a 25mm base and no larger than a poker chip. One terminal will be placed in the center of table. Four more terminals will be places 12” from the center terminal along the horizontal and vertical center lines of the table.

    Scenario Special Rules:
    • A hacker must be in base to base contact with a terminal to hack the terminal.
    • Terminals may not be hacked through a repeater of any kind.
    • Hacking a terminal to retrieve the date requires 2 short actions:
    o Hacking the terminal security (Hack vs. BTS-6)
    o Retrieving the data (Hack vs. BTS 0)
    • Once the data is retrieved it must be transmitted from a different terminal. This requires base contact with the transmitting terminal and two short skills:
    o Hacking the transmitting terminal (Hack vs. BTS -6)
    o Transmit the Data (Hack vs. BTS 0)
    • Defensive Hacking
    o Enemy Hackers in base to base with any terminal may attempt to defensively hack as normal, against the hack attack on the terminal or against the transmission of the data.
    • Transmitting the Data between hackers
    o If a terminal is successfully hacked and the data is successfully retrieved the data can be transmitted to another hacker of the same player.
    o Transmission requires a successful WIP roll on a long order. If successful the data has been transmitted to a new hacker.
    o Intercepting transmission- When the enemy attempts to transmit the data between hackers a defensive hacking may take place to cancel the transmission. On a critical roll the defensive hacker has obtained the enemies data.

    End of Mission
    Victory points are scored for each piece of data transmitted back to the player’s side.

    Each successful transmission of data scores 1 VP. The player with the most Victory Points at the end of the game is the winner.
    Last edited by evil homer; 05-16-2013 at 08:23 AM.
    Quote Originally Posted by Splug View Post
    I'll allow it. In fact, I'll approve. You may proceed.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •