Page 1 of 2 12 LastLast
Results 1 to 10 of 14

Thread: Infinity Starter League Week 1 Scenario

  1. #1
    Senior Member
    Join Date
    Feb 2011
    Posts
    545

    Infinity Starter League Week 1 Scenario

    101 Data Retrieval

    Mission Objectives
    Each player must attempt to hack computer terminals and transmit the data back to their side. Each system is self-contained. The data must be hacked from one terminal and then transmitted back from another terminal.

    Forces:
    Players must agree on a force size. The force must contain at least 1 hacker. Players do not have to pay the SWC cost for a single hacker for their force.

    Deployment:
    Roll for first turn/deployment as normal.

    Scenario Set-Up:
    Deploy terrain as normal. Five Counters will be used to represent terminal locations. The terminal should be at least the size of a 25mm base and no larger than a poker chip. One terminal will be placed in the center of table. Four more terminals will be places 12” from the center terminal along the horizontal and vertical center lines of the table.

    Scenario Special Rules:
    • A hacker must be in base to base contact with a terminal to hack the terminal.
    • Terminals may not be hacked through a repeater of any kind.
    • Hacking a terminal to retrieve the date requires 2 short actions:
    o Hacking the terminal security (Hack vs. BTS-6)
    o Retrieving the data (Hack vs. BTS 0)
    • Once the data is retrieved it must be transmitted from a different terminal. This requires base contact with the transmitting terminal and two short skills:
    o Hacking the transmitting terminal (Hack vs. BTS -6)
    o Transmit the Data (Hack vs. BTS 0)
    • Defensive Hacking
    o Enemy Hackers in base to base with any terminal may attempt to defensively hack as normal, against the hack attack on the terminal or against the transmission of the data.
    • Transmitting the Data between hackers
    o If a terminal is successfully hacked and the data is successfully retrieved the data can be transmitted to another hacker of the same player.
    o Transmission requires a successful WIP roll on a long order. If successful the data has been transmitted to a new hacker.
    o Intercepting transmission- When the enemy attempts to transmit the data between hackers a defensive hacking may take place to cancel the transmission. On a critical roll the defensive hacker has obtained the enemies data.

    End of Mission
    Victory points are scored for each piece of data transmitted back to the player’s side.

    Each successful transmission of data scores 1 VP. The player with the most Victory Points at the end of the game is the winner.
    Last edited by evil homer; 05-16-2013 at 08:23 AM.
    Quote Originally Posted by Splug View Post
    I'll allow it. In fact, I'll approve. You may proceed.

  2. #2
    Senior Member
    Join Date
    Feb 2011
    Posts
    545
    I have no idea how this scenario will play out. We'll see.

    Rather than setting match-ups I'm going to see how much actual participation we have show up. In general from week to week play against a different faction from your own and against a person you did not play against last week.

    I will be bringing 2 tables worth of Infinity Terrain to the store tonight so we may not have to cannibalize much of the 40k stuff.
    Last edited by evil homer; 05-16-2013 at 08:24 AM.
    Quote Originally Posted by Splug View Post
    I'll allow it. In fact, I'll approve. You may proceed.

  3. #3
    Senior Member Korwen's Avatar
    Join Date
    Oct 2010
    Posts
    256
    I haven't received my models yet, maybe I will get them sometime this week. I'm planning on showing up to the store tonight to maybe watch or get a demo game in if anyone is willing to let me borrow some models. Thanks again for this, I'm looking forward to participating with my Imperial Service army

  4. #4
    Senior Member
    Join Date
    Feb 2011
    Posts
    545
    Again this is super casual so no problem. Really this is just an excuse to play with Scenarios instead of straight kill scenarios, and for people to be exposed to as many different armies and rules portions as possible.
    Quote Originally Posted by Splug View Post
    I'll allow it. In fact, I'll approve. You may proceed.

  5. #5
    Senior Member
    Join Date
    Sep 2010
    Posts
    965
    Scenario looks interesting, nice work!
    Quote Originally Posted by Rigphoria
    lying and bluffing is shockingly easy.
    Quote Originally Posted by Splug
    You say that, but if I'm dealt a Cylon card I've got about half a turn before Steve throws me out an airlock
    Quote Originally Posted by Rigphoria
    steve can detect his own kind. that doesn't count.

  6. #6
    Senior Member BDub's Avatar
    Join Date
    Sep 2010
    Posts
    684
    what if the repeater is in base contact with the terminal, jeesh!?

    btw, Does Ariadna even have hackers? Is anyone playing Ariadna?
    Last edited by BDub; 05-16-2013 at 11:15 AM.

  7. #7
    Senior Member Psyberwolfe's Avatar
    Join Date
    Sep 2010
    Location
    ATX
    Posts
    1,176
    I'm Playing Ariadna. No we don't have hackers but I have access to the merc hacker Valerya Gromoz. Since we're just starting how about low point builds between 150 and 200 pts?
    póg mo thóin
    If I tell you, "You're wrong," you'll need to click this.

    Does anybody else find it odd, by the way, that the information age has led to language becoming an oblique and imprecise tool where even the most straightforward phrasing is pored over with chicken entrails and bone tossing to divine the true meaning?

  8. #8
    Senior Member
    Join Date
    Feb 2011
    Posts
    545
    You can play any size game you and your opponent agree on. I think 150 is very reasonable for new players.

    I may look at a specific victory condition for Ariadne but since these scenarios are meant to both playable and teachable, so the rules get learned, I will probably leave it as is.
    Quote Originally Posted by Splug View Post
    I'll allow it. In fact, I'll approve. You may proceed.

  9. #9
    Senior Member Psyberwolfe's Avatar
    Join Date
    Sep 2010
    Location
    ATX
    Posts
    1,176
    Don't worry about the hacker stuff I can take one. If my opponent kills her then I'll have to table them.
    póg mo thóin
    If I tell you, "You're wrong," you'll need to click this.

    Does anybody else find it odd, by the way, that the information age has led to language becoming an oblique and imprecise tool where even the most straightforward phrasing is pored over with chicken entrails and bone tossing to divine the true meaning?

  10. #10
    Senior Member
    Join Date
    Sep 2010
    Posts
    965
    Quote Originally Posted by Psyberwolfe View Post
    Don't worry about the hacker stuff I can take one. If my opponent kills her then I'll have to table them.
    Hrm. Y'know, if I had read this I wouldn't have played the game expecting you to pop another hacker out of stealth at the last second. Not that you didn't make it clear (and that I didn't kind of tip my hand in doing that).

    The mission itself was simple enough to follow; a few questions came up but I think we had basically the same idea for how to handle them and just needed confirmation.

    The new terrain created some great LoS-block obstacles, but I did notice getting cover was much harder (especially once I figured out that I'd been mentally superimposing the Dust rules for cover, not the Infinity rules...). Without the Gears of War effect (aka, chest high walls for the masses) most fire basically came down to "I can see you cleanly" or "I cannot see you," with a few notable exceptions where one or two models got around a corner to fire. Not sure if that's good/bad/otherwise for game balance - just an observation that getting cover for a shot was much rarer than my games with the pipe terrain.
    Quote Originally Posted by Rigphoria
    lying and bluffing is shockingly easy.
    Quote Originally Posted by Splug
    You say that, but if I'm dealt a Cylon card I've got about half a turn before Steve throws me out an airlock
    Quote Originally Posted by Rigphoria
    steve can detect his own kind. that doesn't count.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •