101 Data Retrieval
Mission Objectives
Each player must attempt to hack computer terminals and transmit the data back to their side. Each system is self-contained. The data must be hacked from one terminal and then transmitted back from another terminal.
Forces:
Players must agree on a force size. The force must contain at least 1 hacker. Players do not have to pay the SWC cost for a single hacker for their force.
Deployment:
Roll for first turn/deployment as normal.
Scenario Set-Up:
Deploy terrain as normal. Five Counters will be used to represent terminal locations. The terminal should be at least the size of a 25mm base and no larger than a poker chip. One terminal will be placed in the center of table. Four more terminals will be places 12” from the center terminal along the horizontal and vertical center lines of the table.
Scenario Special Rules:
• A hacker must be in base to base contact with a terminal to hack the terminal.
• Terminals may not be hacked through a repeater of any kind.
• Hacking a terminal to retrieve the date requires 2 short actions:
o Hacking the terminal security (Hack vs. BTS-6)
o Retrieving the data (Hack vs. BTS 0)
• Once the data is retrieved it must be transmitted from a different terminal. This requires base contact with the transmitting terminal and two short skills:
o Hacking the transmitting terminal (Hack vs. BTS -6)
o Transmit the Data (Hack vs. BTS 0)
• Defensive Hacking
o Enemy Hackers in base to base with any terminal may attempt to defensively hack as normal, against the hack attack on the terminal or against the transmission of the data.
• Transmitting the Data between hackers
o If a terminal is successfully hacked and the data is successfully retrieved the data can be transmitted to another hacker of the same player.
o Transmission requires a successful WIP roll on a long order. If successful the data has been transmitted to a new hacker.
o Intercepting transmission- When the enemy attempts to transmit the data between hackers a defensive hacking may take place to cancel the transmission. On a critical roll the defensive hacker has obtained the enemies data.
End of Mission
Victory points are scored for each piece of data transmitted back to the player’s side.
Each successful transmission of data scores 1 VP. The player with the most Victory Points at the end of the game is the winner.