Computers in the Verge and Bleed
Average Tech Level: TL 11
Associated Skills: Computer Operation/TL11 (IQ/E), Computer Programming/TL11 (IQ/H), Current Affairs/TL11 (Any) (IQ/E), Electronics Operation/TL11 (Media, Medical, Scientific, and Sensors) (IQ/A), Electronics Repair/TL11 (Computers, etc.) (IQ/A), Engineering/TL11 (Electronics) (IQ/H) [Nanoelectronics] (IQ/A) [Microelectronics] (IQ/A); Expert Skill (Computer Security) (IQ/H), Mathematics/TL11 (Computer Science) (IQ/H), Research/TL11 (IQ/A), Typing (DX/E), Writing (IQ/A).
Associated Skills: Computer Operation/TL11 (IQ/E), Computer Programming/TL11 (IQ/H), Current Affairs/TL11 (Any) (IQ/E), Electronics Operation/TL11 (Media, Medical, Scientific, and Sensors) (IQ/A), Electronics Repair/TL11 (Computers, etc.) (IQ/A), Engineering/TL11 (Electronics) (IQ/H) [Nanoelectronics] (IQ/A) [Microelectronics] (IQ/A); Expert Skill (Computer Security) (IQ/H), Mathematics/TL11 (Computer Science) (IQ/H), Research/TL11 (IQ/A), Typing (DX/E), Writing (IQ/A).
Computers and Networks
The invention of the computer has happened several times in human history; by themselves, computers are usually nothing more than fancy calculators. However, the true genius of computers is figuring out how to make them talk to one another; the coding protocol necessary to make computers talk to one another is what makes networks possible. Throughout the Verge and Bleed, players will run into numerous different networks with different permissions that connect to different standards. However, they always fall one of three types of network: mesh networks or girds. Mesh networks are highly informal networks that are created by users; these networks can be as simple as two computers linked together or as complicated as a municipal area mesh managed by the population. Mesh networks are often highly decentralized affairs, without any sort of governing authority, and they often arise organically to fill the need of computer networks in an area without a central authority to oversee it. Using a Mesh requires a Research check or even Computer Programming check whenever you want to look up information on it, because the wealth of information and the chaotic organization of it make it hard to sort through.
Grids, on the other hand, are large, centralized and structured networks that make use of large state-owned or government-owned (or in the case of etairism, often times private entities contracted through the government) nodes that act as focal points for network. This helps establish a more centralized and secure internet, since everyone has to connect to the nodes before they can connect to others and the nodes can check networking connects, clock information usage, and the like, and allow for greater safety. Since grids centralize around nodes (also sometimes called vertices) they earn that name despite the local network topology. Using a Grid requires a Computer Operations check whenever you want to look up information on it, because the information tends to follow a more organized and common protocols are employed to ensure that all devices that share those protocols can access that information. If you don't share the protocol, it's often a matter of installing or, failing that, using Computer Programming as if it were a Mesh. These protocols are often connected with other aspects of AGI development to form what are called ontologies, which is a separate matter. The Verge and Bleed have largely been using the same ontology now since the end of the Verge War, but this isn't universally true everywhere.
The two structures are not mutually exclusive. Mesh nets can exist as small nets within grids; in this case, a grid is often public access and anyone with a public key can access the grid, while mesh networks are often private or owned by small groups, and usually take the form of a LAN (local area network) or PAN (personal area network). As one can imagine, the appearance of mesh networks goes down as the authoritarian tendencies of the polity increase; in anarchist and libertarian habitats, there are nothing but mesh networks and no centralized grid to speak of, while in Nariac and the Imperium, there are no mesh nets and everything goes through a Grid. Most meta-empires and nations try to strike a balance between the two.
Grids, on the other hand, are large, centralized and structured networks that make use of large state-owned or government-owned (or in the case of etairism, often times private entities contracted through the government) nodes that act as focal points for network. This helps establish a more centralized and secure internet, since everyone has to connect to the nodes before they can connect to others and the nodes can check networking connects, clock information usage, and the like, and allow for greater safety. Since grids centralize around nodes (also sometimes called vertices) they earn that name despite the local network topology. Using a Grid requires a Computer Operations check whenever you want to look up information on it, because the information tends to follow a more organized and common protocols are employed to ensure that all devices that share those protocols can access that information. If you don't share the protocol, it's often a matter of installing or, failing that, using Computer Programming as if it were a Mesh. These protocols are often connected with other aspects of AGI development to form what are called ontologies, which is a separate matter. The Verge and Bleed have largely been using the same ontology now since the end of the Verge War, but this isn't universally true everywhere.
The two structures are not mutually exclusive. Mesh nets can exist as small nets within grids; in this case, a grid is often public access and anyone with a public key can access the grid, while mesh networks are often private or owned by small groups, and usually take the form of a LAN (local area network) or PAN (personal area network). As one can imagine, the appearance of mesh networks goes down as the authoritarian tendencies of the polity increase; in anarchist and libertarian habitats, there are nothing but mesh networks and no centralized grid to speak of, while in Nariac and the Imperium, there are no mesh nets and everything goes through a Grid. Most meta-empires and nations try to strike a balance between the two.
Making a Personal area network (PAN)One of the most important skills a person can learn how to do in the Verge and Bleed, and that is taught in every elementary classroom, is how to make a PAN, or a personal area network. This allows the user to synch all their devices to the same source, allowing for ease of access and control over the network and associated devices. It also improves security, because there's only one way to attack a PAN and that's to go through the front door, which is usually well protected by anti-malware apps and both hardware and software firewalls. Other benefits include off-loaded processing, which allows the source device to run better, and ease of access.
The first step to making a PAN (or a LAN, for that matter) is to ensure that you have the right software running on all your devices. Free versions can usually be found online with a proper Computer Operations check or with a Research check, depending on the local network type. Once all the devices are running the proper program, designate a device to be the director; the other devices are called agents. Since the director receives additional processing power from the other devices, it's usually wise to make the director the computer that has the most processing power normally. Once you've determined which device is the director, you make a Computer Operations check for each device to link it up. Once all the devices are linked up, they cannot be accessed except through the director device, and so only the director device needs to run anti-malware apps and be equipped with a firewall. Furthermore, for each agent device, the Director device receives 1/4 of their listed Complexity (minimum 1) as a bonus to its Complexity. So a personal computer with Complexity 5 that is linked to four small computers of Complexity 4 adds +4 Complexity to its score; so the personal computer acting as the director device is treated as having a Complexity 9, not Complexity 5, so long as it acts as the director. Furthermore, the only way to access the agent devices is through the director device, which means getting direct access to a device that the user generally has on them at all times. Thus, the director device can be fitted out with the best defensive software available and it protects all associate devices - but once it's compromised, so is every device. |
HAcking ComputersGiven the high security nature of the world, there are only a few ways to actually hack into a computer. The most direct way to do this is to program intrusion software, or to download intrusion software, although most crackers often use this as a last resort. A much better way is social engineering. No matter how smart or advanced the civilization is, humans are still humans, and so schemes like phishing messages and other deception tactics are often very effective at getting most people to reveal their data; this is a combination of Fast-Talk and Writing, and requires Computer Operation. The degree of success on Fast-Talk (which doesn't gain any bonuses due to Appearance, Voice, Charisma, or the like) provides a bonus to the Writing of the message. It's tested against the individual's IQ (or, if they have Gullibility, they make a self control check to see if they believe it instead). If the check is successful, the the hacker often gains access to all the personal data that they need; no spoofing or exploiting is necessary.
In other instances, it's possible to spoof your way into a system; this is done using a Spoofer and a Sniffer. The Sniffer detects and maps non-encrypted traffic with a successful Computer Operations check, while a successful Research check on the data acquired can provide a bonus on the Spoofing check. This is a Computer Operations check that, if successful, allows the user to spoof privileges they don't have, so they can sneak in. The better the success, the more privileges they have access too. However, if they fail, or if they are caught (with an Expert Skill [Computer Security] check), then they can be dumped from the system by the admin or by security. Once in a system, they can install a backdoor program (which requires another opposed check), or run malware of various types. The last way is the direct way, which uses exploit software and is an opposed Computer Operations v. Computer Operation test, where the hacker rolls against the system defense (even if it is just a firewall). On a success, they can get in, but the system knows of their presence and can act accordingly. In both cases, the hacker must be able to establish a connection with the computer in question, which means being within radio range or having a direct, wired connection. |
VPNs and Wired Networks
A virtual private network, or VPN, is a special type of network that is often established within a grid, but it can run within a mesh, as well. Functionally speaking, this is an encrypted network that only certain individuals are invited to; often VPNs charge for subscription service. Since they rely on advanced encryption such as quantum encryption, hacking a VPN is all but impossible and sniffing is virtually impossible. However, because they rely on such encryption, they also consume a great deal of power; as a result, only major commercial networks and government networks like military grids and government institutions rely on VPNs. VPNs often exist alongside normal traffic in a grid or mesh environment, but they never get noticed until someone attempts to sniff them or crack into them.
The only way to crack into a VPN is by cracking into a device that is connected to the VPN (this is also true for wired networks that lack any wireless connections, as well). Once the hacker is inside of the device, usually through a backdoor or because the device connects to a non-secure network that the hacker can take advantage of - they can sniff VPN traffic, spoof the network admin, search the network for hidden information, and the like.
Making a VPN is identical to making a PAN, except it requires high complexity encryption software, often beyond public-key encryption. VPNs are often distributed throughout the system, and are common in authoritarian governments or where governments are known to spy on their citizens (such as Nariac, which contains a treasure trove of VPNs).
The only way to crack into a VPN is by cracking into a device that is connected to the VPN (this is also true for wired networks that lack any wireless connections, as well). Once the hacker is inside of the device, usually through a backdoor or because the device connects to a non-secure network that the hacker can take advantage of - they can sniff VPN traffic, spoof the network admin, search the network for hidden information, and the like.
Making a VPN is identical to making a PAN, except it requires high complexity encryption software, often beyond public-key encryption. VPNs are often distributed throughout the system, and are common in authoritarian governments or where governments are known to spy on their citizens (such as Nariac, which contains a treasure trove of VPNs).
Computers and Range
All computers have inbuilt communicators, which allows them to talk to other communicators. These communicators often have impressive ranges for their power consumption, but the listed ranges are only for non-urban areas. In urban areas, there is so much chatter and so many signals that the signal emitted by the computer can't propagate nearly as far. Thus, while in an urban area, divide the range for the computer's communicator by 10; thus, a 25-yard range micro IR communicator only has a 2.5-yard range in an urban setting. This can vary depending on the degree to which the urban area is developed; in less developed urban areas, it's entirely possible that it might be divided by 5 instead of 10, to represent less interference.
Computer Hardware - Personal Computers
Personal ownership of a computer is often a vital necessity in the modern world; in fact, most people often own multiple computers. Computers are found in everything, from clothing to food, but few of these computers are actually useful for personal use; most of them just store information that can be accessed by a personal computer. As such, personal computers often come in several different types: there are implanted personal computers, called endos, and ectos, which are personal computers that are often worn or carried around. They're also called wearables as a result. Given the majority of citizens within the Verge and Bleed are skittish about digital implants (although this number is decreasing with newer generations), ectos/wearables are often more common than endos are. These all use the various Computer Models and some of the hardware customizations listed under Computers in GURPS: Ultra-Tech pg. 22-23. This is just a small sampling of the more common computers available in the Verge and Bleed; if the PC doesn't see one they like, they're free to use those rules to build another. Building a personal computer is often cheaper, but requires the individual to have Engineer/TL11 (Electronics); treat as per the rules for Inventing on GURPS: Basic pg. 473, but divide costs by 10. A Tiny through Microframe is considered Average Complexity; a Mainframe and Macroframe are Complex Complexity, and a Megacomptuer is Amazing Complexity; hardware customizations may alter this accordingly. Most computers are made of smart material, allowing them to be folded, shaped, molded, and designed into specific shapes.
Backpack Computer. A backpack is just that; a small pack that's worn over the shoulder or in a case that features a full computer capable of running highly complex programs. That it's in a case makes resistant to variety of outside effects and the straps make it easy to carry. It counts as a Personal Computer (100 EB and Complexity 8) with a portable terminal, two 3dX slots, and a tiny radio-communicator with a 5-mile radius. It also has the Hardened customization. [$2,260; 10lbs; 2C/20hr or external power]
Computer Gauntlet. A conventional computer gauntlet is a device that's worn over the forearm, similar to a vambrace. When active, the device features a display with an input keypad. There are many, many variations that have their own unique styles. They count as a Small Computer (10 EB and Complexity 7) with a Datapad terminal and two 3dX slots, along with a micro-radio communicator that has a 1,000 yard range. [$160.00; 0.5lbs; 2B/20hr] Computer Specs. Computer specs are a type of wearable that are often combined with an implanted computer or with a gauntlet or some other type of wearable. They come in a wide array of shapes dependent on local fashion standards, from monocles to mirror shades, to contacts with an ear piece. Functionally, they are a HUD that allows for the user to interface with a computer that doesn't have an interface naturally (such as jewelry computers). By themselves, they are a Tiny Computer (1 EB and Complexity 6) with an inbuilt HUD, flatcam, and a micro-radio communicator that has a 1,000 yard range. [$160.00; 0.05lbs; 2A/20hr] Datapad. A datapad is flat surface with touch screen that can be folded, twisted, and wrapped up so it's smaller and can be easier to carry. They come in a wide range of sizes, from 8 inches by 11 inches to 4 inches by 8 inches. It is a Tiny Computer (Complexity 6 and 1 PB) with a Datapad, two 3dX slots, a flatcam, and a micro-radio communicator that has a 1,000 yard range. [$130.00; 0.05lbs; 2A/20hr] Digital Clothing. Digital clothing is clothing that has enough components in it to qualify as a computer. As a computer, it is noticeably less efficient than a dedicated computer, and anything that breaks the clothing destroys the computer. However, clothing can be rather durable, and is often made to match the local fashion standards. It is a Complexity 3 computer with 10 PB of storage and one 3dX slot; it comes with a sleeve display but just as often is linked up with something like computer specs. [x1.5 cost; weight as clothing; 2B/20hr] Digital Tattoo. This is a computer that's tattooed directly to the user's skin; it can take any number of appearances, with the subcultures that embrace it often choosing a circuitry-like look. Anything that breaks the skin destroys the computer, and it covers the user from scalp to toes. Treat as a Small Computer (10 PB and Complexity 6), but it lacks a display and is often parented to another digital device, along with a micro-radio communicator that has a 1,000 yard range. [$60.00; - ; 2B/20hr, requires printed cells] Notebook. Notebooks are not wearables; notebooks are small, 8 inches by 11 inches, similar to a datapad. However, it is heavier, and has a larger storage capacity; the built in monitor can be twisted around in any direction since it's mounted on a pivot. Like the datapad, it can folded into quarters to make it smaller. Treat as a Small Computer (10 PB and Complexity 6), with a portable terminal, two 3dX slots, and a tiny radio communicator with a five mile radius [$220.00; 0.5lbs; 2B/2hr] Quantum Gauntlet. The Quantum Gauntlet functions like a conventional Computer Gauntlet as detailed above, except it has the quantum option, drastically reducing the time needed to perform certain tasks. It functions as a Small Computer (10 EB and Complexity 7) with the quantum computer customization, a datapad terminal and two 3dX slots, along with a micro-radio communicator that has as 1,000 yard radius. [$1,000.00; 1lb; 2B/20hr; LC 3] Sleeve Computer. Sleeve Computers are long, usually fingerless sleeves that fit on the arm. they come in a variety of styles, often made from neoprene or some other polymer that encases thin wafers of digital components, usually using piezoelectricity to maintain their charge. However, they can come in a variety of different styles, with bioplastic being the most popular (transparent bioplastic displays the various components while shielding against UV rays to prevent damage). It is a Small Computer (10 PB and Complexity 6) with the printed customization that has a sleeve display, two 3dX ports, and a micro-radio communicator with a 1,000 yard range. [$150.00; 0.5lbs; 2B/20hr] |
Smart Jewelry. Smart jewelry is probably the most common type of computer; this takes the form of things like a necklace, bracelet, or so some other worm article that functions as a computer but lacks a terminal. In other instances, it's a distributed computer, such as a delicate hand chains, where the chain also contains a tiny wire that connects the computer in the rings to the computer in the chain. Smart jewelry is usually paired with Computer Specs or implanted HUDs. They count as a Tiny Computer (1 EB and Complexity 6) without a terminal, with a 3dX slot, and with a micro-radio communicator that has a 1,000 yard range. [$70.00; 0.05lbs; 2A/20hr]
Smart Jewelry, Bio. The biojewelry is common in some habitats and as part of a few subcultures. Biojewelry often takes the form of some biological organism - sometimes a tree branch or vine, sometimes a genetically engineering centipede or snake, or sometimes a piece of neural coral or sponge. Since the computer is alive, it can be killed, and it requires being fed. However, if mobile (such as a centipede) it can be controlled remotely, as if it were a pod or an android (which it effectively is). It lacks an interface and HUD, but otherwise functions like normal Smart Jewelry. They count as a primitive Tiny Computer (1 TB and Complexity 3) with a micro-radio communicator that has a 200 yard radius. [$35.00; 0.05lbs; Requires nutrients] |
Computer Hardware - Commerical and Industrial Computers
While private and personal computers can often achieve impressive complexities, these are often nothing compared to the computers that are employed by private firms, by industries, or by governments; even starships sometimes have massive computers. These computers are often custom built for the facilities that are designed to operate in, with an eye towards maximizing utility. They don't exist everywhere in the Verge and Bleed - people tend to become skittish around computers large enough and complex enough to run something that resembles an ASI - but they do appear in key locations.
Backpack Microframe. The backpack microframe is a bit like the backpack computer, but it sports even more processing power and features a number of useful adaptations that make it among the cheapest of the commercial and industrial computers available, and one of the few available on the open market. They are popular with university research teams and explorers. While it features a terminal, it's just as often connected to sleeve displays or datapads. Treat as a Microframe (1,000 EB storage, Complexity 9) with the Compact customization, a portable terminal, two 3dX slots, and two tiny radio communicators with a five mile radius. [$20,200.00; 20lbs; external power; LC3]
Closet Computer. The closet computer is a mainframe computer that's capable of fitting inside of a home or business closet. Closet computers are most often used to manage legions of nanofactories or robofactories, and can run three blueprints equal to its own complexity at a time. Treat as a Mainframe (10,000 EB storage, Complexity 10 storage) with the High-Capacity customization; it has a single workstation terminal, two 3dX slots, a tiny encrypted radio communicator with a five mile radius, and several ports for wired communication. [$150,600.00; 400lbs; external power; LC3] Fabricator Computer. The Fabricator computer is an absolutely massive titan of a computer that can run some of the largest molecular blueprints imaginable. These computers often take up entire rooms, processing more data in one hour than the entire 21st century Internet accumulated over its lifespan. They are often the property of major governments, corporations, universities, and the like, and are capable of running three programs of their own complexity at once. Treat as a Macroframe (100,000 EB storage, Complexity 13) with the Genius and High-Capacity customizations; a single workstation terminal, two 3dX slots, a tiny encrypted radio communicator with a five mile radius, and several ports for wired communication. [$835,000,000.00; 4,000lbs; external power; LC3] |
House Brain. The house brain is the computer used by the AI that makes houses work and thrive. House brains are often necessary to make modern homes even livable, and allow the AI or AGI stored inside of them access to numerous components of running the house. House brains are often found in closets or in basements, where they can be safe from weather, and are sealed away to be safe from fires. Treat as a Personal Computer (100 EB storage, Complexity 8), with a portable terminal, two 3dX slots, two tiny radio communicators with a five mile radius (one of which is encrypted), and several ports for wired communication. [$2,000.00; 5lbs; external power; LC4]
Rug Computer. Rug computers (or carpet computers) are microframes that cover large rugs, often times numerous rugs and mats that are linked together. This allows them to be useful in multiple ways, and are popular with large businesses to help reduce space and rent overhead. Treat as a Microframe (1,000 PB storage, Complexity 8) with the Printed customization, four basic workstation terminals, four micro-radio communicators with a 1,000 yard range, four 3dX slots, and two ports for wired communication. They are often linked together to perform high processing tasks using a VPN. [$11,000.00; 40lbs; external power; LC3] Super Node. Super nodes are hugely complex pieces of equipment that are the size of entire buildings, and are often placed in charge of running entire habitats or even clusters of habitats. They can run three programs of their complexity at once, and considered quantum computers for purposes of decryption and searching and the like. Treat as a Megacomputer (1,000,000 EB storage, Complexity 14) with the Genius, High Capacity, and Quantum customizations; it has no terminal of its own but it can be linked to, and it features numerous radio ports, some encrypted and some not, as well as several wired ports, 3dX slots; the works. [$750,000,000,000.00; 40,000lbs; external power only; LC1] |
Computer Hardware - Accessories and related Consumer Electronics
Raw computer power is all good, but sometimes it's necessary to have additional bells and whistles attached, often for aesthetic purposes, but just as often for utility reasons as well, since it improves computer processing speed and power. All of these are optional, and if they modify the computer, use the Engineer (Electronics) skill or the Computer Operations skill (at a -3 default penalty) to install them.
3dX Storage Drives. These are chips that are roughly 1/4" in area, and hold about 1 EB of data. 3dX require drives, which are built into almost every electronic device that exists. They hold 1 EB of data. [$10.00 for a pack of ten; 0.1lb].
3dX/S Storage Drives. These are roughly 1/16" in diameter and hold about 1 PB of data. 3dX/Ses use an adaptor so they can connect to 3dX data ports, which are built into almost every electronic device. [$5.00 for a pack of 20; neg] Additional 3dX ports. These ports add additional places to plug in 3dX drives, which can be installed on the computer. [$5.00; 0.02lbs; AA/100hr on its own] Additional Communication Ports. Ports allow for the device to communicate with other devices; while most devices come with a single port already installed, individuals may want to install more. Note that if they have an encryption chip (see Computer Software, below) then they need to install the chip on the extra port before they install the port. Cost and size vary depending on the extra port; to learn more about the communicators and what they do, see GURPS: Ultra-Tech pg. 43-4. IR micro port. This has a 25-yard range. [$5.00; neg] IR tiny port. This has a 250-yard range. [$20.00; 0.05lbs] Laser, micro port. This has a 5,000-yards, but usually broadcasts at a lower output with a range of 25 to 50 yards. [$20.00, neg.] Laser, tiny port. This has a 25-mile range. [$100.00; 0.05lbs] Radio, micro port. This has a 1,000-yard range, but usually broadcasts at a lower power output with a 5 to 10 yard range. [$10.00; neg.] Radio, tiny port. This has a 5-mile range. [$50.00; 0.05lbs] Sonar, micro port. This has a 120-yard underwater range. [$10.00; neg] Sonar, tiny port. This has a 1,200-yard range underwater. [$40.00; 0.05lbs] Cable Jack. The Cable Jack adds a port to connect a cable to, allowing the computer to transmit data through a wired connection. Few computers come with a built in cable jack; those that do note it in their description. Adding one is a Computer Operations check and a ten-minute job, opening up the computer and then inserting the hardware in the proper slot (if it has a slot; some don't, in which case Electronics Repair (Computers) will be needed instead). Then, once it's installed, the proper drivers are installed, and once they're run, the cable jack is ready for use. [$5.00; neg.] Computer Cable. The modern computer cable is a smart cable that fits into a cable jack. This high-tech cable is capable of shortening or lengthening itself; its base length is 10', but it can double its length to 20', or half its length to 5', depending on the need of the user. It also has an exterior formed of a highly elastic material reinforced with carbon allotropes, making it very tear resistant. It is used as a modern HDMI cable primarily, but the smart cable can carry any signal, meaning that with a cable splitter, it's an all-in-one use cable. [$25.00; 3.5lbs] Computer Cable Splitter. The splitter connects to the end of a computer cable and has its own built in cables that can unspool from it, each one 10 feet long. These cables are not as tough as a computer cable, but they can carry the same range of signals. The splitter itself is a high tech piece of equipment that can detect what signal is needed from what device it's connected to and route the proper signal, acting as a sort of switching board. Most houses have a few of these to direct various signals, from grid signals to messages between computers and multi-media walls. They allow for many computers to make use of one computer cable, and limits the number of cables lying around in computer heavy areas. [$300.00; 2.5lbs] |
Data Banks. Data banks are large units that are used as modular backups or expansions for computers, They use a cable jack and plug into the computer directly, and boost the overall storage for the computer. [$100 per pound, each pound adds 100 exabyte of storage].
Data Player. Data players are inexpensive palm-sized devices that are used for viewing data, usually in audio, video, text, or other formats. It has a 3dX drive, a cable jack, and a radio microcommunicator with a 1,000 yard range that lets it link up with a HUD or with an AR display. [$5.00; 0.05lbs; A/100hr] Entertainment Console. This is functionally a Complexity 7 computer that is treated as being a Complexity 8 computer when it runs computer games, virutal reality, or XP programs. It includes a 3dX drive, portable terminal, and cable jack. [$500.00; 1lb; 4B/5hr or external power] Extra Memory. This option allows the user to augment an existing computer with more memory. These memory sticks are fairly small and inserting them requires a Computer Operations or Engineer (Electronics) check, but benefits from High Manual Dexterity. Four sticks improve the overall Complexity of a computer by +1, and allow it to run an additional program of its listed Complexity simultaneously. [$150.00 per stick; neg] Flatcam. The flatcam is a palm-sized digital audio-visual recorder, and is standard equipment for the Photography skill. It has Night Vision 7 image intensification. [$50.00; 0.1lbs; A/10hrs] Fabber Computer. This is a computer that comes pre-installed with most personal fabricators (including suitcase and workbench nanofactories). This computer by itself is treated as a Small Computer (100 EB of storage, Complexity 8) with a workstation terminal, two 3dX slots, and a micro-radio communicator with a 1,000 yard range. [Free with any factory or fabricator workbench or suitcase] Pocketcam. A high quality digital audio-visual recorder with 48x optical magnification that provides a +1 quality bonus to the Photography skill. It has Night Vision 8 image intensification. [$200.00; 0.25lbs; B/10hr] Portable Camera. A professional quality InVid-production camera that is used for a wide number of reasons; news, intelligence, or video production. It provides x48 parabolic audio magnification, 192x optical magnification, and Night Vision 9. It provides a +2 quality bonus to the Photography skill and can be mounted on a tripod for additional stabilization. [$2,000.00; 4lbs; C/40hr] Recharger. Rechargers are specialized devices that can be used to recharge batteries. Each battery type has its own specific recharger; when plugged into an external power source, they help the battery recharge a 4x the normal speed. [$25.00; 0.1lbs] VR Gloves. This is a simple set of gloves that allows the user to crudely manipulate virtual objects. It requires a computer of at least Complexity 2 to use, as well as a HUD display. [$20.00; 0.3lbs] VR Suit, Basic. The basic VR suit includes gloves as well as "tracers" which mimic the body movements in VR. The user only experiences tactile sensations on their hands. Someone with a DNI can omit the suit and run VR directly through a Complexity 4 program. [$200.00; 1lbs] VR Suit, Full. Provides a Full VR experience; see GURPS: Ultra-Tech pg. 54 for more info. [$2,000.00; 5lbs] |
Computer Software
Software is necessary to run computers; without software, computers cannot work. Computers can only run software up to their Complexity; thus, a Complexity 7 computer can only run 1 Complexity 7 program at a time - although it can run 2 Complexity 6, 3 Complexity 5, and so forth. A great may skills often requires software to even work; for instance, Computer Operation requires the computer to have a Operating System, or OS, installed, otherwise you use Computer Programming since you have to get into the shell coding and run something like DOS. Current Affairs and Research often require software as well; usually some sort of web browser that can sort through all the information available and present it in an easy to understand fashion. Web browsers and p2p sharing programs work on both grids and mesh nets. Getting software is easy; often times, it comes preinstalled on the device; otherwise, it generally requires a monthly subscription. It's possible to download the software from various sources; this usually requires a Research check (or if they're getting it from their network, a networking check). In the case of the former (or the latter, if the faction can't be trusted), the GM should roll; on a Critical Failure, they download some type of malware, instead. Most software will have cost listed beside it; software that lacks such a cost uses the costs as outlined on pg. 25 of GURPS: Ultra-Tech, per typical TL 11 software.
When it can run such software at all, computers treat software from a lower TL as lower Complexity; the exactly formula is the difference between the TLs; subtract the difference of the two TLs from the Complexity of the program. Thus, a TL 11 Complexity 7 computer can only run one TL 11 Complexity 7 program. However, it can run two TL 10 Complexity 7 programs, since TL 10 Complexity 7 programs are functionally Complexity 6 TL 11 - TL 10 = 1, 7 - 1 = 6); similarly, a TL 8 program that was Complexity 7 would be treated as Complexity 4 (since TL 11 - TL 8 = 3, 7 - 3 = 4). However, running such old software is often impossible on modern computers and requires specific adaptors, often requiring antiquated hardware as well (such as a CD Rom or disk drive).
When it can run such software at all, computers treat software from a lower TL as lower Complexity; the exactly formula is the difference between the TLs; subtract the difference of the two TLs from the Complexity of the program. Thus, a TL 11 Complexity 7 computer can only run one TL 11 Complexity 7 program. However, it can run two TL 10 Complexity 7 programs, since TL 10 Complexity 7 programs are functionally Complexity 6 TL 11 - TL 10 = 1, 7 - 1 = 6); similarly, a TL 8 program that was Complexity 7 would be treated as Complexity 4 (since TL 11 - TL 8 = 3, 7 - 3 = 4). However, running such old software is often impossible on modern computers and requires specific adaptors, often requiring antiquated hardware as well (such as a CD Rom or disk drive).
AIs and Muses
Almost every on in the modern era has a muse, which is an AI companion. However, many devices also come with AIs pre-installed that are capable of helping the user, and can sometimes even run the device on their own. Many of these AIs are actually NAIs; scarce few of them are LAIs and none of them are AGIs. More information about those can be found here. Below are some of the more commonly available AI programs. Unless noted otherwise, they have a DX 10 and IQ 9, and one language at native. Animal Keeper AI. These AIs are a muse for smart animals, watching over the critter's activities, directing it as needed, and alerting the owner to any emergencies or other problems. If the animal is equipped with a puppet sock, the AI can also jam it like a biodrone. They have DX 12; HT and ST are dependent on the animal they're jamming. Since they jam the animal rather than upload into it, they use the vehicle operation skills, which for most means Driving (Mecha). Skills: Animal Handling (animal type)-15; Computer Operation-15; Hobby Skill (animal type)-13; Observation-12; Physiology (animal type)-13; Research-12; Veterinary-14; one of Boating (aquatic animals), Driving (walking animals), or Piloting (aerial animals), all at 13. It is a Complexity 6 program. [$1,000.00] Bot/Vehicle AI. These AIs are designed to be capable of piloting the robot/vehicle without human assistance. They have a DX 12; HT and ST are dependent on the vehicle. Since they pilot the vehicle from a remote computer rather than actually sleeving into the vehicle, they use vehicle operation skills. Skills: Computer Operation-15; Hobby Skill (Vehicle type)-14; Mechanic (Vehicle type)-14; one of Boating (any), Driving (any), Piloting (any), or Submarine (any), all at 13. They are a Complexity 6 program. [$1,000.00] Device AI. These AIs are designed to operate particular devices without any human assistance; often, they are replaced with an expert system (see below). Skills: Computer Operation-15; Computer Programming-12; Hobby Skill (Device type)-14; Mechanic (Device type)-14; operation Profession skill relevant to the device at 14; so a Device AI for a flashlight has Profession (Flashlight AI)-14. They are a Complexity 6 program. [$1,000.00] Security AI. These AIs are designed to provide overwatch for electronic systems and to detect intruders; they often work with a firewall. Skills: Computer Operation-15; Computer Programming-12; Electronics Operation (Security)-13; Electronics Repair (Computer)-12; Expert Skill (Computer Security)-15; Observation-12. They are a Complexity 6 program. [$2,500.00] Sensor AI. Sensor AIs are equipped in most off-the-shelf sensor systems. Skills: Computer Operations-15; Computer Programming-12; Electronics Operation (Sensor type)-15, Electronics Repair (Sensor Type)-14; Research-12. It is a Complexity 6 program. [$1,000.00] Standard Muse. Muses are digital entities that have been designed as personal assistants and lifelong companions for many humans, filling a roll somewhere between intelligent object and imaginary friend. They keep and manage dates and appointments, sift through data, upload lifelog recordings, and do other mundane functions so humans don't have to. Use this when the Muse isn't a full character. Skills: Accounting-12; Computer Operation-15; Computer Programming-12; Diplomacy-11; Observation-13; Profession (Muse)-14; Psychology (Owner)-16; and 6 other skills that are relevant to the owner. It is a Complexity 6 program. [$3,500.00] Technician AI. Technician AIs are used on habitats and aboard ships to direct the work of repair drones, and ensure that specific bills and orders are filled. Skills: Computer Operation-15; Computer Programming-13; Crewman (Spacer)-15; Electronics Operation (Sensors)-12; Electronics Repair (Drone Computers)-16; Machinst-12, Mechanic (Ship or Vehicle Type)-14; Profession (Habitat Operator)-15. It is a Complexity 6 program. [$5,000.00]. AR Programs Augmented Reality (AR) programs are programs that run within augmented reality; most of them are purely cosmetic and allow for minor alterations, although a few of the programs (such as many miscellaneous programs) and the tactical programs often find themselves depending on AR despite not being directly connected to AR. For more information on AR, see GURPS: Ultra-Tech pg. 56-7. Visual Enhancement. This software improves the visual acuity of the individual running it. It provides +1 to Vision rolls. It is a Complexity 4 program. [$1,000.00] Cosmetic Filter. Cosmetic filters are a common AR program; they control the audio-video display on a communication system and, when active, the video uplink picks up the user's image as usual, but filters it through a preprogrammed "idealized" beauty standard before transmitting it. This increases the user's video Appearance by one step, but it cannot exceed Very Handsome/Beautiful. Any enhancement above attractive has the Off-the-Shelf modifications, although the individual still looks like themselves. Alternatively, it can be used to provide Unusual Features or even Supernatural Features, such as eliminating one's shadow or reflection. Cosmetic filters are designed for specific species and subtypes in mind; one species using a filter designed for another species produces unusual results. It is a complexity 4 program. [$400] Video Masking. this works like the cosmetic filter, except it changes all of the user's features and voice. The user can be programmed to resemble a different person, or adopt a persona created by the program. It is a Complexity 5 program. [$800]. Blueprints Blueprints are instructions (or sets of instructions) to build a gadget or device that are programmed into a fabricator, nanofactory, or vatfactory. Blueprints contain the molecular structure and composition of a particular device that the factory or fabricator then works to copy when they print or construct the object in question. Blueprints, moreso than other types of software, are often licensed rather than sold, with the typical agreement requiring that the company who owns royalty rights to the blueprint receiving between 10% to 50% the base cost of the item. Sometimes, that royalty may exceed 90%; other times, a sort of profit-sharing IP imperfect usufruct emerges where a small shop or store will license the blueprints and use them to produce goods or services that they sell to the public at large, taking a cut of the profit for themselves rather than being charged for royalties outright. In any situation, blueprints are what make all this, along with molecular nanotechnology, possible. Often, when printing some large item (such as a starship), pieces are printed separately and then assembled individually; this avoids a massive starship from requiring a massive Complexity 12 or 13 computer (although those do exist). 3D Blueprints. These are blueprints that are typically used with fabricator and a robofactory. They are Complexity 2 for devices that cost up $100, Complexity 3 for devices that cost up to $1,000, and so on, with their cost dependent on the complexity of the program. Molecular Blueprints. These are usable with nanofactories. They are Complexity 4 for devices costing up $100; Complexity 5 for devices costing up to $1,000, etc. Defense Programs Defense programs are used to help defend computer systems; these programs often require the individual to have access to Computer Programming or to the Expert Skill (Computer Security). Mathematics (Computer Science) is useful as well when using these programs, although it suffers a -3 default penalty. Anti-Malware App. This app runs scans for malware and programs that create backdoors, as well as detecting the use of spoofers and sniffers. When an anti-malware app is run on a network that is be sniffed, an opposed Computer Operations vs. Computer Operations check is called for; if the Anti-Malware app succeeds, then it finds the sniffer. Similarly, when finding a backdoor program or malware app, the anti-malware app has a penalty equal to the degree of success in installing those programs. Most computers have a basic program installed for free, but most security-minded individuals upgrade. Any malware or backdoor trojans found are removed and quarantined so they cannot be used again. Antimalware App, Basic. Provides basic antimalware software. It has a Computer Operations-14. It is a Complexity 3 program. [Free] Antimalware App, Advanced. A more advanced, often times free, piece of software that provides a Computer Operations-16. It is a Complexity 4 program. [Free] Antimalware App, Premium. The premium version is a subscription, and it often comes with an Advanced Firewall installed (see below). It provides Computer Operations-18; most also provide other bells and whistles such as cleaning up unused or broken registry links, removing unused files, automatically updating nonessential apps, and the like. It is a Complexity 4 program. [$25.00/month] Firewall. The most basic security option, firewalls protect a device from hostile intrusion. Most systems come with one installed by default, but most individuals who are interested in defense upgrade later. Attempting to intrude requires an opposed Computer Operation check against the Firewall's base Computer Operation skill; a failure indicates that the firewall held up. Firewall, Basic. Provides a basic firewall. It counts as having a Computer Operation -12 for purposes of combating intrusion attempts. It is a Complexity 3 program. [Free] Firewall, Advanced. Provides an advanced firewall, with more defensive features. In addition to defending, it also includes a Tracking program (see below) that allows expert programs using the firewall to attempt to track the location that the attack came from. It has Computer Operation-16 for purposes of combating intrusion attempts. It is a Complexity 5 program. [$500.00; LC4] Encryption Programs and One-Time Pads Encryption is vital to securing transmission of data, and systems that make use of encryption generate mathematical formulas (called "keys") to conceal (encrypt) a signal into seemingly-random gibberish. If the recipient has the proper key (or can attempt to brute force one), then they can decrypt the message and make meaningful what was deliberately made into gibberish. The most common method of encryption in the Verge and Bleed is the "public-key" method; whereby a key is publicly distributed, and can be used by anyone to encrypt a message sent to its owner. The only way to securely decrypt the message is with a private decryption key, which is often securely stored in the owner's computer or communicator. Cracking such software is often extremely difficult and time consuming; it becomes even harder when the encryption isn't pseudo-random numbers but rather, deliberately swapped words; thus, long phrases of words and numbers that form sentences but are functionally gibberish - i.e., "Green Dreams Sleep Furiously In the Brightly Illuminated Midnight Concrete" - are often incredibly difficult to crack. Encryptions are rated for the Complexity of the computer that it will take an hour per attempt to crack them. For more information on them and One-Time Pads, see GURPS: Ultra-Tech, pg. 47. Quantum encryption is not only possible but is the norm for governments, militaries, and major businesses like banks in the setting, which means that intercepting any transmission automatically alerts the user that there is eavesdropping while at the same time destroying the encrypted message. However, many deal with the trade off of range limitation and cost by encrypting quantum information on wired networks for absolute security. Decryption Software. This contains a database of hacks and shortcuts that make decryption possible. It provides a +1 bonus to Cryptography. It is a Complexity 2 program. [$500.00; LC3] Public-Key Encryption Software. This is standard encryption software; it is complex enough to be reasonably secure but not so complex that it starts eating bandwidth like a virtual Zoom meeting on 1080p HD. A complexity 11 computer can attempt to break this encryption in one hour. It comes as standard in all devices. [Free] Secure Encryption Software. This is a much more complicated system that is used to secure classified documents or military intel. Given how complicated this encryption is, there is often a delay of two seconds as the message is sent and received. Breaking it requires an hour and a Complexity 13 computer; it makes use of a secure encryption chip that is installed on a communicator or device, and it also generates encryption for one-time pads. [$500.00; LC2] Intrusion Software and Malware Intrusion software is software that is deliberately designed to assist in intruding into a computer, generally through a brute force method but possibly through other methods as well. The software is generally regarded as illegal, but owing to the nature of software, is easy to find and often times relatively easy to design, especially if the known zero-day exploits are available online. Backdoor Program. Backdoor programs establish a "backdoor" in the program that make future uses of Exploit software much easier. Once a user has successful infiltrated a program, or has installed a malware program, it can attempt to install a backdoor with a Computer Operations check. On a success, the backdoor is installed and it provides a +2 bonus to all future uses of the Exploit skill on that particular system. Antimalware programs are used to hunt down and close backdoors, although Expert Skill (Computer Security) can be used to find the exploits and close them as well. It is a Complexity 2 program. [$1,000.00; LC2] Exploit. Exploits are the necessary software used to crack into a computer; they take advantage of known vulnerabilities in other software. Intrusion attempts cannot be made without Exploit software, with the quality of the software providing a bonus to the check. While exploits are opposed Computer Operation vs. Expert Skill (Computer Security), exploits have a penalty equal to the difference between the complexity of the two computers; thus, a Complexity 5 computer attempting to hack into a Complexity 12 computer has a base -7 penalty before other modifiers are added. A successful use of the exploit gives the user access to the computer, although if the system is being actively monitored, every action will call for a Computer Operations vs. Defender's Expert Skill (Computer Security). The base cost is for a Complexity 5 program; for each Complexity beyond 5, increase the cost by +$500; Fine quality versions provide a +2 bonus and a Complexity 6, with each increase in complexity increasing the cost by +$1,000. [$1,500.00/$2,500.00; LC1] Malware. Malware apps run a vast gamut of different programs; some are ransomware programs which hijack the system and lock out users until a specific code is sent to the location; others slip in and log data and information, while others will do that and add a backdoor program. Still others are viruses, which create copies of themselves and flood the computer until it cease to work. Malware can be found almost anywhere and it does a wide range of effects; for purposes of game, treat the Computer Operations skill of the program as 12 for when it needs to make a Computer Operations check; for instance, overcoming a firewall, hijacking a system, logging data, or installing a backdoor. Complexity ranges from a Complex 2 to a Complex 5 (add +1 to the Computer Operations check per +1 to Complexity) program; all malware programs are highly illegal. [Varies; LC0]. Masking. Masking software allows the user to hide their activity online, often through the use of flexible Mesh/Grid IDs, using different servers and VPNs, and the like. It is often used to defeat the Tracker program; the user makes a Computer Operation check with a +2 bonus (it is Fine quality software); the degree of success is used as a penalty when attempting a Research check with the Tracking software. This is a Complexity 6 software. [$2,500.00; LC2] Sniffer. Sniffer programs collect all transmissions that pass to, from, and through the device that they are running on, logging important data along the way. This program functionally lets you eavesdrop on communications that you are within radio range of. Sniffers requires a successful Computer Operation check; on a success, they collect all the data traffic between two or more devices. Note that sniffers do not work on encrypted traffic, which includes VPNs or anything else that uses public key encryption). Once the information is collected, a Research check can be used to find whatever data is wanted. This is a Complexity 5 program. [$1,000.00; LC2] Spoofer. A spoofer program is a program that spoofs commands and transactions, and makes them seem as if they came from another source. This allows a hacker to act as if they have a higher administrative privileges than they actually do; functionally, the quality of the program provides a bonus to the Computer Operations check when intruding on a server or whenever authentication might be needed for a server. It must be used in coordination with a Sniffer. This is a Complexity 5 program; Fine quality versions add a +2 bonus and are Complexity 6. [$1,000.00/$2,500.00; LC1] Tracker. Tracking programs are used to track individuals who are online. Most grids run at least a passive tracking program, tagging individuals by their Mesh/Grid ID. This is required to make a Research check to follow up on the actions that individuals have taken while online. [$1,500.00; LC3] Scorchers Often called "Scorchers," these are programs that are designed to hack and torment individuals with cyberbrains, although they can also be used to torment individuals who also have implants (although such torment is generally contingent on said implants being left on). This is not an exhaustive list - practically any disadvantage or condition can be represented with a scorcher. However, these are the most common. Note that while these are all low Complexity programs, they are only low Complexity because they're designed to run on a cyberbrain; when designing, treat them as if they were +3 Complexity higher. Bedlam. Bedlam is a program that, when run on a cyberbrain or an implant computer with AR inserts. It inflicts deep mental stress, overwhelming the user with horrific, monstrous, or sanity-ripping sensory and emotional implant. This who have AR inserts and an implanted computer can end the experience by shutting down their AR until the program is found; cyberbrains don't get such luxury. Once exposed, the target makes a Fright Check, as detailed in GURPS: Basic pg. 360-1. They suffer a -1 penalty per second exposed to the program. This is a Complexity 3 program. [$5,000.00; LC0] |
Cauterizer. Cauterizer can only run on cyberbrains. It functionally rips into the ego and consciousness stored on the computer with destructive neurological feedback loops. The victim must make an HT-2 check; on a success, they suffer a the Dazed condition for 2 minutes; on a failure, they suffer the Seizure condition for a number of minutes equal to the degree of failure, and on a critical failure, they suffer Seizure and Paralysis for a number of minutes equal to twice the degree of failure. For for more information, see GURPS: Basic pg. 428-9. This is a Complexity 3 program. [$5,000.00; LC0]
Delusion. Delusion is a complex piece of software that runs on both cyberbrains and those with AR inserts. When activated, the victim makes an HT-2 check; on a failure, they suffer the Hallucination condition for a number of rounds equal to the degree of failure. The GM is best to make the HT check in secret, so the PC isn't sure they are experiencing hallucinations. Each time the program activates, it calls for another HT-2 check, with similar results. The Delusions are pre-programmed and can be anything, although the best ones are often subtle and designed to inspire a degree of paranoia. Since it uses AR inserts, it can be defeated by turning off AR inserts. This is a Complexity 3 program. [$5,000.00; LC0] Freeze. Freeze is a piece of software that causes individuals with cybershells and implants to seize up, unable to respond to combat and other stressful situations. Once the program activates, the user makes an HT-2 check; on a failure, they suffer the effects of Combat Paralysis (GURPS: Basic pg. 127). It can activate numerous times, until it is caught by antimalware apps. Individuals with implants can only counteract it by shutting down the implanted computer. It is a Complexity 3 program. [$5,000.00; LC0] Nightmare. The nightmare software triggers anxiety and panic attacks within the victim by stimulating the neural circuitry representing the amygdala and hippocampus. It works on those with cyberbrains and those with implants (and unlike with Bedlam, it is not counteracted by turning off AR; the entire implant computer must be shut down). The victim makes an HT-2 check when the program is first installed; on a failure, the program is installed normally. This program only kicks into effect when the victim is asleep, triggering horrific nightmares as if the victim had the Nightmare disadvantage (GURPS: Basic pg. 144) with the self-control roll (12). This program runs until it is caught by an antimalware app. Higher quality (and therefore, more expensive) versions have lower self control number. It is a Complexity 3 program. [$5,000.00; LC0] Puppet. Puppet is an insidious program that allows an outside user to hijack and take over a cyberbrain. Cyberbrains with the puppet disadvantage are treated as having an involuntary Duty they must fulfill when the program is triggered, if they fail an HT-2 check. The servitude lasts for a number of rounds equal to the degree of failure, although it can be triggered again at any time. Functionally, the cyberbrain user no longer has any control over their own body and is trapped within it. This program runs until it is caught by an antimalware app. It is a Complexity 3 program. [$5,000.00; LC0] Shutter. Shuttering closes down the senses of the individual; when the program activates, the victim makes an HT-2 check. On a failure, they suffer the Blindness, Deafness, Numb, and No Sense of Taste/Smell disadvantages. The program lasts for a number of minutes equal to the degree of failure. However, it can kick on at any time after that, calling for another HT-2 check to repeat the process. It will continue to do this until it is removed by an antimalware program or expert. It is a Complexity 3 program. [$5,000.00; LC0] Spasm. Spasm programs incapacitate cyberbrains and implanted computers with excruciating pain when active. When they activate, the user must make an HT-2 check; on a failure, they suffer the Agony condition; on a critical failure, they suffer that as well as the Heart Attack condition. It lasts for a number of rounds equal to the degree of failure (the heart attack not withstanding; that requires immediate condition). However, it can kick in at any time after that, calling for another HT-2 check to repeat the process until it is caught. Those with implants can only solve it by shutting down their computer, although they likely won't be able to. It is a Complexity 3 program. [$5,000.00; LC0] Throe. Throe inflicts a minor spasming effect on targets with both cyberbrains and digital implants. When it activates, the target makes an HT-2 check; on a failure, they suffer the effects of Neurological Disorder (Severe) for a number of minutes equal to the degree of failure. Those with digital implants and AR inserts can shut it down by closing down their implanted computer. It can trigger again and again until it is caught by an antimalware app. It is a Complexity 3 program. [$5,000.00; LC0] Zero. Zero is a brutal piece of software that runs on both cyberbrains and those with AR inserts. Once installed, Zero triggers a HT-2 check; on a failure, it randomly inflicts one of the following disadvantages: (1) Low Pain Threshold, (2) Numb, (3) One Arm, (4) One Eye, (5) One Hand, (6) Total Klutz. Zero doesn't remove the limb or eye; rather, what it does is shut down the body's perception of that organ, so the user functionally acts as if they have one hand, including phantom limb sensory effects. Those with implants can shut Zero down by closing down the implanted computer. Zero lasts for a number of minutes equal to the degree of success; it can trigger again at any time until caught, each time afflicting a different effect. It is a Complexity 3 program. [$5,000.00; LC0] Tactical Programs Tactical programs are software that is used by militaries and private security firms to assist in their job. These require some source of augmented reality, whether it be AR implants or some sort of ocular display like glasses or a monocle; most helmets have some or all implanted. Silhouette. Silhouette is a optical recognition program that identifies target of military while providing background and technical data on that target. The quality and accuracy of the supporting information depends on the databases that are used; higher quality databases offer expensive subscription services and constantly update but often lack detail. Military databases are often encrypted and contain very detailed information, including hyperspectral emission profiles, countermeasure tactics, and usage instructions, but require Military Rank or Security Clearance to access (or a creative hacker). It is a Complexity 5 program. [$100.00/month; LC3 normally] TacNet. Tactical Networks are a type of software tool used for troops on the ground; tacnets allow a leader to monitor a combat force by tracking and displaying their positions, firing arcs, blind spots, command relationships, and the like. This gives a bonus to Tactics if all parties are in communication with one another. It's a Complexity 5 program if it provides a Tactics +1; Complexity 6 if it provides a Tactics +2. [$500.00/$1,000.00; LC3/2] Targeting. Targeting is a tool that augments the ability of the HUD by improving the speed and rate at which a target gets acquired. It also demonstrates ballistic modeling, compensating for various environmental effects like air pressure, wind, humidity, temperature, and the like, as well as prioritizing targets by threat assessment. The program gives a bonus to a single Gunner or Gun specialization if used with an HUD link. It's a Complexity 3 if it provides a skill +1, or Complexity 4 if it provides skill +2. [$100.00/$500.00; LC3/2] Target Tracking. This is used in conjunction with a sensor system like an imaging radar, radio direction finder, or hyperspectral optics, to track up to 100 distinct targets or emissions sources at a time. It displays their size, signal strength, bearing, vectors, and other appropriate information on a moving map display. It is Complexity 3; add +1 to the complexity for every tenfold increase in target tracking capabilities. [$1,500; LC2] Translator Software There are thousands of different languages throughout the Verge and Bleed, and even those that descended from the same parent language are often vastly different, especially the closer to the Solar System that one goes. Add to that several failed attempts to establish universal languages and one begins to realize that fast and accurate translation is incredibly important, especially in real time. Often times, the translator software requires an individual to speak into a microphone, although ones with high-quality enough software can pick up spoken words directly and translate in that manner. There are several types of translator programs: Modular Translators. Modular translators are rated according to their comprehension of the two languages that they translate between; for instance, Bluefall Portuguese and Sothic English. Often, they are designed for specific locations with major languages in mind but are restricted by the comprehension. Thus, an English to Portuguese translator that translates at broken will translate broken English into broken Portuguese, and vice versa. For more information, see GURPS: Ultra-Tech pg. 48. Modular translators exist for the various languages spoken by the alien species. Broken Translator. This translates speech at the Broken comprehension level; each language requires at least 10GB of space on a computer. It is a Complexity 3 program. [$100.00] Accented Translator. This translate speech at the Accented comprehension level; each language requires at least 30GB of storage on the computer. It is a Complexity 4 program. [$200.00] Native Translator. This translates speech at the Native comprehension level; each language requires at least 100GB storage on a computer. It is a Complexity 5 program. [$500.00] Universal Translator. Universal translators are expert systems that are designed to learn how to speak a language. After an hour of exposure to any language, the translator can begin to piece it together and learn the semantics and underlying structures that make the language work. After an hour of exposure, it can speak the language at Broken. After six hours, it reaches Accented; and after a day, it reaches Native. Its comprehension cannot exceed the comprehension of the speakers that it is learning from; each native language requires storage as per modular translators. Because it is pre-programmed to learn Earth-descended languages, it does not work with alien languages; those translators must be programmed independently and most never exceed Broken (See Modular Translators, above). This is a Complexity 9 program. [$1,000.00] Virtual Tutors These systems are designed to simplify tasks such as repairing an engine or fixing a house, and require AR in order to work. A mechanism may have dozens or even thousands of of different parts that are tagged with microcommunicators and positional sensors. Integral databases know precisely where each piece is supposed to go, and the virtual tutoring software can track the parts and the user's own hand movements, aiding in the assembly, disassembly, or repair of various tools. For more information, see GURPS: Ultra-Tech pg. 56-7. Virtual Tutor. An augmented reality program that coaches the user through a single specific task, such as assembling electronics or fixing a car engine. This grants an effective skill of 12. It is Complexity 3 if the task normally uses an Easy skill; Complexity 4 if it use several skills in coordination. Any necessary parts must be purchased from instructor kits. VR Programs VR, or Virtual Reality, is a widespread technology that allows individuals with the proper hardware to escape from reality and slip into digital worlds of their own making. VR sometimes goes under the name Simulspace. For information about VR, see GURPS: Ultra-Tech pg. 53-55. Total VR. This is only available as a computer program accessed through a DNI. It effectively immerses the individual in a virtual environment, allowing them to treat that VR environment as if it were the real world. If safety interlocks are engaged, the user may experience discomfort or dislocation, but not pain. if they are not engaged, individuals within a total VR simulation will feel pain. They won't suffer any injury, but psychological damage can result if they are hurt, tortured, killed, or injured in VR; this could call for a Fright Check. Some total VR systems include "consent levels" which control how much reality is allowed in the virtual reality. AGIs and AIs, as well as ghost mind emulations, do not need a DNI to experience VR since they experience it normally. It is a Complexity 6 program. VR Manager. This program manages the interactions of multiple users within a shared VR space. It must be run on whatever computer is managing the VR environment. Each program can handle about 10 users; for more people, run more programs. More detailed information can be found in Ultra-Tech on how this complicated piece of software operations. XP Programs XP, or eXperience Playback, goes by a couple of names including "sensies." Functionally, this software is the recorded experiences of others using a DNI as it happened, which others can then play through their DNI to experience the situation as it happened in real time. For instance, if an individual makes an XP of their sky-diving trip, then others who download that XP can experience the sky-diving trip in real time, as if they were actually doing the skydiving themselves. XP programs generally operate at real-time speeds, although some are programmed to enforce a type of time dilation on individuals, which can lead to weird (and sometimes traumatic) incidents. For more information, see GURPS: Ultra-Tech pg. 57-8. XP Player. This software lets someone experience XPs. They must use a DNI to connect their mind to a computer running this program. This lets them record or live XP feeds stored on their computer, or transmitted over networks via communicator. They are a Complexity 6 program. XP Uplink. This software allows the user to transmit and record their XPs as XP media. The link requires a DNI that is in communication with a computer running this program. The data is then sent to a recorder, or broadcasted using a communicator or net connection. It is a Complexity 7 program. Miscellaneous Programs This section details various software programs that don't fit anywhere else; most of it is commercially available or can be downloaded easily off-line. Behavioral Psych Software. When provided with data on a particular person and their activities, this software can build a psychological profile of the individual. The larger the data set - such as sensor scans, mesh/grid activity, relationships maps, location tracking, medical history, lifelogs, and the like - the deeper and more accurate the analysis. This software provides a +2 (quality) bonus to Criminology and Psychology checks when applied to the individual; different versions of this program exist for different species and neurodivergencies. It is a Complexity 5 program. [$5,000.00; LC3] Event Reconstruction Software. The latest forensic methods that are used by crime scene investigators, event reconstruction software takes sensor data and applies predictive algorithms to it, building a reconstruction of past events. This combined data can be used to run a VR or AR simulation of the event and its possible permutations. It provides a +2 (quality) bonus to Criminology, Forensics, and Scrounging checks when looking for evidence. It is a Complexity 5 program. [$5,000.00; LC3] Facial/Image Recognition Software. This program can be used to take an image and run a pattern-matching search among public archives. Similar versions exist for biometrics like gait recognition, voice recognition, and the like. They provide a +2 (quality) bonus to Research checks when researching specific information relevant to the software (for instance, the identity of someone whos picture they have). It is a Complexity 4 program. [$200.00] Kinesics Software. Kinesics software measures voice stress patterns or analyzes other sensory input from other sources to monitor for deception, hostile intent, and other emotional states. This skill provides a +2 (quality) bonus to Body Language, Detect Lies, and Diplomacy checks. It is a Complexity 4 program. [$1,000.00] Probability Mapping. This software is most effective with a mountain of data and quantum computers, standard users can still benefit from it, using the mapping software to predict things like traffic, peak travel times, crime rates, and other periodic and habitual events. When supplied with data on a specific person, this software can make a guess as to their likely current whereabouts, activities, and possibly even moods and other factors. When necessary, it provides a +1 (quality) bonus to certain uses of skills like Area Knowledge, Criminology, Current Affairs, Economics, Finance, Market Analysis, Meteorology, and other skills the GM feels it might be relevant towards. It is a Complexity 4 program.. [$5,000.00] Radio Motion Detection. This is technically known as variance-based radio tomographic imaging, this sensing technique can be used with any wireless radio device. It is especially useful in urban areas, where wireless devices are everywhere. Because the system is passive, using existing signals, it doesn't alert the target. To detect motion in an area, the software measure and analyzes the transmission and reception of radio signals originating on opposite sides of the target area. Variations in these signals detect movement in the area, which can target locations. Since wireless radio signals penetrate walls and other obstructions, this can be used to identify unseen movement inside a structure, without giving up the game like using t-rays or radar. This method is roughly accurate to within 5 yards, reduced or increased by every 2 points for the margin of success or failure on a Computer Operations check. Resolution is poor, with few details on the target provided. It is a Complexity 5 program.. [$5,000.00; LC3] Relationship Mapping. This software uses publically available data, as well as other information supplied, to build a relationship map marking a specific target's known and likely associates and interactions. Aside from analyzing public profiles and online interactions, it also accesses mesh/grid tracking logs to pinpoint incidents of physical proximity. It is useful for identifying a person's social relationships, including friends, relatives, lovers, co-workers, conspirators, and so on. Using this software calls for a Computer Operation check, followed by a Research check to sort through the data supplied to find precisely what the player is looking for. Since there is a lot of data this provides, users benefit from looking for specific things. It is a Complexity 4 program.. [$1,000.00] |
Computer Software - Expert Systems
Expert systems are systems that are like proto-NAIs; they are designed to do a task and they do that task well, but they can only do that task. They often lack the intellectual capability to handle outside tasks and they still need humans to oversee them, although a number of expert systems can reduce the required human oversight multifold. Expert systems are often confused for NAIs, and while it's true that the two are related, NAIs often have a broader skill range and can pass themselves off as being intelligent. Expert Systems don't even attempt to be human. Also, expert systems are considerably older, having been around since before the Interstellar period. Because these expert systems are designed for one task, they cannot default. Vast numbers of expert systems are often overseen by a LAI or NAI, while a single human often works with the LAI or NAI to assist. In this way, large facilities can be almost completely automated between an overseeing LAI/NAI, an overseeing human, and thousands of expert systems that actually handle the work. Expert Systems are often installed in robots.
Accounting System. This expert system is designed to handle accounting. They are treated as having Accounting-15. They are a Complexity 5 program. [$10.00]
Artillery System. These are expert systems that manage artillery, handle mapping and trajectories, and the like. They do not have any knowledge of ballistics - their only understanding of trajectories is as it applies to artillery and they are incapable of applying that knowledge elsewhere. They have Artillery (skill)-15. They are a Complexity 5 program. [$10.00; LC2] Cryptography System. Cryptography systems are systems that are designed to understand and crack codes, systems, and ciphers. Each system is designed for a specific type of cipher, and they are incapable of thinking beyond that cypher type. They have Cryptography (type)-15. They are Complexity 5 programs. [$10.00; LC 3] Farming System. Farming systems are expert systems designed to raise specific crops, often in hydroponics bays. They are incapable of raising crops beyond the one that they are specifically programmed to raise, and they have no special insight into how that planet works nor do they understand how plants grow. They have Farming (crop type)-15. They are Complexity 5 programs. [$10.00] Freight Handling System. A freight handling system is a touch more complicated than the average Expert System, and in addition to understanding how to plan for the loading and unloading of various materials, reading of manifests, and understanding of risk, they have a bit of fuzzy logic that borders on NAI capabilities, allowing them to assess potential dangers and alert customs or supervisors of the facility. They are still not sapient, however, and cannot apply their skills to other environments or situations not directly related to their task. They have Freight Handling-15, Hazardous Materials (biological, chemical, nanotech, and radioactive)-13, and Profession (port security)-14. They are a Complexity 6 program. [$30.00] Gaming System. Gaming systems are expert systems programmed for specific games. They are often dumbed down versions of expert systems, so as not to make things too difficult for the player. They most commonly appear in VR games. They have Games (Specific Game)-15. They are a Complexity 4 program. [$3.00] Gardening Systems. Systems that oversee gardening activities and manage home gardens. They have Gardening-15. They are Complexity 4 programs. [$3.00] Gunner Systems. Systems that are designed to fire specific types of heavy guns. They are like artillery systems. They have Gunner (skill)-15. They are a Complexity 4 program. [$3.00; LC3] Housekeeping Systems. These are maintenance systems largely, used to keep up cleaning, dishwashing, and other labor. They have a specialization based on what type of labor they do; so Housekeeping (dishwashing) mans the dishwasher while Housekeeping (floor cleaning) cleans the floors. They have Housekeeping (skill)-15. They are a Complexity 4 program. [$3.00] Legal Systems. Legal systems are expert systems that, like freight handling systems, veer into NAI territory with fuzzy programming that lets them bend their logic and think a bit outside of the box. Not only are they deeply familiar with one specific legal area (and they update themselves regularly), they are also capable of writing briefs and letters, as well as requests and filing motions for the court. They are not equipped to make decisions based on the law, but they can understand it as written and so operate accordingly. They specialize based on one narrow type; for instance, Law (copyright law). They have Law (skill)-15, Research-13, and Writing-15. They are Complexity 6 programs. [$30.00] Linguistic Systems. Linguistic systems are useful for finding patterns, sorting those patterns, and arranging linguistic data to help make sense of languages through that pattern finding and identifying the underlying grammatical structure. They still require a skilled linguist to make sense of the language, however. They have Linguistics-15. They are Complexity 5 programs. [$10.00] Machinist Systems. Machinist systems are systems that are designed to machine specific materials into specific shapes that are designated when they are made. For instance, one might be designed to produce plastic screws. They have Machinist (specific material and item)-15. They are Complexity 5 programs. [$10.00] |
Market Analysis Systems. Some of the oldest expert systems, Market Analysis systems are like Legal and Freight Handling Systems in that they feature fuzzy programming and the capability to bend logic, allowing them to veer into NAI territory. They are not only familiar with analyzing markets, they also possess limited understand of economics, finance, and retail as well, which helps them integrate their knowledge into a complete picture. They have Economics-13, Finance-13, Market Analysis-15, and Merchant-14. They are Complexity 6 programs. [$30.00]
Mathematics Systems. These are systems that are designed to crunch numbers for math. They are divided up by specialization, and were the original use of expert systems. They have Mathematics (skill)-17. They are Complexity 5 programs. [$10.00] Mechanic Systems. Mechanic systems were designed to assist and run repairs. They are specialized based on the component type, generally with a focus on things like motors for specific vehicles, etc. They have mechanic (specific system)-15. They are Complexity 5 programs [$10.00] Meteorology System. Meteorology systems are designed to predict the weather when given the proper inputs. They have Meteorology (planet type)-15. They are complexity 5 programs. [$10.00] Navigation Systems. Navigation systems are specialized according to type. They have Navigation (air, land, or space)-15. They are Complexity 5 programs. [$10.00] Packing Systems. This expert system is designed to handle loading and unloading equipment. Systems are specialized based on materials. They have Packing (material)-15. They are a Complexity 5 program. [$10.00] Physics Systems. Physics systems are systems that are designed to model various physics interactions, whether it be predicting the effects of quantum entanglement or cosmological modeling. They have Physics (field)-15. They are a Complexity 5 program. [$10.00] Prospecting Systems. Often equipped in specific robot miners, these systems tend to blur the line between expert system and NAI; not only do they have an "eye for the land," but they can analyze several types of land (although they must be programmed for a specific type of geology), and can identify various minerals and metals and alloys, as well as survey. They have Geology (planet type)-14, Mathematics (surveying)-14, Metallurgy-13, and Prospecting (planet type)-15. They are a Complexity 6 program. [$30.00] Research Systems. Research systems are systems that are designed for research; they are often found in libraries and universities and do the boring task of sifting through mountains of data to return useful info. They are specialized according to skill; for instance, Research (Computer Programming) returns all the available information in the accessible data that is relevant to the Computer Programming skill; Research (Religious Rituals) does the same thing. They have Research (skill)-15. They are Complexity 6 programs. [$30.00] Search Systems. Search systems are systems that are designed to sift through pictures and images and search for specific things. Most search systems are flexible enough to search for multiple broad categories of things; for instance, Search (explosives) or Search (weapons). They have Search (skill)-15. They are Complexity 5 programs. [$10.00] Sewing Systems. These are systems that are engineered for textile manufacturing. Each one can work with a specific textile they are programmed for; for instance, Sewing (wool) or Sewing (cotton). They have Sewing (material)-15. They are Complexity 4 programs. [$3.00] Smith Systems. These expert systems are designed to handle metal working, and are programmed to work with a specific type of metal. They have Smith (metal)-15. They are Complexity 5 programs. [10.00] Surgery Systems. These are systems designed to carry specific types of surgery on individuals; each system is designed to handle a specific type of surgery (for instance, one for grafts, the other for implants, etc). They have Surgery (type)-15; variants that have Veterinary (type) also exist and are used in zoos and farms. They are Complexity 5 programs. [30.00] |
Blights
Blights are frightening things; they first emerged during the era of the God AIs, when numerous hyper-intelligent individuals, many of the digital, began experimenting with programming that would affect the various hyper-intelligent AIs and God AIs. The first true Blights likely emerged during the end of the Utopian Period, but they emerged fully and made themselves known during the Ascension Crisis and Swarms. Functionally speaking, a "Blight" is any piece of sentient malware; it's a program that's designed to attack the God AIs and their infrastructure. Blights are not very common but when Blights do emerge, it often requires the response of an entire meta-empire to deal with; the best known Blight in recent memory is believed to be the Meikko and the Alpha Consciousness; the jury is still out whether or not they are a true Blight but signs point towards them likely being one. Other blights that emerged during the Ascension Crisis but have vanished since include Amalgam, an AI infected with a piece of malware that encourages it to forcibly download software linking implants together to create a vast superbrain that is damaging and traumatic to the entities that it uses (Amalgam may be the same as the Alpha Consciousness); Vertex, an AI that attempted stellar engineering by forcing two large stars together and was only stopped through the actions of the Verge Consortium but feels compelled to create stars and black holes for some unknown reason; Greenfly, a blight that hijacked a number of terraforming swarm and almost turned several systems into nothing but rotating habitats overgrown with who knows what kind of horrible experimental and dangerous planimals; Paradox, which hijacks wormholes and redirects them, likely attempting to build some sort of network but in the process destroying the software necessary to make them work; and Red Owl Ultraseven, or ROUS, which behaves like an ultra-intelligent trojan worm, destroying grids and networks. None of these named blights, nor any of the countless others, have been seen since the Ascension Crisis and the Swarms, although it's possible that many of them have simply vanished; died out due to a lack of connections to the grid or of targets - God AI infrastructure - to infect.