cyberware_riggerware

/ Equipment > Cyberware /

/ Equipment > Cyberware > Cyberware Grades

/ Equipment > Cyberware > Cyberware Rules

/ Equipment > Cyberware > Headware

/ Equipment > Cyberware > Headware > Senseware

/ Equipment > Cyberware > Headware > Brainware

/ Equipment > Cyberware > Headware > Communications

/ Equipment > Cyberware > Headware > Riggerware

/ Equipment > Cyberware > Bodyware

/ Equipment > Cyberware > Bodyware > Cyberlimbs

Cyberware Essence Cost Availability Street Index Legality
Headware
Riggerware
BattleTac FDDM 0.15 200,000¥ 10/21 days 3 5P–R
BattleTac IVIS 0.15 150,000¥ 8/14 days 3 5P–R
Remote Control Deck 0.3 25,000¥ x Rating 4/72 hrs 2 Legal
Remote Control ECCM
Ratings 1–3 0.2 Rating x 15,000¥ 4/7 days 2 Legal
Ratings 4–6 0.3 Rating x 35,000¥ 6/14 days 3 6P–Q
Ratings 7–9 0.4 Rating x 75,000¥ 12/28 days 4 5P–R
Rating 10 0.45 900,000¥ 18/45 days 5 4P–R
Remote Control Encryption Module 0.2 Rating x 10,000¥ (Rating)/(Rating) days 3 8P–W
Rigger Decryption Module 0.2 Rating x 17,500¥ (Rating + 2)/(Rating) days 3 8P–W
Rigger Protocol Emulation Module 0.2 Rating x 5,000¥ (Rating + 2)/(Rating) days 2 Legal
Vehicle Control Rig
Level 1 2 12,000¥ 6/48 Hrs 1 6P-N
Level 2 3 60,000¥ 8/48 Hrs 1.25 6P-N
Level 3 5 300,000¥ 8/48 Hrs 1.5 5P-N

1

Headware

It is easy to determine which items fall into the headware classification. Any cyberware that is implanted in the head is considered headware, which ranges from the exotic (cyberskulls) to the mundane (datajacks). Perhaps the most useful of all cyberware, headware’s proximity to the brain also makes it some of the most dangerous to install. The fact that pieces of the skull need to be removed or drilled through in order to install headware allows the body’s most important organ to be exposed and, in some cases, damaged. This risk has in no way diminished the popularity of datajacks, radios, additional memory and other accessories.
Headware is subdivided by function into senseware, matrixware, riggerware, communications and brainware.

75

RIGGERWARE

Rigger remote control decks and accessories can be installed in a cranial interface. Implanted components can be used with linked external decks.

76

BATTLETAC™ FDDM MASTER UNIT

A variant of the BattleTac™ system for remote control networks, the Fire Direction Data Manager system (FDDM) enables one drone to act as a spotter, relaying targeting data to other drones via the remote control network. This allows drones that cannot “see” the target to fire on it.
Game Effects
The BattleTac FDDM system allows one drone to fire its weapons at a target detected by another drone. The remote control deck must carry the master unit as an accessory. Both the spotting drone and the firing drone must be adapted for the BattleTac FDDM. For more information, see Indirect Fire, p. 96, Rigger 3 and p. 99, Cannon Companion.

77

BATTLETAC™ IVIS MASTER UNIT

A variant of the BattleTac™ system for remote control networks, IVIS stands for Inter-Vehicle Information System. The system enhances the data-sharing capabilities between the remote control deck and drones. By improving information-sharing, these systems enable drones to execute more complex and sophisticated tactics to accomplish their assigned tasks.
Game Effects
IVIS enables a rigger to assign a complex mission to a group of drones. Only drones whose pilots have been modified to interact with BattleTac IVIS receive the benefit of this system.
When the rigger issues the command, he makes a Small Unit Tactics (Vehicle Tactics) Test against Target Number 5. Successes from this test can be divided between two uses: providing extra dice for the drone group’s Comprehension Test or creating a dice pool for the drone group known as the IVIS Pool. The IVIS Pool dice are shared by the drones in the group and can be used for any tests made by the drones. The IVIS Pool functions like other dice pools, and it lasts until the drone group completes its task or is given a new one. IVIS Pool dice are not available to drones that a rigger has jumped into.

78

CRANIAL REMOTE DECKS

Cranial remote decks (CRD) incorporate computer and microtronic advances that allow riggers to control drones through a remote deck in their head. This offers the rigger greater mobility and reduces the number of external devices he must manage.
Game Effects
Cranial remote decks use the standard rules for a remote control deck, except that its small size limits a CRD to a Flux Rating of 0. If a rigger wishes to increase a CRD’s transmission power, he must connect the CRD to an external or cyberlimb signal booster (see p. 40).
Riggers with CRD may use linked headware memory as remote control storage memory.

79

REMOTE CONTROL ECCM

This system of electronic counter-countermeasures protects a cranial remote control deck’s network from outside noise, whether from excessive solar activity or jamming.
Game Effects
Rules for ECCM appear on p. 138, SR3.

80

REMOTE CONTROL ENCRYPTION MODULE (RCEM)

The nature of mobile subscriber simsense technology (MSST) protocols prevents remote control networks from using broadcast encryption like other transmitters. However, the digital encoding and spread-spectrum routines provided by the RCEM are specially designed for remote control network security.This implant encodes and decodes remote control signal transmissions for a cranial remote deck, making them indecipherable to intruders who intercept a remote control channel.
Game Effects
Remote control encryption modules are available in ratings of 1 through 10. They are incompatible with standard broadcast encryption techniques. Likewise, normal broadcast decryption programs (p. 289, SR3) are ineffective against RCEM encryption; only rigger decryption modules can break the encryption of RCEMs. For more information on using RCEMs, see Electronic Warfare, p. 35, Rigger 3.

81

RIGGER DECRYPTION MODULE

A diagnostics tool used by security riggers, the rigger decryption module’s firmware cryptographic routines can be used to decrypt control network signals encoded by an RCEM as well as encrypted rigged security systems.
Game Effects
The rigger decryption module decodes encryption routines used by the RCEM or by CCSS security systems. The higher-rated the module, the more protocols are programmed into its firmware, up to a maximum rating of 10. It does not decrypt standard broadcast or data encryption.
To decrypt RCEM signals, use the rules on defeating deck encryption, p. 36, Rigger 3. For defeating CCSS encryption, see p. 49, Rigger 3.

82

RIGGER PROTOCOL EMULATION MODULE

The rigger protocol emulation module allows a rigger’s cranial deck to emulate many of the protocols used on contemporary rigged security systems and drones. This system is required for infiltrating and “hijacking” a rigged security system and is also used for conducting meaconing, intrusion and interference attempts against a remote control network.
Game Effects
The higher-rated the module, the more protocols are programmed into its firmware, up to a maximum rating of 10. For more information on using these modules, see p. 50, Rigger 3.

83

VEHICLE CONTROL RIG

This device consists of neuro-enhancers and muscular signal transference (MST) interfaces. Each level adds +2 to the user’s Reaction and +1D6 Initiative dice while rigging. Vehicles must be equipped with vehicle control gear in order for a rigging character to use them. VCRs also allow users to default to Reaction for any Vehicle Skill at a +2 modifier, as opposed to the usual +4.

Shadowruns

NPC's

Places

Organizations

Slang

House Rules

Wiki

Characters

Calendar











cyberware_riggerware

The DV8's Phayt