Encrypted Computer |
Base Modifiers
Upgrade the difficulty of all Computers checks made to slice the ship's computer systems once. |
Hard Points
0 |
Modifications
Add two setback to Computers checks made to slice the ship's computer systems Mods. |
Decoy Buoy |
Base Modifiers
A decoy buoy can be jettisoned as an action. The buoy appears to sensors to be a ship. and it can be programmed with a specific transponder signal with a Hard Computers check. In addition. the buoy can be set to transmit a distress signal or other data. A character operating a ship's sensors can make a Hard Computers check to identify that the buoy is not an actual ship. After the buoy is jettisoned. it no longer counts as being attached to the ship until reattached. |
Hard Points
0 |
Modifications
Add two setback to Computers checks to identify the buoy Mods. |
Pseudo-Cloaking Device |
Base Modifiers
Increase the difficulty of checks to detect the ship with sensors by two. Upgrade the dif· ficulty of all combat checks against the ship at Short range or further away once. |
Hard Points
1 |
Modifications
Add two setback to combat checks targeting ship at Short range or further away Mods. |
Security Measures |
Base Modifiers
Upgrade the difficulty of Computers and Skulduggery checks made to gain unauthorized access to the ship twice. |
Hard Points
0 |
Modifications
Add two setback Computers and Skulduggery checks made to gain unauthorised access to the ship Mods. |
Slicing Computer |
Base Modifiers
Counts as slicer gear thal can be used by one passenger. Add automatic advantage to Computers checks made to slice enemy ships' systems |
Hard Points
1 |
Modifications
While using the Slicing computer, add 2 ranks of codebreaker and 1 rank of defensive slicing to computers checks. |