Computer Security Database

1-POINT PULLING STRING
PREREQUISITE: INFLUENCE (INTELLIGENCE OR MILITARY)
Codebreaking and electronic security (particularly circumventing electronic security) are the lifeblood of the NSA. The NSA provides security procedures and recommendations for the rest of the government and the U.S. military. Its people know computer security; they wrote the book, quite literally. The NSA computer security manual is the hacker’s bible, and the agency maintains a constantly updated database of security holes and weaknesses for internal use only. A Routine Admin/Legal check and a telecommunications connection allow the character to access the agency’s database. This grants a two step ease to the difficulty of Computer Operation checks on any Computer Hacking, and cuts the time by half (round up). NSA Professions may combine this Pulling String with the “Codebreaker” Supercomputer (with separate Tasks) and gain a four step ease to the difficulty of Computer Operation checks on any Computer Hacking, but the time is only quartered.

Comments

Please Login in order to comment!