The model can attempt to gain access to a computersystem using a suitable computer terminal which must berepresented on-table.This computer may be connected tothe system being accessed or it might be remote.Thereare 3 levels of Hacker access, each harder than the last butoffering greater benefits.A Hacking attempt takes one fullactivation, and might take longer than a single turndepending on how the dice rolls go
Comments
Content
The model can attempt to gain access to a computer system using a suitable computer terminal which must be represented on-table.This computer may be connected to the system being accessed or it might be remote.There are 3 levels of Hacker access, each harder than the last but offering greater benefits.A Hacking attempt takes one full activation, and might take longer than a single turn depending on how the dice rolls go