home home news news columns columns features features

<– Back to the Graveyard

Communications

“Pay attention to your enemies, for they are the first to discover your mistakes.” — Antisthenes

Introduction

“Ok folks, this is the place.”, Pappy the little dwarven rigger announced with no preamble. The team prepared itself once again to place themselves in the line of fire as the van pulled to a stop outside one of a Renraku owned research facility.

“Commnet is hot, all systems go. Status Monitors Check. Systems Check. We are nominal. Standby for drone insertion”

Seconds ticked away as the small crawler drone inched its way toward the fenced in perimeter, its special sensors seeking out enemy communications signals.

“Drone insertion a go. Looks like they have a non-rigged system. No surprise there. Tapping enemy comm signals now”

Another few seconds ticked by while the little rigger manipulated his control systems, trying to lock onto the security guards communications frequency.

“Got the frequency… Heh, pretty cheap crypto, this shouldn’t take long. Ok. we’re in. Gypsy, you’re a go for matrix insertion”

“I’m on it Pappy”, the decker responded as he plugged his cyberdeck into the van’s satellite system. Within seconds Gypsy found the LTG and convinced the building’s computer that he was a legitimate user. Once inside, Gypsy took control of the central computer system and began to work his particular brand of magic.

“I’m in!”, Gypsy announced through the CTI (Cyberdeck Transmitter Interface), “We have the building. We are a go!”

“Alpha team you are go for penetration. Stay frosty and good luck”

The combat team piles out of the van quickly, making their way toward the outer perimeter fence with practiced speed and stealth. In a matter of moments the fence is cut, Gypsy having disabled all of the alarms on the fence as well as stopping the deadly flow of electricity to the first line of Renraku’s defense.

“You’re clear” Gypsy announces, watching the team’s progress through the external security cameras of the building. The Loopback program he was running ensured him that the guard sitting at the monitor station was unaware of his team’s presence. He was watching a 3 minute recording of the external cameras that was in a constant loop. To his monitors everything looked normal. Only Gypsy could see the live video feed now. He quickly set up his loopback on the internal building cameras, then told the computer to unlock the door near the loading dock.

The team was in the building in a matter of minutes. Gypsy then accessed the computer’s files to find the location of the data chip they had been hired to steal. It took him only nanoseconds to browse the system and ascertain its location.

“Pappy, the chip is on the second floor, Room B3.”

The little rigger called up the floor diagrams for the building on his display screens, highlighted the room in question, then sent this digital data over the commlink via the new DataTrack system they had recently installed. All of the team members had been outfitted with Data Display Reticules. The map appeared almost instantly, showing them the quickest route to their destination. Gypsy in the meantime was busy unlocking all of the doors along the chosen route.

“There is our payday boys and girls. We are in the pike, five by five. Smooth sailing all the way. Standby. Catching some chatter on the enemy comm net. Sounds like they’re doing a routine patrol of the building. Make it fast kids”

The team moved quickly toward their objective. Then Gypsy noticed a large Black Samurai icon headed his way. With no time to call out, he activated his attack/defense routines and prepared for cybercombat. The black ice closed quickly, and hit Gypsy hard. The decker was fighting for his life.

Pappy noticed almost instantly as Gypsy’s biofeedback condition monitor went from green to yellow. The decker was in trouble. His hand wavered over the remote cutoff switch installed in Gypsy’s deck. If things got too dicey he could always dump Gypsy from the matrix. Then he noticed the situation was going from bad to worse. The little arachnoid drone he had inserted into the building just before the team went in was piping a video feed of two security guards headed down the hallway toward his team.

“Everybody hunker down and stay frosty, you got the donut eaters headed right for ya. I’ll see if I can draw them off”

The team took whatever cover they could in the exposed hallway and waited. This could get very ugly very fast if they were to be discovered. Pappy switched comm channels into the enemy commnet, and then activated his voice pattern duplication system. Fortunately he had been monitoring the building for a few days and had managed to catch the security chief on tape. Pappy spoke into the enemy comm channel, the voice pattern duplicator making it sound like the security chief.

“All security units report to the security office immediately. Repeat, all security units report to the security office immediately.”

The two patrolling security officers keyed their comm systems and acknowledged, then turned away from the team and headed back to the elevators. Pappy breathed a small sigh of relief, and still kept a watchful eye on Gypsy’s condition monitor as he switched back to the team’s comm frequency.

“I’ve rerouted them. You’re clear.. but make it fast. Gypsy’s in trouble”

The team hurried to the stairway, making their way to the second floor. Meanwhile, in the Matrix, Gypsy’s battle with the black ice was finally over. He managed to suppress the ICE, and feeling a little drained from the exertion keyed his transmitter once again.

“I’m ok Pappy, it was close but I got him. As soon as the guards get upstairs I’ll lockout the elevators. The phone systems and panic buttons are dead. We’re looking good here”

Pappy relaxed a bit and watched as his team made it to their destination, all the while scanning the local airwaves for any sign of LoneStar. The team grabbed the datachip and headed quickly for the exit route now highlighted on their Data Display Reticules. Once the team was clear of the outer fence, Pappy swung the van around to pick them up while Gypsy carefully removed all log entries related to his presence in the system, then shut down the Central Processing Unit and logged off.

The run had gone smoothly despite a few unexpected problems. The van was speeding away into the night with a load of happy, soon to be much richer runners. Gypsy had received a few minor wounds from the encounter with the black ice, but it was worth it. All of the Renraku security guards were now on the 4th floor of the building, and by the time they managed to get the doors unlocked and the elevators working again his team would be long gone.

A Discussion of Communications

Does this sound like any run you’ve ever been on? It should. This is an example of how modern communications can be used to compromise a secure location. Communications are the key to your survival as a runner. You may have noticed references in the introduction to pieces of equipment you have never heard of, such things as the CTI (Cyberdeck Transmission Interface) or the Datalink system. Rest assured that all of these devices and many more are detailed in this article.

Communications equipment is a much overlooked resource by most runners. I have seen many groups that carry only basic commlinks with no crypto, or even worse groups that carry no communications gear at all. But communications on the modern battlefield is key to survival. If you do not have good, secure lines of communications you are as good as dead.

While the hardware discussed later in this article is fairly self-explanatory in its function and purpose, it is worthy to note some of the key roles played by the party members in the above scenario. You will notice that the rigger functions as a command center, keeping his party apprised of the current situation. The decker serves his primary role as matrix overwatch, turning the building’s security systems against the security guards themselves.

The important thing to note is that this is one of the primary roles that each of these two archetypes should play in a campaign. While there are rigged security systems in existence, they are very few and very far between because of the tremendous cost factor needed to build and maintain such a system. Thus only the most ultra-secure sites will probably be rigged. Most other areas will have standard security systems monitored and maintained by computer. Since having a computer solely dedicated to this task and isolated from the matrix is also extremely expensive, most of these systems will be accessible from the matrix. Thus your deckers can interact with the rest of the party, and perform a very vital function while the run is taking place.

Your rigger can also play a crucial role, as he is the command center for the entire team. He relays information from all manner of sources to the rest of the team. He is the team’s eyes and ears. This makes the rigger a much more valuable member of the team, and these services are far more useful than any combat drone could ever hope to be.

What follows is a listing of rules and equipment for communications in the Shadowrun game. I hope you enjoy them.

Communications Devices & Systems

Biofeedback Monitor

Size: Micro

This system consists of two components: a small induction pad placed somewhere on a person’s skin and a microchip that plugs into any standard transmitter. This system transmits encoded data via a communications link that monitors the physical condition of the individual wearing the induction pad.

This allows someone at a remote location using the Biofeedback Monitoring Software to monitor the physical condition of their entire team, and respond accordingly if someone is wounded or unconscious. This system monitors a wide variety of physical indicators, including temperature, so if the induction pad is removed the software will display an Offline message rather than indicating the host as being unconscious or dead.

Description Availability Price Street Index
Biofeedback Microchip 4/48 Hrs 1,000 1
Biofeedback Induction Pad 4/48 Hrs 500 1

Biofeedback Monitoring Software

Size: NA

This software is used in conjunction with the Biofeedback monitor to display the physical condition of anyone or everyone connected to a biofeedback monitor on a commnet. This software displays both visual and/or audible alerts if any of the monitored personnel are injured or stunned. The visible display usually shows a bar graph with green, yellow and red indicators but it can be altered to show any number of conditions, such as heart rate, respiration, etc. This is particularly useful if used in conjunction with a Cyberdeck Remote Cutoff Switch for monitoring a decker in the Matrix, and pulling them out if things get too dicey. This software requires 50 MP.

Description Availability Price Street Index
Biofeedback Software 6/72 Hrs 5,000 1.5

Commnet Datajack Interface

Size: NA

This device makes it possible to control external accessories for a commnet via a standard datajack, and provides a link to send and receive data from external commnet accessories and internal cyberware. Changing commnet settings using a Commnet Datajack interface is considered a free action, rather than a simple one. It should be noted that it is not necessary to use a Commnet Datajack Interface in conjunction with either the Rigger Transmission Interface or the Cyberdeck transmission interface, as there is already a Commnet Datajack Interface integrated in both systems.

Description Availability Price Street Index
Commnet Datajack Interface 4/48 Hrs 500 1

Crypto Circuits

Size: Micro

A Crypto Circuit is a small microchip that can be used in conjunction with any form of transmission device to scramble the outgoing transmission to such an extent that it is unrecognizable to anyone that might be listening in on the same frequency. Please note that Frequency Hopping is the most common, and least effective form of cryptography. It is considered that any Crypto Circuit above level one already incorporates a frequency hopping scheme of some sort in the chip itself. Anyone that possesses a receiver equipped with a similar chip can decode the signal into a usable format. The least expensive forms of crypto available to the public use a specialized algorithm that is hard coded onto the chip itself, so it cannot be changed. More advanced forms of cryptography circuits use a system that utilizes a key code that can be changed if the user suspects their code has been broken (Level 4 and above). This requires anyone that has successfully broken the code and is listening in to make another opposed cryptography test to break the new code. Keep in mind that all team members wishing to use the communications link must be equipped with the same level of Crypto in order to use any cryptography to secure your communications channel.

Crypto Circuit Availability Price Street Index
Level 1-4 4/48hrs 5,000 x Rating 1
Level 5-7 4/48hrs 10,000 x Rating 1.25
Level 6-8 6/36hrs 15,000 x Rating 1.5
Level 9-10 9/5 Days 20,000 x Rating 2

Cyberdeck Remote Cutoff Switch

Size: Small

This is a small black box that plugs in between the cyberdeck and the datajack used by the decker to control it. It basically functions as a switch that can be tripped using a specially encoded electronic signal, allowing another team member to jack the decker out of the matrix from a remote location. It is often used in conjunction with a biofeedback monitor to remove the decker from the matrix if they encounter a problem and cannot jack out themselves. Please note that the decker is still susceptible to dump shock if this device is activated.

Description Availability Price Street Index
Cyberdeck Remote Cutoff Switch 6/72 Hrs 5,000 1.5

Cyberdeck Transmission Interface

Size: Small

The cyberdeck transmission interface is a radio transmitter and software package designed to work in conjunction with a standard cyberdeck. The CTI package allows the decker to send and receive radio signals while in the Matrix. The software must be loaded into the active memory of the deck for it to function properly. The transmitter itself can be built into the deck for an additional 20% of the listed cost, or can be used as a separate plug-in accessory. The CTI software requires 60 mp of active memory to run.

Description Availability Price Street Index
Cyberdeck Transmission Interface 6/48 Hrs 8,000 2
CTI Software Package 4/48 Hrs 1,000 1.5

Data Display Reticule

Size: Mini

This device is a simple transparent eyepiece that can be mounted on a standard headset to receive video or digital data, much as a display link does. This allows team members without the appropriate internal cyberware to receive data or video images from either a Datatrack or Vidtrack system. The eyepiece itself can also be equipped with other enhancements, including Thermographic, Lowlight, and Smartgun Link, with the same prices it would be to similarly equip a pair of goggles. The eyepiece is generally hinged so that it can be moved out of the way when not in use.

Description Availability Price Street Index
Data Display Reticule 4/48 Hrs 2,000 1

DataTrack

Size: Micro

The Datatrack system is used to transmit digital data such as pictures or text over a communications system. The Datatrack system consists of two components, a small microchip that encodes and decodes the digital information, and a visual display unit such as a Data Display Reticule or display link to display the data. Please note that the costs of the unit needed to visually display Datatrack information is not included below, this is simply the cost of the microchip itself. If the datatrack system is to be used with an internal display link and cybereye combination, the radio must either be cyberware as well, or connected to the internal cybersystems via a Datajack Control Interface.

Description Availability Price Street Index
DataTrack 2/5 Days 7,000 1.5

Headsets

Size: NA

Headsets come in 2 basic varieties. The first is a simple ear piece and subvocal microphone combination that is very difficult to detect. It has a concealability rating of 10 and can only mount items of Micro size or smaller. The second is a more conventional headset, consisting of a microphone and earpiece in a solid unit that fits on the user’s head. It does not have a concealability rating, but can mount any accessory listed above up to Mini in size.

Description Availability Price Street Index Concealability
Headset, Standard 4/48 hrs 250 1 NA
Headset, Concealable 4/48 hrs 500 1.5 10

Helmets

Size: NA

Helmets can accept any accessory that a headset can, and things such as the Data Display Reticule can be built into a HUD (Heads up Display). See the Street Samurai’s catalog for more information on helmet pricing and availability. Any system integrated into a helmet costs an additional 25% of its listed price.

See Street Samurai Catalog for Pricing & Availability

Microwave Transmitter/Receiver Upgrade

All of the above listed systems and prices are for broadband equipment. It is possible to use Microwave transmissions rather than standard radio waves. The advantage of Microwave is that it is much harder to detect. Add 4 to the target numbers for a detect test against any system using Microwave transmission. Microwave equipment is much more expensive, double the price of any radio/transmitter capable of sending/receiving microwaves. Please also note that all of the transmitters/receivers on a communications net must also be similarly modified, as a standard broadband receiver will not receive microwaves.

Radio Jammer

Size: Medium

A radio jammer is used to flood a number of frequencies with enough interference that communication becomes impossible. To jam a radio signal is an opposed test of the level of the jammer versus the level of the radio. Before a radio can be jammed, its signal and frequency must be detected by a scanner. It should be noted that jamming of radio signals is highly illegal, and as a result the equipment is very difficult to obtain and very expensive.

Radio Jammer Availability Price Street Index Range
Level 1-4 6/72 Hrs 10,000 x Rating 2 1/2 km x Rating
Level 5-7 6/4 Days 20,000 x Rating 2.5 1 km x Rating
Level 8-9 8/5 Days 30,000 x Rating 2.75 2 km x Rating
Level 10 10/10 Days 340,000 3 25 km

Radio Transmitter/Receiver

Size: Small

This is the standard radio listed in Shadowrun. It can incorporate any of the modifications listed above at the indicated cost. The rating determines the radio’s range for transmission and reception.

Radio Availability Price Street Index Range
Level 1-4 2/2 Hrs 100 x Rating 1 1 km x Rating
Level 5-7 4/12 Hrs 200 x Rating 1 5 km x Rating
Level 8-9 4/24 Hrs 300 x Rating 1.5 10 km x Rating
Level 10 4/36 Hrs 5,000 1.75 200 km

GM Notes: The higher the rating of the radio, the more powerful its signal and the less likely it is that it can be jammed. Unfortunately, the higher the rating the more likely it is that someone can lock onto its signal. To detect a radio signal using a scanner, the target number is 8 - The radio’s rating, with a minimum target number of 2. Please note that a radio signal must be detected by a scanner in this manner before any crypto tests can be made. Also note that more powerful transmitters are much cheaper if they are made larger in size. A transmitter/receiver unit that is Medium in size rather than Small costs 50% less.

Rigger Transmission Interface

Size: Micro

This device can be implanted either in a Remote control deck or in a vehicle itself, allowing the rigger access to all commnet functions while rigged.

Description Availability Price Street Index
Rigger Transmission Interface 6/48 Hrs 10,000 2

Signal Locator Beacon

Size: Micro

This small device is usually implanted in a headset or carried by a team member to allow another person connected to the same commnet to locate them. If used in conjunction with a visual display system and Datatrack, it is possible to show the individual’s location on a map as a small colored dot. This makes it possible to track the team’s movements from a remote location, or find a teammate that might be down or injured.

Description Availability Price Street Index
Signal Locator Beacon 4/24 hrs 1,000 1.25

Scanners

Size: Small

Communications scanners have been on the market for many years. The scanner searches a wide number of frequencies and locks onto any transmission of sufficient strength. To detect a transmission in the local area, the user simply rolls an opposed test of the scanner’s rating against a target number equal to 8 minus the rating of the radio, with a minimum target number of 2. If the radio is a microwave transmitter, then 4 is added to this target number. Thus to detect a radio of rating 2 (assuming the scanner is within the radio’s transmission range), the target number would be 8 minus 2, for a target number of 6. If this radio were a microwave transmitter rating 2, that target number would increase to 10 (8-2+4). A scanner can be integrated into a standard radio/transmission unit at 50% increase in the listed price of the scanner. Thus it is possible to have one small belt device perform multiple functions and decrease the carrying capacity and number of connections needed. All scanners above level 4 are capable of detecting microwave frequencies.

Scanner Availability Price Street Index
Level 1-4 2/2 Hrs 200 x Rating 1
Level 5-7 4/12 Hrs 500 x Rating 1.5
Level 8-9 5/24 Hrs 1,000 x Rating 2
Level 10 6/36 Hrs 15,000 2.5

Scramble Breakers

Size: Micro

Scramble breakers are used in conjunction with a receiver to decode encrypted transmissions, making a communication system vulnerable to monitoring and misdirection. All scramble breakers are capable of following frequency hopped transmitters, and part of the decoding process is an attempt by the computer to find the rate of change in frequency used by the opposed system. Before making the attempt to descramble the transmission, the transmission must first be detected by a scanner.

Scramble Breakers Availability Price Street Index
Level 1-4 6/48 Hrs 10,000 x Rating 1.5
Level 5-7 8/48 Hrs 20,000 x Rating 2
Level 8-9 10/48 Hrs 40,000 x Rating 2.5
Level 10 12/5 Days 300,000 3

Telecom

Size: Small

This is simply a cellular phone unit that can be worn on the belt and accessed through a headset or helmet interface. If the user is also equipped with a datajack control interface, they can dial by simply willing it to happen. This unit can be integrated into a standard radio transmitter/receiver at a 50% increase in the cost of the telecom (the radio’s prices are not affected).

VidTrack

Size: Mini

This device is a small video camera that can be attached to any standard headset, or incorporated into a helmet. This allows video images to be transmitted from the camera to any other system on the commnet equipped to receive video images.

Description Availability Price Street Index
VidTrack 6/48 Hrs 3,000 2

Voice Identification Software

Size: NA

This software runs on any standard computer, and when affixed with an audio feed it will attempt to determine if the voice it hears is truly the person it sounds like or if it is a computer generated forgery. The higher the level of the software, the more complex and subtle the coding and the more effective it is at spotting forgery. Please note that this program can be loaded and executed in headware memory as well. The size of this program is 10 MP x rating.

Voice Identification Software Availability Price Street Index
Level 1-4 4/48 Hrs 1,000 x Rating 1
Level 5-7 5/48 Hrs 5,000 x Rating 1.5
Level 8-9 8/48 Hrs 10,000 x Rating 1.75
Level 10 10/5 Days 200,000 2

Voice Pattern Duplication Software

Size: NA

This software will attempt to make your voice sound like someone else’s voice. It accepts the audio input, then compares the voice modulation pattern with any pattern recorded in its database, and attempts to make the input source sound as if the words or phrases were spoken by the person on the recording. The better the level of the software, the better the forgery will be. This system does require a Voice Modulator or Voice Synthesizer to function properly. The size of this software is 20 MP x Rating.

Voice Duplication Software Availability Price Street Index
Level 1-4 4/72 Hrs 2,000 x Rating 1.5
Level 5-7 6/72 Hrs 4,000 x Rating 2
Level 8-9 8/72 Hrs 8,000 x Rating 2.5
Level 10 12/72 Hrs 100,000 3

GM Notes: If the person who hears the duplicated voice has reason to suspect that it is a forgery, they can roll an Intelligence check against a target number of 6 plus the rating of the Voice Pattern Duplication Software. Any hearing modifications such as hi/lo frequency, hearing amplification and others reduce this target number by one for each enhancement to the listener’s hearing. This is an opposed test against the level of the Voice Pattern Duplication software. The person must get at least one net success to determine that it is indeed a forgery. If they are using Voice Identification Software then it is a simple opposed test of the Voice Pattern Duplication software and the Voice Identification Software.

Voice Synthesizer

Size: Medium

This is a device about the size of a standard cyberdeck that can be used in conjunction with Voice Pattern Duplication software to duplicate the sound of another’s voice. It can be used either as a standalone system, or be integrated into a vehicle.

Description Availability Price Street Index
Voice Synthesizer 4/48 Hrs 2,000 1

Size Descriptions

  • Micro: This is the size of a small microchip. It is usually implanted either in the headset or the transmitter unit itself.
  • Mini: This is a very small item, capable of being mounted on a headset.
  • Small: This is a small item, usually about the size of a cellular phone. It can be attached to a belt or carried separately.
  • Medium: This is a large item, about the size of a cyberdeck (or laptop computer). It can be mounted in a vehicle or carried.

Rules Additions

Changing settings or using advanced commnet features is a simple action, unless using a datajack control interface (then it’s a free action). All software listed can be run by a standard computer in a rigged vehicle or by a cyberdeck, allowing either the rigger or decker to use them. Anyone with headware memory and the appropriate internal cyberware (usually image link for visual output) can run this software as well.

Tests and Rules:

  • Finding a commnet frequency:
    • Simple Test: Roll Scanner Rating vs target number of 8 - Radio Rating (+4 if microwave transmitter).
  • Decrypting commnet encryption:
    • Opposed Test: Crypto Rating vs Scramble Breaker Rating (requires commnet frequency found first).
  • Falsifying a voice over commnet:
    • Opposed Test: Voice Pattern Duplication Software Rating vs Voice Identification Software.
  • Jamming a commnet:
    • Opposed Test: Radio Jammer vs Radio.

Cyberdeck Remote Cutoff Switch

Size: Small

This is a small black box that plugs in between the cyberdeck and the datajack used by the decker to control it. It functions as a switch that can be tripped using a specially encoded electronic signal, allowing another team member to jack the decker out of the matrix from a remote location. Often used with a biofeedback monitor to remove the decker from the matrix if they encounter a problem and cannot jack out themselves. Note: the decker is still susceptible to dump shock if this device is activated.

Description Availability Price Street Index
Cyberdeck Remote Cutoff Switch 6/72 Hrs 5,000 1.5

Cyberdeck Transmission Interface

Size: Small

The cyberdeck transmission interface is a radio transmitter and software package designed to work with a standard cyberdeck. The CTI package allows the decker to send and receive radio signals while in the Matrix. The software must be loaded into the active memory of the deck for it to function. The transmitter can be built into the deck for an additional 20% of the listed cost, or used as a separate plug-in accessory. The CTI software requires 60 mp of active memory to run.

Description Availability Price Street Index
Cyberdeck Transmission Interface 6/48 Hrs 8,000 2
CTI Software Package 4/48 Hrs 1,000 1.5

Data Display Reticule

Size: Mini

This device is a simple transparent eyepiece that can be mounted on a standard headset to receive video or digital data, much as a display link does. This allows team members without the appropriate internal cyberware to receive data or video images from either a Datatrack or Vidtrack system. The eyepiece can also be equipped with enhancements (Thermographic, Lowlight, Smartgun Link) at the same price as similar goggle upgrades. The eyepiece is generally hinged so it can be moved out of the way when not in use.

Description Availability Price Street Index
Data Display Reticule 4/48 Hrs 2,000 1

DataTrack

Size: Micro

The Datatrack system transmits digital data (pictures or text) over a communications system. It consists of a microchip that encodes/decodes the information and a visual display unit (Data Display Reticule or display link) to show the data. Costs for the display unit are not included below. If used with an internal display link and cybereye, the radio must be cyberware or connected via Datajack Control Interface.

Description Availability Price Street Index
DataTrack 2/5 Days 7,000 1.5

Size: NA

This software attempts to make your voice sound like someone else’s. It accepts audio input, compares the voice modulation pattern with any pattern recorded in its database, and tries to make the input sound as if spoken by the recorded person. Higher levels produce better forgeries. Requires a Voice Modulator or Voice Synthesizer. Size: 20 MP x Rating.

Voice Duplication Software Availability Price Street Index
Level 1-4 4/72 Hrs 2,000 x Rating 1.5
Level 5-7 6/72 Hrs 4,000 x Rating 2
Level 8-9 8/72 Hrs 8,000 x Rating 2.5
Level 10 12/72 Hrs 100,000 3

GM Notes: If the person who hears the duplicated voice suspects a forgery, they can roll an Intelligence check against a target number of 6 plus the rating of the Voice Pattern Duplication Software. Hearing modifications (hi/lo frequency, amplification, etc.) reduce this target number by one for each enhancement. This is an opposed test against the level of the Voice Pattern Duplication software. The listener must get at least one net success to determine it is a forgery. If using Voice Identification Software, it is a simple opposed test: Voice Pattern Duplication software vs Voice Identification Software. | Level 5-7 | 6/4 Days | 20,000 x Rating | 2.5 | 1 km x Rating | | Level 8-9 | 8/5 Days | 30,000 x Rating | 2.75 | 2 km x Rating | | Level 10 | 10/10 Days | 340,000 | 3 | 25 km |

Radio Transmitter/Receiver

Size: Small

This is the standard radio listed in Shadowrun. It can incorporate any modifications above at the indicated cost. Rating determines range for transmission and reception.

Radio Availability Price Street Index Range
Level 1-4 2/2 Hrs 100 x Rating 1 1 km x Rating
Level 5-7 4/12 Hrs 200 x Rating 1 5 km x Rating
Level 8-9 4/24 Hrs 300 x Rating 1.5 10 km x Rating
Level 10 4/36 Hrs 5,000 1.75 200 km

GM Notes: Higher radio rating = more powerful signal, less likely to be jammed, but easier to detect. To detect a radio signal with a scanner: target number is 8 - radio rating (minimum 2). Signal must be detected before crypto tests. Larger transmitters are cheaper: Medium size costs 50% less than Small.

Rigger Transmission Interface

Size: Micro

This device can be implanted in a remote control deck or vehicle, allowing the rigger access to all commnet functions while rigged.

Description Availability Price Street Index
Rigger Transmission Interface 6/48 Hrs 10,000 2

Signal Locator Beacon

Size: Micro

This small device is usually implanted in a headset or carried by a team member to allow another person on the same commnet to locate them. Used with a visual display system and Datatrack, it can show the individual’s location on a map as a colored dot. Useful for tracking team movements or finding a downed teammate.

Description Availability Price Street Index
Signal Locator Beacon 4/24 hrs 1,000 1.25

Scanners

Size: Small

Communications scanners search a wide number of frequencies and lock onto any transmission of sufficient strength. To detect a transmission, roll an opposed test: scanner rating vs target number 8 - radio rating (minimum 2). If the radio is a microwave transmitter, add 4 to the target number. Scanners above level 4 can detect microwave frequencies. Scanners can be integrated into a standard radio/transmission unit at 50% increase in listed price.

Scanner Availability Price Street Index
Level 1-4 2/2 Hrs 200 x Rating 1
Level 5-7 4/12 Hrs 500 x Rating 1.5
Level 8-9 5/24 Hrs 1,000 x Rating 2
Level 10 6/36 Hrs 15,000 2.5

Scramble Breakers

Size: Micro

Scramble breakers decode encrypted transmissions, making a communication system vulnerable to monitoring and misdirection. All scramble breakers can follow frequency-hopped transmitters. Before attempting to descramble, the transmission must be detected by a scanner.

Scramble Breakers Availability Price Street Index
Level 1-4 6/48 Hrs 10,000 x Rating 1.5
Level 5-7 8/48 Hrs 20,000 x Rating 2
Level 8-9 10/48 Hrs 40,000 x Rating 2.5
Level 10 12/5 Days 300,000 3

Telecom

Size: Small

Cellular phone unit worn on the belt, accessed through headset or helmet interface. If equipped with a datajack control interface, user can dial by willing it. Can be integrated into a standard radio transmitter/receiver at 50% increase in telecom cost (radio prices not affected).

VidTrack

Size: Mini

Small video camera that can be attached to any standard headset or incorporated into a helmet. Allows video images to be transmitted to any system on the commnet equipped to receive video.

Description Availability Price Street Index
VidTrack 6/48 Hrs 3,000 2

Voice Identification Software

Size: NA

Software for any standard computer; when given an audio feed, attempts to determine if the voice is genuine or a computer-generated forgery. Higher levels are more effective. Can be loaded/executed in headware memory. Size: 10 MP x rating.

Voice Identification Software Availability Price Street Index
Level 1-4 4/48 Hrs 1,000 x Rating 1
Level 5-7 5/48 Hrs 5,000 x Rating 1.5
Level 8-9 8/48 Hrs 10,000 x Rating 1.75
Level 10 10/5 Days 200,000 2

Voice Pattern Duplication Software

Size: NA

Software that attempts to make your voice sound like someone else’s. Accepts audio input, compares modulation pattern with database, and attempts to make the input sound like the recorded person. Higher levels = better forgery. Requires Voice Modulator or Voice Synthesizer. Size: 20 MP x Rating.

Voice Duplication Software Availability Price Street Index
Level 1-4 4/72 Hrs 2,000 x Rating 1.5
Level 5-7 6/72 Hrs 4,000 x Rating 2
Voice Duplication Software Availability Price Street Index
Level 1-4 4/72 Hrs 2,000 x Rating 1.5
Level 5-7 6/72 Hrs 4,000 x Rating 2
Level 8-9 8/72 Hrs 8,000 x Rating 2.5
Level 10 12/72 Hrs 100,000 3

GM Notes: If the person who hears the duplicated voice suspects a forgery, they can roll an Intelligence check against a target number of 6 plus the rating of the Voice Pattern Duplication Software. Hearing modifications (hi/lo frequency, amplification, etc.) reduce this target number by one for each enhancement. This is an opposed test against the level of the Voice Pattern Duplication software. The listener must get at least one net success to determine it is a forgery. If using Voice Identification Software, it is a simple opposed test: Voice Pattern Duplication software vs Voice Identification Software.

Voice Synthesizer

Size: Medium

This device is about the size of a standard cyberdeck and can be used with Voice Pattern Duplication software to duplicate the sound of another’s voice. It can be used as a standalone system or integrated into a vehicle.

Description Availability Price Street Index
Voice Synthesizer 4/48 Hrs 2,000 1

Size Descriptions

  • Micro: The size of a small microchip, usually implanted in a headset or transmitter unit.
  • Mini: A very small item, capable of being mounted on a headset.
  • Small: About the size of a cellular phone, can be attached to a belt or carried separately.
  • Medium: About the size of a cyberdeck (or laptop computer), can be mounted in a vehicle or carried.