User Tools

Site Tools


rpg:gurps:core:equipment:covert_ops:deception_intrusion:computer_intrusion

Computer Intrusion

Secure computers sit in high-security rooms and aren’t networked. “Hacking” them requires physical access – use Fast-Talk and a forged ID, burglary, etc. Less-secure machines on networks might succumb to a quick run down a list of known vulnerabilities or a painstaking search for new ones; either way, basic equipment is a computer, a network connection, and a caffeinated beverage of choice. The most effective route into many systems is to suborn an authorized user . . . or use special tools to spy on him.

Computer Monitoring Gear (TL7)

This apparatus intercepts and decodes the incidental radio-frequency emissions of electronic devices – including computers. The operator can read the contents of video displays (computer monitors, ATM screens, medical equipment, etc.) and capture the telltale signature of electronic typewriters, printers, fax machines, and so on. This requires an Electronics Operation (EW) roll, at a -1 per 100 yards past 300 yards. Maximum range is 1,000 yards (-7), but electrical “noise” and tall buildings limit range to 100 yards in many urban areas. There’s an extra -3 to find a specific machine among many.

Computer Monitoring Gear (TL7). Hardware the size of a refrigerator, normally mounted in a van. $50,000, 300 lbs., external power. LC3.

Computer Monitoring Gear (TL8). A laptop computer running Complexity 3 software and a database, plus a small electronics box and an antenna. $5,000, 6 lbs., external power. LC3.

Keyboard Bug (TL7)

The keyboard of a computer, data-entry terminal, electric typewriter, etc., can be modified to intercept anything typed on it – passwords being the most valuable target. Keyboard bugs transmit by radio, by phone, or (especially on a computer) over the Internet. Installation requires tools, few minutes’ access to the keyboard, and an Electronics Operation (Surveillance) roll.

At TL8, such hardware is sold commercially as either a pass-through device plugged into the keyboard cable or a complete keyboard with onboard memory. Software can do the same thing, recording every keystroke and mouse movement. This may be installed as a virus or even as an openly documented feature; e.g., to allow companies to monitor use of their equipment. $100, neg. LC4.

rpg/gurps/core/equipment/covert_ops/deception_intrusion/computer_intrusion.txt · Last modified: 2017/06/17 03:16 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki