Assisted Fire | Carbonite & Immobilized-B State | Controlled Jump | Cybermask & Impersonation State | Enhanced Reaction | Fairy Dust | Oblivion & Isolated State | Spotlight & Targeted State | Total Control & Possessed State | Trinity | White Noise | Zero Pain
CC Special Skills Charts Legend | Berserk | Bioimmunity | Booty | Camouflage & Camouflaged State | Chain of Command | Climbing Plus | Combat Jump | Courage | Counterintelligence | Decoy | Doctor | Dogged | Engineer | Explode | Fireteam: Duo | Fireteam: Enomotarchos | Fireteam: Haris | Fireteam: Triad | Forward Deployment | Forward Observer | Frenzy | G: Jumper | Guard | Hacker | Hidden Deployment & Hidden Deployment State | Immunity | Impersonation & Impersonation State | Impetuous | Infiltration | Inspiring Leadership | Lieutenant | Marksmanship | Martial Arts | MetaChemistry | Mimetism | Minelayer | Mnemonica | Morpho-Scan | Natural Born Warrior | NCO | Neurocinetics | No Wound Incapacitation | Non-Hackable | Number 2 | Parachutist | Paramedic | Peripheral | Pilot | Protheion | Regeneration | Religious Troop | Remdriver | Remote Presence | Sapper & Foxhole State | Seed-Embryo | Sensor | Shasvastii & Shasvastii-Embryo State | Sixth Sense | Specialist Operative | Strategic Deployment | Stealth | Strategos | Super-Jump | Surprise Attack | Tactical Awareness | Terrain | Total Reaction | Transmutation | Tri-Core | Triangulated Fire | Veteran | Vulnerability
The term Hacker designates a set of Troopers who have received specific training in Infowar. This training allows them to make use both of Hacking Devices, and the programs specifically designed for them.
- Hackers are equipped with a Hacking Device that allows them to use Hacking Programs, according to the type of Hacking Device they carry.
- Hackers may be equipped with a Hacking Device that will grant them access to certain Hacking Programs, depending on the type of Device they are using, or to make direct use of certain Programs without requiring a device.
- Hackers may have Upgrade Programs assigned to them.
FAQs & Errata
Q: How does Isolated State interact with Hacking Programs that are not granted by a Hacking Device?
A: While in Isolated State all the Trooper’s Hacking Programs, Skills and pieces of Equipment with the Comms Attack or Comms Equipment Labels or Traits (Hacking Device, Repeater...) are disabled.Related Pages: Hacker, Isolated State, Quantronic Combat (Hacking)