Hacker
Hacker | Firewall | Hacking Area | Repeater | Deployable Repeater | Hacking Programs Chart | Hacking Device
Programs and StatesAssisted Fire | Carbonite & Immobilized-B State | Controlled Jump | Cybermask & Impersonation State | Enhanced Reaction | Fairy Dust | Oblivion & Isolated State | Spotlight & Targeted State | Total Control & Possessed State | Trinity | White Noise | Zero Pain
CC Special Skills Charts Legend | Berserk | Bioimmunity | Booty | Camouflage & Camouflaged State | Chain of Command | Climbing Plus | Combat Jump | Commlink | Courage | Counterintelligence | Decoy | Doctor | Dogged | Engineer | Exrah | Explode | Forward Deployment | Forward Observer | Frenzy | G: Jumper | Guard | Hacker | Hidden Deployment & Hidden Deployment State | Immunity | Impersonation & Impersonation State | Impetuous | Infiltration | Inspiring Leadership | Lieutenant | Marksmanship | Martial Arts | MetaChemistry | Mimetism | Minelayer | Mnemonica | Morpho-Scan | Natural Born Warrior | NCO | Neurocinetics | No Wound Incapacitation | Non-Hackable | Number 2 | Parachutist | Paramedic | Peripheral | Pilot | Protheion | Regeneration | Religious Troop | Remdriver | Remote Presence | Request Reinforcements | Sapper & Foxhole State | Seed-Embryo | Sensor | Shasvastii & Shasvastii-Embryo State | Sixth Sense | Specialist Operative | Strategic Deployment | Stealth | Strategos | Super-Jump | Surprise Attack | Tactical Awareness | Terrain | Total Reaction | Transmutation | Tri-Core | Triangulated Fire | Veteran | Vulnerability
The term Hacker designates a set of Troopers who have received specific training in Infowar. This training allows them to make use both of Hacking Devices, and the programs specifically designed for them.
HACKER | AUTOMATIC SKILL |
Obligatory |
- Hackers are equipped with a Hacking Device that allows them to use Hacking Programs, according to the type of Hacking Device they carry.
- Hackers may be equipped with a Hacking Device that will grant them access to certain Hacking Programs, depending on the type of Device they are using, or to make direct use of certain Programs without requiring a device.
- Hackers may have Upgrade Programs assigned to them.
FAQs & Errata
Q: How does Isolated State interact with Hacking Programs that are not granted by a Hacking Device?
A: While in Isolated State all the Trooper’s Hacking Programs, Skills and pieces of Equipment with the Comms Attack or Comms Equipment Labels or Traits (Hacking Device, Repeater...) are disabled.
A: While in Isolated State all the Trooper's Skills and pieces of Equipment with the Comms Attack or Comms Equipment Labels or Traits (Hacking Device, Repeater...) are disabled. In addition, all their Hacking Programs are disabled.
Related Pages: Hacker, Isolated State, Quantronic Combat (Hacking)