Eavesdropping Tools


Image Cube25.jpg
Description Named after the age old practice of listening without being seen, this program focuses on collecting information unobtrusively.
Type Program
Requires 1 Processor
Tools Watch Ports, Intercept Data, Probe Defenses
Effects +3 Code Finesse


Note: The following recipe still exists but one or more ingredients are no longer available.

Connect your Network Interpreter with a Vulnerability Database
Network Interpreter Vulnerability Database
= Eavesdropping Tools


Improve your Eavesdropping Tools with some Quick Scan software
Requires Advanced Interpreter
Eavesdropping Tools Quick Scan
= Network Scan
computerchip.jpg Can be decompiled, results unknown.
GoldCoins.jpg This item can be discarded via the gang stash.


This program lets you monitor the alert level of a site and cancel alerts, but does not allow you to see when opponents send data pulses to the main security system.

Tool Summary

Tool Memory Size Target Intensity Notes
Intercept Data 2 None n/a Can make Password Guesser more effective or provides item at the end of combat; May not work in high security systems.
Probe Defenses 0 Memory 1 Adds +2 damage to Exploit if used earlier in the round
Watch Ports 0 (Defense) 1 Defends against stealthy attacks
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License