Intrusive Jammer


Image Syringe25B.jpg
Description So, it's not uncommon to distract computer programs with blasts of gibberish and garbage data. This delightful piece of software takes it a step further by working to tear down its target's filters before unleashing the torrent.
Type Program
Requires 1 Processor
Tools Burst of Static, Network Silence, Corrupt Datastream, Inject Code, Junk Data, False Intrusions
Effects +2 Incognito


Note: The following recipe still exists but one or more ingredients are no longer available.

Extend the reach of your Network Jammer within systems with a Code Injector
Requires Advanced Interpreter
Network Jammer Code Injector
= Intrusive Jammer


Hammer25.jpg This item is not a component for any kind of crafting.
GoldCoins.jpg This item can be discarded via the gang stash.

Tool Summary

Tool Memory Size Target Intensity Notes
Burst of Static 2 Memory 3
Corrupt Datastream 2 Processor 1
False Intrusions 2 Hardening 4 Deals 1 damage to memory instead if it the target has no hardening
Inject Code 1 Memory 1 +2 damage if the Defender has no Hardening
Junk Data 2 Memory 1 Disrupts normal defenses the target uses during their next pass.
Network Silence 1 Alarm 1 Disrupts defender alarm
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License