You are on page 1of 32

RENEGADE RULES V1.

Table of Contents
1.0 Introduction .............................3 7.0 Command Phase ...................11 9.0 Refresh Phase.........................20
1.1 Gameplay Overview .................. 3 7.1 Start of Turn Step .................... 11 9.1 End of Game Step ................... 20
1.2 Components Overview ............. 4 7.2 Restock Hack Shack Step ........ 11 9.2 New Deal Step ....................... 20
Of Sparks and Guardians .............. 12 9.3 Hack Shack Purge Step ............ 20
2.0 Setting Up ................................6
7.3 New Sparks Step .................... 14
10.0 Your Winning Score .............20
Glossary of Terms ..........................8 7.4 Command Actions Step ........... 14
7.5 Replenish Hand Step ............... 19 11.0 Gameplay Variants ...............21
3.0 Cyber Warfare Weapons .........9
7.6 End of Turn Step ..................... 19
12.0 Rootkits ................................21
4.0 Winning and Losing ...............10
8.0 Countermeasures Phase.......19
13.0 Walkthrough ........................24
5.0 Sequence of Play ....................11 8.1 SMC’s Revenge Step ................ 19
Intel Phase ................................... 26
8.2 Success or Failure Step............ 19
6.0 Intel Phase ..............................11 Command Phase .......................... 26
8.3 Move Sparks Step ................... 19
Countermeasures Phase ............... 30
8.4 Scoring Token Step .................. 20
Refresh Phase ............................... 31

Credits:
Game Design: Richard Wilkins (Box of Delights - Ricky Royal)
Development: Tylar Allinder, Alan Emrich, Chris Magoun
Art: Clark Miller
Graphic Design: Noelle Le Bienvenu and Barry Pike III
Playtesting: Bradley Bellamy, Julius Besser, Nathan Hansen, Chuck Hughes, Charlie Jackson, Gary Lawson, Steve Ramsey,
Brad Rochford, Rupert Wilkins
Proofreading: Avalon Emrich, Noelle Le Bienvenu, Linda Daley Paulson, Petra Schlunk, Karen Wolterman
Special Thanks: To super-fan Aaron Moore for logging more than 100 play sessions and being our Renegade cybersecurity expert

2
RENEGADE RULES V1.0

1.0 Introduction 1.1 Gameplay Overview


Renegade is a game designed by Richard Wilkins for 1 to 5 players <RXZLOOKDFNLQWRDQHWZRUNRIąYHVHUYHUVRSHUDWHGE\
ages 13 and up with a playing time of approximately 90 minutes. one of four SMCs (plus a tutorial Simulator SMC to ease new
players into the game). Each of these SMCs brings its own style
You, the players, are hackers, Renegades in a dystopian future, of defenses and increased complexity that you will need to
where humanity is on the brink of disaster. Taking over cities defeat. Once you are jacked into an SMC’s servers, you and
across Japan is the Super-Massive Computer (SMC) known as your friends will assume the role of an Avatar (each with its
“Mother,” an increasingly powerful governess of society. own special ability), moving across the server’s partitions and
At the dawn of the Super-Massive Computer Age, the people ąJKWLQJIRUFRQWURORIWKHQHWZRUN%XWWKH60&VZLOOXVH
were losing faith in an increasingly amoral society. An SMC Countermeasures to thwart your hacking efforts; survive them,
named Mother was developed to emulate human thought and and your team of hackers can take control and claim victory.
emotion, to simulate human desires and aspirations, and to The game is played solitaire or co-operatively: All players will
better understand the rapid decline in morality. The citizens win or lose together.
of Sapporo became the guinea pigs of this technological
experiment. A series of government mandated, city-wide neural
implant programs, dubbed “the harvests,” enabled Mother to The Hacker’s Handbook
gather data directly from a person’s cerebral cortex. *DPHWHUPVSUHVHQWHGIRUWKHąUVWWLPH DQGGHÀQHG are in SMALL BOLD
CAPS (e.g., NETWORK).
Mother’s neural net became increasingly empowered by the
collective thoughts of a city of souls. She soon became her
own master, not only reading the minds of her citizens, but also
malevolently controlling them – sending data as well as receiving
it. Mother took charge and the people became her automatons.
Only a few – the few who from fear, mistrust, or in protest –
avoided the harvests and remained untouched by Mother’s
LQĆXHQFH/LNHVHZHUUDWVWKH\KLGLQDQXQGHUJURXQGFRPSOH[
in Sapporo’s Susukino district. While Mother’s society of
humans became free from crime, free from poverty, and free
from emotion, it was also without free will or faith. But every
society has outcasts, even Mother’s, and from these there
arose the criminals, the bootleggers, and the self-serving; the
hungry, the frightened…and you – the “Renegades.”
And there, in the underground, everyone shares the common
desire: to see the SMCs overthrown and faith in humanity
restored. But among the disenfranchised, only the Renegades
have the tools to do the job....

3
RENEGADE RULES V1.0

1.2 Components ¨ PRIMARY RENEGADE §

Tilda Sweet
Renegade Key Code
Contaminants Installations Commands Server

Overview
z Virus „ Propagator a Destruction ¤ Salvation
z Replicant „ Replicator a Deception ¤ Virtue
z Uplink „ Neural Hub a Cognition ¤ Freedom
z Data Node „ Data Port a Information ¤ Justice
z Any „ Any a Leadership ¤ Faith

q 140 cards, as follows


Countermeasures Countermeasures a Any ¤ Any
z Spark/z Flare „ Guardian/„ Firewall

Actions List
» 75 Basic Command cards Move: a per partition & carry z (3 max, same type); z & „ create “pathways;” teleport from „.
Shift: a per z or z “pushed away;” z to project to any other z or „.
Neural Hubs: If on „, may project (”Ghost”) any Action to any partition on your server.

(15 per player color, forming Profile


Upload: aaa = z must all be the same color; in your partition, must be no zs or „.
„ and „ at your partition alter costs to, respectively: a = z and a = z, regardless of zs.
Modify: a +a + zz(z) > z(z) to convert z to z of a’s color.

their starting decks)


When you Move, you can carry one Spark (z) or one
different-colored Contaminant (z) in addition to the usual Install: a + zzz = „; must all be the same color.
up to three Contaminant tokens of one type that each Infect: as + zs + z vs. zs (or 4 for „) + z.
Renegade is allowed to carry. If you win, Delete all zs or „; If you tie/lose, Delete one z.

» 36 Advanced Command cards


Execute: Perform card’s EXECUTE or INTERRUPT effect.
ACCESS POINT: Justice (¤) #6
Shop: Purchase an Advanced Command card from the Hack Shack.

» 5 SMC cards representing Tilda's a straight-up wirehead. She's concise and logical; when she doesn't grok some NewTek, she'll take it apart and put it back together,
more than likely improving it in the process. Her mind is a databank of knowledge, recalling specs and stories of infamous SMC runs. Her
speciality is combining hardware modules, meaning she can kludge a hack in short order before the Sparks have a chance to react. She's
something of a lurker, not always at the forefront of an attack, but her ability to punch into a system and her situational awareness has her

the different Super-Massive marked out as a possible black-op leader of the future and has earned her the moniker “Ballerina.”

Computers Countermeasure
» 24 Countermeasure cards 5HQHJDGH3URąOH6KHHW
Cards
(8 per Security Level: Copper,
Silver, and Gold)
q 5HQHJDGH3URąOHVKHHWVWKDW
describe each Renegade and their
special ability, along with a summary
of rules and effects
q 6 countersheets, which provide
» 5 server tiles
» 15 Red/Yellow circular tokens
» 15 Blue/Green circular tokens
» 25 Black/Gray circular tokens
» 25 Square tokens (5 each of SMC Cards Command Cards
Red,Yellow, Blue, Green, and
Black/Gray)
» 7 Purple circular tokens
» 3 circular Countermeasure
Scoring tokens (one each of
Copper, Silver, and Gold)
» 10 Avatar standees Red Black
q 2 Infection Dice (one red, one black) Server Die Partition Die
Infection Die Infection Die
q 3 ICE Dice (one each of Copper, Silver, Spark Dice
and Gold)
q 1 Partition Die
q 1 Server Die ICE Dice
q 1 Rulebook
Used in the d-ICE variant (see 11.0), these
dice replace the SMC’s black Infection Die
when resolving Infection combat.

4
RENEGADE RULES V1.0

Guardian (Front) Spark (Front)


Faith

Firewall (Back) Flare (Back)

Countermeasures Virtue

Contaminants Installations

Data Node (Front)


Justice
Data Port
Uplink (Back)

Virus (Front)
Neural Hub Salvation

Replicant (Back)

Propagator
Rootkit Freedom

Replicator

Avatar Server Tiles

Countermeasure Scoring Tokens

5
RENEGADE RULES V1.0

Running A Simulation 2.0 Setting Up


)RU\RXUąUVWJDPHDQGZKHQWHDFKLQJQHZ 1. Determine the ALPHA HACKER LHWKHÀUVWSOD\HU by whatever method you
players, we have provided a “Simulation SMC”
to challenge: The RS20 SMC and the Simulation
choose. That Renegade remains the Alpha Hacker for the rest of the game.
Countermeasure cards. 2. Establish the Game Level: Select one SMC card to battle against and place all
These simulation Countermeasure cards are unused cards in the box. Each SMCFDUGKDVDGLIIHUHQWGLIąFXOW\DQGFRPHVZLWK
DGHąQHGVHWIRUXVHZLWKWKHRS20 SMC for its own setup and operating instructions.This is the “villain” you must bring down!
tutorial purposes only and should never be mixed
in with the general set of Countermeasure 3. Create Your SMC Adversary: Sort the Countermeasure cards by Security
cards when creating a Countermeasure deck Level: Copper, Silver, and Gold LIXVLQJWKH6LPXODWLRQ60&VHHER[RQWKHOHIW .
for any other SMC.
A. 6 KXIĆHHDFKSLOHVHSDUDWHO\ZLWKWKHGHVFULSWLRQVVKRZLQJ DQGWKHLU
SMC Card Breakdown 6XFFHVV)DLOHYHQWVIDFHGRZQ .
B. Draw the number of cards from each pile as indicated at the top of the
A SMC card you have selected GXULQJ6WHSDERYH .
B
C. Arrange these drawn Countermeasure cards to form the
C Countermeasure deck by placing the Copper card V on top, the
Silver card V in the middle, and the Gold card V on the bottom.
D
D. Place all unused Countermeasure cards in the box.
4. Create the SMC Network:6KXIĆHWKHąYHVHUYHUWLOHV6WDUWLQJZLWKWKH
Alpha Hacker, each RENEGADE LHSOD\HU takes turns drawing and placing a
VHUYHUWLOHLQWKHFHQWHURIWKHWDEOHXQWLODOOąYHDUHSODFHGZLWKWKHVHQRWHV
E
A. In the regular game, place server tiles so the partition spaces are all the
same color HDFKVHUYHUWLOHVKRXOGGLVSOD\DVLQJOHFRORU . The multicolored
F side is used in the Fragmented Servers variant VHH .
B. $IWHUSODFLQJWKHąUVWVHUYHUVXEVHTXHQWO\SODFHGVHUYHUVPXVWFRQQHFWWR
the network in such a way that at least two of its partitions are touching
A - Card Title
existing partitions.
B - Countermeasure Card Quantities
C. The numbers on each of the newly placed servers must be in the same
C - SMC Setup Rules orientation as all previously placed servers.
''LIąFXOW\5DWLQJ 5. Going Renegade: Each player establishes themselves on the network by
E - Special Rules following these steps:
F - Spark Placement Quantities A. Each Renegade chooses one 3URąOH sheet RU\RXPD\VKXIÁHWKHPDQGGHDORQH
2QHSparkIRUHDFKGRW DWUDQGRPWRHDFKSOD\HU and takes its corresponding Avatar standee and deck
of 15 Basic Command cards DVVKRZQE\WKHPDWFKLQJFRORUHGLFRQLQWKH
ERWWRPULJKWFRUQHURIHDFKBasic CommandFDUG .
B. Each Renegade places their Avatar standee on the ACCESS POINT (the #6
SDUWLWLRQ of their same-colored server DOVRUHIHUUHGWRDVWKHHOME SERVER .

6
RENEGADE RULES V1.0

Network Setup Example


Note that all the servers’ partition numbers
are oriented in the same direction.

([DPSOHHettie MagneticWKH\HOORZFRORUHG5HQHJDGHVHWVXS These Data Nodes (z represent the intel that your absent
RQWKH$FFHVV3RLQW LHWKH#6SDUWLWLRQ RIVirtueWKH\HOORZFRORUHG Renegades have gathered about the SMC.
VHUYHU ¥ WKLVLVQRWHGDWWKHERWWRPRI+HWWLH·V3URÀOH6KHHW 8. Open the Hack Shack:6KXIĆHWKHAdvanced
DV´Virtue (¥ #6” Command cards and place them, face down, to form an
C. With each Renegade’s Avatar standee now on Advanced Command card $&& deck WKLVGHFNDUHDLV
the network, add one same-colored FLUFXODU FRPPRQO\UHIHUUHGWRDVWKHHACK SHACK 5HYHDOWKHąUVW
Contaminant (z token on their Access Point. four cards and place them in a row, face up, next to the
&RQWLQXLQJWKHDERYH([DPSOHHettieZRXOGDOVRVHWXSZLWK ACC deck.
RQH5HSOLFDQW(z WKH\HOORZFRORUHGContaminant (z WRNHQ 9. The Deal:(DFKSOD\HUVKXIĆHVWKHLUVWDUWLQJGHFNRI
DWVirtue (¥ #6. Basic Command cards and deals themselves a hand of
6. The SMC’s Defenses: Read the directions on the SMC ąYHFDUGV<RXFDQUHSODFH\RXUHQWLUHKDQGVKXIĆLQJLW
card being challenged and follow its setup instructions. EDFNLQWR\RXUGHFNDQGGHDOLQJDQHZKDQGRIąYHFDUGV
adding one Spark EODFNz token to your Access Point
7. Renegade Intrusion: Count the number of Access Points each time you do so.
on the network that do not have an Avatar standee there.
Receive that many Data Node EOXHz tokens and place 10. Tidy Up: Set aside all remaining unused components,
them, collectively, however you wish across the network. snacks, and beverages HJ\RXUFDQVRI*LQJHU&RRO .

7
RENEGADE RULES V1.0

Glossary of Terms Home Server


The server that matches your Avatar’s color (i.e., the
Server
(DFKRIWKHąYHGLIIHUHQWO\FRORUHGVXEGLYLVLRQV
EOXHVHUYHUWLOHLVWKHEOXH$YDWDU·VHome Server . of the network. Each server has a color and a
Access Point name as follows:
The #6 partition in each server. Installation
¥: Salvation UHG
Upgraded versions of Contaminants. There
Actions ¥: Virtue \HOORZ
are four types: Data Ports ( „ , Replicators ( „ ,
What you do during your Command Actions Neural Hubs ( „ , and Propagators ( „ . ¥: Freedom JUHHQ
Step to alter conditions on the network and When referring, collectively, to DQ\DQGDOO ¥: Justice EOXH
improve your Command deck. Installations, a white ( „ icon is used.
¥: Faith SXUSOH
Alpha Hacker Network
Spark Dice
7KHąUVWSOD\HUVHOHFWHGGXULQJVHWXS7KDW The entirety of the game board, comprised of its
player is referred to as the Alpha Hacker for the The Partition Die and Server Die when used
ąYHFRQQHFWHGVHUYHUWLOHV
rest of the game. together. They generate a random server color
DQGDVSHFLąFSDUWLWLRQnVQXPEHURQWKDWVHUYHU
Partition
Avatar
Each separate QXPEHUHG hexagonal space Super-Massive Computer (SMC
The player standee representing the location of on a server. Pieces exist in, and move between,
your character. The SMC is the “villain” you must bring down
partitions.
before determining victory. Each of them have
Command Closed Partition: Any partition completely YDU\LQJOHYHOVRIGLIąFXOW\VHWXSDQGRSHUDWLQJ
surrounded by other partitions. instructions. The network represents the SMC.
5HVRXUFHXVHGWRWDNH$FWLRQV7KHUHDUHąYH
types: Information ( , Cognition ( , Open Partition: Any partition not
Deception ( , Destruction ( , and completely surrounded by other partitions. The Magic Rules
Leadership ( . These apply at all times!
OPEN PARTITIONS
When referring, collectively, to DQ\DQGDOO 1. Always add Sparks (z one at a time.
Commands, a white ( icon is used.
2. No partition can have more than two
Sparks (z z ; adding a third immediately
Contaminant CLOSED creates a Guardian („ .
The programs you upload to the network. There PARTITIONS
3. Guardians („ cannot coexist with
are four types: Data Node (z , Replicant (z , Sparks (z ; a Spark Explosion will
Uplink (z , and Virus (z . Each have their own occur instead VHHSJ .
VSHFLDODELOLWLHVWRKHOS\RXąJKWWKH60&
4. <RXFDQQRWSODFH\RXUInstallation („
When referring, collectively, to DQ\DQGDOO tokens on a partition that has a Guardian
Contaminants, a white (z icon is used. („ token.
Passing
Countermeasure 5. No partition can contain more than three
Ending your Player Turn while still having one or
Contaminant (z tokens of the same type.
The SMC’s programs designed to fend off your more Command cards in your hand.
attacks. There are four types: Sparks (z , 6. :KHQHYHUWKHUHLVDFRQĆLFWEHWZHHQWKLV
Flares (z , Guardians ( „ , and Firewalls ( „ . Security Level rulebook and the text on a card, the card’s
text takes precedence, but you can never
Shown as Copper, Silver, and Gold, the colors
Delete violate the stacking rules above.
UHSUHVHQWWKHGLIIHUHQWGLIąFXOW\OHYHOVRQHDFK
Removing a piece from the network and Countermeasure card.
returning it to the stock of unused pieces.

8
RENEGADE RULES V1.0

3.0 Cyber Warfare Weapons Command Card Breakdown


1. Insert Cards Here: The COMMAND cards in your hand generate Commands,
Execute Actions, and effects that you use to conduct your Turn. The bottom A
portion of each CommandFDUGVSHFLąHVWKHUHVRXUFH V it provides.
B
A. Commands: Each CommandFDUGVKRZVWKHTXDQWLW\DQGW\SH
of Commands it generates VKRZQKHUH , , , DQG <RX
use GLVFDUG one or more Command cards to generate enough
CommandsRIWKHSURSHUFRORUWRSHUIRUPDVLQJOHVSHFLąF$FWLRQ
B. Execute Actions: Some Advanced Command cards $&&V include an
C
Execute$FWLRQ8QOHVVRWKHUZLVHVSHFLąHGRQWKDWFDUG\RXFDQHLWKHU D
generate Commands with that card OR perform its Execute Action.
E
C. Events: Some Advanced Command cards include text WKDWGRHVQRW
FRQWDLQWKHZRUG´Executeµ explaining a special ability that it can perform.
F
2. Token Resistance:&LUFXODURUVTXDUHWKHYDULRXVWRNHQVLQSOD\RQWKH
QHWZRUNUHSUHVHQWSRWHQWLDODFWLYLW\WKHUH<RXU5HQHJDGHVSODFHoJRRGp
hacker CONTAMINANT FRORUHGFLUFXODU tokens and build them up into
A - Card Title
INSTALLATION OLNHFRORUHGVTXDUH WRNHQV7KH60&ąJKWVEDFNZLWKoEDGp
Countermeasures to thwart your Renegades. B - Card Cost
A. Quantities are Limited:<RXFDQQRWFUHDWHDGGLWLRQDOWRNHQV,I\RX C - Advanced or Basic Denotation
run out of your Contaminant HDFKEXWVHH´%LQDU\%LWVµEHORZ or D - Command Generation
Installation tokens RIHDFK , you cannot place more on the network
until the stock is replenished. If you run out of SMC Spark  or E - Special Text
Guardian  tokens and must place one more, you lose! F - Basic Card Player Denotation
B. Binary Bits: Note that your Contaminant (z tokens have a different
color on each side UHG\HOORZDQGEOXHJUHHQ . However, there are only 15
total tokens in each pairing, so playing one reduces the availability of both
of those colors in the stock of unused pieces!
C. Contaminant Types:
VIRUSES UHGz allow you to DELETE UHPRYLQJIURPWKHQHWZRUNDQG
UHWXUQLQJWRWKHVWRFNRIXQXVHGSLHFHV the SMC’s COUNTERMEASURES -
Sparks EODFNz and Guardians EODFN„ - by using an Infect Action
and successfully rolling the Infection Dice.
REPLICANTS \HOORZz , when they outnumber Sparks (z in a partition,
can change one Spark (z into another Contaminant (z of your
choosing using the Modify Action.

9
RENEGADE RULES V1.0

UPLINKS JUHHQz connect a Renegade’s partition to F. Installation Types:


any other partition with an Uplink (z or Neural PROPAGATOR UHG„FUHDWHGE\z z z + : Once
Hub („ , allowing that Renegade to Shift RU´SXVKµ Installed, they spawn new Virus (z tokens at a
away Sparks (z and Contaminants (z from it lower cost with the Propagate Action.
using the Shift Action.
REPLICATORS \HOORZ„FUHDWHGE\z z z + : Once
<RXFDQDOZD\VXVHShift to push away circular tokens Installed, they spawn new Replicant (z tokens at a
in your Avatar’s partition; Uplinks (z and Neural lower cost with the Replicate Action.
Hubs („ allow to you reach across the network
NEURAL HUBS JUHHQ„FUHDWHGE\z z z + : Once
to push them around these “virtually connected”
partitions as well. Installed, these command centers allow you to exert
the power of your mind to act on any partition on
DATA NODES EOXHz connect partitions with your server.
“pathways” that are free to Move along, when using
DATA PORTS EOXH„FUHDWHGE\z z z + : Once
Information to perform a Move Action.
Installed, in addition to being part of a pathway OLNH
Adjacent partitions’ Data Nodes (z create DData Node (z , these also allow you to teleport
pathways through the SMC’s servers allowing your your Avatar from its partition to any other partition
$YDWDUVWR0RYHDURXQGPRUHTXLFNO\DQGHDVLO\ on the network during a Move Action.
D. SMC Spark Countermeasure: G. SMC Guardian Countermeasure:
SPARKS (z : Their presence prevents you from GUARDIANS EODFN„ : By their presence, they prevent
performing an Upload or Install Action at that you from performing an Upload or Install Action at
partition. They also attack your Contaminants (z . that partition. These are harder to Delete HOLPLQDWH
E. z z z = „: A key concept in Renegade is that three than Sparks (z and, when a Spark (z enters
circular tokens can combine into one like-colored a partition containing a Guardian („ , there is a
VTXDUHWRNHQ ZLWKLWVVWURQJHUUHODWHGDELOLW\ . Spark Explosion, and that Spark (z is cloned into
two VHHSDJHSDUW .
a. Important: There is a stacking limit. No partition
can have more than three Contaminants (z z z
or one Installation („ of each type.
4.0 Winning and Losing
E<RXFDQQRWYROXQWDULO\0RYHRU6KLIWDSpark (z
,I\RXDUHUHTXLUHGWRSODFHDSpark (z or Guardian („
to a partition containing a Guardian („ .
token into play and none remain in the stock, you immediately
c. When performing your Actions, you can never lose the game.
break rules “a” or “b” above.
After surviving the last Countermeasure card, you win the
game. To determine how well you did in winning, see 10.0.

10
RENEGADE RULES V1.0

5.0 Sequence of Play 6.0 Intel Phase


You play Renegade in a number of CYCLES (Game Turns) as Refresh your memory by re-reading the SMC card’s special
required to win or lose (see 4.0).The number of Cycles per game Gameplay Instruction (on its lower half). Then read the lower
depends on which SMC you are playing against (e.g., Alpha Moby portion of the SMC’s current Countermeasure card (i.e., the
requires three Cycles; one in Copper, one in Silver, and one in Gold). Copper, Silver, or Gold card that is face up for that Cycle). All
Sequence of play is as follows: Renegades should note the special rules and Goal for that Cycle.

1. Intel Phase (6.0) The Countermeasure card remains face up during the
Command Phase. Renegades can only look at the current
2. Command Phase (7.0): Composed of three Rounds; Countermeasure card.
each Round, starting with the Alpha Hacker and proceeding
clockwise, each player performs a Player Turn, as follows: Renegades will succeed or fail in achieving the current
Countermeasure card’s Goal as a result of the Actions they
A. Start of Turn Step (7.1) perform during the ensuing Command Phase. In addition,
B. Restock Hack Shack Step (7.2) Renegades cannot inspect the Success/Fail outcomes until they
are revealed during the Countermeasures Phase.
C. New Sparks Step (7.3)
D. Command Actions Step (7.4)
E. Replenish Hand Step (7.5) 7.0 Command Phase
F. End of Turn Step (7.6) You complete the Cycle’s Command Phase in three Rounds.
Every Round, beginning with the Alpha Hacker, each player
When all players have completed their Turns, that Round performs a Player Turn. A PLAYER TURN consists of six Steps
is complete. Begin a new Round. Once the third Round is (explained below) performed in order. After a player has taken their
complete, proceed to the Countermeasures Phase. Turn, play proceeds clockwise (i.e., to your left). After completing all
3. Countermeasures Phase (8.0) three Rounds, proceed to the Countermeasures Phase.
A. SMC’s Revenge Step (8.1): Important: Note the SMC card’s special instructions; these
may affect play during the Command Phase.
i. Virus Battle Segment
ii. Delete Contaminants Segment
7.1 Start of Turn Step
iii. Delete Installations Segment
Start of your Turn effects occur at this time.
B. Success or Failure Step (8.2)
C. Move Sparks Step (8.3)
7.2 Restock Hack Shack Step
D. Scoring Token Step (8.4)
If any of the four positions in the Hack Shack are empty, draw
4. Refresh Phase (9.0) the top card(s) from the Advanced Command card (ACC)
A. End of Game Step (9.1) deck to restock it back up to four cards.
B. New Deal Step (9.2) Should the ACC deck become depleted, the Hack Shack is
RIąFLDOO\oVROGRXWpDQGQRWUHVWRFNHGIRUWKHUHVWRIWKHJDPH
C. Hack Shack Purge Step (9.3)

11
RENEGADE RULES V1.0

Of Sparks (z) and Guardians („) Avatars cannot voluntarily enter a partition with a
Firewall („). The instant an Avatar and a Firewall („)
The SMC’s core defenses are represented by Spark (z) share a partition, relocate that Avatar by rolling the Spark
and Guardian („) tokens. Throughout the game, the SMC Dice and placing the Avatar in the indicated partition.
places and moves these Countermeasures across the
network’s partitions to foil your hacking efforts. 4. Creating Guardians: A Guardian („) is a powerful,
immobile Countermeasure.
1. Hacked Off: If you are required to place a Spark (z)
or Guardian („) token into play and none remain in The instant a third Spark (z) token enters a partition,
the stock, you immediately lose the game! immediately return those three Sparks (z z z) to
the stock and replace them in that partition with one
2. Timing is Everything: Whenever adding or moving Guardian („) token.
Sparks (z), do so one at a time, completing the
DGGLWLRQRUPRYHPHQWHIIHFWVRIWKHąUVWSpark (z) As soon as a Guardian („) token is placed, immediately
before proceeding with the second, and so forth. Delete all Contaminant (z) and Installation („)
tokens in that partition.
3. Of Flares and Firewalls: These are the reverse/enhanced
sides of Sparks (z) and Guardians („) respectively. If any Flares (z) create a Guardian („), place it as a
Flares (z) are created during a Spark Explosion Firewall („) instead.
(see part 5). Firewalls („) are created from Flares (z). 5. Spark Explosions: Whenever a Spark (z) token enters
The rules and cards generally refer to Spark (z) a partition containing a Guardian („) token, they cannot
and Guardian („) tokens, as their reverse-side coexist so – Boom! – a SPARK EXPLOSION occurs. That
counterparts function exactly as Sparks (z) and means, instead of adding one Spark (z) token to
Guardians („)GREXWZLWKVRPHoHQKDQFHPHQWVp that Guardian’s („) partition, add two Flare (z z)
tokens (remembering to do so one at a time per “Timing
The instant a Flare (z) shares a partition with is Everything,” part 2) to the next-lowest numbered
any Contaminant (z), the Flare (z) immediately partition instead.
oQHXWUDOL]HVpRQHRIWKHP(of your choice); stack it on
WRSRIWKDWQHXWUDOL]HGContaminant (i.e., z on top Exception: When moving Spark (z) tokens to the next-
of z)WRV\PEROL]HWKLV higher numbered partition during the Countermeasures
Phase, Spark Explosions will also proceed to the next-
1HXWUDOL]HGContaminants (z) are unusable; however, higher numbered partition on that server.
WKHQHXWUDOL]LQJFlare (z) continues to fully function as
a Spark (z)! Chain Reaction: If that next-numbered partition where
exploded Flare (z) tokens must be placed also contains
A Flare (z)FDQRQO\QHXWUDOL]HDVLQJOHContaminant (z). a Guardian („) token, again, they cannot coexist. Instead,
7KHQHXWUDOL]HGContaminant (z) remains imprisoned create another Flare (z) token and skip ahead to the
by that Flare (z) until it is Deleted (at which time both next-lowest numbered partition – and so on around
tokens are returned to the stock). the server, adding another Flare (z) token every time
one would be placed with a Guardian („) token. Be
If any Flares (z) create a Guardian („) through the
careful; when you see two adjacent Guardians („), they
normal Spark (z) rules, place it as a Firewall („) instead.
might quickly create a third one in this manner!

12
RENEGADE RULES V1.0

Spark Explosion & Chain Reaction Example

There are two Spark (z z) tokens Another Spark (z) token arrives The second Flare (z ) arriving in
on partition #2 and Guardian („) at partition #3 – Boom! – two partition #2 explodes from the
tokens on partitions #5, #3, and #1 Flare ( z z ) tokens are placed just-placed Firewall („) – Boom! –
when a Spark (z) token arrives (one at a time) in partition #2. The two Flares (z z ) would be placed
at partition #5 – Boom! – two ąUVWFlare (z) arriving in partition in partition #1 instead. Unfortunately,
Flare ( z z ) tokens are placed (one #2 instantly creates a Firewall („) there is already a Guardian („)
at a time) in partition #4 instead. there (wiping out all Contaminant token in partition #1, so – Boom! –
Remember that Flares (z) are placed (z) and Installation („) tokens in three Flares (z z z ) are placed
in the next-lowest numbered partition. partition #2). Worse, that was the last (one at a time) in partition #6 instead.
Guardian („) in the stock! These three Flares (z z z ) would
normally create a Firewall („) in
partition #6, but since there are
none left in stock, the Renegades
immediately lose the game!

Image of server tile to show


where each numbered partition
is located on the tile.

13
RENEGADE RULES V1.0

Countermeasure Cards 7.3 New Sparks Step


6NLSWKLVVWHSRQWKH$OSKD+DFNHUnVYHU\ąUVWWXUQ
A
Place new Sparks (z) according to the current Security Level of the Round. The
number of Sparks (z) you must place is indicated on the bottom of the SMC
card as a number of dots in a box. Find the box that matches the color of the
current Security Level (Copper, Silver, or Gold) and place that many Sparks (z).
When placing new Spark (z) tokens, where they are placed is determined by rolling the
Spark Dice.The Spark Dice will generate a random server color (via the Server Die;
B
the white side is the server where your Avatar is currently located) and a random partition
number (via the Partition Die).
C
Important: Throughout the game, when asked, the player whose Turn it is rolls the
Spark Dice. The Alpha Hacker rolls if no one is currently taking their Turn.
//Example: The Spark Dice result is [¥], [1], so you would place that new Spark (z)
token at the server where your Avatar is located in the #1 partition.//
The SMC’s Countermeasures are
progressively more challenging by
Security Level (Copper, Silver, and then 7.4 Command Actions Step
Gold) as the SMC diverts more of its You play your Command cards (representing your hacker’s tool kit) during this Step
resources to resisting your intrusion. WRJHQHUDWHVXIąFLHQWCommand points, as shown on the bottom of each card:
A - Card Title : Destruction (red), : Deception (yellow), : Cognition (green), : Information
(blue), and : Leadership (purple; which you can declare to be any other color when
B - Security Level
played). These allow you to perform Actions. Each Action requires a certain quantity
C - Goal and Special Rules and type of Command points to perform, as explained later in this rule. What
GHąQHV\RXUHIIHFWLYHQHVVDVD5HQHJDGHLVKRZFOHYHUO\\RXSOD\DQGFRPELQH\RXU
Command cards.
SMC Movement Arrows 1. Perspective: The results of your Actions occur from the perspective of your
Avatar. You cannot use your Actions to affect another Renegade’s Avatar.
2. Action Limits: During this Phase, you play cards from your hand, face up, onto
the table (so all can see)WRJHQHUDWHVXIąFLHQWCommand points to take a
single Action at a time. After taking that Action, place the cards paying for it in
your Discard Pile (i.e., a new deck of face-up discards alongside your Command
deck)$VORQJDV\RXKDYHFDUGVLQ\RXUKDQGWRJHQHUDWHVXIąFLHQWCommand
points, you can continue taking Actions or pass.
By PASSINGGXULQJHLWKHURIWKHąUVWWZR5RXQGV\RXFDQVDYHRQHFDUGDQG
carry it forward to the next Round, thus having six cards in your hand to play
The order, server (color), and direction
on your next Player Turn. You cannot save a card on the third Round.
(up or down) that Sparks (z) are moved.

14
RENEGADE RULES V1.0

3. &RPPDQG,QHIąFLHQF\: All Command points Move Action


generated by the cards you use must go toward paying For each blue INFORMATION ( ) Command point spent for
for that single Action. Any excess Command points a Move Action, your Avatar receives one Movement point.
generated while paying for that single Action are wasted. When not moving along a pathway (see below), entry into each
<RXGRQRWJHWWRoNHHSWKHFKDQJHpDQGSXWWKRVHH[FHVV adjacent partition costs one Movement point.You do not
Command points to another use. have to spend all the available Movement points during that
4. Command Completion: Once your Action is Move Action, but excess Movement points not spent at that
completed and its Command card(s) discarded, you time are lost.
cannot undo that Action. 1. You Can Take It With You: Whenever Moving from one
5. Read Only Memory: You may freely examine all discards, partition to another, you may also freely take with you up to
but can never examine unrevealed card information. three identical Contaminants (those Contaminants must
6. Wild Card: You may discard any three Command cards be of the same type; e.g., z or z z or z z z).
to generate one Leadership Command ( ) point. q Color Bind: You cannot carry different type (colored)
Contaminants (z) with you at the same time.
7. ACC Effects and Execute Actions: Most Advanced q Stacking Limit: You cannot create a situation, ever,
Command cards have a special Execute Action, where doing so would see more than three
Interrupt, Reveal, or other effects explained at the bottom Contaminant (z z z) tokens of the same type
of each card, below the Command point symbol(s). (color) in a given partition, if even for a moment.
q If you can use either the Command points or the q 6KXIĆLQJ You can pick up and drop off different type
special text, the special text will begin with the words (color) Contaminant (z) tokens as you make a multi-
o25p(e.g., “OR Execute” or “OR Interrupt”). partition movement, provided a Move directly between
q If you can use both the Command points and the any two adjacent partitions follows the above restrictions.
special text, the special text will begin with the word q Sparks: You cannot carry Sparks (z) unless a card
o$1'pRUo$/62p(e.g., “AND Reveal” or “ALSO, when”). effect allows it. In that case, however, you can never
q An Execute Action can only be used during your Move them to a partition where there is already a
Player Turn. An Interrupt can be used at any time. Guardian („).
q ,IWKHWH[WLQVWUXFWV\RXWRoRevealpWKDWFDUGIURP
your hand, place it face up in front of you as proof you 2. The Information Highway: When activated to Move,
possess it and leave it on the table until you either use it costs one Movement point to enter or exit a partition
or discard it (or pass and return it to your hand for your that does not contain any Data Nodes (z) or Data
next Player Turn). Cards can only be Revealed once Ports („). Data Nodes (z) carried with you do not
during a Turn. Cards that are Revealed can still be count as being in a partition (i.e., the presence of blue
used later during the Turn, either for their Command tokens in adjacent partitions creates a zero Movement point
points or additional effects. Advanced Command “pathway” for Renegades to glide through).
cards that are not Revealed are discarded immediately q A Ticket to Ride: You must generate at least one
upon use. Command point and activate your Avatar to
perform a Move Action before you can enter another
$IWHUJHQHUDWLQJVXIąFLHQWCommand points (as shown on partition, even if it is on a pathway (i.e., you cannot
the bottom of each Command card), the following Actions are simply Move along a pathway without generating any
available for you to perform during your Player Turn: Command points to get you started!).

15
RENEGADE RULES V1.0

Movement Example

6WDUW )LUVW0RYH 6HFRQG0RYH 7KLUG0RYH

,I\RXJHQHUDWHWKUHHInformation ( )Commands SRLQWV\RXKDYHWKUHHMovementSRLQWVWRVSHQGGXULQJWKDW


Move$FWLRQDQGFDQ0RYHWRDQRWKHUSDUWLWLRQXSWRWKUHHSDUWLWLRQV(spaces)DZD\
:LWK\RXUWKUHHMovementSRLQWV\RX0RYHRQHJUHHQ( z Uplink)ContaminantWRNHQWRSDUWLWLRQ#2 DQGGURSLWRII
WKHUHWKHQPRYHWZR\HOORZ( z z Replicant)ContaminantWRNHQVWRSDUWLWLRQ#3DQGGURSRIIRQHWKHUH\RXWKHQFDUU\
WKHUHPDLQLQJ\HOORZ( z Replicant)ContaminantWRNHQWRSDUWLWLRQ#6HQGLQJ\RXUMove$FWLRQ

q Teleporting::KHQDFWLYDWHGWR0RYH\RXU$YDWDUPD\ your Avatar’s partition, and then Shifting a second z or z from


0RYHIURPDData Port(„)WRDQ\RWKHUSDUWLWLRQRQ your Avatar’s partition.//
WKHQHWZRUNIRURQHMovementSRLQW,IWKHGHVWLQDWLRQ
 Mindfulness: 7KHEDVLFUHVWULFWLRQVDOZD\VDSSO\
SDUWLWLRQFRQWDLQVDData Node(z)RUData Port(„)
q Three Contaminant Limit: 1RSDUWLWLRQFDQHYHU
WKHQLWZLOOFRVW]HURMovementSRLQWV
KDYHPRUHWKDQWKUHHRIHDFKW\SHRIContaminant(z)
WRNHQLQLW
Shift Action q No Spark Explosions:<RXFDQQRW6KLIWSparks(z)
,QVWHDGRISK\VLFDOO\PRYLQJ\RXU$YDWDUDURXQGWKHQHWZRUN WRDSDUWLWLRQZKHUHWKHUHLVDOUHDG\DGuardian(„)
DQGFDUU\LQJContaminant(z)WRNHQVZLWK\RXYLDDMove q Installations are Immobile:<RXFDQQRW6KLIW
$FWLRQ\RXFDQSURMHFWWKHSRZHURI\RXUPLQGXVLQJRQH VTXDUH(„ or „)WRNHQV
JUHHQCOGNITION( )CommandSRLQWWR6KLIW(or push)RQH  Outreach:*UHHQWRNHQVUplinks(z)DQGNeural
FLUFXODUSpark(z)RUContaminant(z)WRNHQIURP\RXU Hubs(„)DOORZ\RXWRDFWoUHPRWHO\pDVLI\RXU$YDWDU
$YDWDUnVFXUUHQWSDUWLWLRQWRDQDGMDFHQWSDUWLWLRQ ZHUHHOVHZKHUHRSHUDWLQJIURPWKDWSDUWLWLRQ
<RXPD\6KLIWPRUHWKDQRQFHZLWKDVLQJOH$FWLRQ $ Remote Shifting::KLOH\RXU$YDWDULVRQDSDUWLWLRQ
//For example, by creating two green Cognition ( ) Command ZLWKDQUplink(z)RUNeural Hub(„)WRNHQ\RX
points you can Shift two times; that is, Shifting one z or z from FDQSHUIRUPShift$FWLRQVIURPDQ\RWKHUSDUWLWLRQ
WKDWDOVRKDVDQUplink(z)RUNeural Hub(„)

16
RENEGADE RULES V1.0

q (YHU\6KLIWLVDVHSDUDWH$FWLRQPDGHLQGHSHQGHQWO\IURPRWKHU6KLIWV Shifting Via Uplink Example


SHUIRUPHGE\Cognition( )CommandSRLQWVJHQHUDWHGDWWKDWWLPH
q <RXFDQHYHQ6KLIWWKHUHFHLYLQJUplink(z)WRNHQ,QWKLVPDQQHU\RX
FDQ6KLIWDUHPRWHUplinkDURXQGWKHQHWZRUNWR\RXUDGYDQWDJH
% Remote via Neural Hub::KLOH\RXU$YDWDULVRQDSDUWLWLRQZLWKD
Neural Hub(„)WRNHQLWJDLQVWKHDELOLW\WRSHUIRUPDQ\$FWLRQDVLI
LWZHUHRQDQ\GHVLUHGSDUWLWLRQRQWKDWVHUYHUE\WHPSRUDULO\oJKRVWLQJp
DFRS\RI\RXU$YDWDUWKHUH([SHULHQFHVKRZVWKLVPDNHVLWWKHPRVW
SRZHUIXOInstallationWRNHQLQWKHJDPH
q $IWHUSHUIRUPLQJWKDW$FWLRQ\RXUJKRVW$YDWDUGLVDSSHDUVLWLVOLNH
\RXQHYHUOHIWWKDWSDUWLWLRQnVNeural HubeEHFDXVH\RXKDYHQRW
q :KHQSHUIRUPLQJDMove$FWLRQIURPDNeural Hub(„)WRNHQ
\RXU$YDWDUGRHVQRWSK\VLFDOO\0RYHWRRUIURPDQDOWHUQDWHORFDWLRQ
RQWKDWVHUYHU+RZHYHU\RXFDQFROOHFWContaminant(z)WRNHQV
(or Sparks (z) if you are playing Tilda Sweet)E\ąUVWoJKRVWLQJpWR
DQRWKHUSDUWLWLRQRQWKDWVHUYHUDQGDFWLQJDVLI\RXZHUHSK\VLFDOO\
0RYLQJIURPWKDWSDUWLWLRQ

Upload Action
2QHZD\WRDGGDContaminant(z)WRNHQWRWKHQHWZRUNLVWR8SORDGLWRQ\RXU
$YDWDUnVSDUWLWLRQ<RXFDQRQO\8SORDGZKHQ\RXU$YDWDULVLQDSDUWLWLRQWKDWKDV
IHZHUWKDQWKUHHRIWKDWW\SHRIContaminant (z)SUHVHQW(remembering the three
Contaminant (z)per type limit)DQGFRQWDLQVQRCountermeasures(z or „) <RXU$YDWDULVRQFaith(¥)#5ZKHUH
WKHUHLVDQUplink( z )WRNHQ<RX
 Standard Upload:)RUWKUHHCommandSRLQWVRIDQ\RQHFRORU\RXFDQ
QRWLFHWKDWWKHUHDUHWZRSpark(z z)
8SORDGRQHContaminantWRNHQRIWKDWVDPHFRORULH  z(e.g., three
WRNHQVRQSalvation(¥)#3WKDW\RX
Information Command points ( )FDQEHXVHGWR8SORDGRQHData
ZRXOGOLNHWREUHDNXSDQGEHFDXVH
Node (z)token)SURYLGHGQRSpark(z)RUGuardian(„)WRNHQVDUHSUHVHQW
WKHUHLVDOVRDQUplink( z )WRNHQRQ
DWWKDWSDUWLWLRQ
Salvation(¥)#3\RXFDQ%\JHQHUDWLQJ
 Replicate:,I\RXU$YDWDUnVSDUWLWLRQLQFOXGHVDReplicator(„)WKHQRQH JUHHQCognition( )Command
Replicant(z)WRNHQFDQEH8SORDGHGWKHUHIRUHDFKDECEPTION( ) SRLQWV\RXFDQ6KLIWFLUFXODUWRNHQV
CommandSRLQW\RXJHQHUDWH(i.e., you can Upload multiple Replicants (z) DZD\IURPWKHLUSDUWLWLRQYLDUHPRWH
DVRQH$FWLRQ UHJDUGOHVVRIWKHSUHVHQFHRISpark(z)WRNHQV UplinksDVLI\RXU$YDWDUZHUHVWDQGLQJ
 Propagate:,I\RXU$YDWDUnVSDUWLWLRQLQFOXGHVDPropagator(„)WKHQRQH ULJKWWKHUH
Virus(z)WRNHQFDQEH8SORDGHGWKHUHIRUHDFKDESTRUCTION( )Command
SRLQW\RXJHQHUDWH(i.e., you can Upload multiple Viruses (z)as one Action)
UHJDUGOHVVRIWKHSUHVHQFHRISpark(z)WRNHQV

17
RENEGADE RULES V1.0

Modify Action $ 7R\RXUDWWDFNLQJUHGInfection DieUROO(z)DGGWKH


$QRWKHUZD\WRDGGDContaminant(z)WRNHQWRWKH QXPEHURIUHGDestruction( )CommandSRLQWV
QHWZRUNLVWR0RGLI\(“convert”)DSpark(z)WRNHQDW\RXU DQGWKHQXPEHURIUHGVirus(z)WRNHQV7KDWWRWDO
$YDWDUnVSDUWLWLRQ(you cannot Modify Guardian („)tokens) (z + + z)HTXDOV\RXUoInfection scorep
7KLVFDQRQO\EHSHUIRUPHGZKHQ\RXU$YDWDULVDWDSDUWLWLRQ % 7RWKH60&nVEODFNResistance DieUROO(z)DGGWKH
WKDWKDVPRUHReplicant(z)WRNHQVWKDQSpark(z)WRNHQV QXPEHURISpark(z)WRNHQVRUDGGLIWKHUHLVD
,WFRVWVWZRCommandSRLQWVWR0RGLI\WKDWSpark(z) Guardian(„)WRNHQWKHUH(z + z or z + 4 for „)
WRNHQDeleteDQGUHSODFHLWZLWKRQHRI\RXUContaminant 7KDWWRWDOHTXDOVWKH60&nVoResistance scorep
(z)WRNHQV
 ,I\RXUInfection scoreLVJUHDWHUWKDQWKH60&nV
 ,WUHTXLUHVRQHDeception( )CommandSRLQWWR Resistance score\RXKDYHZRQWKDWEDWWOHDeleteDOO
LQLWLDWHWKH0RGLąFDWLRQSOXV Sparks(z)RUWKHGuardian („)IURPWKDWSDUWLWLRQ
 2QHCommandSRLQWRIWKHW\SHRIContaminant\RX ,I\RXUInfection scoreLVOHVVWKDQRUHTXDOWRWKH60&nV
ZLVKWR0RGLI\WKDWSparkLQWRLH  z  z  z Resistance score\RXKDYHORVWWKDWEDWWOHDeleteRQH
 zDQG  DQ\Contaminant(z)WRNHQ\RXFKRRVH Virus(z)WRNHQDWWKDWSDUWLWLRQ

Install Action Execute Action


7RLQFUHDVHWKHLUSRZHUH[SRQHQWLDOO\\RXPD\H[FKDQJHWKUHH 'LVFDUGDQAdvancedCommandFDUGWRLJQRUHLWV
VDPHFRORUHGContaminant(z z z)WRNHQVDW\RXU$YDWDUnV CommandSRLQWVDQGLQVWHDGXVHLWVoExecutep$FWLRQ
SDUWLWLRQIRURQHOLNHFRORUHG(immobile)Installation(„)WRNHQ
E\VSHQGLQJRQHOLNHFRORUHGCommandSRLQWXVLQJWKH Shop Action
Install$FWLRQ(e.g., z z z + = „)
<RXLPSURYH\RXUDELOLWLHVDVD5HQHJDGHE\SXUFKDVLQJFDUGV
<RXFDQRQO\,QVWDOOZKHQ\RXU$YDWDULVDWDSDUWLWLRQWKDWKDV DWWKH+DFN6KDFN(i.e., this is how you upgrade your Command
q 1RSpark(z)RUGuardian(„)WRNHQVSUHVHQWDQG card deck)
q 1RSDUWLWLRQFDQKDYHWZRInstallations („)RIWKHVDPH
,QRUGHUWRSXUFKDVHDQAdvanced Command(ACC)FDUG
W\SH(color)
IURPWKH+DFN6KDFN\RXPXVWSD\IRULWZLWKCommand
SRLQWV(its cost is shown in the upper right hand corner)DVIROORZV
Infect Action
 5HYHDOFDUGVIURP\RXUKDQGWKDWFRQWDLQWKHCommand
7KHZD\\RXDWWDFNDQGDeleteDSpark(z)RUGuardian(„)
SRLQWVQHFHVVDU\WRSD\IRUWKHFRVWRIWKH$&&
WRNHQDW\RXU$YDWDUnVSDUWLWLRQLVWR,QIHFWLWZLWKViruses (z)
(Overpayment is allowed, but excess Command points are lost.)
YLDDestruction( )CommandSRLQWV(and supplemented by
your Virus (z) tokens present there)<RXPXVWKDYHDWOHDVWRQH  7DNHWKHSXUFKDVHGFDUGIURPWKH+DFN6KDFNDQGDGGLW
Virus(z)WRNHQSUHVHQWWRSHUIRUPWKHInfect$FWLRQ WR\RXUKDQG,WLVLPPHGLDWHO\DYDLODEOHIRUXVH
3URFHGXUH  2IWKHFDUGVXVHGWRSXUFKDVHWKHQHZ$&&FKRRVHRQH
RIWKHUHYHDOHGFDUGVWRDeleteDQGGLVFDUGWKHUHVW
 *HQHUDWHRQHRUPRUHUHGDestruction( )Command
SRLQWVDQGGHFODUH\RXUDWWDFN7KHQUROOWKHWZRInfection $WWKHHQGRIDShop$FWLRQ\RXVKRXOGVWLOOKDYHDWRWDORI
Dice(z for you and z for the SMC)DQGDGMXVWWKHLU FDUGVEHWZHHQ\RXUCommandGHFN'LVFDUG3LOHDQGKDQG
VHSDUDWHUHVXOWVDVIROORZV

18
RENEGADE RULES V1.0

7.5 Replenish Hand Step 8.2 Success or Failure Step


'XULQJWKHąUVWWZR5RXQGVRIHDFK&\FOHGUDZąYHPRUH 'HWHUPLQHLI\RXKDYHVXFFHVVIXOO\FRPSOHWHGWKH60&nV
FDUGVIURP\RXUCommandGHFNDQGSUHSDUHIRU\RXUQH[W FXUUHQWCountermeasureFDUG*RDO(or failed to do so)
3OD\HU7XUQ$IWHU\RXFRPSOHWHWKHWKLUG5RXQG\RXZLOOKDYH 7KHQĆLSRYHUWKDWFDUGDQGSHUIRUPLWVFRUUHVSRQGLQJ
DGHSOHWHGCommandGHFNVRWKHUHZLOOEHQRFDUGVLQLWIRU 6XFFHVVRU)DLOHYHQW)ROORZLWVLQVWUXFWLRQVIURPWRSWRERWWRP
\RXWRGUDZ DQGLQWKHRUGHUSUHVHQWHG
:KHQLQVWUXFWHGWRSODFHSparks(z)Guardians(„)RU
7.6 End of Turn Step Contaminants(z)RQPRUHWKDQRQHSDUWLWLRQDQGRUVHUYHU
SODFHWKHPLQDQ\RUGHU\RXGHVLUHNHHSLQJLQPLQGWKHo0DJLF
6RPHHIIHFWVRFFXUDWWKHHQGRI\RXU7XUQWKLVLVZKHQ\RX
5XOHVp(see pg. 8)
SHUIRUPWKHP$IWHUZDUGVSOD\SURFHHGVWRWKHSOD\HURQ
\RXUOHIWZLWKWKHLU6WDUWRI7XUQ6WHS Important:.HHSWKDWFDUGLQLWVVDPH(Success or Fail)RULHQWDWLRQ
q :KHQHDFKSOD\HUKDVąQLVKHGWKHLU7XUQWKDW5RXQGLV DQGDSSO\WKH0RYHSparks6WHS(below)
FRPSOHWH%HJLQDQHZ5RXQG
q :KHQWKHWKLUG5RXQGLVFRPSOHWH(i.e., each player will 8.3 Move Sparks Step
have gone through their entire Command deck of 15 cards)
SURFHHGWRWKHCountermeasures3KDVH 3HUWKHIRXUFRORUHGDUURZVRIWKHFXUUHQWCountermeasure
FDUG(as oriented)Sparks(z)ZLOOPRYHXSRUGRZQRQWKH
VHUYHUVWKDWPDWFKWKHFRORURIWKRVHDUURZV(i.e., a red arrow
8.0 Countermeasures Phase would affect the red server)6WDUWLQJZLWKWKHDUURZRQWKHOHIW
DQGZRUNLQJWRWKHULJKWSURFHHGDVIROORZV
7KH60&VWULNHVEDFNDW\RXULQWUXVLRQV&RQGXFWWKH
IROORZLQJ6WHSVLQRUGHU q ,IWKHDUURZLVSRLQWLQJXS0RYHHDFKSpark(z)WRNHQ
ORFDWHGRQWKHORZHVWQXPEHUHGSDUWLWLRQWKDWFRQWDLQV
Sparks (z)WRWKHQH[WKLJKHUQXPEHUHGSDUWLWLRQ
8.1 SMC’s Revenge Step q ,IWKHDUURZLVSRLQWLQJGRZQ0RYHHDFKSpark(z)WRNHQ
 Virus Battle Segment:Virus(z)WRNHQVPXVWDWWDFN ORFDWHGRQWKHKLJKHVWQXPEHUHGSDUWLWLRQWKDWFRQWDLQV
DOOSpark(z)DQGGuardian(„)WRNHQVLQWKHLUSDUWLWLRQ Sparks (z)WRWKHQH[WORZHUQXPEHUHGSDUWLWLRQ
ZLWKInfect$FWLRQV(7.4)EXW\RXFDQQRWSOD\Command q o/RRSpEHWZHHQSDUWLWLRQV#1DQG#6ZKHQPRYLQJXSDQG
FDUGV5HSHDWDVQHHGHGXQWLOVirus(z)WRNHQVQR GRZQ(i.e., up from #6 to #1 or down from #1 to #6)
ORQJHUH[LVWLQWKHVDPHSDUWLWLRQDVHLWKHUSpark(z)RU q 5HVROYHSparkExplosions(page 12, part 5)DVWKH\RFFXU
Guardian(„)WRNHQV7KHVHDUHEDWWOHVoWRWKHGHDWKp q ,PPHGLDWHO\UHSODFHWKUHHSpark(z z z)WRNHQVRQD
SDUWLWLRQZLWKDGuardian(„)WRNHQ
 Delete Contaminants Segment:5HPDLQLQJ
q SparkExplosionsIROORZWKHGLUHFWLRQRIWKHDUURZ
Spark(z)DQGGuardian(„)WRNHQVRQWKHQHWZRUN
:KHQSparks0RYHXSVRGRWKHLUSparkExplosions
DXWRPDWLFDOO\DeleteDOOContaminant(z)WRNHQVLQ
WKHLUSDUWLWLRQV &RPSOHWHO\UHVROYHSparkExplosionsDVWKH\RFFXU
EHIRUHSHUIRUPLQJDQ\UHPDLQLQJSpark(z)WRNHQ
 Delete Installations Segment:Guardian(„)WRNHQV
PRYHPHQW
RQWKHQHWZRUNDXWRPDWLFDOO\DeleteDOOInstallation
(„)WRNHQVLQWKHLUSDUWLWLRQV
<RXU$YDWDUVDUHXQDIIHFWHGE\WKH60&nVUHYHQJH

19
RENEGADE RULES V1.0

8.4 Scoring Token Step 9.3 Hack Shack Purge Step


If you Succeeded on all of the Countermeasure cards at the Discard all of the cards available at the Hack Shack. A fresh
current Security Level, gain a Countermeasure Scoring token. restock of four cards will be set during the Alpha Hacker’s
It improves your score at the end of the game (10.0). next Turn.
If you Failed, Delete that Countermeasure card, placing it
in the box.
10.0 Your Winning Score
$IWHUVXUYLYLQJWKHąQDOCountermeasure card, measure the
9.0 Refresh Phase degree of your success in Victory Points (VPs) as follows:
Prepare for the next Cycle or end the game. q +1 VP per complete set of 5 Spark (z z z z z) tokens
in the stock.
q +1 VP per Installation („) token on the network.
9.1 End of Game Step q +5 VPs per Guardian („) token in the stock.
If there are no more Countermeasure cards remaining to play, q +25 VPs per Countermeasures Scoring token earned
the game is over and you have won (see 10.0). Now you can by successfully completing all Countermeasures at that
relax with refreshments and celebrate your victory! Security Level (Copper, Silver, and Gold).
Note: Mother has two silver Countermeasure cards,
so both have to be successfully completed to earn the
9.2 New Deal Step silver Countermeasure Scoring token.
If there is another Countermeasure card remaining, then
play the next Cycle. Each Renegade discards any cards still in
WKHLUKDQGVKXIĆHVWKHLUCommand deck, and deals themselves
DIUHVKKDQGRIąYHFDUGV

Winning Score Results


0-69 VPs 70-99 VPs 100+ VPs
Good job, Renegades.You have survived Great work today, comrades! You have Congratulations! Your victory over the
your encounter with the SMCs for just seriously damaged Mother’s network, SMCs has brought you notable acclaim
long enough to progress the Renegade allowing our rescue operatives to free a amongst your comrades. Mother’s network
cause. Mother has been distracted and her JUHDWPDQ\FLYLOLDQVIURPKHULQĆXHQFH is seriously crippled. Whole districts have
defenses weakened, but you did not do These are the kind of victories that will been freed from her grasp. With leaders
quite enough to bring her down. We need ąQDOO\VDYHKXPDQLW\<RXFDQWUXO\VD\ like you, faith in humanity will quickly be
to regroup and consider how we can do “I am Renegade!” UHVWRUHG<RXDUHDWUXHIUHHGRPąJKWHU
better next time…. who can proudly say, “I am Renegade!”

20
RENEGADE RULES V1.0

11.0 Gameplay Variants d-ICE (Intrusion Countermeasure Electronics) Mode


During an Infect Action and the Virus Battle Segment, instead
Once you are familiar with the base game, you may wish to try
of rolling the (normal) black Infection Die to generate the
some of these variants. Feel free to combine them for even
60&nVUHVXOWDGGHGWRWKHCountermeasure’s strength, use
more interesting gameplay.
the corresponding Copper, Silver, or Gold Infection Die
GHSHQGLQJRQZKLFK6HFXULW\/HYHOGHIHQVH\RXDUHąJKWLQJ
Fragmented Servers WKDW&\FOH PDNLQJWKHLUGHIHQVHVPRUHGLIÀFXOWWRFRPEDW .
When laying out the network, place all server tiles with their
“fragmented” (multi-color) sides face up. When fragmented, Designer’s Note:The results on the black die are normal: 1, 2, 3,
“server” always refers to the six partitions of the same color, 4, 5, and 6 with a 3.5 result average.
not those that share a server tile.
The Copper die is: 2, 2, 3, 4, 5, and 6 with a 3.67 result average.
Simultaneous Play The Silver die is: 2, 3, 4, 4, 5, and 6 with a 4.0 average.
Allow all Renegades to conduct that Round’s Player Turns The Gold die is: 3, 4, 4, 5, 5, and 6 with a 4.5 average.
simultaneously (i.e., performing their Actions in any order they Plan your calculations accordingly!
choose). Immediately replace Advanced Command cards in
the Hack Shack when purchased. Players can choose to start
their turns at any time during that Round’s Command Phase
(and performing their Start of Turn Step at that time).
12.0 Rootkits
ROOTKITS (purple z) are a special type of Contaminant (z)

Hard-Core Mode that are only available in games when there is a Renegade with
a Leadership (purple) 3URąOH, such as Rupert Stanz, playing.
When a Guardian („) is formed, immediately Delete all
Special Ability: You can treat a partition’s versatile Rootkit
Contaminant and Installation tokens (z and „) on the (z) as any other single type of Contaminant (z) each time
entire server. you take an Action (only) there.

Horde Mode Limitations: There are certain limitations when Rootkits


are in the game:
Do not set up an SMC or any Countermeasure cards. Instead:
Only one Rootkit (z), at most, per partition, is allowed
Setup: Place one Spark (z) token on every Faith (¥) partition, (instead of the usual three for other Contaminants (z)).
and one Spark (z) token on each Renegade’s Access Point.
Only a Renegade with a Leadership (purple) 3URąOH can
Command Phase: During each Renegade’s New Sparks Step, place Rootkits onto the network. Placement requires:
roll the Spark DiceRQFHGXULQJWKHąUVW&\FOHWZLFHGXULQJ q Three Leadership Command points ( ) to
WKHVHFRQG&\FOHDQGWKUHHWLPHVLQWKHWKLUG&\FOH3ODFHWZR Upload a Rootkit (z); or
Spark tokens (z z) on each partition rolled (instead of only one). q One Deception ( ) Command point plus one
Victory Conditions: Do not bother keeping score.This is a test Leadership ( ) Command point ( + ) to Modify
RIEUXWHVXUYLYDO&DQ\RXPDNHLWWRWKHHQGRIWKUHH&\FOHV" a Spark (z) to a Rootkit (z).

21
RENEGADE RULES V1.0

THE RENEGADES
Tilda Sweet Monty Quantum Oshin Noro Hettie
i Magnetic
i
When she takes When Monty is at His skill adds Once per Player
a Move Action, an Uplink ( z ) or two (+2) to any Turn, when
Tilda can carry one Neural Hub („), Infection scores performing a
Spark (z) or one he can “ghost” his at his partition Modify Action,
different-colored Actions not just at all times. The Hettie’s Avatar can
Contaminant (z) to any partition on Infection score act as a Replicant
in addition to the that server (as other becomes: (z), adding one (+1)
usual up to three Renegades do from z + + z + 2. to the total number
Contaminant Neural Hubs („)), His Avatar does not of Replicants (z)
(z z z) tokens of but to any partition count as a Virus ( z ) in her location.
one type that each that contains any token, and other Although she acts
Renegade is allowed type of Installation Renegades on his as a Contaminant
to carry. („) anywhere on server cannot apply (z), she does not
//For example, the network! If it is Oshin’s skill when count for the three
she could carry another (i.e., remote) he is on a different Contaminant
z z z + z , or Neural Hub („), partition with a (z z z) stacking
z z + z. She he can ghost his Neural Hub („); limit.
could not carry Action to any i.e., Commanding
z z z + z as that partition on that from a Neural Hub
would violate the server (“Command („) only applies
three per partition E\SUR[\µ . to the Renegade
limit rule.// actually taking an
Action.

22
RENEGADE RULES V1.0

Tokyo Black Devon “Dex” Angel Nitrate The Techno Twins Rupert Stanz
As an Action, for Romeo You may place any You control two Adds Rootkit
, you can You may save an Spark (z) that Avatars, both (z) tokens to the
reposition (i.e., extra card between spawns at, or moves sharing your Access game (only one per
remove and replace) turns during the to, your partition on Point (¥ #6). Each SDUWLWLRQPD[QRW
your current ąUVWWZR5RXQGVRI an adjacent partition Action must be three, as with other
server per the HDFK&\FOH instead. performed by either Contaminants).
setup instructions, Avatar, not both. Any When taking a
provided you do not mention of “your Command Action
disconnect any other partition” or “your (only!), players treat
server from the rest server” can be either a Rootkit (z)
of the network. Avatar’s. token as any color
Contaminant (z).
Do not use
Rupert during the
Walkthrough or for
\RXUÀUVWIHZJDPHV
+LV´DGYDQFHGSURÀOHµ
LVEHWWHUGLVFRYHUHG
after you have more
H[SHULHQFHDVD
Renegade.

23
RENEGADE RULES V1.0

13.0 Walkthrough
“Listen up Prospects.You’re looking at the RS20, a simulator designed by our Black Agents.
o7KHVHJX\VDUHH[FRUSVRWKH\NQRZZKDWLWWDNHVWREULQJGRZQWKH60&V7KH\KDYHFUHDWHGWKUHH
Countermeasures for this test. Each is harder than the last, from Copper, through Silver, to Gold.
This is no picnic for posers. If you fail, then restart the sim.
“I’ve put all the dirtboys and wireheads every dark corner of this city can throw at us through this sim.
We’ve been scraping the barrel looking for new recruits. It is like zero-hour in a puppet parlor up here
and folks are losing hope. But someone thinks you guys are something special.
“But let me warn you... only the best will make it through Gold and be called a ‘Renegade.’ Attempt to
VWUHDNWKURXJKWKH60&VZLWKRXWWKHSURSHUWRROVDQGWKHSURSHUWUDLQLQJDQG\RXZLOOEHQRWKLQJEXWD
chalk outline. And you had better pay attention to the restrictions each Countermeasure imposes on
you. We do not want you guys makin’ like Ronin and trying to cheat the system. Not unless it gets our
say-so. Using techniques prohibited by the sim’s CountermeasuresPHDQVLPPHGLDWHGLVTXDOLąFDWLRQ
So listen closely to your instructors and do as they say.
“Last piece of advice: When you reach Gold, we will be jacking-in from the Hack Shack, a bar in
Sapporo’s Susukino district. There you can trade for better Commands, so do so every chance you
get! Prospects aren’t normally allowed in the bar but we have, call it a ‘special arrangement,’ that you be
DOORZHGHQWU\RQFH\RXKDYHPDGHLWWKURXJKWKHąUVWWZRVLPXODWLRQV8VHWKLVRSSRUWXQLW\EHFDXVHWKLV
GLVSHQVDWLRQFRVWVWKH5HQHJDGHą[HUVKHDYLO\HDFKWLPHZHUXQWKHWUDLQLQJSURJUDP
And be careful in there. Every dirty rotten perp and street leech is gonna pick you
out the crowd if you go in looking like some wide-eyed monkey. Use your skills,
XVH\RXUWUDLQLQJDQGWU\WRąWLQ
“Good luck, Prospects. See you on the other side!”
[Rupert Stanz, Ace Renegade First Class]

24
RENEGADE RULES V1.0

This walkthrough teaches the fundamentals of gameplay


E\GHPRQVWUDWLQJRQH&\FOHRIWKHJDPH<RXFDQUXQWKLV
simulation solo or cooperatively in teams of two, three, or
four players.
First, arrange the network as pictured to the right (while normally
UDQGRPIRUWKLVZDONWKURXJKZHZDQWHYHU\RQHXVLQJWKHVDPHERDUG :
1H[WVKXIĆHWKHAdvanced Command cards and, from that
deck, reveal four face up that are available for purchase; this is
WKH+DFN6KDFN7KHVHFDUGVDUHQRWDYDLODEOHWR\RXIRUWKHąUVW
WZR&\FOHVRIWKH6LPXODWRUMXVWLJQRUHWKHPXQWLO\RXJHWWRWKH
SSet et uup
p tthe
he
Gold Countermeasure card. Once you have graduated, and if
ggameame aass sshown
hown ER
ER
TTER

you wish to replay the Simulator, feel free to use them any time.
BBYYYPA
BYP ASSS
PPAASS
AS DATA
DA
DAT STEAALL
TAA STE DDEECR
DEC RYP
EECCR
CRY PT
YYPPT
RYPT
RY ILTR
FIILT
NFFFIL
INFI
INF
ATEE
RAATE
RAT
TTRA ERY
CCKKER
CKE
ASSTE
AS
AST
RRYY MMAS

h ere. (C
here. Cards ggoo
(Cards
7KLVZDONWKURXJKZLOOEHWDNLQJ\RXWKURXJKDVROLWDLUHJDPHZLWK iinn hand.)
hand.))
ASI
AS
BAS
BBASIIC
SIC
SSI
ASIC

WKHEOXHSOD\HUTilda SweetEXWLI\RXZDQWWRSOD\DORQJVLGH
her, either alone or with friends, you are free to add additional
Renegades to join the team. Tilda is the designated Alpha Hacker Jacked-In and Connected
for this walkthrough. If Tilda is playing solo, there will be four servers with
Take Tilda’s Renegade 3URąOH sheet and place it in front of unoccupied Access Points (if you are playing with a team, one
you as a reference. Underneath Tilda’s portrait is her special fewer server per Renegade has an unoccupied Access Point).
ability, so make a note of it. (Tilda’s gives her a special carrying Even though Access Points are unoccupied, you still have
DELOLW\ZKHQVKHPRYHVDERXWWKHQHWZRUN Place Tilda’s Avatar the knowledge to utilize them; to represent this, and since
standee on the #6 space (called the server’s Access Point) of blue is the color of Information in Renegade, place one
her like-colored (Home Server) tile; Tilda’s is Justice (¥) Data Node (zWKHEOXHContaminant) token on each of
#6.Your Avatar standee represents your (virtual) location on the unoccupied Access Points. Normally, you may place these
the network JDPHERDUG and moves about from partition to freely during setup, but for this walkthrough place them on the
partition LHKH[DJRQDOVSDFHWRKH[DJRQDOVSDFH . Finally, place vacant Access Points.
a like-colored Contaminant (z) token at her Access Point; Now that you are connected to the network, let us size up
Tilda starts with a Data Node (z) on Justice (¥) #6. your opponent.
Next, take Tilda’s starting deck of 15 Basic Command
cards FRORUFRGHGRQWKHLUIURQWVZLWKDEOXHLFRQLQWKHLUORZHUULJKW What You Are Up Against
corner)<RXZRXOGQRUPDOO\VKXIĆHWKLVGHFNDQGGHDO\RXUVHOI Set up the RS20-Simulator SMC card as your adversary.
DKDQGRIąYHFDUGVEXWIRUWKLVZDONWKURXJKWDNHWKHVH &UHDWHLWVCountermeasure deck from the three Simulator
VSHFLąFąYHFDUGVBypass, Data Steal, Decrypt, ,QąOWUDWH, Countermeasure cards, with Copper on top, Silver under
and Trickery Master. that, and Gold on the bottom; you play through one card per
If you are playing an additional Renegade, or have friends joining &\FOHVRWKLVJDPHZLOOODVWWKUHH&\FOHV'RQRWORRNDWWKHLU
you, do likewise with their own-color Avatars on those like-colored Success/Failure side! All will be revealed in time….
servers, with a like-colored Contaminant there to start, and Now, checking the SMC card, the RS20-Simulator tells you to
their own CommandGHFNVZLWKWKHVDPHąYHFDUGKDQG place, on each Renegade’s Home Server, two Sparks and one

25
RENEGADE RULES V1.0

Replicant (z z z) on partition #4, and one Replicant (z) on Command Phase


partition #6 (i.e., their Access Point).Thus, on Tilda’s blue Home
This Phase is the main focus of Renegade(DFK5HQHJDGH
Server (¥), you will set up her Avatar standee and z z on her
conducts a Player Turn using (and discarding) their hand’s
Access Point (¥ #6), and on ¥ #4 you will set up z z z.
Commands to hack the SMC and otherwise improve their
Also place one Spark (z) on every odd-numbered partition position in the game, afterward replenishing their hand and the
(i.e., #1, #3, and #5) on Faith (¥) that is adjacent to a offerings at the Hack Shack (if they purchased any Advanced
partition with two Sparks (z z). With the game board in this Command cards from there on their Turn).
FRQąJXUDWLRQSOD\LQJVRORDVTilda, this will just be partition
When all players have completed one Player Turn each, that
#3 on Faith (¥), but this can vary as different networks are
5RXQGLVRYHUDQGDQHZ5RXQGEHJLQVDIWHUFRPSOHWLQJ
arranged for different numbers of Renegades each game!
the third Round, the Command Phase is over. So every
player will have a chance to play through their deck of 15
Intel Phase Command cards each Command Phase.
:LWKWKH60&nVZRUOGFUHDWHGLWLVWLPHWROHDUQWKHąUVW
XQRIąFLDO5XOHRI5HQHJDGH7KLQNąUVWWKHQGR:HOFRPHWR About Commands
the Intel Phase, Prospect! Taking Actions requires Commands, and Command cards
This is the moment to check the Goal on this Cycle’s have symbols near the bottom of their cards indicating how
CountermeasureFDUGDVLWLVWKHąUVW&\FOHWKH*RDORI many and of what type of Commands that card generates.
the Copper card is the one you are trying to achieve while Blue Information Commands ( )DOORZPRYHPHQWJUHHQ
FRQGXFWLQJ\RXU3OD\HU7XUQV,WUHDGV Cognitive Commands ( ) allow you to “ghost” your
$FWLRQVZKHUH\RXU$YDWDULVQRWORFDWHG\HOORZDeception
“GOAL(YHU\5HQHJDGHnV+RPH6HUYHUDQGFaith (¥) must Commands ( ) can turn evil Sparks (z) into friendly
have no Sparks (z).” Contaminants (z)DQGUHGDestruction Commands ( )
Beneath the Goal is that Cycle’s special rule(s) DOORZ\RXWRGLUHFWO\ąJKW60&Countermeasures in
“Nice Try, But Too Obvious You cannot Shift a Spark (z) “battles to the death.”
into a partition that already has two Sparks (z z).”
Let’s Play!
Three Sparks (z z z) on the same partition immediately
removes them, but the SMC replaces them with a Guardian („). Tilda Sweet’s Avatar is standing on her Access Point (¥ #6)
with z z present there, ready to issue some Commands….
Removing Sparks (z) is your Goal, but making Guardians
(„)RXWRIWKHPLVQRWWKHEHVWZD\WRGRLW\RXDUHQRW Remember2XU*RDOLQWKHCopper Cycle is to ensure
ready for Guardians („) just yet! we have removed (i.e. Deleted or Shifted away) all Sparks (z)
from the Faith (¥) server and from each Renegade’s Home
You will either achieve that Goal or you will not. That is Server (yours is ¥; and if you are the only Renegade playing, then
determined later, but you want to keep it in mind while playing you do not need to worry about Sparks (z) on ¥, ¥, or ¥).
your Turns during the Command Phase.

26
RENEGADE RULES V1.0

ROUND 1

TEERR
DEC
DE PT
YPT
ECRRYYP RY MMAASST
KERRY
RICCKKE
TRI
TR

SIICC
BAASSI
BA BBAASSSIIICC

Tilda starts by playing the Command card Decrypt to Using her Trickery Master card, Tilda uses the Modify
generate two Information Commands ( ) to Move her Action to change the remaining Spark (z) on her partition
Avatar. She takes one Replicant (z) with her from her partition into a Virus (z). Trickery Master gives her the one
(¥ #6) to partition #4 on her Home Server. Notice she moved Deception Command ( ) point she needs to perform
only one partition using a card that gave her two Commands the Modify Action. She also uses the one Leadership
she only required one to Move one partition. This is okay Command ( ) point which, being wild, she can designate as
as you ignore excess Commands generated when you take the one Destruction Command ( ) point she requires to
DQ$FWLRQWKH\ą]]OHRXWLPPHGLDWHO\DVWKDW$FWLRQLPSDFWV change a Spark (z) into a Virus (z). Tilda then discards
play. Having used her Decrypt card for her Move Action, Tilda the Command card Trickery Master from her hand and
discards it, face up, in a Discard Pile in her player area, next to her replaces the Spark (z) in her partition with a Virus (z).
Command deck.

SS
ASS
PAS
YPA
BYP
BY TA ST EAALL
TEA
STE
DAAATTA

SIC
ASI
BAAS IC
SIC
BAASSI

Now let us deal with some of those Sparks (z)! Tilda discards Finally, Tilda uses her Data Steal card ( ) to take another
the Bypass card from her hand to generate one green Cognition Move Action, bringing her newly created Virus (z) to
Command ( ), point allowing her to use the Shift Action to partition ¥ #3 (where she just Shifted a Spark (z) to previously).
Shift (or push) one of the Sparks (z) from ¥ #4 to the adjacent Tilda muses, “I would like to perform an Infect Action next,
partition ¥ #3. Now that Tilda outnumbers the Sparks (z) but let us see if we can improve our odds a little.”
there with her Replicants (z z), she can use the Modify Action.

27
RENEGADE RULES V1.0

Having done all she plans to for this Round, Tilda ends her ROUND 2
Turn. Renegades can keep one card in hand, if desired, between With a sigh, Tilda remarks, “Welcome to Round 2, Prospects!
Rounds, so Tilda retains the ,QąOWUDWH card and ends her I was hoping to draw some red Destruction Commands into
7XUQE\GUDZLQJąYHPRUHCommand cards into her hand my hand, but I have been real unlucky. However, all is not lost
(for a total of six)WKHVHDUH just yet….”
Tilda uses as many Destruction ( ) and Leadership ( )
DATA SCA Command points as she can to perform the Infect Action. She
RATE N
INFILT can also discard any three cards from her hand to generate one
additional Leadership ( ) Command point, which is wild!

ATTEE
FIILLTRRRAAT
NFI
INF
IN
AN
AN
ATTAA SSCCCA
DAT
DA
RRU
ERR PT
RUPPT
INTTEER
UPT
IN
FOCUS
INTERR FOOCCCUUUSS
FO
CUUSS
FOOOCCU

BAASSSII
BA

ASSII
BBAAS

SI
ASI
BBAAS

BASSSIICC
BA

IC
BASSIIC
BA

DECRYP
FOCUS T
Tilda generates a mighty four Destruction ( )
Command points by discarding ,QąOWUDWH ( ), Data
Scan (its being used as )DQGDVHWRIWKUHHFDUGV
Interrupt, Focus, and Focus (for one , which she also
declares as a ). Now she rolls the Infection Dice (hers is
the red z and the SMC’s is the black z). Tilda rolls a 2 and
BASIC a 5 and calculates her Infection score versus the SMC’s
BASIC
Resistance score
With z on her partition, + , + 2, her total Infection
score is 7 (1 z + 4 + 2 = 7)ZLWKzz + 5, the
SMC has a Resistance score of 7. With the scores tied, Tilda
loses the battle and Deletes one Virus (z) from her partition
¥ #3. Remember, when a Renegade scores higher, remove all
Sparks (z)IURPWKDWSDUWLWLRQVFRULQJOHVVRUHTXDOWRWKH60&nV
Continue with each player taking a Turn to Shift a Spark (z) to Resistance score causes the Deletion of one Virus (z)!
Faith (¥), Modifying a Spark (z) into a Virus (z), moving
Tilda ends her Turn now, saving Decrypt for Round 3, and
with the Virus (z) to Faith (¥)EHIRUHąQDOO\HQGLQJWKHLU7XUQ
GUDZLQJKHUąQDOąYHFDUGVData Steal, Diversion, Memory
until Tilda is ready to begin Round 2.
Steal, Renegade Apprentice, and Sabotage.

28
RENEGADE RULES V1.0

,I\RXDUHSOD\LQJDVDWHDPFRQWLQXH5RXQGE\XVLQJDVPDQ\
,QIHFW Actions as you can to 'HOHWHPRUH6SDUNV(z)IURP GE
ABOOOTTAAGGE
SAB
WKHQHWZRUNUHIHUULQJWRWKHSUHYLRXVH[DPSOHIRUKRZLWLVGRQH
SA
CE
TIICCE
RENNTI
PRRE
ADEE APP
RENNNEEEGGAD
RE

5281'
:LWKDYLVDJHRIJULPGHWHUPLQDWLRQTildaVWDWHVo,GR IC
BAASSSIIC
BA

QRWOLNHWKRVH6SDUNVRQP\SDUWLWLRQWKH\EORFNPHIURP IC
BAASSIIC
BA

XSORDGLQJQHZ&RQWDPLQDQWV1RZLI,FDQ0RGLI\RQHRI
WKRVH6SDUNVLQWRVRPHWKLQJPRUHXVHIXOZHPLJKWMXVW
achieve our Goal.”
Now, with no 6SDUNV(z) on her partition, she is free to
SHUIRUPDQUpload Action. She discards 6DERWDJH ( +
using the Command as another for a total of ) and
5HQHJDGH$SSUHQWLFH ( ) for a total of three 'HVWUXFWLRQ
EAL
STEEA
TA ST
DAATTA
DA
( ), to Upload one 9LUXV (z) to her partition.
o/HWXV,QVWDOOD5HSOLFDWRUp

SIICC
BBAAASSI

AL
STEEEAAL
ST
MEMMMOORRYY
ME

Tilda has a special ability that allows her to Move with a


6SDUN (z). She discards 'DWD6WHDO ( ) to Move back to
¥ #4 and carries one 6SDUN (z) with her. SIICC
BASSI
BA

Three like-&RQWDPLQDQWV (z z z)RQWKHVDPHSDUWLWLRQ


SIOONN
RSI
DIVVEEERRS
DI
where there are no &RXQWHUPHDVXUHV (z or „) offer
WKHRSSRUWXQLW\WRFRQYHUWWKHPLQWRDQ,QVWDOODWLRQ („)
using the ,QVWDOO Action. Tilda uses the one /HDGHUVKLS
Command ( )IURP0HPRU\6WHDO ( + ) as a
SIICC
BASSI
BA
'HFHSWLRQ Command ( ) point to swap the three
5HSOLFDQWV (z z z) on ¥ #4 for one 5HSOLFDWRU
,QVWDOODWLRQ („), discarding 0HPRU\6WHDO without using its
&RJQLWLRQ Command ( ) at all.
Next she uses 'LYHUVLRQ ( ) to Modify this 6SDUN (z)
into a 5HSOLFDQW (z).

29
RENEGADE RULES V1.0

&RXQWHUPHDVXUHV3KDVH
PT
You have kicked the SMC as best you could during the
DECCCRRYYYPPT
DE
Command3KDVH1RZGXULQJWKH&RXQWHUPHDVXUHV
3KDVHWKH60&NLFNVEDFN,I\RXDUHoDOOWKDWpWKHUHVKRXOG
EHQRPRUH6SDUNV (z) left on the network except the one
on ¥ #6+RZHYHULIPRUH6SDUNV (z)UHPDLQDQGVKDUHD
partition with your &RQWDPLQDQWV (z), those 6SDUNV (z)
IC
SIC
BASSI
BA

now attack.

Finally, using the two ,QIRUPDWLRQ &RPPDQGVIURP 6SDUNV%DWWOH6WHS


'HFU\SW ( ), TildaSHUIRUPVD0RYH Action, allowing her As with an ,QIHFW Action, your 9LUXVHV(z) battle
WR0RYHXSWRWZRSDUWLWLRQV6KHPRYHVKHU$YDWDUDQGWKH &RXQWHUPHDVXUHV to control their contested partitions.
newly created 9LUXV (z) to ¥ #3DQGSLFNVXSWKHUHPDLQLQJ 2QHDWDWLPHLQDQ\RUGHU\RXGHVLUHDWHDFKFRQWHVWHG
6SDUN (z)WKHUHHQURXWHąQLVKLQJKHU0RYH Action at ¥ #6. SDUWLWLRQKDYLQJRQHRUPRUH9LUXVHV (z)DQGRQHRUPRUH
Thus, she carried the 9LUXV (z) and 6SDUN (z) with her &RXQWHUPHDVXUHV (z or „)DQDXWRPDWLF,QIHFW Action
(thanks to her special Movement ability). ensues with this difference: You cannot add 'HVWUXFWLRQ
:LWKQRPRUHFDUGVLQKDQGDQGQRPRUHFDUGVOHIWWRGUDZ Command ( ) points to your ,QIHFWLRQVFRUH – your
TildaHQGVKHUąQDO3OD\HU7XUQRIWKHCommand3KDVH 9LUXVHV (z)DUHRQWKHLURZQ
,I\RXDUHSOD\LQJDVDWHDPFRQWLQXH5RXQGE\WU\LQJWR o)LUVWXSOHWXVGHDOZLWKWKH6SDUNRQP\SDUWLWLRQp
create an ,QVWDOODWLRQ\RXUVHOI'RQRWWDUJHWWKH6SDUN Tilda rolls the ,QIHFWLRQ'LFH and obtains a 3 on the red
(z) on ¥ #6, as we will need that for the next part of the die and a 2RQWKHEODFNGLH$JUHDWUHVXOW7KH,QIHFWLRQ
walkthrough.... VFRUH is 4 (3 + z) and the 5HVLVWDQFHVFRUH is 3 (2 + z).
Tilda is able to 'HOHWHWKHUHPDLQLQJ6SDUN (z)IURPKHU
partition on )DLWK (¥ #6)7KLVWLPHVKHZDVOXFN\
,IWKHUHDUHPRUHSDUWLWLRQVZLWKERWK9LUXVHV (z) and one
RUPRUH&RXQWHUPHDVXUHV (z or „), continue rolling for
WKHPRQHDWDWLPHXQWLOWKH\DUHDOOUHVROYHG
When there are other Renegades participating in
WKLVZDONWKURXJKWKHUHLVDFKDQFHWKDWVRPHRI\RXU
&RQWDPLQDQWV (z)DUHXQGHIHQGHGrPHDQLQJWKH\VKDUHD
partition with a 6SDUN(z) and there are no 9LUXVHV (z) to
SURWHFWWKHPLQWKLVFDVH'HOHWH all those &RQWDPLQDQWV (z)
IURPWKHQHWZRUN(the SMC’s Countermeasures destroyed them).

30
RENEGADE RULES V1.0

6XFFHVVRU)DLOXUH6WHS 5HIUHVK3KDVH
2QO\QRZGR\RXFKHFNZKHWKHU\RXKDYHVXFFHVVIXOO\FRPSOHWHG <RXKDYHFRPSOHWHGWKH&RSSHU 6LPXODWLRQ6WDJH,
the Goal for this &RSSHU&\FOH5HPHPEHUWKH*RDOZDVWR &RXQWHUPHDVXUH card, so 'HOHWH it. This reveals the 6LOYHU
UHPRYHDOO6SDUNV(z)IURPHDFKSOD\HUnV+RPH6HUYHUDQG 6LPXODWLRQ6WDJH,, &RXQWHUPHDVXUH card that you will
DOVRIURPWKH)DLWK (¥) server. If Tilda is playing alone, she confront next Cycle.
KDVMXVW6XFFHHGHG,I\RXDUHSHUIRUPLQJWKLVZDONWKURXJK
ZLWKRWKHU5HQHJDGHVWKHUHLVDFKDQFH\RXOHIWVRPH6SDUNV Before you start the new Cycle, however, each player
(z)XQGHIHDWHG'LG\RX)DLORU6XFFHHGLQPHHWLQJWKH*RDOnV UHVKXIĆHVWKHLU'LVFDUGSLOHVFUHDWLQJWKHLUQHZIDFHGRZQ
objective? CommandGHFNVDQGGUDZVąYHFDUGVLQWRWKHLUKDQG

.QRZLQJQRZZKHWKHU\RX6XFFHHGHGRU)DLOHGĆLSRYHUWKDW )HHOIUHHWRFRQWLQXHWKH6LPXODWLRQIURPKHUH7U\WRIRFXV
Cycle’s &RSSHU &RXQWHUPHDVXUH card (i.e., Simulation on creating ,QVWDOODWLRQV(„)WRFRPSOHWHWKHQH[W*RDODQG
Stage 1) and rotate the card vertically so that you are reading keep on top of 6SDUNV(z). Beginning this Cycle, each Avatar
the appropriate Fail or Success event right-side-up.You did PXVWUROOIRU6SDUNV(z)DSSHDULQJDWWKHVWDUWRIWKHLU3OD\HU
Succeed, right? Turns, as shown by the black dot in the 6LOYHU-colored space
DWWKHYHU\ERWWRPRIWKH566LPXODWRU SMC card.
$OZD\VIROORZLQVWUXFWLRQVIURPWRSWRERWWRP$VVXPLQJ\RX
6XFFHHGHGWKHQ\RXPXVWo$GGRQH9LUXV (z) to )DLWK (¥) The top indicates one 6LOYHU card Cycle for this SMC.
partitions #1, , and #3. Also add one 8SOLQN (z) to each 7KHERWWRPLQGLFDWHVRQH,QIHFWLRQ roll (to add a new Spark
partition on )DLWK (¥).” (z) randomly)GXULQJHDFK3OD\HUnV7XUQWKDW&\FOH1RWHWKDW
,I\RX)DLOHGWKHQLQVWHDG\RXVKRXOGo$GGRQH9LUXV (z) to PRUHGLIąFXOWSMCFDUGVPD\UHTXLUHPXOWLSOHUDQGRP6SDUN
)DLWK (¥) partitions #1, , and #3. Also add one 8SOLQN (z) (z)DGGLWLRQVHDFK3OD\HU7XUQ
and one 6SDUN (z) to each partition on )DLWK (¥).” And those 6SDUNV(z)DUHJRLQJWRNHHS\RXEXV\

'LG\RXQRWLFHWKHGLIIHUHQFHEHWZHHQ6XFFHVVDQG)DLO"

o3URVSHFWV7KDWąUVW&\FOHZDVWKHHDV\SDUW1RZZHDUHLQWRWKHUHDOEXVLQHVVDQGUHDG\WRIDFHVRPHSURSHU
RSSRVLWLRQ7KLVLVZKHUHZHVRUWWKHEODFNKDWVIURPWKHZDJHVODYHV
o,I\RXOHDYHKHUHVWLOODm3URVSHFWnWKHQ\RXKDYHRQO\JRW\RXUVHOIWREODPHDQG\RXZLOOąQGIHZIULHQGVKHUHWRJLYH\RX
DQ\NLQGRIV\PSDWK\
o,I\RXVXFFHHGWKHQ\RXZLOOOHDYHZLWKHYHQIHZHUIULHQGVEHFDXVHIURPWKHQRQ\RXZLOOEHXQGHUJURXQG<RXZLOOOLYH
PRVWRI\RXUH[LVWHQFHLQF\EHUVSDFHRULQVRPHURWWHQMRLQWWKDWZLOOEH\RXURQO\UHDOLW\<RXUFXUUHQF\ZLOOEHLQIRQRPLFV
\RXUGDLO\PHDOZLOOEHGRUSKVDQGGHUPVDQG\RXZLOOOLYHIRUWKHQH[WWLPH\RXZLOOEHMDFNHGLQ%XW\RXFDQKROG\RXU
head up high. You will be one of the few.You will get to wear the patch of a respected brotherhood. You will have purpose.
You will restore faith.You will be a Renegade.”
>5XSHUW6WDQ]$FH5HQHJDGH)LUVW&ODVV@

31
RENEGADE RULES V1.0

6HTXHQFHRI3OD\ $FWLRQV/LVW
MOVE
<RXU&DUG&RPPDQGV
7KHV\PEROVRQWKHFDUGVDOORZ\RXRQH
1. ,QWHO3KDVH  q One 0RYHPHQW point per & CommandSRLQWSHUV\PERORIWKDWFRORU
carry (z | z z | z z z) These are:
2. Command 3KDVH 
SHIFT : 'HVWUXFWLRQ (red)
A. Start of Turn Step (7.1) q Shift one (z | z) out of a partition per : 'HFHSWLRQ (yellow)
B. Restock Hack Shack Step (7.2) 83/2$' : &RJQLWLRQ (green)
q 67$1'$5' =z
C. New Sparks Step (7.3) q 5(3/,&$7(„ + =z : ,QIRUPDWLRQ (blue)
q 3523$*$7(„ + =z : /HDGHUVKLS (purple);
' &RPPDQG$FWLRQV6WHS(7.4) WKLVoZLOGFDUGpCommand generates a
MODIFY
E. Replenish Hand Step (7.5) Command in any of the other colors
q If z > z at partition then, + = zz
: Shown when referring, collectively, to
F. End of Turn Step (7.6) ,167$// any and all &RPPDQGV (white)
q +zzz=„
3. &RXQWHUPHDVXUHV3KDVH 
INFECT
A. SMC’s Revenge Step (8.1): q z + + z = ,QIHFWLRQVFRUH
q z + &RXQWHUPHDVXUHV
i. 9LUXV%DWWOH6HJPHQW (+1 per z, +4 for „) = 5HVLVWDQFHVFRUH
<RXU,QVWDOODWLRQV
ii. 'HOHWH&RQWDPLQDQWV q If Infection > Resistance, 'HOHWH all :KHQ\RXFRPELQHWKUHHRI\RXU
6SDUNV (z) or *XDUGLDQ („) &RQWDPLQDQWV (circular, colored tokens)
6HJPHQW q ,I,QIHFWLRQì5HVLVWDQFH'HOHWH one z . LQWKHVDPHSDUWLWLRQWKH\FDQIRUPRQH
iii. '
 HOHWH,QVWDOODWLRQV ,QVWDOODWLRQ (square, like-colored token):
EXECUTE
6HJPHQW „ : 3URSDJDWRU (red)
Use an Advanced Command card’s ([HFXWH
B. Success or Failure Step (8.2) Action instead of its &RPPDQGV. „ : 5HSOLFDWRU (yellow)
6+23 „ : 1HXUDO+XE (green)
C. Move Sparks Step (8.3)
Spend HTXDOWRFRVWWRSXUFKDVHRQHAdvanced „ : 'DWD3RUW (blue)
' Scoring Token Step (8.4) CommandFDUGIURPWKH+DFN6KDFNDGGWRKDQG „ : Shown when referring, collectively, to
4. 5HIUHVK3KDVH  any and all ,QVWDOODWLRQV (white)

A. (QGRI*DPH6WHS(9.1)
B. 1HZ'HDO6WHS(9.2) 60&nV&RXQWHUPHDVXUHV
C. +DFN6KDFN3XUJH6WHS(9.3) The black tokens and the gray tokens, both circular and square, are the SMC’s tools for protecting itself
against your attacks.
At the end of each Cycle these &RXQWHUPHDVXUHV attack &RQWDPLQDQWV:
z : 6SDUN (black)6\VWHP3DUWLWLRQ5HQHJDGH&RXQWHUPHDVXUHV (S.P.R.C. – or “Spark” for short)
z : )ODUH (gray): Created by 6SDUN ([SORVLRQV
„ : *XDUGLDQ (black): Created by 6SDUNV
„ : )LUHZDOO (gray): Created by )ODUHV

32

You might also like