Professional Documents
Culture Documents
Table of Contents
1.0 Introduction .............................3 7.0 Command Phase ...................11 9.0 Refresh Phase.........................20
1.1 Gameplay Overview .................. 3 7.1 Start of Turn Step .................... 11 9.1 End of Game Step ................... 20
1.2 Components Overview ............. 4 7.2 Restock Hack Shack Step ........ 11 9.2 New Deal Step ....................... 20
Of Sparks and Guardians .............. 12 9.3 Hack Shack Purge Step ............ 20
2.0 Setting Up ................................6
7.3 New Sparks Step .................... 14
10.0 Your Winning Score .............20
Glossary of Terms ..........................8 7.4 Command Actions Step ........... 14
7.5 Replenish Hand Step ............... 19 11.0 Gameplay Variants ...............21
3.0 Cyber Warfare Weapons .........9
7.6 End of Turn Step ..................... 19
12.0 Rootkits ................................21
4.0 Winning and Losing ...............10
8.0 Countermeasures Phase.......19
13.0 Walkthrough ........................24
5.0 Sequence of Play ....................11 8.1 SMC’s Revenge Step ................ 19
Intel Phase ................................... 26
8.2 Success or Failure Step............ 19
6.0 Intel Phase ..............................11 Command Phase .......................... 26
8.3 Move Sparks Step ................... 19
Countermeasures Phase ............... 30
8.4 Scoring Token Step .................. 20
Refresh Phase ............................... 31
Credits:
Game Design: Richard Wilkins (Box of Delights - Ricky Royal)
Development: Tylar Allinder, Alan Emrich, Chris Magoun
Art: Clark Miller
Graphic Design: Noelle Le Bienvenu and Barry Pike III
Playtesting: Bradley Bellamy, Julius Besser, Nathan Hansen, Chuck Hughes, Charlie Jackson, Gary Lawson, Steve Ramsey,
Brad Rochford, Rupert Wilkins
Proofreading: Avalon Emrich, Noelle Le Bienvenu, Linda Daley Paulson, Petra Schlunk, Karen Wolterman
Special Thanks: To super-fan Aaron Moore for logging more than 100 play sessions and being our Renegade cybersecurity expert
2
RENEGADE RULES V1.0
3
RENEGADE RULES V1.0
Tilda Sweet
Renegade Key Code
Contaminants Installations Commands Server
Overview
z Virus Propagator a Destruction ¤ Salvation
z Replicant Replicator a Deception ¤ Virtue
z Uplink Neural Hub a Cognition ¤ Freedom
z Data Node Data Port a Information ¤ Justice
z Any Any a Leadership ¤ Faith
Actions List
» 75 Basic Command cards Move: a per partition & carry z (3 max, same type); z & create “pathways;” teleport from .
Shift: a per z or z “pushed away;” z to project to any other z or .
Neural Hubs: If on , may project (”Ghost”) any Action to any partition on your server.
» 5 SMC cards representing Tilda's a straight-up wirehead. She's concise and logical; when she doesn't grok some NewTek, she'll take it apart and put it back together,
more than likely improving it in the process. Her mind is a databank of knowledge, recalling specs and stories of infamous SMC runs. Her
speciality is combining hardware modules, meaning she can kludge a hack in short order before the Sparks have a chance to react. She's
something of a lurker, not always at the forefront of an attack, but her ability to punch into a system and her situational awareness has her
the different Super-Massive marked out as a possible black-op leader of the future and has earned her the moniker “Ballerina.”
Computers Countermeasure
» 24 Countermeasure cards 5HQHJDGH3URąOH6KHHW
Cards
(8 per Security Level: Copper,
Silver, and Gold)
q 5HQHJDGH3URąOHVKHHWVWKDW
describe each Renegade and their
special ability, along with a summary
of rules and effects
q 6 countersheets, which provide
» 5 server tiles
» 15 Red/Yellow circular tokens
» 15 Blue/Green circular tokens
» 25 Black/Gray circular tokens
» 25 Square tokens (5 each of SMC Cards Command Cards
Red,Yellow, Blue, Green, and
Black/Gray)
» 7 Purple circular tokens
» 3 circular Countermeasure
Scoring tokens (one each of
Copper, Silver, and Gold)
» 10 Avatar standees Red Black
q 2 Infection Dice (one red, one black) Server Die Partition Die
Infection Die Infection Die
q 3 ICE Dice (one each of Copper, Silver, Spark Dice
and Gold)
q 1 Partition Die
q 1 Server Die ICE Dice
q 1 Rulebook
Used in the d-ICE variant (see 11.0), these
dice replace the SMC’s black Infection Die
when resolving Infection combat.
4
RENEGADE RULES V1.0
Countermeasures Virtue
Contaminants Installations
Virus (Front)
Neural Hub Salvation
Replicant (Back)
Propagator
Rootkit Freedom
Replicator
5
RENEGADE RULES V1.0
6
RENEGADE RULES V1.0
([DPSOHHettie MagneticWKH\HOORZFRORUHG5HQHJDGHVHWVXS These Data Nodes (z represent the intel that your absent
RQWKH$FFHVV3RLQWLHWKH#6SDUWLWLRQRIVirtueWKH\HOORZFRORUHG Renegades have gathered about the SMC.
VHUYHU¥WKLVLVQRWHGDWWKHERWWRPRI+HWWLH·V3URÀOH6KHHW 8. Open the Hack Shack:6KXIĆHWKHAdvanced
DV´Virtue (¥#6” Command cards and place them, face down, to form an
C. With each Renegade’s Avatar standee now on Advanced Command card $&& deck WKLVGHFNDUHDLV
the network, add one same-colored FLUFXODU FRPPRQO\UHIHUUHGWRDVWKHHACK SHACK5HYHDOWKHąUVW
Contaminant (ztoken on their Access Point. four cards and place them in a row, face up, next to the
&RQWLQXLQJWKHDERYH([DPSOHHettieZRXOGDOVRVHWXSZLWK ACC deck.
RQH5HSOLFDQW(zWKH\HOORZFRORUHGContaminant (zWRNHQ 9. The Deal:(DFKSOD\HUVKXIĆHVWKHLUVWDUWLQJGHFNRI
DWVirtue (¥#6. Basic Command cards and deals themselves a hand of
6. The SMC’s Defenses: Read the directions on the SMC ąYHFDUGV<RXFDQUHSODFH\RXUHQWLUHKDQGVKXIĆLQJLW
card being challenged and follow its setup instructions. EDFNLQWR\RXUGHFNDQGGHDOLQJDQHZKDQGRIąYHFDUGV
adding one Spark EODFNz token to your Access Point
7. Renegade Intrusion: Count the number of Access Points each time you do so.
on the network that do not have an Avatar standee there.
Receive that many Data Node EOXHz tokens and place 10. Tidy Up: Set aside all remaining unused components,
them, collectively, however you wish across the network. snacks, and beverages HJ\RXUFDQVRI*LQJHU&RRO.
7
RENEGADE RULES V1.0
8
RENEGADE RULES V1.0
9
RENEGADE RULES V1.0
10
RENEGADE RULES V1.0
1. Intel Phase (6.0) The Countermeasure card remains face up during the
Command Phase. Renegades can only look at the current
2. Command Phase (7.0): Composed of three Rounds; Countermeasure card.
each Round, starting with the Alpha Hacker and proceeding
clockwise, each player performs a Player Turn, as follows: Renegades will succeed or fail in achieving the current
Countermeasure card’s Goal as a result of the Actions they
A. Start of Turn Step (7.1) perform during the ensuing Command Phase. In addition,
B. Restock Hack Shack Step (7.2) Renegades cannot inspect the Success/Fail outcomes until they
are revealed during the Countermeasures Phase.
C. New Sparks Step (7.3)
D. Command Actions Step (7.4)
E. Replenish Hand Step (7.5) 7.0 Command Phase
F. End of Turn Step (7.6) You complete the Cycle’s Command Phase in three Rounds.
Every Round, beginning with the Alpha Hacker, each player
When all players have completed their Turns, that Round performs a Player Turn. A PLAYER TURN consists of six Steps
is complete. Begin a new Round. Once the third Round is (explained below) performed in order. After a player has taken their
complete, proceed to the Countermeasures Phase. Turn, play proceeds clockwise (i.e., to your left). After completing all
3. Countermeasures Phase (8.0) three Rounds, proceed to the Countermeasures Phase.
A. SMC’s Revenge Step (8.1): Important: Note the SMC card’s special instructions; these
may affect play during the Command Phase.
i. Virus Battle Segment
ii. Delete Contaminants Segment
7.1 Start of Turn Step
iii. Delete Installations Segment
Start of your Turn effects occur at this time.
B. Success or Failure Step (8.2)
C. Move Sparks Step (8.3)
7.2 Restock Hack Shack Step
D. Scoring Token Step (8.4)
If any of the four positions in the Hack Shack are empty, draw
4. Refresh Phase (9.0) the top card(s) from the Advanced Command card (ACC)
A. End of Game Step (9.1) deck to restock it back up to four cards.
B. New Deal Step (9.2) Should the ACC deck become depleted, the Hack Shack is
RIąFLDOO\oVROGRXWpDQGQRWUHVWRFNHGIRUWKHUHVWRIWKHJDPH
C. Hack Shack Purge Step (9.3)
11
RENEGADE RULES V1.0
Of Sparks (z) and Guardians () Avatars cannot voluntarily enter a partition with a
Firewall (). The instant an Avatar and a Firewall ()
The SMC’s core defenses are represented by Spark (z) share a partition, relocate that Avatar by rolling the Spark
and Guardian () tokens. Throughout the game, the SMC Dice and placing the Avatar in the indicated partition.
places and moves these Countermeasures across the
network’s partitions to foil your hacking efforts. 4. Creating Guardians: A Guardian () is a powerful,
immobile Countermeasure.
1. Hacked Off: If you are required to place a Spark (z)
or Guardian () token into play and none remain in The instant a third Spark (z) token enters a partition,
the stock, you immediately lose the game! immediately return those three Sparks (z z z) to
the stock and replace them in that partition with one
2. Timing is Everything: Whenever adding or moving Guardian () token.
Sparks (z), do so one at a time, completing the
DGGLWLRQRUPRYHPHQWHIIHFWVRIWKHąUVWSpark (z) As soon as a Guardian () token is placed, immediately
before proceeding with the second, and so forth. Delete all Contaminant (z) and Installation ()
tokens in that partition.
3. Of Flares and Firewalls: These are the reverse/enhanced
sides of Sparks (z) and Guardians () respectively. If any Flares (z) create a Guardian (), place it as a
Flares (z) are created during a Spark Explosion Firewall () instead.
(see part 5). Firewalls () are created from Flares (z). 5. Spark Explosions: Whenever a Spark (z) token enters
The rules and cards generally refer to Spark (z) a partition containing a Guardian () token, they cannot
and Guardian () tokens, as their reverse-side coexist so – Boom! – a SPARK EXPLOSION occurs. That
counterparts function exactly as Sparks (z) and means, instead of adding one Spark (z) token to
Guardians ()GREXWZLWKVRPHoHQKDQFHPHQWVp that Guardian’s () partition, add two Flare (z z)
tokens (remembering to do so one at a time per “Timing
The instant a Flare (z) shares a partition with is Everything,” part 2) to the next-lowest numbered
any Contaminant (z), the Flare (z) immediately partition instead.
oQHXWUDOL]HVpRQHRIWKHP(of your choice); stack it on
WRSRIWKDWQHXWUDOL]HGContaminant (i.e., z on top Exception: When moving Spark (z) tokens to the next-
of z)WRV\PEROL]HWKLV higher numbered partition during the Countermeasures
Phase, Spark Explosions will also proceed to the next-
1HXWUDOL]HGContaminants (z) are unusable; however, higher numbered partition on that server.
WKHQHXWUDOL]LQJFlare (z) continues to fully function as
a Spark (z)! Chain Reaction: If that next-numbered partition where
exploded Flare (z) tokens must be placed also contains
A Flare (z)FDQRQO\QHXWUDOL]HDVLQJOHContaminant (z). a Guardian () token, again, they cannot coexist. Instead,
7KHQHXWUDOL]HGContaminant (z) remains imprisoned create another Flare (z) token and skip ahead to the
by that Flare (z) until it is Deleted (at which time both next-lowest numbered partition – and so on around
tokens are returned to the stock). the server, adding another Flare (z) token every time
one would be placed with a Guardian () token. Be
If any Flares (z) create a Guardian () through the
careful; when you see two adjacent Guardians (), they
normal Spark (z) rules, place it as a Firewall () instead.
might quickly create a third one in this manner!
12
RENEGADE RULES V1.0
There are two Spark (z z) tokens Another Spark (z) token arrives The second Flare (z ) arriving in
on partition #2 and Guardian () at partition #3 – Boom! – two partition #2 explodes from the
tokens on partitions #5, #3, and #1 Flare ( z z ) tokens are placed just-placed Firewall () – Boom! –
when a Spark (z) token arrives (one at a time) in partition #2. The two Flares (z z ) would be placed
at partition #5 – Boom! – two ąUVWFlare (z) arriving in partition in partition #1 instead. Unfortunately,
Flare ( z z ) tokens are placed (one #2 instantly creates a Firewall () there is already a Guardian ()
at a time) in partition #4 instead. there (wiping out all Contaminant token in partition #1, so – Boom! –
Remember that Flares (z) are placed (z) and Installation () tokens in three Flares (z z z ) are placed
in the next-lowest numbered partition. partition #2). Worse, that was the last (one at a time) in partition #6 instead.
Guardian () in the stock! These three Flares (z z z ) would
normally create a Firewall () in
partition #6, but since there are
none left in stock, the Renegades
immediately lose the game!
13
RENEGADE RULES V1.0
14
RENEGADE RULES V1.0
15
RENEGADE RULES V1.0
Movement Example
16
RENEGADE RULES V1.0
Upload Action
2QHZD\WRDGGDContaminant(z)WRNHQWRWKHQHWZRUNLVWR8SORDGLWRQ\RXU
$YDWDUnVSDUWLWLRQ<RXFDQRQO\8SORDGZKHQ\RXU$YDWDULVLQDSDUWLWLRQWKDWKDV
IHZHUWKDQWKUHHRIWKDWW\SHRIContaminant (z)SUHVHQW(remembering the three
Contaminant (z)per type limit)DQGFRQWDLQVQRCountermeasures(z or ) <RXU$YDWDULVRQFaith(¥)#5ZKHUH
WKHUHLVDQUplink( z )WRNHQ<RX
Standard Upload:)RUWKUHHCommandSRLQWVRIDQ\RQHFRORU\RXFDQ
QRWLFHWKDWWKHUHDUHWZRSpark(z z)
8SORDGRQHContaminantWRNHQRIWKDWVDPHFRORULH z(e.g., three
WRNHQVRQSalvation(¥)#3WKDW\RX
Information Command points ( )FDQEHXVHGWR8SORDGRQHData
ZRXOGOLNHWREUHDNXSDQGEHFDXVH
Node (z)token)SURYLGHGQRSpark(z)RUGuardian()WRNHQVDUHSUHVHQW
WKHUHLVDOVRDQUplink( z )WRNHQRQ
DWWKDWSDUWLWLRQ
Salvation(¥)#3\RXFDQ%\JHQHUDWLQJ
Replicate:,I\RXU$YDWDUnVSDUWLWLRQLQFOXGHVDReplicator()WKHQRQH JUHHQCognition( )Command
Replicant(z)WRNHQFDQEH8SORDGHGWKHUHIRUHDFKDECEPTION( ) SRLQWV\RXFDQ6KLIWFLUFXODUWRNHQV
CommandSRLQW\RXJHQHUDWH(i.e., you can Upload multiple Replicants (z) DZD\IURPWKHLUSDUWLWLRQYLDUHPRWH
DVRQH$FWLRQUHJDUGOHVVRIWKHSUHVHQFHRISpark(z)WRNHQV UplinksDVLI\RXU$YDWDUZHUHVWDQGLQJ
Propagate:,I\RXU$YDWDUnVSDUWLWLRQLQFOXGHVDPropagator()WKHQRQH ULJKWWKHUH
Virus(z)WRNHQFDQEH8SORDGHGWKHUHIRUHDFKDESTRUCTION( )Command
SRLQW\RXJHQHUDWH(i.e., you can Upload multiple Viruses (z)as one Action)
UHJDUGOHVVRIWKHSUHVHQFHRISpark(z)WRNHQV
17
RENEGADE RULES V1.0
18
RENEGADE RULES V1.0
19
RENEGADE RULES V1.0
20
RENEGADE RULES V1.0
Hard-Core Mode that are only available in games when there is a Renegade with
a Leadership (purple) 3URąOH, such as Rupert Stanz, playing.
When a Guardian () is formed, immediately Delete all
Special Ability: You can treat a partition’s versatile Rootkit
Contaminant and Installation tokens (z and ) on the (z) as any other single type of Contaminant (z) each time
entire server. you take an Action (only) there.
21
RENEGADE RULES V1.0
THE RENEGADES
Tilda Sweet Monty Quantum Oshin Noro Hettie
i Magnetic
i
When she takes When Monty is at His skill adds Once per Player
a Move Action, an Uplink ( z ) or two (+2) to any Turn, when
Tilda can carry one Neural Hub (), Infection scores performing a
Spark (z) or one he can “ghost” his at his partition Modify Action,
different-colored Actions not just at all times. The Hettie’s Avatar can
Contaminant (z) to any partition on Infection score act as a Replicant
in addition to the that server (as other becomes: (z), adding one (+1)
usual up to three Renegades do from z + + z + 2. to the total number
Contaminant Neural Hubs ()), His Avatar does not of Replicants (z)
(z z z) tokens of but to any partition count as a Virus ( z ) in her location.
one type that each that contains any token, and other Although she acts
Renegade is allowed type of Installation Renegades on his as a Contaminant
to carry. () anywhere on server cannot apply (z), she does not
//For example, the network! If it is Oshin’s skill when count for the three
she could carry another (i.e., remote) he is on a different Contaminant
z z z + z , or Neural Hub (), partition with a (z z z) stacking
z z + z. She he can ghost his Neural Hub (); limit.
could not carry Action to any i.e., Commanding
z z z + z as that partition on that from a Neural Hub
would violate the server (“Command () only applies
three per partition E\SUR[\µ. to the Renegade
limit rule.// actually taking an
Action.
22
RENEGADE RULES V1.0
Tokyo Black Devon “Dex” Angel Nitrate The Techno Twins Rupert Stanz
As an Action, for Romeo You may place any You control two Adds Rootkit
, you can You may save an Spark (z) that Avatars, both (z) tokens to the
reposition (i.e., extra card between spawns at, or moves sharing your Access game (only one per
remove and replace) turns during the to, your partition on Point (¥ #6). Each SDUWLWLRQPD[QRW
your current ąUVWWZR5RXQGVRI an adjacent partition Action must be three, as with other
server per the HDFK&\FOH instead. performed by either Contaminants).
setup instructions, Avatar, not both. Any When taking a
provided you do not mention of “your Command Action
disconnect any other partition” or “your (only!), players treat
server from the rest server” can be either a Rootkit (z)
of the network. Avatar’s. token as any color
Contaminant (z).
Do not use
Rupert during the
Walkthrough or for
\RXUÀUVWIHZJDPHV
+LV´DGYDQFHGSURÀOHµ
LVEHWWHUGLVFRYHUHG
after you have more
H[SHULHQFHDVD
Renegade.
23
RENEGADE RULES V1.0
13.0 Walkthrough
“Listen up Prospects.You’re looking at the RS20, a simulator designed by our Black Agents.
o7KHVHJX\VDUHH[FRUSVRWKH\NQRZZKDWLWWDNHVWREULQJGRZQWKH60&V7KH\KDYHFUHDWHGWKUHH
Countermeasures for this test. Each is harder than the last, from Copper, through Silver, to Gold.
This is no picnic for posers. If you fail, then restart the sim.
“I’ve put all the dirtboys and wireheads every dark corner of this city can throw at us through this sim.
We’ve been scraping the barrel looking for new recruits. It is like zero-hour in a puppet parlor up here
and folks are losing hope. But someone thinks you guys are something special.
“But let me warn you... only the best will make it through Gold and be called a ‘Renegade.’ Attempt to
VWUHDNWKURXJKWKH60&VZLWKRXWWKHSURSHUWRROVDQGWKHSURSHUWUDLQLQJDQG\RXZLOOEHQRWKLQJEXWD
chalk outline. And you had better pay attention to the restrictions each Countermeasure imposes on
you. We do not want you guys makin’ like Ronin and trying to cheat the system. Not unless it gets our
say-so. Using techniques prohibited by the sim’s CountermeasuresPHDQVLPPHGLDWHGLVTXDOLąFDWLRQ
So listen closely to your instructors and do as they say.
“Last piece of advice: When you reach Gold, we will be jacking-in from the Hack Shack, a bar in
Sapporo’s Susukino district. There you can trade for better Commands, so do so every chance you
get! Prospects aren’t normally allowed in the bar but we have, call it a ‘special arrangement,’ that you be
DOORZHGHQWU\RQFH\RXKDYHPDGHLWWKURXJKWKHąUVWWZRVLPXODWLRQV8VHWKLVRSSRUWXQLW\EHFDXVHWKLV
GLVSHQVDWLRQFRVWVWKH5HQHJDGHą[HUVKHDYLO\HDFKWLPHZHUXQWKHWUDLQLQJSURJUDP
And be careful in there. Every dirty rotten perp and street leech is gonna pick you
out the crowd if you go in looking like some wide-eyed monkey. Use your skills,
XVH\RXUWUDLQLQJDQGWU\WRąWLQ
“Good luck, Prospects. See you on the other side!”
[Rupert Stanz, Ace Renegade First Class]
24
RENEGADE RULES V1.0
you wish to replay the Simulator, feel free to use them any time.
BBYYYPA
BYP ASSS
PPAASS
AS DATA
DA
DAT STEAALL
TAA STE DDEECR
DEC RYP
EECCR
CRY PT
YYPPT
RYPT
RY ILTR
FIILT
NFFFIL
INFI
INF
ATEE
RAATE
RAT
TTRA ERY
CCKKER
CKE
ASSTE
AS
AST
RRYY MMAS
h ere. (C
here. Cards ggoo
(Cards
7KLVZDONWKURXJKZLOOEHWDNLQJ\RXWKURXJKDVROLWDLUHJDPHZLWK iinn hand.)
hand.))
ASI
AS
BAS
BBASIIC
SIC
SSI
ASIC
WKHEOXHSOD\HUTilda SweetEXWLI\RXZDQWWRSOD\DORQJVLGH
her, either alone or with friends, you are free to add additional
Renegades to join the team. Tilda is the designated Alpha Hacker Jacked-In and Connected
for this walkthrough. If Tilda is playing solo, there will be four servers with
Take Tilda’s Renegade 3URąOH sheet and place it in front of unoccupied Access Points (if you are playing with a team, one
you as a reference. Underneath Tilda’s portrait is her special fewer server per Renegade has an unoccupied Access Point).
ability, so make a note of it. (Tilda’s gives her a special carrying Even though Access Points are unoccupied, you still have
DELOLW\ZKHQVKHPRYHVDERXWWKHQHWZRUN Place Tilda’s Avatar the knowledge to utilize them; to represent this, and since
standee on the #6 space (called the server’s Access Point) of blue is the color of Information in Renegade, place one
her like-colored (Home Server) tile; Tilda’s is Justice (¥) Data Node (zWKHEOXHContaminant) token on each of
#6.Your Avatar standee represents your (virtual) location on the unoccupied Access Points. Normally, you may place these
the network JDPHERDUG and moves about from partition to freely during setup, but for this walkthrough place them on the
partition LHKH[DJRQDOVSDFHWRKH[DJRQDOVSDFH. Finally, place vacant Access Points.
a like-colored Contaminant (z) token at her Access Point; Now that you are connected to the network, let us size up
Tilda starts with a Data Node (z) on Justice (¥) #6. your opponent.
Next, take Tilda’s starting deck of 15 Basic Command
cards FRORUFRGHGRQWKHLUIURQWVZLWKDEOXHLFRQLQWKHLUORZHUULJKW What You Are Up Against
corner)<RXZRXOGQRUPDOO\VKXIĆHWKLVGHFNDQGGHDO\RXUVHOI Set up the RS20-Simulator SMC card as your adversary.
DKDQGRIąYHFDUGVEXWIRUWKLVZDONWKURXJKWDNHWKHVH &UHDWHLWVCountermeasure deck from the three Simulator
VSHFLąFąYHFDUGVBypass, Data Steal, Decrypt, ,QąOWUDWH, Countermeasure cards, with Copper on top, Silver under
and Trickery Master. that, and Gold on the bottom; you play through one card per
If you are playing an additional Renegade, or have friends joining &\FOHVRWKLVJDPHZLOOODVWWKUHH&\FOHV'RQRWORRNDWWKHLU
you, do likewise with their own-color Avatars on those like-colored Success/Failure side! All will be revealed in time….
servers, with a like-colored Contaminant there to start, and Now, checking the SMC card, the RS20-Simulator tells you to
their own CommandGHFNVZLWKWKHVDPHąYHFDUGKDQG place, on each Renegade’s Home Server, two Sparks and one
25
RENEGADE RULES V1.0
26
RENEGADE RULES V1.0
ROUND 1
TEERR
DEC
DE PT
YPT
ECRRYYP RY MMAASST
KERRY
RICCKKE
TRI
TR
SIICC
BAASSI
BA BBAASSSIIICC
Tilda starts by playing the Command card Decrypt to Using her Trickery Master card, Tilda uses the Modify
generate two Information Commands ( ) to Move her Action to change the remaining Spark (z) on her partition
Avatar. She takes one Replicant (z) with her from her partition into a Virus (z). Trickery Master gives her the one
(¥ #6) to partition #4 on her Home Server. Notice she moved Deception Command ( ) point she needs to perform
only one partition using a card that gave her two Commands the Modify Action. She also uses the one Leadership
she only required one to Move one partition. This is okay Command ( ) point which, being wild, she can designate as
as you ignore excess Commands generated when you take the one Destruction Command ( ) point she requires to
DQ$FWLRQWKH\ą]]OHRXWLPPHGLDWHO\DVWKDW$FWLRQLPSDFWV change a Spark (z) into a Virus (z). Tilda then discards
play. Having used her Decrypt card for her Move Action, Tilda the Command card Trickery Master from her hand and
discards it, face up, in a Discard Pile in her player area, next to her replaces the Spark (z) in her partition with a Virus (z).
Command deck.
SS
ASS
PAS
YPA
BYP
BY TA ST EAALL
TEA
STE
DAAATTA
SIC
ASI
BAAS IC
SIC
BAASSI
Now let us deal with some of those Sparks (z)! Tilda discards Finally, Tilda uses her Data Steal card ( ) to take another
the Bypass card from her hand to generate one green Cognition Move Action, bringing her newly created Virus (z) to
Command ( ), point allowing her to use the Shift Action to partition ¥ #3 (where she just Shifted a Spark (z) to previously).
Shift (or push) one of the Sparks (z) from ¥ #4 to the adjacent Tilda muses, “I would like to perform an Infect Action next,
partition ¥ #3. Now that Tilda outnumbers the Sparks (z) but let us see if we can improve our odds a little.”
there with her Replicants (z z), she can use the Modify Action.
27
RENEGADE RULES V1.0
Having done all she plans to for this Round, Tilda ends her ROUND 2
Turn. Renegades can keep one card in hand, if desired, between With a sigh, Tilda remarks, “Welcome to Round 2, Prospects!
Rounds, so Tilda retains the ,QąOWUDWH card and ends her I was hoping to draw some red Destruction Commands into
7XUQE\GUDZLQJąYHPRUHCommand cards into her hand my hand, but I have been real unlucky. However, all is not lost
(for a total of six)WKHVHDUH just yet….”
Tilda uses as many Destruction ( ) and Leadership ( )
DATA SCA Command points as she can to perform the Infect Action. She
RATE N
INFILT can also discard any three cards from her hand to generate one
additional Leadership ( ) Command point, which is wild!
ATTEE
FIILLTRRRAAT
NFI
INF
IN
AN
AN
ATTAA SSCCCA
DAT
DA
RRU
ERR PT
RUPPT
INTTEER
UPT
IN
FOCUS
INTERR FOOCCCUUUSS
FO
CUUSS
FOOOCCU
BAASSSII
BA
ASSII
BBAAS
SI
ASI
BBAAS
BASSSIICC
BA
IC
BASSIIC
BA
DECRYP
FOCUS T
Tilda generates a mighty four Destruction ( )
Command points by discarding ,QąOWUDWH ( ), Data
Scan (its being used as )DQGDVHWRIWKUHHFDUGV
Interrupt, Focus, and Focus (for one , which she also
declares as a ). Now she rolls the Infection Dice (hers is
the red z and the SMC’s is the black z). Tilda rolls a 2 and
BASIC a 5 and calculates her Infection score versus the SMC’s
BASIC
Resistance score
With z on her partition, + , + 2, her total Infection
score is 7 (1 z + 4 + 2 = 7)ZLWKzz + 5, the
SMC has a Resistance score of 7. With the scores tied, Tilda
loses the battle and Deletes one Virus (z) from her partition
¥ #3. Remember, when a Renegade scores higher, remove all
Sparks (z)IURPWKDWSDUWLWLRQVFRULQJOHVVRUHTXDOWRWKH60&nV
Continue with each player taking a Turn to Shift a Spark (z) to Resistance score causes the Deletion of one Virus (z)!
Faith (¥), Modifying a Spark (z) into a Virus (z), moving
Tilda ends her Turn now, saving Decrypt for Round 3, and
with the Virus (z) to Faith (¥)EHIRUHąQDOO\HQGLQJWKHLU7XUQ
GUDZLQJKHUąQDOąYHFDUGVData Steal, Diversion, Memory
until Tilda is ready to begin Round 2.
Steal, Renegade Apprentice, and Sabotage.
28
RENEGADE RULES V1.0
,I\RXDUHSOD\LQJDVDWHDPFRQWLQXH5RXQGE\XVLQJDVPDQ\
,QIHFW Actions as you can to 'HOHWHPRUH6SDUNV(z)IURP GE
ABOOOTTAAGGE
SAB
WKHQHWZRUNUHIHUULQJWRWKHSUHYLRXVH[DPSOHIRUKRZLWLVGRQH
SA
CE
TIICCE
RENNTI
PRRE
ADEE APP
RENNNEEEGGAD
RE
5281'
:LWKDYLVDJHRIJULPGHWHUPLQDWLRQTildaVWDWHVo,GR IC
BAASSSIIC
BA
QRWOLNHWKRVH6SDUNVRQP\SDUWLWLRQWKH\EORFNPHIURP IC
BAASSIIC
BA
XSORDGLQJQHZ&RQWDPLQDQWV1RZLI,FDQ0RGLI\RQHRI
WKRVH6SDUNVLQWRVRPHWKLQJPRUHXVHIXOZHPLJKWMXVW
achieve our Goal.”
Now, with no 6SDUNV(z) on her partition, she is free to
SHUIRUPDQUpload Action. She discards 6DERWDJH ( +
using the Command as another for a total of ) and
5HQHJDGH$SSUHQWLFH ( ) for a total of three 'HVWUXFWLRQ
EAL
STEEA
TA ST
DAATTA
DA
( ), to Upload one 9LUXV (z) to her partition.
o/HWXV,QVWDOOD5HSOLFDWRUp
SIICC
BBAAASSI
AL
STEEEAAL
ST
MEMMMOORRYY
ME
29
RENEGADE RULES V1.0
&RXQWHUPHDVXUHV3KDVH
PT
You have kicked the SMC as best you could during the
DECCCRRYYYPPT
DE
Command3KDVH1RZGXULQJWKH&RXQWHUPHDVXUHV
3KDVHWKH60&NLFNVEDFN,I\RXDUHoDOOWKDWpWKHUHVKRXOG
EHQRPRUH6SDUNV (z) left on the network except the one
on ¥ #6+RZHYHULIPRUH6SDUNV (z)UHPDLQDQGVKDUHD
partition with your &RQWDPLQDQWV (z), those 6SDUNV (z)
IC
SIC
BASSI
BA
now attack.
30
RENEGADE RULES V1.0
6XFFHVVRU)DLOXUH6WHS 5HIUHVK3KDVH
2QO\QRZGR\RXFKHFNZKHWKHU\RXKDYHVXFFHVVIXOO\FRPSOHWHG <RXKDYHFRPSOHWHGWKH&RSSHU 6LPXODWLRQ6WDJH,
the Goal for this &RSSHU&\FOH5HPHPEHUWKH*RDOZDVWR &RXQWHUPHDVXUH card, so 'HOHWH it. This reveals the 6LOYHU
UHPRYHDOO6SDUNV(z)IURPHDFKSOD\HUnV+RPH6HUYHUDQG 6LPXODWLRQ6WDJH,, &RXQWHUPHDVXUH card that you will
DOVRIURPWKH)DLWK (¥) server. If Tilda is playing alone, she confront next Cycle.
KDVMXVW6XFFHHGHG,I\RXDUHSHUIRUPLQJWKLVZDONWKURXJK
ZLWKRWKHU5HQHJDGHVWKHUHLVDFKDQFH\RXOHIWVRPH6SDUNV Before you start the new Cycle, however, each player
(z)XQGHIHDWHG'LG\RX)DLORU6XFFHHGLQPHHWLQJWKH*RDOnV UHVKXIĆHVWKHLU'LVFDUGSLOHVFUHDWLQJWKHLUQHZIDFHGRZQ
objective? CommandGHFNVDQGGUDZVąYHFDUGVLQWRWKHLUKDQG
.QRZLQJQRZZKHWKHU\RX6XFFHHGHGRU)DLOHGĆLSRYHUWKDW )HHOIUHHWRFRQWLQXHWKH6LPXODWLRQIURPKHUH7U\WRIRFXV
Cycle’s &RSSHU &RXQWHUPHDVXUH card (i.e., Simulation on creating ,QVWDOODWLRQV()WRFRPSOHWHWKHQH[W*RDODQG
Stage 1) and rotate the card vertically so that you are reading keep on top of 6SDUNV(z). Beginning this Cycle, each Avatar
the appropriate Fail or Success event right-side-up.You did PXVWUROOIRU6SDUNV(z)DSSHDULQJDWWKHVWDUWRIWKHLU3OD\HU
Succeed, right? Turns, as shown by the black dot in the 6LOYHU-colored space
DWWKHYHU\ERWWRPRIWKH566LPXODWRU SMC card.
$OZD\VIROORZLQVWUXFWLRQVIURPWRSWRERWWRP$VVXPLQJ\RX
6XFFHHGHGWKHQ\RXPXVWo$GGRQH9LUXV (z) to )DLWK (¥) The top indicates one 6LOYHU card Cycle for this SMC.
partitions #1, , and #3. Also add one 8SOLQN (z) to each 7KHERWWRPLQGLFDWHVRQH,QIHFWLRQ roll (to add a new Spark
partition on )DLWK (¥).” (z) randomly)GXULQJHDFK3OD\HUnV7XUQWKDW&\FOH1RWHWKDW
,I\RX)DLOHGWKHQLQVWHDG\RXVKRXOGo$GGRQH9LUXV (z) to PRUHGLIąFXOWSMCFDUGVPD\UHTXLUHPXOWLSOHUDQGRP6SDUN
)DLWK (¥) partitions #1, , and #3. Also add one 8SOLQN (z) (z)DGGLWLRQVHDFK3OD\HU7XUQ
and one 6SDUN (z) to each partition on )DLWK (¥).” And those 6SDUNV(z)DUHJRLQJWRNHHS\RXEXV\
'LG\RXQRWLFHWKHGLIIHUHQFHEHWZHHQ6XFFHVVDQG)DLO"
o3URVSHFWV7KDWąUVW&\FOHZDVWKHHDV\SDUW1RZZHDUHLQWRWKHUHDOEXVLQHVVDQGUHDG\WRIDFHVRPHSURSHU
RSSRVLWLRQ7KLVLVZKHUHZHVRUWWKHEODFNKDWVIURPWKHZDJHVODYHV
o,I\RXOHDYHKHUHVWLOODm3URVSHFWnWKHQ\RXKDYHRQO\JRW\RXUVHOIWREODPHDQG\RXZLOOąQGIHZIULHQGVKHUHWRJLYH\RX
DQ\NLQGRIV\PSDWK\
o,I\RXVXFFHHGWKHQ\RXZLOOOHDYHZLWKHYHQIHZHUIULHQGVEHFDXVHIURPWKHQRQ\RXZLOOEHXQGHUJURXQG<RXZLOOOLYH
PRVWRI\RXUH[LVWHQFHLQF\EHUVSDFHRULQVRPHURWWHQMRLQWWKDWZLOOEH\RXURQO\UHDOLW\<RXUFXUUHQF\ZLOOEHLQIRQRPLFV
\RXUGDLO\PHDOZLOOEHGRUSKVDQGGHUPVDQG\RXZLOOOLYHIRUWKHQH[WWLPH\RXZLOOEHMDFNHGLQ%XW\RXFDQKROG\RXU
head up high. You will be one of the few.You will get to wear the patch of a respected brotherhood. You will have purpose.
You will restore faith.You will be a Renegade.”
>5XSHUW6WDQ]$FH5HQHJDGH)LUVW&ODVV@
31
RENEGADE RULES V1.0
6HTXHQFHRI3OD\ $FWLRQV/LVW
MOVE
<RXU&DUG&RPPDQGV
7KHV\PEROVRQWKHFDUGVDOORZ\RXRQH
1. ,QWHO3KDVH q One 0RYHPHQW point per & CommandSRLQWSHUV\PERORIWKDWFRORU
carry (z | z z | z z z) These are:
2. Command 3KDVH
SHIFT : 'HVWUXFWLRQ (red)
A. Start of Turn Step (7.1) q Shift one (z | z) out of a partition per : 'HFHSWLRQ (yellow)
B. Restock Hack Shack Step (7.2) 83/2$' : &RJQLWLRQ (green)
q 67$1'$5' =z
C. New Sparks Step (7.3) q 5(3/,&$7( + =z : ,QIRUPDWLRQ (blue)
q 3523$*$7( + =z : /HDGHUVKLS (purple);
' &RPPDQG$FWLRQV6WHS(7.4) WKLVoZLOGFDUGpCommand generates a
MODIFY
E. Replenish Hand Step (7.5) Command in any of the other colors
q If z > z at partition then, + = zz
: Shown when referring, collectively, to
F. End of Turn Step (7.6) ,167$// any and all &RPPDQGV (white)
q +zzz=
3. &RXQWHUPHDVXUHV3KDVH
INFECT
A. SMC’s Revenge Step (8.1): q z + + z = ,QIHFWLRQVFRUH
q z + &RXQWHUPHDVXUHV
i. 9LUXV%DWWOH6HJPHQW (+1 per z, +4 for ) = 5HVLVWDQFHVFRUH
<RXU,QVWDOODWLRQV
ii. 'HOHWH&RQWDPLQDQWV q If Infection > Resistance, 'HOHWH all :KHQ\RXFRPELQHWKUHHRI\RXU
6SDUNV (z) or *XDUGLDQ () &RQWDPLQDQWV (circular, colored tokens)
6HJPHQW q ,I,QIHFWLRQì5HVLVWDQFH'HOHWH one z . LQWKHVDPHSDUWLWLRQWKH\FDQIRUPRQH
iii. '
HOHWH,QVWDOODWLRQV ,QVWDOODWLRQ (square, like-colored token):
EXECUTE
6HJPHQW : 3URSDJDWRU (red)
Use an Advanced Command card’s ([HFXWH
B. Success or Failure Step (8.2) Action instead of its &RPPDQGV. : 5HSOLFDWRU (yellow)
6+23 : 1HXUDO+XE (green)
C. Move Sparks Step (8.3)
Spend HTXDOWRFRVWWRSXUFKDVHRQHAdvanced : 'DWD3RUW (blue)
' Scoring Token Step (8.4) CommandFDUGIURPWKH+DFN6KDFNDGGWRKDQG : Shown when referring, collectively, to
4. 5HIUHVK3KDVH any and all ,QVWDOODWLRQV (white)
A. (QGRI*DPH6WHS(9.1)
B. 1HZ'HDO6WHS(9.2) 60&nV&RXQWHUPHDVXUHV
C. +DFN6KDFN3XUJH6WHS(9.3) The black tokens and the gray tokens, both circular and square, are the SMC’s tools for protecting itself
against your attacks.
At the end of each Cycle these &RXQWHUPHDVXUHV attack &RQWDPLQDQWV:
z : 6SDUN (black)6\VWHP3DUWLWLRQ5HQHJDGH&RXQWHUPHDVXUHV (S.P.R.C. – or “Spark” for short)
z : )ODUH (gray): Created by 6SDUN ([SORVLRQV
: *XDUGLDQ (black): Created by 6SDUNV
: )LUHZDOO (gray): Created by )ODUHV
32