Computers
A computer is only as secure as its weakest vulnerability; every computer has a terminal, and every terminal is another weakness. The hacking subsystem provides a framework for accessing computers using the versatile skill set of an entire party.