The network is not neutral.
Behind every system, every layer, every secured environment…
there are forces shaping its behavior, defending its boundaries, and expanding their reach.
Set 6 explores the power structures that exist within the digital ecosystem — the factions, intelligences, organizations, and hidden authorities that compete for dominance across the network.
These are not passive systems.
They have goals.
They have methods.
They have influence.
And once you are noticed…
You become part of their game.
Set 6 introduces organized power into your hacking sessions, transforming isolated intrusions into part of a larger conflict.
Instead of interacting only with systems, the hacker now encounters:
This set turns the network into a living battlefield of interests.
Mega-corporation, rogue AI collective, decentralized hacker network, government cyber division, emergent intelligence cluster.
Infrastructure control, data monopolization, algorithmic dominance, covert evolution, legacy systems.
Localized subnet, global infrastructure, hidden layers of the deep network, fragmented distributed nodes.
Control, expansion, manipulation, survival, evolution, dominance over digital ecosystems.
Infiltration, data manipulation, automated enforcement, predictive control, direct digital conflict.
Unaware, monitoring, testing, recruiting, manipulating, hostile engagement.
Access granted, increased visibility, forced alignment, manipulation, assimilation, systemic escalation.
Set 6 adds structure, conflict, and decision-making to the network.
It introduces:
The hacker is no longer just navigating systems.
They are navigating power.
Perfect for:
Works especially well when you want:
Set 6 transforms hacking into a strategic layer of your campaign.
Every intrusion becomes:
Because in a network ruled by power structures…
You are never just accessing data.
You are stepping into someone else’s territory.
License: Roll20 End User License Agreement
(Personal Use Only, Do Not Distribute)