|
[Cyberwar:2025 Rulebook](uploads/f21a8cd439ed95ab355f7ee7d41b9527/Cyberwar-2025_Rulebook.pdf)
|
|
[Cyberwar:2025 Rulebook](uploads/6026e919966fe776b888bc5d650113d9/Cyberwar-2025_Rulebook.pdf)
|
|
|
|
|
|

|
|

|
|
|
|
|
... | @@ -20,134 +20,159 @@ It is very common for a game to end without a clear winner. Many times the board |
... | @@ -20,134 +20,159 @@ It is very common for a game to end without a clear winner. Many times the board |
|
# User Interface
|
|
# User Interface
|
|

|
|

|
|
|
|
|
|
- A. Network. The game takes place on this network through a series of interconnected nodes. For more information on the network, see the next section.
|
|
- **A. Network**. The game takes place on this network through a series of interconnected nodes. For more information on the network, see the next section.
|
|
- B. View Reports. Click to open a dialog listing all the actions taken on the last turn and their effects.
|
|
- **B. View Reports**. Click to open a dialog listing all the actions taken on the last turn and their effects.
|
|
- C. Public Chat. The public chat message history is found here.
|
|
- **C. Public Chat**. The public chat message history is found here.
|
|
- D. Turn Counter. The history of the state of the board can be viewed using the turn counter.
|
|
- **D. Turn Counter**. The history of the state of the board can be viewed using the turn counter.
|
|
- E. Action Points. The total number of Action Points available to use.
|
|
- **E. Action Points**. The total number of Action Points available to use.
|
|
- F. Cost Effects Window. This window shows the actions available to the player. For more information about the Cost Effects Window, see Upgrading Your Capabilities.
|
|
- **F. Cost Effects Window**. This window shows the actions available to the player. For more information about the Cost Effects Window, see Upgrading Your Capabilities.
|
|
- G. Orders Adjudication. List of all the actions queued for this turn. Click the X button to remove the action.
|
|
- **G. Orders Adjudication**. List of all the actions queued for this turn. Click the X button to remove the action.
|
|
- H. Submit Orders. Click to submit your turn. The text of this button will change from “Submit Orders” to “Edit Orders.” Click this button to edit your orders after they’ve submitted. However, the turn will be adjudicated once the last player submits their turn. Once this happens you are not allowed to go back and edit orders.
|
|
- **H. Submit Orders**. Click to submit your turn. The text of this button will change from “Submit Orders” to “Edit Orders.” Click this button to edit your orders after they’ve submitted. However, the turn will be adjudicated once the last player submits their turn. Once this happens you are not allowed to go back and edit orders.
|
|
|
|
|
|
## Network
|
|
## Network
|
|

|
|

|
|
|
|
|
|
- A. Domain. Each player has its own domain, represented by a color. In the example above, the red play
|
|
- **A. Domain**. Each player has its own domain, represented by a color. In the example above, the red play
|
|
- B. Your Base Node. All actions begin from this node. If the nodes on either side are denied, you will lose access to your base node and will therefore lose.
|
|
- **B. Your Base Node**. All actions begin from this node. If the nodes on either side are denied, you will lose access to your base node and will therefore lose.
|
|
- C. Other Players’ Base Nodes. The other players’ equivalent to your base node. You may click on it to open the chat window.
|
|
- **C. Other Players’ Base Nodes**. The other players’ equivalent to your base node. You may click on it to open the chat window.
|
|
- D. Nodes. Nodes make up the network. Control or manipulation of these nodes expands each players’ control over the network.
|
|
- **D. Nodes**. Nodes make up the network. Control or manipulation of these nodes expands each players’ control over the network.
|
|
- E. Connections. Nodes are connected through these connections, and actions must be taken along those connection lines through nodes that are controlled.
|
|
- **E. Connections**. Nodes are connected through these connections, and actions must be taken along those connection lines through nodes that are controlled.
|
|
- a. The exception to this rule is nodes across the center white hexagon can be controlled from the H node.
|
|
- a. The exception to this rule is nodes across the center white hexagon can be controlled from the H node.
|
|
- F. Tiers. Each player's domain is bordered by black walls, which represent security. Actions taken on nodes across this black wall in another player’s domain have a cost represented by the number in each tier (1 through 4)
|
|
- **F. Tiers**. Each player's domain is bordered by black walls, which represent security. Actions taken on nodes across this black wall in another player’s domain have a cost represented by the number in each tier (1 through 4)
|
|
Playing Your Turn
|
|
|
|
|
|
# Playing Your Turn
|
|
On your turn, you have a number of action points to spend. These are spent on:
|
|
On your turn, you have a number of action points to spend. These are spent on:
|
|
|
|
|
|
1. Taking actions on nodes
|
|
1. Taking actions on nodes
|
|
2. Upgrading your capabilities
|
|
2. Upgrading your capabilities
|
|
|
|
|
|
You are not required to spend all your action points during your turn. They may be banked for use in a later turn.
|
|
You are not required to spend all your action points during your turn. They may be banked for use in a later turn.
|
|
Perform Actions on Nodes
|
|
|
|
To perform actions on a node, click on a node. If the node is gray, actions are not eligible to be performed on that node.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## Perform Actions on Nodes
|
|
|
|
To perform actions on a node, click on a node. If the node is gray, actions are not eligible to be performed on that node.
|
|
|
|
|
|
A. Actions to Perform. Only eligible actions will be displayed here. Its initial cost is displayed on each card.
|
|

|
|
B. Initial Cost of the Selected Action. The cost for the selected action is displayed here.
|
|
|
|
C. Source Node. The node from which the action is performed. Each node can only perform one action per turn.
|
|
|
|
D. Inter-domain Cost. The additional cost for performing actions from one domain to another. This is equal to the domain tier where the nodes are.
|
|
|
|
E. Target Node. The node on which this action is to be performed. There is no choice to be made here, it is only for informational purposes.
|
|
|
|
F. Total Cost. Cost in Action Points for performing this action. It is the sum of the action cost plus the cross-domain cost.
|
|
|
|
G. Owner and Strength. Any information known about this node such as its owner and known strength.
|
|
|
|
|
|
|
|
|
|
- **A. Actions to Perform**. Only eligible actions will be displayed here. Its initial cost is displayed on each card.
|
|
|
|
- **B. Initial Cost of the Selected Action**. The cost for the selected action is displayed here.
|
|
|
|
- **C. Source Node**. The node from which the action is performed. Each node can only perform one action per turn.
|
|
|
|
- **D. Inter-domain Cost**. The additional cost for performing actions from one domain to another. This is equal to the domain tier where the nodes are.
|
|
|
|
- **E. Target Node**. The node on which this action is to be performed. There is no choice to be made here, it is only for informational purposes.
|
|
|
|
- **F. Total Cost**. Cost in Action Points for performing this action. It is the sum of the action cost plus the cross-domain cost.
|
|
|
|
- **G. Owner and Strength**. Any information known about this node such as its owner and known strength.
|
|
|
|
|
|
Upgrade Your Capabilities
|
|
## Upgrade Your Capabilities
|
|
Action points can be used to upgrade your capabilities. These capabilities provide you with more actions to perform.
|
|
Action points can be used to upgrade your capabilities. These capabilities provide you with more actions to perform.
|
|
|
|
|
|
|
|

|
|
|
|
|
|
● Action points can be used to upgrade your capabilities. These capabilities provide you with more actions to perform.
|
|
- Action points can be used to upgrade your capabilities. These capabilities provide you with more actions to perform.
|
|
● Actions are divided up in three trees, and each tree is separated into three tiers
|
|
- Actions are divided up in three trees, and each tree is separated into three tiers
|
|
● The action in the second tier must be unlocked before the third tier can be unlocked
|
|
- The action in the second tier must be unlocked before the third tier can be unlocked
|
|
|
|
- The action is gray if it cannot be upgraded, yellow when it can be upgraded and has some action points allocated to it, and green when it is fully unlocked.
|
|
● The action is gray if it cannot be upgraded, yellow when it can be upgraded and has some action points allocated to it, and green when it is fully unlocked
|
|
|
|
○ Fully-upgraded. Able to be used
|
|
- 
|
|
○ Available. Becomes available (yellow) in the turn after the action above it in its tree is fully-upgraded. Cannot be used until all action points have been allocated, at which point it becomes fully-upgraded.
|
|
- **Fully-upgraded**. Able to be used
|
|
○ Either Unavailable or no Action Points Allocated. Once the action in the tier above it is fully upgraded this will become Available.
|
|
- 
|
|
● Actions are not available until all four action points have been allocated.
|
|
- **Available**. Becomes available (yellow) in the turn after the action above it in its tree is fully-upgraded. Cannot be used until all action points have been allocated, at which point it becomes fully-upgraded.
|
|
● Once actions have been upgraded, they are available to use in the next turn.
|
|
- 
|
|
|
|
- **Either Unavailable or no Action Points Allocated**. Once the action in the tier above it is fully upgraded this will become Available.
|
|
|
|
- Actions are not available until all four action points have been allocated.
|
|
|
|
- Once actions have been upgraded, they are available to use in the next turn.
|
|
|
|
|
|
|
|
# Chat
|
|
|
|
|
|
|
|
|
|
Chat
|
|
|
|
Players can send messages publicly or privately.
|
|
Players can send messages publicly or privately.
|
|
Private Chat
|
|
|
|
|
|
## Private Chat
|
|
Private chat can only be seen by the two players involved in the chat.
|
|
Private chat can only be seen by the two players involved in the chat.
|
|
|
|
|
|
|
|

|
|
|
|
|
|
To chat with another player, click on the base icon of the player with whom you want to chat.
|
|
To chat with another player, click on the base icon of the player with whom you want to chat.
|
|
|
|
|
|
|
|

|
|
|
|
|
|
When a new unread message arrives from another player, a pulsing dot appears next to the name on their base.
|
|
When a new unread message arrives from another player, a pulsing dot appears next to the name on their base.
|
|
|
|
|
|
Public Chat
|
|
## Public Chat
|
|
The public chat is located on the left side of the screen. All messages here are visible to all players.
|
|
The public chat is located on the left side of the screen. All messages here are visible to all players.
|
|
|
|
|
|
Reports
|
|
# Reports
|
|
The reports dialog contains the list of all the actions taken in the previous turns and the results of those actions.
|
|
The reports dialog contains the list of all the actions taken in the previous turns and the results of those actions.
|
|
|
|
|
|
|
|
|
|
A. Secure Results. Securing nodes actions will be shown here.
|
|

|
|
B. Failed Defenses Results. If another player succeeded in acquiring a node you formerly controlled.
|
|
|
|
C. Action. Name of the action taken.
|
|
- **A. Secure Results**. Securing nodes actions will be shown here.
|
|
D. Source Node
|
|
- **B. Failed Defenses Results**. If another player succeeded in acquiring a node you formerly controlled.
|
|
E. Target Node
|
|
- **C. Action**. Name of the action taken.
|
|
F. Attack Strength. Dependent on the strength of the node. This can be changed by securing nodes.
|
|
- **D. Source Node**
|
|
G. Result Icon. Successful actions are denoted by a checkmark, failed actions are denoted by an X.
|
|
- **E. Target Node**
|
|
H. Scan Results. Information found from scanning nodes.
|
|
- **F. Attack Strength**. Dependent on the strength of the node. This can be changed by securing nodes.
|
|
|
|
- **G. Result Icon**. Successful actions are denoted by a checkmark, failed actions are denoted by an X.
|
|
Actions
|
|
- **H. Scan Results**. Information found from scanning nodes.
|
|
First Tier
|
|
|
|
Secure
|
|
# Actions
|
|
|
|
## First Tier
|
|
• Available at the start of the game
|
|
### Secure
|
|
|
|

|
|
|
|
- Available at the start of the game
|
|
|
|
|
|
Increases the value of a server node by one point value to a max of four. The higher value on a server node, the stronger the attack and defense odds are against opposing cyber effects.
|
|
Increases the value of a server node by one point value to a max of four. The higher value on a server node, the stronger the attack and defense odds are against opposing cyber effects.
|
|
Acquire
|
|
|
|
|
|
### Acquire
|
|
• Available at the start of the game
|
|

|
|
|
|
- Available at the start of the game
|
|
|
|
|
|
Overtly seizes control of targeted server node. The Acquire effect cannot be used against bases. The odds of success for an Acquire effect attempt are determined by comparing the value of the attacking server node(s) with the value of the defending server node. Thus, using Secure effects increases the likelihood of a successful acquisition using the secured server. Players also can execute this effect in the blind, or without prior knowledge of someone controlling that server node using the Scan effect. Acquire action strength stacks when attacking the same node from multiple locations.
|
|
Overtly seizes control of targeted server node. The Acquire effect cannot be used against bases. The odds of success for an Acquire effect attempt are determined by comparing the value of the attacking server node(s) with the value of the defending server node. Thus, using Secure effects increases the likelihood of a successful acquisition using the secured server. Players also can execute this effect in the blind, or without prior knowledge of someone controlling that server node using the Scan effect. Acquire action strength stacks when attacking the same node from multiple locations.
|
|
Scan
|
|
|
|
|
|
### Scan
|
|
• Available at the start of the game
|
|

|
|
|
|
- Available at the start of the game
|
|
|
|
|
|
Increases the value of a server node by one point value to a max of four. The higher value on a server node, the stronger the attack and defense odds are against opposing cyber effects.
|
|
Increases the value of a server node by one point value to a max of four. The higher value on a server node, the stronger the attack and defense odds are against opposing cyber effects.
|
|
Second Tier
|
|
## Second Tier
|
|
Expel
|
|
### Expel
|
|
|
|

|
|
• Costs four (4) Action Points to unlock
|
|
- Costs four (4) Action Points to unlock
|
|
• Actions Points may be allocated at the start of the game
|
|
- Actions Points may be allocated at the start of the game
|
|
|
|
|
|
A defensive cyber effect that removes all covertly hidden or exploiting players who reside on your overtly controlled server nodes.
|
|
A defensive cyber effect that removes all covertly hidden or exploiting players who reside on your overtly controlled server nodes.
|
|
Manipulate
|
|
|
|
|
|
### Manipulate
|
|
• Costs four (4) Action Points to unlock
|
|

|
|
• Actions Points may be allocated at the start of the game
|
|
- Costs four (4) Action Points to unlock
|
|
|
|
- Actions Points may be allocated at the start of the game
|
|
|
|
|
|
Same as Acquire, but can misattribute the acquire action launched and mask the owner as another player on the board.
|
|
Same as Acquire, but can misattribute the acquire action launched and mask the owner as another player on the board.
|
|
Exploit
|
|
|
|
|
|
### Exploit
|
|
• Costs four (4) Action Points to unlock
|
|

|
|
• Actions Points may be allocated at the start of the game
|
|
- Costs four (4) Action Points to unlock
|
|
|
|
- Actions Points may be allocated at the start of the game
|
|
|
|
|
|
Functions like an Acquire action, but on success, you will not actually own the node. You will get action points from it and can perform actions off of it as if it was your node, but you will not be able to Secure it. Other players will not see you have this link unless they scan one of the two linked nodes. Exploit actions do not stack.
|
|
Functions like an Acquire action, but on success, you will not actually own the node. You will get action points from it and can perform actions off of it as if it was your node, but you will not be able to Secure it. Other players will not see you have this link unless they scan one of the two linked nodes. Exploit actions do not stack.
|
|
Third Tier
|
|
|
|
Analyze
|
|
## Third Tier
|
|
|
|
### Analyze
|
|
• Costs four (4) Action Points to unlock
|
|

|
|
• Actions Points may be allocated after the Expel action is unlocked
|
|
- Costs four (4) Action Points to unlock
|
|
|
|
- Actions Points may be allocated after the Expel action is unlocked
|
|
|
|
|
|
More effective version of Scan because it can scan the player’s entire network of linked server nodes (+1) to reveal any exploited players residing on the player's network.
|
|
More effective version of Scan because it can scan the player’s entire network of linked server nodes (+1) to reveal any exploited players residing on the player's network.
|
|
Deny
|
|
|
|
|
|
### Deny
|
|
• Costs four (4) Action Points to unlock
|
|

|
|
• Actions Points may be allocated after the Manipulate action is unlocked
|
|
- Costs four (4) Action Points to unlock
|
|
|
|
- Actions Points may be allocated after the Manipulate action is unlocked
|
|
|
|
|
|
Calculates an attack similar to Acquire, but will remove the node from play if successful. Cutting off a player's base from the network will eliminate them from the game. Deny actions do not stack and are calculated separately.
|
|
Calculates an attack similar to Acquire, but will remove the node from play if successful. Cutting off a player's base from the network will eliminate them from the game. Deny actions do not stack and are calculated separately.
|
|
Implant
|
|
|
|
|
|
### Implant
|
|
• Costs four (4) Action Points to unlock
|
|

|
|
• Actions Points may be allocated after the Exploit action is unlocked
|
|
- Costs four (4) Action Points to unlock
|
|
|
|
- Actions Points may be allocated after the Exploit action is unlocked
|
|
|
|
|
|
Reduces the defensive value of that server node to one for one turn. Then the player must launch another OCO or CNE effect to gain access to that server node. If launched on a base, there is a chance the defending player can be locked out of play for one round.
|
|
Reduces the defensive value of that server node to one for one turn. Then the player must launch another OCO or CNE effect to gain access to that server node. If launched on a base, there is a chance the defending player can be locked out of play for one round.
|
|
|
|
|
|
|
|
|