Skip to content

Chapter 7: The Hustle

"The house always wins, unless you know how to count cards."

Modified game mechanics for deception, infiltration, and complex operations.

📖 Modifies STA Core Rulebook, Chapter 7: Operations

Extended Tasks

Planning and executing multi-stage operations

Operation Planning Phase

  • Intelligence gathering requirements
  • Resource allocation and preparation
  • Risk assessment and contingency planning
  • Team coordination and role assignment

Duration: Days to weeks of preparation time Complexity: Multiple skill requirements and challenges Variables: Environmental factors and opposition response Flexibility: Adaptation to changing circumstances

Multi-Stage Execution

  • Sequential task completion requirements
  • Momentum building and resource management
  • Complication response and problem solving
  • Success threshold modification based on preparation

Pacing: Tension building through escalating stakes Teamwork: Coordinated actions and mutual support Pressure: Time limits and detection risks Consequences: Cascading effects of failure or success

Heist Structure Template

  1. Reconnaissance: Target assessment and security analysis
  2. Planning: Approach selection and resource gathering
  3. Preparation: Equipment acquisition and team positioning
  4. Infiltration: Gaining access to target location
  5. Execution: Completing primary objective
  6. Extraction: Escaping with assets and evidence elimination
  7. Resolution: Dealing with consequences and aftermath

Infiltration Framework

  1. Identity Establishment: Cover story and documentation
  2. Access Gaining: Physical or social entry methods
  3. Intelligence Gathering: Information collection and analysis
  4. Objective Completion: Mission-specific goals
  5. Suspicion Management: Maintaining cover and misdirection
  6. Exit Strategy: Planned withdrawal and evidence cleanup

The Heat System

Tracking law enforcement attention

Heat Generation

  • Criminal activity type and severity
  • Public visibility and media attention
  • Law enforcement casualties or embarrassment
  • Pattern recognition and behavioral analysis

Base Values: Standard heat generation by activity type Modifiers: Location, timing, and method factors Accumulation: Progressive increases with repeated activity Decay: Natural reduction over time and distance

Heat Levels and Effects

Cold (0-25 Heat)

  • Normal law enforcement response
  • Standard security measures in effect
  • No special attention or surveillance
  • Business as usual for criminal operations

Warm (26-50 Heat)

  • Increased patrol frequency and vigilance
  • Enhanced security screening procedures
  • Informal inquiries and information gathering
  • Higher prices for illegal goods and services

Hot (51-75 Heat)

  • Active investigation and surveillance
  • Checkpoint establishment and ID verification
  • Contact reluctance and network disruption
  • Significant service price increases

Burning (76-100 Heat)

  • Manhunt activation and resource allocation
  • Shoot-on-sight orders for violent criminals
  • Network collapse and asset abandonment
  • Complete operational shutdown necessity

Heat Management Strategies

  • Geographic relocation and territory shifts
  • Identity changes and appearance modification
  • Bribery and corruption of officials
  • Counter-intelligence and misdirection operations

Heat Reduction Methods

  • Time passage and attention span limits
  • Scapegoat identification and blame transfer
  • Authority figure elimination or corruption
  • Major distraction event creation

Deception Mechanics

Lies, cons, and misdirection

Simple Deception Tasks

  • Basic lies and misdirection
  • False identity maintenance
  • Distraction and attention diversion
  • Information concealment techniques

Skill Requirements: Command + Presence typically Modifiers: Relationship quality, information complexity, stakes level Opposition: Insight, Investigation, or passive difficulty Consequences: Suspicion increase, relationship damage, heat generation

Complex Con Operations

  • Multi-stage deception campaigns
  • Multiple target coordination
  • Long-term relationship manipulation
  • Elaborate false scenario construction

Planning Phase: Target analysis and approach design Setup Phase: Relationship establishment and trust building Hook Phase: Initial commitment and investment securing Play Phase: Manipulation escalation and control maintenance Sting Phase: Final objective completion and evidence elimination

Social Engineering Extended Tasks

  • Authority figure impersonation
  • Insider recruitment and manipulation
  • Information extraction through conversation
  • Access credential acquisition through deception

Preparation: Research and persona development Approach: Initial contact and rapport building Exploitation: Vulnerability identification and pressure application Extraction: Objective completion and relationship termination

Information Gathering

Intelligence networks and data acquisition

Source Types and Reliability

  • Primary sources and direct witnesses
  • Secondary sources and rumor networks
  • Technical intelligence and electronic surveillance
  • Open source intelligence and public information

Verification: Cross-referencing and corroboration requirements Timeliness: Information freshness and relevance decay Access: Source protection and operational security needs Cost: Financial, social, and risk-based payment methods

Intelligence Networks

  • Contact recruitment and management
  • Information flow coordination and security
  • Compartmentalization and need-to-know principles
  • Counter-intelligence and network protection

Structure: Hierarchical vs. cellular organization models Communication: Secure messaging and dead-drop systems Compensation: Payment methods and loyalty maintenance Security: Penetration resistance and damage limitation

Data Analysis and Processing

  • Pattern recognition and trend analysis
  • Threat assessment and opportunity identification
  • Verification and reliability evaluation
  • Strategic planning and tactical application

Tools: Computer systems and analysis software Skills: Investigation, Science, and specialized knowledge Collaboration: Team analysis and peer review processes Presentation: Information packaging and distribution methods

Social Engineering

Manipulating people and situations

Psychological Manipulation Techniques

  • Authority and expertise exploitation
  • Social proof and conformity pressure
  • Reciprocity and obligation creation
  • Scarcity and urgency artificial generation

Ethics: Manipulation vs. persuasion distinctions Targets: Vulnerability assessment and exploitation Resistance: Counter-manipulation awareness and training Consequences: Relationship damage and reputation costs

Organizational Infiltration

  • Corporate culture analysis and adaptation
  • Hierarchy navigation and authority exploitation
  • Internal politics understanding and manipulation
  • Security protocol circumvention through social means

Research: Organization structure and personnel analysis Positioning: Role selection and credibility establishment Exploitation: Information access and privilege abuse Extraction: Objective completion and suspicion avoidance

Group Dynamics Manipulation

  • Leadership identification and influence
  • Coalition building and alliance formation
  • Conflict creation and resolution control
  • Decision-making process influence and outcome steering

Psychology: Group behavior understanding and prediction Timing: Optimal intervention and influence moments Sustainability: Long-term influence maintenance Detection: Manipulation awareness and countermeasure avoidance

Planning Phases

Structured heist and infiltration preparation

Intelligence Gathering Phase

  • Target assessment and vulnerability analysis
  • Security system evaluation and weakness identification
  • Personnel background investigation and leverage development
  • Environmental factor analysis and timing optimization

Resource Acquisition Phase

  • Equipment procurement and customization
  • Personnel recruitment and skill assessment
  • Financial resource allocation and backup fund establishment
  • Safe house and operational base setup

Rehearsal and Training Phase

  • Mission simulation and scenario testing
  • Team coordination and communication protocol establishment
  • Contingency planning and emergency procedure development
  • Equipment testing and backup system verification

Final Preparation Phase

  • Last-minute intelligence updates and plan adjustment
  • Equipment final checks and redundancy verification
  • Team mental preparation and motivation maintenance
  • Extraction route confirmation and backup plan activation

Complication Tables

When things go sideways

Minor Complications (1-2 on d6)

  • Equipment malfunction or performance degradation
  • Unexpected personnel presence or schedule changes
  • Communication interference or coordination difficulties
  • Environmental factors and weather complications

Moderate Complications (3-4 on d6)

  • Security upgrade or procedure changes
  • Insider betrayal or loyalty questions
  • Law enforcement presence or investigation escalation
  • Civilian interference or unexpected witnesses

Major Complications (5-6 on d6)

  • Plan exposure or counter-intelligence operation
  • Team member capture or injury
  • Target evacuation or asset relocation
  • Rival organization interference or competition

Catastrophic Complications (GM Choice)

  • Complete mission compromise and exposure
  • Multiple team member casualties or capture
  • Network collapse and asset loss
  • Long-term consequences and relationship damage

Recovery Options: Adaptation strategies and damage control Escalation Risks: Complication cascading and situation deterioration Learning Opportunities: Experience gain and future preparation improvement Narrative Impact: Story development and character growth consequences