Chapter 7: The Hustle
"The house always wins, unless you know how to count cards."
Modified game mechanics for deception, infiltration, and complex operations.
📖 Modifies STA Core Rulebook, Chapter 7: Operations
Extended Tasks
Planning and executing multi-stage operations
Operation Planning Phase
- Intelligence gathering requirements
- Resource allocation and preparation
- Risk assessment and contingency planning
- Team coordination and role assignment
Duration: Days to weeks of preparation time Complexity: Multiple skill requirements and challenges Variables: Environmental factors and opposition response Flexibility: Adaptation to changing circumstances
Multi-Stage Execution
- Sequential task completion requirements
- Momentum building and resource management
- Complication response and problem solving
- Success threshold modification based on preparation
Pacing: Tension building through escalating stakes Teamwork: Coordinated actions and mutual support Pressure: Time limits and detection risks Consequences: Cascading effects of failure or success
Heist Structure Template
- Reconnaissance: Target assessment and security analysis
- Planning: Approach selection and resource gathering
- Preparation: Equipment acquisition and team positioning
- Infiltration: Gaining access to target location
- Execution: Completing primary objective
- Extraction: Escaping with assets and evidence elimination
- Resolution: Dealing with consequences and aftermath
Infiltration Framework
- Identity Establishment: Cover story and documentation
- Access Gaining: Physical or social entry methods
- Intelligence Gathering: Information collection and analysis
- Objective Completion: Mission-specific goals
- Suspicion Management: Maintaining cover and misdirection
- Exit Strategy: Planned withdrawal and evidence cleanup
The Heat System
Tracking law enforcement attention
Heat Generation
- Criminal activity type and severity
- Public visibility and media attention
- Law enforcement casualties or embarrassment
- Pattern recognition and behavioral analysis
Base Values: Standard heat generation by activity type Modifiers: Location, timing, and method factors Accumulation: Progressive increases with repeated activity Decay: Natural reduction over time and distance
Heat Levels and Effects
Cold (0-25 Heat)
- Normal law enforcement response
- Standard security measures in effect
- No special attention or surveillance
- Business as usual for criminal operations
Warm (26-50 Heat)
- Increased patrol frequency and vigilance
- Enhanced security screening procedures
- Informal inquiries and information gathering
- Higher prices for illegal goods and services
Hot (51-75 Heat)
- Active investigation and surveillance
- Checkpoint establishment and ID verification
- Contact reluctance and network disruption
- Significant service price increases
Burning (76-100 Heat)
- Manhunt activation and resource allocation
- Shoot-on-sight orders for violent criminals
- Network collapse and asset abandonment
- Complete operational shutdown necessity
Heat Management Strategies
- Geographic relocation and territory shifts
- Identity changes and appearance modification
- Bribery and corruption of officials
- Counter-intelligence and misdirection operations
Heat Reduction Methods
- Time passage and attention span limits
- Scapegoat identification and blame transfer
- Authority figure elimination or corruption
- Major distraction event creation
Deception Mechanics
Lies, cons, and misdirection
Simple Deception Tasks
- Basic lies and misdirection
- False identity maintenance
- Distraction and attention diversion
- Information concealment techniques
Skill Requirements: Command + Presence typically Modifiers: Relationship quality, information complexity, stakes level Opposition: Insight, Investigation, or passive difficulty Consequences: Suspicion increase, relationship damage, heat generation
Complex Con Operations
- Multi-stage deception campaigns
- Multiple target coordination
- Long-term relationship manipulation
- Elaborate false scenario construction
Planning Phase: Target analysis and approach design Setup Phase: Relationship establishment and trust building Hook Phase: Initial commitment and investment securing Play Phase: Manipulation escalation and control maintenance Sting Phase: Final objective completion and evidence elimination
Social Engineering Extended Tasks
- Authority figure impersonation
- Insider recruitment and manipulation
- Information extraction through conversation
- Access credential acquisition through deception
Preparation: Research and persona development Approach: Initial contact and rapport building Exploitation: Vulnerability identification and pressure application Extraction: Objective completion and relationship termination
Information Gathering
Intelligence networks and data acquisition
Source Types and Reliability
- Primary sources and direct witnesses
- Secondary sources and rumor networks
- Technical intelligence and electronic surveillance
- Open source intelligence and public information
Verification: Cross-referencing and corroboration requirements Timeliness: Information freshness and relevance decay Access: Source protection and operational security needs Cost: Financial, social, and risk-based payment methods
Intelligence Networks
- Contact recruitment and management
- Information flow coordination and security
- Compartmentalization and need-to-know principles
- Counter-intelligence and network protection
Structure: Hierarchical vs. cellular organization models Communication: Secure messaging and dead-drop systems Compensation: Payment methods and loyalty maintenance Security: Penetration resistance and damage limitation
Data Analysis and Processing
- Pattern recognition and trend analysis
- Threat assessment and opportunity identification
- Verification and reliability evaluation
- Strategic planning and tactical application
Tools: Computer systems and analysis software Skills: Investigation, Science, and specialized knowledge Collaboration: Team analysis and peer review processes Presentation: Information packaging and distribution methods
Social Engineering
Manipulating people and situations
Psychological Manipulation Techniques
- Authority and expertise exploitation
- Social proof and conformity pressure
- Reciprocity and obligation creation
- Scarcity and urgency artificial generation
Ethics: Manipulation vs. persuasion distinctions Targets: Vulnerability assessment and exploitation Resistance: Counter-manipulation awareness and training Consequences: Relationship damage and reputation costs
Organizational Infiltration
- Corporate culture analysis and adaptation
- Hierarchy navigation and authority exploitation
- Internal politics understanding and manipulation
- Security protocol circumvention through social means
Research: Organization structure and personnel analysis Positioning: Role selection and credibility establishment Exploitation: Information access and privilege abuse Extraction: Objective completion and suspicion avoidance
Group Dynamics Manipulation
- Leadership identification and influence
- Coalition building and alliance formation
- Conflict creation and resolution control
- Decision-making process influence and outcome steering
Psychology: Group behavior understanding and prediction Timing: Optimal intervention and influence moments Sustainability: Long-term influence maintenance Detection: Manipulation awareness and countermeasure avoidance
Planning Phases
Structured heist and infiltration preparation
Intelligence Gathering Phase
- Target assessment and vulnerability analysis
- Security system evaluation and weakness identification
- Personnel background investigation and leverage development
- Environmental factor analysis and timing optimization
Resource Acquisition Phase
- Equipment procurement and customization
- Personnel recruitment and skill assessment
- Financial resource allocation and backup fund establishment
- Safe house and operational base setup
Rehearsal and Training Phase
- Mission simulation and scenario testing
- Team coordination and communication protocol establishment
- Contingency planning and emergency procedure development
- Equipment testing and backup system verification
Final Preparation Phase
- Last-minute intelligence updates and plan adjustment
- Equipment final checks and redundancy verification
- Team mental preparation and motivation maintenance
- Extraction route confirmation and backup plan activation
Complication Tables
When things go sideways
Minor Complications (1-2 on d6)
- Equipment malfunction or performance degradation
- Unexpected personnel presence or schedule changes
- Communication interference or coordination difficulties
- Environmental factors and weather complications
Moderate Complications (3-4 on d6)
- Security upgrade or procedure changes
- Insider betrayal or loyalty questions
- Law enforcement presence or investigation escalation
- Civilian interference or unexpected witnesses
Major Complications (5-6 on d6)
- Plan exposure or counter-intelligence operation
- Team member capture or injury
- Target evacuation or asset relocation
- Rival organization interference or competition
Catastrophic Complications (GM Choice)
- Complete mission compromise and exposure
- Multiple team member casualties or capture
- Network collapse and asset loss
- Long-term consequences and relationship damage
Recovery Options: Adaptation strategies and damage control Escalation Risks: Complication cascading and situation deterioration Learning Opportunities: Experience gain and future preparation improvement Narrative Impact: Story development and character growth consequences