Sei sulla pagina 1di 17

Hollywood

Hacking vs. the


Real World
Introduction
There are a lot of similarities between Hollywood what you see in film and television. Not that it’s always
and a Leverage Crew: there are the Grifters playing the such a bad thing; mystery and misdirection are just
parts of characters; the Hackers behind the cameras and more tools in the Hacker’s armory, provided you know
in the special effects departments; the Hitters handling how to best capitalize on that illusion.
the stunt work; and overseeing it all, the Masterminds Inside, we’ll help you avoid egg on your face if the
producing and directing. Together, their job is to Mark or another Crewmember turns out to know
present a story with dynamic characters and action, more than just a bit about bytes.
grabbing and keeping our attention, and ultimately First, we’ll go over some of the common
having us believe in the unreal. Like most Crews in the misconceptions and cover what you can and can’t do
Leverage Roleplaying Game, Hollywood is working with a keyboard. Sharing this with the Crew ahead of
on the side of Good, just seeking to entertain and time can help avoid having to explain the technical
enlighten rather than right wrongs. And like some of details in the middle of the Job, and ensure that your
the best Crews, occasionally they do too good of a job Mastermind’s plans are workable.
at convincing us. Then we’ll take a look at Hollywood’s methods;
Your Hitter can tell you (and probably has) that you can see how the public perception of Hackers and
guns don’t really work that way, and your Grifter can technology influences scriptwriters and come up with
(but maybe won’t) tell you that people don’t react to your own interesting options for presenting Hacker
situations like characters in a movie do. But it’s the way activities in your Leverage games.
Hollywood presents computers that tends to stand out Finally, we’ll finish off with some new showy Talents
for Hackers, and they may marvel at how such a huge for your Hollywood-inspired Hackers.
disconnect exists between what they genuinely do and

ii
The Silver
Smokescreen
Hackers lead busy lives, so maybe you haven’t had time to
catch up with all the latest cinema releases or seen some of the
inaccuracies portrayed on the big and small screen.
If keeping current with all your shows is what’s been entire sci-fi and action thriller DVD collection (like you
keeping you busy, maybe you only cared about being needed an excuse), we’ve put together some of the more
entertained and you didn’t go looking to pick apart the frequent half-truths, myths, and fallacies that might crop
details. That’s fair; entertainment is part of what television up.
is for, after all. To save you from having to re-watch your

The (Over-)Connected World


In the world you see on screen, everything electrical has a couldn’t exist; you can’t reprogram hardware that isn’t
direct line to the Internet and anything with a microchip there. It’s like a Hacker turning your average home PC
can be hacked remotely by anyone with sufficient into a bomb with a virus—unless you popped some C4
skill. We’re almost at the point where every household into Nana’s computer, there’s nothing to blow up.
appliance communicates wirelessly across your home Remote access has one requirement: the system has
network, and your high-tech fridge can already send you to be online. Don’t want a Hacker using the Internet
a text message reminding you to buy milk when you’re to snoop through your top-secret files or tamper with
running low. A smart Hacker can exploit these systems, your state-of-the-art camera systems? Don’t have them
but has to work within his limitations; you could use the connected to the Internet! This is where your Grifters,
networked fridge to get your Mark to take a detour to the Hitters, and Thieves come in: they get you access, either
grocery store, but even the greatest Hackers in the world in person or by hooking up a remote connection.
can’t use that fridge to listen in to a private conversation You’ll also need the rest of your Crew if you want to
unless they could plant a bug in person. Sometimes delete all of your Mark’s backup files; almost any company
you can get creative, and with a spot of tinkering turn a with a shred of common sense will have backups of their
speaker into a microphone, for example, but no amount valuable data in an off-line format. These can be on tapes
of code is going to turn that little sensor that turns on or disks stored in a water- and fire-proof safe, often in
the light when you open the door into a listening device. a separate location to their main systems. Restoring the
Hollywood likes to gloss over these details, especially data from these files isn’t quick or easy, but it’s a small
when it comes to making things explode. In the movies, price to pay to ensure that a computer malfunction,
Hackers can explode gas lines and drop electrical cables virus, or malicious user doesn’t obliterate your valuable
on people, all from the safety of their home computers. research data.
This is pure fantasy, using “features” that wouldn’t or

Universal Adapters
If you’ve ever worked with video or audio files, you’ve their hair out. Trying to get old programs to run on
probably needed to have a specific media player to play modern computers can be difficult even if they were
them, and trying to convert them to use on another designed for a previous version of your operating system;
system or program can often be complex enough to have some websites don’t even work if you’re not using the
even the most serene Hackers on the verge of tearing browser they designed it for. So why is anything remotely

2 Hollywood Hacking
vs. the Real World
technological perfectly and immediately compatible with suggestions. A common design structure is ideal, but it
every other system in movies? You never see the hero may be too costly, too time consuming, or simply beyond
rummaging in a desk drawer to find that old connection the capability of some companies. If they already have an
lead with that funny shaped attachment or encountering extensive catalog of software made before the standards
an “unrecognized format” error when they open the files were published, they probably have their own rules.
recovered from the villain’s lair. Change would mean teaching coders the new standards
That kind of compatibility would be great, and think and potentially redesigning their entire product line.
tanks of top professionals do exist to draft technical Also, some companies prefer that their software is only
standards with the aim of maintaining consistency across compatible with their systems, so their customers can’t
the industry, but these are little more than guidelines and easily switch to their competitors.

Graphical
Misrepresentation
There are more than a few Hackers who treat hacking words from English, but with a rigid structure and a much
like a big computer game, but there are far more movies smaller vocabulary. You better phrase your commands
that show hacking as if it actually were a computer the way the computer expects, or you’ll be running up
game. Even when it is taken seriously, they show against nothing more productive than an “UNKNOWN
strange interfaces with complex three-dimensional COMMAND ERROR” with every line entered.
shapes pinging about the screen, representing data and This isn’t to say that work on natural language
systems. Thing is, a Graphical User Interface (or GUI— processing isn’t coming along; it would be a powerful
sometimes pronounced “gooey”), is meant for end users, tool in making human-computer interaction more
the customers, so they can make sense of and interact accessible. We’re still some way off from having a natural
with something friendlier than streams of code. Even conversation with our workstations—even further off
though some of these systems do exist, most Hackers from perfect voice recognition—but even once those
prefer using a text-based command line; those flashy goals have been met, a lot of Hackers will prefer the old-
graphics are just a distraction. fashioned methods. Part of this is the pride of possessing
When they are using a text-based interface, what they the skills of a “lost” art, another part is precision (machine
won’t be doing is typing plain English sentences telling code isn’t as subjective as language), but probably the
the computer to launch their hacks. Programming most significant reason is speed. It was raised in Hitters,
languages and computer commands are based on human Hackers, and Thieves that good Hackers tend to be lazy
language (some more so than others), but English and impatient; if the option is between a complex but
sentence structure is too complex for a computer to brief sequence of keys against taking the time to type
understand all of its intricacies, inconsistencies and a full English sentence, that Hacker will be committing
exceptions. Computers have their own languages, using those keystrokes to memory.

The Silver Smokescreen 3


Keeping Tabs
Computers are often portrayed with their systems laid Computers don’t really work this way; with the correct
out like a map, forcing you to go to a specific module to interface, you can issue commands to different systems
interact with it, taking up the entire screen in the process, or even another computer from a single command
and then having to pull back out to work with anything line. And just as you can multitask writing your sales
else. When accessing a network of computers, you may reports and playing a game of solitaire by hopping
have to “hop” from workstation to workstation in a between different tabs on your computer, so too can an
chain before reaching the central server. Screenwriters experienced Hacker use multiple terminals to track and
probably do this because operating systems visually interact with many processes simultaneously.
separate out applications and systems, but again, this is
to make it easier for the average user to understand.

4 Hollywood Hacking
vs. the Real World
Game Theory
Computer security measures aren’t going to give talking” when tracing a phone call; that’s a throwback
Hackers a fair chance; if the scanner monitoring a to manual switchboards, eliminated when they moved
network knows you’re trying to gain unauthorized to electronic switching mechanisms. Despite this, even
access, it’s going to cut you off right there and then. It movies and shows set after the changeover in the 1980s
won’t be challenging you to a game and then throwing use this narrative device.
its hands up if you win, saying: “Okay, I know you’re If you’ve ever played Hangman or Mastermind, you
breaking the law and hacking my database, but you’re so know they are lousy ways to protect a password, yet this
good at this game, I’m just going to let it slide and not appears to be the most popular method in the movies.
even bother mentioning it to the authorities.” The scenes usually are trying to represent brute-forcing
And the ticking clock showing how long it will take (attempting every possible combination in sequence
for the security system to track you down and freeze you until you come to the correct one), which is like trying all
out? Doesn’t exist. Your access can easily be terminated one thousand combinations to open one of those three-
on the other end, and your details were already logged digit briefcase combination locks. In films, a brute-force
somewhere the moment you started up your connection crack identifies the password one character at a time, but
and will persist even after you log off. Your only having a password system like that would be ridiculously
countdown is the time it takes the authorities to get a weak; if briefcase locks worked like this, it would only
warrant. That’s also why you don’t need to “keep them take thirty attempts to break in, instead of a thousand.

Enhanced Imagination
Someone once said “computers are incredibly fast, or even a person’s eye, and some can even rotate the view
accurate, and stupid; humans are incredibly slow, or remove objects from an image, making previously
inaccurate, and brilliant,” which is why it’s a lot easier to obscured details, such as a number plate, now visible.
fool people: computers have no imagination. A human Why is this impossible? You have to remember that
brain can make a creative, intuitive leap and see the any computer image is essentially a mosaic of squares
vase in the space between two silhouetted faces, but to a known as pixels. Particularly high-resolution images
computer, it will remain as dark shapes. have lots of pixels, but at some level of zoom, any image
We see this all the time in fiction: computers making is no more than a large series of colored blocks. While
imaginative leaps to impossible conclusions, when the complex calculations may be able to extrapolate some
best you can really hope for is a range of possibilities and guesses, the results are far from perfect. If a car number
their probabilities. The biggest offenders are in police plate is less than a pixel wide in your image, not even
procedural shows, where detectives run a photo or video the processing power of the greatest supercomputer in
feed through an enhancement program to produce a the world can accurately determine those letters and
sharp and clear result. These programs are so good that numbers.
they can pull an image from a reflection in a car window

The Silver Smokescreen 5


Trust the Computer
Hollywood hacking not only changes data on hard some details without referring to their phone’s contacts.
drives, but also inside the human brain! At least, that Computer errors do happen and when they don’t tally
would explain why some characters blindly follow a with expectations and memory, people question the data
compromised system instead of trusting their own provided; military personnel aren’t going to just start
common sense. Even if every trace of your identity were shooting because their computer told them to, and your
changed through the Internet, physical paper trails of family doctor isn’t going to forget everything about you
birth certificates and passports would still exist to raise just because you’re not in the database records.
questions, not to mention people would remember at least

Accidental Intelligence
Despite many brilliant minds struggling to your drone hit by a stray lightning bolt. If it were as
reproduce the intelligence of very simplistic creatures, simple as teaching a computer the importance of self-
screenwriters seem to think that creating a full-blown preservation, computer games would have likely given
artificial intelligence is no harder than accidentally rise to scores of technological life forms by this point.
giving a computer an off-hand instruction or having

Code Interrupts
When it comes to slinging code, any real world Hacker takes time. Writing a program is equal parts science
that claims to be perfect is either lying or a robot. On the and art, and just as novelists don’t have a masterpiece
other hand, Hollywood programmers can sit down at a flow out of their fingers in a continuous stream as soon
computer, fingers flying over the keyboard, and produce as they sit at a typewriter, so too will a programmer
an elegant application that works perfectly the first time, have to pause for thought, check reference sources,
no dry run needed. Many even manage all this without and sometimes reconsider and delete lines of code. Of
ever needing to use the spacebar or enter key! course, any Hackers worth their screen names are going
Coders in the real world spend about half of their to have done most of the grunt work in advance, having
time on testing and debugging their software because it a library of pre-written and pre-tested functions to call
can easily take as long as writing the code in the first on so only minimal tweaking is required.
place. Even if it weren’t for the debugging, coding itself

6 Hollywood Hacking
vs. the Real World
Interpreting
Scripts
Hollywood’s ultimate aim is to entertain, sure, but there
are reasons behind these inaccuracies, and we’ve included
explanations why some occur so frequently. Understanding
why Hollywood misrepresents the Hackers’ art can help
you to decide on how you’ll portray it for your Crew in the
Leverage Roleplaying Game.
Null Data
As with any Crew, scriptwriters are likely to stumble There may be a temptation to assign the Hacker roles
if they don’t do sufficient research. And like with a to the most technologically literate players, but this is
poorly researched Job, coming up against those who something they need to decide on for themselves, as they
have done their homework is probably going to lead to may want to take a break from their “day job” or explore
embarrassment. In movies, this crops up as “techobabble,” a character very different from themselves.
collections of technical terms that may sound impressive Whichever Role they take, how much do the less
to the uninitiated, but don’t make a lick of sense to technically inclined members of the group wish to hear
anyone with knowledge of that field. The writer may about the “sciencey bits”? A Leverage game can be a
have searched for appropriate terminology but didn’t good way to pass on some pointers regarding digital
make sure the words worked together in a sentence. security and Internet safety, but most players won’t
You’re only really going to run into trouble when want to repeatedly pause for a lecture on the history of
someone knows enough about the subject to be able to encryption or be badgered about the need for secure
question you. A trained surgeon may roll their eyes at the passwords each game session.
terminology in a medical drama, but for the rest of us, it’s How technically inclined is your Fixer? If the answer
just a way of getting from one part of the drama to the is “not very” and you have players who need a very
next. Hollywood will potentially have millions of pairs realistic Hacker role, it may seem that your Fixer is going
of eyes and ears scrutinizing their scripts after release, to have to avoid detailing the computer systems in the
but at your table, you only need to worry about a half a Job or else commit to a doing a lot of research before
dozen or so. If no one on your Crew knows their ASCII the game. Another options is to pass the task of defining
from their LIFO, it doesn’t really matter whether or not technical details to the player; let them define traits for
all your jargon makes sense, as long as it sounds right. the security systems and sound them out for suggestions
When you do have someone with some technical when Complications arise.
knowledge in the group, how concerned are they about A final word on portraying technophile/technophobe
technical errors and inaccuracies? Some people are comedy team-ups: they usually work best when
willing to overlook all the “bad science” and don’t bother both parties have sufficient knowledge of computers.
critically analyzing the technical elements; for others, It becomes much easier portraying an issue of
spotting glaring mistakes completely takes them out of miscommunication when the players are on the same
the moment. Even if people are willing to give a movie page, even though their Crewmembers are not. Most
a free pass, they may have issues doing the same when importantly, it helps avoid hurt feelings and bruised
they are providing part of the creative input, such as in a egos; if your friends just don’t grok the digital world the
roleplaying game. way you do, they might not appreciate being the butt of
such jokes while relaxing at the gaming table.

8 Hollywood Hacking
vs. the Real World
Communication Relay
If you’ve ever seen your Crew’s eyes glaze over during of what you would realistically see a Hacker do isn’t
your tutorial on how to use your latest unbelievably cool very visual, so the options available to a scriptwriter
gadget, you’ll know that it’s not always an easy task to are to have a character give an infodump as a running
share information with the less technically savvy. You commentary, or use a visual allegory to explain what’s
probably shouldn’t stop your game for a full-blown going on. This leads to the flashy graphic interfaces;
lecture to get everyone up-to-speed and the same holds while a good Hacker may know you just need to tailor
just as true in movies and television. Imagine if you had your search queries and pipe functions to filter down
to audit a physics class before you were allowed to see a directory listing to find a specific file, everyone can
the latest sci-fi blockbuster: not fun. Well, at least not by understand searching through a three-dimensional
everyone’s definition of “fun.” cityscape representing that data.
Hollywood has a few tricks to explain to the audience Chances are, you aren’t going to have the time or
what they need to know, but by far the clumsiest method equipment to make swish CGI montages to represent
is the “infodump,” when the script comes dangerously your hacking in your home games, so your allegories
close to being just like one of those dull lectures. The need to be verbal. Consider real world analogs to the
worst cases have one character explaining the details to a process you’re describing: “DNS acts like a phone book
second, even when it’s obvious both parties know all the for the internet,” or “DDoS attacks are like flooding
information. a telephone switchboard with crank calls so the real
It can be tricky to determine how computer savvy any ones can’t get through.” As a rule of thumb, if you can’t
large audience will, but you can expect a wide range of summarize the concept in a few short sentences, your
experience in any substantially sized group, so anything best bet is probably to avoid explanations altogether and
technical is probably going to need explaining to at least just jump to the end results.
some of your audience. As we’ve already covered, a lot

Interpreting Scripts 9
Regular Expressions
Some scenes appear so frequently that they have flash every failed match on the monitor, but doing so
become ingrained in our consciousness; so much so reassures the user that the computer is busy working on
that we have a stronger belief in the fiction than we the problem; people may even perceive the slower search
do in the reality. Many people expect Hackers to crack as taking less time as a result. The same theory applies to
any computer within a minute of sitting down at the progress bars and time estimates, despite the frequently
keyboard, despite the fact that their own laptops take inaccurate results.
that long just to boot up! When Hackers do manage such These expectations can be a burden on the designers
a feat, it’s because they’ve taken the time to do lots of of real software and systems, but for screenwriters they
preparation and research, and ensured they have all the give a handy shorthand. Similarly, you can take advantage
right tools. Either that or the Marks kept their passwords of these set pieces to describe a situation to your gaming
on sticky-notes in their desk drawers. group; they may not understand your explanation of a
Real systems may sacrifice efficiency to meet the brute-force hack, but describing the flashing of every
expectations of their users. A database search of a possible code rotating by on the screen is much more
fingerprint would be much faster if it didn’t briefly familiar territory.

10 Hollywood Hacking
vs. the Real World
Progress Bar
You don’t get to be the one of best Hackers in the to take the time to reflect on the errors after everything’s
field without having been on the wrong end of a police been wrapped up so you can try and avoid similar
investigation or two, so you probably don’t need to missteps derailing future Jobs.
be told that real police work doesn’t quite match up Sometimes, the plot demands that the vital clue not
to what you’ll see in police and forensic procedurals. arrive too early, otherwise the story would be done
That’s because the long waits for lab reports, the need before the first ad break; this can be explained away as the
to double-check and verify findings, and the frequent computer needing time to process the data, decrypt the
inconclusive results that are likely to occur in the real file, or search the database. There may even be mention
world don’t make for thrilling television. As with any of a backlog of work in the lab, as a nod to realism or
drama, the plot should progress forwards with every to justify why it’s taking longer this particular episode.
scene, and that usually means that a new piece of the These delays just happen to be precisely the right amount
puzzle is uncovered at every step and dead-end avenues of time to exhaust every other avenue of pursuit and give
of investigation won’t be shown unless they provide the break in the case in the penultimate or final act. In
interesting or amusing diversions. situations where there’s a deadline, it can ratchet up the
It’s a similar situation with a Leverage Crew: you’re tension, complete with ticking clock displayed on the
all at the very peak of your professions, so the question screen.
of whether you can is usually less important than what The behind-the-scenes reasoning for this will often
happens when you do. It may seem like it solely falls be that not having investigated the clue early would
to your Fixer to ensure that everything flows from one have been too much an oversight to justify, but also that
scene into the next, with the occasional interesting the resolution would be immediately apparent if all the
Complication throwing a spanner in the works, but the information had been received straight away. In such
whole table should work toward the goal of a smooth situations, it could be that an early Complication has
and enjoyable game. It’s also important to keep an eye been standing in the way of knowing the full story and
on the Complications that crop up; they make the Job only when it is later resolved will the twist be revealed.
interesting, but shouldn’t be allowed to bring the whole For a crafty Mastermind the delay may have been part of
operation screeching to a halt. When and if that does the plan the whole time, as they’ll no doubt explain with
happen, it’s vital to remove the obstruction and get a quick flashback.
everything rolling again as soon as possible; remember

Interpreting Scripts 11
Cool Running
These days, almost everyone loves their stylish and of impossibly cool set pieces will lighten the tone of
flashy gadgets. Hackers and Hollywood both twigged to the final product, but too many may result in out-right
this early, and both have their huge range of “toys”—in comedy.
the case of Hollywood, both in front of and behind the Neither extreme, nor any given point on the axis
camera. Sometimes for Hollywood’s on-screen gadgets, between “cool” and “realistic,” is the “correct” way. It’s
no one truly believes such technological marvels could important that your Crew and Fixer agree on your play
really exist, but we’re willing to suspend our disbelief style. If one of your players pictures the Job as a gritty
to enjoy the suave secret agent escaping the elaborate crime drama, they are going to be put out if you whip
deathtrap with clever use of a laser-firing fountain pen. up a functioning laser sword for your Hitter to use. As
Sometimes, the “Rule of Cool” trumps reality. you’re playing the Leverage Roleplaying Game, players
How far you can push the Rule of Cool depends on familiar with the show are probably going expect a
the tone of your fictional world; “action adventure” is similar tone—fairly light-hearted fun, a touch of comedy,
more lenient when it comes to throwing out the reality with a strong grounding in reality—but don’t make too
rulebook than a historical drama. Frequent application many assumptions without asking.

Mini Game
We’ve mostly discussed hacking as seen in film and For your own games of Leverage, feel free to go
television, but there are two other areas where you often with whatever works best for your group, be that a
see these concepts raise their heads: in computer games perfect simulation of technical principles or knowingly
and roleplaying games. In addition to the reasons listed disregarding every notion of realism. Everyone should
above, games that include an element of hacking will try be at the game table to have fun, just as they would when
to make it fun and interesting for the player, and might going to see a movie; so as long as that’s happening,
not share more than a passing nod to reality as a result. you’re well on your way to stealing the magic of the silver
screen.

12 Hollywood Hacking
vs. the Real World
New Talents
These new Talents can add a little Hollywood flair to your
hacking scenes. And they’re not even all for Hackers.
As Seen On TV Role: Hacker
Activation: You are making the last roll in a Timed
You’ve spent countless hours watching every movie Action that includes your Hacker die and only a
featuring hacking and every show with a computer in single beat remains.
it; less so for the entertainment and more to understand Effect: You may keep three dice for your result, but
how the media portrays technology. You know that you do not receive Plot Points for any Complications
even the most knowledgeable person can be influenced from the roll.
by what they watch, and you make sure you’re ready to
capitalize on those mistakes. Here’s One I Compiled
Earlier
Role: Mastermind
Activation: You’re involved in a Contested Action
relating to computers or technology and the Fixer Whether or not you were a Boy Scout, you took the
rolls an Opportunity. “Be Prepared” motto to heart, at least when it comes to
Effect: Add a d6 to your roll for the remainder of the software. You have libraries full of subroutines and data
Action. If you describe a mistake your opposition drives packed with applications you have written to
made, step it up to a d8. cover just about every conceivable situation.
Role: Hacker
Babble Baffles Brains Activation: You trigger a Flashback to reveal a time
Sometimes you don’t have to be able to walk the consuming technical process that you have already
walk, as long as you can talk the talk. You’re an expert at completed or put into motion.
confusing people with a string of jargon and acronyms, Effect: Add your Vitality die to your roll and include
or giving the appearance of being more proficient than one more die in the result. If you are already using
you really are by using appropriate technical terminology. your Vitality die, add a d8.

Welcome to My
Role: Grifter
Activation: You are unsuccessful in a Face Action
where you are playing the part of a professional in a Virtual World
technical field.
You know the average user won’t be able to grasp the
Effect: You may reroll your attempt at the Face Action,
technical details like you can, so you spend a lot of time
this time including your Hacker die.
crafting foolproof user interfaces so simple that even a

I Was Going Slow For chimp could use them. Or your Hitter.
Role: Hacker
Your Benefit Activation: Another Crewmember uses an Asset that
The hack is taking too long and it seems certain represents a gadget, computer, or program supplied
that you’re about to be discovered in the midst of your by you.
illicit activity, but in the final seconds you point out that Effect: The Crewmember may roll your Hacker die
you were taking your time to lecture your Crew on the instead of the Asset die.
finer points of your craft; you could have had this thing
cracked ages ago if you had been so inclined.

14 Hollywood Hacking
vs. the Real World
Credits
Writing: Photography:
Craig Payne Page i: Hardison infiltrates the airport’s Control Tower © 2011
Leverage 4 Holdings, Inc. All Rights Reserved.
Page 1: Hardison working his magic from inside Lucille. © 2011
Editing: Leverage 4 Holdings, Inc. All Rights Reserved.
Sally Christensen Page 4: Parker and Nate infiltrating the Department of Defense.
© 2010 Leverage 3 Holdings, Inc. All Rights Reserved.
Development: Page 7: Hardison is hacking history. © 2010 Leverage 3 Holdings,
Cam Banks Inc. All Rights Reserved.
Page 9: Parker goes undercover. © 2010 Leverage 3 Holdings, Inc.
All Rights Reserved.
Layout & Production:
Page 10: Nate and Hardison find an improbable ally in Trevor, a
Daniel Solis kid on the field trip Nate and Parker hijacked. © 2011
Leverage 4 Holdings, Inc. All Rights Reserved.
Based on the LEVERAGE Roleplaying Game by Cam Banks, Page 11: Working with Chaos proves even more difficult than
Hardison expected. © 2011 Leverage 4 Holdings, Inc. All
Rob Donoghue, and Clark Valentine with Tiara Lynn Agresta,
Rights Reserved.
Matt Forbeck, Stephanie Ford, Laura Anne Gilman, Fred Hicks,
Page 13: Elliot and Hardison look over the map. © 2010 Leverage
and Ryan Macklin 3 Holdings, Inc. All Rights Reserved.

M A R G A R E T

WEIS
PRODUCTIONS, ltd.

Margaret Weis Productions, the Cortex System, Cortex Plus, and the Cortex Plus logo © 2012 Margaret Weis Productions, Ltd.
© Leverage Holdings, Inc. All Rights Reserved.
TNT logo and key art ™ & © Turner Network Television, A Time Warner Company. All Rights Reserved.

Potrebbero piacerti anche