So I've been looking into DHD a bit lately, and why it seems that they don't work due to the order of operations, where an enemy forces you to declare Reset before you could declare any of the defensive programs. Basically, upon re-reading the rules for the Order Expenditure Sequence, then searching further in the rules, the only time the rules say that you check the requirements for declaring a skill is during the last part of the order, not at the time it is declared. Check the Important box here: http://infinitythewiki.com/en/Order_Expenditure_Sequence Now, the Zone of Control rules have explicit language about what skills you can declare, specifically only allowing Change Facing or Reset, unless the trooper has a Special Skill or piece of Equipment that can be used without LoF. This section of the rules would be entirely redundant if you couldn't declare an ARO before checking the requirements. Check the text here: http://infinitythewiki.com/en/Zone_of_Control Furthermore, to prevent complication, the BS Attack Declaration rules actually prevent you from declaring the skill without having previously generated LOF (These rules appear to be in addition to the rules found under the BS Attack skill, which has different requirements). Similar to the ZoC rules about AROs, these additional requirements seem redundant if you must check the skill requirements at the time of declaration. http://infinitythewiki.com/en/BS_Attack_Declaration Those three things make it seem like you can declare Breakwater (and other defensive programs) before you've been the target of an attack. If the enemy doesn't hack you, then you've essentially declared Idle, but if they do hack you, you can resolve the hacking program. I haven't found anything in the rules or FAQ that say you to check the requirements at any time other than when you apply the effects of the orders declared. This doesn't seem to have any effect on how other aspects of the game are played, since ZoC normally forces Change Face or Reset, it seems to only really affect defensive hacking programs.