Psionic Circuit Smashing Hack targets subtly from a distance

1
The power to issue commands to technological devices.
Used by Watchdog, Created by Tanyatwohands.
(Activating this Effect is not obvious. The only sign you are using an Effect is staring at the target. )

Watchdog must directly contact the target with his eyes for one minute. At the end of the duration, he may psionically direct the target with a single command.


Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

This Effect is not obvious, and the only sign you are using an Effect is staring at the target. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.

After you finish activating this Effect, you cannot move quicker than a walk (max 15 feet per Round) for one minute and suffer a -1 dice penalty for an hour. Exhaustion’s penalty and duration stacks with multiple activations.

  • Exhaustion penalties and duration stack. If you activate this Effect or another Effect with Exhaustion, your penalty will worsen, and the duration is increased by one hour.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Community Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. This Effect cannot be used unless she covers her own eyes as her vision doubles while mentally delving into the software. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 1 minute. Select a Computer within 300 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Every hack you make leaves behind Flashdrive icon in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Increase your sacrificial Injury's Severity by 1 and spend 1 minute. Select a Device within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Every hack you make leaves behind Fractal Spiders crawl across the screen/device in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see You vomit a stream of fractal spiders onto the device.

If you do not have a sacrificial Injury when you activate this Effect, take a new Severity-1 Injury.

  • When narrating disturbing content, be cognizant of your group's tone and accommodating to those who would like to "fast forward" through the description.
  • The sacrificial Injury received from activating this Effect cannot be prevented by any means or healed before 1 day has passed. It is shared with all Effects that use sacrifice. This Injury does not requires Stabilization or cause Battle Scars when it becomes Severe.
  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

"The automated lensing systems seem absolutely shot. At least they're pointing forward-ish. It's a lot less handy, but I can effectively 'aim' them at the target. It's not entirely unlike aiming a gun, actually. The matter forge isn't working quite right either, but that's fine. Lith can just strip the electrons needed locally. I'd just rather they not be from me."

The cyberwarfare suite is controlled by an onboard AI, which Henry was very happy to finally get working. Even if they bicker some. For example, Lith will never admit failing a hack herself. It's just Henry moving his hand the wrong way while she was working. When he does hold his arm steady enough, though, Lith is able to read and write electron states directly in the device's memory. This permits her to influence the digital state of a device directly. By reflex, she ensures she won't be detected for the operation of the mission.

Spend 2 Actions. Select a Computer within 20 feet. Can be used on Alien technology. You must use up a small amount of zinc in order to activate this Effect. Roll Dexterity + Firearms, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.

This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 1.

Anyone who touches this Artifact will notice it warping their body and may drop it. If they choose to hold or use it, they immediately receive the following Battle Scar: Extensive Augmentation - Head - Your head has had extensive augmentation performed to it, and some tradeoffs had to be made. Take +2 damage from called shots to the head. If they lose possession of this Artifact, the Battle Scar heals over the course of the next day.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 2 Actions. Select a Device within arm's reach. Can be used on Alien technology. You must actively and obviously use a sticky note to activate this Effect. You must make a Trauma roll when you use this Effect. Its Difficulty cannot be reduced by any means. Roll Charisma + Influence, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Every hack you make leaves behind a sticky note in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Stock Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.