Robot cookie
Spend 1 minute and use up this Robot cookie from gru. Select a Computer within 20 feet. Does not work on Alien technology. Roll 7 dice Difficulty 6, dice penalties do not apply. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is cookie crumbs. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. They scrub the system of footprints, leaving no trace behind.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you experience a S-4 injury as the device explodes. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
The next in Louis's foray into computer science is a little cartridge for his SEAL units. Simply retrieve one from your pack, and slam it into the machine and it'll perform an automated hack of the targeted device! Though fingers that are too fast may find themselves encountering a slight bug, as mashing the input as you input the cartridge has been known to cause the device to encounter a null error and hack itself, but, we promise we're working on that!
Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you disable the artifact for a downtime as it hacks itself.. Roll Dexterity + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Every hack you make leaves behind A gif of a seal clapping and arfing. in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
S0L scratches or burns something that looks like a small sun into a surface, but is actually a complex set of instructions in insanely small symbols. A complete system override for any robot or "living computer" not prepared to look at it.
Once the trap triggers, S0L is connected to the victim and may even make their circuits overheat and their bodies burn.
Anyone checking the system afterwards will find an ASCII sun prominently "burnt" into the code.
If you know that an evil copy of you is somewhere out there, you have to find a way to defeat them without giving up on your ideals.
Exert your Mind and spend 30 seconds to trap a region of any shape that contains your current location and fits entirely within 20 feet. This trap lasts until triggered or disarmed. This Effect cannot be used unless the target is an Animate Computer. Roll Perception + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking.
The trap looks like a scratched or burnt sun pictogram. Only those who have seen this trap before can identify it as a trap. Anyone who is aware of the trap may intuitively avoid, trigger, or destroy it.
Any Computer that enters the chosen region will trigger the trap. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
Every hack you make leaves behind A sun on a prominent display in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
You may only use this Effect once per day.
.
Exert your Mind and spend 1 minute. Select a Computer within 300 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Every hack you make leaves behind Flashdrive icon in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
Chip pulls out his laptop, cracks his knuckles and flicks his collar up.
He clicks 'Hacking.exe' (And can quickly code the 3 lines of script that somehow make the software work in moments if it doesn't exist yet)
The screen goes black, with technicolor symbols flickering down from the top of the screen (A la The MATRIX), forming a first person view similiar to a game. He controls the view by typing seemingly nonsensical code at a blistering speed. It often portrays metaphorical version of the hack (stealing files might be entering a ghostly/matrixy version of reality and finding the golden orb, turning on a TV is walking into a room and picking up the remote control, etc)
Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. You must actively and obviously use laptop to activate this Effect. Roll Dexterity + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.