Using this power requires Oz to speak the commands to TORI. This can be done in her compact form if he speaks directly to her.
Exert your Mind and spend 2 Actions to activate. Select a Computer within 300 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
Tam starts to tap her fingers against her side, a soft smile on her face as she looks away a little. This was just another kind of sparring - and she was good at that.
A manifestation of Tam's telekinetic abilities, Tam has learned to manipulate the internals of electronics.
Spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. You must make a Trauma roll when you use this Effect. Its Difficulty cannot be reduced by any means. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is fingers tapping against your side. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
This Gift's Cost is capped at 2 and cannot be increased further.
Possession of this Power grants the following Battle Scar: Atrophied Shoulder - One of your shoulders is damaged. Whenever it takes a major blow or is otherwise put under stress the GM may dislocate it. A dislocated limb cannot be used until you Exert your Mind and spend an Action to reset it.
Watchdog must directly contact the target with his eyes for one minute. At the end of the duration, he may psionically direct the target with a single command.
Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is staring at the target. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
After you finish activating this Effect, you cannot move quicker than a walk (max 15 feet per Round) for one minute and suffer a -1 dice penalty for an hour. Exhaustion’s penalty and duration stacks with multiple activations.
Allister Reeves up his R.E.D Queen engine in his skull, overclocking it to allow it to make connections to the device. he then uses his mind scape (A Literal forge, anvil, and flowing lava in the shape of code and blueprints) to reforge the designs and intentions of the device to carry out his will.
Exert your Mind (unless Security device) and spend 1 Action. Select a Device within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is Revving engine. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
Possession of this Power grants the following Trauma at all times: Compulsion to Protect The Innocent: When faced with a new opportunity to act on your compulsion, you must succeed a Self-Control roll to resist..
The Contractor would flip the back of the cellphone and pop the cover door open, revealing the slot for a good sized battery, that he just replaces with a new one. The door is closed as he would quickly boot it up and start to use it, the screen glowing yellow as it connects to the nearby device, the screen going dimmer and dimmer until finally the hack is complete.
Exert your Mind and spend 1 minute. Select a Device within 300 feet. Does not work on Alien technology. You must use up Batteries in order to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind Glowing Yellow Screen in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
Spend 1 minute and use up this Robot cookie from gru. Select a Computer within 20 feet. Does not work on Alien technology. Roll 7 dice Difficulty 6, dice penalties do not apply. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is cookie crumbs. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.