Tech Tunnel Can't be too different from movin' rocks

1
Requires Seasoned
This Artifact allows you to issue commands to technological devices.
Used by Derek Boon, Created by Ravvie.
On Legendary Artifact Groundsarge's Striker.
(When activating this Effect, it is obvious you are interacting with the target. You must use this Artifact obviously when activating this Effect.)

Removing a small device from the handle of the pickaxe and touching it to the target, you begin interfacing with the device in a manner similar to Dig-Dug, poking around the inner workings to achieve the desired result.


Spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Brawn + Melee, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.

After successfully using this Effect, you may choose to add the target to your own personal "network." You may use this Effect on any target on your network at any range. You can have up to 3 targets on your network.

This Gift's Cost is capped at 2 and cannot be increased further.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Community Hack Gifts

Exert your Mind and spend 2 Actions to activate. Select a Computer within 20 feet. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

  • You can target yourself if you qualify as a valid target by the other requirements.

Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Can be used on Alien technology. You must use up 1 ounce of Nanite metal in order to activate this Effect. Roll Perception + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

If you know that an evil copy of you is somewhere out there, you have to find a way to defeat them without giving up on your ideals.

Exert your Mind and spend 30 seconds to trap a region of any shape that contains your current location and fits entirely within 20 feet. This trap lasts until triggered or disarmed. This Effect cannot be used unless the target is an Animate Computer. Roll Perception + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking.

The trap looks like a scratched or burnt sun pictogram. Only those who have seen this trap before can identify it as a trap. Anyone who is aware of the trap may intuitively avoid, trigger, or destroy it.

Any Computer that enters the chosen region will trigger the trap. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.

Every hack you make leaves behind A sun on a prominent display in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

You may only use this Effect once per day.

  • Multiple traps cannot be placed in the exact same location or be triggered by the same single Action. Nor can one trap triggering cause another to trigger.
  • Trap can only be spotted by someone who has witnessed this particular trap before, has been informed, or possesses relevant supernatural abilities. They must achieve an Outcome of 4 or higher on a Perception + Alertness roll to do so.
  • The area you choose where the trap can be triggered may be just a single location, similar to a tripwire or a pressure plate, or it can be a proximity trigger which hits anyone who comes within the specified range of the trap. This is defined by you when you place the trap and cannot be changed once the trap is placed.

I am energy incarnate. I am the ghost in the machine.

Increase your sacrificial Injury's Severity by 1 and spend 2 Actions. Select a Computer within 300 feet. Can be used on Alien technology. You must actively and obviously use rings to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.

Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see eyes start to glow and cables of my finers split open and energy like cables snake from my fingertips and the base of my head and down my spine and plug into the target..

After you finish activating this Effect, you cannot move quicker than a walk (max 15 feet per Round) for one minute and suffer a -1 dice penalty for an hour. Exhaustion’s penalty and duration stacks with multiple activations.

If you do not have a sacrificial Injury when you activate this Effect, take a new Severity-1 Injury.

  • When narrating disturbing content, be cognizant of your group's tone and accommodating to those who would like to "fast forward" through the description.
  • Exhaustion penalties and duration stack. If you activate this Effect or another Effect with Exhaustion, your penalty will worsen, and the duration is increased by one hour.
  • The sacrificial Injury received from activating this Effect cannot be prevented by any means or healed before 1 day has passed. It is shared with all Effects that use sacrifice. This Injury does not requires Stabilization or cause Battle Scars when it becomes Severe.
  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

"I am locked."

"Yes, but you *could* be unlocked."

-----------------------------------

It does require her to be able to focus properly and not distracted.

Spend 2 Actions. Select a Computer within arm's reach. Can be used on Alien technology. This Effect cannot be used unless you have no Body damage and your Mind is Agitated or better. Roll Charisma + Influence, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

This Effect is not obvious, and the only sign you are using an Effect is nose wiggling. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.

This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.

Possession of this Power grants the following Trauma at all times: More Thought than Form: Failing a limit roll causes a momentary crisis, and Minerva's form flickers. She takes a severity one from this.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Stock Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.