A golden Lotus pattern begins revolving in Amarjeet's eyes. After the Hack is completed, an identical pattern will be displayed somewhere on the UI of the affected device.
The Lotus III implant has been upgraded. Sophisticated decryption & code-breaking software is pre-loaded into the implant, optimized to synchronize with the end-user's conscious attempts to crack security systems. Capable of defeating the most sophisticated systems in moments, use of this feature causes the user's eyes to display the familiar Lotus Logo as a revolving pattern on the iris. Additionally, in what we consider to be a win for our marketing team, any device compromised by our software will display our Lotus Logo in system - all the better to alert potential clients of system vulnerabilities.
Operating the system linkage on a regular basis has been proven to damage the optic nerves: always use caution when operating prototype cybernetics.
Exert your Mind and spend 2 Actions to activate. Select a Computer within 20 feet. Does not work on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you Blindness. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Every hack you make leaves behind Lotus Logo in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
Owl touches a scar near her eye, looking at some device. After a bit, the connection is made, and her command is sent.
Owl had a great idea!
A way to interface with her computers and other devices without having that ability be tracked or stolen.
She didn’t think about all the consequences till halfway through the surgery.
Exert your Mind and spend 1 minute. Select a Computer within 300 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is Owl touches a scar near one of her eyes rubbing it some. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.
Possession of this Power grants the following Battle Scar: Implant scars: Owl has several large scars covering her face, particularly around her eyes. This increases the difficulty of social rolls by one..
Possession of this Power grants the following Trauma at all times: Technological Paranoia: You come across an active security system you don’t control, you must make a self control roll to not attempt to take it over..
Minerva wiggles her nose absentmindedly as she finds her target in the Dreamlands. Once she does, she slips into its Dream - for all things have Dreams - even objects. Once inside of its dream, she can talk with it, persuading it to behave as she desires.
"I am locked."
"Yes, but you *could* be unlocked."
-----------------------------------
It does require her to be able to focus properly and not distracted.
Spend 2 Actions. Select a Computer within arm's reach. Can be used on Alien technology. This Effect cannot be used unless you have no Body damage and your Mind is Agitated or better. Roll Charisma + Influence, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is nose wiggling. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.
Possession of this Power grants the following Trauma at all times: More Thought than Form: Failing a limit roll causes a momentary crisis, and Minerva's form flickers. She takes a severity one from this.
Twisting my ring the ring glows and I send out electrical signals/ energy cables directly interface with systems modern, alien, or organic. and take control.
I am energy incarnate. I am the ghost in the machine.
Increase your sacrificial Injury's Severity by 1 and spend 2 Actions. Select a Computer within 300 feet. Can be used on Alien technology. You must actively and obviously use rings to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see eyes start to glow and cables of my finers split open and energy like cables snake from my fingertips and the base of my head and down my spine and plug into the target..
After you finish activating this Effect, you cannot move quicker than a walk (max 15 feet per Round) for one minute and suffer a -1 dice penalty for an hour. Exhaustion’s penalty and duration stacks with multiple activations.
If you do not have a sacrificial Injury when you activate this Effect, take a new Severity-1 Injury.
A small silver ring with linked blue boxes engraved into it.
The user extends their hand towards the target. When they do thin tendrils extend from the ring and search for purchase on the wearer. The tendrils attach and start sucking small amounts of power from the user as they continue to crawl along their body before retreating after the hack is done.
The user's packaged will and commands are transmitted through the ring and then antenna tendrils towards the target.
Expend a point of Battery and spend 1 Action. Select a Device within 300 feet. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see Ring tendrils.
Anyone who touches this Artifact will notice it warping their mind and may drop it. If they choose to hold or use it, they immediately receive the following Trauma: Irrational anger and disrespect of people who have truly shoddy security setups.. If they lose possession of this Artifact, the Trauma heals over the course of the next day.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.