Whilst wearing the glove, the glove will glow with what seems to be line of electrical circuit from it connecting to the object being hacked.
Upon activation. Nanites with pre-inputted program floods the machinery, executing the order
Expend a point of Battery and spend 2 Actions to activate. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously.
Every hack you make leaves behind A Clown taunting in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
Minerva wiggles her nose absentmindedly as she finds her target in the Dreamlands. Once she does, she slips into its Dream - for all things have Dreams - even objects. Once inside of its dream, she can talk with it, persuading it to behave as she desires.
"I am locked."
"Yes, but you *could* be unlocked."
-----------------------------------
It does require her to be able to focus properly and not distracted.
Spend 1 minute. Select a Computer within arm's reach. Can be used on Alien technology. This Effect cannot be used unless you have no Body damage and your Mind is Agitated or better. Roll Charisma + Influence, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is nose wiggling. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
This Gift's Cost is capped at 2 and cannot be increased further.
Mandy has attended college in Dortmund Germany and majored in computer science. She knows how to hack machines with any smartphone quickly enough to be able to bypass most firewalls or defenses.
Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. This Effect cannot be used unless the target is capable of connecting via bluetooth. You must actively and obviously use a smartphone to activate this Effect. Roll Dexterity + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
You may only use this Effect once per day.
Tam starts to tap her fingers against her side, a soft smile on her face as she looks away a little. This was just another kind of sparring - and she was good at that.
A manifestation of Tam's telekinetic abilities, Tam has learned to manipulate the internals of electronics.
Spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. You must make a Trauma roll when you use this Effect. Its Difficulty cannot be reduced by any means. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is fingers tapping against your side. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
This Gift's Cost is capped at 2 and cannot be increased further.
Possession of this Power grants the following Battle Scar: Atrophied Shoulder - One of your shoulders is damaged. Whenever it takes a major blow or is otherwise put under stress the GM may dislocate it. A dislocated limb cannot be used until you Exert your Mind and spend an Action to reset it.
Paul brings the TTT close to the device he wishes to command, and says what he would like the device to do.
Spend 1 Action. Select a Device within arm's reach. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind the 4-chan symbol in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
This Gift's Cost is capped at 2 and cannot be increased further.
"With holy light the world is revealed and those that want to transcend now may look upon the sacred rite and now my succumb the the dark and see the truth" (Uckerberg, 10)
Jer is able to effect technology with the chip in his head that has disfigured him the chip is pronounced on his head. He stares at the technology and through infrared and blue-tooth technology he is able to unlock it.
Spend 1 minute to activate. Select a Computer within arm's reach. Does not work on Alien technology. You must actively and obviously use Eye ball implant to activate this Effect. Roll Charisma + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
This Gift's level is capped at 2 Gifts and cannot be increased further.
Possession of this Power grants the following Battle Scar: Left eye with green veins.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.