Waterproof, bulletproof, and as fireproof as anything in it's category can be the hardened reinforced steel laptop weighs in at a hefty 10 lbs, but it delivers performance beyond anything else in it's category. With hardware that makes a supercomputer blush, and a petabyte of ram any system you set this bad boy to cracking will be crying for it's mother by the end of a minute. Combine that with it's built in destroyer protocol and you'll find that the devices it targets are rendered completely unusable!
Exert your Mind and spend 2 Actions. Select a Device within 300 feet. Can be used on Alien technology. You must use up A laptop battery in order to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
Anyone who touches this Artifact will notice it warping their mind and may drop it. If they choose to hold or use it, they immediately receive the following Trauma: Conspiracy Nut: You believe any conspiracy theories told to you.. If they lose possession of this Artifact, the Trauma heals over the course of the next day.
Tam lets out a breath, staring into the blade. It was okay.
And then it presses in. It doesn't hurt - much - but it does, some...
Expend a point of Battery to activate. Select a Living target within arm's reach. Your target must make a Trauma roll when you activate this Effect. Over the course of one day, your patient must communicate with you and reveal at least one of their Traumas to you, including the details of those Traumas and the circumstances of how they were acquired. After the full treatment time has elapsed, roll Charisma + Melee at Difficulty 6.
Your target may Resist. If your treatment is successful, you may remove one of the patient's revealed Traumas without incurring any Experience cost.
Once per day per target, you may choose to use this Effect to stabilize the Mind of a target within arm's reach. Treatment takes 30 seconds but will not remove any Traumas. If you are successful, restore 2 Mind damage.
You may choose to use this Effect to temporarily relieve any number of the patient's Traumas (including mental Conditions). In this case, Treatment takes an Action and the effect lasts two hours. If the Patient is currently experiencing an episode, Difficulty is increased by 2.
Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see A blade pressing in the ocular canal, pressing into the brain. The target is left with a highly bloodshot eye.
....
Spend 1 minute. Select a Device within arm's reach. Can be used on Alien technology. This Effect cannot be used unless only works on vehicles. Roll Intellect + Drive, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
After successfully using this Effect, you may choose to add the target to your own personal "network." You may use this Effect on any target on your network at any range. You can have up to 3 targets on your network.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind and apple with a sunrise behind it in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 1.
In its active form, it resembles a Citari 725 - Feather Model Hunting Shotgun, a Twenty-Eight Inch Barrel Length with a Blued Finish, Built to be used with Twelve-Gauge Shells, and Wooden Stock Completing It. But differentiating this from any other Citari 725 was a length of script engraved alongside the outside of the barrel, its language foreign and beheld a slight blue glow.
This Artifact can be used as a shotgun. It is roughly the same size as a shotgun but can be collapsed into A dark-steel colored metal ring and concealed. Collapsing or expanding it costs a Quick Action.
Attack by rolling Dexterity + Firearms, Difficulty 6. Successful attacks deal Contested Outcome +5 Weapon Damage.
You also gain the following effects:
The visor has several visual sensors built into it.
You gain the following benefits as long as you are wearing this Artifact.
Your senses are enhanced in the following way.
Any senses which have been heightened cannot be overloaded. Battle Scars you receive cannot affect these senses.
A Veteran's jacket that seems to catch or deflect an incoming attack with a ghostly hand, protecting the last member of the 7th Reconnaissance Division for Royal Army Service, Spectre Company.
You gain the following benefits as long as you are wearing this Artifact.
You have 4 Armor, which reduces incoming Damage. Armor from multiple sources does not stack. Called Shots may circumvent your Armor, depending on its coverage.
Your Armor’s rating is increased by 2. If you Attack, Clash, or initiate a Contested roll, your Armor’s rating is decreased by 3 for one minute. This penalty does not stack with itself.
When Winter Fang's glittering string is drawn, an ice arrow crystalizes nocked and ready to fire. These ice arrows melt quickly after piercing their foes, leaving deadly wounds instead of evidence.
This Artifact can be used as a bow. It is roughly at least twice as large as a bow and cannot be concealed on your person or disassembled for storage.
Attack by rolling Dexterity + Athletics, Difficulty 6. Successful attacks deal Contested Outcome +3 Weapon Damage. Attacks do not require a successful called shot to do damage.
You also gain the following effects:
The Skeleton Key slips easily into any keyhole and turns without a fuss.
Spend an Action.
You may lock, unlock, and/or open any number of doors, containers, knots, or locks within arm's reach of you. Cannot be used on Alien technology.
If you successfully operate a lock, you may choose to destroy it, rendering it inoperable.
The spy can do up their passport to appear as any valid form of identification.
This Artifact can change its appearance. When not transformed, it is roughly the same size as a passport but can be collapsed into a wallet and concealed. Collapsing or expanding it costs a Quick Action.
Spend a Quick Action to activate. This Artifact changes its appearance into a chosen Object. This lasts until you decide to end the Effect, which may be done as a Free Action.
The new object's appearance can mimic specific items (such as a particular painting, a certain person’s ID, etc), but must be of a similar size and weight to this Artifact.
The new appearance is illusory; it will hold up to scrutiny, but its composition is not altered and it gains no new functionality. Any attempt to use it for a function which it cannot perform (for instance, making bread look like a knife and then trying to stab someone) will cause the illusion to fail or allow a Perception check to see through the illusion, at the GM's discretion.
When used as identification and scanned, the scanner will act appropriately and bring up appropriate generic information. Further searches for the identity in the computer will turn up no results. This will not open security doors on its own.
Companions gawk at the sheer size and quantity of the equipment the survivalist stores in the Bug-out Bag, but when they open it, they find only a standard set of survival gear. Only when the survivalist opens it is its true capacity revealed.
This Artifact holds 5 times what it normally could inside of it. Objects stored inside are weightless.
Living things can be stored in this Artifact. They will have access to anything else inside and may attempt to break free, damaging or destroying the Artifact in the process.
If this Artifact is destroyed, things inside may get out, and it will cease to function until it is repaired.
When scanned or investigated without opening, the contents of this container appear normal and unremarkable.
If anyone other than you opens the container, it appears empty. Others can still destroy it to get at the contents.
"The Coffin" can only be used to store things commonly found in coffins, such as bodies, clothes, jewelry, photos, weapons, coins, and similar.
This Artifact holds 5 times what it normally could inside of it. Objects stored inside are weightless. Unless you are storing something commonly found in coffins, this Artifact behaves as its mundane counterpart. This Effect cannot be used unless you are storing something commonly found in coffins.
Living things can be stored in this Artifact. They will have access to anything else inside and may attempt to break free, damaging or destroying the Artifact in the process.
If this Artifact is destroyed, things inside may get out, and it will cease to function until it is repaired.
When scanned or investigated without opening, the contents of this container appear normal and unremarkable.
On a Downtime, you may change this Artifact from one type of container to another. Maximum once per Downtime.
If anyone other than you opens the container, it appears empty. Others can still destroy it to get at the contents.