Laz releases a small number of nanites while swiping or scanning a security card twice. They infiltrate the system through the reader and alter the credential database that the system uses, registering the car he swiped as a valid user of chosen security clearance, and hiding their interference from system logs and firewalls.
Spend 2 Actions. Select a Computer within arm's reach. Does not work on Alien technology. This Effect cannot be used unless the only command you give the system is to grant the card used as your focus security permissions of some level within the system. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you corrupt the card used as your focus so badly that it can never be read or used again (either for its mundane purpose or as a focus). You must actively and obviously use a security card to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
This Gift's Cost is capped at 2 and cannot be increased further.
J's eyes turn blue as he starts interacting with the computer, as he touches the machine and electricity sparks around where his hand makes contact.
Exert your Mind and spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
When Corey goes up to touch the lock or computer he seems to know his way around the security and he’s able to access anything that he touches. His hand glow an iridescent blue and then you see the silenced pistol on the screen after he has gotten what he needs.
Spend 1 minute. Select a Device within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind Shows a picture of a silenced pistol in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
This Gift's Cost is capped at 2 and cannot be increased further.
Due to the users cybernetic enhancements they are able to glean information from technology without physically interacting with it
Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is The user’s pupil will have subtle red hue to it. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
Every hack you make leaves behind A skeleton wearing business attire being shot in a kneeling position in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
After you finish activating this Effect, you cannot move quicker than a walk (max 15 feet per Round) for one minute and suffer a -1 dice penalty for an hour. Exhaustion’s penalty and duration stacks with multiple activations.
Kurt seems to laugh to themselves immediately before something out of the ordinary happens, a computer is unlocked, the camera turns off due to an unexplained power outage at just the right time.
Exert your Mind and spend 2 Actions. Select a Device within 300 feet. Can be used on Alien technology. Roll Intellect + Crafts, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
This Effect is not obvious, and the only sign you are using an Effect is Kurt seems to laugh to themselves. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
Tam starts to tap her fingers against her side, a soft smile on her face as she looks away a little. This was just another kind of sparring - and she was good at that.
A manifestation of Tam's telekinetic abilities, Tam has learned to manipulate the internals of electronics.
Exert your Mind and spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. You must make a Trauma roll when you use this Effect. Its Difficulty cannot be reduced by any means. If you fail or Botch, you receive one Mind Damage and a new Trauma. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is fingers tapping against your side. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
Possession of this Power grants the following Battle Scar: Atrophied Shoulder - One of your shoulders is damaged. Whenever it takes a major blow or is otherwise put under stress the GM may dislocate it. A dislocated limb cannot be used until you Exert your Mind and spend an Action to reset it.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.