Laz rubs his hand across the mag strip, contact patch, or security chip of a security card, depositing a small number of nanites on its surface, then swipes, inserts, or taps the card as appropriate for the reader, depositing them on the system. At his command, they infiltrate the system through the reader's connection and alter the credentials database that the system uses, registering the card he swiped as valid for the chosen security clearance. They remain in the system for a time, staying a step ahead of detection or reversal countermeasures, but eventually will "die" off, leaving their actions vulnerable to detection and reversal.
Spend 2 Actions. Select a Computer within arm's reach. Does not work on Alien technology. This Effect cannot be used unless the only command you give the system is to grant the card used as your focus security permissions of some level within the system. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you corrupt the card used as your focus so badly that it can never be read or used again (either for its mundane purpose or as a focus). You must actively and obviously use a security card to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
This Gift's Cost is capped at 2 and cannot be increased further.
Mandy has attended college in Dortmund Germany and majored in computer science. She knows how to hack machines with any smartphone quickly enough to be able to bypass most firewalls or defenses.
Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. This Effect cannot be used unless the target is capable of connecting via bluetooth. You must actively and obviously use a smartphone to activate this Effect. Roll Dexterity + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
You may only use this Effect once per day.
Owl touches a scar near her eye, looking at some device. After a bit, the connection is made, and her command is sent.
Owl had a great idea!
A way to interface with her computers and other devices without having that ability be tracked or stolen.
She didn’t think about all the consequences till halfway through the surgery.
Exert your Mind and spend 1 minute. Select a Computer within 300 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is Owl touches a scar near one of her eyes rubbing it some. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.
Possession of this Power grants the following Battle Scar: Implant scars: Owl has several large scars covering her face, particularly around her eyes. This increases the difficulty of social rolls by one..
Possession of this Power grants the following Trauma at all times: Technological Paranoia: You come across an active security system you don’t control, you must make a self control roll to not attempt to take it over..
J's eyes turn blue as he starts interacting with the computer, as he touches the machine and electricity sparks around where his hand makes contact.
Exert your Mind and spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Wren wraps a blindfold around her eyes and sends her mind to the target to which she wants to send the command.
Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. This Effect cannot be used unless she covers her own eyes as her vision doubles while mentally delving into the software. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Nik taps at his smartphone for a few moments. Faintly glowing lines resembling the traces of a circuit board flow over the ground to the targeted device. As they fade away, a satisfied smirk appears on their face.
Was that thing even on the network? Doesn't matter, they have access.
If it exists, it can be hacked. Nik believes that this maxim should be true for everything that exists, and this gift is their first step towards making that a reality.
Exert your Mind and spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. You must actively and obviously use smartphone to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.