Rei's innate technique, or Mahojutsu, allows them to channel their internal energies into other technological devices to manipulate them. They do so through by using jade as a conduit- which allows them to manifest their sorcery in the form of coursing electricity between the focus and target. This lightning continues to linger after the hack is completed, acting as a calling card and allowing them to access previously hacked machines as well.
Spend 1 minute. Select a Computer within 20 feet. Can be used on Alien technology. You must actively and obviously use a jade gemstone to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
After successfully using this Effect, you may choose to add the target to your own personal "network." You may use this Effect on any target on your network at any range. You can have up to 3 targets on your network.
Every hack you make leaves behind distorted lightning in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
This Gift's Cost is capped at 2 and cannot be increased further.
Possession of this Power grants the following Battle Scar: Exhaust Efficiency: Your body is highly optimized to sustain and release energy as necessary. Your voice modules are limited to only a whisper. After physical activity, steam and energy emits from your body and you suffer a -2 dice penalty on Stealth rolls.
J's eyes turn blue as he starts interacting with the computer, as he touches the machine and electricity sparks around where his hand makes contact.
Exert your Mind and spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
The Contractor would flip the back of the cellphone and pop the cover door open, revealing the slot for a good sized battery, that he just replaces with a new one. The door is closed as he would quickly boot it up and start to use it, the screen glowing yellow as it connects to the nearby device, the screen going dimmer and dimmer until finally the hack is complete.
Exert your Mind and spend 1 minute. Select a Device within 300 feet. Does not work on Alien technology. You must use up Batteries in order to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind Glowing Yellow Screen in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
Nik taps at his smartphone for a few moments. Faintly glowing lines resembling the traces of a circuit board flow over the ground to the targeted device. As they fade away, a satisfied smirk appears on their face.
Was that thing even on the network? Doesn't matter, they have access.
If it exists, it can be hacked. Nik believes that this maxim should be true for everything that exists, and this gift is their first step towards making that a reality.
Exert your Mind and spend 2 Actions. Select a Computer within 20 feet. Does not work on Alien technology. You must actively and obviously use smartphone to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Spend 2 Actions. Select a Device within arm's reach. Can be used on Alien technology. Roll Charisma + Occult, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind Holy Symbols in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 1.
Spark's eyes unfocus as they concentrate fully on the Flame, and start quickly sorting through the list of override codes command gave them, while connecting wirelessly to the device in question.
Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is unfocused eyes. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a warning pop-up that the system has been overriden and locked down on the order of C&C in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.