This artifact is a plain, handheld cylinder, has a microphone on the top of it, and a transmitter on the bottom. When held in the hand, and holding a button on the side, the unit will accept voice commands and transmit them to the desired target.
The onboard AI will explain the steps it's undertaking to carry out the command while it works, and occasionally ask for clarification. If the target is used on a computer the calling card manifests as a wolf head joker playing card displayed on the screen. If used on a device that's doesn't have a screen, instead a laser engraving will appear on the target of a wolf head joker card.
Exert your Mind and spend 1 minute. Select a Device within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind a wolf head joker playing card. in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. They scrub the system of footprints, leaving no trace behind.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you experience a S-4 injury as the device explodes. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
Alexandra hacks with her chip.
Exert your Mind and spend 2 Actions to activate. Select a Computer within 20 feet. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
A hologram arm appears where Tay's missing limb would be and the circuit board glows brightly. the hologram arm reaches into the computer and then disapears leaving it's code in the system until activation, leaving a shining pink stone behind on the screen
the arm looks very much non human, and mechanical, like the arm Tay lost and the stone left behind is modeled after the artifact that allows time travel. This all works do to special parts of the circuit that try to interact with the arm, but instead as a fail-safe make the holographic arm temporarily. This power merely gives a means to interact with the circuit board to hack a system.
Exert your Mind and spend 1 minute to activate. Select a Computer within arm's reach. Can be used on Alien technology. You must actively and obviously use Modified Circuit Board to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.
Every hack you make leaves behind a shining pink stone in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
You've always preferred the company of machines to people. Maybe because, unlike people, they tend to do what you ask without much fuss.
Exert your Mind and spend 2 Actions. Select a Computer within arm's reach. Does not work on Alien technology. You must actively and obviously use a device-compatible cable to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.
Chip pulls out his laptop, cracks his knuckles and flicks his collar up.
He clicks 'Hacking.exe' (And can quickly code the 3 lines of script that somehow make the software work in moments if it doesn't exist yet)
The screen goes black, with technicolor symbols flickering down from the top of the screen (A la The MATRIX), forming a first person view similiar to a game. He controls the view by typing seemingly nonsensical code at a blistering speed. It often portrays metaphorical version of the hack (stealing files might be entering a ghostly/matrixy version of reality and finding the golden orb, turning on a TV is walking into a room and picking up the remote control, etc)
Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. You must actively and obviously use laptop to activate this Effect. Roll Dexterity + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.