ALPHA Protocol *doggo voice* "I'm in."

1
This Artifact allows you to issue commands to technological devices.
Used by Lorelai Whitetail, Created by Caelum.
On Legendary Artifact [Conroicht] Prototype Smartwatch.
(When activating this Effect, it is obvious you are interacting with the target. You must use this Artifact obviously when activating this Effect.)

With but a tap on the screen, the watch takes a sampling of Lorelai's blood and converts it into a digital virus capable of infecting technological targets at range. This forms a sympathetic link between user and target, which allows Lorelai to navigate a virtual space using only her instincts-- interfacing with the target program in a predator/prey relationship.


Take a Severity-1 Injury and spend 2 Actions. Select a Computer within 300 feet. Does not work on Alien technology. Roll Perception + Occult, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.

  • The Injury received from activating this Effect heals in 1 day and cannot be prevented or prematurely healed by any means.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Community Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

This Effect is not obvious, and the only sign you are using an Effect is your eyes reflecting the programs you are running. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Increase your sacrificial Injury's Severity by 1 and spend 2 Actions. Select a Device within 300 feet. Does not work on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you blast off a finger. You must use up Alcohol in order to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.

Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Every hack you make leaves behind ETA axe and snake symbol in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see glowing blue showing skeleton..

If you do not have a sacrificial Injury when you activate this Effect, take a new Severity-1 Injury.

  • When narrating disturbing content, be cognizant of your group's tone and accommodating to those who would like to "fast forward" through the description.
  • The sacrificial Injury received from activating this Effect cannot be prevented by any means or healed before 1 day has passed. It is shared with all Effects that use sacrifice. This Injury does not requires Stabilization or cause Battle Scars when it becomes Severe.
  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Spend 2 Actions and use up this device that's the size of a poker chip. Select a Computer within arm's reach. Does not work on Alien technology. Roll 7 dice Difficulty 6, dice penalties do not apply. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.

  • This consumable is destroyed when used and cannot be used again.
  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Spend 1 minute. Select a Device within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Every hack you make leaves behind Shows a picture of a silenced pistol in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

This Gift's Cost is capped at 2 and cannot be increased further.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Stock Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.