Jane's mind had unlocked part of its potential. When she touches a device be it a computer, laptop, or even a cell phone she establishes a link between her mind and herself. When touching a device her hand will have blue lines spread from her to the device and her eyes will stream data across their surface.
When Jane wants to make something 'Self-destruct' her eyes turn briefly red with red data moving the opposite direction when she uses her secondary ability.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
A golden Lotus pattern begins revolving in Amarjeet's eyes. After the Hack is completed, an identical pattern will be displayed somewhere on the UI of the affected device.
The Lotus III implant has been upgraded. Sophisticated decryption & code-breaking software is pre-loaded into the implant, optimized to synchronize with the end-user's conscious attempts to crack security systems. Capable of defeating the most sophisticated systems in moments, use of this feature causes the user's eyes to display the familiar Lotus Logo as a revolving pattern on the iris. Additionally, in what we consider to be a win for our marketing team, any device compromised by our software will display our Lotus Logo in system - all the better to alert potential clients of system vulnerabilities.
Operating the system linkage on a regular basis has been proven to damage the optic nerves: always use caution when operating prototype cybernetics.
Exert your Mind and spend 1 Action. Select a Computer within 300 feet. Can be used on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you go Blind. Roll Perception + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind Lotus Logo in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
Brainsurge sends electricity through his palms directly into a device, allowing him to give the device commands.
Spend 1 minute. Select a Device within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind lightning bolt in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
This Gift's Cost is capped at 2 and cannot be increased further.
The next in Louis's foray into computer science is a little cartridge for his SEAL units. Simply retrieve one from your pack, and slam it into the machine and it'll perform an automated hack of the targeted device! Though fingers that are too fast may find themselves encountering a slight bug, as mashing the input as you input the cartridge has been known to cause the device to encounter a null error and hack itself, but, we promise we're working on that!
Exert your Mind and spend 1 minute. Select a Computer within 20 feet. Does not work on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you disable the artifact for a downtime as it hacks itself.. Roll Dexterity + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Every hack you make leaves behind A gif of a seal clapping and arfing. in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
The Gamer starts cinematically clacking on the keyboard, looking as if they are just typing random bullshit, their fingers moving with comical (and impossible) speed, before they are in the system.
Spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.
Eyes turn black
Exert your Mind and spend 1 minute. Select a Device within 20 feet. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
This Effect is not obvious, and the only sign you are using an Effect is glowing black eyes. If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.