Jason always had an interest in technology and making it better. Now he makes small spiders that can attach to technology and do his bidding. The technology is draining and takes to to complete. The small spiders will attach to the piece of technology and integrate into the tech by moving it or forming together to plug into it.
What makes the spiders creepy is that it is a small swarm of spider bots they have dark red eyes and brown and black fur.
(NSFW) https://www.latestly.com/socially/social-viral/spiders-swarm-australian-homes-to-escape-nsw-floods-viral-videos-will-give-you-nightmare-2387658.html (NSFW)
The spiders are small and integrate into the technology. Jason keeps the spiders in a small black box that he uses to operate.
Exert your Mind and spend 1 minute to activate. Select a Device within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see Creepy spider.
After you finish activating this Effect, you cannot move quicker than a walk (max 15 feet per Round) for one minute and suffer a -1 dice penalty for an hour.
.
Exert your Mind and spend 1 minute. Select a Computer within 300 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Every hack you make leaves behind Flashdrive icon in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
With a click of his tongue and a tap of his fingers. He gets into the front-end of whatever he is trying to get into. It always works flawlessly, leaving behind a little card, A King of Diamonds playing card.
Spend 1 minute. Select a Device within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Every hack you make leaves behind King Of Diamonds Playing Card in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
This Gift's Cost is capped at 2 and cannot be increased further.
Alexandra hacks with her chip.
Exert your Mind and spend 2 Actions to activate. Select a Computer within 20 feet. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
A small silver ring with linked blue boxes engraved into it.
The user extends their hand towards the target. When they do thin tendrils extend from the ring and search for purchase on the wearer. The tendrils attach and start sucking small amounts of power from the user as they continue to crawl along their body before retreating after the hack is done.
The user's packaged will and commands are transmitted through the ring and then antenna tendrils towards the target.
Expend a point of Battery and spend 1 Action. Select a Device within 300 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.
Anyone who touches this Artifact will notice it warping their body and may drop it. If they choose to hold or use it, they immediately receive the following Battle Scar: Disfigured. Permanent stains on hand from where tendrils have previously latched on.. If they lose possession of this Artifact, the Battle Scar heals over the course of the next day.
Anyone who touches this Artifact will notice it warping their mind and may drop it. If they choose to hold or use it, they immediately receive the following Trauma: Irrational anger and disrespect of people who have truly shoddy security setups.. If they lose possession of this Artifact, the Trauma heals over the course of the next day.
A hologram arm appears where Tay's missing limb would be and the circuit board glows brightly. the hologram arm reaches into the computer and then disapears leaving it's code in the system until activation, leaving a shining pink stone behind on the screen
the arm looks very much non human, and mechanical, like the arm Tay lost and the stone left behind is modeled after the artifact that allows time travel. This all works do to special parts of the circuit that try to interact with the arm, but instead as a fail-safe make the holographic arm temporarily. This power merely gives a means to interact with the circuit board to hack a system.
Exert your Mind and spend 1 minute to activate. Select a Computer within arm's reach. Can be used on Alien technology. You must actively and obviously use Modified Circuit Board to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.
Every hack you make leaves behind a shining pink stone in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.