[FOCI]

Hacks the Network

Expanded Worlds

AI and the countless networks integrated into every part of life are as ubiquitous as air, and to most people, about as noticeable. Not you. From the moment you first realized that networks ran on an underlying "Ur" tongue, a code of mathematics and logical symbols, you were hooked. It wasn't your goal to learn everything you could about hacking computers so much as there was nothing else for you. As a thrown stone follows its trajectory, you learned to hack the network.

What you wear doesn't matter, because you live in the code (as long as you have access to a computer, hand terminal, or some other connection). You might have a few extra pockets for high-energy snacks and spare storage medium, as well.

Additional Equipment

You have an expensive portable computer of your choice.

Minor Effect Suggestion

The network security measures or linked cameras are blinded for one round.

Major Effect Suggestion

The network and all nearby connected machines power down for several rounds, up to one minute.

Tier 1

Perfect Hack (3 Intellect points) Action

You persuade a networked machine, computer, connected server, or similar information-relaying appliance to do your bidding. You can discover an encrypted password, break through security on a website, briefly turn off a machine such as a surveillance camera, or disable a robot with a moment's worth of fiddling.

Computer Programming Skill

You are trained in hacking—using and exploiting computer software—you know one or more computer languages well enough to write basic programs, and you are fluent in various network protocols.

Tier 2

Network Tap (4 Intellect points) Action

You can ask the GM one question and get a very short answer.

Tier 3

Expert Hacker Enabler

The more you practice hacking, the more proficient you become. You gain 3 additional points to your Intellect Pool and +1 to your Intellect Edge.

Tier 4

Erased Enabler

You infiltrated the networks so completely that networked cameras can't identify you. If your face comes up on automated recording devices, vulnerabilities you've previously exploited keep you from being recognized. Even when station security physically recognizes you, upon checking their records and hand terminals, they're told that you're not who you seem to be, but rather someone unimportant, which you can use as an asset in any related persuasion or deception interaction.

Tier 5

Control Machine (5 Intellect points) Action

You can control the functions of any machine, no matter how far from you it is, that you've previously exploited using Perfect Hack, as long as it is networked to your current location. This effect lasts for ten minutes.

Tier 6

Power Nap Action

In addition to your normal recovery rolls each day, you can take as many ten minute recovery rolls as you have the time for, so long as you add the points recovered to your Intellect Pool.

GM Intrusions: It's nearly impossible to write perfect code on the first try. Hackers who make a name for themselves can become targets of other hackers. Hacking requires a working computer, hand terminal, or similar device.