[FOCI]


Expanded Worlds
AI and the countless networks integrated into every part of life are as ubiquitous as air, and to most people, about as noticeable. Not you. From the moment you first realized that networks ran on an underlying "Ur" tongue, a code of mathematics and logical symbols, you were hooked. It wasn't your goal to learn everything you could about hacking computers so much as there was nothing else for you. As a thrown stone follows its trajectory, you learned to hack the network.
What you wear doesn't matter, because you live in the code (as long as you have access to a computer, hand terminal, or some other connection). You might have a few extra pockets for high-energy snacks and spare storage medium, as well.
You have an expensive portable computer of your choice.
The network security measures or linked cameras are blinded for one round.
The network and all nearby connected machines power down for several rounds, up to one minute.
You persuade a networked machine, computer, connected server, or similar information-relaying appliance to do your bidding. You can discover an encrypted password, break through security on a website, briefly turn off a machine such as a surveillance camera, or disable a robot with a moment's worth of fiddling.
You are trained in hacking—using and exploiting computer software—you know one or more computer languages well enough to write basic programs, and you are fluent in various network protocols.
You can ask the GM one question and get a very short answer.
The more you practice hacking, the more proficient you become. You gain 3 additional points to your Intellect Pool and +1 to your Intellect Edge.
You infiltrated the networks so completely that networked cameras can't identify you. If your face comes up on automated recording devices, vulnerabilities you've previously exploited keep you from being recognized. Even when station security physically recognizes you, upon checking their records and hand terminals, they're told that you're not who you seem to be, but rather someone unimportant, which you can use as an asset in any related persuasion or deception interaction.
You can control the functions of any machine, no matter how far from you it is, that you've previously exploited using Perfect Hack, as long as it is networked to your current location. This effect lasts for ten minutes.
In addition to your normal recovery rolls each day, you can take as many ten minute recovery rolls as you have the time for, so long as you add the points recovered to your Intellect Pool.
GM Intrusions: It's nearly impossible to write perfect code on the first try. Hackers who make a name for themselves can become targets of other hackers. Hacking requires a working computer, hand terminal, or similar device.