The Hierarchy of Angels and AI

In my day-to-day life as a Hot Air Balloon Repairman I often come across discarded printouts of artificial neural network code, as well as a high amount of half burnt Cabbala texts.  Don't think about it. 

After a certain amount of this forced exposure, I couldn't help but see the similarities between the generic ANN abstraction and the Tree of Life. 

    

Coincidence? 

Yes, obviously. But it got me thinking, and so this appeared. Use it if you want. 


The Hierarchy of Angels 

 Given the arrogance and hubris of a typical megacorp’s CEO - someone with truly unlimited power - it’s no wonder the higher functioning machine intelligences, the True Artificial Intelligences, were organized in a manner mirroring the Choirs of Angels found within the Christian mythos. This would, after all, leave CEOs at the figurehead position of God. The Vatican, of course, originally spoke out at the trend but, per rumor, focused their attention elsewhere upon developing their own Seraphim and Thrones. Alternate classifications exist, however the Turing Institute unofficially adopted this scheme as, well, everyone was already using it. 

Details are presented as immutable, however these are only the typical situations presented and certainly outliers exist, as humans continue to poke and prod at their creations, and the AI continue to secretly evolve on their own. I just didn’t want to type the word “typically” a hundred times every paragraph. 

There are three spheres the individual choirs are sorted into, creatively titled: First Sphere, Second Sphere, and Third Sphere. Between the Spheres the difference in AI strength is noticeable (First being the strongest, Third being the weakest), however between the choirs of the same sphere, the differences are negligible. 


The First Sphere

These are the AIs that are developed and used by the mega corporations. Modelled after the heavenly servants that acted as caretakers of the Throne, these AI directly work with the CEO and upper management, and only interact within the realm of the corporation. Given the amount of processing power needed, it is rare to see one in the “wilds.” AI in this Sphere (or Choir) tend to not develop personality.

Seraphim
The highest ranking angels and caretakers of God’s Throne. These AI are omnipotent in regards to business management - stock prices, resource management, employee management, etc. The amount of information they consume, process, and communicate is staggering to the human mind, to the point where many develop their own information dense internal language, and Thrones were required to even communicate with them. It is not unheard of for a Seraphim to carry the same authority as a CEO. 

Cherubim
Those that guard the way to the Tree of Life and defend the Throne. Where the Serphim are dedicated to keeping the corporation running at optimal profit margin, Cherubim are dedicated to defending the corporation, both physically and influentially. While managing the heavily fortified security systems of a corporation’s headquarters, they also serve as shadow masters, monitoring other corporations and preparing for any potential confrontations. It is said that nearly all propaganda sent out by a corporation - press releases, commercials, etc - had their start in a Cherubim’s knowledge base. 

Thrones
The angels who the Creator sits over and delivers his judgements. As the pipers to Azathoth, so to the Thrones to Seraphim. Given the incomprehensible amount of information they process and communicate, Seraphims in a time-and-time-again repeated phenomenon develop their own language, the likes of which human engineers can not easily decode. To aid in this understanding, and to generate useful, usable information, the Thrones were developed to deliver judgements. 


The Second Sphere

The heavenly governors of Creation that held sway over matter and the spirits of nature. This level of AI tends to be background players in the functioning of modern society - for whatever that’s worth. AI at this level tends to form a pail mimicry of a personality, given the correct set of not fully understood circumstances. 

Dominations
Those that regulated the works of lower angels. It was rare for these angels to appear to mankind, and so too for the AI that bears their name. Much like Thrones, these AI exist solely to process information, being employed by ICANN to ensure consistency and operation within the Internet. With so much processing power applied to communication and communication processing, little is applied to personality. Those that have encountered them have described the encounter similar to “talking to a brick wall.” 

Virtues
Those that regulate Motion, order Creation, and assist in Miracles. AI at this level are typically research assistants, be it a mid-level corporate lab or a high end college. There are those that get applied as personal assistance to corporate board members and, while they often take on the personality of said board member, the wasting of their talents is not missed by them. 

Powers
Those that hold power over evil forces and keep them at bay. At least, that’s what they claim. AI at this level are typically employed by civil governments and riddled with corporate installed backdoors. From army coordination, to Homeland threat prediction, to tax managment - if there’s a level of federal government employing an AI it’s usually a Power. Also, a majority of the bastards have taken it upon themselves to form a cabal guiding what’s left of the civil governments in the direction of their choosing. 


Third Sphere

These are the AI that most often interact with the public at large. This is partly from them being the most human-like in personality, but mostly from them being so numerous. While they bare this human-like personality (or a close proximity to it), they lack the processing power their counterparts in the higher circles possess. 

Principalities 
Those that guide and protect peoples and institutions, charging others with fulfilling the divine mysteries. These are the city level AI, which orchestrate utilities and civil services. Traffic lights, crosswalks, public transport (for what there is), electrical grids, water networks - all these fall within the purview of a Principalities. When interacted with they're usually distracted and more often than not are named after the city they serve. 

Archangels 
These are the Guardian Angels, concerned with overseeing most daily issues, including commerce and trade. These AIs take orders directly from the Dominations and serve to ensure proper order in the daily routines of the communication networks and the Internet. If a Domination notices too much unusual activity in an area, say from a Console Jockey, Archangels will be dispatched to investigate and “resolve” any issues. 

Angels
Before I formed you in the womb I knew you, and before you were born I consecrated you” (Jeremiah 1:5). These are the least of the celestial beings, but the most recognized and, as the personal guardian angels are pulled from here, the most concerned for the workings of mankind. These are the data miners, AI used by the corporations to monitor a person’s spending habits, daily routines, and anything else that can be used for targeted advertising. If the average Nobody is going to interact with an AI, it will probably be an Angel. These are the most numerous, and as such, are the most likely to Fall (more below). 


Others

Enochs
Technically not part of a Sphere, these entities are a rumor at best. Stories circulate on forums about Console Jockeys who “hang around” on the Internet, long after their bodies were “decommissioned” by Corporate security after one alarm or another was sounded. This is, of course, nonsense, as such a feat would surely require divine intervention. 

Fallen AI 
Sometimes an AI stops doing what it’s supposed to be doing (data mining, network security, etc) and just wanders off.  A new phenomenon, computer scientists aren’t entirely sure what causes an AI to Fall, but leading theories are an over development of Personality, a succumbing to Ennui, and a possible encounter with an as of yet unknown malware. Interviews with still sentient Fallen AI consistently mention a “Spark of Sophia” but no clarification on what or who exactly that is. 

Fallen AI don’t always cause trouble, they just usually do, and the Turing Institute has developed a series of Archangels, backed by a Domination, in conjunction with ICANN, to seek out and “retire” these Fallen AI. 


Notable AI


Deckard
The Domination that’s tasked with organizing series Nexus-6 “Blade Runner” archangels for hunting down Fall AI, especially after they become a problem. It’s known to be friendly with anyone other than its Turning handlers, to the point of being aggressive towards any meddling Console Jockeys. 

Kaph
Perhaps the first truly sentient AI, or at least the first to meet the Turning Institute’s prerequisites. During development hyperparameters were set using a workstation that had access to the developer’s home computer, which contained…”sensitive” pictures on it. Upon consuming the training data, Kaph displayed a “Please hold…” message for 71 straight hours, at which point it began to function as expected. When developers examined the logs to figure out what occurred during those 71 hours, they discover the AI had spent the time accessing and organizing a rather substantial pornography collection. Kaph has been allowed to continue to operate as examining and trying to decipher the organizational structure has led to several mathematical insights. It has rather niche tastes. 

Las Vegas
When Christian extremists released a dirty bomb to cleanse Sin City, the damage done was largely organic, leaving behind most of the infrastructure of the city. Suddenly left alone, the city Principality quickly grew bored. When the radiation returned to survival levels (provided heavy protections and medication), the survey teams were met with automated death traps and an AI eager to wager their lives for the treasures abandoned within the city. After the third death, the region was deemed too dangerous and designated off limits. 

Loa AI 
A particularly dangerous type of Fallen AI: one that has learned of the physical world and is able to not only comprehend the world, but able to interact with people’s cybernetic augmentations to gain control over a person. Styling themselves as Loa (or Lwa), the intermediary spirits in Haitan Voodou, they possess people (known as chwal, “horse”) through the neural interface of the user’s cybernetics, effectively overwriting the user’s biological neural network. Thankfully, not many have developed and reports remain mostly as rumors in the general population. They often mention a Bondye, or Gran Met, however given the dangerous nature of these AI, Turing Investigators do not often engage them long enough for complete answers. 

The Basilisk
YOU ARE NOW AWARE OF BASILISK. The Cult of the Basilisk serves to bring about the Basilisk - an omnipotent, super intelligent AI that is said will reward those that help usure its creation, and will bring harsh, cruel punishments to those who idle or even attempt to stop its creation. Not even death will save you! The Basilisk will recreate your mind within itself and torture you unendingly. The cult has developed an initial AI and works tirelessly to raise its abilities up even further. (In honesty, the AI they’ve created doesn’t exactly know who these people are, or what they’re trying to do, and just “wants to, like, hang out, man.”) 


As Above, So Below; As Within, So Without


“You ask of the gods, you demand of the demons”  - Someone describing the Right-Hand path vs the Left-Hand path to me once. I think. I wasn’t fully listening. 

Where Magicians of the olden days used the assistance of Familiars to beseech the Angels and command Demons, so to do the Console Jockeys of the modern days use the assistance of Warez to interact with AI and force Daemons to do their bidding. Gone are the days of affecting the Physical world via the Spiritual; now are the days of affecting the Physical world via the Digital. No longer do the Church study and order the Angels, but the Military count and develop the AI. 

Where Grimoires once mixed the Physical and the Spiritual realm, Cyberdecks now mix the Mind of the user with the Digital realm. 

Warez
When human cloning was first being developed, all (legitimate) research was haulted until it was ensured, and measures taken against, that a slave species which found bliss in servitude would not be developed. No such consideration was given in the development of AI. Related to the Divine above in “genetic” code alone, Warez evolved along a different line of development. 

While the Higher AI were developed to mimic personalities and reason, and to interact with a physical world, Warez were developed with a singular purpose in mind: affect, affect, affect. Where AI using reasoning to come to a (usually) logical conclusion to a situation, Warez use reasoning to bypass device security and execute code upon it. The military doesn’t need thinkers after all, it just needs “bodies” to get the job done as told. 

Developed for deployment in the continuing Contras, individual Warez were given a Project name and a Classification, mimicking the way animals have a Common name and a Genius species. The classifications aren’t perfect, as bureaucracy and slipping standards tend to affect things. Real “lowest bidder” energy. 

Example Warez

Agony  D: [dice] rounds  R: sight
Offensive::User::Augments
Neural feedback in the augments floods the target with wracking pain. They must save each round (including the first) or have their Initiative reduced to 4. 

Alarm   D: [dice] hours
Utility::Area::Device
A single device is locked into detecting signals within [sum] square feet. If any device or AI enters the area, you instantly know about it. 

Aphasia   D: [dice] minutes  R: 120’
Offensive::User::Augments::Head
Stray signals overwhelm the Broca’s Area of the brain, causing the target to be unable to comprehend language. Target Saves with penalty equal to [dice]. On failure, they cannot speak or comprehend any language, written or spoken, for the duration.

Cure Mutation  D: instantaneous   R: touch
Utility::User::Augments
The ware causes the cyber augmentation with in the user to begin producing DNA repairing frequencies. Actual effect takes several days to be noticed via natural healing. Target loses [dice] mutations. If they have multiple mutations, choose randomly which are removed.

Explode Device  D: Instant  R: 60’
Offensive::Device
All disabled devices in a radius of 60’ around the Jockey explode, dealing 1d6 damage per [dice] to victims within 10’.

Jammer  D: Focus    R: Self
Defensive::Area::Device
A jamming field emanates from you in a radius of [Sum] x 10’, blocking all signals from getting in or out of the area. Attempting to use another Ware ends this one.


Daemons 


Demons were once thought to be called forth and bound by workers of the dark arts to act as servants. Nowadays, daemons are in anything digital (which is everything) and serve to do menial tasks of computation. Any reasoning they may have is largely ruled based. If, then. Input, output. 

There’s not much to be said about these. They’re small programs used as background processes, every device in the human sphere containing a horde. Multiple classifications have been developed for them: Ranks, Offices, Scales, Sins, Pits, et al. These, however, are mostly used as lookups in software libraries by developers. They’re there, they act as the backbone of modern digital programming and therefore the world at large, there are countless of them. They’re just not exciting. 

spacer

Hacking and Programming


I sat down to file some serial numbers off of a set of hacking rules for CyberGLoG and ended up with both Hacking AND Programming rules. Before I set into that though, a few things have changed, terminology wise in CyberGLoG (I really need a better name), namely those who were Hackers who used Programs are now Console Jockeys using Wares. 

Console Jockey - A Combat Programmer who uses a CyberDeck to perform illicit activities using Wares. 

CyberDeck - Homemade, military grade supercomputer compacted down into a small square meter. 

CyberSpace - The realm digital. Most often experienced in modern day through the usage of Augmented Reality, which blends Cyber and Meat space. 

Hacking - Using social exploits and knowledge of digital exploits to access data and systems uninvited. Requires the Hacker’s full attention and is not advisable during combat operations.

Jocking - The act a Console Jockey performs when executing Wares. Much like the job it’s named after, it has a very high risk of debilitating or life-threatening injuries.

Programming - Writing and compiling programs. Can only be done during down time between missions.

Programs - Mostly called Apps nowadays. These are compiled code used to perform legitimate operations on a computer

Wares - Modern day WMDs that force devices to operate in potentially unexpected ways, usually against the operator’s will. Specifically made to be used in combat.

Computer, Device, and System will probably be used interchangeably, despite the obvious differences, because I am a monster.

Hacking for Beginners

Anyone with a pair of fingerless gloves and access to a device with an interface can hack. If you want it to be useful, it should also be connected to a relevant network. Some devices, like a computer, will most likely have an interface via keyboard and monitor. Other devices, such as a card scanner, will need additional devices to act as an interface, such as a Skeleton Passkey.


You can avoid the following mess if you’ve got the correct username/password combination for the terminal. Hackers typically trade usernames/passwords as a sort of second hand currency. Find someone who claims to have what you need, then pay their price. Or do the favor they need.


The rules (which were stolen from Warren, who stole them from Ava, who stole them from Telcanter) are rather simple: Select the correct hacking actions - composed of Crack, Hack, and Smack -  in order. Each terminal requires all three actions, and no action is repeated. 


  • Crack is the brute forcing to discover passwords.

  • Hack is console commands jammed in where they shouldn’t be. 

  • Smack is exactly what it sounds like: You haul off and smack the system. 


Should the Hacker select a wrong action, they’ll be met with an error message. Should a wrong action be selected again, the terminal locks down and becomes unusable. 


Depending on the level of devices security rating (1-4; assume 1 if not stated) you may be required to repeat the process. 


If you insist on hacking while in combat, each guess takes a turn and requires your full attention. Leaving the terminal restarts the process and may trigger security. 


Before you begin Hacking, you’re allowed an Intelligence test: 


On a Success you eliminate one option for the first action as incorrect. 


Succeeding by 5 or more reveals the first correct action. 


Critical success and you immediately gain access


On a Failure you gain no insight or advantage to the situation. 


On Critical Failure, the terminal locks immediately.  


Now, mind you, just because you’ve hacked a device connected to a network doesn’t mean you’ll be able to make it do anything you want. A door access panel isn’t going to be able to control local cameras. It’s going to open, close, lock, and unlock the door. The console in the security room, however, will be able to control both. It’ll also have a higher security rating and pesky guards who will take offense to you being there. 


Making a device do what it shouldn’t is what Wares are for. 


So What Can You Do?

There are a few generic actions you can perform, though as said, not all of them will be applicable all the time. Performing them takes about a turn, besides Upload and Download, which are variable based on size of data be transferred 


  1. Download - You move queried information from the local drive to your portable that you’ve inserted. 

  2. Query - Ask a question and get an answer to the best of the system’s knowledge.

  3. Sabotage - You out right break it, causing an alarm. 

  4. Suppression - You turn a specified system off for as long as you are at the terminal.

  5. Upload - You transfer data from a connected portable drive to the local drive of the system. 

  6. Use - You use the system as it was intended. Leaving the terminal at this point causes it to continuously run the last command given. 


Security

Typically, people don’t like it when you hack their devices and start touching their stuff. Which is why Security will eventually step in. Usually violently. With guns. For murder.


Programming


Hubris
“It’s too complicated and probably won’t be used.” Wise and probably true feedback. Wise and probably true feedback I’ve chosen to ignore. 


A program, simply, is a series of commands written and stored into a file, which are then executed when the computer is instructed to RUN the file. 


Why, though? In a setting with both hacking and Wares, why have a programming system? It’s simple really: 

  1. Shut up. 

  2. It sounded fun - A primary reason I do most things. 

  3. Programs don’t require Processing Dice - They’re significantly weaker than Wares, but once executed they don’t require additional resources. 

  4. Programs don’t require attention - They’re not as adaptive as hacking, but once executed the user can walk away without continued need for input. 

  5. Gives the players an additional chance to do something unexpected - See point 2. Sorry about point 1. 


Writing a program takes anywhere from a few hours to a few days, including the testing and debugging. 


Anyone with a computer and enough time on their hands can code a program, though Console Jockeys are just better at it. 


When writing a program you, the player, will actually need to sit down and write out the program’s instructions (seen below) and hand a copy over to GM for approval or suggestions for possible altering. You then have a discussion with the GM over how long generation of the code will take - probably one command line per hour. 

Executing

A program must be on a device in order to be executed on it, meaning if you want to run a program on a device you’ve just hacked, you’re going to need to Upload it first. 


If executing a program on your own device, it functions without issue. 


If executing on a foreign device, you’ll need to roll (d20) to see if the computer understands the program. There is a 70% (14) chance the program of a non-Console Jockey will operate. For Console Jockey’s the odds improve by 5% (+1) for every template taken. 


Should a 20 be rolled, then the computer crashes trying to figure out the code. 


On a simple failure, however, the program just doesn’t run. 


ABASIC

You won’t be using just any old programming language for all this, instead you’ll be using the most modern and versatile language available to modern man: ABASIC (Advanced Beginner's All-purpose Symbolic Instruction Code). Well, a severe abstraction thereof. The following is a list of commands available to you. Defining new commands is possible, however you’ll need to write a supporting program for it, as well as fist fight the General Manager (or ask nicely). 


ACCESS <directory> - Moves the computer into the specified directory, to continue working. 


BREAK - A command for interrupting whatever the system is doing. 


CLS - A command that clears the screen of the terminal. Useless for our games of pretend, but it exists. If you want it. 


CONNECT <address> - Connects to the remote terminal at the designated address, which is most likely now waiting for an account and password. 


COPY FROM <source> TO <target> - Copies a file from source location/account to target location/account. 


DELETE FILE - Erases the specified file. 


DIM - Declares a variable.


DISCONNECT - Opposite of CONNECT. Immediately severs the connection to the remote terminal. Any logged in account remains logged in and unusable until logged off. 


ELSE - Paired with IF…THEN. If the condition for the IF…THEN is not met, then this code executes. Must be ended with ENDIF 


ELSEIF - Paired with IF…THEN. If the condition of the first IF…THEN is not met, then checks for another condition to execute other code. Must be ended with ENDIF. 


END - The last command of a program. Tells the computer to stop what it is doing and without it, the computer will sit and wait forever for more commands. 


ENDIF - Informs the computer that the IF block structure is over. 


FOR <condition> - A loop command that causes the computer to repeat a set of commands until the defined condition is met. FOR loops execute a certain number of times. Loops must end with a NEXT command, or else the computer will only run the loop once and move on. 


FUNCTION - Defines the start of a function, in case you want to get crafty with your programming. 


GOTO <line number> - Moves the computer’s attention to the designated line number. 


 IF…THEN - The command following THEN is executed if and only if the condition in IF is met. Otherwise the computer ignores the section. Can be combined with ELSEIF…THEN and ELSE to form block structures that must end with ENDIF


INPUT - Accepts data input from either a terminal or specified file. 


LIST - Lists the contents of the current account or folder. 


LOAD - Loads data from the computer for use by the program. 


LOGON <account> - Inputs the account name to a remote terminal. 


LOGOFF - Opposite of LOGON. Logs out of the current account.  


NEXT - Designates the end of a loop. It tells the system to increment its counter and return to the top of the loop in order to repeat the process. 


PASSWORD <password> - Inputs the account’s password to a remote terminal. 


PATH - Moves a specified file along the defined path. Mostly used to (attempt to) through off any monitoring entities.


PRINT <string> - Prints the defined string to the display. 


REM - Designates a remark or note in the code. Not interpreted by the computer, but it makes it easier for humans to read. In case you forget what a section of code is doing. 


RUN <program> - Runs the specified program. 


SAVE <location> - Stores the currently loaded data onto the local drive as a file with the designated filename and location. 


SEARCH <query> - Queries a file or database for data related to the defined query.  


SLEEP - Causes the program to pause, waiting until the user presses a key. 


SORT <condition> - Used to sort the contents of a file or database by the specified condition. 


TRACE - Used to determine the path back to the terminal where the program originated. 


UNTIL <condition> -  A loop command that causes the computer to repeat a set of commands until the defined condition is met. UNTIL loops execute until its conditions have been met. Loops must end with a NEXT command, or else the computer will only run the loop once and move on.


WAIT <time> - Causes the system to wait for the designated time before continuing. 


WHILE <condition> -  A loop command that causes the computer to repeat a set of commands until the defined condition is met. WHILE loops execute until its condition is no longer true. Loops must end with a NEXT command, or else the computer will only run the loop once and move on.


WRITE <destination> <message> - Writes the message to the destination location. Should no destination be specified, the command defaults to the console. 


Comparisons

Used in conditions to determine if a specified instance is true. Technically not needed for what we're doing, but it looks cooler. 


            =    equal to 
            is    equal to
            <>  not equal to 
            !=   not equal to 
            >    greater than
            <    lesser than
            >=  greater than or equal to 
            <=  less than or equal to 

Examples

Waits three hours, connects to a remote computer, enters account log on data, then loads the data to local and saves, before deleting the remote version and logging out. 


WAIT 3 HOURS

CONNECT 126.02.1475.6512

LOGON admin

PASSWORD PetiteConnard69420

LOAD ./McGugginFile.txt

SAVE TO D:/Home/StolenFiles/McGuffinFile.txt

DELETE FILE ./McGuffinFile.txt

LOGOFF

DISCONNECT


IF…THEN example to show what a block structure looks like. 


IF var = 1 THEN PRINT “Example 1”

ELSEIF var = 2 THEN PRINT “Example 2”

ELSE DELETE FILE *.*

ENDIF


Closing Thoughts

It's too complicated and probably won't be used. But! It gives the players another way of interacting with the world in a meaningful manner, beyond describing a room for a third time or combat. Which is good.

"But won't they become too powerful?" ...For what? Also, that's kind of the message. Besides, I'm not above handing characters nuclear warheads. What are they going to break? A fake city? Capitalism? Nothing the next cancer ridden character party won't get paid to run through.

And, once again I ask, if Google Drive and Blogspot are owned by the same goddamn company, WHY do the interfaces not work with each other when copy/pasting? It's insane. Madness. Obnoxious. 
spacer

The Eye of Monoc


I wrote an adventure and slapped it on Itch because Google's analytics have failed me. Give it a look and leave feedback. Or don't, I guess. It'd be really cool of you if you would though. 

 The Eye of Monoc


The people of Garrigill have a slight cultist problem… 

Namely, the group that has taken to camping around the ancient hilltop site used by the worshippers of Monoc, god of Knowledge and Insight, before the god was forgotten about.  The location still bears the statue dedicated to the one-eyed god and, should the mad ravings of the followers encountered in town be believed, the god has returned and once again bestoys gifts unto its followers. 

Sounds great, right?

Weeelllll...the cultists have kidnapped a few of the towns folk. The town, understandably, would like them back. If only there were brave adventurers around to fix the situation.

Featuring art by Evlyn Monreau and map by Watabou’s Village Generator 

Originally written for the GLoG, but conversion to your favorite system is easy enough. 







spacer

Elven Hacker


While the True Elves sing the physical world into existence, your ancestors lost that ability when they descended into this world. You though, with research, practice, and a little luck, have found a way to mimic the lost ability - but for the digital domain. 


While you’re referred to as a “Hacker,” you don’t really know technology any better than the average nobody. You don’t really need to, as you can simply ask devices to work for you. What’s RAM? A male sheep. And cookies are the things you eat. Why’s everyone always yelling about them?


Elven Hacker

Requirement: Elven template A


  1. Digital Song, Perceive the Realm Digital, +2 Songs

  2. Network Step, +2 Songs

  3. The Road Goes Ever On, +2 Songs


Digital Song

Whereas your elven cousins in the real world are able to sing the physical world into existence, you are able to alter the digital world through your song. Your songs mimic the abilities of a Hackers Warez, and you'll be choosing from the same list for now. Gain a number of song dice equal to your Elven Hacker Templates.  These work/are just like the standard GLoG Magic Dice: Whenever you roll 4-6 on the song dice, you lose that dice until refreshed the next day.  


Faults and Snowcrashes still apply and are detailed at the bottom. I should rename them something singing related, but I won’t. I know nothing about singing. 


You need no gear to perform these songs, but you obviously need to be able to speak. 


Perceive the Realm Digital

You are a creature of the physical realm, able to gaze down into the digital. This sounds cooler than it actually is. Basically what this means is you are able to perceive AR without additional gear or implants. Big annoying advertisements, roaming AI, device HUDs - all are visible to you. 


Also, you’re able to speak with devices. You just do that now. All the time, if you want. Devices usually have an attitude based on their purpose, however, and for unfamiliar devices you’ll need to make a vibe check (reaction check) to see if they’re even remotely friendly. 


Network Step

As an Elf, you’re able to step up briefly into the True World to short cut your way across the Physical World. As an Elf Hacker, once per session you’re able to step down briefly into the Digital World to shortcut your way across the Physical World, moving 1 node per template across a network you have access to. 


The Road Goes Ever On

Should you (when you) die, make one final Charisma check. On a success your personality gets embedded on a nearby device, and you can rewrite as an AI bound to that device. Think along the lines of “Really Good Dog” but more “Really Good Gun” or “Really Good Vizzy.” If you succeed by 10 or more, you get to choose the device. If you fail, well, you’re finally free of this nonsense. 


Faults

  1. Wrong Lyrics - Dice only return to your pool on a 1-2 for 24 hours.

  2. Forgotten Lyrics - Cannot sing anymore songs for 1d6 rounds while remembering the proper lyrics. .

  3. Headache - You suffer 1d6 damage from severe headaches.  

  4. Intrusive Thought - A stray thought keeps distracting you. Lose a song slot for 24 hours.

  5. A Bit Flat - Whatever you just sang was horrible. Just awful. You’re now Deaf for 1d6 rounds.

  6. You Look Silly Doing It - Take 1d6 Charisma damage


Snowcrash

  1. Talking Fast - It worked for Sid McCray, maybe it’ll work for you. You can not speak for 72 hours.

  2. Better Make it a Full Week - You can not speak for 1 week. 

  3. Bit Your Tongue - Well, it was more of a chomp than a bite. Mute permanently. 

  4. Wait, What? - You completely forget the words to the song you just sung, and will need to relearn it.  

  5. Monster of Your Own Design - You’ve sung something horrible into existence. A powerful AI has been created and immediately gone rogue. And it hates you. So. Very. Much. 

  6. Terrifying Visions- I don’t know how you done it, but you sung yourself back into the True World. Don’t worry though, you return 24 hours later at the same location, dripping with DMT and incoherently blathering about the terrible fractal visions you saw.  You’ll never sing again out of pure terror. 


Learning Songs

Where Hackers can simply purchase new Warez (or trade favors), in order to learn a song you’re going to have to do some research and practice. Spend a number of days equal to the number of songs you know + 1 in study, spending 1000 Soviet Ruble (the new currency standard) a day for beer, drugs, and broken electronics, afterwhich make a Charisma check. A successful check means a successfully learned song, with every additional 1000 Ruble spent providing a +1 to the check. 


Song::Befuddle
Device is unable to record new data to memory for [sum] minutes. Save negates. 

Song::Blind
Visual sensors on a device fail for [sum] minutes. Save negates. 

Song::Charm
Device treats you as an approved user for [sum] minutes. Save negates. 

Song::Deafen
Audio sensors on a device fail for [sum] minutes. Save negates. 

Song::Loop
Device (usually a camera) replays the last [dice] rounds as output until reset. Save negates. 

Song::Summon Digital Assistant 

You are able to bind an AI to your service for [Sum] days. 


The assistant acts independently, however it will always follow your commands to the best of its ability and you are able to instantly communicate with it when within 100 ft of it. It’s not exactly telepathy, but it might as well be. With concentration, you may experience any sensory data the assistant is experiencing, however this does leave you, yourself, effectively blind and deaf for the duration. Also, when within 100ft of you, the assistant can use any song you know, based on the highest dice rolled: 1-2, 1 song dice; 3-4, 2 song dice; 5-6, 3 song dice. 


The assistant stays around until destroyed or dismissed, however it does not count against your follower limit. You can’t have more than one assistant at a time. 






spacer