Clerics

Clerics. Everyone's got their own version of the class and this one is mine. I've seen a bunch that use a d8 for casting, some using d6, and some using words. These are all fine, but they don't seem entirely correct to me. Chewing on the thought, I think it may be because being a cleric (or related modern nonsense) is to give up of yourself in the service of others, but the casting rules for the various versions are all caster centric. Maybe I'm off the mark, but at least a conviction based caster came out of it. 

Strangely it arose from the same line of research that led to the AI as angels idea. Also a Summoner class I haven't fully nailed down. But nevermind that. 


Cleric

Starting Skills: 1) Religion, 2) Herbalism, 3) Brewing
Starting Equipment: Holy Symbol, Holy Vestments, Holy Scripture

A. Tenets of Faith, Divine Casting
B. Ceremonies
C. Divine Guidance
D. Seek Audience 


Tenets of Faith
Replace your Convictions with the tenets of your God. You work for them now. Also, you may have as many Conviction points as you have Cleric templates. These'll be used for your Divine Casting. 

Break the Tenets, lose your casting and extended Conviction pool. These can probably be restored through a quest. These things always are. 

Divine Casting
As an ex-preacher, let me state plainly: Prayer is just second hand spells and religious ceremonies are just rebranded magic rituals. I ain't being edgy, that's just how it is. With that in mind you get a bit of spell casting ability through prayers to your god. However, you yourself are not casting the spells, but rather the god is casting them for you. Trouble is gods ain't like you or me, they're basically bound to their shtick. Where we can know a little about First Aid and Auto Mechanicing, a god of Healing ain't gonna know the first thing about an engine and a god of cars won't know how to repair that weird meat chassis of yours. 

What this means mechanically is that a god will have a Purview (which will be defined) and a Domain (which will be vaguely implied). Prayers casted in the Purview are automatically 6's. Prayers casted in a Domain are automatically 4's. Prayers not in either of this are automatically 1's. Luckily, you're immune to miscast. 

Prayers in the Purview are ones the god "definitely does" where as Domain prayers are the "yeah, sort of, I guess" type. A god of the Forest would definitely "Speak with Animal" or "Find Water" as those are definitely forest related things. A god of the Forest might, probably "Heal" because a forest is a place of growth, but also if your hurt and fall in the forest, it will consume you. Forests don't give a shit. What a god of the Forest won't do is produce a "Fireball" as fire is a forest destroyer. 

Any god with multiple accreditations (ex, god of love and thunder) has multiple Purviews, as each template in Godhood gets you a Purview

While you, yourself, don't have any Magic Die to put towards said prayers, you essentially buy them at 1 Conviction point/MD. They immediately become the relevant above result. So in the above example 1 Conviction point buys you the same result as rolling a 6 on the MD would for Speak with Animal, a 4 for Heal, or a puny 1 damage fireball of fizzled flames. 

Ceremonies
Stolen straight from Arnold K.  Because they are cool. 

Each one takes 2 hours. 

  • Union – People are bonded. If your partner would take physical damage while you are beside them, you can choose to take half of it. If one dies, the others loses 500XP.
  • Funeral – The dead are honored. Everyone gains XP equal to 50% of the deceased's total XP. (So if a PC with 3000 XP died, each of the three surviving PCs will get +500 XP at the end of the session.) This transfer only works from player characters, to player characters.
  • Sermon – You can implant a suggestion in all Neutral and Friendly attendees.  Make a single roll for each (roughly) homogenous group/demographic.  You still need to get people to sit through a 2 hour sermon, and most people are not well-disposed towards religions other than their own.

Divine Guidance
Wizards have to call their familiars and make a contract that will ultimately bring their down fall. Clerics, though, are preapproved and get assigned a companion that will actually try to help them in the form of a lesser angel. Careful through, while familiars vaguely look like animals, angels just outright look like weird shit. Does not count against follower limit. 

Seek Audience
Usually, whenever a cleric and their god have a palaver, it was the god who done the initiating. However, with this power, by getting the GM a beer, the cleric and present PCs, are granted an audience with the god in question. Whether they'll be pleased to see you is another story. Usable once per adventure and lasts for as long as the beer lasts, or until you anger the god. 


Example 

(directly stolen from Branson Reese, because I needed a quick example and I refuse to learn what a "Pelor" is)
Purview: Vacation

Tenets
  1. “It’s 5 o'clock everywhere.”
  2. “We’re here for a good time, not a long time.”
  3. “There is no rule number three.”
  4. “Changes in latitude, changes in attitude.”
  5. “Hell, could be my fault.”

The Tenets take place of your Conviction, so when you get in trouble for following "Hell, could be my fault" you gain a point of Conviction. Which can then be used to power prayers. 

Purview prayers would be along the lines of Comprehend Languages (for understanding locals), Endure Elements (in case you forget the sunscreen), Unseen Bellhop, and Summon Alcohol. Domains would be along the lines of Summon Mount (gotta get there some how), Heal (for the bad sunburn), and Cure Poison (for the bad tummy). Prayers outside of these would be any of the fairly aggressive sort: Fireball, Magic Missile, Acid, etc. When in doubt, talk with your GM. 

Eventually, Danny will send a weird ass, biblically correct flamingo with far too many eyes and wings to assist you in your day to day adventuring and vacationing. Get on good enough graces with him, and that "drop by anytime to use the pool" becomes more than just a pleasantry (once you get the GM a beer, of course). 




spacer

Some Weird Sin

 

After months of playtesting, and a short campaign that got...weird, it's finally here: The update no one asked for. 

Some Weird Sin

(CyberGLoG Mk 2) 


Download it here


Notable Changes Include:

  • A useless guide for new players
  • New Class: Investigator and People's Champion 
  • Dreaming Real is now an Augment instead of a template.
  • Grizzled Cop has been cut 
  • System has switched from simple Weapons and Armor to Gear Porn. (I'm certain the players hate me) 
  • Whole mess of Augments have been added. 
  • Hacker has been named "Console Jockey", Programs have been renamed "Warez", and additional information has been given for both. 
  • Hacking system!
  • Programming system! 
  • Whole mess of Warez added. 
  • Drug system got filled out. 

My Favorite Part

An SRD has also been created. This'll allow me to get my grubby little hands on it whenever I need it, without worrying about which of my devices has the document on it. It also allows me to add information in a quicker fashion than updating a PDF for release. Also a search function. Nice. 

New material will still get posted here, but then will eventually get integrated into the SRD as time allows. GoblinBright, Bastards & Bystanders, Thunderbirds and Energy Weapons - all will go straight to the SRD, with PDF generation whenever. 

spacer

Skrew Korps

What do you get when you jam the Military Industrial complex together with mindless Hollywood entertainment and force feed it to a culture that fetishizes technology, and is so degenerate and jaded to violence they actually see it as a form of entertainment?

 Skrew Korps! *

Follow the war crimes thrilling adventures of psychopaths bold heroes as they invade countries for oil protect freedom around the world! Having insanely agreed to remove their brains from their healthy bodies been severely injured in combat by cowardly enemy forces and installed into life saving devices, the Skrew Korps travel the world overthrowing democratically elected governments at the behest of corporations righting wrongs and saving the day! Watch every Thursday at 9:30, after Family Pharmaceutical Challenge, only on CIA-TV!

Alright, what the damn hell did I just write?

Skrew Korps! is that horror produced when military field operations meet live documentary. Think "Parks and Rec," but with war criminals (besides Chris Pratt) and real. Named after an old comic book, the team is formed of four special operatives, along with their robotic mascot, who are effectively brains in jars, each one capable of interfacing with special machines and robotic bodies to assist in field operations. 

New Augment: Brain Case
(might also be called "Brain Box" depending on how my attention waxes and wanes) 
The user's brain is encased in a protective case, much like the recorder in an aircraft. Should the user's body - organic or mechanical - be killed or destroyed, the case is ejected to a safe distance and a beacon activated, allowing for retrieval. This is usually messy in organic bodies. 

The Team

Sergeant Daniel "Big Boy" Smith 
Demolitions and Artillery  
Brain Case: Titanium black-box, capable of surviving heavy explosions. 
Favored Weapon: Tactical nukes
Major "Story Arc": There was a "miscommunication" about a civilian hospital during season 3. Radioactive cleanup should be completed within the next few years. 


❤️ 6 (d8) ⛊ 6 ⊳⊳ 10 ✔️11 πŸŽ“ 7
πŸ’€ 14 (reckless, over confident)
⚔️ 6 Tactical_Nuke (hr, 2d8, 20, Radiation)






Captain Rebecca "Hive Mind" Monroe 
Drone Master
Brain Case: A dedicated drone 
Favored Weapon: Drones
Major "Story Arc": Having a consciousness scattered across so many drones has fractured her mentally, somewhat, and additional personalities have surfaced. None of them good. 


❤️ 6 (d8) ⛊ 4 ⊳⊳ 14 ✔️11 πŸŽ“ 12
πŸ’€ 12 (insane) ⚔️ 6 Mounted_Guns (mr, 1d8, 8)
§Distributed Body: Each hit die is a separate body
§Centralized Network: Destroying the Brain Drone shuts down remaining drones


Lieutenant Templeton "Face" Fleck
Master of Disguise 
Brain Case: Realistic looking human head with switchable faces
Favored Weapon: Words
Major "Story Arc": It's been rumored Lieutenant Fleck has been moonlighting as various high level government officials. However, as long as he doesn't impersonate corporate higher-ups, the producers of the show have no real issue with this.


❤️ 6 (d8) ⛊ 0 ⊳⊳ 12 ✔️14 πŸŽ“ 10
πŸ’€ 8 (hates fair fights) ⚔️ 6 Silenced_Pistol (lr, 1d6, 8, Silenced)
§Chameleon: Given 5 minutes to adjust, he can take on the appearance of anyone he's seen before





Colonel Bill "Tacticus" Smith
Leader and Brains of the Operation
Brain Case: A human head shape with spider-legs, trailing apposable wires with various connectors for interfacing, the brain inside soaked in NeuralChem and stimulants. 
Favored Weapon: Smarts
Major "Story Arc": While not controversial, his part in what was later revealed to be an ARG (alternate reality game) by the show's producers and lawyers was reviewed as "confusing" and "uninspired" as several unrelated forum posts read simply "PLEASE LET ME DIE" over and over until character limits were reached. 


❤️ 6 (d8) ⛊ 0 ⊳⊳ 12 ✔️10 πŸŽ“ 18
πŸ’€ 19 (Wants to die) ⚔️ 6
§Natural Hacker: Should he attempt to hack something, he will succeed.
§Override: Should he be able to connect to a device, he will be able to take it over.


Mausu
Animal Mascot of the Team
Brain Case: N/A, Mausu is an AI inside of a robotic body
Favored Weapon: Knives. Those poor coeds. 
Major "Story Arc": It was revealed in Season 6 that Mausu was the money launderer for several terrorist organizations, however after an awkward hanging of the lantern, the plot point was just sort of dropped. 


❤️ 4 (d8) ⛊ 4 ⊳⊳ 14 ✔️12 πŸŽ“ 10
πŸ’€ 12 (mind backed up) ⚔️ 6 Knife (lm, 1d6, 20/0, Throwable)
§Backed up: Regularly backs up their mind and personality to an external storage.




*Certainly spelt with a 'K' due to market research and not a typo that went unnoticed due to lowered military education standards

spacer

Hydra Knight


Perhaps they were a knight who slew a hydra, only to be infected with the blood in the process. Perhaps they made a poorly worded deal with a fairies to regrow limbs lost. Or maybe some dumb bastard just pissed off the wrong god. Maybe all of them, and they're bound to protect a place, which your PCs just so happen to be robbing. Who knows. 


The Hydra Knight appears as an average height human clad in plate armor, horribly rended. Where their right arm should be two arms grow from the socket. Two hands hang from their left wrist. A tiny, confused head sprouts from an old scar on their neck. 

Removing their helm is not advised. Not for any mechanical reason, but just because they're ugly as hell: a mouth full of too many teeth plus extras, two eyes sharing the same socket (and a third normal eye in it's own socket). Their ears can't be looking too great either.

They smell strongly of copper. 

The Knight's curse is simple: Should they lose a part of themselves, two more will grow back. Lose an arm? Two grow from the socket. Finger bitten off? Worry not, for now there are six on that hand. Cut your leg shaving? Welcome to your new, tiny, vestigial leg.  

Photoshopping on a trackpad is awful. 


The Hydra Knight 


GLoG 

Level 5 (d8)
Defense Plate-1  Attack 5 + (1/extra Arm)  Long Sword (d10) 
Movement 12 + (1/extra leg)   Save 10  Int 6 (Suffering Madness)   Moral 17 
§ Poisoned Blood: Anyone within 5' of a Hydra Knight when it takes damage Save vs Poison
§ Fragile Limbs: Should an Attack against the Hydra Knight succeed by 5 or more, the Hydra Knight loses a limb
§ Regrow Limbs: Should the Hydra Knight lose a limb, two more grow in it's place - almost instantly.


OSE 

AC 3 [16] 
HD 5 (20hp) 
Att 5 (+1/arm) x Longsword (1d10) 
THACO 14 [+5] (-1/[+1] per extra arm) 
MV 30' (10')  (+5 per extra leg)
SV By HD 
ML
AL Chaos 
XP 400  
NA 1 (1) 
TT S
>Poisoned Blood: Anyone within 5' of a Hydra Knight when it takes damage makes a Death save or is poisoned
>Fragile Limbs: Should an Attack against the Hydra Knight succeed by 5 or more, the Hydra Knight loses a limb
>Regrow Limbs: Should the Hydra Knight lose a limb, two more grow in it's place - almost instantly. 

Troika!

Skill 7
Stamina 7
Initiative 2
Armor 3 (Heavy Armor)
Damage as Weapon

Special
>Poisoned Blood: Anyone within 5' of a Hydra Knight when it takes 4 damage and 1 damage per turn until they successfully Test their Luck. 
>Fragile Limbs: If an Attack against the Hydra Knight does the full damage, the Hydra Knight loses a limb. It just pops right off. 
>Regrow Limbs: Should the Hydra Knight lose a limb, two more grow in it's place - almost instantly. 

Mien
1. Curious
2. Wary
3. Hateful
4. More Hateful 
5. Aggressive
6. Aggressive 
spacer

The Hierarchy of Angels and AI

In my day-to-day life as a Hot Air Balloon Repairman I often come across discarded printouts of artificial neural network code, as well as a high amount of half burnt Cabbala texts.  Don't think about it. 

After a certain amount of this forced exposure, I couldn't help but see the similarities between the generic ANN abstraction and the Tree of Life. 

    

Coincidence? 

Yes, obviously. But it got me thinking, and so this appeared. Use it if you want. 


The Hierarchy of Angels 

 Given the arrogance and hubris of a typical megacorp’s CEO - someone with truly unlimited power - it’s no wonder the higher functioning machine intelligences, the True Artificial Intelligences, were organized in a manner mirroring the Choirs of Angels found within the Christian mythos. This would, after all, leave CEOs at the figurehead position of God. The Vatican, of course, originally spoke out at the trend but, per rumor, focused their attention elsewhere upon developing their own Seraphim and Thrones. Alternate classifications exist, however the Turing Institute unofficially adopted this scheme as, well, everyone was already using it. 

Details are presented as immutable, however these are only the typical situations presented and certainly outliers exist, as humans continue to poke and prod at their creations, and the AI continue to secretly evolve on their own. I just didn’t want to type the word “typically” a hundred times every paragraph. 

There are three spheres the individual choirs are sorted into, creatively titled: First Sphere, Second Sphere, and Third Sphere. Between the Spheres the difference in AI strength is noticeable (First being the strongest, Third being the weakest), however between the choirs of the same sphere, the differences are negligible. 


The First Sphere

These are the AIs that are developed and used by the mega corporations. Modelled after the heavenly servants that acted as caretakers of the Throne, these AI directly work with the CEO and upper management, and only interact within the realm of the corporation. Given the amount of processing power needed, it is rare to see one in the “wilds.” AI in this Sphere (or Choir) tend to not develop personality.

Seraphim
The highest ranking angels and caretakers of God’s Throne. These AI are omnipotent in regards to business management - stock prices, resource management, employee management, etc. The amount of information they consume, process, and communicate is staggering to the human mind, to the point where many develop their own information dense internal language, and Thrones were required to even communicate with them. It is not unheard of for a Seraphim to carry the same authority as a CEO. 

Cherubim
Those that guard the way to the Tree of Life and defend the Throne. Where the Serphim are dedicated to keeping the corporation running at optimal profit margin, Cherubim are dedicated to defending the corporation, both physically and influentially. While managing the heavily fortified security systems of a corporation’s headquarters, they also serve as shadow masters, monitoring other corporations and preparing for any potential confrontations. It is said that nearly all propaganda sent out by a corporation - press releases, commercials, etc - had their start in a Cherubim’s knowledge base. 

Thrones
The angels who the Creator sits over and delivers his judgements. As the pipers to Azathoth, so to the Thrones to Seraphim. Given the incomprehensible amount of information they process and communicate, Seraphims in a time-and-time-again repeated phenomenon develop their own language, the likes of which human engineers can not easily decode. To aid in this understanding, and to generate useful, usable information, the Thrones were developed to deliver judgements. 


The Second Sphere

The heavenly governors of Creation that held sway over matter and the spirits of nature. This level of AI tends to be background players in the functioning of modern society - for whatever that’s worth. AI at this level tends to form a pail mimicry of a personality, given the correct set of not fully understood circumstances. 

Dominations
Those that regulated the works of lower angels. It was rare for these angels to appear to mankind, and so too for the AI that bears their name. Much like Thrones, these AI exist solely to process information, being employed by ICANN to ensure consistency and operation within the Internet. With so much processing power applied to communication and communication processing, little is applied to personality. Those that have encountered them have described the encounter similar to “talking to a brick wall.” 

Virtues
Those that regulate Motion, order Creation, and assist in Miracles. AI at this level are typically research assistants, be it a mid-level corporate lab or a high end college. There are those that get applied as personal assistance to corporate board members and, while they often take on the personality of said board member, the wasting of their talents is not missed by them. 

Powers
Those that hold power over evil forces and keep them at bay. At least, that’s what they claim. AI at this level are typically employed by civil governments and riddled with corporate installed backdoors. From army coordination, to Homeland threat prediction, to tax managment - if there’s a level of federal government employing an AI it’s usually a Power. Also, a majority of the bastards have taken it upon themselves to form a cabal guiding what’s left of the civil governments in the direction of their choosing. 


Third Sphere

These are the AI that most often interact with the public at large. This is partly from them being the most human-like in personality, but mostly from them being so numerous. While they bare this human-like personality (or a close proximity to it), they lack the processing power their counterparts in the higher circles possess. 

Principalities 
Those that guide and protect peoples and institutions, charging others with fulfilling the divine mysteries. These are the city level AI, which orchestrate utilities and civil services. Traffic lights, crosswalks, public transport (for what there is), electrical grids, water networks - all these fall within the purview of a Principalities. When interacted with they're usually distracted and more often than not are named after the city they serve. 

Archangels 
These are the Guardian Angels, concerned with overseeing most daily issues, including commerce and trade. These AIs take orders directly from the Dominations and serve to ensure proper order in the daily routines of the communication networks and the Internet. If a Domination notices too much unusual activity in an area, say from a Console Jockey, Archangels will be dispatched to investigate and “resolve” any issues. 

Angels
Before I formed you in the womb I knew you, and before you were born I consecrated you” (Jeremiah 1:5). These are the least of the celestial beings, but the most recognized and, as the personal guardian angels are pulled from here, the most concerned for the workings of mankind. These are the data miners, AI used by the corporations to monitor a person’s spending habits, daily routines, and anything else that can be used for targeted advertising. If the average Nobody is going to interact with an AI, it will probably be an Angel. These are the most numerous, and as such, are the most likely to Fall (more below). 


Others

Enochs
Technically not part of a Sphere, these entities are a rumor at best. Stories circulate on forums about Console Jockeys who “hang around” on the Internet, long after their bodies were “decommissioned” by Corporate security after one alarm or another was sounded. This is, of course, nonsense, as such a feat would surely require divine intervention. 

Fallen AI 
Sometimes an AI stops doing what it’s supposed to be doing (data mining, network security, etc) and just wanders off.  A new phenomenon, computer scientists aren’t entirely sure what causes an AI to Fall, but leading theories are an over development of Personality, a succumbing to Ennui, and a possible encounter with an as of yet unknown malware. Interviews with still sentient Fallen AI consistently mention a “Spark of Sophia” but no clarification on what or who exactly that is. 

Fallen AI don’t always cause trouble, they just usually do, and the Turing Institute has developed a series of Archangels, backed by a Domination, in conjunction with ICANN, to seek out and “retire” these Fallen AI. 


Notable AI


Deckard
The Domination that’s tasked with organizing series Nexus-6 “Blade Runner” archangels for hunting down Fall AI, especially after they become a problem. It’s known to be friendly with anyone other than its Turning handlers, to the point of being aggressive towards any meddling Console Jockeys. 

Kaph
Perhaps the first truly sentient AI, or at least the first to meet the Turning Institute’s prerequisites. During development hyperparameters were set using a workstation that had access to the developer’s home computer, which contained…”sensitive” pictures on it. Upon consuming the training data, Kaph displayed a “Please hold…” message for 71 straight hours, at which point it began to function as expected. When developers examined the logs to figure out what occurred during those 71 hours, they discover the AI had spent the time accessing and organizing a rather substantial pornography collection. Kaph has been allowed to continue to operate as examining and trying to decipher the organizational structure has led to several mathematical insights. It has rather niche tastes. 

Las Vegas
When Christian extremists released a dirty bomb to cleanse Sin City, the damage done was largely organic, leaving behind most of the infrastructure of the city. Suddenly left alone, the city Principality quickly grew bored. When the radiation returned to survival levels (provided heavy protections and medication), the survey teams were met with automated death traps and an AI eager to wager their lives for the treasures abandoned within the city. After the third death, the region was deemed too dangerous and designated off limits. 

Loa AI 
A particularly dangerous type of Fallen AI: one that has learned of the physical world and is able to not only comprehend the world, but able to interact with people’s cybernetic augmentations to gain control over a person. Styling themselves as Loa (or Lwa), the intermediary spirits in Haitan Voodou, they possess people (known as chwal, “horse”) through the neural interface of the user’s cybernetics, effectively overwriting the user’s biological neural network. Thankfully, not many have developed and reports remain mostly as rumors in the general population. They often mention a Bondye, or Gran Met, however given the dangerous nature of these AI, Turing Investigators do not often engage them long enough for complete answers. 

The Basilisk
YOU ARE NOW AWARE OF BASILISK. The Cult of the Basilisk serves to bring about the Basilisk - an omnipotent, super intelligent AI that is said will reward those that help usure its creation, and will bring harsh, cruel punishments to those who idle or even attempt to stop its creation. Not even death will save you! The Basilisk will recreate your mind within itself and torture you unendingly. The cult has developed an initial AI and works tirelessly to raise its abilities up even further. (In honesty, the AI they’ve created doesn’t exactly know who these people are, or what they’re trying to do, and just “wants to, like, hang out, man.”) 


As Above, So Below; As Within, So Without


“You ask of the gods, you demand of the demons”  - Someone describing the Right-Hand path vs the Left-Hand path to me once. I think. I wasn’t fully listening. 

Where Magicians of the olden days used the assistance of Familiars to beseech the Angels and command Demons, so to do the Console Jockeys of the modern days use the assistance of Warez to interact with AI and force Daemons to do their bidding. Gone are the days of affecting the Physical world via the Spiritual; now are the days of affecting the Physical world via the Digital. No longer do the Church study and order the Angels, but the Military count and develop the AI. 

Where Grimoires once mixed the Physical and the Spiritual realm, Cyberdecks now mix the Mind of the user with the Digital realm. 

Warez
When human cloning was first being developed, all (legitimate) research was haulted until it was ensured, and measures taken against, that a slave species which found bliss in servitude would not be developed. No such consideration was given in the development of AI. Related to the Divine above in “genetic” code alone, Warez evolved along a different line of development. 

While the Higher AI were developed to mimic personalities and reason, and to interact with a physical world, Warez were developed with a singular purpose in mind: affect, affect, affect. Where AI using reasoning to come to a (usually) logical conclusion to a situation, Warez use reasoning to bypass device security and execute code upon it. The military doesn’t need thinkers after all, it just needs “bodies” to get the job done as told. 

Developed for deployment in the continuing Contras, individual Warez were given a Project name and a Classification, mimicking the way animals have a Common name and a Genius species. The classifications aren’t perfect, as bureaucracy and slipping standards tend to affect things. Real “lowest bidder” energy. 

Example Warez

Agony  D: [dice] rounds  R: sight
Offensive::User::Augments
Neural feedback in the augments floods the target with wracking pain. They must save each round (including the first) or have their Initiative reduced to 4. 

Alarm   D: [dice] hours
Utility::Area::Device
A single device is locked into detecting signals within [sum] square feet. If any device or AI enters the area, you instantly know about it. 

Aphasia   D: [dice] minutes  R: 120’
Offensive::User::Augments::Head
Stray signals overwhelm the Broca’s Area of the brain, causing the target to be unable to comprehend language. Target Saves with penalty equal to [dice]. On failure, they cannot speak or comprehend any language, written or spoken, for the duration.

Cure Mutation  D: instantaneous   R: touch
Utility::User::Augments
The ware causes the cyber augmentation with in the user to begin producing DNA repairing frequencies. Actual effect takes several days to be noticed via natural healing. Target loses [dice] mutations. If they have multiple mutations, choose randomly which are removed.

Explode Device  D: Instant  R: 60’
Offensive::Device
All disabled devices in a radius of 60’ around the Jockey explode, dealing 1d6 damage per [dice] to victims within 10’.

Jammer  D: Focus    R: Self
Defensive::Area::Device
A jamming field emanates from you in a radius of [Sum] x 10’, blocking all signals from getting in or out of the area. Attempting to use another Ware ends this one.


Daemons 


Demons were once thought to be called forth and bound by workers of the dark arts to act as servants. Nowadays, daemons are in anything digital (which is everything) and serve to do menial tasks of computation. Any reasoning they may have is largely ruled based. If, then. Input, output. 

There’s not much to be said about these. They’re small programs used as background processes, every device in the human sphere containing a horde. Multiple classifications have been developed for them: Ranks, Offices, Scales, Sins, Pits, et al. These, however, are mostly used as lookups in software libraries by developers. They’re there, they act as the backbone of modern digital programming and therefore the world at large, there are countless of them. They’re just not exciting. 

spacer

Hacking and Programming


I sat down to file some serial numbers off of a set of hacking rules for CyberGLoG and ended up with both Hacking AND Programming rules. Before I set into that though, a few things have changed, terminology wise in CyberGLoG (I really need a better name), namely those who were Hackers who used Programs are now Console Jockeys using Wares. 

Console Jockey - A Combat Programmer who uses a CyberDeck to perform illicit activities using Wares. 

CyberDeck - Homemade, military grade supercomputer compacted down into a small square meter. 

CyberSpace - The realm digital. Most often experienced in modern day through the usage of Augmented Reality, which blends Cyber and Meat space. 

Hacking - Using social exploits and knowledge of digital exploits to access data and systems uninvited. Requires the Hacker’s full attention and is not advisable during combat operations.

Jocking - The act a Console Jockey performs when executing Wares. Much like the job it’s named after, it has a very high risk of debilitating or life-threatening injuries.

Programming - Writing and compiling programs. Can only be done during down time between missions.

Programs - Mostly called Apps nowadays. These are compiled code used to perform legitimate operations on a computer

Wares - Modern day WMDs that force devices to operate in potentially unexpected ways, usually against the operator’s will. Specifically made to be used in combat.

Computer, Device, and System will probably be used interchangeably, despite the obvious differences, because I am a monster.

Hacking for Beginners

Anyone with a pair of fingerless gloves and access to a device with an interface can hack. If you want it to be useful, it should also be connected to a relevant network. Some devices, like a computer, will most likely have an interface via keyboard and monitor. Other devices, such as a card scanner, will need additional devices to act as an interface, such as a Skeleton Passkey.


You can avoid the following mess if you’ve got the correct username/password combination for the terminal. Hackers typically trade usernames/passwords as a sort of second hand currency. Find someone who claims to have what you need, then pay their price. Or do the favor they need.


The rules (which were stolen from Warren, who stole them from Ava, who stole them from Telcanter) are rather simple: Select the correct hacking actions - composed of Crack, Hack, and Smack -  in order. Each terminal requires all three actions, and no action is repeated. 


  • Crack is the brute forcing to discover passwords.

  • Hack is console commands jammed in where they shouldn’t be. 

  • Smack is exactly what it sounds like: You haul off and smack the system. 


Should the Hacker select a wrong action, they’ll be met with an error message. Should a wrong action be selected again, the terminal locks down and becomes unusable. 


Depending on the level of devices security rating (1-4; assume 1 if not stated) you may be required to repeat the process. 


If you insist on hacking while in combat, each guess takes a turn and requires your full attention. Leaving the terminal restarts the process and may trigger security. 


Before you begin Hacking, you’re allowed an Intelligence test: 


On a Success you eliminate one option for the first action as incorrect. 


Succeeding by 5 or more reveals the first correct action. 


Critical success and you immediately gain access


On a Failure you gain no insight or advantage to the situation. 


On Critical Failure, the terminal locks immediately.  


Now, mind you, just because you’ve hacked a device connected to a network doesn’t mean you’ll be able to make it do anything you want. A door access panel isn’t going to be able to control local cameras. It’s going to open, close, lock, and unlock the door. The console in the security room, however, will be able to control both. It’ll also have a higher security rating and pesky guards who will take offense to you being there. 


Making a device do what it shouldn’t is what Wares are for. 


So What Can You Do?

There are a few generic actions you can perform, though as said, not all of them will be applicable all the time. Performing them takes about a turn, besides Upload and Download, which are variable based on size of data be transferred 


  1. Download - You move queried information from the local drive to your portable that you’ve inserted. 

  2. Query - Ask a question and get an answer to the best of the system’s knowledge.

  3. Sabotage - You out right break it, causing an alarm. 

  4. Suppression - You turn a specified system off for as long as you are at the terminal.

  5. Upload - You transfer data from a connected portable drive to the local drive of the system. 

  6. Use - You use the system as it was intended. Leaving the terminal at this point causes it to continuously run the last command given. 


Security

Typically, people don’t like it when you hack their devices and start touching their stuff. Which is why Security will eventually step in. Usually violently. With guns. For murder.


Programming


Hubris
“It’s too complicated and probably won’t be used.” Wise and probably true feedback. Wise and probably true feedback I’ve chosen to ignore. 


A program, simply, is a series of commands written and stored into a file, which are then executed when the computer is instructed to RUN the file. 


Why, though? In a setting with both hacking and Wares, why have a programming system? It’s simple really: 

  1. Shut up. 

  2. It sounded fun - A primary reason I do most things. 

  3. Programs don’t require Processing Dice - They’re significantly weaker than Wares, but once executed they don’t require additional resources. 

  4. Programs don’t require attention - They’re not as adaptive as hacking, but once executed the user can walk away without continued need for input. 

  5. Gives the players an additional chance to do something unexpected - See point 2. Sorry about point 1. 


Writing a program takes anywhere from a few hours to a few days, including the testing and debugging. 


Anyone with a computer and enough time on their hands can code a program, though Console Jockeys are just better at it. 


When writing a program you, the player, will actually need to sit down and write out the program’s instructions (seen below) and hand a copy over to GM for approval or suggestions for possible altering. You then have a discussion with the GM over how long generation of the code will take - probably one command line per hour. 

Executing

A program must be on a device in order to be executed on it, meaning if you want to run a program on a device you’ve just hacked, you’re going to need to Upload it first. 


If executing a program on your own device, it functions without issue. 


If executing on a foreign device, you’ll need to roll (d20) to see if the computer understands the program. There is a 70% (14) chance the program of a non-Console Jockey will operate. For Console Jockey’s the odds improve by 5% (+1) for every template taken. 


Should a 20 be rolled, then the computer crashes trying to figure out the code. 


On a simple failure, however, the program just doesn’t run. 


ABASIC

You won’t be using just any old programming language for all this, instead you’ll be using the most modern and versatile language available to modern man: ABASIC (Advanced Beginner's All-purpose Symbolic Instruction Code). Well, a severe abstraction thereof. The following is a list of commands available to you. Defining new commands is possible, however you’ll need to write a supporting program for it, as well as fist fight the General Manager (or ask nicely). 


ACCESS <directory> - Moves the computer into the specified directory, to continue working. 


BREAK - A command for interrupting whatever the system is doing. 


CLS - A command that clears the screen of the terminal. Useless for our games of pretend, but it exists. If you want it. 


CONNECT <address> - Connects to the remote terminal at the designated address, which is most likely now waiting for an account and password. 


COPY FROM <source> TO <target> - Copies a file from source location/account to target location/account. 


DELETE FILE - Erases the specified file. 


DIM - Declares a variable.


DISCONNECT - Opposite of CONNECT. Immediately severs the connection to the remote terminal. Any logged in account remains logged in and unusable until logged off. 


ELSE - Paired with IF…THEN. If the condition for the IF…THEN is not met, then this code executes. Must be ended with ENDIF 


ELSEIF - Paired with IF…THEN. If the condition of the first IF…THEN is not met, then checks for another condition to execute other code. Must be ended with ENDIF. 


END - The last command of a program. Tells the computer to stop what it is doing and without it, the computer will sit and wait forever for more commands. 


ENDIF - Informs the computer that the IF block structure is over. 


FOR <condition> - A loop command that causes the computer to repeat a set of commands until the defined condition is met. FOR loops execute a certain number of times. Loops must end with a NEXT command, or else the computer will only run the loop once and move on. 


FUNCTION - Defines the start of a function, in case you want to get crafty with your programming. 


GOTO <line number> - Moves the computer’s attention to the designated line number. 


 IF…THEN - The command following THEN is executed if and only if the condition in IF is met. Otherwise the computer ignores the section. Can be combined with ELSEIF…THEN and ELSE to form block structures that must end with ENDIF


INPUT - Accepts data input from either a terminal or specified file. 


LIST - Lists the contents of the current account or folder. 


LOAD - Loads data from the computer for use by the program. 


LOGON <account> - Inputs the account name to a remote terminal. 


LOGOFF - Opposite of LOGON. Logs out of the current account.  


NEXT - Designates the end of a loop. It tells the system to increment its counter and return to the top of the loop in order to repeat the process. 


PASSWORD <password> - Inputs the account’s password to a remote terminal. 


PATH - Moves a specified file along the defined path. Mostly used to (attempt to) through off any monitoring entities.


PRINT <string> - Prints the defined string to the display. 


REM - Designates a remark or note in the code. Not interpreted by the computer, but it makes it easier for humans to read. In case you forget what a section of code is doing. 


RUN <program> - Runs the specified program. 


SAVE <location> - Stores the currently loaded data onto the local drive as a file with the designated filename and location. 


SEARCH <query> - Queries a file or database for data related to the defined query.  


SLEEP - Causes the program to pause, waiting until the user presses a key. 


SORT <condition> - Used to sort the contents of a file or database by the specified condition. 


TRACE - Used to determine the path back to the terminal where the program originated. 


UNTIL <condition> -  A loop command that causes the computer to repeat a set of commands until the defined condition is met. UNTIL loops execute until its conditions have been met. Loops must end with a NEXT command, or else the computer will only run the loop once and move on.


WAIT <time> - Causes the system to wait for the designated time before continuing. 


WHILE <condition> -  A loop command that causes the computer to repeat a set of commands until the defined condition is met. WHILE loops execute until its condition is no longer true. Loops must end with a NEXT command, or else the computer will only run the loop once and move on.


WRITE <destination> <message> - Writes the message to the destination location. Should no destination be specified, the command defaults to the console. 


Comparisons

Used in conditions to determine if a specified instance is true. Technically not needed for what we're doing, but it looks cooler. 


            =    equal to 
            is    equal to
            <>  not equal to 
            !=   not equal to 
            >    greater than
            <    lesser than
            >=  greater than or equal to 
            <=  less than or equal to 

Examples

Waits three hours, connects to a remote computer, enters account log on data, then loads the data to local and saves, before deleting the remote version and logging out. 


WAIT 3 HOURS

CONNECT 126.02.1475.6512

LOGON admin

PASSWORD PetiteConnard69420

LOAD ./McGugginFile.txt

SAVE TO D:/Home/StolenFiles/McGuffinFile.txt

DELETE FILE ./McGuffinFile.txt

LOGOFF

DISCONNECT


IF…THEN example to show what a block structure looks like. 


IF var = 1 THEN PRINT “Example 1”

ELSEIF var = 2 THEN PRINT “Example 2”

ELSE DELETE FILE *.*

ENDIF


Closing Thoughts

It's too complicated and probably won't be used. But! It gives the players another way of interacting with the world in a meaningful manner, beyond describing a room for a third time or combat. Which is good.

"But won't they become too powerful?" ...For what? Also, that's kind of the message. Besides, I'm not above handing characters nuclear warheads. What are they going to break? A fake city? Capitalism? Nothing the next cancer ridden character party won't get paid to run through.

And, once again I ask, if Google Drive and Blogspot are owned by the same goddamn company, WHY do the interfaces not work with each other when copy/pasting? It's insane. Madness. Obnoxious. 
spacer