Difference between revisions of "Future Imperfect-specific Rules"

From RPGnet
Jump to: navigation, search
m
 
m
Line 5: Line 5:
 
The easiest way to prevent brain hacking is simply to not have a neural interface.  If one is not connected, one cannot be hacked.  However, such people are increasingly rare in today’s society, and so other methods must be devised.  The best method that is currently available is the “personality barrier.”  Personality barriers wrap the mind in one or more digitially-created, fake personalities which confound and misdirect attempts to access the true mind of the subject.  Exceptionally potent military-grade personality barriers have even been known to trap or back-hack intruders in order to neutralize them.
 
The easiest way to prevent brain hacking is simply to not have a neural interface.  If one is not connected, one cannot be hacked.  However, such people are increasingly rare in today’s society, and so other methods must be devised.  The best method that is currently available is the “personality barrier.”  Personality barriers wrap the mind in one or more digitially-created, fake personalities which confound and misdirect attempts to access the true mind of the subject.  Exceptionally potent military-grade personality barriers have even been known to trap or back-hack intruders in order to neutralize them.
  
Game Mechanics
+
 
 +
'''Game Mechanics'''
  
 
Mechanically, there are three types of brain hacking in Future Imperfect, each of which serves a slightly different purpose.  They are:
 
Mechanically, there are three types of brain hacking in Future Imperfect, each of which serves a slightly different purpose.  They are:
Line 13: Line 14:
 
# The Full-Intrustion Hack
 
# The Full-Intrustion Hack
  
The Misdirection Hack is used to confound and confuse its victims by inserting false sensory information into their heads.  This is done using the Illusion power (EM pg. 51) with the required Restrictions “Requires active Neural Interface” (-2BP) and “Affected by Personality Barrier” (-1BP).
+
The Misdirection Hack is used to confound and confuse its victims by inserting false sensory information into their heads.  This is done using the Illusion power (EM pg. 51) with the required Restrictions “Requires active Neural Interface” (-1BP) and “Affected by Personality Barrier” (-1BP).
  
The Quick-and-Dirty Control Hack allows the hacker to take direct, temporary control of the person who is being hacked.  The basis for this the Mind Control power (EM pg. 56) with the required Restrictions “Requires active Neural Interface” (-2BP).
+
The Quick-and-Dirty Control Hack allows the hacker to take direct, temporary control of the person who is being hacked.  The basis for this the Mind Control power (EM pg. 56) with the required Restrictions “Requires active Neural Interface” (-1BP).
 
   
 
   
The Full-Intrustion Hack is a complete invasion of the victim’s psyche, allowing for varied and long-term effects.  Outcomes similar to those caused by the Misdirection and Quick-and-Dirty hacks can be achieved with Full-Intrustion, but it generally takes much longer to accomplish.  For Full-Intrustion hacking, use the Telepathy power (EM pg. 67) with the required Restrictions “Requires active Neural Interface” (-2BP).  The actual act of Full-Intrusion hacking someone’s brain is conducted using the rules for Mind Combat (EM pg. 100).
+
The Full-Intrustion Hack is a complete invasion of the victim’s psyche, allowing for varied and long-term effects.  Outcomes similar to those caused by the Misdirection and Quick-and-Dirty hacks can be achieved with Full-Intrustion, but it generally takes much longer to accomplish.  For Full-Intrustion hacking, use the Telepathy power (EM pg. 67) with the required Restrictions “Requires active Neural Interface” (-1BP).  The actual act of Full-Intrusion hacking someone’s brain is conducted using the rules for Mind Combat (EM pg. 100).
  
 
Personality Barriers use the Mind Shield power (EM pg. 56).
 
Personality Barriers use the Mind Shield power (EM pg. 56).
 +
 +
-----
 +
 +
[[Future Imperfect]]

Revision as of 18:19, 11 February 2007

Brain Hacking

Just as the networking of computers in the late 20th century gave rise to the computer hacker, so has the networking of human minds given rise to the brain hacker. Now that our neurons can be translated into ones and zeroes, they are just as vulnerable to manipulation and predation as our mainframes. While legitimate uses of brain hacking technology exist (medical and psychological procedures and, in some countries, police and military interrogations being the most common), the majority of brain intrusions are illegal.

The easiest way to prevent brain hacking is simply to not have a neural interface. If one is not connected, one cannot be hacked. However, such people are increasingly rare in today’s society, and so other methods must be devised. The best method that is currently available is the “personality barrier.” Personality barriers wrap the mind in one or more digitially-created, fake personalities which confound and misdirect attempts to access the true mind of the subject. Exceptionally potent military-grade personality barriers have even been known to trap or back-hack intruders in order to neutralize them.


Game Mechanics

Mechanically, there are three types of brain hacking in Future Imperfect, each of which serves a slightly different purpose. They are:

  1. The Misdirection Hack
  2. The Quick-and-Dirty Control Hack
  3. The Full-Intrustion Hack

The Misdirection Hack is used to confound and confuse its victims by inserting false sensory information into their heads. This is done using the Illusion power (EM pg. 51) with the required Restrictions “Requires active Neural Interface” (-1BP) and “Affected by Personality Barrier” (-1BP).

The Quick-and-Dirty Control Hack allows the hacker to take direct, temporary control of the person who is being hacked. The basis for this the Mind Control power (EM pg. 56) with the required Restrictions “Requires active Neural Interface” (-1BP).

The Full-Intrustion Hack is a complete invasion of the victim’s psyche, allowing for varied and long-term effects. Outcomes similar to those caused by the Misdirection and Quick-and-Dirty hacks can be achieved with Full-Intrustion, but it generally takes much longer to accomplish. For Full-Intrustion hacking, use the Telepathy power (EM pg. 67) with the required Restrictions “Requires active Neural Interface” (-1BP). The actual act of Full-Intrusion hacking someone’s brain is conducted using the rules for Mind Combat (EM pg. 100).

Personality Barriers use the Mind Shield power (EM pg. 56).


Future Imperfect