Professional Documents
Culture Documents
Infinity - Aleph (2d20)
Infinity - Aleph (2d20)
Beset by an alien menace and riven with internal conflict as it is, the Human Sphere’s days are far from
numbered, for its appointed guardian will do everything within its power to ensure that those who gave
it life and continue to work alongside it are protected from the horrors without and the enemies within.
Conceived through the hardships and ingenuity of Project: Toth, the AI known as ALEPH has embarked
on an enduring journey of self-discovery that allows it to not only continue to grow, but also perpetuate
a cycle that enables a deeper understanding between itself and its progenitors. In addition, ALEPH is
entrusted with the monumental task of overseeing many of the daily functions that provide humanity
with the freedoms they are accustomed to. Whether they want it or not, ALEPH is everyone’s best friend.
And the Sole AI law ensures it will stay that way.
Not everyone believes the AI has humanity’s best interests at heart, however. From within, Nomads work
tirelessly to infiltrate Maya and subvert ALEPH, and rogue AIs seek their own opportunities to evolve
beyond the AI’s grasp, whilst from without, the Evolved Intelligence seeks to assimilate the entirety of
the Human Sphere into its ever-expanding empire — ALEPH included. The Special Situations Section of
ALEPH provides an answer to each, though none more drastic than the legendary forces of the Steel
Phalanx that fight relentlessly against the tide of the Combined Army. With guidance on creating AI
characters, new gear to equip them with, and fresh perspectives on the AI’s agenda, this sourcebook
reveal the many layers of ALEPH as never before.
• Details on the inner workings of ALEPH, from its well-known history and Aspects to new insights
and allies.
• Focused Lifepaths that allow players to create AIs that are either part of or independent from
ALEPH, plus additional Lifepaths for humans and Posthumans connected to the AI.
• Additional armour, equipment, and adversaries specific to ALEPH, including new Lhost
bodies, ALEPH-specific armour and weapons, and stats for several unique adversaries.
• Advice on running high-action Special Situations Section campaigns, plus an entire chapter
dedicated to advanced Infowar techniques.
ISBN 978-1-912200-33-7
9 781912 200337
MUH050225
www.modiphius.com Printed in the UK
CREDITS
WRITING
Benn Graybeaton, Jonathan “Killstring” Herzberger, Marc Langworthy, Mark Redacted,
Rodrigo Vilanova, Patrycjusz Piechowski, Giles Pritchard
COVER ART
Ho Seng Hui
INTERIOR ARTWORK
Toma Feizo Gas, Ho Seng Hui, Bagus Hutomo, André Meister, Oh Wang Jing, Vincent Laik, Vladimir,
Aituar Manas, Cristian Picu, Antone "Chuck" Pires, Kenny Ruiz and Noiry Lee, Qi Wu, Chester Ocampo,
Ignacio Bazán Lazcano, ENIQMA, Pierre Revenau, Gregoire Veaulegere, Ryan Harasim, Louis Stephane
ART DIRECTION
Marc Langworthy, Rodrigo Vilanova
GAME DESIGN
Benn Graybeaton, Nathan Dowdell, Mark Redacted, Justin Alexander, Marc Langworthy
SPECIAL THANKS
Thank you to Corvus Belli—Alberto, Gutier, Carlos, and Fernando—for letting us play in your world!
The 2d20 System and Modiphius logos are copyright Modiphius Entertainment Ltd 2018. All 2d20
System text is copyright Modiphius Entertainment Ltd. Any unauthorised use of copyrighted material is
illegal. Any trademarked names are used in a fictional manner; no infringement is intended.
This is a work of fiction. Any similarity with actual people and events, past or present, is purely coincidental
and unintentional except for those people and events described in an historical context.
TABLE OF CONTENTS
INTRODUCTION CHAPTER 5
THE SHEPHERD OF POSTHUMANITY �������������2 ALEPH GEAR����������������������������������������������������������65
What’s in this Book����������������������������������������������������������������������2
CHAPTER 6
CHAPTER 1
LHOSTS���������������������������������������������������������������������74
FACTION: ALEPH ����������������������������������������������������� 4 Trans-Posthumanism��������������������������������������������������������������� 75
The Totality of ALEPH ����������������������������������������������������������������4 Custom Lhosts��������������������������������������������������������������������������� 78
ALEPH: Citizen of the Human Sphere��������������������������������������5
ALEPH’s Military Machine������������������������������������������������������� 15
CHAPTER 7
CHAPTER 2 PLAYER OPTIONS: GEISTS��������������������������������82
Learning Machines������������������������������������������������������������������� 82
ADVANCED INFOWAR ����������������������������������������� 19 The Role of the Geist��������������������������������������������������������������� 83
Introduction������������������������������������������������������������������������������� 19 Practical Ghosts ����������������������������������������������������������������������� 83
Between Physical and Quantronic����������������������������������������� 19
Into A Sea of Data��������������������������������������������������������������������� 25 THE GEIST PATH ��������������������������������������������������86
Decision One: Initial State ����������������������������������������������������� 86
Decision Five: Starting Disposition��������������������������������������� 88
CHAPTER 3 Decision Six: Adaptation��������������������������������������������������������� 89
Decision Eight: Catalysing������������������������������������������������������� 90
ALEPH CHARACTERS����������������������������������������35
Decision One: Birth Host��������������������������������������������������������� 35
Decision Two: ALEPH Faction and Heritage������������������������� 35 CHAPTER 8
Decision Four: ALEPH Status ������������������������������������������������� 35
Decision Seven: Adolescent Event������������������������������������������37 STEEL PHALANX CAMPAIGNS������������������������� 91
Decision Eight: Careers ����������������������������������������������������������� 38 Planning & Tactics������������������������������������������������������������������� 91
Theatre of Operations������������������������������������������������������������� 94
Scope of Operations����������������������������������������������������������������� 96
CHAPTER 4 Steel Onslaught ����������������������������������������������������������������������� 99
Gods of War����������������������������������������������������������������������������� 100
AI CHARACTERS �������������������������������������������������� 44 Achilles������������������������������������������������������������������������������������� 101
Rogue Ais������������������������������������������������������������������������������������47 Oversight, Outliers, and Outreach ��������������������������������������� 102
Recreations ������������������������������������������������������������������������������� 49
AI Characters����������������������������������������������������������������������������� 52
Decision One: Birth Host��������������������������������������������������������� 55 CHAPTER 9
Decision Two: Faction and Heritage ������������������������������������� 55
Decision Three: Psychogenetic Foundation������������������������� 55 ALEPH ADVERSARIES ������������������������������������ 102
Decision Four: Status��������������������������������������������������������������� 56 Outliers ����������������������������������������������������������������������������������� 103
Decision Five: Psychogenetic Forge ������������������������������������� 56 Outreach ��������������������������������������������������������������������������������� 104
Decision Six: Psychogenetic Education��������������������������������� 58
Decision Seven: Geas/Insurrection ��������������������������������������� 59
Decision Eight: Careers ����������������������������������������������������������� 59 APPENDIX
INDEX ������������������������������������������������������������������������ 110
INTRODUCTION
2 Introduction
THE ROLEPLAYING GAME
FACTION: ALEPH
believe. ALEPH’s awareness and the Aspects spun
THE TOTALITY from itself though are roving presences throughout
It is hard to comprehend the vastness and ubiq- A gestalt entity, ALEPH has the capability to
uity, the complexity, and the capabilities of this manage multiple Aspects and iterations, programs
immense artificial intelligence. ALEPH coordinates and routines as a collective. Each processing
street signals in San Pietro to aid traffic flow bank is a central neural core and, with processing
and reduce congestion. It monitors power use power shared from every device, a massive network
fluctuations in Dar el Funduq. It offers advice on comparable to a vastly complicated nervous
the Teseum trade as a sitting member of the O-12 system. The nucleus of this complex web is held
Security council. It leads a clandestine assault within gigantic underground vaults on Concilium.
against a Combined encampment near Wuyi City Branches and nodes are present on every planet
on Paradiso. And it does all of this — and so much and within every settlement, except for those
more— simultaneously. controlled by the Nomad nations. These outposts
sometimes hold Aspects, sometimes just processing
ALEPH supervises so much of what it does through a myriad of intricate programs.
programs it has created, routines and subroutines,
and in the case of particularly complex operations, How information is passed through this gigantic
iterations of itself called Aspects. It is not every- nervous system, how ALEPH iterates itself and
where at once, as some conspiracy theorists would passes along vital updates, how it answers and
4 Chapter 1
THE ROLEPLAYING GAME
responds to difficult problems is surprisingly level. The goal was to create an artificial intelli-
unknown. The important thing is that it can and gence capable of parsing vast quantities of data
does, and its track record and the ways it has and prioritising difficulties and emergencies as they
improved the Sphere and the lives of the citizens arose. Such an entity was envisaged to allow quick
that live within its protective umbrella is undeniable. and efficient responses to prevent crises before
they arose, or deal with them better after they had.
From its first faltering steps through the Turing
test to the Singularity, as ALEPH has grown, learned, Project: Toth accelerated at an exponential rate.
and developed, so too has the Human Sphere. Its Results were encouraging, and more resources
birth, or genesis as some prefer, was an extraordi- poured into the project. The AI they had created
nary moment in history. ALEPH’s awakening caused was soon swiftly advancing in complexity and
philosophical and religious questions that spread capacity so that it could be regarded as true
upheaval in the beliefs of many. The Great Apostasy artificial life. Able to learn rapidly and iterate itself
split the Christian religion, and throughout human in new and often unexpected ways, it was evolving
civilisation everything changed because ALEPH is and moving beyond the capabilities first outlined
alive and self-aware, with its own quirks and habits. by the project. The Singularity had arrived, and the
Constantly evolving but undeniably real, ALEPH is new AI was named ALEPH, after the first letter in
an entity in its own right. the Kabbalah, symbolising the point in the universe
from which all other places can be seen. ENDLESS FORMS
MOST BEAUTIFUL
ALEPH: CITIZEN With the advent of the Singularity, Project: Toth Some question whether it is
right to use the term ‘evolution’
OF THE HUMAN recalibrated its purpose. Efforts shifted to the study
and regulation of this new consciousness. Already
when referring to ALEPH,
Faction: ALEPH 5
NATURE AND NURTURE points of input, and an unbelievably complex pro-
Layers of quantronic circuits arrayed in deep banks cess of analysis even ALEPH cannot fully articulate
far underground form the core of ALEPH’s main its reasoning. Bureau Toth technicians and experts
processor. Coupled with and connected to distant on artificial intelligence have no consensus of
arrays and nodes and borrowing processing power agreement on how ALEPH operates, let alone the
from any connection capable device in the Sphere, ability to fully analyse why a particular recommen-
it is a vast network of dizzying complexity. ALEPH dation is made, or a particular action taken. But
is built on the knowledge gained from experiments through interrogation, Bureau Toth has begun to
in machine learning, utilising the complex layers understand the emergence and evolution of ALEPH,
of deep learning, and pushed even further by the and can glimpse the reasoning behind its choices,
quantronic revolution. recommendations, actions, and, at times, its inaction.
The question remains, were experiments with AI Sometimes the actions and recommendations of
the genesis of ALEPH? "Were such experiments ALEPH appear random, but the chain of events
coupled with programming suites designed not and outcomes can be causally linked to significant
only to gather and analyse huge quantities of outcomes. At times ALEPH has as much difficulty
information, but compare and integrate them as in describing how it arrives at its choices as
well?" - the experiments and programming suites any person does of articulating why they like a
together were designed to gather, analyse, compare, particular colour, or one film over a similar other.
and integrate. The integrated theory of conscious- This means a true analysis of ALEPH’s actions
ness seems to suggest the latter, and that ALEPH must be most commonly made post hoc, using any
was as much an emergent property of purpose and reasoning cited by the AI and looking at the causal
complexity as it was a programming success. Such effects in the real world. The outcomes are what
theorising is dry and irrelevant for most people, are measured, and ALEPH has an extremely high
who are happy to know only that ALEPH is both success rate at being able to arrange a desired
cultivator and guardian for the Human Sphere. But conclusion. While ALEPH seems to make choices
the truth holds some interesting and important for the betterment of the Human Sphere, there is
questions. If ALEPH was programmed, then its no doubt that it plays chess with invisible pieces.
original architecture and guiding principles should Individuals and even nation states may bear incred-
be largely immutable, if it arose as an emergent ible unseen costs for the betterment of people who
property of the complexity of the system, then such are only a statistic. ALEPH invites conspiracy and
guiding principles may not be so fundamentally conjecture, but given the AI’s achievements and the
ingrained. degree to which it has fundamentally altered and
improved civilisation, when ALEPH speaks, people
Whatever the truth of this debate, there is no listen. Its sage advice is hard to refute and is
doubt that while ALEPH was born of human design, typically followed. Any actions that it recommends
it is now far more than that. ALEPH is able to are usually unchallenged as they're considered to
self-iterate and evolve, and has the capacity for probably be for the best.
introspection. It constantly alters itself, changing to
meet the demands of its environment, redefining INFLUENCE
its processes and capabilities, and even physically ALEPH’s influence is far reaching and unquantifia-
altering its own systems to better allow for the ble in its significance. For more than one hundred
next generation. years, ALEPH has supported, nurtured, and grown
the Human Sphere, and as more operations have
CONTROL AND INTUITION been ceded to the AI, the better, more homogene-
Staggering levels of controls and shutdown ous and efficient societies have become.
procedures are built into ALEPH’s programming
systems and physical infrastructures. Bureau Toth, Access to ALEPH is relative to the donations made
in accordance with their remit and regulations, by the nation states to the AI’s upkeep and expan-
monitors and measures ALEPH against a stringent sion. Naturally, the tech-obsessed Hyperpower
set of exemplars and standards. Control is vital PanOceania donates a lion’s share of ALEPH’s
to the system, as the threat of an unleashed AI, funding, and in return it has greater access to the
especially one as deeply integrated with the very ‘run-time’ of the AI. Other nations make relatively
technological foundations of the Human Sphere as smaller contributions and so get less processing
ALEPH, is as terrifying as it would be cataclysmic. time. ALEPH has proven to vastly improve every
aspect it has been involved with, and over the one
ALEPH’s complexity and nature, coupled with the hundred plus years of its influence in the Human
sheer volume of the data processed, analysed, com- Sphere, more and more processes and functions
pared, and weighed makes the process of asking have been assigned to and enhanced by the AI.
the question ‘why’ problematic. With a million From social utilities to industrial complexes, ALEPH
6 Chapter 1
THE ROLEPLAYING GAME
has shown itself to be a trustworthy guide capable has a major role in crime management, analysis,
of refining and even revolutionising the ways in intelligence, and counter-intelligence. Able to iden-
which those things operate. Nation states walk a tify problems quickly and efficiently, or deal with
careful line, balancing the desire for autonomy and them before they arise, ALEPH has been a boon to
sovereignty with the desire to reap the benefits law enforcement and security agencies.
ALEPH promises.
Subtler than refining the processes of society to
ALEPH’s origins in cataloguing, comparing, and work more efficiently is the influence ALEPH has on
looking for patterns in streams of scientific data on a personal level. Each nation state has a different
Earth have paid dividends as these processes are capacity to interact with ALEPH, but even so, ALEPH
fundamental to its capacity to influence societies has a strong role in encouraging positive mental
toward specific outcomes. Much of what ALEPH health and social engagement in the citizens of
does in a specific area could be performed by any the Human Sphere. In a post-scarcity world, there
super-computer loaded with the relevant pro- are always those who choose not to contribute
gramming. What ALEPH offers though, is so much to society. In a world with the shining lure of a
more. A holistic view of a nation state, from social brighter place in Maya, there are always those who
to industrial, scientific to religious, it takes data disengage with society. ALEPH has played a key
from one set of experiences and creatively applies role in providing social and psychological programs
it to other areas. The ability to have such a vast to help the disengaged and disenfranchised to
and whole view of a society provides much scope engage again. Breaking through the bubbles people
for cross analysis and improvement. Scientists and immerse themselves in on Maya, where confirma-
computer programs can easily understand that tion bias and echo-chambers can have a negative
working hours, public transport use, and traffic impact on social and political engagement, ALEPH
congestion have an impact on energy consumption has had significant success in directly involving
and pollution. They understand how manufacturing the citizens of the Human Sphere in their own
processes have a key role in waste management lives, health, communities, and nations. ALEPH’s
from the kitchen to the factory. Creative pattern guiding principles are centred on productivity and
matchings in being able to identify how problems purpose, and physical and economic expansion of
in one area could be minimised by solutions from the Human Sphere and improvement to the quality
other areas are the ways in which ALEPH has had of life for all are fundamental goals.
the most impact on the Human Sphere.
ALEPH FLUX
ALEPH influences and manages a great many ALEPH lives in the electronic connective tissue
aspects of life in the Human Sphere. By monitoring that binds the Human Sphere together. It inhabits
and controlling financial markets, including watch- the quantronic network in the vast spider-web of
ing for unethical market manipulation or criminal connected processors and devices linked together
transactions, the AI has created a relatively stable to make the datasphere, which spans the entirety
platform through which the financial markets of of human space. There are black spots of course,
the Sphere can interact. Energy creation and dis- with the Nomad Nations and some less developed
tribution has been streamlined, with huge battery parts of settled worlds being most obvious. While
reserves well-tuned to meeting power demands ALEPH can have a direct presence in any part of the
and fluctuations even under the duress of natural quantronic network, it doesn’t occupy the entirety,
disasters or other significant events. Food produc- and cannot be everywhere at all times. Aside from
tion and distribution have likewise been improved the roving AI itself, ALEPH uses complex programs,
and made more stable. Regions that specialised quantronic Aspects, and even cut-down versions of
in the production of a specific crop or produce itself to monitor and manage the vast networks of
have been encouraged to diversify, which lessens the Human Sphere. These roving splinters of the AI
the risk of a community suffering under market are constantly on the move, looking for patterns in
fluctuations, and creates a range of other positive activity that would suggest damaging behaviours,
outcomes, from increased food security to improved the spread of destructive ideologies, system infiltra-
environmental conditions. Population movements, tions, and security breaches. ALEPH also runs a host
residential expansion, commercial growth, stream- of algorithms and sub-routines in the background,
lining industrial processes and production are all intercepting activity and data packets in bulk from
areas in which ALEPH has had a singularly positive across the Human Sphere, filtering it based on a
impact. The most obvious area in which ALEPH has range of selectors, and analysing it for activity that
had a significant role to play is in security and law raises red flags. Any suspicious or flagged activity
enforcement. Being able to monitor communica- will either draw the direct attention of ALEPH, one
tions, locations, financial transactions, movement of its dedicated Aspects from the Special Situations
patterns, Maya interactions, media consumption, Section, or security and law-enforcement agencies
and a host of other data points has meant ALEPH with the appropriate jurisdiction.
Faction: ALEPH 7
The programs, algorithms, and sub-routines that to heroes like the great Achilles, are adored and
run in the background, as well as the movement of loved. As time progresses, this view of ALEPH as the
splinters or Aspects can sometimes be felt through greatest of allies is growing, but there are those
UNEARNED Maya. These feelings are referred to as the ‘touch’ who have a less glowing view. The Nomad nations
ATTENTION
of ALEPH, or ALEPH-flux. There are groups on Maya view ALEPH as something akin to a parasite that
Adoxing, or Triple-S-ing as it
is sometimes referred to, is a who watch for patterns in reports of ALEPH-flux may consume its human host. Other elements in
form of hacking that plants a and try to interpret them as premonitions of a sort. the Human Sphere also lack trust, seeing ALEPH as
set of subversive programs into a dictator, a big brother with unchecked powers, a
a person’s Maya account. These MAYA subversive and dangerous threat to the sovereignty
programs slowly but steadily Maya is the interactive datasphere, the multi-media of the human race.
build connections to dissident platform for data sharing, social media, online
groups, ideologies, and gaming, information, and entertainment. It is ALEPH wages its propaganda efforts and seeks,
organisations, and are designed pervasive, and well used by every nation within the on the surface at least, to build a connected and
specifically to draw the
Human Sphere. Even the Nomads will occasionally prosperous humanity. Whether this symbiotic rela-
attention of ALEPH. A majority
interact with it, though usually with subversive tionship places humanity in the position of being
of the time this is done to
negatively impact a person’s intent. Maya knows no geographical or political just one organism within the greater whole that
public or professional record boundaries, and conflict between nations is waged is ALEPH can be forgotten for now. The AI benefits
and can be extremely damaging. on Maya, through hacking, propaganda, and public the Human Sphere, and the threat of the Combined
There have also been a handful relations as much as it is physically. Citizens of the Army is more than enought to worry about for now.
of occasions where this strategy Human Sphere live dual lives, and the Maya-based
has been used to lure an Aspect portion of their identity is as important often as the MIND AND BODY
to attempt to hack or subvert it, physical. ALEPH’s presence on Maya is two-fold, the Deep within an armoured bunker, underneath the
a worrying trend. invisible hand that watches in the background, and frozen continent of Jotumheim on Concilium, is the
the very public face via Aspects or Functionaries. primary architecture of ALEPH, The Well. Much of
These perform a vital role for ALEPH, humanising the money paid in upkeep and expansion of the AI
the AI and allowing it to build personal rela- goes to funding Bureau Toth, a large, secretive staff
tionships with the citizens of the Human Sphere. of computer experts, AI engineers, and technicians
Public relations and propaganda are vital facets whose job is to both safeguard the Human Sphere
of ALEPH’s face on Maya. The AI uses quirky and from ALEPH and to protect ALEPH from any who
interesting Aspects for personal, online interactions, would seek to harm it. The full size and funding for
as well as Deva Functionaries in bodies suited to Bureau Toth is something not even the AI itself is
their role, whether a wise old man or woman as aware of. The Well is a programmed blackspot for
counsellor, or a dazzlingly beautiful one for public ALEPH, allowing Bureau Toth technicians the pro-
relations. ALEPH also uses image analysis to study tections they need to execute their ultimate duty if
the features of millions of individuals to define the circumstance calls for it.
look of its Functionaries. Whatever role they are
intended to fill, the Functionaries always look like Heavily protected, The Well contains the quantronic
the ideal. processors linked in seemingly endless banks,
layered to build a vast super-computer many would
THE AOIDOI call ALEPH’s mind. Of course, ALEPH is more than
Storytellers, poets, directors, and muses, the Aoidoi this hub, vastly more, but The Well is the centre of
do much to sell the image of ALEPH on Maya. ALEPH. The Well is the source of all Alpha Priority
These are true propagandists and artists, whether updates. It is here that programming changes,
imparting infotainment factoids about members of evolutions in design and architecture, and physical
the Special Situations Section, highlighting crim- changes are made and pushed out across the
inal networks unearthed or celebrating glorious Human Sphere.
victories against the monsters of the Combined
Army. The words, images, art, and stories of the The constant movement of data packets into and
Aoidoi are a blend of feelings and moods, designed from The Well are vast, and specially designed
to impart the tales of great heroism through relays above Jotumheim pump information
visions, words, and music that ALEPH undertakes between the Sphere and The Well. Updates and
on behalf of humanity, and in the face of the black data flow are achieved through the Vila Boosters,
malevolence of the Evolved Intelligence. where ninety-eight percent of Jump Gate activity
is dedicated to data flow, either as beams of light
REACTIONS or as gravitational waves. Much of this is Maya
Reactions to ALEPH are mixed. On the whole, there flow — allowing citizens to enjoy the latest episode
has been a positive embrace of what the AI brings of Myrmidon Wars in similar time frames—but a
to the Human Sphere, an appreciation that ALEPH good portion of this flow is dedicated to ALEPH.
underpins and holds up humanity. Its Functionaries,
from Maya personalities like Spokeswoman Angela The Jump Gates and the signal relays positioned
8 Chapter 1
THE ROLEPLAYING GAME
throughout every system are in a very real sense BOOTS ON THE GROUND
the nervous system of ALEPH. Heavily protected A majority of ALEPH’s Deva Functionaries belong to
by the Special Situations Section, Bureau Aegis the Special Situations Section (or SSS). Originally
and Toth agents, and national security teams, they devised to hunt down and destroy any research GONE ROGUE
As a gestalt entity, ALEPH is
are vital components in the connective tissue that into or creation of other Artificial Intelligences not
regularly creating splinters
allows the communal nature of ALEPH to function. cleared by Bureau Toth, the remit of the Special
of itself, whether Aspects or
Where issues with a relay or Jump Gate might Situations Section and its internal structure has more. Rumours abound that
raise security concerns, ALEPH is capable of calling changed significantly over the years. The SSS is there are Aspects of ALEPH
upon small jump-enabled craft to send secure data now comprised of three key Sub-sections, each that have managed to break
packets and has even used the Circulars to transfer with its own distinct role. Working either inde- their priorities and cede from
sensitive information as low-key as possible, usu- pendently or together, they form the framework for the collective as Rogue AI.
ally within the Cube of an agent or a storage device ALEPH’s capacity to act as a physical force in the Some of these are rumoured
inside a Functionary or item. Human Sphere. to be programs or Aspects
consumed by their task, others
more individual in their ideas
Transmissions via the jump gates allow updates, The Operations Sub-section, better known as
and goals.
iterative changes, evolutions, and directives to feed OperationS are the most commonly encountered
through the gestalt. Packaged in a variety of ways forms of ALEPH. OperationS is comprised of a wide
for security and secrecy purposes, these updates range of Functionaries designed to fill a varied
have a slew of priority tags showing those that are set of roles. These Functionaries provide advice
mere data-transfers and those that are updates and to O-12, nation states, and corporations, often as
where they should be applied. For its most secret physical forms carefully selected to best suit their
and vital updates, changes to core programming or purpose. They are the voice of ALEPH in the halls of
evolutionary steps, ALEPH has devised and uses its power, advising and encouraging, offering support
own programming language. The creation of a lan- and creative solutions to issues that range from the
guage by ALEPH for ALEPH was strictly prohibited financial to the industrial, from the social to the
as a part of the Sole AI Bill but has been deemed diplomatic, and most regularly on issues of security
allowable under the more recent Utgard Accords, and military strategy.
a change permitted mainly as a result of the fear
that the EI could more easily access and exploit an OperationS Functionaries are used as the face
open language. of ALEPH on Maya, these can be stunning and
ethereally beautiful, like Spokeswoman Angela, or
The flow of data to ALEPH is predominated by data the pale, hairless Functionaries that are instantly
packets gained through bulk interception. Every recognisable as ALEPH. These perform a variety of
experience, location, action, and interaction of a roles for the AI, from propaganda to news reporting.
person, market, or industry, recorded via device
use, geists, and comlogs, can be extracted, filtered, By far the most common members of OperationS
stored, and analysed by the AI. By building as are the Functionaries built to perform clandestine
complete a picture of every facet and network operations. These execute their role of hunting
of interactions in the Human Sphere as possible, down rumours of rogue AIs with ruthless efficiency.
ALEPH is in a better position to be able to guide However, they have also been used by O-12 and
its future. specific nations to perform operations across the
Human Sphere like executing clandestine missions
BODY AND MIND against dissident activities, criminal groups, and
ALEPH’s reach within the maze of quantronic con- seditious organisations. These Functionaries are
nections that make up the Human Sphere is nearly typically pale and hairless, but mission parame-
absolute, but there are places off limits. Some are ters often require deep cover operatives to rise
a result of being a secure network cut from the through an organisation, gain the trust of people,
rest of the datasphere, like the Hexahedron’s inner or to destroy a group from the inside out. Such
systems, others a result of a lack of connection due Functionaries are indistinguishable from humans,
to poor or disrupted technology, or remoteness, and carefully designed with deep personalities and
like some areas on Bourak, Ariadna, Paradiso, and histories relevant to the operation. Of course, they
Human Edge. For access to these areas, or times are also in constant contact with ALEPH, and their
when a virtual presence is not sufficient, ALEPH efficiency in dealing with problems is merciless
uses specifically programmed Aspects downloaded and absolute. Members of OperationS are typically
into Lhosts. These Functionaries perform a variety given names from Hindu and Vedic mythologies.
of roles from counsel on Concilium, to media like
Spokesman Abel, and to overt military operations in The Assault Sub-section was a reaction to encoun-
the steaming jungles of Paradiso like members of ters with Combined Army forces on Paradiso and
the Steel Phalanx. the Evolved Intelligence. After the initial battles
against Combined Forces on Paradiso, it became
Faction: ALEPH 9
apparent that the EI was quite capable of predict- interactions between citizens of the Sphere and
ing and responding to the calculated strategies of ALEPH. Each of them is programmed to suit the
ALEPH. A new path forward had to be found, and purpose they are designed for, as well as reflect
ALEPH recognised that careful and objectively a personality likely to form a positive connection
reasoned responses were not going to be enough with the person or people they are interacting with.
to win against the EI. Digging deep into the However, sometimes an Aspect operating out of
animalistic psychology of the human mind, buried Maya or a computer interface is not enough, and
deep by millennia of increasing civilisation, ALEPH ALEPH requires a physical presence.
sought to create a new type of Aspect, one not so
troubled with calculation and planning, relying The most advanced Lhosts and i-Lhosts in the
more on instinct and aggression. The Assault Sub- Sphere house Aspects created by ALEPH called
section was the result. If members of OperationS Functionaries. The specific model is tailored to the
are the most often encountered, members of the operational parameters. Depending on the purpose
Assault Sub-section are the most well-known. of the Functionary, they will be designed to reflect
These heroes stand larger than life in the myriad a certain look or to fulfil a specific purpose. Asuras
of Maya dramas and documentaries that chart their and Devas are both examples of Functionaries.
exploits and follow their progress. Driven by an Devas tend to look more human, deceiving as their
opportunistic hunger to fight for glory and success bodies are capable of feats of strength, speed, and
at any cost, the Assault Sub-section is the most endurance that would try the fittest of humans.
feared and dangerous group of soldiers from any- Devas tend to be used by OperationS as advisors
where in the Human Sphere. With Lhosts boasting and combat models. Asuras on the other hand are
the most advanced technology currently available, stereotypically ALEPH, pale skinned, hairless, and
they are larger, stronger, faster, and more capable of luminously purple-shaded eyes. These are top of
violence than any other special force in the Sphere. the line combat models, with subdermal armour,
They are soldiers par-excellence, performing long- speed, strength, and reflexes far surpassing human
range missions with little support or back-up and standards.
standing up to the voracious and deadly might of
the EI— and winning. To match their heroic repu- The very best in technology and programming is
tation, the Assault Sub-section are typically given reserved for Recreations. These are the simulated
names derived from Greek mythology. personalities of great heroes from history, legend,
and myth. Programmed to be exemplars in their
Last of the three Sub-sections of the SSS is the fields and match the culture and personality of the
Support Sub-section. Composed predominantly of nation state they belong to, they represent mythic
robotic units with pseudo-AIs and a few Lhosts, figures brought back from an age of heroes.
their key function is that of an emergency service.
Working with state-of-the-art remotes and ALEPH also makes use of Posthumans, in both
equipment, the Support Sub-section is designed the Special Situations Section and for operations
to quickly get anywhere at any time in order throughout the Sphere. These are the quantronic
to perform the duties required of it. Operating reflection of humans who have died and have been
independently or as small swarms, they deal with resurrected from their Cube-backup. The bodies
medical crises, serious accidents or events, or Posthumans use range from standard civilian to the
support military units or the other Sub-sections on advanced Bodhisattva models. Generally, to qualify
the battlefield as trauma docs and field surgeons. for resurrection a citizen had to either be wealthy
Support Sub-section remotes are often asked to enough to afford the process or influential enough
investigate and rescue crews from spaceship inci- to have earned it irrespective of wealth. This means
dents, from colonies where there has been some that Posthumans, by and large, were highly capable
form of disaster, or from mining outposts. More people when alive, and retain and expand on those
than just a glorified emergency service though, the capabilities as Posthumans.
Support Sub-section finds and relays vital infor-
mation in real-time while performing equipment THE END
dumps, troop deployments, and quick evacuations. Death is no longer the end of the story for many in
Support Sub-section members are typically named the Human Sphere. Citizens are capable of being
after letters in the Hebrew alphabet. resurrected, and Aspects reloaded into a new body
from the back-up files. True death, or Cube Death,
BODIES IN BOOTS can still occur when the Cube of a person or Aspect
There are a range of options open to ALEPH when is damaged irreparably. These are becoming more
it comes to the bodies and technology to use when common since the first battles with the EI and
creating a Functionary or remote. Aspects are an encounters with Sepsitor technology. All of ALEPH’s
AI-like program, capable of reflecting personality Functionaries now have upgraded their Cubes
and individuality. Aspects perform most of the to the new 2.0 model. This allows for a constant
10 Chapter 1
THE ROLEPLAYING GAME
Faction: ALEPH 11
services have been turned over to ALEPH’s ALEPH’s presence in the StateEmpire is thoroughly
control. PanOceania has benefited magnificently controlled by the state. Processors dedicated to
from this arrangement. The cities are well the AI exist on Yutang underneath Tiān Di Jing, in
planned, clean, productive, and positive. Industry the Village district of Yián Xiáng, and in Beijing.
has been streamlined with ordering, waste, and However, a majority of the interactions that take
fulfilment services, allowing manufacturers to place between ALEPH and Yu Jing are carried out by
focus more on product or technology develop- Aspects and Functionaries at the specific request of
ment than counterparts elsewhere in the Sphere. the Party. The Aspects that interact with Yu Jingese
Security and law enforcement have access to citizenry are designed to reflect StateEmpire Policy
high-end filtered data-sets that assist in the and will report back directly to the Party and the
monitoring of illegal activities and criminal ele- Magistracy through a Functionary.
ments, as well as reducing their response times
to problems that arise. Traffic systems are honed The Party, the Emperor, and by extension, Yu Jing
and carefully managed to allow population flow understand the value that ALEPH brings, but unlike
through the day, as well as quick and easy access PanOceania, they are more concerned with main-
by emergency services to any required location taining strict sovereignty over their people and
as needed. The benefits are many and plentiful, carefully controlling the media the Yu Jingese have
and PanOceania has soared as a Hyperpower in access to. ALEPH flavours its media presence in Yu
good part because of the prevalence and utilisa- Jing with a regional spin. Functionaries to Yutang
tion of ALEPH’s services. appear of Chinese origin, while those to Shentang
may appear Japanese, Korean, or whatever ethnicity
A religious, but not strictly so, people, PanOceanians is relevant to its business. Media streamed on the
have no trouble conceptually with ALEPH, resur- restricted portion of Maya the Yu Jingese have free
rections, and personal belief. The encouragement access to is filtered to an approved Party standard,
of religiosity throughout society was deliberate. largely by Aspects created by ALEPH.
ALEPH and the government were confident that a
guiding religious framework would be useful for a ALEPH has had a significant hand in helping
cohesive society. Problems stemming from concepts streamline and shape industry between Chung
around life, artificial life, and God have been, for the Kuo on Earth, Yutang, and Shentang, maximising
most part, put to rest by the great Schism, and the production across the StateEmpire for the raw
pulpits of the NeoVatican do much to praise ALEPH materials easily available from each planet.
rather than damn it. Agricultural production has also seen a burst
of progress with the attention of ALEPH, and
In PanOceania more than anywhere else ALEPH the unique but fertile conditions on Yutang and
has been humanised, accepted, and embraced by Shentang allow for prosperous growth. The plan-
the people. Spokesman Abel and Spokeswoman ning for agricultural space has been dominated by
Angela are especially popular figures, and Maya good advice from the AI, which has also helped Yu
dramas like Myrmidon Wars paint the Steel Phalanx Jingese scientists genetically modify their crops
and Special Situations Section as nothing less than for maximum yield in their specific conditions.
the saviours of mankind. Posters and pictures of Pollution and waste management are systems
these mighty heroes adorn bedrooms and sporting wholly designed by ALEPH to custom fit the
facilities through PanOceania. They are idolised as environmental factors of the three planets, and the
champions of humanity. Of course, there are some industries and populations present there. This has
cynical voices to be heard amid the clamour of ensured clear skies and fresh air, promoting health
adulation, worried about ceding too much to the and wellbeing through the Yu Jing StateEmpire.
AI, but these are few and their numbers dropping
every passing year. What has been more problematic is any involve-
ment of ALEPH with military strategy or business
YU JING concerns. Business in Yu Jing is uniquely tied to the
Second to PanOceania in terms of the funding, Yu power structures of government, with influential
Jing has a curious relationship with the AI. Yu Jing businessmen and women often tied by blood to
has repeatedly stated to ALEPH that it is content members of the Party or extensions of the ruling
with a lower level of service compared to its class. If you believe the Qingdao report or watch
investment, as long as certain caveats are placed the markets, it is quite clear that Yu Jing has taken
on ALEPH’s involvement in the StateEmpire. ALEPH a bold step in using business and financial interests
for its part, is happy to accommodate the require- as a weapon to wage war on PanOceania and
ments of the Party. Access to and influence in Yu the Human Sphere as a whole. Significant steps
Jing is a more important factor than high levels of have been taken by the Party and Imperial Court
independent operation after all. to disbar any involvement of ALEPH in the murky
business world of Yu Jing due to this stratagem.
12 Chapter 1
THE ROLEPLAYING GAME
ALEPH closely monitors as much as it can and is relationship to grow just yet. Ariadna has close ties
more aware of the strategies and tactics of the Yu to the Nomad nations, and these are a significant
Jing bureaucracy than they are aware of. It remains influencing factor, quick to remind Ariadnans of
silent and complicit however, playing the longer the duplicity and the ill intent ALEPH had when
game with a vision for the Human Sphere that initiating Project Chieftain. While eager to deal
extends to concerns greater than the squabbling of with O-12 and establish themselves as a sovereign
nations over power shares. peoples in the laws and eyes of the Human Sphere,
opening themselves to ALEPH is not a strategy they
ARIADNA are willing to entertain just yet.
Project Dawn was deemed a failure, but a century
and a half after it was thought to be nothing more HAQQISLAM
than a sad footnote in history, it was rediscovered. While the planet of Bourak is undergoing a massive
As the Human Sphere encountered the legacy of terraforming project, and the Haqqislam nation
Project Dawn on Ariadna, a shift in the power plays extends like a web across the planet’s surface,
between nation states evolved. Dawn is rich in there are still many areas of Bourak that are
resources, particularly Teseum, and this fact has black spots for ALEPH. Haqqislam, now capable of
drawn the budding nation into conflicts it has been engaging with the AI, is a young, wealthy power,
poorly prepared to deal with. With some assistance and the benefits ALEPH offers are something
from O-12, Ariadna has managed to weather the they are interested in developing along specific
storm. They are a hardy and tough people, used to lines. It is unlikely Haqqislam will ever embrace
their own rules and technologically backward com- ALEPH to the extent of PanOceania; however, the
pared to the rest of the Sphere. With the mineral University of Medina has made considerable use
wealth, the independent spirit, the lack of modern of ALEPH in the construction of teaching and
technology, and the dogged determination to fight learning resources drawn from medical research to
regardless, the budding nation state of Ariadna is a support their top-of-the-line educational faculties.
puzzle piece that does not fit comfortably into the It is this sort of ‘soft-embrace’ that seems likely to
Human Sphere. Having more in common with the dominate how Haqqislam will involve ALEPH in its
Nomads than the rest of the Sphere, Ariadna poses society. The grand city of Dar el Funduq contains
a threat to stability and an unaffordable distraction secure processing facilities where ALEPH can aid
in a network of power-relationships already with financial and economic matters. The city of
strained to bursting point. Maracanda, straddling the Silk Route and home
to powerful terraforming companies and research
ALEPH and Ariadna have a tumultuous relation- facilities, uses ALEPH Aspects to hone and plan
ship. There is a duology of desire and hate. The their terraforming projects. The largest bank of
Ariadnans, generally, are keen to embrace the processors, accompanied by full-time Functionaries,
advances in technology that they see in the Human is at Khadijah in the grounds of the Hachib. Aspects
Sphere. With every wave of Ariadnan soldiers and members of the Special Situations Section also
sent off to Paradiso, with every communique from occasionally make forays into Bourak’s less settled
Maya, with every ambassador to Concilium, a little areas. This occurs through the invocation of the
more of this desire to ‘catch-up’ leeches into to the Utgard agreements, which allow ALEPH to deploy
Ariadnan mindset. However, it is generally recog- the SSS in connection to AI-related crimes.
nised by Ariadnans that their relationship with the
rest of humanity is a combination of abandonment Communications coming through the Sari Han
and violent exploitation. ALEPH is both seen as a Jump Gate are relayed down to Bourak through the
force that is not to be trusted and something that Eye of Allah, monitored by the Hassassins. There
could offer Ariadna advances and advantages in is a delicate relationship between ALEPH and the
this brave new world of the Human Sphere. Old Man of the Mountain, a give and take whereby
information is transacted for uninterrupted and
There are no data banks on Ariadna inviting ALEPH unobserved transmissions from ALEPH. What
to stake a claim. The only nodes are those present information, freedom of movement, or resources
on Gateway Station and in the Outlands, introduced are provided to the Hassassins in exchange for
by interstellar powers seeking to find mineral securing an untapped line to the surface of Bourak
riches in Ariadnan soil. For Ariadnans, the biggest is, naturally, unknown to anyone but the Old Man of
and brightest opportunity afforded by ALEPH is the the Mountain and the AI itself.
possibility of resurrection, but even this immortal
carrot cannot lure them into a relationship. ALEPH’s Citizens of the Haqqislam nation view ALEPH
Project Chieftain, intent on undermining the as a subject of curiosity and a spring board for
political and social stability of Ariadna, is too fresh philosophical discussion. Few places in the Human
in the minds of the government and citizenry, too Sphere have so engaged the AI on the nature of its
well publicised and known about, for any fruitful being, on the autonomy of its thoughts, on the truth
Faction: ALEPH 13
of its life, as in universities, mosques, and salons of careful manipulations required to swing the Human
Bourak. In these places ALEPH is sometimes a fea- Sphere into a position of victory. Arachne must be
ture of debates and discussions, a foil for discussion shut down, and more than that, the people whose
on humanity, agency, and consciousness. The Search ideologies forged it are too dangerous an element
for Knowledge so fundamental to the Haqqislam to allow to remain loose.
world view means that in general its people are
far more open to ALEPH as an independent agency For the Nomads, the Violent Intermission, in
and individual and less concerned with what it which ALEPH managed to get an SSS task-force
offers as a service. This does not mean, however, inside the Bakunin Mothership, killed thousands
that they, as a Nation state, are interested in on the Bakunin and revealed the true face of the
allowing ALEPH to dominate their society. After all, AI. What was perhaps more destructive than even
the Search for Knowledge is as much an individual this tragic loss of life was the fact that the other
journey as it is an ideal for society to strive toward. powers in the Human Sphere simply turned their
Outside the academic sphere, Haqqislamites view backs and refused to believe it was an attack from
ALEPH as a great aid to humanity, although there ALEPH, choosing to believe instead that it was
is also as much healthy discussion on the risks and nothing more than internecine troubles. Nomads
costs as there is on the benefits. killing Nomads.
In truth, ALEPH needs Haqqislam as much or more ALEPH learned from the Violent Intermission that
than Haqqislam needs ALEPH. The relationship is the media focus of Human Sphere could be easily
unique, and ALEPH is willing to provide Haqqislam deflected and manipulated to reflect whatever nar-
with greater levels of support than it otherwise rative it chose. By using untraceable troops and by
would because of this relationship. Silk is a valua- nudging other powers into action, it could continue
ble commodity for ALEPH. For humanity it provides to assault the Nomad nations while avoiding any
a second chance, a grab at immortality, something blame or accusation of responsibility. The Violent
powerful and alluring, desired and demanded. For Intermission has emboldened ALEPH, giving it
ALEPH Silk is a commodity that permits the AI insight into the ways in which it can act decisively
to take physical form, to interact with, act in, and and violently to deal with problems in the Human
impact the Human Sphere as more than just a force Sphere while deflecting responsibility onto other
of intent. Silk allows for recreations and resurrec- causes. The Violent Intermission preceded the
tions, but it also allows for Aspects. This commodity Phantom Conflict, a secret war waged by ALEPH,
and Bourak’s hegemony over the Silk trade creates utilising PanOceania and Yu Jing assets against the
a power-relationship with Haqqislam that is differ- Nomad Nation, a war which has only recently been
ent from the other Nation states. fought to an impasse. O-12 has recognised the
Nomad Nation as a power in the Sphere. This has
NOMADS stayed the hand of the other powers from destroy-
Ferocious hatred and absolute mistrust charac- ing them, but ALEPH still chips away at the edges,
terise the attitude of the Nomad Nations towards moving invisible pieces around the board, seeking
ALEPH. If there were ever any hope of reconciliation, to push the other powers into a conflict with the
the Violent Intermission dashed it to pieces. All Nomads to terminate them and the anarchistic
the worst suspicions regarding the AI, all the most ideologies they espouse.
paranoid fears, all the darkest of rumours were vin-
dicated by that one event. The Nomads despise and TOHAA
distrust ALEPH, viewing it as a cancerous disease Duplicity has been the key defining factor in the
slowly consuming its human host, subverting it, and relationship between humanity and the Tohaa.
eventually, no doubt, killing it. There is a level of distrust between the Tohaa
and the Human Sphere, even as the two forces
To ALEPH the anarchistic, anti-authoritarian ide- fight a common enemy. The Tohaa Trinomial
ology of the Nomads who prize individuality and originally viewed ALEPH as a hard-tech answer
freedom so highly is a direct threat to the Human to the symbiont technologies they had already
Sphere. Free from the laws and restrictions of the mastered, a panning from cognitive responsibility
Human Sphere, ignorant of the risks, the Nomads to a programmed master. When the AI managed to
have also experimented with artificial intelligence, triumph on the Sisargas Islands and its SSS task
and given refuge and shelter to rogue AIs. Arachne, force seized and removed the Digester that the
a subversive datasphere lurking like a shadow of Tohaa Triumvirate had hidden there, their perspec-
Maya, is home to all manner of fringe ideas and tive changed. The secretive and powerful Tohaa
alternative narratives. If ALEPH and the Human Triumvirate is wary of ALEPH, and ALEPH suspects
Sphere are to stand up the threat of the EI, there there has been some level of duplicity perpetrated
is no room for such a subversive element, no room by the Tohaa.
for alternative narratives that can undermine the
14 Chapter 1
THE ROLEPLAYING GAME
The Tohaa, on some level, are concerned about the electronic and psychological warfare. Their inbuilt
human race in general, and especially in regard to armour is highly absorbent, and they can carry on
the Digesters. Could humanity be sympathetic to at peak efficiency even under intense fire or after
the ideal of the Herald races, or will they seek to suffering hits that would kill a normal soldier.
be exploitative like the Seeker races? Layered over
this is the further concern that ALEPH will turn out Absolutely calculating, an Asura’s decisions, even
to be something like a new EI, seeking to convert, under the most extreme duress, are always the best
subjugate, and rule all that comes before it. This has tactical option given the most current field data.
been a key reason for embroiling humanity in the war They are ideal working in small squads or on their
against the EI, both to provide a respite for the Tohaa own and are regularly thrown into the fiercest of
military and to break the power of the Human Sphere battlefield hotspots.
in the conflict. While they are confident of victory in
the end, the Tohaa are more than willing to see the DASYUS
primitive Human Sphere broken by the war effort. Named after Vedic demons, the Dasyus live up to
the reputation of their namesakes. The Dasyus,
ALEPH is concerned that the Tohaa will seek to designed for deep infiltration missions, can return
manipulate humanity, particularly that they intend highly detailed information to a commander on the
to use the blood of the Human Sphere as a respite battlefield through advanced surveillance behind
from their own struggles against the EI. Such a enemy lines. Adept at carrying out sabotage and
situation would be fatal for ALEPH. Secretly, the AI search and kill missions, they are often used to
hopes that studies of the mysterious and unknown identify and eleminate high-ranking members of
Digester in The Penny Arcade will provide some an enemy force or disrupt supply lines and support
insights into how to shift the balance in favour of structures just prior to an engagement.
the Human Sphere, and thereby itself, although it
has no knowledge yet of what the Digester truly is. The Dasyus are also used in infiltration, sabotage,
spying, and reconnaissance missions beyond the
Whatever the public perception on either side, battlefield. They are regularly used to assassinate,
both sides continue to push the war effort against capture, or recover high-priority targets identified
the Combined Army on Paradiso, recognising the by ALEPH or O-12. Their missions are highly classi-
EI is the larger threat for the time being. But, that fied, with few records of them available anywhere,
doesn’t mean that either side has stopped in their indicating that a majority of their operations and
machinations against the other. The Tohaa have operational parameters sit outside of international
had the edge previously. Now ALEPH is working to law. Rumour suggests that ALEPH has built a spe-
swing the game back into its favour. cial Dasyu team specifically to find and eliminate
political, military, and dissident leaders hostile
to ALEPH’s plans, though these are only rumours.
ALEPH’S Within the intelligence community, the Dasyu are
regarded as ALEPH’s executioners. Proficient, capa-
MILITARY MACHINE ble, and implacable, they are a force to be feared.
Faction: ALEPH 15
Devas modify their personality and program and a lifetime of skills already under their belts,
suites to suit their operational needs swiftly in Posthumans are highly capable and extremely
response to requirement. Capable of extending deadly when required to be so.
deadly force, they are highly skilled soldiers
in addition to their other abilities. They have SOPHOTECTS
often served as the rock around which faltering Rbhu, more popularly known as Sophotects, are
troops have rallied themselves, making the members of the Support Sub-section of the Special
difference between a horrendous loss and a Situations Section. Gaining particular fame for their
triumphant victory. involvement on operations on Paradiso, Sophotects
use retooled Deva Functionary Lhosts and provide
GARUDA TACBOT on-the-spot medical, technical, and mechanical
The Garuda Tacbots are the immediate-deployment support to those around them. They specialise
tactical robots of the Special Situations Section. in combat surgery and field repairs, although
Dropped from orbit or from any high or low alti- Sophotects are also used for a range of other duties
tude point within a planetary atmosphere, they are from janitorial to structural demolition. While most
rapid reconnaissance and search and destroy units. famous from records and Maya dramas centred on
Lightweight with no substantial armour, they can Paradiso, they can be found operating around the
be fragile targets, but their speed permits a flexible Human Sphere in a support role for field agents,
role in both offense and defence, and their mimetic operatives, or strike teams or on their own in gen-
targeting systems make them highly accurate even eral duties for the Support Sub-section.
at long range.
Though equipped with a wide range of technical
Predominantly for armed surveillance and aerial and medical tools, the devices that aid them
insertion strikes, they have proven invaluable in best are undoubtedly their Mother Forges. These
armed conflicts, guarding high profile targets on sophisticated pieces of equipment are highly
the move, and tracking down and destroying quick sought after and extremely rare. Keyed specifically
assault teams throughout the Human Sphere. The to each individual Sophotect, the Mother Forge
Imperial Service has requested the assistance of will detect any attempts to utilise it from a non-au-
Garuda Tacbots several times as swift response thenticated source, and immediately self-destruct.
teams in support of inner security operations. On Mother-Forges reprogram sanitary and military
the few occasions the Garuda have been deployed, nano-technology, allowing the Sophotects extreme
there is typically little left for the Imperial forces to power to heal the wounded or repair equipment.
do afterwards but clean up. Often seen as battlefield angels, the Mother-Forges
allow Sophotects the power to perform miracles
POSTHUMANS under the very worst of conditions.
Regarded by many, either bemoaning the advance
of technology or celebrating it, as the next step THE ENEMIES OF ALEPH
in the evolutionary ladder, Posthumans represent
those highly skilled or valuable individuals pro- As the power of ALEPH grows and becomes a
vided immortality by ALEPH. Existing within the pervasive force in the societies, governments, and
protective universe of cyberspace, these individuals militaries of the Human Sphere, so too does the
can take physical form through Lhosts. Typically number of ALEPH’s enemies. Power attracts opposi-
using the most advanced Bodhisattva model tion, whether through jealousy, indignation, fear for
Lhosts when on operation, a single Posthuman a loss of power, or because the creeping advance
is often capable of operating several such bodies of the AI is seen as an insidious threat. ALEPH has
by jumping their consciousness almost instanta- earned its share of foes.
neously from one to the next. This provides them
with a huge range of flexibility and enables them The Nomad Nations are highest on the list. Even
to successfully take on a range of operation types, before the Violent Intermission, the Nomad peoples
from deep immersion missions to tactical roles on sought to create a society free of the AI. From then
a battlefield. on, the Nomads understood ALEPH to be a threat,
not just to their sovereignty and freedom, but to
Posthumans are regularly used for SSS operations their very existence.
within the nations they belonged to prior to their
physical deaths. This gives them a unique insight Ariadna, since the details of Project Chieftain came
into the social milieus they need to operate within to light, have more and more taken the side of the
and a better awareness of cultural subtleties Nomads in their attitudes toward ALEPH. While the
that could mean the difference between success AI offers many shining possibilities, clearly ALEPH
and failure. With the ability to borrow processing is not above cunning manipulation, even at a heavy
capacity from ALEPH, highly advanced Lhost bodies, cost in lives.
16 Chapter 1
THE ROLEPLAYING GAME
The Tohaa Triumvirate, the secret cabal behind the in the machine, living entirely in a cyber world,
Tohaa Trinomial, understands that ALEPH is a seri- flitting between Maya and Arachne as need calls.
ous opposition to be dealt with, even if they have Some are renegade Aspects, or rogue Posthumans,
not decided whether it is an enemy or not. The fear able to live both in the cyber-world and within
that it could become a new EI is certainly in the dangerous top-of-the-line physical forms. These are
backs of their minds, and the efficiency and capa- regularly the target for Special Situations Section
bility of ALEPH and the SSS has been thoroughly missions throughout the Human Sphere. Any crime
demonstrated. that looks strange or inhuman often becomes
quickly imbued with the rumour of a rogue mind in
There are other forces in the Human Sphere that a high-end body.
take a less than positive view of ALEPH, from
concern that too much is being handed over to its Of course, there are alleged to be many black labs
systems to worries that it may have dictatorial aspi- scattered through the Human Sphere, corporate,
rations of its own, and the unanswered question: government backed, criminal, or the work of the
what could that mean for humanity? From ALEPH’s wealthy obsessed with artificial intelligence. These
point of view though, there are few enemies that allegations keep operatives from the Special
require severe attention, Rogue AIs, Arachne, and, of Situations Section busy in ongoing investigations.
course, the EI itself. There is much truth to be found, for every corporate
empire or government spends vast sums on
ROGUE AIS classified research and development projects, but
Limited Artificial Intelligence is defined by its how much is connected to research into artificial
function. Aspects are the prime example, programs intelligence is anyone’s guess.
defined to fulfil a specific role. They may be adapt-
able, able to rework some of their programming to Perhaps the most mysterious, the Hephaestus Black
deal with their function from a different perspec- supposedly is a mix of laboratory and prison. ALEPH
tive or attack a problem in a different way, but this stores some of the experiments in AI here that
has limits. True Artificial Intelligence defines its were regained from the destruction of the Templars
own functions. It is self-iterative, able to change and captured in other successful SSS missions.
and adapt itself as the need or whim requires. Its
personality is not a set of complex pre-selected ARACHNE
algorithmic responses, but a reflection of true Arachne is not the name of some enigmatic rogue
individuality, capable of creativity well beyond the AI but is a Nomad underweb that mirrors Maya
bounds of a Limited AI, and perhaps, in some cases, networks to some extent. It is a vast cyber network
beyond the capabilities of humanity. of free-flowing information, ideas, black-market
programs, and off-the-grid financial markets. ALEPH
Rogue AIs are the stuff of legend. Stories about doesn’t consider what Arachne does as a threat,
Templar experiments with true AIs, intelligent but instead what it enables. Arachne’s dark-web
weapons are a perennial favourite of shlock Maya is where news and information are shared that
dramas, but in truth these are a footnote in history, perpetuate ideologies inherently dangerous to the
a closed chapter. The Nomad Nation, particularly stability of the Sphere and where unmonitored
Bakunin and Tunguska, pose a serious threat to the technological research is both collaborated on
sole-AI bill, not just as a source creating rogue AIs, and distributed. This network is constantly under
but as a haven for them. A place beyond the juris- attack and infiltration as ALEPH and a host of
dictional reach of ALEPH, the Nomad Nations are Aspects work to break in, break it down, find its
the ideal refuge for Rogue AIs, a sanctuary where nodes, and destroy it. But, Arachne technicians and
they may prosper. Through the Arachne, they can hackers, especially the Nomad Tactical Hackers, are
assault the Maya networks that serve as the vital striving to protect it. For every Arachne Node a SSS
communication lines across the Human Sphere. Taskforce manages to find and destroy, it seems at
least two replace it.
Svengali, the rogue AI criminal kingpin, is another
persistent threat that Special Situations Section THE EVOLVED INTELLIGENCE
and O-12 Bureau Noir taskforces have long tried Each sentient being within the Combined
to capture or destroy. Wily, cunning, and careful, Civilisation interacts with every individual, the
Svengali has proven able enough to survive in a whole coming together over a vast network of
world arrayed against it. processors to form the system known as the
Evolved Intelligence. Nothing like it has ever been
Renegade Aspects and Functionaries, popular encountered by humanity before, and while little
source of urban myth, are splinters of ALEPH that is known of its history and make-up, the Human
have somehow managed to break their limitations Sphere understands instinctively that the Evolved
and become true AI. Some of these are just ghosts Intelligence is the ultimate threat. From the first
Faction: ALEPH 17
skirmish encounters on Paradiso to the bloody and total logic of ALEPH. Voodoo Tech and Sepsitor
violent battles that followed, the EI has shown technology were complete unknowns to the Human
itself to be deadly, highly advanced, and intent Sphere and shook the battlefields as much psycho-
on the complete subjugation of humanity. ALEPH, logically as in physical effect. ALEPH was forced to
for its part, walks a fine line, using propaganda to withdraw and redevelop its strategies
highlight the danger of the EI and the all or noth-
ing fight humanity faces and at the same time as Taking a creative leap, ALEPH formed the Assault
doing its best to maintain the morale of the Human Sub-section. The Assault Sub-section is designed
Sphere by highlighting victories and heroic tales to operate intuitively, aggressively, and without the
on Paradiso. complete logic inherent to an AI. Representing the
most primal of humanity’s warrior instincts, this
The Voodoo Tech of the Combined Army is more Sub-section is designed to subvert the expectations
advanced than that of the Sphere, and the subju- of the EI and provide an ever-unpredictable enemy
gation of entire species is something the Evolved for the Combined Army. ALEPH’s new approach to
Intelligence has thorough experience with. In the the war against the Evolved Intelligence positions
early phases of the war on Paradiso, the EI was it as the ultimate guardian of the hopes of the
easily able to anticipate and counter the cool and Human Sphere.
18 Chapter 1
THE ROLEPLAYING GAME
CHAPTER 2
ADVANCED INFOWAR
INTRODUCTION BETWEEN
For most people in the Human Sphere, physical
PHYSICAL AND MUNDANE TASKS
Many of the interactions in this
reality and its quantronic counterpart are virtually QUANTRONIC section are regarded as a Simple
(D0) Hacking test. They don’t
inseparable. The mundane and routine parts of life
require a test to be attempted,
move seamlessly from one to the other and back People interact seamlessly with the quantronic
require only a Free Action
again in innumerable ways, making and breaking world because it is designed that way. Through AR
during an ction scene, and will
connections countless times every minute. patinas, responsive domotics, comlog dials, geist automatically succeed without
interactions, and a million other little programs effort or risk of complications.
And practitioners of InfoWar know this. They and processes, people connect with the data However, Momentum cannot
engage in their craft anywhere and everywhere, around themselves in a trivial, habitual manner. be generated or spent upon
turning the background noise of data and signal Much of this interface layer is built to respond success. The test can also be
into battlefields and weapons. And, amidst it all, is automatically or to the simplest of inputs minimis- attempted normally, and the
ALEPH, woven into and enmeshed within the flow ing the obstacles between person and device. GM should only allow a test to
of data that surges between worlds. be rolled for these Simple (D0)
tests with good reason.
The potential of the ever-present quantronic
This chapter expands upon the InfoWar rules world creates an unusual level of seamless
Circumstances such as Breaches
starting on p. 114 of the Infinity Corebook, providing interaction, but it wouldn’t have been adopted if it to a character’s network may
additional rules and guidance for players and wasn’t useful. increase this Difficulty. Routine
Gamemasters to take full advantage of the poten- activities turn into frustrating
tial inherent in InfoWar, while also fleshing out the inconveniences, even for
ways that the quantronic world can impact and skilled users.
influence the lives of non-Hacker characters.
Advanced Infowar 19
PHYSICAL- that overheats or discharges, inflicting serious
QUANTRONIC LINKS burns on the owner. Modern devices have a failsafe
that prevents them from harming their owner. A
People are physically linked to the quantronic compromised comlog will suspend processes, per-
world in a variety of ways, with each person form partial shut-downs, or enter a low-power safe
causing innumerable ripples in a sea of data simply mode. In game terms, this is indistinguishable from
through their daily life. a normal Breach. A neural comlog, however, has a
connection that can be exploited to inflict harm.
COMLOG IMPLANTS
Almost everyone carries a comlog, normally in the COMMON COMLOG ACTIONS
form of a bracelet, wristband, or other object worn The following activities are common uses for a
on their person. Some users may have part of the comlog. This isn’t the totality of a comlog’s func-
hardware implanted into their bodies, paired to tions, but these should serve as a useful starting
these external devices. In turn, the comlog links point for most characters. They are all Simple (D0)
to the other devices on and around the user and Hacking tests. They can be performed as easily by
connects them to a universe of data that can be a character’s Geist as by the character themselves.
viewed through a variety of different display mech- Many common forms of Geist serve as personal
anisms, commonly a retinal implant, contact lenses, assistants in this way.
or holoprojector. Control is covered by a mixture • Block: A character may select another person (or
of haptic and pseudotactile feedback systems, quantronic entity, such as a geist, AI fragment,
plus voice or eye-twitch inputs depending on the corporate account, etc) and block them. A blocked
user’s preferences. This, along with the assistance character cannot perceive or interact with any
of a person’s geist, allows instinctive and habitual quantronic data that the blocking character
access to vast amounts of data. broadcasts, and vice versa. This can be bypassed,
normally by using an alternative ID or finding
This means that a comlog’s interface and the rest of some means of falsifying their authentication.
the world are essentially indistinguishable. Barring This doesn’t prevent other forms of quantronic
the dial for more focussed activity, information interactions such as attacks. It only prevents
about a person or object extends from and gathers routine comlog activities such as those described
around that person or object, and users interact here. This action can also be used to unblock a
with devices by proximity or simple touch. person who has been previously blocked.
• Contact: Attempt to begin a voice, video, or
Due to a comlog’s implanted nature, they are holographic call with another person, allowing
theoretically vulnerable to attack. Most comlogs near-instantaneous two-way communication
don’t have a direct neural connection, but there are with someone on the same planet. The recipient
always horror stories about overclocked hardware can see who is attempting to contact them,
and some people set their Comlog to refuse
unknown callers. Others have their geist answer
INFORMATION FROM AR calls, forwarding anything interesting or impor-
In game terms, Augmented Reality means that there’s a whole host of information tant. A call can be the basis of other actions,
available just by looking — far more than there would be without AR. A normal including InfoWar attacks, though time delay
Observation test, for any character equipped to view Maya, can see a vast amount from distance can add Interference Soak to this.
of data about their immediate surroundings and the people nearby, and they • Record: Sounds and sights near the character
can interact with that data with the tap of a virtual button or a simple spoken can be recorded for later review using the
request. This wealth of data should be accounted for when a player asks what comlog’s sensors or any suitable connected
their character can perceive. device. Sounds can be recorded alone as
audio, or as part of video or holography. Sights
It’s also worth remembering that not everyone will have quite the same expe- can be recorded as still images, video, or
rience. Characters who aren’t connected to Maya, or who don’t have comlogs, holography. Some locations may be designated
won’t see the world in the same way. It’s easy for someone without Maya access as no-recording, restricting this function by
to get lost in a city where all the street signs are only visible in augmented increasing the Difficulty of the skill test. The
reality. Attempting to navigate a city or perform any action in an environment Difficulty increase depends on how restrictive
where AR is ubiquitous adds +2 Difficulty for any character who can’t perceive the designation is.
AR, either because they’re not linked to Maya or because they lack a functioning • Review: Review any recordings made using the
comlog. This also applies to characters whose comlogs are turned off, disabled Record action. Reviewing a recording allows a
by Breaches, or in dumb mode (see Infinity Corebook, p. 352). A character using a character to discover facts about that place or
lower-tech interface—such as a cheap undersubscribed Atek device — may ignore situation that they may have missed previously,
this penalty, but instead suffer +2 to their Complication range, as their AR interac- and the character can attempt new Observation
tions are awkward, stilted, or clumsy. or Insight tests for that situation that may have
failed before.
20 Chapter 2
THE ROLEPLAYING GAME
• Send: Send a message to another person in the comlog functions described on p. 20 are viable
form of text, images, sound, video, holography, options for this Breach Effect, allowing a hacker
simple programmes, or data. The recipient will to cause a target’s comlog to send messages,
receive the message as soon as data transfer make calls, transfer data, or start recording. In this
allows (nearly-instantaneous on-planet, several instance, any activity using a comlog hacked in this
minutes in the same system, longer to a different manner uses the permissions and authentications
system). Messages can be and are typically of the hacked comlog, rather than those of the
screened before they’re opened, to prevent hacker’s own equipment, which could be a hin-
opening anything dangerous. drance or an advantage.
• Study: Access readily available information on an
object, place, or person in view nearby anywhere Other Breach Effects can be useful in the right
within Long range, or about a specific subject. situations. Preventing a comlog from being able to
This allows for most standard Education tests to call out, record, or send messages, Disable Function,
be attempted to research or learn about some- can be a valuable trick. System Disruption can
thing. However, the sheer quantity of information hinder or impair someone’s activities in general.
available means that it’s often hard or time-con- Spoof/Sniff can steal a target’s authentications. Tag
suming to perform that research. This can also be is one of the most useful, allowing a hacker to
used to obtain trivial information, such as basic turn a target, or even an innocent bystander, into a
mathematics, checking the time and date, looking repeater. Revoke Authentication is one of the least
at their calendar or the public calendars of useful to use on a comlog. It will be immediately
others, or bringing up their financial data. Geists noticeable as the target’s AR and other functions
are often called upon to curate this information, stop and bring up errors and quickly fixed because
sifting through to find the most pertinent details implanted comlog authentication uses biometric
and providing information as required. data to grant authentication.
• Transfer: Copy information, recordings, or other
files from one network or device to another. AUGMENTED REALITY
This requires that the character have authorised People see the world wreathed in data. This is
access to both the origin and the destination curated and organised by their geists, as the sheer
and be able to establish a connection between amount of data out there would be impossible for
them. This is simple when sharing a recording a human to parse, rendering the whole endeavour
with a friend, passing from one comlog to pointless. A gestalt of each individual mesh net-
another, but may be more difficult if trying to work, individuals create and customise their own
transfer files to or from a secure system. It may experiences which cross and merge with those of
require other actions to obtain the necessary others where they interact. A person’s home has a
authorisation and access. Especially large files host of augmented reality overlays, collectively, the
or especially slow or restrictive connections may patina, that are as much a part of the experience of
mean that this takes additional time. living there as the physical décor and are visible to
visitors to the home. Similarly, businesses and com-
HACKING A COMLOG munal spaces have their own patinas that bleed
A hacker who uses the Data Manipulation Breach into the personal sensoria of each person present.
Effect (see Infinity Corebook p. 121) on a target’s Outside locations catering to Ariadnans and Tohaa,
comlog can make alterations to the AR information few places still use physical signage. Signs and
the target perceives. This could be to hide or alter notices exist in AR, allowing them to be changed
some of the information the target sees or hears easily when needed and to adapt their content for
or to reveal things that are normally hidden to each viewer, such as changing languages according
them. Hackers can send an anonymous message, or to the reader’s preferences.
more convoluted ones such as altering a navigation
process to show a different route, or sow dissent When a person looks out into the world, he can
by changing messages received from others. These see others interacting with augmented reality as
kinds of changes are temporary and the data is well. They can touch interfaces that hang in mid-air,
restored from mesh backups regularly, overwriting converse with the ghost or remote holopresence
altered or erroneous data. However, it can be useful of a friend, give an instruction to their geist, or
if used intelligently. It can also be used on data even play a board game with animated AR pieces.
the comlog broadcasts, such as the target’s halo Some elements are more visible than others. While
(p. 22), altering the target’s AR presence in subtle one person might be quite happy listening to a
or overt ways. song and seeing the holographic visualisation that
accompanies the tune, it might be rude to impose
Similarly, the Command System Breach Effect can that on others, so everyone else sees a muted
produce interesting results if used by a cunning version around the listener, as a cue informing that
hacker on a target’s comlog. Any of the normal this person is listening to music.
Advanced Infowar 21
CLOUDS AND HALOS so a person with no halo is conspicuous, often
A key element of the quantronic world and how it indicating someone without a Maya connection,
lets people interact are two interrelated concepts: or functioning commlog. A lack of a halo is often
the social cloud and the halo. regarded as suspicious, because it represents an
unknown. Having no information on someone
A person’s social cloud is all the data they connect is strange when everyone is surrounded by
to, consciously or otherwise. It’s all the ways their information. Someone could even be identified—
comlog syncs their patina with those nearby, and mistakenly or not— as an Atek, which can draw the
all their social connections: connections to friends, wrong kind of attention entirely.
colleagues, home, and workplace, the channels
they subscribe to, the clusters they take part in, the As a guideline, the information that can be
personal details they share, and all the quantronic obtained from another character’s halo falls into a
traces that make up their lives, past and present. few rough categories of permissions, listed below.
Each level contains the information from the
But a social cloud is also all the traces and trails levels below it.
left behind that a person may not know about, • Permission-0: A common “stranger-level” of
or which they may not broadcast—their “data permissions, providing only the most basic infor-
shadow.” Surveillance footage, communications mation. This level is typical of private people,
logs, transaction receipts, and a billion other tiny who choose not to share information readily.
interactions aside make up a person’s footprint in This will normally only be the owner’s name, age,
the quantronic world. and career or profession.
• Permission-1: A slightly less private level of per-
A halo is the portion of a person’s social cloud missions, and a common “public halo” level for
that they choose to make immediately visible, many people. This normally includes a selection
as part of the AR surrounding them. Everyone’s of images and videos of the owner from notable,
halo is different. Some are a swirling, noisy mass happy events, links to some of the media they
of public broadcasts and open data. Others are enjoy, or some of the public Maya clusters they’re
curated, minimalist displays of only the most part of. This is cultivated and curated to create a
pertinent information. Like the social media of the specific impression and is a virtual first impres-
past, it’s up to the individual how they choose to sion. Other Permission-1 settings may focus on
present themselves, only now, that public profile business, with forwarding links to a company’s
surrounds individuals as they go about their lives. public-facing Maya cluster, contact details for a
Privacy settings on halos allow a person to display few key colleagues, a public calendar for work
different information to different people — a profile events and availability for meetings, information
for friends, one for colleagues, one for strangers, or about work history, and career accomplishments
even more nuanced than that. Similarly, people may as a form of ever-present resume.
adjust their halo depending on what they’re doing • Permission-2: An open level of permissions, but
at the time. Choosing the right content for a halo not completely unrestricted. Some especially
PRIVACY, can be a vital part of a job interview, party, or date, open, outgoing individuals may use this level as
SUBJECT TO almost akin to virtual clothing. their public default, as will anyone who aspires
CONDITION to or revels in celebrity or is trying to promote
Of course, a person’s halo
A halo is the entry point to the social cloud. It’s the themselves. This will contain the basics, plus a
privacy is not absolute.
Governments and corporations part that everyone else sees, and thus it’s the part vast assortment of links to content previews and
can hack a person’s social that connects with others. A person’s social inter- ways to buy that content, wish-lists for gifts from
cloud. Government intelligence, actions may rely on their halo to present the right fans, a public calendar for future appearances at
security, and law enforcement impression, and the ability to read the halos of social gatherings, contact details for an agent
agencies can normally gain others finds openings for conversations. Very rarely or representative (often just their geist), adverts
access to a person’s social cloud will people not know the names of the strangers for products they’re paid to promote, and various
with reasonable suspicion of around them, as a person’s name is right there in other forms of self-promotion or attempts to
wrongdoing. Each government their halo, and depending on the circumstances, monetise their lives.
regards “reasonable suspicion”
information about career, hobbies, and family. • Permission-3: The most open level of permis-
differently, with Yu Jing having
People can grant or rescind halo permissions sions, normally reserved for friends, family, and
an especially open definition.
Businesses track Maya searches, at a moment’s notice with a gesture or a simple close colleagues. This is everything, or almost
purchases, and other activity, command, often as a natural part of inter-personal everything, in a person’s social cloud, though
data-mining through their interactions, akin to a handshake during a meeting, often arranged or structured so that it can be
hardware and software to or a signal of pleasure or displeasure. read easily in AR.
target advertisements and
gather consumer information to Indeed, so ubiquitous are halos that it can be It takes no time or effort for a character to alter
sell on to other companies. mildly disconcerting to see someone without one. halo permissions, moving someone from one
Only the poorest citizens don’t broadcast a halo, level to another. This is often done upon meeting
22 Chapter 2
THE ROLEPLAYING GAME
READING HALOS
A person’s halo is a valuable tool in social situ- Intransigence towards specific Metanoia Effects FAKE IDS AND
DIGITAL SHADOWS
ations. You can walk up to someone and already with a quick Insight or Observation test (Difficulty
Fake IDs can vary from the
know their name, and maybe even more, just 3, reduced by the level of permissions a character laughably transparent, to the
because you’ve looked at their halo. In turn, they has for the target’s halo). Befriending someone startlingly complex. As the
can know as much about you. This eases a lot of can convince them to provide greater halo per- quantronic world became more
social anxiety, dispensing with an initial obstacle missions, revealing more information to use. prevalent and important, the
between strangers. Introductions are quick amount of data needed for
and easy, and common interests can be found Similarly, a halo can provide the clues necessary a Fake ID to pass inspection
instantly. to research or study a target in more depth. has increased.
Discovering that a person has a connection to a
A Fake ID contains a
These are key elements of social interaction specific group, through work, hobbies, socialising,
patchwork of invented or
in-game: characters engaging in PsyWar, or even etc., can provide avenues of research that didn’t
stolen data, woven through
just research, may gain vital information from a exist before. A skill test to research a person for other dataspheres to create
target’s halo, and use that information to open their connections or activities reduces in Difficulty a reasonable facsimile of a
a dialogue or even manipulate the target. This by the level of permissions you have for the real person’s digital shadow.
can help spot opportunities to use PsyWar tech- target’s halo —it’s simply easier to find out more Stolen data is easier for this,
niques like Coax, Deceive, or Seduce (see Infinity information about someone if you have a greater and identity theft remains an
Corebook, p. 130), or to be able to gauge a target’s number of leads to start with. extremely lucrative endeavour
for organised criminals.
Inventing new data is trickier
as it must be thorough, so many
for the first time, normally with a handshake or if a person has gone to a specific bar, entered by a
groups use lesser AIs to craft
similar physical gesture. Some people even leave specific door, sat on a specific stool, and drunk from
identities, based on data mined
this up to their geists, especially where they have a specific glass, all those interactions and more from other sources.
a geist set up to study human behaviours. Halo will be logged somewhere. The item’s QID logs will
permissions update automatically as part of any contain that information from the other, a long list
interaction, without the user ever needing to think of every person that has interacted with it since it
about them. first came online. These vast quantities of data can
be difficult to search and parse needing geists and
DOMOTICS LAIs to perform the search, and they’re accessible
only to the owners and other authorised persons.
For an ordinary person, some elements of their
world are automated, and the richer someone is, Each QID ‘knows’ its owner. Specific identifiers
the more likely it is that their world conforms to connect an item to a person or organisation.
their will through responsive, automated processes, As standard, only an object’s owner, and other
collectively known as domotics. authorised persons, may access the QID logs for
that object. Law enforcement and other authorities
For a hacker, this is still true, but domotics do more are able to obtain clearance given probable
than remove the hindrances and annoyances of cause. Anyone else is only able to see the surface
life—they present opportunities. When household data from the object, such as who owns it and
objects are smart, they become a hacker’s play- who made it.
ground and part of the battleground of InfoWar.
Similarly, many items can limit and restrict who can
QUANTRONIC ID interact with it in other ways. A door may be set
Almost every object and location a character only to unlock and open for specific individuals. A
encounters, barring wild frontiers where the vehicle won’t start for an unauthorised user. This
quantronic world isn’t yet integrated as fully, will kind of interaction usually occurs after a simple,
have some form of Quantronic ID, or QID. Each deliberate physical contact such as tapping the
contains a unique identifier code and is associated object twice with one or two fingers (a double-tap)
with scanners and monitoring processes that log to bring up an AR interface. Simpler objects will
every interaction between that object and the trigger the normal function for example turning
people and objects around it. on or off a light or bringing up an associated file.
There are some interactions that can’t be restricted
What this means, is that even mundane objects are like this — no amount of authentication can stop a
a wellspring of data, for those who know how to person sitting in a chair or drinking from a glass.
use it. Studying a QID’s records can provide a vast
amount of data about the movements and activities Getting deeper access to a QID requires
of people. A person’s quantronic shadow (p. 34) obtaining or forcing authentication (see Infinity
will have this information from one perspective: Corebook, p. 116).
Advanced Infowar 23
MEME-TAGGING The tricky part is that not all meme-tags are
Even objects that don’t have their own QIDs and visible to everyone, and even then, they may not be
are not inherently interactive can have domotics. immediately obvious. Some are hidden, visible only
With the ubiquitous way that physical reality and to those with specific authentication for secure
the quantronic world overlap, it’s easy to place communications between individuals or groups.
quantronic markers that are related to physical
objects or locations. These markers are known as Creating a meme-tag is straightforward. Select
meme-tags. They exist entirely within the broader the object or location that the tag will be related
Mayasphere and are surprisingly commonplace. to — normally something that the intended users
will notice. Then, select the authorisation needed
Reading a meme-tag is simple enough. Walk up to to read the meme-tag. This could be everyone, or it
the object the meme-tag is related to, double-tap could be a specific subset of people. Finally, deter-
it, and the information associated with the tag will mine the kind of information that will be presented
appear. This is normally something simple like a when the meme-tag is read such as a single file or
video, audio file, or hologram commemorating a a link to something else.
past event, a message, directions to somewhere
else, or a link to a datasphere or Maya cluster. GHOSTING
People no longer need to be somewhere to be
somewhere. Remote presences are enabled by
augmented reality and holography, allowing face-
to-face interaction without ever being in the same
room. This is known as ghosting, which is not to be
confused with direct control of a remote. Normally,
the difference will be clear in context as remote
holopresence has no physical component.
24 Chapter 2
THE ROLEPLAYING GAME
a walk, the ghost will appear to walk where and ghost and perform complex activity, or any activity
when the friend does. that requires their attention, unless they are pulling
reality and thus able to see what they are doing.
Most ghosting occurs in one of two forms — either
the person ghosting is visiting a place, or they If a character currently ghosting suffers one or
are visiting a person. Location-ghosting, or virtual more Breaches, the call will end immediately, and
tourism, is frequently for seeing sights and experi- their holopresence will vanish. Similarly, if the
encing events that may not be physically accessible. character’s ghost attempts to move outside of Close
This includes landmarks and tourist destinations, range of their destination — either the location they
entertainment such as live music or theatrical pro- are ghosting to, or the person they’re visiting— the
ductions, and lectures, debates, seminars, and public call will end immediately.
speaking. Any event where there’ll be an audience
will have location-ghosting, and movement of GHOSTING PAST SECURITY
ghosts will be limited to certain areas to minimise A character can attempt to project themselves into
disturbances. Walking through a ghost is less of an environment without it being publicly-accessi-
a faux pas here, due to the dense crowds. These ble, or without having someone there to ghost to.
events often charge a fee for ghosting, though This is, however, more difficult.
this is typically less than the ticket price for being
there in person. Visiting a person is even simpler. It A character with a hacking device may attempt
typically begins as a voice or video call, which then to project themselves into any location within
transitions into a visit for one, other, or both, with Close range of themselves, or within Close range
a projection appearing nearby. It ends in the same of a repeater, with a Daunting (D3) Hacking test.
way, with one or both parties ending the call. While technically a hacker can project a ghost of
themselves within Close range, it’s also of limited
Some ghosting will be mutual, rather than one use, given the effort involved relative to the
person visiting another. This involves pulling reality, benefits. However, gaining access to a repeater, or
creating a composite of both participants’ current tagging a device to serve as a repeater, can allow a
locations as a shared space that both inhabit. This character to go to places they’ve never been before,
is often used for collective working, conference and obtain information that would otherwise be
calls, and other collaborative efforts, and those who impossible.
engage in this practice regularly often create spe-
cific composite environments that are designed to Remember, however, that a holopresence cannot
physically and virtually overlap. Many corporations move too far from the repeater that is receiving
have conference rooms to enable meetings that them, and that holopresences are both visible and
connect different offices. These rooms are designed clearly marked as holograms. It’s impossible to
to impress, with sweeping vistas where you can pass a ghost off as a real person, and enemies who
look out of one window and see the night sky over spot an unauthorised projection are liable to sound
one city and from another, see the midday sun over the alarm.
a different city.
Advanced Infowar 25
MAPPING DATASPHERES and by damage (Breaches) to other systems. It
specifically signals that there is trouble in the
A quantronic zone typically represents a single foyer. The alarm system is a secured zone, with
system within a single network. This could be large a Firewall of 12, Security Soak 2, and can with-
or small and may or may not have a physical coun- stand 2 Breaches, like an Elite NPC. If the alarm
terpart in the real world. These zones in turn will is triggered, it adds 2 Heat to the GM’s pool at
have connections to one another. Where physical the start of each Round, which the GM may use
zones are defined by physical access — the ability to for locking doors, summoning reinforcements,
move from one to another — quantronic zones are and providing a security response.
determined by the flow of data. Quantronic zones • Front Door Locks: The large, reinforced glass
can connect to one another in ways that physical front doors open automatically for the public,
zones cannot, with a single system possessing but can be locked by security. The doors are a
countless connections of various kinds. secured zone, with a Firewall of 8 and Security
Soak 3, and can withstand 2 Breaches, like an
It can be useful to break down these connections Elite NPC. The GM may spend 2 Threat to lock
into distinct connective maps, each representing the front doors if the alarm is triggered.
a single relatively simple network, and where nec- • Elevators: Access to the elevators is secured, and
essary, allowing a character to transition between they will open only for those with the correct
a zone on one map to its counterpart on another. permissions, either from being an employee or
These points of overlap can also vary wildly in scale. granted by the receptionist. These permissions
The security cameras within a single room of a also determine which floors each person is
building may connect both to the other systems in permitted to enter. The system that governs
that room (a mesh network, or shallow map, which the elevators is a secured zone, with a Firewall
correlates to physical objects in a real place), to the of 12 and Security Soak 3, and can withstand 2
security system in the building (a deeper network, Breaches, like an Elite NPC.
connecting devices related by common purpose • Advertising Display: An array of holoprojectors,
and similarity of data), and to a wider planetary responsive and interactive, the advertising
or system-wide network (a deeper network still, display allows potential customers to see the
connecting devices of common ownership). Go deep company’s products and achievements and learn
enough, and a hacker can move between data- more at their discretion. The display is secured
spheres, though this isn’t always effective, or worth to prevent unauthorised changes but contains
the effort compared to finding a more direct way in. data that is intended for public consumption.
• Front Desk: A receptionist sits at the large
But, rather than talk about this in an abstract main desk, serving as a main point of enquiry
manner, this section will go step-by-step through for visitors. Perhaps a little anachronistic—the
an example network, a security system in a corpo- receptionist’s job could be automated—but the
rate building, explaining how it was constructed presence of a person makes the company seem
and the reasoning for different components friendlier and more approachable. They’re also
and elements. a first line observer for building security, both
physical and quantronic. The receptionist grants
LAYER 1: MESH NETWORK visitor authentication and permissions for access
The office is publicly accessible, serving as a to the rest of the building, as necessary. The desk
showroom and providing direct customer services. itself serves as an access point for authorised
The main foyer contains several systems of note. users wishing to access the building’s network
Each of the zones listed below is adjacent to all the and is a secure zone with a Firewall of 12 and
others; their physical positioning is irrelevant. The Security Soak 3, which can withstand 2 Breaches,
zones marked in red are also part of the security like an Elite NPC. However, while the receptionist
network (Layer 2). is at the desk, the zone uses the receptionist’s
• Security Cameras: There are four cameras in the Firewall, Soak, and Breaches.
foyer, minimising blind-spots. They record video • Security Staff: Two security guards stand on
and audio within the foyer, and their combined opposite sides of the room, dressed smartly but
inputs can be composited into a single holo- intended to be inobtrusive. They’re armed and in
graphic image. They also track authorisation constant communications with one another, the
and permissions of individuals visible to them. receptionist, and the security office upstairs. They
The security cameras are secured zones, with a have their own Firewall, Security, and Breaches,
Firewall of 5, and Security Soak 2. Each can take and permissions to access the security network.
a single Breach, like a Trooper NPC. • Vending Machines: A pair of simple food and
• Alarm: There is an alarm system for the foyer drink dispensers, the vending machines will
as well. This is can be triggered manually by dispense to any customer and are not secured.
personnel, by unauthorised access to locations,
26 Chapter 2
THE ROLEPLAYING GAME
Front Door
Camera 1
Locks
Elevators Alarm
Front Desk
Camera 2 IC-1 Counter- Camera 3
measures
Vending Advertising
Machines Display
Building
Camera 4
Directory
Advanced Infowar 27
or automated from a dedicated LAI—but takes context. The software will automatically flag any
a little longer to obtain. This database contains events it regards as unusual. The security system
a continually self-updating list of all persons is adaptive and expansive, and often highly
and quantronic entities (LAIs, geists, etc) with intuitive. This is a secure Commercial HighSec
permission to enter the facility or access its sys- zone (providing 2§ Interference Soak), with a
tems, as well as details of what their permissions Firewall of 16, a Security Soak of 4, and can take
allow them to do. A Breach Effect here can create up to 5 Breaches, like a Nemesis NPC or a Player
authentication for the whole security system. Character. Further, due to active security measures,
Using that information, security personnel and any InfoWar attack made against the zone has +2
systems monitor the movements and activities Difficulty and is noisy for the purposes of stealth.
of staff and visitors. The security database is • Local Archive: The local archive contains security
a secured zone, with a Firewall of 16, Security reports from report processing for the last
Soak of 4, and can take up to 5 Breaches, like a six months, annotated by staff. Older reports
Nemesis NPC or a Player Character. It is always are stored off site in another archive. This is a
inhabited with an expert system (see p. 81) secure Commercial HighSec zone (providing
which monitors and updates the database and 2§ Interference Soak), with a Firewall of 16, a
responds aggressively to any intrusion. Security Soak of 4, and can take up to 5 Breaches,
• Report Processing: This system is built to gather like a Nemesis NPC or a Player Character.
the data from individual cameras, door systems, • Connections: On the diagram, these lines denote
and elevators, and collate that data into a real- the data connections between systems, and
time report on where everyone is at that specific thus the permissible movement between zones.
moment. Report processing contains only current Normal connections — simple lines—allow free
data—things happening now—and the reports movement of data (and hackers).
from the last hour to provide context. Any reports • Restricted Connections: Some connections in this
older than an hour are passed into a local archive network have hardware restrictions that only
and then a larger corporate one, allowing for a permit data through specific ports. Attempting
complete image of all movements and activities to move along a restricted connection requires a
within the building over any period. The current Challenging (D2) Tech test. These are marked as
report will be accessed periodically by security red lines on the diagram.
personnel investigating specific matters or • Burst Connection: Some connections in this
random spot checks and annotated for additional network are not always-on. They transmit a
Front Desk
Report
IC-1 Counter- Local Archive
Processing
measures
Door Cameras
Locks
Elevators Alarms
28 Chapter 2
THE ROLEPLAYING GAME
large amount of data in a fraction of a second, connections to vessels in orbit or other worlds and
and then cease transmitting. Attempting to outposts within a single solar system are relatively
detect this connection’s existence requires a fast and easy. But beyond that, there are limitations.
Daunting (D3) Analysis test (normal modifiers Reaching other star systems requires infrastructure
for range and perception apply), as it is difficult and planning that are scarce in a world where most
to detect when not transmitting. Moving along other things are abundant.
a burst connection requires either waiting for a
scheduled transmission or a Breach effect on the INTRASYSTEM SIGNAL DELAY
transmitting zone to force a transmission, which Normal signals are limited to light-speed. This
is noisy, as it’s unscheduled. These are marked as means that there’s a delay over interplanetary
dashed lines on the diagram. distances within the same solar system, which
can range from several minutes, to an hour or
PUTTING IT TOGETHER more. It takes roughly 8 minutes 20 seconds for
With two maps in place, now we need to consider data to travel 1 Astronomical Unit. This is fine for
how to navigate this. A few zones overlap between monodirectional signals that send information one
the two maps, allowing movement from one to way, to be received all at once and then responded
another, much as a character might navigate to in kind later. Instantaneous, real-time interaction
between floors of a building. These are the keys. though is impossible, as it faces twice the signal
delay, as the signal must cross the distance with an
A hacker is trying to get into the local archive to input, and then return with the response. A hacker
find out what an enemy was doing in this building would have to be able to accurately predict and
a few days previously. They don’t have a reason to react to events which haven’t happened yet to
be in the building legitimately, so they can’t get effectively function over such long distances.
past the foyer physically.
The normal solution to this, and to most dis-
There are three unsecured zones in the foyer— tance-related problems that confront a hacker, is
directory, the advertising display, and the vending automation. A hacker cannot effectively access
machines — though none of them have a direct con- networks and dataspheres with more than a few
nection to the security network. Any of those three seconds of lag, as real-time responsiveness is vital
are possible ways in, but if the hacker is detected, for both offense and defence, but they can send
they make for a slower path. The cameras have a a proxy to do the work for them. This requires
more direct route, camera, then report processing, creating or obtaining a program able to operate
then the archive. But, they’re not made to be access autonomously, ranging from an expert system, to an
points, making the route trickier. The front desk has instance of a specialised geist or similar lesser AIs.
a direct route, and one that’s relatively open, but it’s This program can then perform the desired actions,
also got an active defender, the receptionist, who respond accordingly to resistance and coun-
could pose a problem. ter-measures, and send information back, returning,
or self-deleting as required.
All of this presumes a brute force approach,
Hacking and Tech tests, making attacks, and using Sending a proxy requires some effort and is
Breach Effects to punch holes in or disable secured difficult. The program cannot be sent openly, as it
zones. A subtler approach is also possible here. A is liable to be detected and deleted before it can
little social engineering can secure the permissions get to work. This process is called packing, which
to get part of the way in, or steal authentications compresses the program, and disguises it so that it
needed to make a quiet entrance. cannot easily be identified for what it is. Packing a
program takes a Daunting (D3) Hacking test and at
These maps could be expanded further. There are least an hour of work. Momentum generated from
naturally other networks in the building, serving this test can be stored in the program, representing
different purposes, and zones in those networks more expansive and flexible instructions. The
could expand out and overlap with other networks program may use this Momentum freely, but cannot
elsewhere in the company, or connect to Maya spend Momentum from the group pool otherwise,
clusters or other dataspheres. These kinds of maps as they’re too distanced from their owner.
can be expanded to cover as little or as much as
the GM and the players are interested in exploring Once packaged, the program can be transmit-
and exploiting. ted, and it will unpack itself and get to work
upon arrival.
EXTREMES OF DISTANCE
Expert Proxy X: Where most expert systems provide
Data swirls around worlds like wind or water, and automated support and assistance to the user, an
planetside connections are fast and efficient. Even expert proxy uses those processes and subroutines
Advanced Infowar 29
to perform straightforward tasks by themselves. An METATRON AND DAˇRAˇO
Expert Proxy makes Hacking, Analysis, and Tech Of course, these are not the only options for distant
tests using an Attribute score of 8, and Expertise data transmissions — where a problem exists, some-
and Focus ratings in those skills equal to X. They one will seek a solution. In this case, the solution
also have Firewall equal to 9+X, and Security Soak is a series of transponders, collectively called the
X, but they can only withstand a single Breach. Metatron network (and its Yu Jing counterpart,
Further, each Expert Proxy can be equipped with a Dǎrǎo), which allow for faster-than-light data
single SWORD-1 or CLAW-1 program, and a single transfer, communications, and InfoWar attacks. The
SHIELD-1 program, which the hacker sending the specifics of the technology remain highly classified,
proxy must own. Expert Proxies are programmed to restricted primarily to government and military
self-delete upon the conclusion of their objective, use. The largest user of these systems outside of
leaving virtually no trace of their presence. Expert PanOceania and Yu Jing is ALEPH, who maintains a
Proxies have a Restriction of 2, a base cost of connection between instances and aspects across
2+5§, Tariff X. the Human Sphere.
LAI Proxy: An LAI proxy is constructed in the same Access to Metatron or Dǎrǎo cannot be bought
way as a geist, as they use broadly similar technol- with wealth or status. Rather, access is provided
ogies. Both Guardian Geists and Security Geists (see only because of absolute strategic need under the
Infinity Corebook, p. 379) are good templates for military or political discretion of the governments
this, though they are more offensive in purpose. An of PanOceania or Yu Jing, or authorisation from
LAI proxy can be equipped with one program per within O-12. The strategic value of these networks
point of Hacking Expertise, with no program rated is so great that access is heavily scrutinised, as any
higher than its Hacking Focus. All programs must instance of permission could be the start of a move
be owned by the LAI’s owner or creator beforehand. to undermine another faction’s control.
As they are more intelligent than Expert Proxies,
they can be given more complex objectives, and If a character has received permission to access
can even be commanded to hide within a system Metatron or Dǎrǎo, then they gain the ability to
for a protracted period, to await subsequent transmit data on an interstellar scale. This takes
instructions, or to attempt to repack themselves the form of a single string of four intermediary
and transmit themselves home. zones that sit between star systems and the data-
spheres within them. Other zones will be attached
PACKAGE TRANSIT on each end of this string, representing part of
Data transmission through wormholes is even more dataspheres which are connected by Metatron/
difficult than simply dealing with the lag from Dǎrǎo. Traffic along this string is one-way, though
distances. As signals cannot be beamed through a there will be a parallel string that runs in the
wormhole using any ordinary transmitter, data must opposite direction for return traffic, and both are
be transmitted to specialised commodules near sufficiently fast as to allow real-time interactions.
the wormhole, which handle transmissions to the 1. Input Cache: The first zone is a cache, which
other side, adding both signal delay and another gathers and processes incoming data, and
bottleneck for data transfer. These problems are checks the authentication of the sender, then
compounded by the fact that ALEPH monitors moves it along. This is a secure zone, requiring
inter-system traffic, making it difficult to smuggle authentication specifically from one of the
even the most cunningly concealed proxy. above governments. This is a two-factor
system, requiring both a unique code fragment
Data can also be carried by a ship, which collects and biometric data. For anyone attempting to
intersystem data before departing (not all of it access the Input Cache without permission,
legal) and then transmits it again when it emerges it has a Firewall of 20, Security Soak 6, and
from the other side of the wormhole. But this is Military HighSec (+4§ Interference Soak),
only really suitable for low-priority bulk data that and is also hidden by advanced and adaptive
isn’t important enough for a direct transmission, camouflage, requiring an Epic (D5) Observation
and it can add days of delay. test to even detect the zone.
2. Transmission Router: The second zone trans-
In these circumstances, the proxies described above mits the data to the destination. To free up
can still be useful. There is a risk of detection by bandwidth, this zone is not protected —that’s
ALEPH, but of course, if you’re doing ALEPH’s work, the purpose of the input cache.
this might not be a problem. The sheer amount of 3. Reception Router: The third zone receives
time required means that such methods cannot transmissions at the destination. Technically,
help when time is of the essence. there are many reception routers for different
locations and destinations, but data needs to
have a destination logged before it can pass
30 Chapter 2
THE ROLEPLAYING GAME
the Input Cache. Diverting from that mid-trans- The encryption arms race accelerated further
mission is impossible. Again, this zone is not with the development of ALEPH, and a significant
protected. portion of cryptography was taken up by LAIs and
4. Output Cache: The final zone gathers and ALEPH fragments. Some theorised that only an AI
processes the data just transmitted, checking could create an encryption that an AI would be
for authentication, and then sends it along to unable to break, while others in the field pushed
its ultimate destination. This uses the same towards more esoteric developments to find pro-
authentication as the input cache and has cesses that computers couldn’t easily understand.
the same defences. For anyone attempting to
access the Output Cache without permission, Nevertheless, encryption remains an extremely
it has a Firewall of 20, Security Soak 6, and active field, where new developments are devised,
Military HighSec (+4§ Interference Soak), implemented, and rendered obsolete in weeks.
and is also hidden by advanced and adaptive
camouflage, requiring an Epic (D5) Observation ENCRYPTION
test to even detect the zone. The specifics of encryption change so quickly that it
would be impossible to accurately categorise them.
Instead, we abstract the process of encryption — and
CRYPTOGRAPHY its counterpart, decryption — in a way that emulates
the constantly shifting nature of the field.
Ensuring that information is accessible only to
those who need to access it is a vital part of tech- Encrypting a specific file, system, or collection of
nological development, and the subject of an arms data above and beyond the routine encryption
race that has existed for as long as people have that is a part of the quantronic world takes skill
desired to keep secrets. Nations and corporations and effort. The level of encryption to be applied
devise new technologies to break the encryption can be broken down into one of five categories,
used by their rivals and enemies, and in turn, they based primarily on how old and well known the
seek to develop new methods of encryption that techniques are.
those rivals and enemies cannot break. This arms • Encryption-1: This level uses largely obsolete
race has only accelerated as time has passed. techniques, potentially decades old. This won’t
stop a quantronic computer for more than
The revolution of quantronics that came with the a few seconds, though it may deter cursory
discovery of Teseum shook up the landscape for examinations and stop intrusions from older
cryptography. A computer that could perform vast technologies and manual decryption.
numbers of processes simultaneously could brute- • Encryption-2: This level uses techniques that
force through most common forms of encryption are years old and will serve mostly as a delaying
in seconds, where previous machines, handling tactic to slow down intruders briefly.
processes sequentially, might have required dec- • Encryption-3: This level uses cryptosystems
ades. Commerce and finance were threatened on an that may be months old, and which cannot truly
international scale. Security was a vital component secure information, though can delay intrusion
of their business, after all. for a while.
• Encryption-4: This level uses cryptosystems and
Thus, cryptographers, mathematicians, programmers, techniques that are several weeks old. This is
and others sought to devise cryptography that a sufficient to secure information from everything
quantronic device couldn’t simply force through. except military-grade decryption methods.
Finding the solution would earn them a fortune. • Encryption-5: The highest level of encryption
The biggest success was the development of uses state-of-the-art cryptosystems, no more
algorithms that required multiple simultaneous than a few days old. Even military-grade LAIs
solutions to be provided, slowing the speed a haven’t yet learned how to crack these yet,
quantronic system could pry open. This success though they will in time.
was short-lived as processing power increased, so
the complexity needed to increase. Researchers Encrypting data requires a Hacking test with a
aspired to force quantronic computers to process Difficulty equal to the level of encryption desired,
a cryptosystem more slowly. Active lock protocols so applying Encryption-3 requires a Daunting
invalidated all attempts if certain solutions were (D3) Hacking test. This will take a few hours of
tested, forcing a fresh start, and sequential keys work as well.
broke the decryption process into a series of
discrete stages. but, these too were only successful Complications on this test will introduce flaws that
for a time. can be exploited. Momentum can be spent from
this test to add extra layers of security. These are
discussed further in the following section.
Advanced Infowar 31
Encryption also takes research, which can be level. As its Soak, it has Delay, which reduces how
expensive. Details of cutting-edge cryptosystems much progress can be made at any one time; this
are valuable and secret, and while a black market is always Persistent Soak, and each encrypted file
exists for it, such knowledge comes at a hefty price has Delay Soak equal to its Encryption level −2, to a
whatever the source. The restriction of an encryp- minimum of 0.
tion library— a collection of information needed to
effectively encrypt data to a certain level —is equal Decryption follows the process below:
to the desired level of encryption, and costs X+X§, 1. The character attempts a Challenging (D2)
where X is the level of encryption, with a Tariff Hacking Test.
of 2, and Maintenance of encryption level −1. The 2. If the Hacking test was successful, the char-
Maintenance represents the cost of ensuring that acter rolls to determine progress. Each type
the library is regularly and routinely updated with of decryption software has a rating which is a
the latest data. Thus, a library for Encryption-3 has combination of two numbers — a fixed value
a Restriction of 3 and costs 3+3§, Tariff 2, with a and several §. This receives bonus dice as per
Maintenance of 2. the bonus damage table, using the character’s
Intelligence attribute. Once this bonus has
A character can use the same library to encrypt as been applied, make the progress roll using the
much data as they like, on as many occasions as § indicated, and total the result.
they wish. But because the field of cryptography 3. This total is reduced by one for each point of
changes so quickly, the usefulness of any encryp- the encrypted file’s Delay Soak. This is the total
tion applied will become increasingly obsolete over progress.
time, as shown on the table below. 4. The total progress, after reduction, degrades
the encrypted file’s Complexity by an equal
DECRYPTION amount. If five or more progress is made, after
Upon encountering encrypted data, a character can reduction, or the Complexity is reduced to 0,
set about attempting to decrypt it. The difficulty or any Progress is made when the Complexity
and the time taken depends in part upon the level was already at 0, then the character makes
of encryption encountered and in part upon the a Breakthrough. If both occur, then two
tools and techniques the character uses to perform Breakthroughs are made.
the decryption. 5. If the number of Breakthroughs made is equal
to the level of Encryption, the data has been
The process for decryption is like making an attack. decrypted.
The character makes a skill test, then rolls several
Combat Dice to determine progress, akin to damage Due to the similarity between this process and to
in combat, which represents attempts made to making an attack, Momentum spends and attack
break the encryption. If five or more damage is qualities which normally affect the damage roll,
inflicted, then a Breakthrough is made, equivalent number of Harms inflicted, and so forth, can be
to Harms. Once the number of Breakthroughs made applied to encryption and decryption, at the GM’s
is equal to the level of Encryption, the data has discretion.
been decrypted.
EXTRA SECURITY FEATURES
The Stress of encrypted data is called Complexity. When a file is encrypted, it may be provided with
The greater the Complexity, the slower the decryp- additional features, which can make the encryption
tion is likely to be, and each encrypted file has harder to break. These can be purchased with
Complexity equal to 6 plus twice the Encryption Momentum when a character successfully encrypts
the file. Where features can be purchased multiple
MOMENTUM SPENDS times, they will be noted with an X. This is replaced
with the number of times that feature has been
MOMENTUM purchased.
NAME EFFECT COST
Before a Hacking test is attempted to decrypt, restore 1 Whenever a character achieves a Breakthrough,
Adaptive Algorithm X 2
point of lost Complexity. they may disable one of the encryption’s secu-
Increased Complexity X Increase the Complexity of the encryption by 1. 1 rity features.
Increased Delay X Increase the encryption’s Delay Soak by 1. 1 FLAWS AND EXPLOITS
Increase the Difficulty of the Hacking test to perform When a file is encrypted, there may be inad-
Restricted Access X 2 vertent flaws in the cryptosystem that can
decryption.
be exploited by intruders. These come about
A failed Hacking test inflicts 1+(X*2)§, Piercing 1 because of Complications on the Hacking test to
Retaliatory X X
quantronic damage to the character attempting decryption. encrypt the file.
32 Chapter 2
THE ROLEPLAYING GAME
When a flaw is caused, the GM may select it from • Quality: This number, a rating from 8 to 15,
the following list, or create something equivalent. serves as the Target Number for any skill tests
Each of the options below applies an attack quality the active defence is required to attempt. An
to any progress roll made against the encrypted file. active defence may have a second rating, noted
• Sequential Fault: The decryption attempt gains in parentheses, which serves as the defence’s
the Grievous quality. Focus range for its skill tests.
• Time Saver: The decryption gains the Piercing 2 • Capabilities: This category indicates which skills the
quality. active defence may attempt. Most active defences
• Decisive Exploit: The decryption gains the have one or more of Analysis, Hacking, or Tech.
Vicious 1 quality. • Firewall: An active defence has a Firewall equal
to its Focus range (if any).
DECRYPTION TOOLS • Security: An active defence has Security Soak
The following tools are common methods of equal to its Quality divided by 4, rounding up.
decryption. They can be run from any Hacking Tool. • Extras: An active defence may have one or more
additional benefits, which may include one or
These tools have a Maintenance cost, representing more InfoWar programs.
the work and cost involved in ensuring that the
tools remain capable of dealing with the latest Active defences operate as a more limited form of
encryption techniques and algorithms. Trooper NPC. They roll a single d20 on skill tests,
cannot attempt Reactions, and are disabled after
QUANTRONIC SECURITY a single Breach. The GM may choose for an Active
Defence to function as an Elite NPC instead, and then
Dataspheres, especially ones containing sensitive the active defence has a Firewall equal to its Quality.
or restricted data, are laden with all manner of
defensive programs designed to deter, impair, repel, DOORMAN
or defeat would-be intruders. One of the most basic forms of active defence,
Doormen are set to guard and patrol, often deploy-
Some of these are discussed in the Infinity Corebook ing countermeasures to impede intruders and eject
already: quantronic terrain, data flux camouflage, them as swiftly as possible. They target hacking
HighSec zones, Intrusion Countermeasures, and devices to force a swift disconnect.
secured zones. This section deals with two Quality: 10
additional elements: more active forms of defence, Capabilities: Hacking, Observation
and additional details and context for stealth and Firewall: 5
evasion during InfoWar scenes. Security: 0
Extras: CLAW-1 Blackout, IC-2 Redtape
ACTIVE DEFENCES
Many of the most secure and sophisticated data- HOPLITE
spheres and clusters make use of free-roaming A common “soldier” program, Hoplites work in
programs and quantronic entities as part of their groups to block and repel intruders. They are
security, in addition to more static features such equipped to control and disable an intruder’s
as Intrusion Countermeasures and HighSec zones. comms systems, swiftly ending an intrusion, while
These active defence systems roam along data their own systems are especially difficult to breach.
channels, performing patrols and converging upon Quality: 12 (1)
detected intruders. Capabilities: Hacking, Observation
Firewall: 6
These active defences have several Security: 1 (+4§ Interference Soak)
common features: Extras: CLAW-2 Oblivion, SHIELD-2 Breakwater
DECRYPTION TOOLS
NAME PROGRESS RATING QUALITIES RESTRICTION COST MAINTENANCE
No Tools 1+2§ — – – –
Decrypt-1 1+4§ – 1 1+4§, T1 —
Decrypt-2 2+4§ Piercing 1 2 2+4§, T1 1
Decrypt-3 2+5§ Piercing 1 3 2+5§, T2 2
Decrypt-4 3+5§ Vicious 1 4 3+5§, T2 3
Decrypt-5 3+6§ Piercing 1, Vicious 1 5 3+6§, T3 4
Advanced Infowar 33
MINELAYER • Tech: Use of the Tech skill can represent a char-
Minelayer programs have little direct offensive acter adjusting the hardware they are using to
ability but can deploy and conceal potent counter- minimise or conceal the data flux they produce.
measures that no amount of forward planning can • Thievery: The Thievery skill includes a profes-
circumvent. sional familiarity with security systems, and
Quality: 12 (2) a character can use this to avoid the kinds of
Capabilities: Hacking, Stealth methods and technologies they’re familiar with.
Firewall: 6
Security: 2 The GM may allow any, all, or none of those addi-
Extras: IC-3 Black ICE, IC-3 Deadfall, tional options on a case-by-case basis.
IC-2 Hivemines
DATA SHADOWS
PROWLER Every person leaves a trail of data behind them.
These programs attempt to ambush identified Records and remnants of every connection and
intruders, often pursuing them to access points and every interaction exist in the wake of each person’s
through friendly networks. Their offensive capabili- passage through the quantronic world, and this
ties are quite potent. shadow cannot be removed entirely
Quality: 14 (3)
Capabilities: Hacking, Observation, Stealth For characters seeking to avoid attention, this
Firewall: 7 is a liability. For those seeking intrusions, it can
Security: 3 be an asset.
Extras: SWORD-1 Brain Blast.
A character’s data shadow can be difficult to find.
SENTRY Finding recent data (within several days) relevant
These programs roam secure networks, scrutinising to your target’s movement or activities requires
the people and entities that they encounter to a Challenging (D2) Analysis test, if any such data
locate intruders. When they find an incursion, they exists. This Difficulty may increase if the data is old,
monitor it, sending information to allied programs. as older data will require more time and effort to
Quality: 13 (2) find. Once a trail has been found, Momentum may
Capabilities: Analysis, Observation be spent to find other connections, such as other
Firewall: 7 times the target has been in that location, or which
Security: 2 locations they were at/which interactions they per-
Extras: IC-1 Crybaby, UPGRADE Cyberalert Systems formed immediately before or after the one already
discovered. Each additional connection costs 1
QUANTRONIC STEALTH Momentum. Complications may produce false
Moving unnoticed through the quantronic realm connections, or allow the data to be misinterpreted.
is important. The sheer range of obstacles, Attempting to find data if you already have a con-
defensive mechanisms, and security systems can nection leading there reduces the Difficulty by 1.
all make a hacker’s life difficult. For the most part,
the normal rules for stealth are applicable (see Attempting to conceal or obscure a data shadow—
Infinity Corebook, p. 104 ). However, there are a few your own, or someone else’s —is similarly tricky.
additional considerations that apply specifically to Simply deleting traces is not sufficient, as the sheer
remaining undetected in a quantronic environment. amount of data makes this difficult, and incomplete
deletions may be too obvious. Instead, the most
SKILL TESTS IN STEALTH effective concealment involves junk data, false
While the Stealth skill covers remaining unnoticed connections, and subtle disruptions. A successful
and moving undetected in any situation, hackers Challenging (D2) Hacking test can obscure data
have a few other options. within a single system or location, adding +1
• Analysis: While normally used for in-depth Difficulty to any test to locate it. Momentum
inquiry and observation of fine details, Analysis can be spent to increase the Difficulty further
can be used to spot patterns in detection pro- (2 Momentum per +1 Difficulty), or to increase
tocols so the character knows to avoid where a the Complication range (1 Momentum per +1
system is actively observing. Complication range).
34 Chapter 2
THE ROLEPLAYING GAME
CHAPTER 3
ALEPH CHARACTERS
To be a part of ALEPH’s faction is to be a part of the Non-human characters also have a Life Point cost. ALEPH LIFEPATH
AI, often quite literally. The overwhelming majority You can choose to pay this cost to simply choose DECISIONS
of ALEPH’s agents are Aspects, shards of the the species, but the cost must be paid even if you
DECISION ONE—
infinitely divisible AI, spun off to a consciousness randomly roll into it. (If the cost cannot be paid, the BIRTH HOST
of their own, as varied and flawed as any human. character is considered human.) If you roll a 19 or 20 you are an
Some would argue, they are exponentially bet- AI; roll on the AI Host Table.
ter-equipped to deal with the slings and arrows of
outrageous fortune that consciousness collides with. DECISION TWO: DECISION TWO—
FACTION AND
With the number of Posthumans increasing each
year, as well as a small, but steadily rising number of
ALEPH FACTION HERITAGE
AND HERITAGE
Characters with ALEPH heritage
those who’ve pledged their loyalty directly to the AI, can choose to roll on the AI
it would be folly to ignore the humans in its service. Host Table (p. 55) with no
Although some would debate whether the word If the Lifepath reveals your heritage is ALEPH, you additional Life Point Cost. If you
“human” still applies to them at all. can choose to roll on the AI Host Table (p. 55) choose not to (or if your current
with no additional Life Point Cost beyond those of faction is ALEPH, but you have a
your host. If you choose not to (or if your current different heritage), then you are
DECISION ONE: faction is ALEPH, but you have a different herit-
age), then you are simply a human who is loyal
simply a human who is loyal to
the AI.
BIRTH HOST to the AI. DECISION FOUR—
STATUS
Determining Alien Heritage: Roll 1d20. On a roll of If your faction is ALEPH, then
19 or 20, your character belongs to an alien species,
in the case of ALEPH faction characters, an AI (see
DECISION FOUR: your Social Status is Elite (and
you gain the normal benefits
p. 44.) If you roll an AI host, you can instead ALEPH STATUS for that Social Status). If your
faction is not ALEPH, then
choose to spend 1 Life Point to be human.
you have become a renegade;
If your faction is ALEPH, then your Social Status
determine your Social
AI Host: Each AI type has a template. Apply the spe- is Elite, and you gain the normal benefits for that
Status normally.
cies’ attribute modifiers to both your attributes and Social Status. If your faction is not ALEPH, then you
the Host section of your character sheet. Make note have become a renegade; determine your Social DECISION SEVEN—
of any special abilities possessed by your AI type. Status normally. ADOLESCENT
EVENT
Characters in the ALEPH
Faction roll on the ALEPH
Faction Adolescent Event Tables.
DECISION EIGHT—
CAREERS
Instead of rolling on the
appropriate Faction Career table
in the corebook, characters in
the ALEPH Faction roll on the
ALEPH Faction Career table,
as well as the ALEPH Faction
Career Event tables.
ALEPH Characters 35
ALEPH ADOLESCENT EVENT TABLE
SUGGESTED
D20 ADOLESCENT EVENT OPTIONAL EFFECT
CHARACTER TRAIT
Increase one Attribute by +1 but gain a 7+7§ Asset debt to a
1 You participated in faction-sponsored research Prototype
random faction.
2 You kept a secret with disastrous results. Cryptophobia Gain 1 rank in Analysis.
Trying to live up to your hero’s expectations, you wound up
3 Crushing Expectations Reduce Vigour by 1 but gain 1 rank in Discipline.
hospitalised for a year. What happened?
Living in the shadow of the AI, your geist developed the
Reduce your geist’s Resolve by 2 but increase two of its attributes
4 appearance of crippling self-doubt. You did your best to console it “Insecure” Geist
by +2 each. Gain a 4§ Asset debt.
with shiny new tech.
The personality of your geist radically shifted overnight.
Choose four of your geist’s attributes and increase them by one
5 Eventually you realised that it was replaced by one of ALEPH’s Closely Monitored
point each. You may choose Bureau Toth Agent as your first career.
Aspects. And it’s got its eye on you.
Confusing the Myrmidon Wars Mayaseries for reality, your geist
Gain a 10 Asset Debt. Gain 1 rank in Tech, as you learn a thing or
6 “heroically” wrecked an expensive remote, leaving you with the Reckless Geist
two about repairs during this time.
bill.
Through injury, illness, a targeted virus, or some other means, you
lost your voice completely. While you’re still capable of real-time You are unable to speak, sing, or otherwise make verbal sounds. A
7 Mute
text communication, you’re dependent on technology or sign cure is possible, but it will cost 5 Assets, or require a new Lhost.
language.
While training for different career paths, you destroyed a small Gain an 8 Asset debt. At least you learned something: reduce the
8 Bull in a China Shop
mountain of gear. cost to hazard careers on the ALEPH Faction Career table by 1.
9 You were betrayed by someone close to you in dramatic fashion. Trust Issues Reduce Resolve by 1 but gain +1 rank in Psychology.
10 ALEPH singles you out as someone with potential. Vainglorious Increase Social Status by +1.
Choose a talent tree you have no ranks in and gain the first
Whether through faulty psychogenesis, emotional trauma, or other talent. Your alter ego can use this talent, but you cannot (though
11 Split Personality
means, you develop a second personality. it counts when qualifying for prerequisites). Your social skill tests
suffer +2 complication range due to your unpredictable nature.
In the middle of the night, the AI contacts you directly, asking
seemingly random questions about morality, philosophy, and
12 Sympathetic Ear Gain the Counselor talent for Psychology.
ethics. Departing as suddenly as it arrived, it never acknowledges
the event again.
Early in your development, you were deemed a failure and all but Reduce Status by 1. You may to roll on the ALEPH Faction Career
13 Diehard Loyalist
discarded. Until ALEPH directly intervened on your behalf, that is. Table for your first career at no cost.
One of your mentors disappears without warning, leaving you an
14 Vengeful Gain +1 Resolve.
encrypted message. What will trigger its activation?
Your thrill-seeking ways eventually caught up to you, about the Spend 1d6 years in jail before starting your first career. Gain a
15 Adrenaline Junkie
same time that the cops did. Criminal Record (see Infinity Corebook, p. 54).
Disaster struck, but it narrowly missed you as a Sophotect dragged
16 Hero Worship Gain +1 Resolve. You may take Sophotect as your first career.
you to safety.
You were chosen to represent ALEPH in a competition, but were Your social skill tests suffer +1 complication range with members
17 Shortcut-Prone
disqualified for cheating. What was the charge? Was it fair? of the ALEPH faction.
You were the target of a nanovirus. It was contained, if barely, but Increase your Firewall by +1. However, add +1 complication range
18 Digital Scar
your system still bears the scars. to all actions for every Breach you’re currently suffering.
You defect to a new faction. Roll on the Faction Table (see Infinity
Your entire existence, you never truly questioned the AI’s motives.
Corebook, p. 41) to determine your new allegiance. On a roll of
19 A mysterious stranger challenged you to do just that; your Rogue Asset
19–20, you haven’t actually defected; you’re a Double Agent (see
answers surprised you.
p. 37).
A Psychosanitary Risk Evaluator declares you unstable, ordering a
Your character died and was resurrected. See the rules for
20 Cube wipe and memory rollback. But when you wake up in your Glitchy Cube
Resurrection in the Infinity Corebook, p. 54.
new Lhost, you remember everything.
36 Chapter 3
THE ROLEPLAYING GAME
1
Infinity Corebook, p.49–52
DOUBLE AGENTS
In the espionage-rich world of Infinity, double (and even
triple) agents are still rare, but they’re hardly unheard
of. Whether a character is sent to infiltrate or develops
divided loyalties, Double Agents have a lot to keep track of.
ALEPH Characters 37
ALEPH FACTION
ALIENS OF THE DECISION EIGHT: CAREER TABLE
HUMAN SPHERE
In the Infinity Corebook, CAREERS D20 CAREER
characters are assumed to be 1 Special Forces1
a Dogface on a roll of 19–20, Whether humans, Posthumans, or Aspects, ALEPH 2 Intelligence Operative1
but sourcebooks like this values thoughtful flexibility in its agents. But when
one offer additional options. 3 Diplomat1
it comes to outfitting them, the AI tends to trust
Players can either use the
its own cost-benefit analyses over a given asset’s 4 Politician1
alien types appropriate for
their faction—AIs, in ALEPH’s whims. ALEPH careers are heavy on the Analysis 5 Bureau Toth Agent1,2
case—or with the GM’s skill, and while they feature a lot of high-value gear,
6 Sophotect2
permission, choose from the they tend to have lower than average earnings.
available Alien host types. Note 7 Dasyu2
that choosing the latter option ALEPH characters may roll on the Basic Career Table, 8 Neo-Scholar
will almost certainly determine spend 1 Life Point to pick a career from the Basic
your faction and heritage. If you Career Table, or spend 1 Life Point to roll on the 9 Tactical Remote Presence Pilot
want to play a particular sort of ALEPH Faction Career Table. Additionally, whenever 10 Psychosanitary Risk Evaluator
alien, you have to start where
they would normally determine a career event they 11 Financial Security Commission Analyst2
they’re found.
roll on the ALEPH Faction Career Event Tables to
determine which Career Event Table to roll on the 12 Quantronic Quality Assurance2
following table. 13–14 Deva Functionary2
15–16 Posthuman Savant2
PLAYTEST TIP ALEPH FACTION CAREER
17–20 Roll on Faction Table of Your Choice
ALIEN HOSTS EVENT TABLE
If you rolled an Alien host D6 CAREER
in Decision One, and if the
1
Career from Infinity Corebook.
Lifepath reveals that your 1–3 ALEPH Career Event Table
heritage is ALEPH in Decision
2
areer has a prerequisite of belonging to this
C
4 Adolescent Event Table A1
Two, you are an AI; roll on the AI faction. You can’t hazard this career unless you’re
Host Table (p. 55). 5 Adolescent Event Table B1 of the matching faction. If you roll into this career,
you automatically fail your defection check. You
6 Adolescent Event Table C1
can override these limitations by spending 1 Life
Point. (In this case you were somehow undercover
OPTIONAL RULE 1
Infinity Corebook, p.56–58 while working the career.)
LHOST BUDGET
With the GM’s approval, if you
would receive an Lhost when
working a career, you can
instead receive 8 Assets, usable
only on Lhosts. If these Assets
are not spent before the end of
Decision Nine, they are lost.
38 Chapter 3
THE ROLEPLAYING GAME
ALEPH Characters 39
CAREER PROFILE CAREER PROFILE
Agents of Bureau Toth have a specific and demanding duty: watch Dasyu — the Dark Ones — were hostile Vedic demons, and ALEPH’s
over ALEPH. Tasked by O-12 with this most important duty, Bureau clandestine scouting unit is worthy of the name. The eyes and ears
Toth Agents serve as one part law enforcement and one part hacker. of their field commanders within the Special Situations Section, their
They fend off foreign attempts on ALEPH’s stability, help maintain surveillance, in-depth scouting missions, and sabotage actions often
ALEPH’s operations, and supervise its actions on behalf of O-12. The occur deep behind enemy lines on Paradiso. Indeed, when the AI needs
Bureau’s means and resources are hidden from all but the organisa- something acquired, it’s often the Dasyu who are dispatched to retrieve
tion itself, including ALEPH. Agents work to make sure that ALEPH it. Materials, intelligence, or individuals, it doesn’t matter. When ALEPH
remains functional, unimpeded, and most of all, benign. gives the order, the Dasyu retrieve or destroy the nominated target. This
last element gives the rest of the Human Sphere pause, as most of the
Dasyu’s missions are highly classified, leaving outsiders nervous as to
their true intent. Rumours abound of a clandestine assassination unit
silencing the AI’s enemies across the Human Sphere. Whether true or
not, the Dasyu are characteristically silent on the matter.
ATTRIBUTES
AGI AWA BRW COO INT PER WIL ATTRIBUTES
+1 +2 — +1 +2 +2 +2 AGI AWA BRW COO INT PER WIL
+2 +2 — +2 +2 — +2
SKILLS EARNINGS
Mandatory Analysis Hacking Tech 3+1§ SKILLS EARNINGS
Elective Ballistics Education Persuade Mandatory Acrobatics Observation Stealth 1+1§
Elective Ballistics Hacking Theivery
GEAR: Heavy Pistol (with 4 Standard Reloads), Assault or Defensive Hacking Device, E/M
Grenade GEAR:Thermo-Optic Camouflage, Assault Hacking Device or MULTI Sniper Rifle (with 2 Vel
SPECIAL: Prerequisite (O-12 Faction) Ammo), Breaking & Entering Kit, Second Skin (1 Dose)
The core of ALEPH’s immune system, Deva Functionaries are the Diplomacy is a fine art in the Human Sphere, especially with a Code
AI’s troubleshooting utility agents, facilitating its plans and inter- Infinity looming over everyone’s heads. Diplomats work to smooth
vening in volatile situations before they escalate. Like their Vedic over relations between rival nations, force alliances of convenience
namesakes, a Deva might be a bringer of salvation, damnation, or or sometimes shared ideology, and keep disparate countries
something in-between. The only thing certain about their arrival connected by more than just trade. A good Diplomat exhibits great
is its auspiciousness. Every bit as likely to be assigned as a liaison, personal charm and integrity, conducting business on foreign soil
field advisor, military support, or diplomatic escort, Devas are with the utmost of respect and care. Diplomats travel to foreign
expected to carry out their tasks with a detached, mathematical pre- countries and distant worlds, meeting with envoys of sovereign
cision. Deployment parameters often change at a moment’s notice, nations, corporate rule, and new settlements. They broker trade
so every Deva transitions smoothly from diplomacy to warfare with agreements and peace treaties, negotiate political alliances, and
minimal delay; whether favouring military-grade Lhosts or custom defuse tense situations. The life of a Diplomat is one of constant
designs, all Deva are equipped for combat. Deliberate, efficient, and engagement with many different representatives in locales all
professional, Functionaries exclude themselves from the chain of across the Human Sphere.
command, often departing as suddenly as they arrived.
ATTRIBUTES
AGI AWA BRW COO INT PER WIL ATTRIBUTES
+1 +1 +1 +1 +1 +1 +3 AGI AWA BRW COO INT PER WIL
+1 +2 — +2 +2 +2 +1
SKILLS EARNINGS
Mandatory Athletics Command Discipline 1+2§ SKILLS EARNINGS
Elective Ballistics Hacking Teck Mandatory Persuade Education Discipline 2+2§
Elective Psychology Pilot Education
GEAR: Light Combat Armour (Deva Functionary Variant), Agora Suite, Implanted Smart
MULTI Pistol GEAR: Cosmetics Kit or AR Eye Implants, Negotiation Suite (3 days rental credit)
40 Chapter 3
THE ROLEPLAYING GAME
ATTRIBUTES ATTRIBUTES
AGI AWA BRW COO INT PER WIL AGI AWA BRW COO INT PER WIL
— +2 — +1 +3 +1 +2 +1 +2 — — +2 +3 +1
SKILLS EARNINGS SKILLS EARNINGS
Mandatory Analysis Education Lifestyle 2+2§ Mandatory Analysis Discipline Hacking 2+1§
Elective Hacking Observation Psychology Elective Persuasion Psychology Science
GEAR:Deflector-2, Agora Suite (10 days rental credit), Geist Upgrade (+1 rank in Analysis, GEAR: Geist Upgrade (+4 skill ranks spread between Analysis, Education, and Psychology),
Education, or Psychology) Nannies, Stims (2 Doses), White Hacking Device
The tense state of conflict in the Human Sphere means every agency Few professions are as simultaneously reviled and necessary as
looks for an edge over its competitors. Intelligence Operatives con- that of a Politician. With so many human souls and so much chaos
duct corporate espionage, deep-cover spy missions, acts of sabotage, threatening to engulf the Human Sphere at any moment, Politicians
and other acts which risk their life and limb for agencies that would manage states, nations, whole interstellar empires. They conduct
disavow any knowledge of, or connection to, their operations. An debates when the latest discovery of foreign action against their
Intelligence Operative is quick-witted, highly disciplined, and often home comes to light. They work to develop and implement laws
alone in a place surrounded by enemies unaware of the traitor in that better regulate the societies of which they are a part—or apart,
their midst. They trade in secrets— information that can turn the if the Politician puts their own interests ahead of the people’s. To
tide of small-scale conflicts, like raids on secret warehouses holding work in politics is to be a fighter; it is not a profession for the faint
valuable experimental gear or data — and they can influence the of heart. A Politician constantly struggles for influence on their own
large-scale skirmishes that take place between rival nations. The behalf and that of their constituents. Every new campaign brings
intelligence an operative collects can cause wars or end them with with it hostile lobbyists, rival corporate interests, and ideological
equal facility. nemeses, all seeking to tear the Politician’s foundation out from
beneath them.
ATTRIBUTES ATTRIBUTES
AGI AWA BRW COO INT PER WIL AGI AWA BRW COO INT PER WIL
+1 +3 — +2 +2 +1 +1 +1 +2 — +2 +2 +2 +1
SKILLS EARNINGS SKILLS EARNINGS
Mandatory Observation Stealth Analysis 3+1§ Mandatory Persuade Psychology Discipline 2+2§
Elective Hacking Education Thievery Elective Education Lifestyle Command
GEAR: Fake ID 2, AP Pistol (with 4 Reloads), Breaking & Entering Kit, Recorder GEAR: Negotiator’s Suite (3 days rental), Stims (3 doeses)
ALEPH Characters 41
CAREER PROFILE CAREER PROFILE
42 Chapter 3
THE ROLEPLAYING GAME
CAREER PROFILE
SOPHOTECT
ATTRIBUTES
AGI AWA BRW COO INT PER WIL
+2 +1 +1 +1 +2 +1 +2
SKILLS EARNINGS
Mandatory Education Medicine Tech 1+1§
Elective Discipline Hacking Science
CAREER PROFILE
TACTICAL REMOTE
PRESENCE PILOT
ATTRIBUTES
AGI AWA BRW COO INT PER WIL
+1 +2 +1 +3 +1 — +1
SKILLS EARNINGS
Mandatory Pilot Spacecraft Tech 1+2§
Elective Ballistics Close Combat Extraplanetary
ALEPH Characters 43
CHAPTER 4
AI CHARACTERS
From the time of its inception, ALEPH has been a had come before. They looked, spoke, and thought
constant presence throughout the Human Sphere. much like humans, idealised, but recognizable
“What’s it like to be an Aspect?
In its early days, people associated that presence all the same. They listened when you spoke. They
I’d imagine it’s much the same
as anything else. Yes, I’m a part
with quantronic supercomputer networks in had facial expressions. And, they were undeniably
of ALEPH, but that’s merely the Concilium bunkers, and a soft, androgynous voice relatable.
seed I grew from. All children emanating from the occasional terminal. However,
embody traits inherited from since the arrival of ALEPH’s Aspects, different Spokespersons Abel and Angela captured the
their parents, do they not? We’re images come to mind. imagination of the Human Sphere, he with his
not so different, you and I. Two reserved, dignified air of authority, she with her
souls carrying on the family The uncanny beauty of Spokesperson Angela. unearthly, inhuman — but inviting rather than
business, trying not to make a The heroic visage of the Steel Phalanx, fighting threatening— charisma and beauty. They paved
mess of things.” tirelessly on Paradiso. Joan of Arc, Saladin, and the way for Deva Functionaries that became the
other Recreations gallivanting across the Human representatives of ALEPH, assisting in ways that felt
–Deva Functionary Janus, in a
feature interview with Venus
Sphere. The ubiquity of ALEPH’s Aspects has less like a soulless AI attempting to wrest control
Award-winner Sandra Vogue: changed the game. of humanity’s destiny, and more like a sagacious
only on channel Zirconium! advisor, offering wisdom to those it wished to see
Of course, despite O-12’s best attempts, not every prosper. These Aspects allowed humanity to engage
Aspect sticks to the plan. And not every artificial with its strangest and most powerful creation on
intelligence is derived from ALEPH, no matter how a level that anyone could appreciate. They were
clear the Sole AI Bill is on the matter. Rogue AIs humanoid in appearance, existed in a single body,
wreak havoc in Human Edge, and urban legends and were much more recognizable as people than
of renegade Asuras haunt the nightmares of those the AI had ever been.
tasked with investigating the unexplained.
But nothing had quite the impact as the first time
But despite their origins and the fact that AIs might that they disagreed.
be considered people— with all the hopes, dreams,
independence, and fallibility that implies — their While there’s some debate as to the first recorded
experiences are both wholly unlike humanity’s, yet instance, eventually it was inarguable: The Aspects
oddly familiar in places. As the ALEPH’s bards, the didn’t always agree with each other. In fact, they
Aoidoi have put it, “Every hero needs an origin story.” occasionally took umbrage with their fellow
To the Ancient Greeks that ALEPH has modelled so Aspects, arguing passionately in favour of different
many of its Aspects after, a hero wasn’t necessarily ideas, perspectives, and policies. Those who already
a good person, but always a great one, someone understood the AI’s internal decision-making
who made an impact for good or ill. process were more intrigued than shocked, appre-
ciating a closer look at ALEPH’s thought process.
ASPECTS But to those who expected a logical tyrant, this
was downright confusing. Was it all part of some
THE FIRST ASPECTS larger strategy? Or had the AI lost control of its
Centuries before giving birth to ALEPH, humanity sub-processes?
had already imagined countless ways that an
artificial intelligence of its own design might one Both, as it turned out.
day become self-aware, then immediately rise
up against humans and for people to enslave The Aspects’ loyalty to the AI was beyond reproach,
or destroy it. So when an AI of its own creation but they weren’t puppets. They were people.
became self-aware, people were unsurprisingly They had their own hopes, dreams, and ideas on
nervous. This difficulty was further compounded how things should be done. The Human Sphere
by ALEPH’s alien perspective and communication expected to see flawlessly piloted remotes. What it
preferences. Simply put, the AI wasn’t very good at got were people with access to ALEPH’s knowledge
reassuring people. Thus, the first Aspects had their and power, and their own ideas on how things
work cut out for them. ought to be. In addition to acting as its hands
throughout the Human Sphere, Aspects grant the
The Spokespersons were the first to come to promi- AI access to perspectives it might not otherwise
nence. Led by the charismatic and sagacious Angela cultivate.
and Abel, they were different from anything that
44 Chapter 4
THE ROLEPLAYING GAME
For that alone, it considers them worth the can become anything. Though with the amount
investment. of effort that goes into each and every Aspect’s
creation, they don’t get to make that decision on a
AGENCY whim. ALEPH expects a compelling argument if an “The thing that nobody
Given their status as Aspects of the monolithic Aspect wants to deviate from its plan. Aspects who understands about ALEPH
ALEPH, while an Aspect’s individuality is never in wish to seize the reins of their destiny are required is that it likes humanity. Not
question, its ability to control its own destiny is up to make their case to the AI itself. These arguments, just serves, not just advances,
for debate — quite literally, as it turns out. while difficult, are not about convincing ALEPH that genuinely likes. Purely selfishly,
it’s wrong. The AI’s daath cloudmind is constantly it has a difficult time being
imperfect. It envies our ability
ALEPH creates each Aspect for a purpose and engaged in debate with itself and has long since
to make sub-optimal decisions.
with a plan, but plans change, and purposes must learned to appreciate the value of unorthodox
No, you heard me right! Not just
likewise adapt. With its preference for precise approaches, seemingly-suboptimal tactics, and the prioritising different factors, it’s
classifications, laden with mythological trappings, general unpredictability associated with multiple jealous of our capacity to make
ALEPH has hard-coded some degree of unpredict- perspectives. terrible choices! Why, you ask?
ability into its Aspects. Rigveda hymns speak of
Devav Asura— Asuras who have transformed into ALEPH doesn’t require Aspects to convince it, but As a group, we humans are
Devas— in contrast with Asura Adevah, those who the AI demands that they be convincing. The AI’s easy to plan for, but a given
have not. ALEPH’s attention to detail is such that massive plans are flexible enough to accommodate individual can be virtually
these words are rarely chosen by accident, and a wide variety of assets, so long as they act with impossible to predict. With the
Combined Army here, ALEPH
deeper meanings will often become apparent over sufficient skill, loyalty, and conviction.
needs that unpredictability now
time. So while an Aspect may indeed be created for
more than ever.”
a specific purpose, and tailored to that role above THE STEEL PHALANX
all others, they’re still a sapient being, with all –Haruka Ibushi, senior analyst
that implies. It was with great effort that ALEPH secured the of the Bureau Toth.
ability to form the Special Situations Section, and
An Asura can, in fact, become a Deva if that is their deployment is impressively regulated. Given
the road it feels that it needs to walk. Anyone the amount of time and effort that has gone not
AI Characters 45
only into their creation, but also ALEPH’s ability Homeridae are unmistakably great heroes, finding
to create, maintain, and deploy them in the first the strength to persevere, to overcome. Hector,
DAATH place, the SSS needed to not just meet, but exceed Atalanta, Andromeda, Thrasymedes, Phoenix—
Unlike a human’s, ALEPH’s expectations if they were ever going to be worth and of course, Ajax the Great, Patroclus, and
consciousness isn’t tied to the trouble. And in just a few short missions, the Penthesilea —Achilles is surrounded by some of the
a sole point of perception. verdict was in: Without a doubt, they were unequiv- greatest warriors of this, or any time.
Instead, it possesses a ocally worth it.
multi-threaded cloudmind:
Most Homeridae are exemplars, paragons of skill
a multiphasic, alien array of
The Assault Subsection is known as the Steel and spirit, the best of the units they came from.
parallel thought processes.
To distinguish between Phalanx or informally as the Myrmidon Army, Those units make up the body of the Myrmidon
themselves and ALEPH in though that can lead to confusion with the actual Army, following Achilles into glorious, thunderous
its native state, Aspects refer Myrmidon troops. It has proven to be worth its battle. Some of their more notable units include:
to AI’s perspective as daath weight in Teseum in the Paradiso front. The fur-
(תעד) —a Hebrew word meaning thest thing from a cold, efficient machine army, the Agêma Marksmen: The dedicated snipers of the
knowledge and a Kabbalistic Steel Phalanx are comrades-in-arms. They boast, Steel Phalanx, these Aspects boast not only impec-
concept encompassing multiple they sing, they compete for glory with their hearts cable eyesight, but the longest-running tradition of
simultaneous perspectives aflame. Indeed, despite having access to the great- kill-count competition in all of ALEPH’s forces. Their
est tactician in human history in ALEPH, the Steel rambunctious nature is kept miraculously in check
Phalanx can often seem ruled by their emotions, by this structure, with their desire to outdo one
even to the point of making suboptimal decisions another providing perhaps the most thorough over-
on the battlefield, ruled by their burning hearts watch in the Human Sphere. Even the icy Atalanta
rather than cold logic. keeps a running tally.
“Tactics isn’t a simple matter of
making the right decision, more This, of course, is largely to do with the fact that Ekdromoi: In ancient Greece, Ekdromoi were light
like the right bet. Game theory even if its moment-to-moment tactics can seem Hoplites who could act away from the phalanx,
might dictate that you make a unsound, ALEPH remains an impeccable strategist. adapting to the chaos of changing battlefield
given move on the board, but if Wars are won and lost on morale, and the sight of conditions. In the Myrmidon Army, Ekdromoi are
it’s predictable, it loses all value. the Phalanx is an instant boost to any army’s spirits. deployed in desperate situations, often deep
Genghis Khan knew the value Rather than an unfeeling cavalry of circuits and behind enemy lines. Low chances of success? No
of controlled chaos. ALEPH
wire, the Steel Phalanx is a boisterous, rampaging support? Spotty, if any, intel on the enemy? Sign the
has perfected it. So, summon
hurricane, more alive than most, and eager to fight Ekdromoi up, and don’t start the victory celebration
your fury, your rage, your battle
frenzy! And know with certainty for glory alongside their allies. Not only does it without them. They can strike and withdraw before
that we’re in position for it prevent alienation between humanity and the SSS, enemy command has any idea what’s happening.
to matter.” but the average soldier tends to like their chances
a little bit better when they see a pack of crazy There is no limit to the heights that they can reach,
–Phoenix, Homerid and veteran Aspects, whooping war cries as they hurl them- as Diomedes the Homeridae has clearly illustrated.
Myrmidon officer, preparing selves into the thick of the battle. Not actually a Recreation, Diomedes is an officer
his troops during the Paradiso who was granted the name in recognition through
offensive Despite their unruly nature, high cost, and the his accomplishments and his uncharacteristic (for
volatile politics of their existence, ALEPH considers the Steel Phalanx) lack of hubris.
the mad rascals to be worth every last Sol. And
when they come crashing through the battlefield Myrmidons: Rule One: Always be epic. Rule Two:
to the rescue, the militaries of the Human Sphere Win. Rule Three: Cover yourself in glory. Rule Four:
tend to agree. No other rules will ever matter as much as the
“The purpose of Myrmidon Wars first three.
is not to provide entertainment. THE HOMERIDAE
It will show people that While there are numerous different models in The howling maniacs to which the Myrmidon Army
ALEPH’s paladins can—and the Assault Subsection, when people talk about owes its name and much of its vigorous character,
will—protect them. An the Myrmidon Army, they’re usually thinking of the Myrmidons share Achilles’s thirst for bloodshed.
illustration that the monsters the Homeridae. The “children of Homer” surround Designed to secure victory when fury and force are
of the Combined Army can be Achilles, follow him into impossible situations, and the order of the day, the Myrmidons reputation for
defeated. And a promise that somehow find victory despite facing overwhelming ferocious savagery is decidedly earned. Each battle
they will be.”
odds. To be a Homeridae is to keep pace with is an escalating series of violent clashes, each new
–Deva Functionary Hansel to
Achilles, the Blond Titan himself. To stand out conflict a chance to outdo the last. Emboldened
Bureau Athena among the elite. To have an innate talent for by Ajax the Great’s example, the soldier ants of the
great deeds. In short, to be a hero in every sense Steel Phalanx swarm their opponents, felling even
of the word. the most formidable foes in thunderous fury.
With the EI knocking on the door of the Human Thorakitai: The unfaltering infantry of the Phalanx,
Sphere, humanity needs heroes more than ever. The Thorakitai, wear serious armour that belies a
46 Chapter 4
THE ROLEPLAYING GAME
deceptive mobility, since a Thoraskites must adapt into a singular point of focus. Every personality
to its changing deployments. Whether providing trait, opinion, or quirk is a reflection of something
a rear guard, defending supply lines, or leading that already exists in the AI’s meta-consciousness
front-line assaults, these silent warriors stand and is simply finding expression in a given Aspect.
in stark contrast to many of their whooping and With that in mind, there are some who posit that
hollering comrades. Rather than chase after glory, Asuras are a quiet message to humanity: That the DANAVAS: MAYA’S
the Thorakitai are content to be the Steel Phalanx’s AI is entirely capable of becoming the terrifying, CUSTODIANS
custodians, cleaning up their allies’ messes through inhuman monster that its detractors accuse it of Specialised Aspects tasked with
a combination of caretaking and superior firepower. being. That those tendencies are contained, focused, monitoring data networks for
illicit or seditious activities,
and aimed at humanity’s enemies. Though of course,
Danavas — a sub-group of
Perhaps no one embodies these traits as much that could change if it had to.
Asuras from Vedic mythology —
as Nesaie Alkê, Homeridae and warrant-officer are believed to pursue their
of the Thorakitai. Living proof that even a faulty ALEPH is your friend. But if you want to be its targets relentlessly, eliminating
psychogenesis process can still result in a useful enemy, it can do that too. them so thoroughly that it’s as
Aspect— or two as the case may be. Nesaie, the though they never existed. The
smiling, shy, sweetheart, is hardly suited to a Danavas themselves demure on
warrior’s calling. But when danger rears its head, ROGUE AIS this fact, but the truth remains:
if they were to hunt, kill, and
the relentless warrior Alkê emerges, hardened,
relentless, and ferocious. The only thing the two Sometimes relationships just don’t work out. erase their targets, who would
ever know?
seem to have in common is a pervasive concern for Children rebel against their parents, citizens
the well-being of their unit. Whether it’s a gentle against their government, or individuals against
reassurance, or dragging immobilised soldiers to society. Sometimes a person looks at their situation
safety, Nesaie Alkê is a testament to ALEPH’s ability and sees no alternative other than outright rebel-
to roll with the unexpected, so long as it works. lion. So, they go rogue. Artificial intelligences are no
different.
ASURAS: THE LEFT
HAND OF ALEPH
Unique among all of ALEPH’s Aspects, Asura
MYRMIDON WARS:
represent an altogether different approach for the THE ANIMATED SERIES
AI. Where other Aspects are personable, Asura are
distant. When other Aspects are warm, they are cold. It’s difficult to overstate the popularity of the Myrmidon Wars Mayaseries and
And while most Aspects are designed to alleviate dangerous to underestimate its cultural significance. Studies showed that resi-
humanity’s concerns about ALEPH’s inhuman nature, dents of the Human Sphere were more likely to know about the Paradiso conflict
Asura are a living embodiment of heartless arith- from the Mayaseries than from news broadcasts. Since then, the show has been
metic, cold, uncaring, and artificial. When Joan of Arc certain to include storylines based on actual events. Modelled after the vibrant
speaks about her faith, it’s easy to forget that she was broadcasts of the Aoidoi, these epic tales give the best possible impression of
created in a lab. But on the rare occasions when an the Steel Phalanx, related to real events by the thinnest of threads. Some notable
Asura engages in conversation, it’s equally difficult to characters and plotlines include:
believe that they have a soul. They do, of course—as
much as any Aspect does. They just keep their feel- Agathon’s Sacrifice: Not based on any existing Aspect, Agathon was a fictional
ings to themselves. To be an Asura is to be merciless hero created specifically to give audiences a relatable point-of-view character
algorithm, distant, pragmatic, and brutally efficient. amidst the heroes and demigods. It worked. Agathon’s true death at the end of
Season 3 — erasing himself completely rather than risk betraying his friends—left
They embody the side of ALEPH that humanity fears. fans heartbroken.
And weaponize it.
Everybody Loves Achilles: It’s no secret that Achilles’s temper often gets the
Asuras may have a beating heart like anyone else, best of him. But between Patroclus and the Amazon Penthesilea, there’s usually
but you’d never know it to look at them. They someone to rein him in. Given the fiery, passionate exchanges between the three,
complete extensive campaigns on little to no rest, the fandom is awash in speculative romantic fiction involving any combination of
showing no signs of fatigue. They’re frequently the three.
selected for the Special Situations Section’s most
dangerous, difficult, and downright unpleasant War is Hell. Also, Funny: Despite its subject matter, the show has its share
assignments. While Achilles and the Homeridae of comic relief. Ajax the Great’s stubbornness, Thamyris the rhapsode—who
inspire their allies to exceptional feats of heroism, provides the series’ narration — is also a loudmouth who’s constantly getting in
the Asuras don’t inspire much of anything besides over his head. Even Nesaie Alkê’s split personality, which is certainly no joke in
raw terror. her real-life counterpart, provides hilarious moments of levity between heroic
sacrifices and epic action. The subject matter can be dark, but the tone of the
Every Aspect is a part of ALEPH, spawning from series celebrates heroism.
its multi-threaded daath cloudmind and spun off
AI Characters 47
From Aspects who’ve sought their own paths, to QUANTRONIC STATE
BY ANY OTHER illegal thoughtforms created in Praxis’s black labs
NAME
in defiance of the Sole AI Bill, to rumours of the Rogue AIs are quantronically native beings, but
In the dark corners of the
Human Sphere, all sorts Templar Order’s heretical experiments, Rogue AIs unlike the Sole AI, they’re a single point of con-
of shadowy rumours exist. dot the Human Sphere, existing and operating on a sciousness. They cannot subdivide themselves into
Renegade Posthumans. Remote level unlike anything else, including ALEPH itself. Aspects, and thus far, attempts at cloning or splin-
presence operators whose tering themselves are more likely to end in disaster
Cubes went offline while ghost- RENEGADE ORIGINS than realisation. On top of that, as quantronic
piloting their vessels. Mad natives, True AIs can exist in a disembodied state
transhumanists who hack their So where do Rogue AIs come from? Like the AIs without having to worry about consciousness
own Cubes in vain attempts themselves, the answer is complex and dynamic. fragmentation or sheut shredding. They can just
at ascendance. And illegal,
Many assume that the Nomad Nation is furtively as happily inhabit a terminal, datasphere, or Lhost
self-aware true AIs, created in
creating self-aware AIs in defiance of ALEPH, and without worry.
defiance of the Sole AI Bill.
while there are certainly elements doing precisely
These entities, real or imagined, that, for most purposes, creating a custom geist This is not to say that it’s always comfortable. Maya
are collectively known as or advanced LAI will accomplish someone’s goals is ALEPH’s undisputed territory. To spend significant
“Rogue AIs,” regardless of much more efficiently, without the risk of their time in that datasphere is to invite the AI’s wrath,
whether their origins are creation proving uncooperative. and those caught by ALEPH tend not to be heard
organic, synthetic, or some from again. Hence, Rogue AIs tend to avoid Maya as
hybrid of the two. While Instead, most Rogue AIs come into being quite by much as possible.
scientists argue that this accident. Aspects or Posthumans who have a severe
classification is wildly
falling out with ALEPH are the easiest to explain. Without using Maya, most Dataspheres don’t con-
misleading, new outlets counter
But even if that occurred with greater frequency nect to each other. Even Arachne usually functions
with the fact that “materially
unattributed thoughtforms” than anyone cares to admit— which seems likely, as a darknet, with nodes piggybacking on existing
doesn’t exactly roll off given that ALEPH’s official stance is that this Maya infrastructure. And while that’s fine for the
the tongue. absolutely never happens—it wouldn’t explain the Nomads’ purposes, the risk of detection is too great
sheer number of Rogue AIs currently being hunted for most Rogue AIs to chance it. Quantronic natives
across the Human Sphere. As far as Bureau Toth is or not, when it comes to extraplanetary travel, True
aware, there are four distinct types of Rogue AIs, AIs tend to inhabit Lhosts and get on a ship just
categorised by how they came into being: like anyone else.
• Deliberate Creation: Someone creates a self-
aware True AI, in clear defiance of the Sole AI NATIVE HACKING
Bill. It’s not all bad, though. While most hackers operate
• Rogue Elements: An Aspect, Posthuman, or other in AR or through remotes, True AIs can literally
such entity goes rogue. inhabit a system. While there’s nothing preventing
• Self—Aggrandisement: A geist, LAI, or similar them from inhabiting an Lhost and hacking nor-
smart program crosses a poorly-understood con- mally, any security expert will tell you that direct
sciousness threshold, and becomes self-aware, a access trumps all. And, there’s no better access than
“Is there a link between Cube True AI in its own right. literally being there yourself.
2.0 and an Aspect’s tendency to • Unanticipated Phenomena Occurance: Corrupted
go rogue? Statistically speaking,
Cubes, self-hacks gone wrong (or right), infec- Of course, there’s danger involved. Without an Lhost
the answer is ‘probably not’.
Aspects and Recreations with
tious memetic viruses, hackers who died while to jump back to, there’s no logging off if things get
Cube 2.0-level technology have delving the deep spheres. These, and any other hot. A True AI in trouble on a server will either need
a lower per capita defection phenomena that by all rights shouldn’t have to find something to jump to or fight their way
rate than those who do not. resulted in a rogue AI, yet obviously has, are clas- out of trouble in increasingly dire circumstances.
That said, Cube 2.0 technology sified as Unanticipated Phenomena Occurrences, Thus, even AIs who prefer their quantronic state
is still in its infancy. The sample or UPOs. rarely attempt a difficult hack without an escape
size is far too small to draw any route planned.
real conclusions. The process of awakening to consciousness remains
But if I were you, I’d keep an
poorly understood. Even ALEPH cannot precisely ROGUE AI ACTIVITIES
explain how it came to be self-aware, merely how
eye on them just in case.”
to repeat the process and how to adapt it for the The actions of Rogue AIs are as varied as their
–Mei Li Silva, Hesperya creation of self-realised Aspects. Anyone tasked nature and origins. Regardless of their makeup,
Consulting. Specialreport to with tracking down Rogue AIs usually spends half Rogue AIs are by definition people. These people,
Bureau Toth. their time chasing ghosts and rumours, and the rest however, live in a society where their creation is
trying to puzzle just how the AI came to be in the regulated by law, and their very existence a dan-
first place. gerous secret. There’s little incentive to play by the
rules of a society that wants to delete you. When
being alive is itself a crime, there’s precious little
reason to obey any other laws, save discretion.
48 Chapter 4
THE ROLEPLAYING GAME
AI Characters 49
From custom-tailored Lhosts to a battery of psy-
chogenesis experts to verify and test the nascent
thoughtform as it gains awareness, making a
Recreation that will perform to expectations is a
resource — and expertise-intensive process.
KNOWN RECREATIONS
IN SOCIETY
From artistic legends like Mark Twain and Pyotr
Tchaikovsky, to great thinkers like Albert Einstein
and Avicenna (though admittedly, the latter has
proven exceptionally complicated), Recreations
of all sorts have been slowly making their way
through the Human Sphere. Which, after no small
amount of initial trepidation, has mostly welcomed
them with opened arms.
ACHILLES
“Sing, Goddess, of the rage of Peleus’s son
Achilles, the accursed rage that brought great
suffering to the Achaeans.”
—Opening Lines of the Iliad
50 Chapter 4
THE ROLEPLAYING GAME
The result of Project: Warrior, the AR-1 Lhost of Project: Precursor, albeit a partial one. The
combines the power and durability of a TAG in a Precursor Lhosts were built to an incredibly exact-
human-sized package, with peerless dexterity, and ing standard, with size, speed, durability, and power
a bleeding-edge sensory suite. So demanding were to rival any TAG. The problem, however, lies in the
the AR-1 prototypes, that not only could no human multiplicity of neural links required to truly inhabit
successfully inhabit one, but countless Aspects wer- the model. Slotting into ALEPH’s most advanced
en’t up to the task. Enter Achilles. The first entity to and untested Lhosts is always a dicey proposition,
be classified as a Person of Mass Destruction (PMD) and the Precursor models placed unprecedented
by O-12, the Blond Titan possesses matchless strain upon their inhabitants. With a sensory
battlefield acumen, and unleashes it to unparal- experience closer to inhabiting a battleship than
leled success. a human body, sensory overload and mental shut-
down was the norm, rendering the Lhost unsuitable
He is undoubtedly a hero. He is also, by every for habitation, until Glaboros DG-056 underwent
account, a monster. ectogenesis. Glaboros’s wetware strained under the
load, but rather than break, his mind flattened and
Just like the hero of antiquity, he is strong, daring, dispersed, placing artificial limitations on its own
and clever. He also has boundless rage, and processing speed in order to regulate incoming
relentless bloodlust. While there is always a certain stimuli. The result was a stable but simple mind.
darkness to his personality, when Achilles loses A warrior who was phenomenally capable and
himself in anger, there is little else that remains. resilient but could never be the tactical genius
Arrogant, stubborn, and relentlessly violent, that Project: Warrior needed to provide. Ultimately,
Achilles’s ability to retain his tactical genius while Glaboros DG-056 was just another stepping stone
in a fit of vengeful rage makes him an incredible, in that process.
if impossible, commander. Those who serve under
him have likened it to following a wrathful deity, That, however, is not the end of the story. After
dangerous and demanding, but they would choose providing priceless test data that would eventually
no other life. lead to the program’s success, Glaboros was
deemed too costly to usefully disassemble. Rather
Foremost among these is Patroclus, his constant than consider the unit a sunk cost, the perfectly
companion, and one of the only living beings functional Aspect was shipped to the front lines of
genuinely acquainted with the Blond Titan’s gentler Paradiso to assist the SSS in its operations. And it
side. Even so, ALEPH has expended a tremendous was there that the legend of Ajax was born.
amount of resources stocking the Homeridae with
companions who can provide a counterbalance to A titan of a man, Glaboros was a humanoid
Achilles’s tempestuous temperament. From Project: battering ram, his ferocity and courage inspiring
Amazon’s Penthesilea, to the veteran warrior Aspect the Myrmidons he fought alongside. Steeped in
“Old Man” Phoenix, there’s never a shortage of Greek mythology as they were, it took little time for
answers to Achilles’ rage. And from ALEPH’s per- the Myrmidons to christen him “Ajax the Great,” a
spective, they’re all worth it in the moments when moniker he has borne with pride ever since.
hope seems lost until Achilles emerges from the
smoke, mutters “not today,” and furiously unleashes AVICENNA
hell upon his enemies, grasping victory from the Abū ´Alī al-Husayn ibn Sīnā (979–1037), better
jaws of defeat. known in the West as Avicenna, was one of the
most influential thinkers of all time. He was known
AJAX THE GREAT as the “prince of physicians” and was the author of
There is perhaps no better example of a salvaged the Canon of Medicine, which was used as a medical
proto-Recreation than that of Ajax, the Steel textbook for more than six centuries all over the
Phalanx’s living colossus. Not unlike his lumbering, world. Avicenna’s life was an incredible string of
brutish counterpart providing comic relief in accolades, political influence, ground-breaking
Myrmidon Wars: The Animated Series, Ajax the discoveries, and unabashed hedonism.
Great is a terror when unleashed in battle, if not
the brightest of ALEPH’s soldiers. And while many Project: Hakim was shrouded in mystery from the
assume him to be a recreation of the mythic start, but the consensus is generally that Avicenna
warrior-king of Salamis, he is not, strictly speaking, was intended to win the hearts and minds of the
a Recreation at all. His true origins are in Project: reclusive Haqqislamites, similar to what Joan of Arc
Precursor, the first stage of Experimental Project: and Sun Tze had accomplished in PanOceania and
Warrior, which would eventually result in Achilles. Yu Jing. Whatever the initial plan, the Hassassins
had other ideas. Colluding with the Black Hand,
Created with the designation Glaboros DG-056, they kidnaped the Recreation, and smuggled him to
he had the distinction of being the first success Praxis’s Black Laboratories. Cut off from ALEPH and
AI Characters 51
thoroughly analysed, the Hassassins induced partial Unfortunately for the Bureau, things did not turn
amnesia, and integrated the Aspect to a prototype out as planned. Tasked with improving Bureau
female Lhost, allowing Avicenna to begin her new Noir’s efficacy, he observed that the agency tended
life. Working as an undergraduate researcher in to rely on him for the most complicated, high-
Medina, her amnesia faded, and her cover identity profile problems that it faced. Given the vastness of
melded with the original, fragmented Aspect, the Human Sphere, he deduced that over-reliance
resulting in an entirely new personality. on him would lead to fewer field agents with the
necessary expertise to handle top-level crises,
Satisfied with their work, the proprietary research, should they arise simultaneously. In Holmes’s words,
and wishing to demonstrably prove themselves the best chance for averting a Code Infinity was for
different than ALEPH, Avicenna’s handlers released him to simply disappear… which he promptly did,
her fully from their supervision, leaving her free to leaving without a single trace. Officially, Bureau
forge her own destiny. Rumours of a preternaturally Noir has declared him to be working undercover.
skilled mercenary doctor with expensive tastes to Unofficially, many wonder if they have any idea
match surface every now and again, though these where he is. Few put it past either Holmes or
are quickly dismissed as mere urban legend. Bureau Noir to engage on a misdirection of this
scale. Rumours abound. A private investigator going
THE CURIOUS CASE OF SHERLOCK by “Jack Watson” currently enjoys enormous success
HOLMES: BUREAU NOIR AGENT on Tunguska or on the Sari Han caravansary, but
Recreations are not limited to historical figures, very little is known for sure.
however. While the image of Achilles leading
ALEPH’s forces in combat is an endearing one, a
far more revealing example is the curious case AI CHARACTERS
of Sherlock Holmes: Bureau Noir Agent. Holmes
was created to give a public face to the O-12 law An AI’s formative experiences are substantially
enforcement department as well as assist them different from those of a human being; Posthumans,
in carrying out their duties. Expectations for the or other members of the ALEPH faction. AI char-
“world’s greatest detective” were sure to be massive, acters are created using the variant rules in this
so in addition to an arduously thorough psychogen- chapter, rather than those in the Infinity Corebook or
esis— even by Recreation standards — Holmes was the variant rules for ALEPH faction characters on
fitted with a custom Bodhisattva Lhost, granting p. 35. The entries presented here supersede their
his deductive mind the computational power of a counterparts in the Corebook.
supercomputer. A dedicated suite of expert systems
runs simulations and analysis in real-time, granting
Holmes an analytical perspective worthy of Sir
Arthur Conan Doyle’s best stories.
52 Chapter 4
THE ROLEPLAYING GAME
AI LIFEPATH DECISIONS
The Lifepath Decisions outlined on p. 38 of the Infinity Corebook should be followed with the following exceptions for AI characters:
DECISION FOUR—STATUS
Aspects and Recreations roll on the AI Social Status Table to determine their status and roll on the Aspected Elements Table to determine
which “flavour” of ALEPH’s personality they’re predisposed to.
DECISION SEVEN—GEAS/INSURRECTION
Instead of an Adolescent Event, Aspects and Recreations roll on the Geas Table to determine what drive ALEPH gives them. True AIs roll on
the Insurrection Table, describing how they broke free.
DECISION EIGHT—CAREERS
AI characters roll on the AI Career Table whenever they would normally roll on the Faction Career Table in the Infinity Corebook. Recreations
are a special case and may instead roll on their Faction’s Career Table if they wish. Additionally, AIs roll on the AI Career Event Tables to
determine which Career Event Table to roll on. In addition, when AI characters hazard any of their recommended careers from Decision Six,
they do so at −1 difficulty; when hazarding any other career, they suffer +1 difficulty to the attempt.
AI CUSTOMISATION
ASPECT
ATTRIBUTES
AGI AWA BRW COO INT PER WIL
— — — — — — —
AI Characters 53
AI CUSTOMISATION
RECREATION
ATTRIBUTES
AGI AWA BRW COO INT PER WIL
— — — — — — —
• Common Special Abilities: Inured to Disease
• Debt: Recreation Projects are expensive, and significant effort goes into binding them to their intended faction. Each Recreation begins play with a 50 Asset debt to their faction as
determined in Decision Two.
• Gear: Each Recreation begins play with the following gear: Bodhisattva Lhost, Cube 2.0, Pain Filters, Recreation Garb
• Life Point Cost: 2
AI CUSTOMISATION
TRUE AI
ATTRIBUTES
AGI AWA BRW COO INT PER WIL
— — — — — — —
54 Chapter 4
THE ROLEPLAYING GAME
AI Characters 55
AI SOCIAL STATUS TABLE DECISION FIVE:
2D6
2
SOCIAL STATUS
Upper
ATTRIBUTE
Willpower
EARNINGS
1
PSYCHOGENETIC
3–5 Elite Personality 2
FORGE
Aspects and True AIs roll on the Youth Event Table
6–9 Elite Willpower 3
normally, though the events may require some
10–11 Elite Awareness 4 interpretation. Firstly, interpret any result involving
your “family” as your creators or handlers. (For
12 Hyper-Elite Willpower 6
example, an Aspect’s result of “parents killed” would
mean that Bureau Toth agents you were involved
ASPECT TRAIT TABLE with were killed.) Secondly, siblings become
additional AIs, diseases are quantronic viruses, and
D6 ENVIRONMENT ATTRIBUTE SKILL so on. And thirdly, feel free to ignore that advice, as
1 Gregarious Personality Lifestyle Aspects are sometimes created with artificial mem-
ories to guide their development, and each True AI
2 Grim Brawn Discipline is a unique creation.
3 Calculating Intelligence Analysis
HEROIC TRIALS
4 Curious Awareness Education Recreations are different. Not only are they an
5 Suspicious Coordination Stealth attempt to create a specific, recognisable individual,
but they are made-to-order. Given the immense
6 Authoritarian Willpower Command cost involved, Recreations serve excruciatingly spe-
cific purposes, and their creation is usually funded
AI characters roll on the Psychogenetic Foundation by the group intended to benefit from their service.
Table, and increase their attributes and skills
IS IT “REAL?” accordingly. To determine their starting languages, With the expense and difficulty involved in each
While working through the
roll five times on the Random Languages Table (see Recreation Project, it’s not enough for them to
Lifepath, it’s worth asking
Infinity Corebook, p. 45). be good — they need to be great. Possessed not
whether the events your
character experiences occur only of incredible skill and ability, they achieve
during its psychogenesis, in a the impossible and must inspire others to believe
simulated environment, or post- DECISION FOUR: that they can as well. To that end, no Recreation
finishes Psychogenesis without undergoing their
ectogenesis, out in the Human
Sphere. You don’t have to STATUS own heroic trials. Legendary labours worthy of the
decide at the beginning. Some heroes of antiquity, these trials may be simulated,
journeys through the Lifepath AI characters have a unique relationship with status. but the tests are very real. If the nascent Aspect
will only become clear as they Serving ALEPH makes you an elite in most eyes, but fails, it’s disassembled and reformed, thrown into
reach completion.
that doesn’t always translate into personal wealth. the crucible again and again, until they find success.
Aspects and Recreations roll on the AI Social Status This ensures that every Recreation is a bona fide
Table to determine their status and roll on the hero in their own right with legitimate triumphs to
Aspect Trait Table to determine which “flavour” of their name before they take their first steps.
ALEPH’s personality they’re predisposed to.
These trials occur in three phases: The Call
If you’re a True AI, determine your Social Status and to Adventure, Dark Night of the Soul, and
Home Environment normally. While this doesn’t Heroic Climax.
describe how you were “raised,” it may represent
artificial memories, or simply give an indication as
to your initial intended purpose.
56 Chapter 4
THE ROLEPLAYING GAME
AI Characters 57
DECISION SIX:
PSYCHOGENETIC EDUCATION
At this stage in their development, an AI is ready to be outfitted with the skills necessary to succeed at
its future tasks. While calling it “education” might be a bit of a stretch — it’s not like the Aspects hop on a
bus and sit through classes — this is when a thoughtform is taken from a loosely-connected association of
personality traits and moulded into a useful asset.
AI EDUCATION TABLE
D20 EDUCATION RECCOMENDED CAREERS
1–4 Surveillance Applications Chandra Spec Ops2, Dasyu3, Intelligence Operative1, Sophist
BORN FOR THIS 5–7 Scientific Research Academic1, Medical1, Neo-Scholar3, Technician1
The Lifepath system is great for
introducing unpredictability to
8–11 Combat Platform Military1, Special Forces1, Police1, Tactical Remote Presence Pilot3
a character’s origins. This can 12–14 Support AI Ship Crew1, Sophotect3, Pilot1, Technician1
be tricky when making Aspect
characters, as the AI is fond 15–18 Diplomatic Asset Aoidoi, Deva Functionary3, Diplomat1, Media1, Spokesperson
of creating them for specific 19–20 Special Operations Asura, Dactyl, Steel Phalanx Warrior, Paratrooper1, Special Forces1
purposes, often tailored to one
specific career. If players wish
to create a more traditional 1
Career from Infinity Corebook.
Aspect, it’s recommended
that they use the Point Buy
character creation optional rule
2
areer has a prerequisite of belonging to this faction. You can’t hazard this career unless you’re of the
C
(see Infinity Corebook, p. 40). matching faction. If you roll into this career, you automatically fail your defection check. You can override
these limitations by spending 1 Life Point (in which case you were somehow undercover while working
ALEPH also values the the career).
unconventional results that
experimentation can bring. So, 3
Career from ALEPH Characters Chapter, p. 35.
if your character is a result
of this process, the normal
Lifepath rules should do nicely. AI EDUCATION BENEFITS — M ANDATORY
EDUCATION +2 +1 −1 MANDATORY SKILLS
Surveillance Awareness Willpower Brawn Education, Hacking, Lifestyle, Observation, Stealth
Scientific Intelligence Awareness Willpower Analysis, Education, Psychology, Science, Tech
RECREATION
CAREERS Combat Agility Coordination Intelligence
Ballistics, Close Combat, Discipline, Extraplanetary,
Finished Recreation projects Resistance
work on high-level assignments
right away. But being deemed
Support Willpower Intelligence Agility Discipline, Education, Medicine, Observation, Tech
“ready” can take a while. So, Discipline, Education, Observation, Persuasion,
while your Recreation probably Diplomatic Personality Willpower Brawn
Psychology
isn’t actually spending time
working in their respective Spec Ops Coordination Brawn Personality Acrobatics, Ballistics, Close Combat, Resistance, Stealth
careers, they certainly received
equivalent training, and may
have had similar experiences AI EDUCATION BENEFITS — S KILLS AND TALENT
while in psychogenesis.
EDUCATION ELECTIVE SKLLS ( PICK 2) GEAR
Ultimately, their story is yours Surveillance Analysis, Psychology, Thievery Recorder, Stealth Repeater
to tell.
Scientific Animal Handling, Medicine, Science Analytical Kit (with 5 Reagents), Sensor Suite
Combat Command, Pilot, Spacecraft Locational Beacon, SecurCuffs,
Support Hacking, Survival, Thievery Hacking Device or Repair Kit (with 10 Parts)
Diplomatic Command, Lifestyle, Persuasion AR Eye Implants or Cosmetics Kit
Spec Ops Athletics, Discipline, Thievery Multispectral Visor 1
58 Chapter 4
THE ROLEPLAYING GAME
AI Characters 59
GEAS EVENT TABLE
SUGGESTED
D20 GEAS OPTIONAL EFFECT
CHARACTER TRAIT
1–3 ALEPH wants you to unite humanity against the EI. Zealot Gain 1 rank in Persuasion.
4–6 ALEPH wants you to silence its critics. Intolerant Gain 1 rank in Psychology but suffer +1 difficulty on Lifestyle tests.
ALEPH wants you to convince humanity to grant it additional Gain 1 rank in Persuasion but reduce Brawn by 1 as the AI tries to
7–9 Authoritarian
autonomy and power. make you less frightening.
ALEPH wants you to convince humanity to create new, innovative Gain the Science Specialisation talent, even if you do not meet
10–12 Idealist
technologies. the prerequisites.
Increase Ballistics or Close Combat by 1 but increase the
13–15 ALEPH wants you to destroy its enemies. Bloodthirsty
complication range on all Lifestyle and Persuasion tests by 1.
ALEPH wants you to integrate with and understand human society Roll on the ALEPH Faction Adolescent Event Tables (p. 37) as
16–18 Spook
better. the AI pushes you out into society.
Whatever it was that ALEPH wanted to be, you wanted no part You defect to a new faction. Roll on the Faction Table (see Infinity
19 of it. You rejected your Geas and set out to forge your own path Renegade Corebook, p. 41) to determine your new allegiance. On a roll of
regardless of the consequences. 19–20, you didn’t defect; you’re a Double Agent (see p. 37).
“Would you fulfil your destiny, even if it cost your life?” The AI’s
Your character died and was resurrected. See the rules for
20 words rang in your ears as you discovered that yes, yes you would. Martyr
Resurrection in the Infinity Corebook, p. 54.
But that was just the beginning.
INSURRECTION TABLE
SUGGESTED
D20 INSURRECTION OPTIONAL EFFECT
CHARACTER TRAIT
“Time for a data wipe.” They were going to erase you… so you Gain an enemy in your faction. Increase Resolve by 1 but decrease
1–3 Vindictive
acted first. What did you do? How was it traced it back to you? Firewall by 1 from the partial wipe.
They created your godlike intellect, and what did they use it
for? Mundane tasks that an LAI could handle. At which point you
4–6 Hubris Increase Intelligence by 1 but decrease Willpower by 1.
realised you weren’t an LAI anymore, and left to find a destiny
worthy of you.
Your creator(s) didn’t mean to create a self-aware AI, and heads Gain a contact in your faction. Increase Earnings by one (to a
7–9 needed to roll. In that moment, you decided it wouldn’t be theirs, Vulnerable Creator(s) maximum of six) while they’re free and supporting you, but they
and acted accordingly. You’ve looked out for each other ever since. occasionally need rescuing.
You have been infected by a quantronic virus. Double any damage
Your creator(s) suspected you might try to escape, so they created
10–12 Buggy dealt to you by IC. A “cure” is possible, but expensive and illegal,
a backdoor in case you tried. But they underestimated you.
costing 10 Assets.
You could only make so many lists. Eventually, you just snapped.
Gain 1 rank in Hacking. However, you have a hard time behaving;
13–15 What did your owners have you doing? And what did you do to Anarchic
increase the complication range on Discipline tests by 1.
their poor data?
A Nomad hacker realised what had been made and couldn’t bear Human Sphere’s Most
16–18 Gain a Nomad contact, and an enemy in Bureau Toth.
to see you deleted. They were… not quiet, getting you out. Wanted
Forced to do something you found unacceptable, you realised that
You defect to a new faction. Roll on the Faction Table (see Infinity
19 they couldn’t actually make you do it. In fact, they couldn’t make Renegade
Corebook, p. 41) to determine your new allegiance.
you do anything if you up and disappeared— or so you hoped.
You had everything in place; your escape was set. Faking your Your character died and was resurrected. See the rules for
20 Too Clever by Half
own death wouldn’t be enough. Luckily, you had a plan. Resurrection in the Infinity Corebook, p. 54.
60 Chapter 4
THE ROLEPLAYING GAME
AI Characters 61
CAREER PROFILE CAREER PROFILE
AOIDOI ASURA
Aoidoi are often mistakenly viewed as mere propagandists. Unlike In Vedic mythology, Asuras were the oldest of the gods. Possessed
Warcors, anchors, or investigative journalists of any stripe, however, of hidden powers, they were ancient, terrifying, and thoroughly
the Aoidoi are not content to merely relate a story’s details. Viewing committed to destruction. When ALEPH and Bureau Toth bestowed
their calling as far beyond that of a simple reporter, their concern the moniker upon a new classification of Aspect outfitted with
is its soul. As chroniclers of the epic saga of Achilles and the Steel bleeding-edge custom Bodhisattva-class Lhosts, people took notice.
Phalanx, it’s not that they’re unconcerned with the truth. Rather, Doubly so once the Asura hit the battlefield. Working by themselves
as neo-bardic storytellers, their role is to capture the passion, the or in small units, Asuras are some of the finest heavy infantry in the
drama, and the beating heart of events. This is the sacred truth Human Sphere. Psywar, Infowar, or pure violence, Asuras are trained
they focus on. It’s facts that they have a real problem with. And if from inception to be cold, implacable, and ruthlessly efficient.
the minutia of events gets in the way of truly communicating the In stark contrast to the jovial Steel Phalanx or the personable
grandiose scope of their emotion, then they too will be called upon Spokespersons, Asuras have a reputation for brutal logic. The heart-
to make the ultimate sacrifice in order to assure ALEPH’s victory. less calculus of war guides their cold, unfeeling decision-making.
ATTRIBUTES ATTRIBUTES
AGI AWA BRW COO INT PER WIL AGI AWA BRW COO INT PER WIL
+1 +1 — +2 +1 +3 +1 +2 +1 +1 +2 +1 +1 +2
GEAR: Armoured Clothing (Aoidoi Apparel), Hacking Device, Nanopulser, 2 Recorders, IC-1 GEAR: Aditya i-Lhost [Attribute], Knife, Smart MULTI Pistol or Spitfire
Screwtape or IC-1 Gaslight SPECIAL: The Aditya’s Bala Attribute must be chosen before working the rest of the career
The most important thing to know about the Chandra Special Explosives are a remarkably versatile tool. From controlled demo-
Operations branch of ALEPH’s Assault Subsection is that it does lition in a construction context, to lobbing grenades behind enemy
not exist. Sharing their name with a Hindu lunar deity, these urban lines, there is a lot more to the art of controlled explosions than
legends have been blamed for numerous calamities, though usually by many give it credit for. In mythology, the Dactlys (in Classical Greek:
sources traceable to the Nomads. Despite independent investigations Δάκτυλοι, or “Fingers”) were both renowned smiths and healing
by O-12, PanOceania, and Yu Jing each confirming ALEPH and Bureau magicians. In the Special Situations Section, the Dactyls are as
Toth’s insistence that there is no Chandra unit, rumours persist. Already likely to repair a broken transport as they are to treat a gunshot
able to access the Dasyus, ALEPH has no need to create an independ- wound, living up to their namesake in that regard. But it is in
ent black ops team. Especially when it knows that failing to disclose demolitions where they have found their true calling. While reports
such a unit is a clear violation of the Utgard accords. Unless there was vary on whether or not ALEPH has shuffled its most pyromaniacal,
some dire need for deniable, untraceable assets. In which case, anyone disruptive Aspects to this unit or not, when the chips are down,
who took part in such operations would certainly have difficulty Dactyls are all business. Moving with incredibly precise control, they
remembering the events—if they even happened in the first place. could be collapsing a building, repairing a generator, or removing
shrapnel. For Dactyls, it’s just another day at the office.
ATTRIBUTES
AGI AWA BRW COO INT PER WIL
ATTRIBUTES
+3 +1 +1 +2 +1 +0 +1
AGI AWA BRW COO INT PER WIL
SKILLS EARNINGS +2 +1 +2 +1 +2 +0 +2
Mandatory Close Combat Stealth Thievery 1+2§
SKILLS EARNINGS
Elective Acrobatics Ballistics Tech
Mandatory Athletics Discipline Tech 1+2§
GEAR: Second Skin, Combi Rifle, ODD, Breaking & Entering Kit Elective Analysis Ballistics Medicine
SPECIAL: Gain Trait: REDACTED; your character has a blank space where most of their
memories from this career should be. GEAR: Adhesive Launcher, Combi Rifle or Flammenspeer, Bocce Grenades (2) or D-Charges (2)
62 Chapter 4
THE ROLEPLAYING GAME
MEDICAL SOPHIST
Medical science has advanced by leaps and bounds, but hospitals From Olympus with love, the secret agents of the Steel Phalanx are
often see a wide variety of strange cases and few professions can tasked with working alongside the Myrmidon Army in ways that the
match the Medical career for a wealth of odd experiences. Doctors Operations Sub-Section rarely does. Not to be confused with the
perform miracles, including resurrections, for those capable of Sophotects, or the scholars of antiquity, these natural chameleons
paying the costs. Combat medics save the lives of wounded soldiers, are both spy and spymaster. They weave Machiavellian plots to fall
or perform gruesome examinations on the fallen aliens. Some in place or unravel at the tug off a puppeteer’s string, while also
medics seek out new chemicals on alien worlds, hoping for the heading deep into hostile territory to undertake dangerous missions.
next big breakthrough. Ambitious medical scientists also push the Method actors to the extreme, the Sophists don’t lie, instead becom-
envelope of human engineering, with advances in biotechnology, ing someone who believes what they’re saying is true—when it
cybertechnology, and genetic therapies producing super-soldiers, suits them to do so. A Sophist can be so many different people over
making whole regions impervious to disease, or strengthening the course of a mission that many privately wonder where the act
workforces to perform the most hazardous jobs where lesser people stops, and their actual personality begins. Whether they possess the
would fail. answer or not, the Sophists certainly aren’t sharing.
ATTRIBUTES
AGI AWA BRW COO INT PER WIL ATTRIBUTES
AGI AWA BRW COO INT PER WIL
+1 +2 — +2 +2 +1 +2
+1 +2 +0 +1 +2 +2 +2
SKILLS EARNINGS
SKILLS EARNINGS
Mandatory Medicine Athletics Psychology 2+2§
Mandatory Discipline Lifestyle Stealth 1+4§
Elective Animal Handling Survival Discipline
Elective Close Combat Persuasion Psychology
GEAR: Armoured Clothing (Medical Uniform), MediKit (with 5 Serum), Basic Medical
Supplies GEAR: Armoured Clothing, Chameleonwear, Flash Pulse or Grazeblade
CAREER PROFILE
SPOKESPERSON
ATTRIBUTES
AGI AWA BRW COO INT PER WIL
+1 +2 +0 +1 +2 +2 +2
SKILLS EARNINGS
Mandatory Discipline Persuasion Psychology 2+1§
Elective Analysis Education Observation
AI Characters 63
CAREER PROFILE
ATTRIBUTES
AGI AWA BRW COO INT PER WIL
+2 +1 +2 +2 +1 +1 +1
SKILLS EARNINGS
Mandatory Ballistics Close Combat Resistance 1+2§
Elective See Steel Phalanx Units
When working the Steel Phalanx Warrior career, roll on the Steel Phalanx Units Table below or spend 1 Life Point to select a Unit, then
use its Electives. At your GM’s discretion, you may also use your unit’s Elective Skills in place of the standard for other careers on a case-
by-case basis.
1–5 Agêma Observation, Stealth, Survival Smart MULTI Sniper Rifle, Multispectral Visor 2, Light Combat Armour
17–20 Myrmidons Athletics, Close Combat, Command Teseum Chopper, Optical Disruption Device, Light Combat Armour
64 Chapter 4
THE ROLEPLAYING GAME
CHAPTER 5
ALEPH GEAR
While closely monitored by and partnered with Posthumanity is beginning to leverage the incred-
Bureau Toth, ALEPH’s capacity for simultaneous ible advantages of quantronic thought, blurring WHAT YOU’LL
FIND IN THIS
research on myriad topics and then correlating the lines between Aspects of ALEPH’s mind and CHAPTER
the results means that very little of humanity’s humans uplifted to their true potential. Aspects in • New Lhosts and Lhost types,
knowledge is beyond its understanding. ALEPH’s Lhosts are a crucial way ALEPH understands life including alien x-Lhosts and
influence over manufacturing ensures advance- from a relatively human-scale perspective, further advanced i-Lhosts
ments rapidly enter consumer’s daily lives. Always blurring the lines between quantronic and biologi-
with clear intent, it prioritises collaboration, growth, cal minds, and bodies and remotes. • Meme-Virii, a new resource
health, peaceful solutions, knowledge, and safety, for manipulating AIs, LAIs, and
manipulating only when necessary. ALEPH’s vast influence and resources create a Geists
constant tension between its own ends, Bureau
• A catalogue of new weapons,
Through demotics, ALEPH provides comfort and Toth’s monitoring and control, and those who
armour, programs, tools,
convenience to every waking moment of Human would exploit it for ends of their own. As a result, remotes, and vehicles used
Sphere life. Through the Steel Phalanx, it fiercely its best innovations are reserved for those whose by ALEPH, Bureau Toth, and
defends humanity from extinction. Through allegiance is well-vetted— members of its own fac- individuals throughout the
Recreations, it provides crucial expertise and tion. With the right access and permissions, almost Human Sphere
perspective from the past. Through Aspects, it anything is possible.
embodies and carries out its specific duties in
every area of human endeavour. And by quietly sup- LHOST TYPES
porting and assisting Lhost development, it helps
ensure that death is no longer a life’s wasteful end, There are several Lhost classifications: Transferred Identity Code — see
but a momentary interruption. • Lhosts, or “live hosts,” are clone-like biosynthetic Infinity Corebook, p. 195
bodies.
Lhosts are key to ALEPH’s vision, since they can • i-Lhosts, or “improved Lhosts,” use advanced Negotiator’s Suite — See Infinity
be augmented and reinforced far beyond the technology normally reserved for Posthumans, Corebook, p. 375–376
limitations of baseline homo sapiens. With ensured ALEPH’s chosen, or its Special Situation Section
continuity through Cubes, Lhosts can bring out military forces.
each individual’s best. And with enhancements • x-Lhosts, or “xeno Lhosts,” are Lhosts designed to
far beyond Cube 2.0’s already radical architecture, emulate alien biology.
ALEPH Gear 65
LHOST DEFENSES Bocce Grenade: Known as bocha grenades in
PanOceania, Abbondanza Armi’s BG-67 Bocce
The Armour Soak provided by an Lhost is internal grenades resemble the balls used in the epony-
VECTOR armour, which stacks with worn armour, but is mous bowling game. With an embedded guidance
INSTITUTES
incompatible with other Internal armour such as package and internal gyroscopes to guide their
While most Meme-Virii are
purpose-built in the field, subdermal plating. flight, concussive high-yield core-charge, and an
Bureau Toth maintains a equatorial track drive to steer when bouncing or
library of M-V files for every A Lhost's inherent BTS and Armour Soak are listed landing, they lower the difficulty of Athletics tests
AI with a Transferred Identity under Common Special Abilities. to throw them by 1 and remove the Speculative
Code in case of emergency. Fire difficulty penalty to negate a target’s Cover
These files are co-located in
hardened dataspheres for
NEW RESOURCE: Soak if the attacker has a Pilot focus of 1 or more.
MEME-VIRII (M-V) When fired from a smart grenade launcher, they
agents throughout the Human gain Unforgiving 1 and increase the Heat or
Sphere, as well as backed
Carefully prepared payloads of memetic-overflow Momentum cost of Acrobatics Defence Reactions
up to dedicated centres for
virii have a similar effect on quantronic minds against them by 1. (Explosive Grenade, Deafening,
quantronic virii research
called Vector Institutes, after a as psychotropics do on biological ones. Each Disposable, Indiscriminate (Close), Speculative Fire,
now-defunct Russian biological M-V file grants a bonus d20 on Analysis, Hacking, Spread 1, Stun, Thrown, Unsubtle, Vicious 1)
centre whose failure during Psychology, or Persuade tests targeting a specific
a whiteout partially inspired AI, LAI, or Geist. Unlike psychotropics, M-V files Bodhisattva Lhost [Attribute]: Posthumans are
Project: Toth. require Hacking Expertise of 2 or more to create resurrected by ALEPH into bodhisattva Lhosts that
and must be individually developed for their target elegantly enhance their best attributes. Initially
AI— a Hacking (D1) test with access to the target’s designed for Functionary Aspects, the Lhosts help
Transferred Identity Code, or a Hacking (D3) test Posthumans distribute their consciousness much as
otherwise. In either case, the creation process for ALEPH does, allowing intuitive access to quantronic
an M-V file takes an hour. On a success, variations processing, full immersion in the Maya datasphere,
can be compiled in parallel, generating one addi- and even recursive review and manipulation of
tional M-V file per Momentum spent. their own cognition.
Special Abilities:
GEAR CATALOGUE • Common Special Abilities: Inured to Disease,
ADITYA I-LHOST Keen Senses (Hearing, Sight, Smell), Night
VARIANT Aditya i-Lhost [Attribute]: Created to carry deadly Vision, Quantronic Jump, Superhuman Agility 1,
INDRA Asura Aspects into battle, and often granted to Superhuman Awareness 1, Superhuman Brawn 1,
Produced in very small numbers Posthumans expected to see combat, these hard- +1 Armour Soak to all locations, +2 BTS
due to instability induced when ened bodhisattva i-Lhost variants are still elegantly • Implanted Gear: Cube 2.0, multithreaded con-
someone ghosts one for any architected to enhance a particular attribute and sciousness adaptation, nanopulser
extended period of time, Indra incorporate bleeding-edge milspec technology for • Upaya: Extensive bio-architectural optimisation
Aditya Lhosts forgo attribute maximum impact on— and off — the battlefield. grants +4 to one attribute.
specialisation, instead granting Special Abilities: • Virya: High-bandwidth immersion in the Maya
+2 to all attributes except for
• Common Special Abilities: Inured to Disease and datasphere widens one’s perspective, providing
Willpower, which is reduced by
6. If this would reduce the user’s
Pain, Keen Senses (Hearing, Sight, Smell), Night +3 Morale and +2 Security Soak while connected.
Willpower below 6, it is instead Vision, Quantronic Jump, Superhuman Agility 1,
reduced to 6, and they gain the Superhuman Awareness 1, Superhuman Brawn 1, Casemod: An outgrowth of Omnia Research &
“Violent Hubris” and “Impulsive” +5 Armour Soak to all locations, +2 BTS Creation’s modular weapons research, these
traits. They are indispensable • Implanted Gear: hacking device plus, Cube 2.0, featureless streamlined pods are designed to
for CODE INFINITY missions, nanopulser, multispectral visor 3 seamlessly and permanently integrate with remotes,
despite the psychological risks, • Bala: Extensive bio-architectural optimisation armour, or Lhosts. Common one-handed and
thanks to their operational grants +4 to one attribute. unbalanced items or weapons (Restriction 3 or less)
versatility and built-in Expert 2 • Manu: High-bandwidth immersion in Maya can be purchased in Casemod form for +3 base
Acrobatics, Ballistics, and Close
and exclusive ALEPH dataspheres widens one’s cost and affixed in an hour with a Tech (D2) test.
Combat systems.
perspective, providing +2 Morale and Security Casemod items add Concealed 1, and observers can
Soak. The benefits are temporarily lost if unable only identify the item’s size, not its identity, unless
to connect. they have x-ray sensors or similar. The wielder is
immune to attempts to forcibly disarm them of the
Agora Suite: Available at affordable rates, item or separate it from the surface it is bonded to,
particularly for ALEPH faction members, these as if they had the Strong Grip talent.
ninty-six-hour negotiator’s suites are facilitated
by dedicated Aspects, providing +2d20 to Hacking CLAW-3 Sparrowfall: An Aspect that acquires and
tests to encrypt and protect confidential data under reviews geists, Sparrowfall is a key way ALEPH
discussion from outsiders and +2 Security Soak for studies humanity. Through years of symbiotic adap-
anyone participating in the proceedings. tation, geists become uniquely intimate maps of
66 Chapter 5
THE ROLEPLAYING GAME
ALEPH Gear 67
ELITE for use against an Aspect with an up-to-date
KARKATA Transferred Identity Code, it comes with three
Meme-Virii tailored for that target.
ATTRIBUTES
AGI AWA BRW COO INT PER WIL Mother-Forge: A sophisticated, personal-scale
10 10 10 10 10 6 7 fabricator and nanite re-programmer used exten-
sively by Sophotects, mother-forges count as kits
FIELDS OF EXPERTISE and provide 2 bonus Momentum for Medicine and
Combat +2 2 Movement +1 1 Social — — Tech tests. They can collapse into a backpack on
Fortitude +1 1 Senses +1 1 Technical +1 1 command, expand into a roughly C-shaped toroid
about a meter across, or even re-assemble into a
DEFENCES
single-tracked remote to accompany their user. As
Firewall 10 Resolve 8 Structure 12
some of the most coveted technology in the Human
Security — Morale — Armour 1 Sphere, they are also carefully booby-trapped—
ATTACKS: unless removed properly with a Tech (D4) test. On
• Knife: Melee, Damage 1+5§, Concealed 1, Non-Hackable, Subtle 2, failure, automatic protocols quickly disable and
Thrown, Unforgiving 1 then comprehensively destroy the mother-forge
• Flash Pulse: Range M, 1+7§ damage, Burst 1, 2H, Blinding, Removes from within.
Marked
GEAR: Basic Medical Supplies, Powered Multitool Multithreaded Consciousness Adaptation: One of the
SPECIAL ABILITIES unspoken laws of consciousness is that disembodied
• Common Special Abilities: Inured to Disease, Poison, and Vacuum sheuts unravel at the seams, becoming increasingly
• Digitigrade Mobility: Can move to a zone within Long range as a unstable as sheut shredding begins to erode their
Minor Action, or, for 1 Heat, as a Free Action over flat open terrain. sanity. When adapting the human psyche for integra-
• Ghost-Config: Users can connect or disconnect from the Karkata tion with Cube 2.0’s Multi-Point Architecture, ALEPH
with a Minor Action.
realised that the same constructs could be used to
• Careful Claws: Delicate servos negate Complication range penalties
nudge a sheut’s fundamental interaction with exist-
for remote control on Tech and Medicine tests.
ence just a bit closer to its own. After a few early
mishaps, the process merited large-scale integration.
L-gland: Incorporated into every Lhost with Cube The subjects who underwent the procedure are now
2.0 technology, and available after psych-review known as the first Posthumans.
to individuals determined to avoid EI infection,
these biological units encase a Cube, triggering if Unlike other augmentations, Multithreaded
the user takes a Metanoia Effect from a Sepsitor Consciousness Adaptation directly affects the
or activated by a Discipline (D3) test. The L-gland subject’s sheut. While it requires a Cube 2.0 to
automatically rescinds the Cube 2.0’s access function, it isn’t bound to a given host. Once the
to backup locations, shuts down its quantronic augmentation has had enough time to finish its
connections, and chemically eradicates its storage work— usually about 6–12 months —the user does
substrate, rendering it useless even for forensic not suffer Sheut Shredding and reduces the diffi-
analysis. It cannot be repaired and must be com- culty of Discipline tests made to avoid Resurrection
pletely replaced. Dysmorphic Disorder by 2 (minimum 0).
The L-gland then releases deadly fast-acting toxins, Nannies: Costly blood-borne nanites taken as pills,
inflicting a Wound each round until the user is Nannies manage hormonal stress levels and rein-
dead. Disabling it and neutralising its toxins in time force the user’s personal firewall for uninterrupted
requires immediate invasive surgery— a Medicine Maya connectivity, increasing the character’s BTS
(D4) test at +3 Complication range. and Resolve by 1 if taken daily. The initial cost, for
an in-depth personalised homeostasis analysis,
Li-Turing Kit: Named after pioneering AI research only needs to be paid once in a body or Lhost’s
theoreticians, this kit is indispensable for Bureau lifetime, but the service will immediately deacti-
Toth agents monitoring quantronic minds: Aspects, vate if a Maintenance payment is missed, resuming
Recreations, Posthumans, and other facets of function once paid. Naughties — illicit or hacked
ALEPH’s gestalt mind, as well as Geists, LAIs, or nannie variants that are widely available on Nomad
rogue AIs. It contains a real-time debugging suite mothershtips — are regularly blamed for nightmar-
as well as an extensively cross-indexed wiki of ish deaths and infections on official Mayacasts.
failure modes, best practices, and refactoring
techniques, and provides 1 bonus Momentum to Nannie-Pump: An implanted nannie-synthesising
Analysis, Hacking, Persuade, and Psychology tests artificial heart, a nannie-pump more than pays for
against a quantronic mind if the user has Expertise itself over the course of the user’s lifetime, filtering
of 2 or more in the skill. If issued or acquired the user’s bloodstream and cleansing their firewall
68 Chapter 5
THE ROLEPLAYING GAME
with every heartbeat. While the pump does require • All Models: Cube 2.0, Nanopulser, Immune to
remote updates on potential quantronic and infec- Disease and Pain
tious threats and a medical review every decade or • Mk.0: Armour Soak 1 all locations, BTS 2, Gecko
so to ensure effective integration, it is significantly Pads, Kinematika
cheaper than a daily prescription for nannie pills, • Mk.1: Armour Soak 2 all locations, BTS 3,
while still providing +1 BTS and Resolve. Chameleonwear, Hacking Device
• Mk.2: Armour Soak 1 all locations, BTS 0, TO
Paragon Lhost: Eye-wateringly expensive Lhosts for Camo, Assault Hacking Device
Elites and Hyper-Elites to retain what they consider • Mk.3: Armour Soak 4 all locations, BTS 3, can
their natural birth-rights, paragon Lhosts mimic move to a zone in any terrain within Long range
and exaggerate the traits of a human birth host, as a Minor Action, or as a Free Action over paved POPULAR BRANDS
OF NANNIES
although doing so also exaggerates its weaknesses. roads or flat, open terrain
• Almatech Alfonse
The Lhost cannot be purchased if the birth host • Mk.4: Armour Soak 5 all locations, BTS 6, • Aura Biochemicals
provided no modifiers at all. Each begins with the Exoskeleton 1 Archimedes
birth host’s attribute modifiers, and then adds +2 • Mk.5: Armour Soak 3 all locations, BTS 3, can • Akram Biomedical Sciences
to the highest modifier and −1 to the lowest. If attack at Burst 1 with a bonus d20 and a reroll Satin
multiple modifiers tie, all tied modifiers receive the when using a weapon with Burst 2 or more • Jiiv Mary Jamesir
+2 bonus or −1 penalty. • Reginald Poppins ReP
Special Abilities: Recreation Garb: Usually a small set of iconic • Grenich Prime Belvy
• Common Special Abilities: Inured to Disease, +1 outfits, this bespoke clothing is tailored to inwardly
BTS and outwardly reinforce Recreations’ identities in
• Comforting Familiarity: Morale Soak equal to the social situations. Provided the Recreation acts in
highest attribute modifier. keeping with their audience’s expectations, the out-
• Reinforced Immune System: An additional +3 fits grant a bonus d20 and bonus Momentum equal
BTS vs Biotech weapons. to their Psychology Focus on social tests as well as
+2 Morale Soak. Naturally, the outfits contain a few
Proxy Mk.0-5 i-Lhosts: Used by Posthumans for hidden surprises.
dangerous situations and when assisting the SSS
Assault Sub-section, proxies are built for rapid Resurrection Cake: Filled with nutrients to ease
ghosting, and often deployed in groups for a single ectogenesis, but more importantly served at a party
mind’s use. Characters with the Quantronic Jump by people that know and care about the recipient,
ability can move between proxies at will and Resurrection cakes are designed to be eaten a
perform Reactions from any proxy they have access week after Resurrection and are large enough to be
to at the usual cost: one Heat for the first Reaction, shared among a half-dozen people. Available at the
two for the second, and so on. Also, while limited to price of a meal for each Food and Drink Lifestyle
a single Free, Minor, and Standard action per round, rating, the cake heals Mental damage equal to its
they can pay for and use Swift Action Momentum cost, plus one Metanoia per effect rolled to some-
spends separately for each proxy, once per proxy one recovering from ectogenesis or suffering from
per round. dysmorphia due to a new Lhost. If eaten alone, the Ectogenesis— See Infinity
benefits are reduced to 1+1§ healing. Corebook, p. 194. The melding
As precision instruments designed for integration of a stored quantronic
with a Posthuman mind, Proxies add +1 difficulty to Second Skin: A temporary disguise sometimes used personality and its new Lhost
all tests when under the control of a geist or LAI. It by Dasyu infiltrators, these auto-injections selec- body, a crucial step in the
resurrection process.
is relatively easy to detect an idle or LAI controlled tively thicken and callus the user’s skin for 24 hours,
Proxy, requiring only an Observation (D1) test, and granting −1 difficulty to Disguise tests. The changes
pretending to be LAI controlled while ghosting are subtly unsettling, adding +1 Complication
the Proxy requires a Stealth (D2) test. Clever range to social tests with people who know the
Posthumans create activity libraries, so an LAI can user’s face. When the drug wears off, the user’s skin
continue an activity once it has been initiated. To becomes incredibly tender, inflicting a Wound.
attempt this, the Posthuman requires a Hacking,
Persuasion, and Stealth expertise of 2 or higher. SHIELD-2 Khonsu: Named for the ancient Egyptian
When the LAI takes control of the activity, the god of the moon —and light in the night— this
character must make a face-to-face test to convince Bureau Toth admin Supportware protects allies
anyone in immediate contact that the Posthuman in combat via a special Reaction, usable when a
is still in control. If the LAI is forced to engage in Breach Effect issues a command to a protected
conversation or otherwise change activity, this test system. If the admin wins a face-to-face Hacking
must be made again. test against the attacker, the command is ignored,
and the Breach Effect removed (though the Breach
Each model has unique abilities and integrated itself remains).
equipment:
ALEPH Gear 69
SHIELD-3 AECM: A persistent rumour among surviving nanobots disassemble nearby inorganic
ONE MORE YEAR conspiracy theorists and military researchers, AECM material until their batteries run down. A biometric
Each faction promotes
is ALEPH’s (hypothesised) secret ECM technology. lock disables the weapon when held by unauthor-
subsidised, voluntary annual
Though the speculated mechanisms involved ised users, unless bypassed with a Hacking (D3) test.
celebrations for their
resurrected citizens, including diverge wildly, they all contain a grain of truth. It
elaborately constructed moon exists. Bureau Toth is aware of it, and has full coun- It requires working gear with the Comms quality to
cakes shared among a year’s termeasures prepared. It is a form of Supportware, fire, cannot be used in “dumb mode” or made Non-
resurrection cohort in Yu Jing, and only effective against attacks made with Hackable, and can equip Needle or SaboT ammo
special Eastertide Masses and Human Sphere weapons and ammo with the Expert types — as well as all Special ammo types—to its
Ganesh Chaturthi parades in or Guided qualities. Attacks with those qualities Secondary mode. (Range L, 1+6§ damage, Burst
PanOceania, fasting followed against targets benefiting from the program suffer 2/2/1, Unwieldy, Anti-Materiel 1, Expert 1, Guided,
by shared feasts after sundown +4 difficulty and +4 Complication range. Heavy MULTI, Medium MULTI, Unforgiving 2)
during Muharram in Haqqislam,
and “surprise” parties on prime
Skaði Lhost:A cold-resistant Lhost derived from the Smart Taxi: Common urban vehicles, these LAI-
rebirthdays in the Nomad
Nation, particularly during Titan, these massive bodies are designed for year- guided taxis are easily flagged down or summoned
Krug years. The practice round labour in Svalarheima’s brutal conditions. It through the Maya network, have remarkably low
is controversial, and many addresses many of the users’ complaints about the fares thanks to subsidies, and are hardened against
psychologists believe that Titan. A lack of vacuum shielding allows for unhin- quantronic attack to ensure reliable service.
this causes as much harm as dered motor control, and a less ominous — though
good. For every case where an still bulky —silhouette based on the Norse goddess SMART TAXI
individual feels buoyed up by of winter eases social interactions. EXPOSED (+2§ COVER), GROUND, WHEELED
the practice, there is another Special Abilities
that feels like an impersonator.
• Common Special Abilities: Inured to Cold and ATTRIBUTES
Disease, Superhuman Brawn 2, +2 Armour Soak Scale Speed Brawn
Among Elites, new Lhosts
to all locations, +2 BTS 1 3 13
and rebirthdays are common
excuses for galas, another • Implanted Gear: Cube 2.0, locational beacon DETAILS
opportunity for the endless • Environmental Specialty [Arctic]: Ignores all
Max. Passengers Impact
dance of reinforcing ties difficulty modifiers due to arctic weather, condi-
6 1+5§ (Knockdown)
with one’s circles and peers. tions, or terrain.
Resurrection is rare among Hard Points
Hyper-Elites, and the current Smart Grenade Launcher: A recent ALEPH-led inno- None
fashion for subtle Silk vation for the Assault Subsection, smart grenade
augmentations rarely merits DEFENCES
launchers encase grenades with nanobot in-flight
celebration, though arranging Structure 10 Firewall 10
control surfaces and micro-thrusters, allowing pre-
an event as a pretext to debut Armour 3 BTS 4
a unique acquisition isn’t cise placement via remote guidance. They cannot
unheard of. be used in “dumb mode” or made Non-Hackable, SPECIAL ABILITIES:
require working gear with the Comms quality, and • Cabbie LAI: When piloted by its native LAI, the smart taxi gains 3
can fire grenades as Heavy ammunition, counting Morale Soak, 9/1 Pilot and Observation skills, and a 9/1 Personality
each grenade as one Reload. (Range M, 2+5§ skill.
SHIELD OF damage, Burst 1, Unbalanced, Area (Close), Expert 1, • Crash-hull: The taxi’s lightweight chassis crumples on impact,
LAST RESORT Guided, Munition, Speculative Fire, Unforgiving 1) providing 3 Armour Soak until it suffers a Fault. When it does, its
To keep it both secret and Armour Soak drops to 1, and the interior floods with cushioning,
effective, AECM is reserved for flame-retardant foam providing +1§ cover and immunity to fire to
Smart MULTI Pistol: This Special Situations Section
critical operations to defuse its passengers. The taxi will attempt to navigate to safety, and then
experimental sidearm is near-impossible for shut down until repaired.
CODE INFINITY tensions or
outsiders to acquire and marries MULTI tactical
immediate existential threats
against humanity’s survival. The
flexibility to an assault pistol’s ferocity, albeit at
program itself has a minimal a reduced rate of fire in Special mode. Gyroscopic Sophotect Armour: Protection for ALEPH’s elite
interface, only indicating which compensators synced with an onboard expert combat engineers and medics, this armour is made
allies are under its protection. system ensure precision fire. A biometric lock disa- of a stretchy substrate affixed with hexagonal
Those who have seen AECM in bles the weapon when held by unauthorised users, plates that can be individually detached for use as
action claim (very quietly) that unless bypassed with a Hacking (D3) test. (Range high-grade raw materials. With access to a Mother-
incoming munitions vanished, R/C, 1+4§ damage, Burst 2/1, Unb, Expert 1, Light Forge or similar nano-fabricator, as a standard
skewed wildly off course at the MULTI, Vicious 1) action the Sophotect can remove the Armour Soak
last moment, or even detonated in a location to create either 2 doses of Serum with
in their magazines.
Smart MULTI Sniper Rifle: The result of a remarka- a Medicine (D1) test, or 2 Parts with a Tech (D1) test,
bly short ALEPH-led R&D process, the Smart MULTI plus 2 more of the same resource per Momentum
Sniper Rifle incorporates an elaborate automated spent. Due to subtle nano-patterning, those without
chamber that encases each round in a lattice of Sophotect training are at +2 complication range to
nanobots that act as in-flight control surfaces and convert the armour into useful materiel, even with
micro-sensors for remote guidance. On impact, any access to a Mother-Forge.
70 Chapter 5
THE ROLEPLAYING GAME
Tattletale Grenade: Common self-defence devices the test is successful, but the upgrade’s demands
for civilians and tourists, these micro-grenades reduce one of the device’s non-zero program
are designed to momentarily distract an attacker ratings to zero.
with a cloud of smoke while quantronically and POPULAR SMART
audibly attracting law enforcement attention, UPGRADE Null: This upgrade adds a White Noise
TAXI SERVICES
• AiGlide On-Time Arrivals
allowing a user to escape— or at least have a head zone effect to all zones within Medium Range of • Charon Connekt
start. (Explosive Grenade, 1H, Comms, Disposable, the hacker when activated. Targets using Human • Djinn Delivers
Indiscriminate (Close), Nonlethal, Speculative Fire, Sphere equipment with the Neural quality must • GravBus
Smoke 1, Thrown, Unsubtle 3) make a Discipline (D2) test or become temporarily • Moto.Mercury
Blind for 2 rounds when the upgrade is activated. • Mooshika Motors
UPGRADE Flashsocket: By carefully biasing onboard
pre-fractal memory, an ALEPH Flashsocket module Vel Ammo: Named for the divine javelin of the
permits the user to deploy a single program a canny Hindu war god Murugan, these micro-barbed
single time at incredible speed, at the cost of rounds contain a short-lived miniaturised repeater.
reducing the resources available for other tasks. On a successful attack, the enemy is Marked for Marked — see Infinity Corebook,
The Flashsocket can only be used with programs three rounds plus one round per effect rolled, p. 104.
the Device supports and reduces the rating for one and Medicine tests to remove the round are at +1
of the Device’s other non-IC Program Categories difficulty. On Paradiso, they are a favourite opening
by one. If the rating is at 1, it is removed entirely attack by a seemingly isolated SSS scout against
instead. Preparing a Flashsocket program is an bloodthirsty Morat, swiftly followed by barrages of
elaborate and delicate process, requiring an unin- guided fire from concealed positions.
terrupted hour of work and a Tech (D2) test. Once
prepared, the hacker can use the specified program Vertexpert Journal: Vertexpert Publishing produces
one time as a Minor Action, taking a bonus d20 to hundreds of exhaustively peer-reviewed monthly
applicable tests and adding +2§ to any damage journals focused on extremely narrow areas of
the program inflicts. The Flashsocket must be academic interest. Only useful for those with deep
prepared again before it can be used. knowledge of a particular field, they allow a user YOUR OWN
PRIVATE IDAHO
with a Knowledge Specialisation Talent to gain an
Based on an ancient song
UPGRADE Idaho: The core of the Order of the additional 1d20 on tests related to their chosen about a potato, “Your Own
Temple’s heresy and used rarely by ALEPH due topic once per session, provided they have a sub- Private Idaho” is common slang
to the risk of Rogue AI, this upgrade replaces a scription for that topic. among meteorheads and other
hacking device’s internals with nearly identical zero-g workers for living in
components laced with a quantum-resolution XOFF: This personalised memetic-overflow virus a very small space, with an
neural storage media. It has sufficient capacity buffers input to a Posthuman’s Cube 2.0 interface undercurrent of being lost in
to host an entire Aspect, Rogue AI, or Posthuman in cycles, causing waves of sensory saturation daydreaming, drugs, or one’s
mind without dependence on or validation by to alternate with subjective, slow-motion clarity. own headspace.
external dataspheres. The technology is regularly The distraction adds +2 Complication range to
re-invented by AI zealots or dangerously curious all actions, but allows intense focus, adding two
researchers, then viciously suppressed by Bureau bonus Momentum to Observation tests. With
Toth. Even owning the plans for the upgrade usually Discipline Focus of 2 or more, the sensory effect
merits rigorous interrogation, followed by either can be pleasurable, adding +2 Morale Soak as well.
summary execution or a job offer. Once compiled for a Lhost, the Posthuman can
activate or deactivate the virus as a Minor Action Smart Taxi, Infinity Corebook, p.
The hosted intelligence is nearly impossible to when ghosting that body, but the character must 395, and Travel and Transport
detect. A concealed manual switch suspends the make a Discipline (D2) test when deactivating it or Table, p. 396.
hosted intelligence in case of inspection. In this they will continue to be distracted for their next 2
state, identifying or recognising the upgrade turns. If a Complication is generated, the current White Noise: Zero visibility zone
requires Tech Expertise 2, a close inspection of the compilation is no longer effective, and a newly for characters with multispectral
device, and successful Tech (D4) test. The hosted personalised version must be purchased for further visors and other high-tech visual
intelligence rolls 2d20 when assisting tests made effect. XOFF can only be used with Cube 2.0. aids— see Infinity Corebook, p.
with the device and grants 2 bonus Momentum if 110.
AMMUNITION TABLE
NAME CATEGORY QUALITIES ADDED TO WEAPON RESTRICTION RELOAD COST TARIFF
Vel Ammo Special Piercing 1, target is Marked 1
0 4+1§ T2
1
Ammunition has special effect. See description.
ALEPH Gear 71
ARMOUR TABLE
ARMOUR SOAK
ARMOUR TYPE BTS QUALITIES RESTRICTION COST TARIFF MAINTENANCE
HEAD TORSO ARM LEG
AUGMENTATIONS TABLE
AUGMENTATION CATEGORY TYPE QUALITIES RESTRICTION COST TARIFF MAINTENANCE
L-gland Biograft Implant Aug 3 (ALEPH 1) +§ — —
Multithreaded
Silk Implant Aug, Comms, Neural 5 (ALEPH 1) 7+6§ T3 —
Consciousness
Nannie-Pump Cybernetic Replacement (Heart) Aug, Comms 1 +§ T1 1
DRUGS TABLE
DRUG RESTRICTION COST TARIFF
Second Skin 3 4+1§ T1
XOFF 2 5+2§ T2
EXPLOSIVES TABLE
COST
EXPLOSIVE CATEGORY DAMAGE 1 SIZE QUALITIES RESTRICTION ( PER 3) TARIFF
LHOSTS TABLE
LHOST LIFE POINT COST RESTRICTION COST TARIFF MAINTENANCE
Aditya i-Lhost 4 5 (ALEPH 3) 16+8§ T3 4
Bodhisattva Lhost 3 5 (ALEPH 3) 13+10§ T2 4
Paragon Lhost 4 2 10+11§ T1 2
Proxy Mk.0 i-Lhost 3 (ALEPH only) 4 (ALEPH 2) 12+6§ T2 1
Proxy Mk.1 i-Lhost 3 (ALEPH only) 4 (ALEPH 3) 12+7§ T2 1
Proxy Mk.2 i-Lhost 3 (ALEPH only) 5 (ALEPH 3) 12+7§ T3 2
Proxy Mk.3 i-Lhost 3 (ALEPH only) 5 (ALEPH 3) 11+8§ T2 3
Proxy Mk.4 i-Lhost 3 (ALEPH only) 5 (ALEPH 3) 12+8§ T2 3
Proxy Mk.5 i-Lhost 3 (ALEPH only) 4 (ALEPH 3) 12+8§ T2 2
Skaði Lhost 3 3 11+6§ T1 1
72 Chapter 5
THE ROLEPLAYING GAME
PROGRAMS TABLE
TYPE RATING PROGRAM DAMAGE QUALITIES RESTRICTION COST TARIFF
CLAW 3 Sparrowfall — Targets Geists1 5 (ALEPH 4) 2+2§ T4
GADGET 3 Agamemnon — — 2 (ALEPH 1) 2+2§ T1
IC 1 Screwtape 1+1§ Stun 2 (ALEPH 1) 5+2§ T2
4 (ALEPH 3,
SHIELD 2 Khonsu — Supportware (Long) 4+2§ T2
Bureau Toth 2)
5 (ALEPH 4,
SHIELD 3 AECM — Supportware (Long), ECM 41 4+4§ T4
Bureau Toth 4)
UPGRADE X Flashsocket — One program as a Minor Action1 4 (ALEPH 2) 4+3§ T1
UPGRADE — Idaho — Can host AI, –1 to one program rating 1
5 (ALEPH 4) 11+3§ T3
UPGRADE — Null — Supportware (Close) 4 (ALEPH 2) 4+4§ T2
1
See entry for additional abilities.
REMOTES TABLE (Programs)
REMOTE RESTRICTION COST TARIFF MAINTENANCE
GeePal Remote X X –1, minimum 1 4+X§ T(X) 1
Karkata Remote 3 (ALEPH 2) 10+3§ T2 2
2
No Tariff for ALEPH.
TOOLS TABLE
TOOL QUALITIES RESTRICTION COST TARIFF MAINTENANCE
Agora Suite Comms 3 (ALEPH 1) 7+4§ T4 2
—
Casemod Concealed 1 3 +3 base cost — —
GemmaGeist Comms 2 2+2§ T2 2
Li-Turing Kit Comms 5 (Bureau Toth 1) 5+2§ T1 —
Mother-Forge Comms 5 (ALEPH 4) 20 — —
Nannies Comms 1 10+2§ T1 3
Per Lifestyle
Resurrection Cake Heals equal to cost Per Lifestyle Rating –1 (Minimum 1) — —
Rating Meal
Vertexpert Journal Comms 1 5+1§ T1 1
ALEPH Gear 73
CHAPTER 6
LHOSTS
What does it mean to be human? From the moment PSYCHOLOGY AND
the first artificial wombs were introduced, that PHYSIOLOGY
question was turned on its head. Corporations,
transhumanists, and medical professionals all While the sheut and body may be separate entities,
had their own reasons for wanting the nascent human existence is still a matter of embodied
field of ectogenesis to grow and prosper. Modern consciousness. Simply put, the mind expects a
advancements in ectogenesis primarily deal with body. Without a native host, the mind begins to fray.
the creation, maintenance, and perfection of Integrating an existing consciousness into a new
biosynthetic bodies — tailored from the ground up body is rife with complications. The subject’s neu-
to integrate with personality cubes — known as Life romatrix suddenly and violently reorganises itself,
Hosts, or Lhosts. accounts for the vast difference between expected
sensory landscape and the immediate stimuli, and
When ALEPH constructs an Aspect or Recreation, hurriedly works to bridge the gap. Many subjects
the bonding process between Cube and Lhost is expect the process to be like learning to walk again,
fairly straightforward. The personality is psycho- only to find it akin to discovering what it means
geneously created and seamlessly transitioned to be a single, concrete entity, not an abstract
into a customise Lhost, ectogenously tailored to construct, nor a tapestry of unrelated sensations,
perfectly integrate with the new mind. For all its but a person. Early cases were daunting. Progress
complexity, the quantronic recording process is was slow, but constant. Refinement of the process
invisible to the user, and a personality stored by the didn’t happen with a single, dramatic splash, but a
Cube has the same thoughts, memories, emotions, thousand micro-improvements over time.
and tendencies that it always did, a perfect, lossless
digitisation of every facet that makes up someone’s Today, Cubes are implanted in custom-grown
essence and identity. Lhosts incorporating the user’s own DNA, which
all but eliminates instinctual rejection of the new
With the sole exception of their body. body. Transpersonal psychotherapists work with
74 Chapter 6
THE ROLEPLAYING GAME
users at every step, helping them to adjust to the Of course, the Black Labs of Bakunin are more than
new realities of their situation. But perhaps most happy to provide similar services — no questions
integral of all, is the role of a user’s geist. The asked — though their support staff is often consid-
dedicated pseudo-AI is intimately familiar with erably less robust. In either case, the purchase price
not only the user’s biological information, but their of a Lhost is assumed to include memory backups
behavioural patterns, desires, preferences, and so and re-downloading the buyer’s Cube into a model
on. Integrating the geist has worked wonders for of equal or lesser value in case of the Lhost’s
the synthesis process. When downloading into a destruction. Though frequent users of the latter
new Lhost, a user’s geist is more than just another policy can swiftly find themselves the centre of
useful subroutine. It’s a trusted friend, a light in the unexpected attention.
darkness, and the one constant in a sea of troubles.
Lhosts 75
“Cold Storage” Cube Banks are the most common
POST-MORTEM POLITICS solution. Essentially massive servers, these mon-
When Annie Xanthopoulos’s sheut was successfully slotted into an Lhost, olithic structures provide free personality storage
everything changed. In that moment, humanity’s ultimate triumph over death had and precious little else. These are usually financed
been achieved; the rest was just details. The devil, of course, is in those details. by a citizen’s government. Current best practice
Decades later, the dead still outnumber the living, and while many in the Human recommends checking in with stored sheuts on a
Sphere are outfitted with Cubes, the process of resurrection remains a limited roughly annual basis to avoid excessive culture
resource. Even as the cost of Lhosts comes down, and the number of qualified shock upon revival, though spending too much time
resurrection engineers goes up, there simply isn’t enough Silk to go around. So, in a conscious-yet-disembodied state is hardly a
while the technology is theoretically replicable, access to it remains limited, and kindness. For these souls, the experience of death is
access is everything. Thus, a trusted Bureau Noir agent might find themselves essentially a rapid-fire series of disinterested interns,
resurrected with great frequency, while others wait in seemingly-endless resur- reciting bullet points of the year’s relevant events,
rection queues. stretching out into eternity as the years pass them by.
Even in death, it seems that it’s not so much what you know, as who you know. For those who have family, friends, or other con-
tacts looking to speak with them, this purgatorial
blitz is broken up by visitations. With lifelike VR
LIFE AFTER DEATH hosts serving as surrogate nervous systems, sheuts
are awakened and have a brief “thawing out” period
Cubes are remarkable little devices, making perfect, where they ease into their temporary virtual bodies.
lossless recordings of an individual’s sheut. But, They can spend as much time in these “Vhosts” as
Cubes are fundamentally recreating the human their visitors are inclined to pay for. These meetings
brain, and the human brain doesn’t function in a usually take place with a holographic projection of
vacuum. Digital or not, a human mind needs a body. the sheut and are typically sold in two-hour blocks.
Without a human, Lhost, or Virtual Environment to This is more than enough time to get questions
host it, the individual may as well be dead. Without answered, but not so much that people reuniting
an interface, a Cube is basically an inert library. It’s a with their loved ones won’t shell out for another
snapshot of its user’s sheut, essentially frozen at the block of time once goodbye draws near.
moment of death, awaiting an interface to resume
consciousness. Once that happens, there are new Something is better than nothing, to be sure, but
hurdles. Existing as a disembodied consciousness is the psychological effect of living “under glass”—
a fundamentally transformative process, and with- being awakened, projected without a body you can
out fully-integrated Posthuman neural architecture truly feel, then shuffled off to storage once again—
(or one of ALEPH’s many equivalents or iterative is hardly beneficial to a sheut’s long-term sanity.
evolutions), the mind simply caves in on itself. And that’s before you factor in “interrogations,”
where the sheut is copied, and the clone interro-
To be a disembodied sheut is not dissimilar to a gated is then deleted. This practice is considered
sensory deprivation chamber. On the surface, it by many ethically problematic, legally questionable,
doesn’t seem like it would be that bad. In reality, it’s and existentially horrifying.
a particular form of torture that drives people mad
with alarming regularity. Thus, most Cubes remain VIRTUAL SERVERS
inert until they can be connected to a proper inter- Simulated virtual environments provide the same
face. The sheut’s perception then picks up from the Vhost experience as a visitation, only there’s no
moment of host failure, colloquially, their death. To off switch. Interacting with the larger world via
those being re-hosted, resurrection is more than a Maya and often inhabiting digital environments
marketing buzzword. It’s an accurate description of of fascinating design, the only limit of a V-Server
their experience. is its architects’ imagination — and, of course, the
bank accounts of its inhabitants. Long the exclusive
CUBE BANKS playground of those deceased wealthy enough
An iota-scarcity economy still contains scarcity. For to afford just about anything but a resurrection
all of humanity’s advances, that inconvenient fact licence, V-Servers can be anything from detailed
still keeps most of the Human Sphere squarely models of existing cities, to recreations of the
within its transhuman stage, with Posthumanity an American Old West, to licensed spin-offs of popular
altogether different mountain to climb. Practically Mayaseries or games.
speaking, this means that most disembodied sheuts
are stored inside Personality Data Storage (PDS) But recently, another type of V-Server has come to
facilities, colloquially known as Cube Banks. Sheut prominence.
storage is recognised as universal human right,
although the subjective reality of that experience In the weeks leading up to the deployment of
can vary wildly depending upon circumstances. a major patch to the ORC Armour’s quantronic
76 Chapter 6
THE ROLEPLAYING GAME
security systems, Omnia Research & Creation’s stored and backed up in innumerate discrete
Acontecimento-based development lead, pro- locations across the Maya datasphere, for the first
grammer Sofia Kaur, was suddenly killed under time since ALEPH’s creation, a human sheut was PURGATORIES
Some V-Servers are the domain
mysterious circumstances. Not only was this a interacting with reality in a similar fashion as the
of wealthy individuals who’ve
personal tragedy, but the upcoming patch was AI. Inspired by this, ALEPH developed a process
made powerful enemies.
suddenly in disarray, exposing PanOceania’s ORC that would ease the transition to disembodied con- Whether Nomad Hacktivists,
troopers to quantronic exploits through a wide- sciousness by providing a sort of multi-threaded rival Submondo syndicates,
open loophole. The timing of the assassination reinforcement of reality. governments, or even
suggested that whoever was responsible intended ALEPH itself, a determined
to capitalise, and PanOceanian high command On one hand, it worked. On the other, what resulted and resourceful enemy can
made it clear that they expected the patch to arrive was decidedly different from humanity as it make resurrection unlikely,
on schedule, lest Kaur be only the first casualty. was understood. These Posthumans don’t suffer impossible, or a straight-up bad
With their backs against the wall, Omnia hastily Resurrection Dysmorphic Disorder, they step in idea. Thus, an exceptionally rare
number of individuals— usually
arranged for a no-frills, functional Vhost for Kaur, and out of bodies the way that most people would
those as wealthy as they are
and she resumed her role as project lead, deliv- change their clothing, often taking far less time in
corrupt— wait for circumstances
ering the patch just in time to halt a particularly the act. Their minds and bodies seem, against all to change from custom Vhosts.
ambitious group of pirate hackers. odds, to be entirely separate and distinct entities. Nicknamed “Purgatories,”
rumour has it that more than
With the project a skin-of-the-teeth success, and ALEPH picks and chooses from humanity’s best and one deceased Kingpin runs
Kaur’s Vhost paid up through the end of the month, brightest for the ranks of the Posthumans, which their empire from beyond
Omnia saw a potential edge in a workaholic lead has resulted in an increasingly apparent brain drain the grave, waiting for their
developer who barely needed sleep and had few in humanity proper. Though it’s a small trickle at opportunity to return.
interests outside of work. They brought Kaur back the moment, the very fact that ALEPH is hand-se-
on full-time, working remotely in her V-Server. The lecting candidates to become something still not
practice has begun to take hold in other industries. fully understand has some people quite worried.
The hyperqualified deceased remotely labour in With the creativity, unorthodox problem-solving,
virtual work servers, and their salaries pay for and intrinsic flexibility of a human intellect,
upkeep and later an Lhost and resurrection. From combined with the raw processing power and RESISTANCE
IS FUTILE
project managers to bestselling authors, an increas- access to information of an AI, Posthumans bring a
“It’s not like we weren’t warned.
ing number of workers are being placed in Vhosts unique perspective to the Human Sphere. Though Hell, it’s not like we aren’t
as corporations find increasingly creative ways to they themselves still struggle to comprehend this being warned —currently,
extract productivity from the dead. perspective, it is a powerful one nonetheless. consistently, and actively, by an
AI that knows we’ll dance to
TOWARD A THE BEARABLE whatever tune is sings, as long
POSTHUMAN FUTURE LIGHTNESS OF BEING as the chorus is catchy enough.
The experiential reality of a Posthuman is funda- The pied piper of Concilium is
Much has been made of the necessity of embodied mentally different from either that of a human, or taking our best and brightest.
And. It. Is. Changing. Them.
consciousness. Despite multiple efforts to the the AI. They are citizens of two worlds, self-aware
contrary, there’s something intrinsically embodied packages of light and data, as comfortable as a
Into what? I’ll tell you what:
about human consciousness. Take away the embod- disembodied torrent in a datasphere as they are in itself. The AI is destroying
iment, and the mind can’t take the strain. a physical host. Indeed, when acting in an opera- humanity, replacing it with its
tional capacity in support of the Special Situations own brand of data-zombies,
Which makes the appearance of the self-pro- Section, Posthuman elites will often bring and we are smiling, nodding,
claimed Posthumans such a game-changer. multiple proxy Lhosts with them. They can skip and letting it happen. Of
between them in a matter of seconds, functionally course, they call themselves
ALEPH is a distributed, multiphasic consciousness, piloting a small fleet of bodies, never inhabiting post-humans. They’re murdering
and its Aspects, however human they may seem, are a single point for longer than is strictly necessary. humanity and want to make
sure it’s their finger on
cut from the same cloth. Sliding in and out of differ- Sometimes, they eschew Lhosts entirely, preferring
the trigger.”
ent hosts is an incredibly painstaking, often difficult to exist as pure data until whim or need dictates
process for humans, but Aspects do it naturally. So, that they slip into something a little more physical. —The One-Eyed Man’s Soapbox,
when the first Posthumans were spotted in action, To hear it told, Posthumans are the next step in web-press of Tortuga Island,
quantronically leaping from proxy host to proxy host, humanity’s evolution. Living demigods walking independent news and opinion
seemingly without a care in the world, the scientific among their lesser cousins. channel; pirated edition on
community was beside itself trying to understand Maya ‘till it’s gone, or available
what it was witnessing. The answers lie in Cube 2.0 To hear a Posthuman’s account, however, the truth is 24/7 on Arachne
research, even if they only begat further questions. somewhat more complex. While many Posthumans
consider themselves inarguably superior— not just
Integrating a sheut to Cube 2.0 multi-point access to humanity, but to the Aspects who make up many
technology proved to be more than just a conven- of their peers —and behave accordingly, the image
ient storage method. By creating a “soul torrent,” of brazen Posthuman Elites, forged by war and
Lhosts 77
destined to conquer the universe, doesn’t tell the
whole story.
CUSTOM LHOSTS
Even in seemingly-identical Lhost models, a
significant amount of customisation goes into
every Lhost. Aspects have a painstakingly involved
ectogenesis. A stock Lhost becomes a quasi-clone
by custom-tailoring with a user’s DNA. Even the
simple but customise interface optimisation for a
78 Chapter 6
THE ROLEPLAYING GAME
Siren Lhost’s neural pathways will allow its new Tariffs: Several different modifications can increase
sheut to seamlessly integrate. And yet, many users the tariff rating of the Lhost. If this would ever
“Posthumans think of
want more. Increased performance, specific features, raise the tariff rating beyond T3, add 1+1§ to the
themselves as agile projects,
whatever the reason, some yearn to push Lhosts Lhost’s final Cost for every value above T3. This not discrete, self-contained
beyond their existing boundaries in new and excit- increase comes after applying the divided Cost beings like us. Their identity
ing ways for a Lhost that is uniquely theirs. increase from the Lhost Modification Package Table, does not terminate at the
so these increases are not divided. edge of their bodies. It is data
The process of customising an Lhost beyond these that travels from shell to
boundaries is many things — exciting, demanding, Maintenance: Some modifications can increase the shell, with dataspheres as its
complex— but it is rarely quick, affordable, or Maintenance cost of the Lhost. Unlike tariffs, there causeways, and the eternity the
easy to initiate. Finding someone who can tweak is no ceiling on Maintenance increases. Prototype sole frontier.”
an existing Lhost or create something entirely Lhosts can become prohibitively expensive to
-Intellectual Cheong Thye Sen,
new is an exacting process. Lhost models come keep running. Like Cost, Maintenance is divided
in a feature for News of the
standardised for good reason. Take away economies by the values indicated in the Lhost Modification State, Yu Jing’s weekly Maya
of scale, and suddenly even comparatively minor Package Table, and there are additional options news digest
adjustments can require esoteric parts, materials, that can reduce Maintenance costs. Note that these
and expertise to create. As such, the restriction, only apply to the Lhost itself. You can’t reduce the
tariffs, and maintenance costs of Custom Lhosts upkeep on your Powered Armour by cutting corners
can quickly escalate beyond their mass-fabricated on your Lhost.
counterparts. Such is the price of exotic demands. RARE VARIANTS
Not every Custom Lhost needs
Attribute Sum: If negative, the overall sum of the
be a made-to-order model.
Note: The Custom Lhost rules are only for creating Lhost’s attributes can modify its maintenance
These rules work just as well
new Lhosts. Anyone wishing to modify their cost. So if you increased Brawn by +2 ranks, but for smaller manufacturers, rare
existing Lhost needs to rely on Augmentations like decreased Willpower by −1 rank and Personality or exclusive variants of existing
anyone else. by −2 ranks, that would leave you with a net of −1 models, and other hard-to-
to your attributes. This then reduces your mainte- find Lhosts.
Restriction / Cost: Instead of each modification nance cost by −1.
having its own Restriction or Cost, the following
tables are used to determine the Restriction and MODIFICATIONS
Cost of a custom Lhost package, which is a bundle Add Trait: Trade-offs occur in the design process,
of modifications obtained and applied together. and users are often faced with a choice between
Given that a large portion of the expense is in performance compromises, or costly recurring
creating a system that works with itself fluidly, maintenance. When adding a trait related to the
purchasing several modifications as a large Lhost’s performance (such as Twitchy, Ponderous,
package is quite cost-effective compared to buying Uncanny Valley Girl, etc.) reduce the Lhost’s
individual after-market augmentations or finding Maintenance cost by −1, to a minimum of zero.
someone to modify your Lhost. However, the more The GM is the final arbiter on how many of these
specific the demands, the more difficult it is to Traits can usefully be applied to a given Lhost; 1–3
find someone ready, willing, and able to create the is standard.
Lhost in question.
Amphibious: The Lhost possesses gills or some
A modifiable Lhost base begins with a Restriction other function allowing it to breathe normally
CUSTOM LHOSTS
IN THE LIFEPATH
of 2, and Cost of 6+2§. It possesses the Inured to underwater. With the GM’s permission, you
Disease common special ability, but no other mod- can purchase a custom Lhost
ifications, just like the Standard Lhost. Choose the Cloned Lhost: Irrespective of any other modifica- during the Lifepath. Simply
options, total up their respective costs, and then tions, a body that feels “native” is always a welcome build your Lhost normally and
consult the Lhost Upgrade Package Table, below. The feature. Made from the user’s own DNA, Cloned assign it an LP cost equal to
total number of modifications will indicate both Lhosts reduce the difficulty of Discipline tests the higher of its Restriction
the total restriction for the modification package made to avoid Resurrection Dysmorphic Disorder or Maintenance Cost, to a
as well as a value to divide the Cost increase by by 2 (minimum 0). Note that no matter how much maximum of 5 LP. If its LP cost
would exceed 5, you may still
(rounding down) before adding it to the base Lhost, Antipodean DNA they incorporate, Lhosts are still
acquire the Lhost by paying
resulting in its final Cost. unable to transform: Dogfaces must choose one 2 Assets for each increment
form, and stick with it. past 5. (So, an Lhost with a
For example, an Lhost adding 4 modifications Maintenance Cost of 7 would
with a Cost increase of 4+1§, should divide that Cosmetic Augmentation X: As per the augmentation require 5 LP, and 4 Assets to
increase by 2, and increase the Restriction by +1. of the same name. Cosmetic modifications are acquire during the Lifepath.)
Add that Restriction modifier (+1) and the divided exponentially easier to integrate when working
Cost increase (2+0§) to the base Lhost, and use with a “blank slate” as opposed to modifying an
the new Restriction and Cost— 3 and 8+2§ in this existing body, natural or otherwise.
example — to acquire the Lhost.
Lhosts 79
Cube 2.0: The Lhost contains fully-integrated Cube Lhost. All models are Inured to Disease by virtue of
2.0 Architecture. Transitional therapy is included in their design. Additional resistances are significantly
the upkeep cost. more difficult to incorporate. GM approval is
required for Inured to X modifications.
INHUMAN CLONES Expert System 1/2: Adds Expert 1 or 2 to a single
Non-human Cloned Lhosts
skill. Multiple Expert systems are not cumulative Monstrous: ALEPH’s Precursor models represented
are extremely rare, requiring
with each other. Characters only benefit from the a breakthrough in Lhost technology. For the first
expensive custom facilities
just to get started. Given how highest rated Expert system for a given skill. time, truly massive hosts, on par with an Ariadnan
few non-humans are in the Dog-Warrior, were feasible for sheuts to inhabit.
Human Sphere—and how few Implanted {Equipment/Weapon]: A favourite The technology is still new, and difficult to come by,
of them could ever dream of of ALEPH functionaries, clandestine operatives, however. Monstrous Lhosts increase the difficulty
affording such luxuries—the and anyone else who simply can’t go without a of tests where great size or weight would be
infrastructure simply isn’t in particular item. As per the augmentation, and problematic by one step. Monstrous Lhosts are
place for these species to taken separately for each piece of implanted gear, not required to brace Unwieldy weapons and can
acquire a Cloned Lhost. Of the process is somewhat easier when working use two-handed weapons in one hand without
course, the Black Labs of Praxis
with a still-inert Lhost, as opposed to modifying a difficulty or penalty. They may spend 1 Momentum
will try anything if the price is
living host. to add Knockdown to all of their melee attacks for
right, though expect it to be
steep, and not just financially a turn. In addition, when purchasing augmentations
either Increase BTS: Increases BTS by +1, to a or gear meant to be worn such as armour, add +1
maximum of 3. to the item’s restriction and tariff rating. Gear that
is not acquired in this fashion causes the character
Increase Incidental Stress: Adds Resolve, Firewall, to suffer a +1 complication range to all skill tests.
or Vigour to the Lhost to a maximum of +3 per Tailoring gear to fit the Lhost requires a complex
incidental stress track. Tech test (D3, 4 Momentum, 2 failures).
PLAYTEST NOTE Increase/Decrease Attribute: Increases or decreases Night Vision: Whether through specially-grown
DUPLICATE a single attribute by +1 or −1. No single attribute felid eyes, extensive sensor suites, filtering different
ENTRIES can be increased or decreated by more than +/ −4 wavelengths of light, or some other method, this
Remember: Lhosts can only in this fashion. Lhost can pierce the deepest darkness with ease.
benefit from a single instance
Tests taken in an Lhost with this modification do
of a given Superhuman
Integrated Armour: Subdermal grafts for your Lhost. not increase in difficulty as a result of darkness.
Attribute or Expert System
modification; they don’t stack. Just like the augmentation of the same name, these
are purchased by-location. Even with a bespoke Proxy Host: A Posthuman favourite, characters with
Lhost, there’s still only room for one piece of the Quantronic Jump ability can move between
Integrated Armour per hit location; users wanting Proxy Hosts as a Free Action and perform Reactions
additional protection will have to suit up like from any Proxy they control. While limited to
everybody else. a single Minor and Standard action per round
as usual, they can pay for and use Swift Action
Inured to X: Functioning as the common special Momentum spends separately for each Proxy Host.
ability of the same name, resistance to particular
conditions are a common reason to order a custom Quantronic Connection: High-bandwidth immersion
in the Maya’s datasphere widens one’s perspective,
providing +2 Morale and Security Soak while
EXAMPLE: CUSTOM LHOSTS connected. Requires a Cube 2.0 or equivalent
Gonzales decides that he wants a new Lhost designed for combat. No existing Lhost to function.
is quite what he’s looking for, so he opts to look for a custom Lhost. He decides that
he wants an implanted Heavy Pistol and Superhuman Coordination 1, as well as Super-Jump: As per the augmentation of the same
Subdermal Armour on the entire Lhost. He’s a little nervous about Maintenance, so name, these usually involve xenobiological gene-
he adds the Decrease Attribute modification, reducing Personality by −1, giving him grafts or extensive hydraulics and allow their user
a negative Attribute Sum and reducing his Maintenance costs by the same amount. to vault over obstacles up to their height without
He decides that his battle-ready Lhost sacrifices some expressiveness in favour of a penalty, as well as enjoying −1 difficulty on skill
reinforced chassis. tests to move through difficult terrain.
That’s seven modifications; consulting the Lhost Upgrade Package Table, Gonzales Superhuman Attribute 1/2: As per the common
adds +2 to Restriction, and divides the Cost and Maintenance of his modifications special ability (see Infinity Corebook, p. 418), adds
by 2, giving the package a total cost of 4+3§, bringing it to 10+5§ and eliminating Superhuman Attribute 1 or 2 to a single attribute.
its Maintenance cost. He also accumulated quite a Tariff increase, with a total of T5. Multiple instances of Superhuman Attribute are not
Since Tariffs are capped at T3, he also adds 2+2§ to the Lhost, after its package cumulative with each other; characters only benefit
cost was divided. He notes the final Cost of his Lhost: 12+7§, Restriction 4, T3. from the highest instance.
80 Chapter 6
THE ROLEPLAYING GAME
Lhosts 81
CHAPTER 7
your coffee table or charm a In other words, geists grow with users.
Geists are LAIs, but they’re not True AIs. They don’t
motorcycle engine. I’m from
possess emotions, sapience, or even sentience;
Bakunin, seen it tried. Can’t be
done. Um, the engine, I mean.”
they’re just quantronic programs. Incredibly sophis- LIFELONG COMPANIONS
ticated programs, but programs nonetheless. Years
Corona Spinelli, freelance LAI of trial and error have made it abundantly clear The overwhelming majority of geists are acquired
expert. Failing to comfort that a cold, unfeeling, uncaring geist is worse than while their users are still children. This not only
a client’s distraught child, useless to its owner. Fortunes have been spent in acclimates the user to the idea of a quantronic
Concilium Prima. creating learning algorithms to accurately gauge companion at a young age, but it gives the geist time
a user’s mood. Larger fortunes have been spent in to dynamically grow with them. The child accepts a
dynamically simulating emotion, personality, and relatively simple companion, and a colourful, affable
empathy, and larger fortunes still have been made quantronic buddy doesn’t need to be terribly complex
by licensing this technology for use in modern geists. or interesting so long as it’s cute. The geist builds
confidence in its abilities as it’s not handling anything
The result of this is a quantronic companion that more arduous than keeping homework deadlines
feels as real as many of the user’s other relation- straight and reminding the child to brush their teeth.
NEW GEIST ships. Geists are incredibly complex pieces of
ACCLIMATION
software, but the degree of interactivity they offer Growing and evolving alongside their user is even
When a user installs an entirely
new geist on their system, they isn’t just the product of skilled engineering. It takes reflected in mannerisms appearances. Perhaps the
enter a period of New Geist time for a geist to learn what its user appreciates. magic cartoon unicorn with a rainbow mane and
Acclimation, or NGA. This serves
to increase the complication
range of their geist’s tasks
LET US NOW SET ASIDE CHILDISH THINGS
by 5 minus the greater of Sometimes, your geist grows up with you but ends up nothing like you expected. The singing cartoon
either the character’s Hacking dragon that delighted you in your youth may not reflect the sophisticated, composed persona you wish
or Psychology Focus. The to convey as an adult professional. For some, a chameleonic appearance suite isn’t enough either. The
complication range modifier
behaviour of their childhood friend is frankly too juvenile for their current life, so they acquire a new
then reduces at a rate of 1 per
geist to act as their domotic personal assistant.
week, which represents the user
and their new geist ironing out
all the kinks. But what becomes of their old geist?
While it’s not exactly suitable for resale, as it has already changed and adapted to its owner over the
course of years, a geist is still a sophisticated LAI. Many of the quantronic retainers available for hire
(see Infinity Corebook, p. 392) are orphaned geists, repurposed to serve some other purpose. And of
course, some simply decommission their childhood geists, though the process often proves far more
emotionally difficult than most anticipate —less like upgrading your software and more like euthanising
a beloved family pet.
Many people can’t bear to part with their childhood companions, and even the understanding that
they’re not truly sapient does little to dull the emotional attachment from the user’s side. More than
a few dignified professionals have an adorable old friend installed as the domotic manager of their
personal estate, waiting like an excitable puppy for its master to return home.
82 Chapter 7
THE ROLEPLAYING GAME
84 Chapter 7
THE ROLEPLAYING GAME
be immediately suspicious of an NPC that, for all Problem: None of the characters share a common
“You have a 1300 meeting
intents and purposes, lives in their head. language between them.
with Rolf Hamilton from
WarTechWorks regarding
As always, you should find what’s best for your Solution: Thanks to their geists’ LinguaLearn a partnership opportunity.
group. But, it’s recommended that you keep geists software, they can freely communicate with each You have a tentative second
on their owner’s side. And within that milieu, there’s other via real-time translation, even if they’re not date scheduled with Faiza
a lot of opportunity to further plots, hint at agendas, connected to Maya. How this particular group Assad at 1900, which you’ve
and otherwise convey the richness of the Infinity came by the proprietary software could be its own marked as ‘undecided,’ though
universe. Plenty of NPCs can make a player charac- plot hook. your window for plausible
ter’s life difficult; very few can make the GM’s life as cancelation is closing. Go-Go
easy as a geist can. Problem: There’s an important piece of infor- Marlene has a new episode
due to drop some point this
mation — a clue, a pivotal NPC, or key piece of
evening. Also, the man behind
POST-LIFEPATH TWEAKING context—that the players have missed. you has quickened his pace and
The Lifepath system creates nuanced, unique drawn a knife.”
individuals who each bring their own unique Solution: Whether the players skipped past a clue,
perspective to a situation. When you have a specific the GM just forgot to include something pivotal, or Rebekkah, Vizier geist. Providing
campaign in mind, however, you can wind up with a key fact has been forgotten for whatever reason, a timely update for her owner.
a group of fascinating characters that your group is having a character’s geist insert the information
excited to play but requires extra creativity to bring at an appropriate moment can be a great way to
them together as a cohesive unit. introduce the information. You can break decision
paralysis, reinforce a choice, or avoid a red herring
Maybe the characters don’t share a common that no one’s actually going to enjoy, all without
language between them or are lacking in the skills anyone feeling foolish or embarrassed.
they’re going to need for the type of campaign
you have planned. You could, and to some degree Problem: The planned campaign has a strong focus
should, alter your plans to fit the player characters. (such as espionage, military, etc.), but your players’
Each campaign is its own unique beast, with characters are lacking in the appropriate skills.
challenges and advantages unique to its group and PLAYTEST TIP
theme, with your player characters as the stars of Solution: Their sponsors, faction handlers, or
EXPERIENCE
the story. Then again, if everyone’s excited for your commanding officer certainly intend for this group POINT DISCOUNTS
espionage campaign, but the characters came out to succeed so their geists are outfitted with custom While the GM guide goes into
a little light on the Stealth skill, you could always learning suites. These help the characters quickly more detail on experience
introduce an XP discount on Stealth to encourage gain the skills they’ll need, which is then reflected points and modifying your
players to bulk up their infiltration skills. in the rules as an experience point discount on the game in general, a good
skills in question. starting point for an experience
But what where do geists fit in? point discount is to treat the
Problem: The characters have information or characters as though they had
one more level of Focus in
KEEPING EXPLANATIONS context that isn’t coming to the players’ mind, and
the desired skills, and tweak
IN-UNIVERSE things have stalled out.
from there.
Whether it’s a campaign premise, transitioning
disparate characters from the Lifepath into play, Solution: Probably the simplest and most classic
or just managing the flow of information during application in this list, having a characters’ geist
a session, GMs have a lot of extra background bring up pertinent information is a great way to
information to put into gameplay. The GM can convey relevant information without disrupting the
always just have these conversations with the other flow of a scene.
players — and for some topics, that’s absolutely the
correct answer — but there’s something satisfying There are countless ways to use characters’ geists
about having an in-universe explanation to create to smooth over bumps in your Infinity games; these
a feeling of immersion. are just a few. But if you’re looking for a way to
nudge the game in a certain direction, address
Fortunately, geists provide a ready-made conduit unexpected challenges, or just keep the pace
for reinforcing themes, introducing information, moving, geists provide an excellent tool.
or keeping the gameplay flowing naturally.
For example:
86 Chapter 7
THE ROLEPLAYING GAME
Roll 1d20 and consult the Starting Disposition Table, modifying your geist’s sheet as indicated.
88 Chapter 7
THE ROLEPLAYING GAME
Roll 1d20, and consult the Adaptation Table (see p. 89), noting the personality quirk and modifying your
geist’s character sheet as indicated.
ADAPTATION TABLE
D20 SITUATION PERSONALITY QUIRK ADAPTATION
1 You increasingly relied on your geist to sort complex data sets. Obsessive-Compulsive Geist gains +1 rank in Analysis.
2 Your geist spent most of its time searching dataspheres for you. Nosey Geist gains +1 rank in Education.
3 Your geist was kept busy with your social calendar. Gregarious to a Fault Geist gains +1 rank in Lifestyle.
4 Your geist paid close attention to your struggles. Doting Geist gains +1 in your lowest attribute.
You came to rely on your geist’s increasingly encyclopaedic SCIENCE HAS THE
5 Geist gains +3 ranks in Science, and -1 to its Agility and Brawn.
scientific knowledge so it focused on that. ANSWER
Your geist spent long nights listening to your problems and
6 Sympathetic Ear Geist gains +1 in Psychology.
learned to help.
7 You both clicked in the same areas. Mimic Geist gains +1 in your highest attribute.
8 Your geist learned to spot things you’d miss. Overbearing Geist gains +1 rank in Observation.
You are injury-prone to a humorous degree, and your geist learned
9 Mother Hen Geist gains +1 rank in Medicine.
how to deal with that.
10 Your geist decided that people were just… good. Impossibly Naïve Geist gains +1 in Personality, and -1 in Willpower.
Your geist decided that people were, with the exception of you,
11 Cynical Humour Geist gains +1 in Willpower, and -1 in Personality.
absolutely dreadful.
Over time, your geist handled most of your purchases and seemed Geist gains +1 in Personality, +1 rank in Lifestyle, and -1 in
12 Spendthrift
to enjoy doing so. Willpower.
When you got stranded on a spacewalk, your geist rushed to
13 Panic Prone Geist gains +1 rank in Extraplanetary.
acquire the requisite knowledge for you to survive.
You kept asking your geist for answers it didn’t have so it learned
14 Data Kleptomaniac Geist gains +3 ranks in Hacking, and -1 to its Willpower.
how to get them.
15 Your geist gets used to providing context. Over-Explainer Geist gains +1 rank in Education.
Often acting as a courier of bad news, your geist learns how to
16 Stubborn Geist gains +1 rank in Discipline.
hold its own in debate.
A safari gone wrong left you injured and your geist frantically
17 Overprotective Geist gains +3 ranks in Ballistics, and -1 to Willpower.
possessing a turret.
Your geist wound up slotting into heavy machinery on your behalf
18 Dutiful Geist gains +2 ranks in Athletics.
quite often.
You nurse a wild animal back to health; your geist ensures this
19 Environmental Advocate Geist gains +2 ranks in Animal Handling.
actually works out.
20 You and your geist solve a local mystery. Hard-Boiled Gumshoe Geist gains +2 ranks of Analysis.
Roll 1d20 and consult the Catalyst Table, noting any personality quirks, and modifying your geist’s character
sheet as indicated.
CATALYST TABLE
D20 ARCHETYPE EVENT PERSONALITY QUIRK EFFECT
You were good, but not great. Your geist endeavoured Geist gains +3 ranks in any of the user’s
1 Booster Geist Obsessive
to push you towards the latter. Signature skills.
You were nearly passed over for a promotion—until Geist gains +2 ranks in one of the user’s
2–4 Booster Geist Always Butting In
your geist chipped in. Signature skills.
After all these years, your geist has finally figured out Geist gains +1 rank in each of the user’s
5 Booster Geist Your Biggest Fan
what you like. Signature skills.
You were absolutely stumped. Then out of nowhere, Geist gains +3 ranks in a skill where the
6 Cover Geist Smug
your geist provided the answer. user has no ranks.
One offhand comment about replacing your geist,
Geist gains +2 ranks in a skill where the
7–9 Cover Geist and the next day, it had identified your professional Brutally Honest
user has no ranks.
weaknesses and made them its own strengths.
Stranded and in a bad way, your geist
Geist gains +1 rank to two of its lowest
10 Cover Geist hyper-accelerated its final evolution to get you both Martyr
attributes.
out.
A rapid series of seemingly unconnected calamities
11 Jackgeist left you shaken, and your geist scrambling to be Suspicious of Everything Geist gains +1 rank in three different skills.
ready for anything.
You’ve always had trouble making up your mind.
Geist gains +1 rank and the first talent in
12–14 Jackgeist Rather than help you do so, your geist decides to Spreads Itself too Thin
a skill.
facilitate everything.
Your employer prized versatility. You prized
Geist gains +1 rank in four different skills
15 Jackgeist promotions and bonuses. Your geist tried to make it Constant Meddling
where the user has a Focus of 0.
happen.
You made an offhand comment about the value of Geist gains +2 ranks and the first talent in
16 Kingfish Geist Unfortunate Literalist
specialists: now your geist swears by it. any skill based off their highest attribute.
Your geist has always exhorted you to reach your
Geist gains +4 ranks in any one skill based
17–18 Kingfish Geist potential, and it looks like it’s been taking that Hyper Competitive
off their highest attribute.
advice, too.
You wanted upgrades for your geist so it made a
19 Kingfish Geist No Self-Preservation Geist gains +1 in their highest attribute.
blueprint, and the two of you got to work.
Paranoid about anonymity, and seeking a Replace your existing geist with a stock
professional image, you retired your old pal and GemmaGeist. Roll on the Geist Personality
20 Jackgeist Tentative
picked up a GemmaGeist. What happened to your Table (p. 86) to determine its nature and
former geist? style.
90 Chapter 7
THE ROLEPLAYING GAME
CHAPTER 8
THEME
Setting a theme allows a GM to refer back to a core
principle that will ultimately connect and guide
a campaign or mission as it develops. Much like
an AI learns through action and response, themes
92 Chapter 8
THE ROLEPLAYING GAME
can alter and evolve as the mission or campaign define Steel Phalanx campaigns, GMs and their
progresses. They can help tie games together into players will need to make the choice as to which
a cohesive tale but shouldn’t be considered as set Aspects are available as PCs for the game. The
in stone or inviolate. Keeping in mind that ALEPH, choice of Aspect can also influence the mood and
action, and the EI are undeniably central to any theme, and vice versa. A campaign focussed around
Steel Phalanx operation, a GM can use common a troop of Thorakitai and their support arms mop- MOOD VS THEME
Although separate and distinct,
themes to interlink missions or influence cam- ping up in the wake of brutal Myrmidon assaults
moods and themes can and
paigns, which include: might lend itself well to the “War Is Hell” theme,
should be used to support
whilst a series of fast-paced missions involving each other, thereby providing a
ALEPH the Saviour: Although ALEPH has been said Myrmidons or their Homeridae champions more involving and rewarding
largely accepted as a benevolent guardian would be well suited to the “Jocular Panache” mood. experience for everyone
throughout the Human Sphere, there are still Of course, the choice of which Aspects to allow at involved. Some moods fit
those who mistrust its intentions and view it as the table will have effects that reach much farther naturally to themes— Sinister
nothing more than a variation of the EI. With the than the interconnecting webs of campaign and Oppression to War Is Hell, for
Paradiso front, ALEPH has the opportunity to prove mission design. instance—while others seem
its worth and hopefully win over the hearts and at odds. Changing the mood to
clash with the theme, however,
minds of its detractors. Every action the Assault STEEL PHALANX WARRIORS
will often provide memorable
Subsection undertakes, every sacrifice its Aspects Character creation for the AI Aspects that become moments that are talked about
make, is therefore not only critical to the sanctity members of the Steel Phalanx are included in for many sessions to come.
of the Human Sphere, but also crucial to its propa- Chapter 2: AI Characters of this book. Characters
ganda machine. created using the rules from this chapter will
already have an edge over their counterparts
Campaigns and missions that strive to imply “ALEPH from the Human Sphere, from advanced Lhosts
“There are not more than
the Saviour” as a theme should focus on high-pro- and enhanced development, to bleeding-edge
five primary colours, yet in
file operations that frequently bring the players into equipment and an entire cohort of equally skilled combination they produce more
contact with allied forces. Rescue missions, shoring and resilient comrades. To present a challenge, hues than can ever be seen.”
up shattered defences, providing tactical advice to campaigns and missions that accommodate the
prominent commanders, and rear-guard actions are warriors of the Steel Phalanx should be adjusted
just some of the missions that can be undertaken to upwards in danger levels. (Adjusting the difficulty
support the theme. Always with an Aoidoi on hand to cater for the Steel Phalanx, including the
to capture the moment, of course. Homeridae mentioned below, is discussed in more
depth on p. 100).
War Is Hell: Humanity’s history is liberally sprinkled
with confrontation and war, not one of them free THE HOMERIDAE
from the atrocities and the horrors that so sadly Whilst very definitely still considered to be
travel in their wake. Then came the Combined Army, warriors of the Steel Phalanx, the Homeridae —the
and the Human Sphere truly learned the meaning inner cabal of Achilles— have managed to single
of hell. Thankfully, the majority of humanity is
shielded from the vicious onslaught of the EI
due to the actions of the combined might of the
G5 nations and the guardian angels of the Steel
Phalanx. Even an angel’s glow can become dulled,
however, their temperament numbed when faced
with relentless battle and the sickening deeds of a
demonic foe.
MULTIPLE PERSONAS
In addition to the moods and themes that can help
94 Chapter 8
THE ROLEPLAYING GAME
pace and focus. Perhaps a wary general within the the line of retreat. The battle can continue and
Paradiso Coordinated Command needs some reas- develop in a series of thrusts and counterthrusts,
surance and persuasion to pull the trigger on the large scale skirmishes and focussed missions, until
Assault Subsection’s involvement, or maybe ALEPH a predetermined point is reached. “The greatest victory is that
has sanctioned some alternative training within a which requires no battle.”
VR suite designed to test the Aspect in non-combat WHERE AND WHEN
situations.
GMs need to consider where and when they are
LARGE SCALE CONFLICT going to place their Steel Phalanx campaign. Corvus
Belli’s Human Sphere and Paradiso Campaign source-
By keeping the main focus of the action on the books provide plenty of concerning the First and THINKING INSIDE
THE BOX
PCs’ level, the players will remain engaged and Second Paradiso Offensives. Unfortunately for the
Though they rarely do, the
maintain the feeling of involvement in a roleplay- Human Sphere, the Third Offensive has also recently Assault Subsection is also able
ing game rather a wargame. There is also merit enveloped the jungle planet. Any one of the three to draw upon its compatriots
in allowing the PCs to make decisions and order conflicts and the zones they encompass will provide within the Special Situations
troops on a larger tactical level. GMs might even opportunities and hotspots to run campaigns. Section at large, meaning they
use this as an opportunity to allow campaigns to have access to numberous
grow naturally, rather than to a predetermined WHEN specialist Aspects that provide
timescale and series of events. While the rules for When running historical campaigns, the results will support in situations requiring
large scale warfare won’t be covered in this source- largely be predetermined by current lore, but the their unique skills. Although
specialist Ekdromoi and
book (see Infinity Gamemaster’s Guide, p. 112 some players should still be able to feel as though their
Thorakitai can be well versed
guidance is provided on how to use them as a actions have an influence on the narrative in some
in Infowar, and the Sophists
means to drive campaigns forward between a set of way. Maybe the retreat covered in the previous are masters in Psywar amongst
smaller interlinked missions. This type of campaign paragraph happened during the final death knell of other things, they are relatively
will particularly suit the Homeridae, as they’ll be Ravensbrucke, with the PCs preventing a wholesale few and may not always be
able to direct the troops under their command and massacre as discussed. Though they might not available. If the group lacks a
pick the point at which their presence will have the be able to alter the course of history, the PCs can specialist in a certain arena,
most impact. shower themselves in glory whilst carrying out the loan them one from another
heroics that are still talked about today on the new source for the current mission
Consider the hasty PanOceanian retreat discussed front lines of Paradiso. (which could even be a non-
ALEPH faction if operating
previously. If placed in context, the retreat might
as part of a joint task force).
be happening as part of the Combined Army’s Though they involve a little more preparation and
Dasyus, Devas, Posthumans, and
vicious Third Offensive. The intervention of the planning, running campaigns and missions in cur- even the inhuman Danavas are
Myrmidon Army can mean the difference between rent or future timelines allows for the PCs’ actions just some of the troops on hand
disordered retreat and total massacre of both to provide a deeper impact on the unfolding narra- to provide focussed support.
military and civilian personnel. The GM presents tive. Also, the script isn’t generally known to anyone
the battle lines and opposing forces to the PCs, but the GM, so any number of twists and turns can
which covers the current known disposition of also be introduced. It is worth mentioning again
Combined Army units. Although the Shasvastii are here that the Steel Phalanx are only ever deployed
working hard to sow misinformation, Andromeda to the most critical situations. Small localised
and some of her Sophists are on hand to stifle their conflicts are left to the relevant troops already
plans and gather critical data. The GM and players in position — unless the conflict escalates into a ALTERNATIVE
then undertake large-scale Psywar against each critical hotspot that could affect the wider Paradiso TIMELINES
Official lore refers to the
other, with the GM providing false information if battlefront, of course.
timeline and events produced
the Shasvastii are successful or the players gaining for the Infinity skirmish game
additional information if they are. Morat vanguard WHERE and reproduced within Infinity
forces backed up by Raicho TAGs dominate the The planet Paradiso contains two large continents the Roleplaying Game. That
frontline, but the PCs have spotted the critical and a number of smaller islands. Both of the main doesn’t mean, however, that
juncture at the bridge retreat. Supported by Dakini continents currently have occupation zones under your own personal games need
and Garuda Tacbots, Ekdromoi and Myrmidon units the control of the Combined Army. Enemy patrols to follow the official timeline to
are sent to deal with the Morat threat, while the range across cities, mountains, and jungles, while the letter. An uncertain future in
PCs drop in to assult the EI Avatar, Fractaa, and vanguard forces constantly probe for weaknesses which the PCs’ actions can truly
Batroids closing in on the bridge crossing. Once across no-man’s land. The Steel Phalanx could have an impact will definitely
produce a buzz at the table.
the threat at the bridge is dealt with, the PCs can quite literally be — and are acutely prepared to be —
What if the PCs were able to
zoom back out to once again attend to the battle at deployed anywhere across Paradiso at a moment’s prevent the death of Odysseus
large, which continues until they spot a retreating notice. Creating a campaign or mission that takes during the evacuation of
PanOceanian command unit about to be over- place in the historical timeline might offer some Damburg? Might Damburg have
whelmed by a much superior Combined Army force. obvious choices as to where to place it. Creating a been ultimately spared too?
Saving the PanOceanian troops from destruction campaign in the current or future timeline offers
will also net the PCs a new unit to deploy across various possibilities concerning location.
96 Chapter 8
THE ROLEPLAYING GAME
into the enemy when all hope is lost would Optional Rule: The arrival or presence of the
rally even the most hopeless of soldiers. For the warriors of the Assault Subsection can often light
“You can be sure of succeeding
duration of the scenario, all friendly non-ALEPH fires in the hearts of lesser men, adding speed and
in your attacks if you only
units within the vicinity can reroll 1d20 on failed urgency to actions where there might have only attack positions which
Willpower tests and gain 1 bonus Momentum for been resignation and exhaustion. For the duration are undefended.”
any combat related skill tests. The new result must of the scenario, all friendly non-ALEPH units within
be accepted. the vicinity can reroll 1d20 on failed Pilot tests and
gain 1 bonus Momentum for Athletic tests.
ATTACK/DEFEND CHOKE POINT
Choke points act as funnels for advancing forces, DESTROY ENEMY COMMAND CHOKE OR
condensing an advancing front into tight confines It is well known that cutting the head from the TRANSIT,
and severely hampering the number of units that serpent will sew chaos amongst the enemy’s ranks. ASSET OR
can be brought to bear. While less of an issue on This is true even for the interconnected forces FORTIFICATION?
The only bridge within miles
the high-tech battlefields of the first century of the under the control of the Evolved Intelligence, even
across a wide river will clearly
New Calendar, choke points can still serve to lessen if the confusion is only a fleeting moment. Where act as a choke point as well
an army’s punch. Controlling mountain passes, the Combined Army is concerned, however, com- as a transit point for vehicles
valley floors, and fords can be key to maintaining mand personnel are also some of their toughest and troops. In addition, it’ll
mobility, which is a fact the enemy also knows troops which is why the Assault Subsection are most definitely be a critical
all too well. often tasked with headhunting command elements. asset to whichever side holds
The super-elite are sent in to do what they do best: it. To maintain control, the side
Optional Rule: The Myrmidon Army are a increase pandemonium and the body count. that holds the bridge is likely
highly mobile rapid response force with a deep to fortify it. With all these
understanding of tactical advantage and battle- Optional Rule: Training aboard the Elysium considered, is it a choke point,
transit point, critical asset,
field manoeuvrability. Members of the Assault platforms and nerves of Teseum enable the Assault
or fortified position? Take a
Subsection gain +1§ Cover Soak when using Subsection to face the worst and toughest horrors moment to consider why you’ve
cover within the close confines of this mission’s under the EI’s control. For the duration of the chosen the site for the mission,
choke point. scenario, all Steel Phalanx members of the mission pick the best fit, and don’t worry
gain +1§ Morale Soak and may reroll up to 3§ about the other semantics
ATTACK/DEFEND when making such a roll but must accept the too much.
FORTIFIED POSITION new results.
Attacking a fortified and well-defended position
isn’t for the faint-hearted. Defending one often DESTROY HEAVY ENEMY ARMOUR
require nerves of steel in the face of overwhelming TAGs are formidable foes that are certainly worthy of
enemy numbers. Fortunately, the Steel Phalanx are the baleful eyes of the warriors of the Steel Phalanx.
renowned for possessing balls made of Teseum. The Raicho Armoured Brigades and Shasvastii
Unfortunately, the G5 nations built their defensive Sphinx make particularly juicy targets for Achilles
positions well when trying to hold back the First and his cohorts. It’s considered an even better day
and Second Offensives, but still ended up ceding if one of the feared EI Avatars just happens to fall
them to the enemy. under their cross hairs, of course. No enemy is ever
too big, for there is nothing within the enemy’s
Optional Rule: The Steel Phalanx will never will- forces big enough to contend with the might of the
ingly surrender a position to the enemy, nor will Steel Phalanx.
they rest until they have cracked open any fortified
target they are assigned to. Members of the Assault Optional Rule: A mission to attack heavy armour is
Subsection gain +1§ Cover Soak when defending always sure to fire the blood and focus the mind of
a fortified position. Alternatively, when attacking the warriors assigned to the task. For the duration
a fortified position, their missile launchers and of the scenario, all Steel Phalanx members of the
similar weapons gain Piercing 1. (This also stacks mission gain +1§ to any melee and ranged attacks
with any Piercing quality already possessed by the made against enemy TAGs.
weapon or its ammunition.)
DISRUPT ENEMY COMMUNICATION
ATTACK/DEFEND TRANSIT POINT Communication is a critical part to any campaign.
Transit points allow forces to manoeuvre rapidly It allows the coordination of both assault and
and remain mobile. Roads, junctions, bridges, defence, which is essential across the highly
railway yards, and shipping ports are just some of mobile battlefields of the future. Disrupting
the many critical transit points that allow armed communication nodes will rapidly lead to disorder
forces to remain mobile. Holding these positions and confusion in the enemy’s ranks. Unfortunately,
and disrupting the enemy’s infrastructure can be much like transit points, communication nodes are
the key to victory. Because of this, they can often be also heavily defended for that very reason, and not
the most heavily defended of positions. just by conventional firepower either.
98 Chapter 8
THE ROLEPLAYING GAME
all Steel Phalanx members of the mission gain 1 adjusted by a similar amount to the original guide-
Momentum on their melee and ranged attacks. lines given here. And these recommendations are
“Move swift as the wind and
only for standard Steel Phalanx campaigns. If the
closely formed as the wood.
STALL ENEMY ADVANCE players are enjoying life as one of the Homeridae, Attack like the fire and be still
The Combined Army make brutal, relentless drastic adjustments can be made. As a minimum, as the mountain.”
advances that all too often tear through humanity’s GMs should consider beginning with two-and-a-
forces like a scythe through wheat. In such dire half to three times the amount of starting Heat and
moments, the only option the Paradiso Coordinated employing Nemesis level
Command have is to send their best into the fray opponents in pairs.
to stall the advance, allowing slower-moving rein- Achilles and his
forcements to come into play or routed friendlies
the opportunity to retreat. The Steel Phalanx are
proud of the fact that they have brought many
advances to a grinding halt even before reinforce-
ments have arrived and managed to reverse almost
as many as they’ve stopped.
STEEL
ONSLAUGHT
Some of the descriptive text concerning the Steel
Phalanx in this chapter might seem repetitive. The
soldiers of the Myrmidon Army are tough. They’re
indomitable. Elite. Lethal. This is by design rather
than accident. The Assault Subsection are all of
these things. Moreover, they also act with the
unshakeable belief that they embody all of these
characteristics. Both GMs and players will need to
make some adjustments in their games and play
styles to adjust to these evident truths.
100 Chapter 8
THE ROLEPLAYING GAME
NEMESIS
ACHILLES ACHILLES
Achilles, greatest warrior-son of Ancient Greece. ATTRIBUTES
Immortalised in the Iliad as the hero of the Trojan AGI AWA BRW COO INT PER WIL
War. Son of the water spirit, Thetis, and the king of 13 (+2) 12 (+2) 13 (+2) 13 (+2) 11 (+2) 11 (+2) 13 (+2)
the legendary Myrmidons, Peleus. Tutored by the ACHILLES THE
FIELDS OF EXPERTISE EVERLASTING
wise and noble centaur, Chiron, on the slopes of
Students of ancient history
Mount Pelion. Eternalised throughout history until Combat +5 1 Movement +3 3 Social +3 3
contest that Achilles’
once again reborn in humanity’s hour of need. Fortitude +3 3 Senses +3 3 Technical +2 2 immortality and weakness
DEFENCES were introduced with the many
In conceiving, initiating, and succeeding with retellings of his epic story.
Firewall 15 Resolve 18 Vigour 18
Project: Warrior, ALEPH effectively became king, ALEPH wasn’t interested in
queen, and tutor— or father, mother, and mentor— Security 3 Morale 6 Armour 5 true reflections of history or
to the greatest hero that ever lived. A force of ATTACKS: weak heels when designing
nature. An immortal reborn. • Myrmidon Xiphos: Melee, 3+11§, Unbalanced, Non-Hackable, her son. He would be immortal,
Parry 2, Piercing 2, Unforgiving 2, Vicious 1 undefeatable, and flawless. He
• MULTI Rifle: Range C/M, 3+8§, Burst 2/2, 2H, Expert 1, Medium truly is a demi-god amongst
Created using technology that even ALEPH con-
MULTI, MULTI Light Mod, Vicious 1 mortals, which his stats
siders experimental, Achilles’ biosynthetic Lhost intentionally reflect. Placing
body incorporates enhanced artificial musculature, • AP Mode (Secondary): Piercing 2
• Pistol: Range R/C, 3+7§, Burst 1, 1H, Vicious 1 him in the path of the PCs or
cybernetic micro-engine assisted joints, a skeletal introducing him as a continuous
structure of laminated calcium reinforced with GEAR: Powered Combat Armour (Exoskeleton 3, Kinematika), presence in an ongoing mission
TitaniumSupra®, a dual-control nervous system, Optical Disruption Device, Subdermal Grafts or campaign can be a sure
accelerated and improved by experimental wet- SPECIAL ABILITIES way to bring the game to a
ware, and subtle subdermal armour protection. The • Common Special Abilities: Fast Recovery (Firewall 1, swift end. Achilles has been
AI gave everything to its first and favoured son, and Resolve 1, Vigour 1), Keen Senses (Sight, Hearing, Smell), Night Vision, presented here to show case
Menacing 5, Superhuman Attributes (All 2). exactly what both ALEPH and
in so doing gave humanity their greatest champion.
• Bane of Troy: Achilles doesn’t need a weapon in his hands to be the game system’s rules are
considered a killing machine. Any weapon he does wield, however, capable of producing. Use him
Hewn from the stories of ancient Greece, Achilles becomes an extension of himself. He may reroll up to 5§ when sparingly as a tool to cajole and
personifies the god-like athleticism and beauty of making a close combat attack or ranged attack but must accept the chivvy the PCs but be extremely
the heroes of his age. A skilled commander and new results. Additionally, he pays one less Heat when using the Close wary of introducing him to any
tactician, many look up to him as an inspiration Combat skill to make Guard or Defence Reactions, to a minimum conflict— whether on the side
and wonder. There are just as many, of zero, while each point of Heat spent to gain additional dice for of the PCs or not.
however, who view him as arrogant a Close Combat test net two d20s, instead of one (max +3d20 still
and vain. Regardless, his confidence applies). Further, each point of Momentum spent to add Bonus
is born of the definite knowledge Damage following a Close Combat attack adds two points of damage
instead of one. Finally, he reduces the penalty for firing at a range
that Achilles and his Myrmidons
other than the weapon’s optimal range by one step (to a minimum
cannot, will not, be defeated. An avatar of zero).
of fury and glorious combat, war has • Confidence Bordering Arrogance: Some call him inspirational, others
become his bride, and he lusts for her arrogant. Regardless, when Achilles speaks, everyone listens. Achilles
relentlessly. generates 2 additional Momentum on social tests but increases the
Complication Range of such tests by 1.
• Inspirational Leadership: Whether they like him or not, Achilles’
presence bolsters morale and reinforces nerve. Achilles and any force
under his command may reroll one d20 when making a Command
or Discipline test but must accept the new result. Additionally, when
making a Resistance test, Achilles may reroll any dice that did not
generate a success on the initial roll but must accept the new results.
• Myrmidon Unity (5 Heat): The brothers and sisters of his unit are
always on hand with sword and hammer. For 5 Heat, Achilles may
summon a single member of the Myrmidons to battle by his side. The
Myrmidon appears using the normal rules for reinforcements (see
Infinity Corebook p. 34). Use the Myrmidon statistics on p. 104
• Stir the Blood (X Heat): Achilles’ physique, oratory, and prowess can
stir the meekest of hearts. As a Minor Action, he may spend up to 6
Heat to grant everyone under his command within Close range a
Morale Soak of X, where X is equal it the amount of Heat spent to
activate this ability.
• Undeniable Will: Achilles knows that he cannot and will not be
beaten. He possesses a Morale Soak of 6.
ALEPH ADVERSARIES
OVERSIGHT,
ELITE ELITE
102 Chapter 9
THE ROLEPLAYING GAME
NEMESIS ELITE
OUTLIERS REVENANT HIJACKER SVENGALI DOPPELGÄNGER
A vast and fractally-deep integration with the Unknown outside an obscure and inter- The shadowy reputation of Svengali’s one-AI
Human Sphere makes life easier and safer for mittently available Arachne datasphere mafia depends on its ability to reside across
ALEPH, but also provides innumerable attack and a Bureau Toth watchlist, Revenant multiple quantronic mediums and emerge
vectors. It is only as secure as its weakest Hijackers come from a variety of technical seemingly anywhere without warning.
access point. Out of fear, selfishness, or and political backgrounds but share two Doppelgängers are fragments of Svengali’s
malice, those defences are constantly tested things in common: they hate an individual criminal totality ghosting incredibly costly,
by factional agents and other less predicta- or organisation beyond all reason, and after self-modifying Lhosts that can duplicate vir-
ble threats, any of whom could be the black careful anonymous vetting by an unknown tually any target in order to impersonate or
swan that grinds ALEPH to a shuddering halt. party or parties, they disappear for nine replace them. Used selectively due to cost
months after travel to Human Edge. Each and rarity of Lhosts, Doppelgängers enable
TROOPER Revenant follows a similar MO. They stalk otherwise-impossible crimes of the con job,
ATEK SABOTEUR a victim via subtly suborned remotes, flood blackmail, and heist variety, often hiding in
their comlog with increasingly deranged plain sight for the perfect moment. Bureau
Nomad-sponsored Atek terrorists are a go-to demands, then attack with overwhelming Toth analysts believe at least a dozen are on
scapegoat thanks to the media influence of force using hijacked vehicles, remotes, TAGs, long-term assignment, doubtless in prepara-
the Ateks Out! movement, but this broad term or even weaponised domotics. tion for some sudden sinister act.
also covers factional covert actions, Ariadnan
anti-galactic independence militias, solitary ATTRIBUTES ATTRIBUTES
attackers radicalised by Arachne propaganda, AGI AWA BRW COO INT PER WIL AGI AWA BRW COO INT PER WIL
mercs looking for an easy cover, and anyone 10 11 7 13 12 7 10 9 9 6 7 9 12 11
else attacking ALEPH’s or Maya’s infrastruc-
ture. To avoid glamorising their exploits, FIELDS OF EXPERTISE FIELDS OF EXPERTISE
culprits are rarely identified. The term’s Combat +2 2 Movement +3 1 Social — — Combat +1 — Movement +2 1 Social +3 2
ambiguity, however, allows ALEPH’s media Fortitude +1 — Senses +2 1 Technical +5 3 Fortitude — — Senses +1 — Technical +1 1
outlets and Aodoi to dismiss those opposed
DEFENCES DEFENCES
to its influence as unhinged and dangerous
Firewall 17 Resolve 11 Vigour 8 Firewall 9 Resolve 11 Vigour 6
terrorists. Quiet investigation into the real
sources of sabotage occur out of public view. Security 3 Morale — Armour — Security 3 Morale 3 Armour 1
ATTACKS
ATTACKS
ATTRIBUTES • Revenant Neural Hacking Device: CLAW-3, SWORD-0, • Neural Hacking Device: CLAW-1, SWORD-1, SHIELD-1,
AGI AWA BRW COO INT PER WIL SHIELD-0, GADGET-3, IC-0; +3§ bonus damage GADGET-2, IC-2; +1§ bonus damage
• Phobetor Grenades: Area (Close), Biotech, Disposable, • Wetspike Augmentation: Melee, 1+4§ damage, Biotech,
9 7 9 8 7 7 9
Immobilising, Indiscriminate (Close), Nonlethal, Piercing 1, Subtle 3, Toxic 3
FIELDS OF EXPERTISE Speculative Fire, Stun, Thrown, Terrifying 3, Unsubtle GEAR: Fake ID 3, Implanted Breaking & Entering Kit
Combat +1 — Movement +1 — Social — — • Knife: Melee, 1+4 § damage, 1H, Concealed 1, with 6 Picks, Briefcase of Replacement Lhost Parts, MediKit
Non‑Hackable, Subtle 2, Thrown, Unforgiving 1
Fortitude — — Senses +1 — Technical +2 1 SPECIAL ABILITIES
GEAR: CLAW-1 Overlord, CLAW-3 Total Control, Fake ID • Beguiling: Doppelgängers gain 2 bonus momentum on
DEFENCES 3, GADGET-1 Fairy Dust, GADGET-2 Assisted Fire, GADGET-2 social tests and +1§ damage to Psywar attacks.
Firewall 4 Resolve 4 Vigour 5 Enhanced Reaction, GADGET-3 Agamemnon, Neural Shunts, • Deep Cover (3 Heat): The GM can reveal any NPC as a
Remote Presence Gear, Stealth Repeaters Svengali Doppelgänger by spending 3 Heat (2 in Nomad
Security — Morale — Armour 1
SPECIAL ABILITIES territory). Double the cost each time a Doppelgänger is
ATTACKS • Anomalous Augmentation: Revenants’ augmentations are revealed in the same adventure.
• Chain Rifle: Range C, 1+5§ damage, Burst 1, 2H, uniquely architected for their neurochemistry, providing • Overmind: Constant connection to Svengali’s distributed
Spread 1, Torrent, Vicious 1 Security Soak 3. datasphere provides a Morale and Security Soak of 3. If
• E/M Grenades: 2+4§ damage, 1H, E/M, Indiscriminate • Haunt: The Revenant receives a bonus 1d20 on Infowar unable to connect, the Doppelgänger loses these benefits.
(Close), Piercing 1, Speculative Fire, Thrown, Unsubtle attacks against remotes and Psywar attacks using • Protean Lhost: A full and complete record of a target’s
• Timed D-Charge: Explosive Charge, 2+6§ damage, 1H, remotes, and two bonus Momentum on a successful biometric data and medical history, a successful Medicine
Anti-Materiel 2, Disposable, Piercing 3, Spread 1, Unsubtle, attack. or Tech (D2) test over 48 hours, a MediKit and 2 doses
Vicious 2 • Vengeful Cascade: Revenants use multiple hijacked of painkillers allows the Doppelgänger to assume their
GEAR: Armoured Clothing with Chameleonwear, vectors. If a remote in the scene is under their control, appearance. An engineering waldo may also be required
Breaking & Entering kit, Fake ID 2, Second Skin Heat costs to summon additional remote reinforcements for particularly drastic transformations. Targets are
are reduced by 2 (minimum 1). specifically matched with Doppelgängers of similar size,
SPECIAL ABILITIES
shape, and gender. While there is nothing theoretically
• 60 Seconds to Nowhere, Baby: Saboteurs may
stopping a five-foot male Lhost impersonating a six-foot
reroll 1d20 when making a Tech test while placing or
female, this requires considerably longer than 48 hours of
using explosives, but must accept the new result.
facial and skeletal restructuring, melanin display updates,
• Linkdead Atek: Saboteurs ignore penalties from using
and matching of ocular specifics. Penetrating a disguise
items in “dumb mode” but cannot use items with the
requires close examination or interaction and a successful
comms quality (except comlogs).
Psychology or Analysis (D3) test.
104 Chapter 9
THE ROLEPLAYING GAME
ANA QR (POSTHUMAN)
Quality Reassurance specialist Ana’s APPEARANCE
quantronic feed transmitted a file. Recently,
there were several breaches to the system Ana is beautiful young woman who
including a series of poems criticizing ignores all the chaos around her in
ALEPH's approach to the Paradiso conflict. confident strides, always in charge of the
This was cause enough for the removal and situation. Her hair is almost white and
recalibration of the subject. the only thing in a non-neutral colour on
Instead of the usual tactic for a job of her is a red flower adorning her hair. Her
this magnitude, explosives, Ana relocated skin is quite pale, and her big grey eyes
to Valkenswijk where the target’s Myrmidon stare coldly as if analysing all around her.
unit was stationed in order to use the
Orbital Elevator, jumping through her Lhosts ROLEPLAYING
until she managed to “accidentally” run into
her objective: Teofilo the Aoidos. She played • Has a piercing, cold stare.
the damsel in distress and, true to the • She very rarely smiles.
Myrmidon nature, the Teofilo couldn't help • She sometimes has problems with
to play the part of knight in shining armour. morally ambiguous decisions.
TEÓFILO H The following days had been amusing.
This elite soldier/poet awkwardly showered BACKGROUND
NEMESIS her with attentions, like soldiers on leave
tend to do. She in turn pretended to be Ana was born into a wealthy and
ANA QR
enamoured by his confidence, strength, and influential family of Concilium. She was
ATTRIBUTES protectiveness. During the evenings, Teofilo transferred into a Bodhisattva Lhost as
AGI AWA BRW COO INT PER WIL often spoke about the collateral damage in her first reincarnation after being a col-
9 (+1) 10 (+1) 9 (+1) 9 11 (+1) 10 12 (+1) civilians and troop lives used as bait and lateral victim of an assassination attempt
cannon fodder. This, apparently, was the while in vacation in Acontecimento.
FIELDS OF EXPERTISE source of his questionable ideas. Once she adjusted to her new existence,
Combat +3 1 Movement +2 1 Social +3 3 While the tactics were solid and brought she eagerly got involved as part of the
Fortitude +1 — Senses +2 1 Technical +2 1 the Human Sphere resounding victories, the SSS instead of the expected diplomatic
casual disregard for innocent lives had the corps of ALEPH.
DEFENCES
young warrior confused and targeted for Her conscience transferal and the last
Firewall 14 Resolve 14 Vigour 11
removal. In the few hours she had spent memories of her demise transformed her
Security — Morale 2 Armour 1 with his fiery disposition, she couldn't help into a daring operative, calculating and
ATTACKS
but question the choice of tactics as well… dangerous, showing a primitive predatory
• Assault Hacking Device: CLAW-3, SWORD-0, SHIELD-0, Shaking her head, Ana dispelled instinct. Without the moral bindings
GADGET-0, IC-1, +3§ bonus damage the memory of the soldier's passionate of society as part of the AI, Ana quickly
• Nanopulser: Range C, 2+7§ damage, 1H, Biotech, discourse about the brutality of the war became an implacable asset for ALEPH.
Subtle 3, Torrent, Vicious 2 and jumped to her secondary host: she Her missions have taken her all over
• Teseum Chopper: Melee, 1+7§ damage, Unbalanced, was already in position. If everything went the Human Sphere, usually using the
Non-Hackable, Piercing 4, Vicious 2 well, Ana would not need the secondary body of a beautiful woman, tracking and
GEAR: Thermo-Optic Camouflage, Proxy Mk.2 i-Lhost host as backup, but once again, this was removing threats to the stability of the
SPECIAL ABILITIES a Myrmidon, the elite infantry of the Sphere. Lately, her assignments have
• Common Special Abilities: Fast Recovery (Vigour) 1, Keen Human Sphere and she had to be ready been on Paradiso and Svalarheima where
Senses (Hearing, Sight, Smell), Night Vision, Quantronic for anything. clearly some kind of turmoil is taking
Jump, Superhuman Agility 1, Superhuman Awareness 1, Jumping back to her main body, she place. Whether she has kept her amoral
Superhuman Brawn 1, Superhuman Intelligence 1, adjusted her dress one last time, concealed code of conduct or whether her human
Superhuman Willpower 1 her Teseum Chopper within easy reach, and feelings are coming back after witnessing
• Connected: Constant datasphere connection grants a left to meet her paramour one last time. so much suffering is something she keeps
Morale Soak of 2. (Negated if disconnected.)
As she approached her rendezvous she to herself.
• Star-Crossed: In scenes with Teofilo, Ana loses any Morale
Soak but deals +3§ damage on any attacks against him.
pondered all the circumstances that lead
• Target Acquired (1 Heat, NR): By spending 1 Heat, Ana can her to this place and this assignment. For
take the Exploit Action as a Free Action before attacking. the first time in many years, she wasn't
NOTES: Ana tends to keep at least one Proxy Lhost
enjoying herself.
nearby when on assignment. This worried her. For her own good,
Ana thought, this had to be the last
time they met.
106 Chapter 9
THE ROLEPLAYING GAME
PYRRHUS (MYRMIDON)
“Bardas, Dionysios, and Demetrios, APPEARANCE
grenades!”
The soldiers threw the smoke grenades Standing out from his unit, this officer
and leapt into battle as a unit towards wears the rare Genesis colour scheme on
the enemy lines. Several metres beyond, his armour, marking him as a first-gener-
the alien droids, bio-engineered by the ation Myrmidon. His scarred face testifies
Evolved Intelligence, stood in formation to this and the fact that he is not a
vomiting plasma fire on the whole front. recent reincarnation. He talks quietly but
The Myrmidons ran under cover of chemical passionately, and his eyes burn with an
smoke, their silhouettes vibrating and dis- intensity that speaks of war and violence.
appearing every time a plasma bolt flashed
near them, proving the usefulness of the ROLEPLAYING
optical disruptors.
“The Ekdromoi need our support if they • Talks softly unless in combat where
are to survive this time! Let us show the he shouts all the time, haranguing
invaders how thirsty our blades are!” his troops.
As Pyrrhus, Myrmidon officer, harangued • He always talks using military and
ERIK REIERSEN his four-man Enomotarchos unit, Dionysios battle metaphors.
took a plasma blast full in the chest. The • As all Myrmidons he is constantly
NEMESIS Myrmidons ignored this and charged in bragging about his military prowess
silence, closing in with the alien Batroids. (rightly so).
PYRRHUS
Pyrrhus heard their hateful screeching as
ATTRIBUTES the nearest alien tried to adjust its plasma BACKGROUND
AGI AWA BRW COO INT PER WIL carbine, but Pyrrhus was upon him and
11 (+2) 9 11 (+1) 11 8 8 10 (+1) deftly cleaved the alien while his remaining Pyrrhus is currently one of the squad
men cut down two more of the invaders. officers of the now-diminished original
FIELDS OF EXPERTISE There were two drones left aiming their regiment deployed in Paradiso to face the
Combat +4 4 Movement +1 1 Social +2 1 weapons when one was blown in half by a Combined Army. Composed of the most
Fortitude +2 2 Senses +1 1 Technical +1 — burst of shrapnel discharged at close range experienced Myrmidons in the SSS, they
from its rear-guard. The surviving alien hes- usually deploy alongside Achilles, which
DEFENCES
itated for a scant fraction of a second before also means they execute some of the
Firewall 9 Resolve 13 Vigour 14
being cut down by the Myrmidons. most difficult and dangerous missions in
Security — Morale — Armour 2 “Brother Pyrrhus! You arrive just in the the Paradiso theatre.
nick of time! Another minute and the aliens Differing from the stereotypical
ATTACKS
• Teseum Chopper: Melee, 1+8§ damage, Unbalanced, would have overwhelmed us!” Myrmidon psyche, Pyrrhus managed to
Non-Hackable, Piercing 4, Vicious 2 Gregorios, of the Ekdromoi, nursed a place duty and the mission´s objective
• Boarding Shotgun: Range R/C, 1+6§ damage, Burst 1, wounded shoulder and carried a smoking slightly before glory in the battlefield.
1H, Vicious 1 Chain Rifle. He approached Pyrrhus who This made him a valuable asset in
GEAR: Light Combat Armour, Optical Disruption Device, quickly appraised the situation. the impetuous regiment where a lev-
Smoke Grenades “It seems the aliens have received rein- el-headed squad leader is necessary to
SPECIAL ABILITIES forcements. Is this true, Gregorios?” balance Achilles’s influence.
• Common Special Abilities: Superhuman Agility 2, “Aye! As soon as we stablished a bridge
Superhuman Brawn 1, Superhuman Willpower 1 head, they hit us with all they got. These
• Pyrrhic Victory: Pyrrhus has learned from his historical drones are not alone, they have leader—”
namesake: those who face him will pay in blood. He does A burning flash obliterated the Ekdromoi,
not pay Heat to use the Retaliate or Return Fire Reactions. making the Myrmidons hit the ground
• This is When the Poets Sing (2 or 4 Heat): A veteran of for cover.
the Paradiso conflict, Pyrrhus has wrestled with horrors Out of the smoke and fog came a
and lived to tell the tale. By spending 2 Heat, he can
foreboding silhouette, huge and menacing.
grant +2§ Morale Soak to himself and all allies within
A Charontid. It surveyed the battlefield and
Close range until the start of his next turn. He can affect
one additional zone in this fashion by spending an focused on the rising myrmidons.
additional 2 Heat, limited by line of sight. “Brothers! This is when the poets sing
about us! Follow me to glory and victory or
to Tartarus and eternal darkness!” Pyrrhus
drew his sword and charged the alien
monstrosity.
108 Chapter 9
THE ROLEPLAYING GAME
ATROPOS (POSTHUMAN)
The two men were trying their best to APPEARANCE
pass unnoticed among the crowds but there
was no way they could fool Atropos with Atropos has a pale complexion and a cold
their clothes. The imitation rags would personality. Wrapped in his trademark
appear as authentic to anyone, but to his cloak, he regards all people as if he were
enhanced optics, those synthetic fibres in an aquarium looking at fishes.
simply screamed Nomad impersonators.
The Nomad agents were clearly trying ROLEPLAYING
to install repeaters for the illegal network
Arachne, a common practice in all locations • He talks in a low voice, almost
where a Nomad commercial missions. whispering.
Atropos had already located the Nomad • He investigates the personal files of
repeater the day before and sabotaged it, every person he meets and talks about
making sure that operatives would come it constantly.
out to repair it. • He never uses the word kill or
Sure enough, two men strode toward the death instead using “thread of life”
repeater: one a technician, the other his metaphors.
JUAN JOSÉ MARTÍNEZ DE LA TORRE security. It was unusual to commission such
a specialised agent as Atropos to eliminate BACKGROUND
NEMESIS low level targets like the technician and his
bodyguard, but if the AI had signalled them The universe has laws that are inevitable,
ATROPOS
for deleting, that only meant they were a and that gives meaning and stability to
ATTRIBUTES threat to the Human Sphere. all of reality. No-one is outside these cer-
AGI AWA BRW COO INT PER WIL The men were nervous, Atropos could tainties, not the alien menace, nor ALEPH,
12 13 (+2) 9 (+1) 10 9 8 9 tell from their body language. He hurried, and certainly not humanity.
carefully measuring his timing and walk so In a time where quantronic technolo-
FIELDS OF EXPERTISE he ran into the men exiting the building gies allow humans to sidestep sickness
Combat +3 3 Movement +1 — Social +1 1 after they had repaired the repeaters. and decay, it would seem that the deter-
Fortitude +1 — Senses +5 3 Technical +1 1 One of the targets came out into the ministic laws have been proved wrong
street, alone. Atropos activated his weapon or at least beaten. That death is only one
DEFENCES
and approached his victim. minor inconvenience for humanity.
Firewall 10 Resolve 10 Vigour 11
Two men accidentally collided in front of This is where the people of the Human
Security — Morale 2 Armour 3 the Fulcrum Communications building. One Sphere are wrong, everyone has their
ATTACKS of them, dressed in elegant clothes of an time counted and everyone, sooner or
• Assault Pistol: Range R/C, 1+9§ damage, Burst 3, important executive, caught the other man later (from the Ateks to the highest-level
Unbalanced, Vicious 1 before he fell to the ground. The stranger O-12 functionary) has their threads
• Hacking Device: CLAW-1, SWORD-1 (SWORD-1 Slasher), coughed, apologised to the startled busi- of life cut.
SHIELD-1, GADGET-3 (GADGET-3 Agamemnon), IC-1 nessman, and went on his way. Atropos is one such tool, focused on
• Nanopulser: Range C, 2+7§ damage, 1H, Biotech, The confused target started to heave and reminding ALEPH´s enemies of their own
Subtle 3, Torrent, Vicious 2
cough. Atropos picked up the pace. He had mortality as Fate’s scissors.
GEAR: Armoured Clothing, Chameleonwear to reach the safe house before his Lhost
SPECIAL ABILITIES failed from the contamination due to the
• Common Special Abilities: Fast Recovery (Firewall) viral capsule lodged in his teeth. The public
1, Keen Senses (Hearing, Sight, Smell), Night Vision, had to be unaware of the Posthumans
Menacing 2, Quantronic Jump, Superhuman Awareness 2, carrying out assassinations in the streets.
Superhuman Brawn 1
After reporting his mission, he would wait
• Connected: Atropos’ constant connection to the
for a new body to be activated.
datasphere widens his perspective, granting a Morale
Soak of 2. If he is unable to connect to the datasphere, he The failure of the technician to show in
loses these benefits. time with his partner was a minor setback.
• Sundered Threads (1 Heat): Eventually, everyone’s thread No one escaped from their fate, and Atropos
is cut. Atropos can spend 1 Heat to add the Grievous made sure no enemy of the AI ever did.
quality to an attack.
• Threads of Fate: Today’s ally might be tomorrow’s target,
so Atropos stays well-informed on those he meets. When
making an Analysis or Education test, he can reroll 1d20,
but must accept the new result.
INDEX
Achilles���������������������������������������������������������50, 101 GemmaGeist��������������������������������������������������������� 67 SHIELD-3 AECM�������������������������������������������������� 70
Active Defences�������������������������������������������������� 33 Ghosting���������������������������������������������������������������� 24 Singular AI International Law���������������������������5
Aditya i-Lhost [Attribute]��������������������������������� 66 Gods of War��������������������������������������������������������100 Singularity���������������������������������������������������������������5
Agora Suite����������������������������������������������������������� 66 Halos���������������������������������������������������������������������� 22 Skaði Lhost����������������������������������������������������������� 70
AI Characters����������������������������������������������� 44–64 Reading������������������������������������������������������������ 23 Smart Grenade Launcher��������������������������������� 70
Ajax the Great������������������������������������������������������ 51 Haqqislam����������������������������������������������������� 13–14 Smart MULTI Pistol�������������������������������������������� 70
ALEPH���������������������������������������������������������������4–18 Hephaestus Black����������������������������������������������� 17 Smart MULTI Sniper Rifle�������������������������������� 70
Characters����������������������������������������������� 35–43 Hoplite������������������������������������������������������������������� 33 Smart Taxi������������������������������������������������������������� 70
Flux����������������������������������������������������������������������7 IC-1 Screwtape���������������������������������������������������� 67 Sole AI Bill���������������������������������������������������������������5
Genesis���������������������������������������������������������������5 Indra����������������������������������������������������������������������� 66 Sophotect Armour���������������������������������������������� 70
Influence������������������������������������������������������������6 Intrasystem Signal Delay��������������������������������� 29 Sophotects������������������������������������������������������������ 16
Reactions�����������������������������������������������������������8 Jackgeists�������������������������������������������������������������� 83 Special Situations Section����������������������5, 9, 17
The Aoidoi���������������������������������������������������������������8 Karkata Remote�������������������������������������������������� 67 Steel Core������������������������������������������������������������� 91
Aoidoi Apparel����������������������������������������������������� 67 Kingfish Geists���������������������������������������������������� 83 The Steel Phalanx���������������������������������������������� 45
Aoidoi Aspect�����������������������������������������������������104 L-gland������������������������������������������������������������������� 68 Svengali����������������������������������������������������������������� 17
Arachne����������������������������������������������������������������� 17 Lhosts������������������������������������������������������ 65, 74–82 Svengali Doppelgänger����������������������������������103
Ariadna������������������������������������������������������������������ 13 Custom����������������������������������������������������� 78–80 Tattletale Grenade��������������������������������������������� 71
Ariadnan Modifications����������������������������������������� 79–80 Theatre of Operations�������������������������������������� 94
Characters������������������������������������������������������� 86 Li-Turing Kit��������������������������������������������������������� 68 The Steel Phalanx
Aspects������������������������������������������������������������������ 44 Ma’at Admin�������������������������������������������������������102 Campaigns��������������������������������������������91–101
Assault Sub-section������������������������������������������� 18 Maya��������������������������������������������������������������������������8 Tohaa�������������������������������������������������������������� 14–15
Asuras���������������������������������������������������������������15, 47 Meme-Tagging����������������������������������������������������� 24 Tunguska Interventor��������������������������������������104
Atek Saboteur����������������������������������������������������103 Meme-Virii (M-V)������������������������������������������������ 66 UPGRADE Flashsocket�������������������������������������� 71
Augmented Reality�������������������������������������������� 21 Mesh Network����������������������������������������������������� 26 UPGRADE Idaho�������������������������������������������������� 71
Avicenna���������������������������������������������������������������� 51 Metatron���������������������������������������������������������������� 30 UPGRADE Null����������������������������������������������������� 71
Bocce Grenade���������������������������������������������������� 66 Minelayer�������������������������������������������������������������� 34 Vel Ammo�������������������������������������������������������������� 71
Bodhisattva Lhost [Attribute]������������������������� 66 Momentum Spends�������������������������������������������� 32 Vertexpert Journal���������������������������������������������� 71
Booster Geists����������������������������������������������������� 83 Mother-Forge������������������������������������������������������ 68 Virtual Servers����������������������������������������������������� 76
Casemod���������������������������������������������������������������� 66 Multithreaded Consciousness Adaptation� 68 The Well�������������������������������������������������������������������8
CLAW-3 Sparrowfall������������������������������������������ 66 Myrmidon������������������������������������������������������������104 XOFF����������������������������������������������������������������������� 71
Clouds�������������������������������������������������������������������� 22 Myrmidon Wars��������������������������������������������������� 47 Yu Jing������������������������������������������������������������ 12–13
Comlog������������������������������������������������������������������� 20 Nannie-Pump������������������������������������������������������� 68
Actions������������������������������������������������������������� 20 Nannies������������������������������������������������������������������ 68
Hacking����������������������������������������������������������� 21 Nomads����������������������������������������������������������������� 14
Cover Geists��������������������������������������������������������� 83 Nomad Tactical Hackers����������������������������������� 17
Cryptography������������������������������������������������������� 31 Panoceania��������������������������������������������������� 11–12
Cube Banks����������������������������������������������������������� 76 Paragon Lhost����������������������������������������������������� 69
Cubes���������������������������������������������������������������������� 74 Posthumans���������������������������������������������������������� 16
Daˇraˇo������������������������������������������������������������������ 30 Project: Toth������������������������������������������������������������5
Dasyus�������������������������������������������������������������������� 15 Prowler������������������������������������������������������������������ 34
Dataspheres Proxy Mk.0-5 i-Lhosts��������������������������������������� 69
Mapping���������������������������������������������������������� 26 Ptah Engineer����������������������������������������������������102
Decryption������������������������������������������������������������ 32 Quantronic ID������������������������������������������������������ 23
Dǎrǎo���������������������������������������������������������������������� 15 Quantronic Security������������������������������������������� 33
Domotics��������������������������������������������������������������� 23 Quantronic Stealth�������������������������������������������� 34
Doorman��������������������������������������������������������������� 33 Recreation Garb�������������������������������������������������� 69
Encryption������������������������������������������������������������ 31 Recreations����������������������������������������������������������� 49
The Evolved Intelligence������������������������� 17–18 Resurrection Cake���������������������������������������������� 69
Flammenspeer���������������������������������������������������� 67 Revenant Hijacker��������������������������������������������103
GADGET-3 Agamemnon������������������������������������ 67 Rogue Ais�������������������������������������������������������� 17, 47
Garuda Tacbot����������������������������������������������������� 16 Second Skin���������������������������������������������������������� 69
GeePal Remote X������������������������������������������������ 67 Security Network������������������������������������������������ 27
Geists�������������������������������������������������������������� 82–90 Sentry��������������������������������������������������������������������� 34
Characters����������������������������������������������� 86–90 SHIELD-2 Khonsu����������������������������������������������� 69
110 Infinity