Site E - Balanced Scenario
Col. Edgar Dunstan
I know this is a bit below your pay grade, Commander, but I want to send you down to Syldavia to lend a hand to the local PD. They've been getting reports of unusual activity for almost a week-- nothing conclusive, but worth paying attention to-- and then last night some poor schlub working security in the suburbs ran across a cluster of fucking Morats climbing out of a sewer grate. The guy somehow managed to call for help before the monkeys turned him into a smear, and local Auxilia were called in to clean out the intruders, but obviously we're not assuming the hairy bastards just got lost. Something's up.
We sent a Hexaedron scanning team to sweep the sewers, and they found indications that the critters've been using them as a viaduct for a while now. The scanning crew are still looking for clusters that may have slipped through previously, but they aren't really equipped to handle anything they might find. I want your squad on-hand in case they do turn anything up.
Oh, and mind the scenery. It's a pretty nice neighborhood and Command doesn't want to piss off the taxpayers any more than necessary.
or
A Control Zone is considered Dominated by a player if he has more Army Points than the adversary inside the Zone. Only troops considered as miniatures, Markers, or Seed Embryos count, as well as AI Beacons, Proxies, and G:Servant Remotes. Those troops in Null state will not be counted. Those Markers representing weapons or pieces of equipment (like Mines or Deployable Repeaters), fake Holoechoes, and any Marker that does not represent a trooper will not be counter either.
Players will consider a trooper inside a Control Zone when more than half of the trooper's base is inside that Zone.
| LI (Hackable) |
Fugitive Hacker | ||||||||
| MOV | CC | BS | PH | WIP | ARM | BTS | W | S | |
| 4-4 | 13 | 10 | 10 | 14 | 0 | 0 | 1 | 2 | |
| Abilities: | Limited Camouflage | ||||||||
| Equipment: | Assault Hacking Device | ||||||||
| Weapons: | Pistol | ||||||||
At the end of each Turn, unless the Hacker is in base contact with an enemy model*, she will attempt a WIP roll to disappear with her stealth field, opposed by a Discover roll from any enemy model with LoF to her. If she succeeds, the hacker is replaced by a Camouflage marker which is placed 8" away in a direction determined by the dispersion template (though she will not enter any player's Deployment Zone).
* NOTE: Remember that a marker cannot be in base contact with a model, so this requires the Hacker to first be Discovered.
At the end of the game, a player Captures the Fugitive Hacker if he is the only player with a model in base contact with her. Any player who Captures the Fugitive Hacker will secure the Portable Stealth Field Campaign Award for his faction.
The Portable Stealth Field is a reusable resource that may be used by the faction that secures it for the remainder of the campaign. Each round when assigning players to Mission Sites, this resource may be allocated to one Site to assist the allied player fighting there.
Benefit: One friendly model at the chosen Site gains Limited Camouflage during deployment and the first Game Round. This state expires at the end of the first Game Round if the model has not left the Camouflage state by that point.