Site B - Attack/Defend Scenario
Administrator Jayanti
The Evolved Intelligence has taken our bait, Commander. Their dropships de-orbit on the secure complex as we speak, and the Coalition Navy reports unusual orbital movement over the site. Your colleagues on the ground are going to endure much suffering to sell this ruse.
However, it is important that we keep the ruse from sliding into an actual catastrophe. While we must regretfully cede ground to the enemy, it cannot be to the degree where they see us as a trivial foe whom they can rob without consequence. They must learn that attacking us has a price, lest they be emboldened and reach greedily for more.
This is not mere idle philosophy, Commander. Already the Evolved Intelligence has foreseen its victory, and assumes to claim further prizes. While its heavy forces descend on the contraband, an infiltration team has just tripped alarms at the Airavata data hub in the heart of Silvania. This is bold even for the Combined Army-- Airavata is no mere routing node. One third of all Maya traffic and half of all ALEPH processing on Paradiso passes through here. ALEPH's tracking of the Evolved Intelligence's intrusion into Maya hinted that it had some interest in the site, but we never guessed that it would attack such a well-fortified hub so brazenly.
It is unclear what the Intelligence aims to accomplish once inside Airavata, but several alarming possibilities exist. The facility is a control hub for Ghost-linked remotes on the entire Norstralian continent, as well as a data repository for trillions of Maya termi
This infiltration indicates an alarmingly cavalier level of confidence in our foe. If it believes itself free to divert resources from its primary goal to casually harass our informational infrastructure, that tells us that we are already losing credibility in its eyes as a foe.
Special: Achievement of mission objectives during the mega-battle directly awards League Points.
A hacker within a Fulcrum has access to the Puppeteer program, which enables possession of Defensive Turrets. Two can be possessed at once if they are placed within 12" of each other.
While controlling a Fulcrum, a Hacker's BTS becomes 9, and it gains access to a number of special Hacking Programs, which are listed in the appendix at the bottom of the scenario description.
| REM (Hackable) |
Adhesive Turret | ||||
| BS | WIP | STR | ARM | BTS | |
| 11 | 13 | 1 | 3 | 3 | |
| Abilities: | Total Reaction, G:Remote Presence | ||||
| Equipment: | 360 Visor, Multispectral Visor Lv.1 | ||||
| Weapons: | Adhesive Carbine*, Electric Pulse | ||||
| Special |
Adhesive Carbine |
||||
| DMG | Burst | Ammo | Properties | ||
| - | 2 | Adhesive | Non-Lethal | ||
| 0-8 | 8-16 | 16-24 | 24-32 | 32-48 | |
| +6 | 0 | -3 | - | - | |
| REM (Hackable) |
Ghost Turret | ||||
| BS | WIP | STR | ARM | BTS | |
| 11 | 13 | 1 | 1 | 6 | |
| Abilities: | G:Remote Presence | ||||
| Equipment: | 360 Visor, Automated Hacking Device, ODD | ||||
| Weapons: | Electric Pulse | ||||
| Special: |
Automated Hacking Device: This model's Hacking Device has access to the following programs:
|
||||
Sentry Turrets begin the game friendly to the Defending Player. They do not receive an Active Turn, but may perform AROs against enemy models.
GADGET-3
Attack, CLAW-3
Attack, GADGET-3
GADGET-3
SHIELD-3