Site B - Attack/Defend Scenario
Noctifer-Agent Keeskreet
This whole distasteful mess will soon be over, Commander. I have just been given the order to organize the final and most crucial step in the Unfolding Intellect's great scheme, and because you have proven your worth as a subtle operator, I have recommended you to execute it.
The final stolen samples will soon be reduced to sparkling dust, but this annihilation serves little purpose if the humans are permitted to keep the intelligence furnished to them by the traitorous Exrah. They have held the master's works before and will obtain more in the future, but these wonders are so vastely beyond the understanding of their pitiful mammal brains that we need not worry. Let them bash their rocks against our weapons, it will do them no good.
This is different, however. The Exrah fiends sold the humans not only technology that was not theirs to barter, but also the knowledge of how to employ it. This, the Intellect cannot tolerate. And so you will be performing the most crucial task of this entire campaign: you will slice into the human data networks and expunge all traces of the Exrah data. An undertaking this vast cannot be performed from just any access point in their network, however; you must stand within a central junction of their datastream, from where you may view all corners of their knowledge net and burn away the pieces that they do not deserve.
This task is the most vital you will ever be asked to perform, Commander. If the humans are permitted to wield the power of the Intellect's devices without submitting to its will, that will undermine the great sacrifice of all those of us who have given up our racial destinies to serve. This insult cannot be suffered.
Succeed, and the eyes of a grateful god will be upon you.
Be safe, Commander.
...
Hmm? Oh, right, the other matter.
Did you see those monkeys grunting off toward the hangar? They've volunteered to march directly into the gunfire of the humans protecting the last dregs of the Exrah contraband, in the hopes that the Unfolding Intellect will favor one frothing horde of knuckle-dragging primates over another in the aftermath.
Your assessment is correct: they are morons.
The Intellect agrees with my analysis that their plan is doomed and the monkeys are all going to get butchered. Unfortunately, the Intellect and I begin to diverge slightly on the matter of whether or not that would be a good thing. The wisdom of the Intellect is truly inscrutable to we mere mortals, as it has for some reason determined that measures should be taken to ensure that a few of them survive their suicidal charge.
So while you're inside the enemy data stream, see if you can locate the human machine logic subroutines for the devices they've have layered around their stolen prize. It should be a simple matter to turn the crude devices away from our illustrious allies and toward their masters.
Do so, and you will have the thanks of a belching red stench cloud. Truly, a prize to be envied.
Special: Achievement of mission objectives during the mega-battle directly awards League Points.
A hacker within a Fulcrum has access to the Puppeteer program, which enables possession of Defensive Turrets. Two can be possessed at once if they are placed within 12" of each other.
While controlling a Fulcrum, a Hacker's BTS becomes 9, and it gains access to a number of special Hacking Programs, which are listed in the appendix at the bottom of the scenario description.
| REM (Hackable) |
Adhesive Turret | ||||
| BS | WIP | STR | ARM | BTS | |
| 11 | 13 | 1 | 3 | 3 | |
| Abilities: | Total Reaction, G:Remote Presence | ||||
| Equipment: | 360 Visor, Multispectral Visor Lv.1 | ||||
| Weapons: | Adhesive Carbine*, Electric Pulse | ||||
| Special |
Adhesive Carbine |
||||
| DMG | Burst | Ammo | Properties | ||
| - | 2 | Adhesive | Non-Lethal | ||
| 0-8 | 8-16 | 16-24 | 24-32 | 32-48 | |
| +6 | 0 | -3 | - | - | |
| REM (Hackable) |
Ghost Turret | ||||
| BS | WIP | STR | ARM | BTS | |
| 11 | 13 | 1 | 1 | 6 | |
| Abilities: | G:Remote Presence | ||||
| Equipment: | 360 Visor, Automated Hacking Device, ODD | ||||
| Weapons: | Electric Pulse | ||||
| Special: |
Automated Hacking Device: This model's Hacking Device has access to the following programs:
|
||||
Sentry Turrets begin the game friendly to the Defending Player. They do not receive an Active Turn, but may perform AROs against enemy models.
GADGET-3
Attack, CLAW-3
Attack, GADGET-3
GADGET-3
SHIELD-3