Site B - Attack/Defend Scenario
Administrator Jayanti
The Evolved Intelligence has taken our bait, Commander. Their dropships de-orbit on the secure complex as we speak, and the Coalition Navy reports unusual orbital movement over the site. Your colleagues on the ground are going to endure much suffering to sell this ruse.
However, it is important that we keep the ruse from sliding into an actual catastrophe. While we must regretfully cede ground to the enemy, it cannot be to the degree where they see us as a trivial foe whom they can rob without consequence. They must learn that attacking us has a price, lest they be emboldened and reach greedily for more.
This is not mere idle philosophy, Commander. Already the Evolved Intelligence has foreseen its victory, and assumes to claim further prizes. While its heavy forces descend on the contraband, an infiltration team has just tripped alarms at the Airavata data hub in the heart of Silvania. This is bold even for the Combined Army-- Airavata is no mere routing node. One third of all Maya traffic and half of all ALEPH processing on Paradiso passes through here. ALEPH's tracking of the Evolved Intelligence's intrusion into Maya hinted that it had some interest in the site, but we never guessed that it would attack such a well-fortified hub so brazenly.
It is unclear what the Intelligence aims to accomplish once inside Airavata, but several alarming possibilities exist. The facility is a control hub for Ghost-linked remotes on the entire Norstralian continent, as well as a data repository for trillions of Maya termi
This infiltration indicates an alarmingly cavalier level of confidence in our foe. If it believes itself free to divert resources from its primary goal to casually harass our informational infrastructure, that tells us that we are already losing credibility in its eyes as a foe.
Noctifer-Agent Keeskreet
This whole distasteful mess will soon be over, Commander. I have just been given the order to organize the final and most crucial step in the Unfolding Intellect's great scheme, and because you have proven your worth as a subtle operator, I have recommended you to execute it.
The final stolen samples will soon be reduced to sparkling dust, but this annihilation serves little purpose if the humans are permitted to keep the intelligence furnished to them by the traitorous Exrah. They have held the master's works before and will obtain more in the future, but these wonders are so vastely beyond the understanding of their pitiful mammal brains that we need not worry. Let them bash their rocks against our weapons, it will do them no good.
This is different, however. The Exrah fiends sold the humans not only technology that was not theirs to barter, but also the knowledge of how to employ it. This, the Intellect cannot tolerate. And so you will be performing the most crucial task of this entire campaign: you will slice into the human data networks and expunge all traces of the Exrah data. An undertaking this vast cannot be performed from just any access point in their network, however; you must stand within a central junction of their datastream, from where you may view all corners of their knowledge net and burn away the pieces that they do not deserve.
This task is the most vital you will ever be asked to perform, Commander. If the humans are permitted to wield the power of the Intellect's devices without submitting to its will, that will undermine the great sacrifice of all those of us who have given up our racial destinies to serve. This insult cannot be suffered.
Succeed, and the eyes of a grateful god will be upon you.
Be safe, Commander.
...
Hmm? Oh, right, the other matter.
Did you see those monkeys grunting off toward the hangar? They've volunteered to march directly into the gunfire of the humans protecting the last dregs of the Exrah contraband, in the hopes that the Unfolding Intellect will favor one frothing horde of knuckle-dragging primates over another in the aftermath.
Your assessment is correct: they are morons.
The Intellect agrees with my analysis that their plan is doomed and the monkeys are all going to get butchered. Unfortunately, the Intellect and I begin to diverge slightly on the matter of whether or not that would be a good thing. The wisdom of the Intellect is truly inscrutable to we mere mortals, as it has for some reason determined that measures should be taken to ensure that a few of them survive their suicidal charge.
So while you're inside the enemy data stream, see if you can locate the human machine logic subroutines for the devices they've have layered around their stolen prize. It should be a simple matter to turn the crude devices away from our illustrious allies and toward their masters.
Do so, and you will have the thanks of a belching red stench cloud. Truly, a prize to be envied.
Special: Achievement of mission objectives during the mega-battle directly awards League Points.
A hacker within a Fulcrum has access to the Puppeteer program, which enables possession of Defensive Turrets. Two can be possessed at once if they are placed within 12" of each other.
While controlling a Fulcrum, a Hacker's BTS becomes 9, and it gains access to a number of special Hacking Programs, which are listed in the appendix at the bottom of the scenario description.
| REM (Hackable) |
Adhesive Turret | ||||
| BS | WIP | STR | ARM | BTS | |
| 11 | 13 | 1 | 3 | 3 | |
| Abilities: | Total Reaction, G:Remote Presence | ||||
| Equipment: | 360 Visor, Multispectral Visor Lv.1 | ||||
| Weapons: | Adhesive Carbine*, Electric Pulse | ||||
| Special |
Adhesive Carbine |
||||
| DMG | Burst | Ammo | Properties | ||
| - | 2 | Adhesive | Non-Lethal | ||
| 0-8 | 8-16 | 16-24 | 24-32 | 32-48 | |
| +6 | 0 | -3 | - | - | |
| REM (Hackable) |
Ghost Turret | ||||
| BS | WIP | STR | ARM | BTS | |
| 11 | 13 | 1 | 1 | 6 | |
| Abilities: | G:Remote Presence | ||||
| Equipment: | 360 Visor, Automated Hacking Device, ODD | ||||
| Weapons: | Electric Pulse | ||||
| Special: |
Automated Hacking Device: This model's Hacking Device has access to the following programs:
|
||||
Sentry Turrets begin the game friendly to the Defending Player. They do not receive an Active Turn, but may perform AROs against enemy models.
GADGET-3
Attack, CLAW-3
Attack, GADGET-3
GADGET-3
SHIELD-3