Software

Moderate Animal Keeper AI

Like a muse for smart animals, this AI overwatches a critter’s activities, directs it as needed, and alerts the owners to any emergencies or other problems. If the animal is equipped with a puppet sock, it can also jam it like a biodrone.

Moderate AR Illusions

These databases of AR clips can be used to create realistic illusions in someone's entoptic display.

Crazypants Attaché AI

Attachés are expert-system consultants used by Titanian intelligence groups, commonly assigned to ministers and diplomats. They are typically connected by VPN to the Orchestra, which they ping for requests for information.

High Bedlam

Bedlam programs assault the ego with traumatic mental input, inflicting mental stress. Victims are overwhelmed with horrific, monstrous, sanity-ripping sensory and emotional input. Each attack inflicts 1d10 SV.

High Behavioral Psych Software

A program that uses provided data to build a psychological profile. Has Academics: Psychology 80 and gives +20 bonus to psychology tests.

High Bot/Vehicle AI

These AIs are designed to be capable of piloting the robot/vehicle without transhuman assistance.

Moderate Cartography Package

This software is used to build detailed maps. Idealy employed by flying morphs with the Mnemonic Agumentation or Life Recorder implant.

High Cauterizer

This scorch program rips into the ego with destructive neurofeedback routines. Each attack with a cauterizer inflicts 1d10 + 5 DV on the target ego. This damage is reflected as digitized neurological damage.

Moderate Device AI

These AIs are designed to operate a particular device without transhuman assistance.

Low Encryption Software

Crypto software generates key pairs, encrypts messages using public keys, and decrypts with secret keys.

High Event Reconstruction Software

Combines sensor data to help build a simulspace environment to help investigations. Gives +20 to Investigation Tests where applicable.

High Exploit Software

Exploits are hacker tools that take advantage of known vulnerabilities in other software. They are required for intrusion attempts.

Low Facial/Image Recognition Software

This program can be used to take an image and run a pattern-matching search among public archives. Similar version of this program exist for other biometrics: gait recognition, vocal recognition, etc.

Expensive Fake Brainprint Plug-In

A program used by infomorphs and characters with cyberbrains, it allows the user to fake a brainprint scan.

Low Firewall Software

This program protects a device from hostile intrusion. Every system comes with a standard version of this software by default.

Expensive Kaos AI

Kaos AIs are used by hackers and covert ops teams to create distractions and sabotage systems. Kaos AIs should also have one appropriate weapon skill at 40.

Moderate Kinesics Software

Gives a +10 to Kinesics Tests.

High Monitor AI

These Ais are designed to surveil their subject and keep them from engaging in any proscribed activities.

High Nightmare

Nightmare programs trigger anxiety and panic attacks within the victim by stimulating the neural circuitry representing the amygdala and hippocampus. The target ego must make a WIL x 2 Test. If they succeed, they are shaken but otherwise unaffected, suffering a -10 modifier to all actions until the end of the next Action Turn.

High Probability Mapping Software

When supplied with data on a particular person, this software can make a guess as to their likely current whereabouts, activities, and possibly even moods.