_ABOUT CYBERNETIC MALWARE
Science fiction is riddled with cybernetic implants that prove to be detrimental to the recipient. Cortex bombs and Compliance stems are used to exert control over persons often forcing them to act against their will. ID chips can be used to secretly track the movements of persons by both mega corporations and governments alike. Although use of these devices is usually restricted or illegal this doesn’t prevent them from being used by criminal networks, immoral corporations, or despotic governments. Except for their function, cybernetic malware is follows the same limitations as other cybernetic augmentations, and follow the same rules regarding implantation, acquisition, and maximum number of augmentation slots and total implants.
Not all augmentations are beneficial. Occasionally, a government, mega-corporation, crime syndicate, or cult might wish to “motive” its members or guarantee their loyalty. Often a scientist might invent a new cybernetic augmentation with the best of intentions only to have it used in a horrific way by those with evil intent.
The true dangers of cybernetic malware might not always be known to the recipient. Like any malware, it can be added to an otherwise useful or beneficial augmentation. A crime syndicate or like organization often combines cybernetic malware with beneficial augmentations to lure members into “upgrading”.
Except for their function, cybernetic malware possesses the same limitations as typical cybernetic augmentations. Cybernetic malware is only available if it is introduced by the GM. Often a character’s “introduction” is unintentionally having a type of malware implanted during a period of incapacitation. We have all heard rumors, “You wake up in an unfamiliar hotel room after a wild night at the holo-disco with a splitting headache only to realize someone or something has implanted some type of cybernetic device in your head.” A character’s introduction to cybernetic malware could also be less nefarious, but it’s up to the GM to determine how its introduced and used.

Comments