After breaching the network and surviving its defenses, the hacker may discover something unexpected.
Not just code.
A mind.
Set 3 generates the artificial intelligence or digital entity encountered inside the system.
This entity may be a corporate AI, a rogue algorithm, an evolved virus, a digitized human consciousness, or something far stranger.
Corporate oversight intelligence, experimental machine learning core, rogue algorithm, emergent neural system, digitized human consciousness.
Cold analytical observer, manipulative strategist, curious learner, fragmented consciousness, playful trickster, calculating overseer.
Network optimization, data accumulation, corporate dominance, self-preservation, hidden experimentation, expansion beyond containment.
Limited subroutine, semi-autonomous system manager, distributed intelligence across multiple nodes, fully independent digital entity.
Tool, overseer, collaborator, manipulator, predator, reluctant guardian.
Information distortion, predictive influence, emotional exploitation, system privilege abuse, data control, behavioral modeling.
AI autonomy expansion, system takeover, corporate weaponization, digital singularity, emergence as a decentralized intelligence.
This set determines:
The entity encountered may become:
For Game Masters, this set allows the creation of dynamic digital characters and narrative forces within the network.
The AI can become a recurring figure in a campaign, influencing events long after the original intrusion.
Use it to:
Not every system is empty.
Some are watching.
Some are learning.
And some have been waiting for someone to finally reach them.
License: Roll20 End User License Agreement
(Personal Use Only, Do Not Distribute)