*The group will be impersonating members of the “Horizon Monitors” cult. The cult believes that through studying ancient religious texts, they have deciphered an apocalypse prophecy, which will come to pass in the near future. According to the Monitors, the apocalypse will spare those who learn to properly pronounce a specific Sumerian phrase of warding. They wear common clothes, and attempt to spread knowledge of the Phrase through whatever means they have at their disposal.
Kirk has provided a small tablet computer with a recording of the phrase installed. The phrase will appear as printed words on the screen. As someone touches a word, the recording will play the appropriate pronunciation, and analyze the user’s pronunciation to determine if it is correct.*
The group approaches the building marked “Zion” after parking their vehicles in the lot on 18th street, approximately half a kilometer from the building. Seneth and Kirk remain behind, inside Donovan’s vehicle, with Kirk’s heavily modified motorcycle and and Goethe’s Mirage motorcycle parked at either flank. The vehicles are mostly out of sight of casual observers.
Kirk successfully gains access to the TWT network, although it was much more difficult than she thought. The automated network security programs are suspicious of an intruder, but have not yet located her, or alerted the network operators. The network AI has organized the security Intrusion Countermeasures (ICe) programs into a “search party,” to determine if anyone has gained unauthorized access to the system.
As Goethe, Donny, and Nail approach the building, the troll grunts menacingly. “Hands up where I can see them, mutts!” he orders. His firearm is ready, but not aimed, and he is suspicious of the trio approaching them.
The human seems much more relaxed as he examines the sign Goethe is holding, which reads “Monitor your salvation.”
The human nods to the troll. “I’ve heard of these guys,” he says, unable to hide the curiosity in his voice. “Let 'em say their piece.”
The troll remains suspicious, and gruffly acknowledges the group. “You can talk from there,” he says. “No closer, 'less you can dodge bullets.”
Kirk has successfully infiltrated the TWT system, but the ICe programs are suspicious of an intruder. She will need to make a new Hacking + Stealth (complex form) roll every minute, with increasing penalties each time. If the ICe finds her, she will either need to jump out of the system, or engage in cybercombat which will alert the human program administrators (TWT hackers). As soon as Kirk attempts to destroy the drone reception signals, she will alert the ICe to her presence. The con group must make their move relatively quickly, before Kirk is discovered!
One player in the con group will attempt to deceive the two guards, tricking them into allowing them to come closer. If multiple players in the con group make a post in which they speak to the guards, each of them must make a separate con roll, giving the group more chances to fail. One person should “take charge” and lead the con attempt.