Synthetic Epistemology

Recap: MITM Week 4
Getting Out!

The cell opened the door to the storage room, and went inside to retrieve a sample. Something triggered Caroline’s async powers, and after probing the disturbance, Marvinus Ars Satorum materialized through what appeared to be a spatial rift. The MITM provost encouraged the cell to take a sample, which they did. The cell decided to take Satorum’s cortical stack, and Caroline fired her pistol straight at Marvinus’ head. Aphrodite ran for the exit with the sample while Caroline and the jammed bot took on Marvinus. Azazeal helped Aphrodite craft her escape disguise, while hardwired security dealt with the bot and Caroline. Natalia tried to escape via the monorail using a chameleon cloak, but due to the crowds on the monorail, her morph was detected. She shot up the visible security guard, but when the blast doors trapping her morph didn’t open, she decided to off herself instead. Azazael escaped by taking the monorail, using some excuse about needing to go home. The sample was returned succesfully to Eye_Of_Fire, but surprisingly, the next day, all of the scientific data MITM apparently had about exotic matter apparently made it onto the Martian mesh as a series of press releases. It seems like the data will soon be synced to the system-wide mesh.

New Wiki Pages
Useful Links!

So, I wrote some extra Wiki pages. They might be useful to read.


Firewall Personnel Authentication

Massachusetts Institute of Technology- Mars Campus

Recap: MITM Week 3
Nobody Suspects the Butler(s)

Our intrepid infiltrators met up with their luggage-like companions. Between our 5 remaining sentinels and Jake Carter, the infiltrated agents subverted a general purpose bot, and used it to infiltrate their mimics into the service corridors of MITM. The resident async hacked the net to get a map of the area, and maneuvered the mimics into the exotic matter facility. While inside the facility, the mimics discovered Seraphy, seemingly frozen in an instant, but couldn’t figure out what was freezing her. While the sentinels studied their fallen ally, Jake discovered the exotic matter containment room.

Recap: MITM Week 2
Sleeving into Silicon

The sentinels who stayed home from the mission due to various conflicts got a call from a proxy. An orbital strike had been called in to deal with MITM, but exact details for why the strike was necessary weren’t accessible via the Eye. The proxy wanted to stop the potential threat to Mars represented by an asteroid impact on the surface.

Caroline and Natasha met the proxy at a coffee bar on campus. He introduced himself as Jake Carter, and had brought a Morningstar negotiator named Sila Uh to help. Jake had access to a long-planned insertion plan. Jake showed the three sentinels a series of synthetic morphs, to be infiltrated into the campus dome as a grocery delivery. Once inside, the cargo destination would be rerouted, in this case as luggage for those who already infiltrated the dome.

Initially offput by the thought of sleeving into a synth and the ensuing difficulty that could cause her, Caroline asked Jake to find a brain-in-a-box equipped synth. Jake managed to call in a favor from a friend, and got a brain-equipped mimic in a hurry. Sila sleeved into a regular mimic, Caroline sleeved into her bio-mimic, and Natasha sleeved into a fighter flexbot. Jake revealed his own synth, a skulker swarmanoid. They gathered some espionage gear, loaded themselves into a cargo container, and had themselves shipped into campus. They were delivered to ACI-001, Seraphy’s, and Eogene’s room about the time when the first day’s plenaries ended.

Notably, though, those plenaries were accelerated. For whatever reason, MITM decided to shorten the talk times at the last minute, to open up the last day for a day of MITM talks about exotic matter. Apparently they have made significant enough progress with exotic matter to host a whole day of talks on the results before the closing banquet.

Recap: MITM Week 1
Unexpected Allies

The team prepped for their infiltration of MITM. They attempted to hack into MITM’s servers, but got little information before the connection was backtracked and attempted to be breeched.

The team spent the rest of the prep time working to design a plasma-equipped missile launcher blueprint, gather as much soft intel on the campus as possible, and coming up with general ideas.

They finally approached MITM, and managed to sneak in several submachine guns inside ACI-001. Seraphy lost her blades and covert tools to security checks. Once inside, the team maintained contact via a tacnet, and ended up meeting another Firewall sentinel. However, during that night, the new sentinel was apparently kidnapped by MITM. Seraphy reshaped her skin to resemble a guard she’d seduced the day before, and knocked him out and assumed his identity. She managed to leave Union Tower and infiltrate the exotic matter lab as the guard, but dropped out of the tacnet at roughly the time of infiltration. While Seraphy was out infiltrating the lab, the guard’s stack was popped and resleeved in a spare, to be interrogated. After being promised a new morph, the guard quickly spilled the beans, including his lack of access authority to the exotic matter lab. The remaining members of the team decided to attend the conference as the attendees they are posing as.

Arc 2 Week 1
Let's go to MIT!

The party has been tasked by Firewall to steal some exotic matter under development at MIT-Mars.

Apparently, MITM has been investigating the human potential to create and utilize exotic matter, of the sort that makes up a Pandora Gate. Patterns within the data flows the crows have access to suggest that MITM has had success at generating significant quantities of exotic matter, and might be close to figuring out how to work with it. This would potentially allow humanity to construct their own Pandora gates. This could be wonderful, providing instantaneous links between the human worlds. It could also be terrible, providing a potential point of entry for any exhumans or alien influences with access to the Pandora gate network.

Firewall needs a sample of the stuff for their own study. You don’t need to know why, all you need to know is that you are the proxies chosen for this mission. Given the relatively security-conscious nature of access to MITM, Firewall has provided forged credentials for an upcoming soft condensed-matter physics conference. The credentials will be enough to get you into the dome of MITM, while providing a buffer between you and your daily identity. You have received clearance to attend as yourself, if your academic interests lie sufficiently close to the conference topic.

in further support for how well developed this line of research is at MITM, the conference has its closing banquet scheduled to be held in the condensed matter laboratory’s visitors’ wing. While this will get you through any exterior physical barriers presented by the building’s security, Firewall would prefer you attempt penetration of the specific laboratory at an alternative time, given the likelihood for increased physical security during the banquet.

Firewall has 5 available identities. Only 2 are martian. The other 3 are off-worlders, and ego-casting has been arranged so your broadcast is incident from the correct line of site. Martian identities can bring their own morph, while off-worlders must choose from an unaugmented loaner morph. See below to check what morphs are available, and plan accordingly.

MITM Public Morphs

Note: These morphs have had their custom affinity pre-selected by the Institute for optimal conference benefit.

  • Bouncer (+5 Cog)
  • Exalt (+5 Int, +5 Sav, +5 Wil)
  • Flying Squid (+5 Cog)
  • Grey (+5 Sav)
  • Martian Alpiner
  • Menton (+5 Sav)
  • Ruster (+5 Cog)
  • Savant (+5 Wil)
  • Steel Morph (+5 Int)
  • Synth (+5 Cog)
  • Takko
Week 1
Sleepy Students

Eye_of_Fire sent you a coded message informing the cell that a new drug craze was sweeping the seedier parts of the campus community. Normally this wouldn’t be a Firewall-relevant event. However, 2 qualities of the drug make it a potential X-Risk: 1) it effects biologicals and synthetic users, something common drugs almost never do; 2) a small but non-negligible percentage of users are lost to comas from which there is no fast cure, even with an ego bridge.

The cell located one of the comatose patients, and connected the patient to an ego bridge. The ego showed signs of heavy tampering, which the cell brute-forced apart. Whatever was currently trapping the ego apparently didn’t take kindly to the interference, and the resultant fragment of ego was little better than a gamma fork. CAT ran a scan of the trapping routines, and had to reboot after activating some booby-trap hidden in the code. The AGI seems to have managed to clear out the offending software with a reboot.

Welcome to the stars!
Things to know ahead of time

First Session

Feb 13th, 2016


Check this


Ben’s place! (Near the Stony Dorms)

House Rules
We play by the most recent edition
1) Initiative is d10+(Int+Ref)/5.
2) Rolling equal to the target number is a success.
3) Opposed rolls requiring a resolution are won by the highest margin of success.

4) Margin of success is equal to the dice roll when the roll succeeds. Margin of failure is roll-target.
5) Hacking is a task action taking 10 minutes. That 10 minutes is broken up into 2 checks, one representing progress at 50% completion, the second representing progress at 100% completion. If the first check fails, the attempt fails without notifying the targeted system, and the attempt must be restarted. The second task is an opposed test against any active defenses. A system without active defenses counts as a defender who failed. The outcomes proceed as outlined in the hacking opposed test table. If both opponents fail, rerolls are made once a round (full initiative count). The rerolls cannot be sped up by higher speed, though the initial task action can. Once inside the system, all infosec checks are made as mental actions, assumed to be immediate actions, unless the core book specifies otherwise.


I'm sorry, but we no longer support this web browser. Please upgrade your browser or install Chrome or Firefox to enjoy the full functionality of this site.