Bypass (Cybernetics, Genetics, Machinery, Materials, Munitions, Neuronetics, Robotics)
Skills: Cybernetics|Genetics|Machinery|Materials|Munitions|Neuronetics|Robotics
Actions: bypass(main-action) chk(CC-S)= d20 + M(this) on (pass or fail) set(PC)= 8 + R(this) + M(Stealth)
This technique allows you to use your base engineering skill to perform the bypass action. If you placed ranks in this as a materials technique, then you would enable the bypass action on Materials.
Bypass is a check against the artefact's security complexity challenge (CC-S) to deteermine, if you can bypass its interface (whatever that is), and be ready to search and then perform other actions on the artefact.
bypass(main-action) chk(CC-S) = d20 + M(this) on (pass or fail) set(PC) = 8 + R(this) + M(Stealth)
In the second part of the above experession (beginning with 'on pass or fail'), you set a Perception Challenge (PC) with the Bypass technique aspected by your Stealth. The PC you set becomes the challenge any other engineer that is looking at the artefact, must overcome in order to notice your bypass.
Therefore you make your Bypass attempt with:
bypass(main-action) chk(CC-S) = d20 + M(Bypass)
At the same time you are setting a Perception Challenge for any other engineer with:
on (pass or fail) set(PC) = 8 + R(Bypass) + M(Stealth)
This PC remains even after you have made your modifications and left, because its the challenge set for any other engineer to notice that work has been done.
Bypass must ordinarily be done while you are in connection with the artefact, but if you are attempting a bypass with comms only, you have access to Scan-Tools, and you are in range for those tools, you can attempt the bypass remotely.
Follow-Up Actions
Once you have bypassed the system, you are now free to explore the artefact's functions, and you can make other modifications as an engineer normally would. You should understand that:
- "bypassing the security system in order to feed the security personnel the false impression that the base is surrounded" involves a very detailed second action, which may take an hour to produce (possibly outside the available timeframe)
- "bypassing the striker's comms port in order to activate the self-destruct" involves activating a (likely) very secure system within the artefact, which would normally require a second bypass (and given that function) at a much higher CC-S.
In other words, make your follow-up action(s) sensible.
Searching Around
Sometimes you're not sure what you're looking for. In this case, your first follow up action may be to perform a search with:
search(min) chk = d20 + R(Eng) + M(Investigate) v opp spot
This is the normal seach action with your engineering skill. If 1 minute is too long you can spend 1fp to reduce the time to 1 round (meaning that you restrict yourself to accepting whatever you find in a frantic search lasting until your next turn).