CyberMagic Spells for use in a GURPS Cyberpunk/Magic Campaign GURPS Grimoire added the Tech College of magic to the magic campaign. The spells are useful in a campaign in which Magic meets Cyberpunk, but their are many specific spells that Cyberpunk wizards have developed in order to make their lives easier. Machine Spells Speak Protocol/TL Regular This spell allows a computer to speak to any other computer in the world, regardless of each machine's protocol, for the duration of the spell. Note that while this allows the computers to speak to each other, it doesn't automatically grant access to the remote computer. The caster does not need to know the protocols each machine is using. Duration: 5 minutes Cost: 4 to cast, 2 to maintain Prerequisite: Machine Speech. Read Icon/TL Regular When cast on a decker, this spell allows the decker to identify any Icon in Cyberspace, including representations of other deckers. The decker can identify the source of the icon, as well as trace it back to its origin. Succesfully stealthed deckers cannot be seen, and thus cannot be read. Duration: 1 hour Cost: 6, 3 to maintain Time to cast: 1 minute Prerequisites: Machine Speech. Heal Implants/TL (VH) Regular This spell will repair all damaged implants in the targets body. This includes bionics, nanotech, and neural implants. The mage must first succesfully cast Schematic and Body-Reading on the target. Duration: Permanent Cost: 30 Time to cast: 1 minute Prerequisites: Rebuild, Schematic, Body-Reading AI Scramble/TL (VH) Regular; Resisted by IQ Turns an AI into an ordinary computer for the duration of the spell. The computer's complexity will be equal to the AI's IQ -5. If the mage succesfully casts Schematic on the AI first, the AI resists at -3. The AI will remember what happened while it was "asleep." This does not shut off the AI's security programs. Duration: 10 minutes Cost: 10 to cast, 5 to maintain Prerequisite: Malfunction. Download/TL(VH) Regular; In the Case of AIs, resisted by IQ Allows the Mage to transfer all data from the target computer to the Mage. The Mage must maintain concentration on the computer for ten minutes to fully absorb all the information. The Mage can remember the information for a full day. If the machine is an AI, the Mage must win a contest of wills by 5. If the mage fails, the spell fails. If the mage succeeds by less than 5, he gets the information, but also the AI's mental advantages and disadvantages(which also last for a day). If the mage succeeds by 5 or more, he gets the information and not the advantages and disadvantages. Note that the computer does not lose its memory. Duration: 1 day Cost: 20. Cannot be maintained. Prerequisites: Magery 3, Machine Speech, Memorize Upload/TL(VH) Regular; in the cast of AI's, resisted by IQ This spell allows the mage to copy any or all information from his brain to a computer's memories. The computer's free memory will be written to first, and then the information will start overwriting memory in use. The mage can choose what information is transfered. This spell is often used in conjuction with Download to copy data and programs from a corporate or government computer to the mage's cyberdeck. Netport/TL (VH) Regular When cast, this spell allows the target to transfer from one location to another across the net. To work, the target must first have computer with a connection to a remote terminal. When cast, the target and his possesions(only as much as the target can lift) will change into energy, "jump" into the computer and transfer through cyberspace to the remote terminal. The target will then "jump" out of the remote terminal and reform as matter. If the destination terminal is shut off before the target reaches it, the target will reform at the target's source computer. If both machines are shut off, the target will be lost in Cyberspace and must attempt to find a terminal to escape from. Duration: Until destination is reached Cost: 10 Prerequisites: Machine Speech, Body of Lightning Read Magnetic Media/TL Regular When cast on a computer disk, tape, or any other type of magnetic media, the Mage can "read" the information on the magnetic media directly, regardless of the format, without the use of a computer. The Mage can also tell what type of machine the magnetic media is for(ie, the Mage can read what type of format the magnetic media has.) On a critical success, the Mage can read files that were deleted from the Magnetic Meida unless the files have since been overwritten(GM's discretion.) Cost: 10 Prerequisites: Machine Speech, Magnetic Vision Memory Zap/TL Regular;AIs resist w/ IQ This spell sends electricity shooting through the casters arm which erases the target computer's memory and programming. The computer will no longer be able to function until is reprogrammed. AIs that are reprogrammed will start without their memories, unless they had a backup stored somewhere. The mage must touch the computer to be affected. Duration: Permanent Time to cast: 10 seconds Cost: 10 Prerequisite: Malfunction, Shocking Touch Electricity Conducting Non-Conducter Regular This spell changes a non-conducting object into a conducting object, thus allowing wood, glass, etc. to carry a signifigant charge. Cybermages use this in conjuction with other Electrical magic to suprise their foes by making doors, floors, etc, into electrical traps. Duration: 2 minutes Cost: 6 to cast, 3 to maintain Prerequisites: Magery 2 and Lightning Non-Conducting Conductor Regular This spell, the opposite of Conducting Non-Conducter, changes a conducting object to a non-conducting object. This spell is usually cast on computers to make their silicon chips slow down considerably for the duration of the spell(the computer's processing speed goes down to about 6 instructions per second, rather than million or billion of instructions per second.) It can also be cast on a person to make their skin non- conducting. Duration: 2 Minutes Cost: 6 to cast, 3 to maintain Prerequisite: Magery 2, Lightning, Conducting Non-conductor A typical Cyberpunk Mage Decker will use her spells in the following way: First, she'll cast speak protocol on her computer to make it easier for her to connect to another machine. Then, she'll use Netport to get to that machine. She'll use Download, to steal the information she wants, then go home using Netport and shut her system down. Finally, she'll use Upload to transfer her stolen data to her deck so she doesn't lose it, and she'll sell it to the highest bidder.