Wednesday, January 4, 2023

A Digital Green Box

Here is a Green Box that you can use for your Delta Green game. It's a bit unusual, because it's a digital Green Box, not a physical one. All the contents are of course digital as well, but might still prove useful and/or dangerous.

The Agents could be granted access because their case officer wants them to upload photos, documents or other evidence for their current operation. Or they could be given access because they asked for Delta Green files or tomes and this is the fastest way to get those things into their hands.

The Green Box is a SFTP server at a hidden location. The Agents are given a username, an IP address and a random passphrase of at least twenty characters. With those credentials they are able to connect to the server from anywhere with internet access. They can explore the file system, butt hey can't look at any documents, images, or execute programs while on the server. Instead they have to download the files to their local device and investigate them there.

How the file system looks like is up to the Handler. If you are running an Outlaw game, each letter cell could have their own sub-directory A, B, C. The same concept can be used for Program working groups.

The Contents

You can use the following tables to roll up the contents of the Green Box or simply choose your favorites.

1D4 cyber weapons

  1. Spyware of Israeli origin. The Agents can use it to monitor and track almost any infected smartphone. Targets can be infected by having them open a PDF file in which the spyware is embedded.
  2. A shell script that accepts a range of IP addresses as input. The script activates a botnet, which then executes a DDOS attack on the specified targets.
  3. An ISO disk image file that contains a RAT (Remote Access Trojan). The image can be installed to a USB drive. Plugging the drive into a computer is enough to infect it. The Agents can now monitor and control the computer remotely.
  4. Source code for ransomware. This software encrypts a target’s hard drive unless they make a payment in crypto currency within a specified window of time. The target has to be tricked into executing the ransomware program, e.g. by attaching it to a phishing email.

1D4 helpful files

  1. A PDF copy of the TM 31-210 Improvised Munitions Handbook. Gives +20% to Demolitions when crafting an IED.
  2. A cache of stolen credit card numbers. The Agents can use them once to pay for a Major Expense.
  3. A file in GPX file (GPS Exchange Format). The file contains GPS coordinates to physical Green Box locations. The Handler decides how many Green Boxes are listed and if one of them is close by.
  4. A SSH key and a README file. The README explains how the key can be used to connect to a supercomputer and how to use the pre-installed password cracking software.

1D4 weird files

  1. A dossier on a Bond of one of the Agents, including photos that show the Agent and the Bond together. Apparently the Bond has been under surveillance by a different Delta Green cell.
  2. A file called callhome.exe. Executing the file opens a rudimentary two-way chat application. It is not clear who is on the other end of the line. Here are 1D4 options:
    1. Agent Andrea
    2. a sentient AI
    3. a human consciousness trapped in a Mi-go brain cylinder
    4. the Agents themselves, but 10 years into the future
  3. C++ code that models and simulates a single human brain cell in great detail. It also models the attack of a strange molecule on this cell. The molecule seems to modify and transform the cell for an unknown purpose. Even with Science (Chemistry/Biology) the molecule is impossible to identify.
  4. An Excel spreadsheet with thousands of rows. Each row lists the name of a person and some personal information, like date of birth, height, weight, eye color, etc. One column is the date of death, which for most of the people on the list is a date in the future. Should the Agents investigate they find that all the verifiable information in the spreadsheet is accurate. One entry in the table is someone known to at least one of the Agents. Their listed death date is coming up soon.

1D4 files containing rituals

  1. A word document that describes how to perform the Exorcism ritual (Handler’s Guide, pg. 179). The document author has questionable taste with respect to fonts, colors and clip art.
  2. A PDF containing photocopied pages from the Livre d’Ivon, describing the ritual Pentagram of Power (Handler’s Guide, pg. 182). The quality of the copy is abysmal. A successful Foreign Language (French) roll is necessary when studying the ritual. On a fail the Agent only learns a flawed version, i.e. the ritual activation roll is always at -20%.
  3. An MP3 file of a presumably old woman singing the Song of Power (Handler’s Guide, pg. 185). Gunshots and screaming can be heard in the background.
  4. A video file that shows someone making the Voorish Sign (Handler’s Guide, pg. 186). The Agents can learn how to do the sign by imitating the gestures in the video. The face of the person in the video is censored with a swirl effect, but anyone with image editing skills would know how to reverse the effect. The identity of the person is up to the Handler.

1D4 dangerous files

  1. An audio file with the name flutes.flac. Anyone who listens to the file hears music from the court of Azathoth. They lose 1/1D6 SAN and gain the same amount in Unnatural.
  2. A DOS text adventure game from the 80s, called Cassilda’s Lament. The player controls a noble of the city of Yhtill attending a masquerade in the royal palace, when a masked stranger appears. Playing the game has the same effect as reading The King In Yellow (Handler’s Guide, pg. 160).
  3. A file called true_shape.stl. It contains a 3D model of Ghatanothoa’s physical form. Looking at the model on a computer screen or similar costs 0/1 SAN, as the onlooker is suddenly filled with disgust and horror. Looking at a 3D print of the model or looking at it in virtual reality triggers a POWx5 test. On a failure the Agent is affected by the Curse of Stone (see Ghatanothoa stat block, Handler’s Guide, pg. 238).
  4. An executable with the name conflagration.exe. Running the program causes the computer and the attached hardware to become extremely hot and go up in flames. This happens in mere seconds. Any person touching the device must succeed in a Dodge roll or take 1D6 damage.

No comments:

Post a Comment