The operator must make a computer programming/repair roll: Roll Result Very Easy Contacts, SecCard and flesh are all unusable Easy Contacts: +2 to security for retinal scans SecCard: +2 to security for card scans Flesh: +2 to con. Moderate Contacts: +1D to security for retinal scans SecCard: +1D to security for card scans Flesh: +1D to con. Difficult Contacts: +1D+2 to security for retinal scans SecCard: +1D+2 to security for card scans Flesh: +1D+2 to con. Very Difficult Contacts: +2D to security for retinal scans SecCard: +2D to security for card scans Flesh: +2D to con. Heroic Contacts: +3D to security for retinal scans SecCard: +3D to security for card scans Flesh: +3D to con. Retinal Contact: These will produce thin plasticizes membranes which replicate the retina pattern of the target to be impersonated.Chemical Security Card (SecCard): This will store 10 image sheets, which can contain pictures, text information or identification with proper code sequences. The SecCard has no electronic parts. O change to the next identification screen, one presses the "advance" button. Once an image sheet is used the information cannot be retrieved.Flesh Disguise: These are replicas of the face, hands, and feet of another person. Once fitted into place, the replications are extremely effective at a distance. The mouth of the disguise has a small electronic link to modify the pitch and tone of the voice (if the recorded voice is available)