Difference between revisions of "Corporate Decker"
Line 16: | Line 16: | ||
Their job is to to data spike and link-lock the intruders. From there, they'll format the enemy's deck and set the condition that it will broadcast the user's position to the corp and GOD when they next connect to the matrix. Establish Snoop and begin intermixing Cat's Paw Data spikes and Tantrum Data Spikes to prevent the enemy from breaking the connection. In the event that the connection is broken, the decker will begin tracing devices that the enemy received communications from as well as any that they sent messages to.<br> | Their job is to to data spike and link-lock the intruders. From there, they'll format the enemy's deck and set the condition that it will broadcast the user's position to the corp and GOD when they next connect to the matrix. Establish Snoop and begin intermixing Cat's Paw Data spikes and Tantrum Data Spikes to prevent the enemy from breaking the connection. In the event that the connection is broken, the decker will begin tracing devices that the enemy received communications from as well as any that they sent messages to.<br> | ||
Their deck will start with the attributes A: 6 S: 3(7) DP: 5 FW: 5 | Their DR 3 deck will start with the attributes A: 6 S: 3(7) DP: 5 FW: 5 | ||
The decker will start combat with 6 programs loaded: Linklock, Hammer, Decryption, Smoke and Mirrors, | The decker will start combat with 6 programs loaded: Linklock, Hammer, Decryption, Smoke and Mirrors, Wrapper, and Configurator<br> | ||
They will use wrapper to disguise themselves as a random file in the host. The most likely way a player will find them is from a failed sleaze action (Format Device or Snoop) which will result in them gaining a mark on the decker and being informed that a file has taken a failed sleaze action on them. | |||
After establishing a link-lock they will swap out Decryption | After establishing a link-lock and brute-forcing 3 marks they will use configurator to swap out Decryption for Stealth, Hammer for Bootstrap, and switching Configurator to have their phase 3 loadout loaded.<br> | ||
After formatting the enemy device, or failing to format a technomancer, they will attempt to establish a snoop | After formatting the enemy device, or failing to format a technomancer (A mark is not placed on the decker in this event), they will attempt to establish a snoop before using Configurator to swap Bootstrap for Cat's Paw, Stealth for Decryption, Smoke and Mirrors for , and Configurator set to their phase 2 loadout.<br> | ||
They'll attempt to trace the enemy until successful, and then begin | They'll attempt to trace the enemy until successful, and then begin alternating between Cat's Paw data spikes and Tantrum data spikes<br> | ||
Their different loadouts will look like: | |||
*Phase 1: A:6 S:3 DP: 5 FW: 5 Linklock, Hammer, Decryption, Guard, Wrapper, and Configurator(Phase 2) | |||
*Phase 2: A:3 S:7 DP: 5 FW: 5 Linklock, Bootstrap, Stealth, Smoke and Mirrors, Wrapper, and Configurator(Phase 3) | |||
*Phase 3: A:6 S:3 DP: 5 FW: 5 Linklock, Cat's Paw/Tantrum, ,Decryption, Wrapper, and Configurator(Phase 3) | |||
==Stat Block== | ==Stat Block== |
Revision as of 02:52, 14 June 2024
Base Metatype | Human |
---|---|
Threat Level | 4 |
Typical Faction | Generic Unit |
Thematics Approval | No |
Mechanics Approval | No |
Description
Matrix Sheet This decker is employed by corporate security to help protect high-value systems.
Standard Operating Procedure/Rules of Engagement
This decker remains on standby in augmented reality during their shift. When a player is detected by a local host, they will take a dose of Psyche and then switch to hot-sim.
Their job is to to data spike and link-lock the intruders. From there, they'll format the enemy's deck and set the condition that it will broadcast the user's position to the corp and GOD when they next connect to the matrix. Establish Snoop and begin intermixing Cat's Paw Data spikes and Tantrum Data Spikes to prevent the enemy from breaking the connection. In the event that the connection is broken, the decker will begin tracing devices that the enemy received communications from as well as any that they sent messages to.
Their DR 3 deck will start with the attributes A: 6 S: 3(7) DP: 5 FW: 5
The decker will start combat with 6 programs loaded: Linklock, Hammer, Decryption, Smoke and Mirrors, Wrapper, and Configurator
They will use wrapper to disguise themselves as a random file in the host. The most likely way a player will find them is from a failed sleaze action (Format Device or Snoop) which will result in them gaining a mark on the decker and being informed that a file has taken a failed sleaze action on them.
After establishing a link-lock and brute-forcing 3 marks they will use configurator to swap out Decryption for Stealth, Hammer for Bootstrap, and switching Configurator to have their phase 3 loadout loaded.
After formatting the enemy device, or failing to format a technomancer (A mark is not placed on the decker in this event), they will attempt to establish a snoop before using Configurator to swap Bootstrap for Cat's Paw, Stealth for Decryption, Smoke and Mirrors for , and Configurator set to their phase 2 loadout.
They'll attempt to trace the enemy until successful, and then begin alternating between Cat's Paw data spikes and Tantrum data spikes
Their different loadouts will look like:
- Phase 1: A:6 S:3 DP: 5 FW: 5 Linklock, Hammer, Decryption, Guard, Wrapper, and Configurator(Phase 2)
- Phase 2: A:3 S:7 DP: 5 FW: 5 Linklock, Bootstrap, Stealth, Smoke and Mirrors, Wrapper, and Configurator(Phase 3)
- Phase 3: A:6 S:3 DP: 5 FW: 5 Linklock, Cat's Paw/Tantrum, ,Decryption, Wrapper, and Configurator(Phase 3)
Stat Block
Stat Block
B | A | R | S | W | L | I | C | Ess | Special Att | ||
---|---|---|---|---|---|---|---|---|---|---|---|
3 | 3 | 4 | 3 | 5 | 5 (8)"(8)" can not be assigned to a declared number type with value 5. | 5 | 3 | 5.05 | |||
Condition Monitor | 10 | ||||||||||
Limits | Physical 5, Mental 7, Social | ||||||||||
Initiative |
| ||||||||||
Qualities | None | ||||||||||
Skills | Cybercombat 6, Computer 6, Electronic Warfare 6, Hacking 6, Hardware 3, Software 3, Ettiquete 3, | ||||||||||
Knowledge Skills | |||||||||||
Augmentations |
| ||||||||||
Spells | |||||||||||
Adept Powers | N/A | ||||||||||
Gear | Psyche*5, Renraku Tsurugi, | ||||||||||
Weapons | |||||||||||
Vehicles | N/A |