Corporate Decker

From ShadowHaven Reloaded
Jump to navigation Jump to search


Corporate Decker
Placeholder.png
Base MetatypeHuman
Threat Level4
Typical FactionGeneric Unit
Thematics ApprovalNo
Mechanics ApprovalNo

Description

Matrix Sheet This decker is employed by corporate security to help protect high-value systems.

Standard Operating Procedure/Rules of Engagement

This decker remains on standby in augmented reality during their shift. When a player is detected by a local host, they will take a dose of Psyche and then switch to hot-sim. Their job is to to data spike and link-lock the intruders. From there, they'll format the enemy's deck and set the condition that it will broadcast the user's position to the corp and GOD when they next connect to the matrix. Establish Snoop and begin intermixing Cat's Paw Data spikes and Tantrum Data Spikes to prevent the enemy from breaking the connection. In the event that the connection is broken, the decker will begin tracing devices that the enemy received communications from as well as any that they sent messages to.

Their DR 3 deck will start with the attributes A: 6 S: 3(7) DP: 5 FW: 5

The decker will start combat with 6 programs loaded: Linklock, Hammer, Decryption, Smoke and Mirrors, Wrapper, and Configurator
They will use wrapper to disguise themselves as a random file in the host. The most likely way a player will find them is from a failed sleaze action (Format Device or Snoop) which will result in them gaining a mark on the decker and being informed that a file has taken a failed sleaze action on them.

After establishing a link-lock and brute-forcing 3 marks they will use configurator to swap out Decryption for Stealth, Hammer for Bootstrap, and switching Configurator to have their phase 3 loadout loaded.

After formatting the enemy device, or failing to format a technomancer (A mark is not placed on the decker in this event), they will attempt to establish a snoop before using Configurator to swap Bootstrap for Cat's Paw, Stealth for Decryption, Smoke and Mirrors for , and Configurator set to their phase 2 loadout.

They'll attempt to trace the enemy until successful, and then begin alternating between Cat's Paw data spikes and Tantrum data spikes

Their different loadouts will look like:

  • Phase 1: A:6 S:3 DP: 5 FW: 5 Linklock, Hammer, Decryption, Guard, Wrapper, and Configurator(Phase 2)
  • Phase 2: A:3 S:7 DP: 5 FW: 5 Linklock, Bootstrap, Stealth, Smoke and Mirrors, Wrapper, and Configurator(Phase 3)
  • Phase 3: A:6 S:3 DP: 5 FW: 5 Linklock, Cat's Paw/Tantrum, ,Decryption, Wrapper, and Configurator(Phase 3)

Stat Block

Stat Block

B A R S W L I C Ess Special Att
3 3 4 3 5 5 (8)"(8)" can not be assigned to a declared number type with value 5. 5 3 5.05
Condition Monitor 10
Limits Physical 5, Mental 7, Social
Initiative
  • AR: 9 + 1d6
  • Cold-Sim VR: 5 + DP + 4d6
  • Hot-Sim VR: 5 + DP + 5d6
Qualities None
Skills Cybercombat 6, Computer 6, Electronic Warfare 6, Hacking 6, Hardware 3, Software 3, Ettiquete 3,
Knowledge Skills
Augmentations
  • Cerebral Boosters R3, Datajack Plus R3 and Cyberear with 3x Antennae
Spells
Adept Powers N/A
Gear Psyche*5, Renraku Tsurugi,
Weapons
Vehicles N/A