Difference between revisions of "Corporate Decker"

From ShadowHaven Reloaded
Jump to navigation Jump to search
Line 13: Line 13:
==Standard Operating Procedure/Rules of Engagement==
==Standard Operating Procedure/Rules of Engagement==
This decker remains on standby in augmented reality during their shift. When a player is detected by a local host, they will take a dose of Psyche and then switch to hot-sim.
This decker remains on standby in augmented reality during their shift. When a player is detected by a local host, they will take a dose of Psyche and then switch to hot-sim.
Their job is to to data spike and link-lock the intruders. From there, they'll format the enemy's deck and set the condition that it will broadcast the user's position to the corp and GOD when they next connect to the matrix. Establish Snoop and begin intermixing Cat's Paw Data spikes and Tantrum Data Spikes to prevent the enemy from breaking the connection. In the event that the connection is broken, the decker will begin tracing devices that the enemy received communications from as well as any that they sent messages to.
Their job is to to data spike and link-lock the intruders. From there, they'll format the enemy's deck and set the condition that it will broadcast the user's position to the corp and GOD when they next connect to the matrix. Establish Snoop and begin intermixing Cat's Paw Data spikes and Tantrum Data Spikes to prevent the enemy from breaking the connection. In the event that the connection is broken, the decker will begin tracing devices that the enemy received communications from as well as any that they sent messages to.<br>
The decker will start combat with 6 programs loaded: Linklock, Hammer, Decryption, Smoke and Mirrors, Guard, and Armor
 
After establishing a link-lock they will swap out Decryption for Exploit, Armor for Stealth, and Hammer for Bootstrap.
Their deck will start with the attributes A: 6 S: 3(7) DP: 5 FW: 5
After formatting the enemy device, or failing to format a technomancer, they will attempt to establish a snoop and start by swapping Bootstrap for Cat's Paw and Exploit for Cat's Paw.
 
They'll attempt to trace the enemy until successful, and then begin intermixing Cat's Paw data spikes and Tantrum data spikes
The decker will start combat with 6 programs loaded: Linklock, Hammer, Decryption, Smoke and Mirrors, Guard, and Armor<br>
 
After establishing a link-lock they will swap out Decryption for Exploit, Armor for Stealth, and Hammer for Bootstrap.<br>
 
After formatting the enemy device, or failing to format a technomancer, they will attempt to establish a snoop and start by swapping Bootstrap for Cat's Paw and Exploit for Cat's Paw.<br>
 
They'll attempt to trace the enemy until successful, and then begin intermixing Cat's Paw data spikes and Tantrum data spikes<br>
 
==Stat Block==
==Stat Block==



Revision as of 04:06, 8 May 2024


Corporate Decker
Placeholder.png
Base MetatypeHuman
Threat Level4
Typical Faction
Thematics ApprovalNo
Mechanics ApprovalNo

Description

This decker is employed by corporate security to help protect high-value systems.

Standard Operating Procedure/Rules of Engagement

This decker remains on standby in augmented reality during their shift. When a player is detected by a local host, they will take a dose of Psyche and then switch to hot-sim. Their job is to to data spike and link-lock the intruders. From there, they'll format the enemy's deck and set the condition that it will broadcast the user's position to the corp and GOD when they next connect to the matrix. Establish Snoop and begin intermixing Cat's Paw Data spikes and Tantrum Data Spikes to prevent the enemy from breaking the connection. In the event that the connection is broken, the decker will begin tracing devices that the enemy received communications from as well as any that they sent messages to.

Their deck will start with the attributes A: 6 S: 3(7) DP: 5 FW: 5

The decker will start combat with 6 programs loaded: Linklock, Hammer, Decryption, Smoke and Mirrors, Guard, and Armor

After establishing a link-lock they will swap out Decryption for Exploit, Armor for Stealth, and Hammer for Bootstrap.

After formatting the enemy device, or failing to format a technomancer, they will attempt to establish a snoop and start by swapping Bootstrap for Cat's Paw and Exploit for Cat's Paw.

They'll attempt to trace the enemy until successful, and then begin intermixing Cat's Paw data spikes and Tantrum data spikes

Stat Block

Stat Block

B A R S W L I C Ess Special Att
3 3 4 3 5 5 5 3 5.05
Condition Monitor 10
Limits Physical 5, Mental 7, Social
Initiative
  • AR: 9 + 1d6
  • Cold-Sim VR: 5 + DP + 4d6
  • Hot-Sim VR: 5 + DP + 5d6
Qualities None
Skills Cybercombat 6, Computer 6, Electronic Warfare 6, Hardware 4, Software 4, Ettiquete 4, Hacking 3
Knowledge Skills
Augmentations
  • Cerebral Boosters R3, Datajack Plus R3 and Cyberear with 3x Antennae
Spells
Adept Powers N/A
Gear Psyche*5, Renraku Tsurugi,
Weapons
Vehicles N/A