![]() |
![]() ![]() |
![]() |
![]()
Post
#1
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,598 Joined: 24-May 03 Member No.: 4,629 ![]() |
I figured that I could pitch in a bit, toss in some personel since he's holding the line on the frameworks which, well, is beyond me. :)
But characters? I can make characters. Street Hacker The Street Hacker is a step beyond the "Script Kiddies", but still has a long way to go until they can be considered "real" hackers. Some are literal street hackers, poor and SINless, raised in a culture where mainline splices for Matrix access were standard and wireless ports were few and far between. Most are middle class brats, the children of wageslaves in the corporate culture found with too many toys and too little parental oversight. By their teen years, they can run rings around their parents and, indeed, most of their teachers, delving into teh world of hacking to impress their peers or to score points. Many get caught at some point and scared straight, others drift into other pursuits when teh opposite sex gets their attention, some quit because it gets too hard and they're not willing to shoulder the extra work, content to rest on their laurels, but, a few, a tiny, tiny segment, go on to become true Hackers, Note that most Street Hackers operate in AR. Attributes Bod: 2, Agi: 2, Rea: 2, Str: 2, Cha: 2, Int: 2, Log: 2, Wil: 2, Edge 2, Essence 6, Init 4, Passes 1 Skills Cracking Group: 2, Computer: 2, Data Search: 2, Hardware: 1, Software: 1, Etiquette 1, Con 1 Gear Sony Emperor Commlink running Renraku Ichi O/S (Response 2, Signal 2, Firewall 2, System 2) Analyze, Browse, Command, Edit, Encrypt, and Scan (All at 2) Attack, Decrypt, and Exploit (All at 2) Corporate Hacker The Corporate Hacker, aka "The Man" or "Sellout", is charged with Matrix secuirty at his place of employ, dreaming of having a better job but happy that he gets a regular paycheck and doesn't have to sweat for it. He gets to place with neat toys, doesn't have heavy oversight from above and, when he's got nothing else to do, tends to browse around the Matrix, hunting for points of interest. When a security breach begins, he usually lets the Ice handle it, but does start paying better attention. Should the Ice crash or the intruder get past them, he goes into action, first tracing the intruder, then moving to actively intercept. When no security issues are up, the corporate hacker usually spends his time in more mundane Matrix affairs, updating and upgrading the company's web site, passing humors emails around, or engaging in flamewars on boards. Note that Corporate Hackers operate in Cold VR and have Security accounts. Attributes Bod: 2, Agi: 2, Rea: 3, Str: 2, Cha: 2, Int: 3, Log: 3, Wil 2, Edge: 3, Essence: 5.9, Init: 6 (6), Passes 1 (2) Skills Cracking Group: 3, Electronics Group: 3, Etiquette (Corporate) 1 (3), Con 1, Negotiation 1 Matrix Sites: 3, Matrix Rumors: 2, Business: 2, Personal Corporation: 2, Matrix Security Proceedures: 2 Gear Datajack Novatech Airware Commlink with Iris Ob O/S and Sim Module (Response 3, Signal 3, Firewall 3, System 3) Analyze, Browse, Command, Edit, Encrypt, and Scan (All at 3) Attack, Armor, Decrypt, Exploit, Stealth, Track (All at 3) Agent (2) loaded with Analyze and Track (2) Typically, the Corporate Hacker will have Analyze, Browse, and Stealth loaded, switching from Browse to Agent when a security breach begins. After the Agent is launched, he switches from Stealth to Attack and attempts to drive off the intruder. If the Agent is knocked offline, the Corporate Hacker can either upload Armor, for a tougher battle, or Track, to run it himself. System Administrator The System Administrator is usually the best computer guy at the company and always the most skilled politically. The entire Matrix site is his to operate and control, tho the Home Office Protocols have to be followed. He keeps the newest releases for himself to beta test, passing them down if they're any account, and controls the budget for the hackers overall, often playing favorites and making sure he gets the best toys. His budget isn't unlimited, however, and he's often frustrated by "Corporate bean counters" who won't allow him to get the software and hardware that he needs to make sure everything's as secure as it can be. He delegates well, sending the newer hackers upstairs to find out why a suit's system isn't working (Oh, look, it wasn't plugged in) or helping the bosses understand the new inter-office eMail policy. He himself is under constant stress and relishes the chance to take it out on a wayward hacker who thinks that his system is a playground. The System Administrator isn't a bad guy so much as a cog in the machine, given a constant, throbbing headache. Note that System Administrators operate in Cold VR and have Administrator accounts. Attributes Bod: 2, Agi: 2, Rea: 4, Str: 2, Cha: 2, Int: 4, Log: 4, Wil: 2, Edge: 4, Essence: 5.5, Init 8 (8), Passes: 1 (2) Skills Cracking Group: 4, Electronics Group: 4, Etiquette (Corporate): 2 (4), Con 2, Negotiation 2 Matrix Sites: 4, Matrix Rumors: 3, Business: 3, Personal Corporation: 3, Matrix Security Proceedures: 3 Qualities Home Ground (His corporate matrix location.) Gear Datajack, Sim Modlue, Image Link, Sound Link Transys Avalon Commlink with Custom Novatech Navi O/S (Response 4, Signal 4, Firewall 4, System 4) Anlyze, Browse, Command, Edit, Encrypt, Scan (All at 4) Attack, Armor, Blackout, Decrypt, Exploit, Sniffer, Spoof, Stealth, Track (All at 4) Agent (3) with Analyze, Stealth, and Track (All at 3) Typically, the System Administrator will only be online during a security breach, called in if the on duty hacker can't handle the intrusion or if the system is going wonky. The System Administrator will arrive with Analyze, Browse, Stealth, and his Agent loaded, sending it to sniff around for the intruder while he quietly looks for the problems, switching from Browse to Command or Edit as needed. Once the intruder is found, he switches to Analyze, Armor, and either turns off Stealth for Blackout, if the Agent is still up and running, or turns off the Agent for Blackout if it isn't. He thus attacks while stealthed, intending on a casual trace after the hacker's been shorted out on the other end of his attacks. If Blackout is ineffective, he will use Attack instead. Note that the System Administrator is sometimes called on as an Intrustion Hacker, infiltrating the system of competitors, to embark on espionage. As such, he has a very full program suite. Home Office Hacker When the Home Office is called in, it's bad ... VERY bad ... System Administrators are reduced to flop-sweat and toadism, simultaneously trying to help the investigation, cover up his failure, and save his job by pinning the whole thing on someone else. Home Office Hackers sometimes arrive in person, and are given great leeway and resources by their parent corporation. WOrth their weight in gold, these hackers no longer have to do things the Corporate Way and, instead, do it theirs... some of them wrote the protocols that the locals can't seem to follow. To a man, Home Office Hackers are cocky and overbearing, but, their abilities back up all the bluster. Their primary differences lie in their rather exotic looks or edgy personalities ... quite a few were Shadowrunners who came under the fold, either by being caught and seeing the light or being so good that they were put on retainer. The put the corporation above all and have full authority to use assets in any way needed, up to, and including, sanctioned wetwork. Home Office Hackers have Admistrator accounts and operate in Hot VR. Attributes Bod: 3, Agi: 3, Rea: 5(7), Str: 3, Cha: 3, Int: 5, Log: 5(6), Wil: 3, Edge: 5, Essence 4.5, Init 12(13), Pass 1 (3) Skills Cracking Group: 5, Electronics Group: 5, Etiquette (Corporate) 3(5), Con: 2, Negotiation: 4, Intimidation: 2, Dodge: 2, Forgery: 3, Infiltration: 3, Perception: 3. Pistols: 3 Matrix Sites: 5, Personal Corporation: 5, Matrix Rumors: 4, Business: 4, Matrix Security Proceedures: 4, Famous Hackers: 4 Qualities: Codeslinger: Track Gear Datajack, Data Lock with Encryption (5), Sim Module (HotMod), Image Link, Sound Link, Reaction Enhancer (2) Touch Link, Cereral Booster (1) Custom Commlink with Custom O/S (Response 5, Signal 5, Firewall 5, System 5) Analyze, Browse, Command, Edit, Encrypt, Scan (All at 5) Attack, Armor, Biofeedback Filter, Black Hammer, Blackout, Decyrpt, Defuse, Exploit, Sniffer, Spoof, Stealth, Track (All at 5) Agent (4) with Analyze, Armor, Stealth, and Track (All at 4) Agent (4) with Analyze, Armor, Black Out, and Stealth (All at 4) Home Office Hackers usually have Analyze, Stealth, Track, and two Agents loaded. They will run Track and the first Agent, once their quarry is found, giving two stealthed trackers for the hacker to try and hide from. If the tracking Agent is crashed, they switch to Biofeedback Filter, then activate the combat Agent. Track is turned off for Blackout, or Black Hammer if termination orders are in place, then both Hacker and Agent attack. Once the opposition is dealt with, a tracking agent is reloaded and sent out, with a "Cleaning crew" behind. Note that Home Office Hackers are given quite a bit of leeway, and can choose negotiation, aprehension, or wetwork as the situation calls for. They commonly run intrusions when not on cleanup duty, with physical intrusions also being needed from time to time, thus the improved physical attributes and combat skills of the ordinary Home Office Hacker. Note that the above information is given for typical corporations, such as Ares or Aztechnology. For megas with a more technical outlook, use the next highest threat in the place of the suggested. For example, NeoNet corporate hackers use System Administrator stats, while NeoNet System Adminstrators use Home Office Hacker stats. A Home Office Hacker from NeoNet should be a terrible thing indeed! |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 15th June 2025 - 03:27 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.