I figured that I could pitch in a bit, toss in some personel since he's holding the line on the frameworks which, well, is beyond me. smile.gif

But characters?

I can make characters.


Street Hacker

The Street Hacker is a step beyond the "Script Kiddies", but still has a long way to go until they can
be considered "real" hackers. Some are literal street hackers, poor and SINless, raised in a culture where
mainline splices for Matrix access were standard and wireless ports were few and far between. Most are
middle class brats, the children of wageslaves in the corporate culture found with too many toys and too
little parental oversight. By their teen years, they can run rings around their parents and, indeed, most of
their teachers, delving into teh world of hacking to impress their peers or to score points. Many get caught
at some point and scared straight, others drift into other pursuits when teh opposite sex gets their attention,
some quit because it gets too hard and they're not willing to shoulder the extra work, content to rest on their
laurels, but, a few, a tiny, tiny segment, go on to become true Hackers,

Note that most Street Hackers operate in AR.

Attributes
Bod: 2, Agi: 2, Rea: 2, Str: 2, Cha: 2, Int: 2, Log: 2, Wil: 2, Edge 2, Essence 6, Init 4, Passes 1

Skills
Cracking Group: 2, Computer: 2, Data Search: 2, Hardware: 1, Software: 1, Etiquette 1, Con 1

Gear
Sony Emperor Commlink running Renraku Ichi O/S (Response 2, Signal 2, Firewall 2, System 2)
Analyze, Browse, Command, Edit, Encrypt, and Scan (All at 2)
Attack, Decrypt, and Exploit (All at 2)

Corporate Hacker

The Corporate Hacker, aka "The Man" or "Sellout", is charged with Matrix secuirty at his place of employ,
dreaming of having a better job but happy that he gets a regular paycheck and doesn't have to sweat for it.
He gets to place with neat toys, doesn't have heavy oversight from above and, when he's got nothing else
to do, tends to browse around the Matrix, hunting for points of interest. When a security breach begins, he
usually lets the Ice handle it, but does start paying better attention. Should the Ice crash or the intruder get
past them, he goes into action, first tracing the intruder, then moving to actively intercept. When no security
issues are up, the corporate hacker usually spends his time in more mundane Matrix affairs, updating and
upgrading the company's web site, passing humors emails around, or engaging in flamewars on boards.

Note that Corporate Hackers operate in Cold VR and have Security accounts.

Attributes
Bod: 2, Agi: 2, Rea: 3, Str: 2, Cha: 2, Int: 3, Log: 3, Wil 2, Edge: 3, Essence: 5.9, Init: 6 (6), Passes 1 (2)

Skills
Cracking Group: 3, Electronics Group: 3, Etiquette (Corporate) 1 (3), Con 1, Negotiation 1
Matrix Sites: 3, Matrix Rumors: 2, Business: 2, Personal Corporation: 2, Matrix Security Proceedures: 2

Gear
Datajack
Novatech Airware Commlink with Iris Ob O/S and Sim Module (Response 3, Signal 3, Firewall 3, System 3)
Analyze, Browse, Command, Edit, Encrypt, and Scan (All at 3)
Attack, Armor, Decrypt, Exploit, Stealth, Track (All at 3)
Agent (2) loaded with Analyze and Track (2)

Typically, the Corporate Hacker will have Analyze, Browse, and Stealth loaded, switching from Browse to
Agent when a security breach begins. After the Agent is launched, he switches from Stealth to Attack and
attempts to drive off the intruder. If the Agent is knocked offline, the Corporate Hacker can either upload
Armor, for a tougher battle, or Track, to run it himself.

System Administrator

The System Administrator is usually the best computer guy at the company and always the most skilled
politically. The entire Matrix site is his to operate and control, tho the Home Office Protocols have to be
followed. He keeps the newest releases for himself to beta test, passing them down if they're any account,
and controls the budget for the hackers overall, often playing favorites and making sure he gets the best
toys. His budget isn't unlimited, however, and he's often frustrated by "Corporate bean counters" who won't
allow him to get the software and hardware that he needs to make sure everything's as secure as it can be.
He delegates well, sending the newer hackers upstairs to find out why a suit's system isn't working (Oh,
look, it wasn't plugged in) or helping the bosses understand the new inter-office eMail policy. He himself
is under constant stress and relishes the chance to take it out on a wayward hacker who thinks that his
system is a playground. The System Administrator isn't a bad guy so much as a cog in the machine, given
a constant, throbbing headache.

Note that System Administrators operate in Cold VR and have Administrator accounts.

Attributes
Bod: 2, Agi: 2, Rea: 4, Str: 2, Cha: 2, Int: 4, Log: 4, Wil: 2, Edge: 4, Essence: 5.5, Init 8 (cool.gif, Passes: 1 (2)

Skills
Cracking Group: 4, Electronics Group: 4, Etiquette (Corporate): 2 (4), Con 2, Negotiation 2
Matrix Sites: 4, Matrix Rumors: 3, Business: 3, Personal Corporation: 3, Matrix Security Proceedures: 3

Qualities
Home Ground (His corporate matrix location.)

Gear
Datajack, Sim Modlue, Image Link, Sound Link
Transys Avalon Commlink with Custom Novatech Navi O/S (Response 4, Signal 4, Firewall 4, System 4)
Anlyze, Browse, Command, Edit, Encrypt, Scan (All at 4)
Attack, Armor, Blackout, Decrypt, Exploit, Sniffer, Spoof, Stealth, Track (All at 4)
Agent (3) with Analyze, Stealth, and Track (All at 3)

Typically, the System Administrator will only be online during a security breach, called in if the on duty
hacker can't handle the intrusion or if the system is going wonky. The System Administrator will arrive
with Analyze, Browse, Stealth, and his Agent loaded, sending it to sniff around for the intruder while he
quietly looks for the problems, switching from Browse to Command or Edit as needed. Once the intruder
is found, he switches to Analyze, Armor, and either turns off Stealth for Blackout, if the Agent is still up
and running, or turns off the Agent for Blackout if it isn't. He thus attacks while stealthed, intending on a
casual trace after the hacker's been shorted out on the other end of his attacks. If Blackout is ineffective,
he will use Attack instead.

Note that the System Administrator is sometimes called on as an Intrustion Hacker, infiltrating the system
of competitors, to embark on espionage. As such, he has a very full program suite.

Home Office Hacker

When the Home Office is called in, it's bad ... VERY bad ... System Administrators are reduced to flop-sweat
and toadism, simultaneously trying to help the investigation, cover up his failure, and save his job by pinning
the whole thing on someone else. Home Office Hackers sometimes arrive in person, and are given great
leeway and resources by their parent corporation. WOrth their weight in gold, these hackers no longer have
to do things the Corporate Way and, instead, do it theirs... some of them wrote the protocols that the locals
can't seem to follow. To a man, Home Office Hackers are cocky and overbearing, but, their abilities back up
all the bluster. Their primary differences lie in their rather exotic looks or edgy personalities ... quite a few
were Shadowrunners who came under the fold, either by being caught and seeing the light or being so good
that they were put on retainer. The put the corporation above all and have full authority to use assets in any
way needed, up to, and including, sanctioned wetwork.

Home Office Hackers have Admistrator accounts and operate in Hot VR.

Attributes
Bod: 3, Agi: 3, Rea: 5(7), Str: 3, Cha: 3, Int: 5, Log: 5(6), Wil: 3, Edge: 5, Essence 4.5, Init 12(13), Pass 1 (3)

Skills
Cracking Group: 5, Electronics Group: 5, Etiquette (Corporate) 3(5), Con: 2, Negotiation: 4, Intimidation: 2,
Dodge: 2, Forgery: 3, Infiltration: 3, Perception: 3. Pistols: 3
Matrix Sites: 5, Personal Corporation: 5, Matrix Rumors: 4, Business: 4, Matrix Security Proceedures: 4,
Famous Hackers: 4

Qualities:
Codeslinger: Track

Gear
Datajack, Data Lock with Encryption (5), Sim Module (HotMod), Image Link, Sound Link, Reaction Enhancer (2)
Touch Link, Cereral Booster (1)
Custom Commlink with Custom O/S (Response 5, Signal 5, Firewall 5, System 5)
Analyze, Browse, Command, Edit, Encrypt, Scan (All at 5)
Attack, Armor, Biofeedback Filter, Black Hammer, Blackout, Decyrpt, Defuse, Exploit, Sniffer, Spoof, Stealth,
Track (All at 5)
Agent (4) with Analyze, Armor, Stealth, and Track (All at 4)
Agent (4) with Analyze, Armor, Black Out, and Stealth (All at 4)

Home Office Hackers usually have Analyze, Stealth, Track, and two Agents loaded. They will run Track and
the first Agent, once their quarry is found, giving two stealthed trackers for the hacker to try and hide from.
If the tracking Agent is crashed, they switch to Biofeedback Filter, then activate the combat Agent. Track is
turned off for Blackout, or Black Hammer if termination orders are in place, then both Hacker and Agent attack.
Once the opposition is dealt with, a tracking agent is reloaded and sent out, with a "Cleaning crew" behind.

Note that Home Office Hackers are given quite a bit of leeway, and can choose negotiation, aprehension, or
wetwork as the situation calls for. They commonly run intrusions when not on cleanup duty, with physical
intrusions also being needed from time to time, thus the improved physical attributes and combat skills of the
ordinary Home Office Hacker.

Note that the above information is given for typical corporations, such as Ares or Aztechnology. For megas with
a more technical outlook, use the next highest threat in the place of the suggested. For example, NeoNet
corporate hackers use System Administrator stats, while NeoNet System Adminstrators use Home Office
Hacker stats. A Home Office Hacker from NeoNet should be a terrible thing indeed!