Black Hat

Interfacing with modern data systems has gone beyond the capabilities of the organic brain. There is a space to be filled by those who sacrifice their attachment to the physical world to envelop themselves entirely in cybernetic pathways and electronic spheres. These extremists are known as the Black Hats.

Global do not officially offer Black Hat archetype packages, and acquiring the package often takes persuasion of certain types of merchants. Heightening nueral pathways to dangerous levels couples with a variety of bodyports and physical alterations to create the perfect system operator.

To the player, the Black Hat AT offers the ability to hack high-level systems, and blur the line between cyberspace and the real world, covering combat failings of purehuman Netrunners by allowing the Black Hat to overload lights, locally disrupt environmental systems, and compromise large industrial systems to protect themselves or assault enemies. Downsides include governmental/MegaCorp aggression towards Black Hats, loss of skills in dealing with NPCs, and vulnerability to enemy hackers.

Requirements: Smarts 4, Wits 3, Poise 2, Neural Core Bodymod

Skills: Hack, Interface, Track

Perks: Integrated, Digital Shadow, Power Source, Bodyport

Feats: Human Calculator

Techniques: Power Surge, Securispike, Cloak, Scan

Perks

''Integrated: You are attuned physically to computer systems. You no longer become disoriented by Uplinking.''

Digital Shadow: A ghost in the machine, you leave limited trace of your hacking exploits.

''Power Source: Your Core is boosted by a synthesises nanobot reaction. You can power low-level systems by Uplinking.''

''Bodyport: Your skin is laced with nervescanners. As such, you can Uplink using a simple copper cable inserted into any part of your skin if you must.''

Feats

''Human Calculator: You are extremely skilled at making mental calculation. +3 to all Calculate scores.''

Techniques

''Power Surge: You can overload the usually extremely robust capacitors of many electrical systems as easily as another hacker might steal information. This takes twenty seconds per system, causing the system to explode.''

''Securispike: You can force security systems to freeze completely in an emergency. A spiked security system cannot be repaired easily. This takes one minute per system. Any security device on the system cannot be turned on or off or used.''

''Cloak: You can hide your party from prying eyes of any mechanical nature. You must have access to the system. This takes two turns per system. Any surveillance devices on the system will not pick you up.''

''Scan: You can search for electrical signals in your physical vicinity. This is a quick action. You will detect any unshielded machinery nearby.''