Archetype - Social Engineer by Prometheus (relic1@hotmail.com) |
||
Basics | Skills | Cyberdeck |
Vitals: Attributes: |
Computer 4 Negotiation 4 Fast Talk 6 Computer B/R 4 Unarmed Combat 2 Implanted Weapons 4 Firearms 4 Etiquette (Corporate) 2 Procedure 4 Etiquette (Matrix) 3 |
Cyber Deck MPCP-6/5/4/5/4 Hot Assist Response Increase-1 Hardening-4 Active Memory: 500 Mp Storage Memory: 1,000 Mp I/O Speed: 240 MePS Programs: Analyze-4 (48 Mp) Armor-4 (48 Mp) Attack-6S (144 Mp) Browse-4 (16 Mp) Commlink-4 (16 Mp) Deception-6 (72 Mp) Decrypt-5 (25 Mp) Read/Write-4 (32 Mp) Relocate-4 (32 Mp) Scanner-4 (48 Mp) Sleaze-6 (108 Mp) Spoof-4 (48 Mp) |
Gear | Cyberware/Bioware | |
Cyber Deck (See Below) Ares Predator (w/ ext. Smartlink, Silencer, & 100 Regular Rounds) HK 227 (w/ext. Smartlink, Gas Vent (2), & 100 Regular Rounds) Armor Clothing (3/0) Armor Jacket (5/3) Pocket Computer (500 Mp) Wristphone with screen Programming Shop 4 Dataline Taps (5) Bug Scanner 5 Voice Mask 5 Datacode Breaker 5 5,000 Nuyen |
Datajack Chipjack Headware Memory 50 Mp Display Link Datasoft Link Retractable Spur Smartlink |
"Once I was just another Decker. Cutting through heavy choke point after heavy choke point to get a copy of the latest corporate programs, to tap a dataline, or to find some choice passcodes.. Then one day I realized that the corporations technical support was there to support me. With a few telecom calls and some good old fashion charm I got an armload of technical information about their system. Everything from what subsystem trapdoors were secreted away in to complete security read-outs on its IC."
"I may not use the fanciest technology, but with what I can get off of a ten minute phone call with tech support I don't need it."
Commentary: The Social Engineer is a slight bit of a relic from the past. Instead of relying on SOTA technology, he relies on charm. Commonly he will call a corps tech support and say that he is the head of a certain project (which he found out about by digging through the corps trash) and is having trouble logging on to the network. He then proceeds to convince the poor sysop in tech support to open up a secondary account for him while they try to find out what is wrong with his normal log in. The thoroughly duped sysop usually gives him a supervisor passcode allowing the enterprising Social Engineer to totally circumvent a large amount of IC.
Despite his preference for more social solutions he tries to keep as cutting edge in technology as he has funds to.