Page 83 - Hunter - The Vigil
P. 83
T
C
T
E
E
T
R
C
R
T
E
R
E
O
A
R
C
H
A
C
R
R
R
A
A
E
T
I
A
T
I
N
C CHAPTER TWO: CHARACTER CREATION
H
O
A
P
P
A
E
A
Science. Other Skills can range from Brawl or Weaponry to write other tools, on and on until they’ve spent two weeks
Politics and Socialize, often depending on out-of-work activi- making the tools they need to tackle a two-day job. Repeti-
ties. Eidetic Memory, Resources and Status are all reasonably tion is boring. Coming up with a way to make someone else
common Merits. do the boring bit is interesting. Hackers focus on the interest-
Concepts: Aerospace jock, chemical engineer, demo ing bits to the exclusion of everything else.
man, driven architect, designer drug baron, government A number of Hackers work in technical support, while
contractor, military consultant, old-fashioned civil engineer, others provide IT departments around the world with their
prosthetic designer, radical biotechnologist shining stars. Many don’t play well with others, but only a few
Asset Skills: Crafts and Science go to the extent of living on welfare and using their time to
Professional Training: solve truly interesting problems. However she funds her life,
te
r
n
I
• • Intern anyone who specializes in problem solving in a highly techni-
n
•• Engineer cal fi eld is a Hacker at heart.
••• Team Lead Hackers have myriad gateways to the Vigil. Fuck with
•••
T
d
Lea
eam
•••• Visionary too much corporate security code, and the poor bastard finds
y
CIO
•••••
••••• C I O a team of pistol-carrying “security forces” storming his hovel,
each with a bone-white rebreather mask and mumbling in
Hacker Slavic. Tap into various CCTV sources, and a Hacker sees
Monsters are old fashioned. Most of them don’t realize that things he shouldn’t ever see. Go too far out into the null zone
their paper trails are open to anyone with the right Google-fu. of hidden web sites and he discovers that something intelli-
People who self-identify as Hackers live and breathe com- gent — and altogether not human — has contacted him and
puters. Despite the negative connotations the media attach to won’t leave him alone.
the word, they hold to the original meaning, found at MIT. Most hunter groups are glad to have a Hacker among their
A Hacker doesn’t lock himself in his room for 36 hours while number. While they’re usually no good at frontline work, a
he plays online computer games, but he just might spend that Hacker brings a wealth of backup skills to the group. She tests
long solving an interesting problem in an innovative way. the cell’s plans to destruction and then comes up with ways to
Most Hackers think nothing of writing tools that help them fix the bugs. Depending on her specialty, she may be able to
82
82

