Back to photostream

Chigaru

Name: Chigaru Bomani

 

Runner name: Anubian and HH

 

Apparent Age/True Age: 28

 

Gender: Male

 

Profession: Combat Decker

 

 

 

~ Appearance ~

 

Height: 5’10”

 

Weight: 157

 

Eyes: Brownish gold

 

Hair Color: Raven black

 

Hair Style: Cropped short

 

Complexion: Slightly pale

 

Build: lithe

 

Scars: None visible

 

Distinguishing Features: Funded by his numerous illegal jobs of hacking into some of the world's most protected companies, Anubian has been able to construct a mobile and armored computer. The physical armor that he wears is shaped in the image of the Egyptian god Anubis. The armor holds his computer and various cyberware.

 

~ Attributes ~ (12 additional dots)

 

Intelligence ***

Wits ***

Resolve **

 

Strength *

Dexterity **

Stamina **

 

Presence **

Manipulation ***

Composure ***

 

 

~ Skills ~ (22 dots)

 

Academics**

Computer****

Crafts

Investigation**

Medicine

Occult

Politics*

Science

 

Athletics**

Brawl

Drive

Firearms

Larceny*

Stealth**

Survival**

Weaponry*

 

Animal Ken

Empathy

Expression

Intimidation

Persuasion**

Socialize*

Streetwise**

Subterfuge

 

 

~ Possessions ~

 

Weapons: Sawed off shotgun

Armor: See the Garb of Anubis

Cybernetics: Chigaru possesses two, four slotted datajacks in the back of his head. Using these jacks, he is able to insert Data cards and memstick into his head to access or store information upon them.

 

Important Items: Garb of Anubis (See Below for specifics): this specialized mechanical suit that Chigaru has constructed and paid for through various legal and illegal activities. The Garb is actually an armor plated, mobile computer that covers the majority of his body. With the technological goodies he has purchased from both worlds, it has become the hacker’s wet dream given form. The armor can absorb only a few shots but protection was only a minor concern. The computer is always being updated with new hardware and software. No computer system can last long under its assault

 

Vehicles:

 

 

~ Self ~

 

Personality: Diligent when it comes to hacking but tends to be rather care free in nature.

History: History: There isn't much to say about Chigaru Bomani. Born into a well to do Rakshasain family, he never wanted for anything. Though there was a cost to the blessing of wealth, his parents were never around. To pass the time, Chiggy turned towards the computer and the internet. In time, the young man’s knowledge of computers, how they work and how to build one then as time went on, it became his only passion.

 

Using the sizeable ‘allowance’ that he received from his parents, Chiggy was always buying the newest and strongest upgrades that he could get his hands upon. His introduction into becoming a hacker stemmed from the computer games he used to play online. To put it frankly, he sucked at them until he was struck the idea of trying to change the game itself. Searching through hundreds of websites, he learned how to tweak the games to give him an advantage.

 

During his searching, he stumbled upon a website for wannabe hackers. The site enticed him and he gave it shot. Starting off small, he worked on using a modified palm to getting free drinks form soda machines. As the months went by and his skills increased, he started withdrawing money from atms and putting the funds on a cashcard. The excitement of hacking was addictive and while he stole money at times, it wasn’t because he needed the funds but due to the challenge of not getting caught.

 

Years passed by and Chiggy soon began hitting up entire companies, swapping funds or just wrecking playful havoc on their computer systems. Unfortunately, this time he was sloppy and wound up being arrested. Sentenced to five years in jail, it was at this time in his life that he was approached by other conflicts. Having heard of his case and disbelief at what he had done, Chiggy showed them his skills by doing minor hacking from within the prison.

 

Upon his release, the contacts he made set him up with a few ‘runners’. Runners are the true black op mercenaries for global companies. They take on missions ranging from escort and theft, to full scale terrorism and murder. The reason being a runner is so appealing is that they get paid obscene amounts of cash and tend to have access to government grade materials. Making contact with these runners, Chiggy’s new life began.

 

 

 

A few runs later, he had augmented his own body with state of the art cyberware, computer components that can be integrated with the human body. Now, his body sports a direct link between his gunsights to his eyes, data jacks to insert programs or extra memory straight into his brain but also his Deck. Deck is was he refers to his armored super computer that he wears. Its power is nearly unmatched and has the capability for him to mentally enter the cyberworld to speed up his hacking. He is now a Decker for hire, if the pay is good or job interesting enough, he’ll take it for the thrill of the hack.

 

Despite his prior Criminal record, Chiggy relied on the connections he made through the companies who hired him and his own family influence to land a stable programming job at the main technological hub of Rakshasa, where he get the privilege of moderating and programming the ever growing computer world.

 

While he may have all his needs met with that job, it still doesn’t sate his hunger for illegal high risk hacking jobs. Because of his type-A personality, he enters into the shadowlands and takes follows the command of the leading gang boss when she comes up with interesting job opportunities for him.

 

 

Garb of Anubis components

 

Helmet Components:

 

Commlink: Commlinks are the universal Matrix access device, used by everyone to be online all-the time, control all of their electronics, access their ID and accounts, and enhance their experiences with augmented and virtual reality.

 

Flare Compensation: This protects the user from blinding flashes of light as well as simple glare. Flare compensation also protects users with thermographic vision from heat flashes and glare from infrared lighting. It eliminates the vision modifiers for glare.

 

Low-Light Vision: This accessory allows the user to see normally in light levels as low as starlight. Total darkness still renders the user as blind as an unmodified person.

 

Micro-Transceiver: This classic short-range communication device is perfect for discreet operations. The micro- transceiver consists of an earbud and adhesive subvocal microphone (see p. 318). The transceiver’s Signal rating is equal to its Device rating.

Sensors:

Camera: The most common sensor, cameras can capture still photos, video, or trideo (including sound). Cameras may also be upgraded with vision enhancements (see p. 323).

Cyberware Scanner: This millimeter-wave scanner is primarily intended to detect cyber-implants, but can be used to identify other contraband as well. Maximum range 15 meters. See p. 255.

 

Directional Microphone: Allows the user to listen in on distant conversations. Solid objects as well as loud sounds outside the line of eavesdropping block the reception. Maximum range is 100 meters.

 

 

Hand and Arm components

Both hands

AR Gloves: AR Gloves: Available in all sizes and shapes, these gloves allow the user to manually interact with the Matrix, by manipulating virtual arrows, accessing a virtual keyboard or display, or remotely controlling a device. They are also equipped with force feedback, allowing for a limited tactile augmented reality experience. These gloves are also able to provide basic information regarding touched or held items, such as weight, temperature, and hardness.

 

Right hand

Skinlink: With skinlink, a device is adapted to send and receive data transmitted through the electrical field on the surface of metahuman skin. Though limited to touch, skinlink communication has the advantage of being protected from signal interception or jamming.

 

Maglock Passkey: The passkey can be inserted into a cardreader’s maglock, fooling it into believing that a legitimate passkey has been inserted.

 

Left Hand

Laser Microphone: This sensor bounces a laser beam against a solid object like a windowpane, reads the vibrational variations of the surface, and translates them into the sounds that are occurring on the other side of the surface.

 

Autopicker: This lockpick gun is a quick and effective way of bypassing mechanical locks. The autopicker’s rating added as a dice pool modifier to the Locksmith + Agility Test to pick the lock (see p. 125), or used in place of Locksmith skill if the character lacks it.

 

 

Torso and Back Components

 

Chameleon Suit: A full body suit made from ruthenium polymers supported by a sensor suite that scans the surroundings and replicates the images at the proper perspectives, providing the wearer with chameleon abilities. Apply a –4 dice pool modifier to Perception Tests to see the wearer. Also armored for additional protection. (This serves as the base upon which the other features have been added onto.

 

Software and Data Chips

Mapsoft: Mapsoft programs feature detailed information on a particular area, from streets to business/residential listings to topographical, census, GPS, and environmental data. An interactive interface allows you to quickly determine the best routes/directions, locate the nearest spot of your choice, or create your own customized maps. The mapsoft automatically updates itself with the latest data and will retrieve correlating online data (GridGuide traffic reports, restaurant menus, etc.) as necessary.

 

 

 

Means of connection

Fiberoptic Cable: This cable is used to establish a wired connection between two devices.

Laser Link This device allows an attached node to communicate with other laser-equipped nodes (see Beam Links, p. 51). Laser links require line of sight, and may be hampered by smoke or fog (reduce Signal by the Visibility modifier). Laser links are immune to radio-frequency jamming. (The laser link on p. 58, Arsenal, is

simply a Rating 2 laser link.)

 

Satellite Link: This allows the user to uplink to communication satellites in low-Earth orbit, connecting to the Matrix from places where no local wireless networks exist. This link has a Signal rating of 8. Includes a portable satellite dish.

 

Programs

Attack programs, anti-virus, firewalls, decryption programs, encryption programs, Key generators, password crackers, key loggers, tracking software, fake ID tags.

 

 

10,524 views
0 faves
0 comments
Uploaded on April 5, 2012
Taken on April 4, 2012