***RE-UPDATED***
So I've heard a lot of arguments and discussions about the viability of technomancers as opposed to standard deckers. The following post is a challenge to all the character optimizers out there to show us what this new edition can do in relation to deckers and technomancers. I've always felt that all characters will need to contribute in combat no matter their archetype so there will be some meat space combat involved. The idea is to provide a typical and level playing field between the two archetypes and see how well they compare against each other. In order to prevent any sort of janky dice from skewing the results the best option I can think of is to use a large array of pre-rolled dice for the encounter and then pull the dice to be used for the roll from the pool at hand. Since any player who attempts this challenge will have access to the same dice pool array it should limit the effects of luck on whether or not one succeeds or not. In order to participate in this challenge one simply needs to make a character that would fit under the decker or technomancer archetype and then run it through the below run posting your results. Trying to game the system by say burning some dice by humming a tune and using the “perform singing” skill during combat as a free action is heavily frowned upon. The pool of dice for yourself and another for NPCs is listed at the very bottom. If you use up either pool just start over from the beginning. If both archetypes are somehow able to complete this run successfully then I will write another more difficult run and see how well that goes. If there are any questions about the run or the set up please feel free to ask me. Either way here goes nothing
After your meet up with the Johnson you are now 1000 nuyen richer with another 9000 nuyen upon completion and are as stuffed full of all the soy ribs you could eat. The job is simple, waltz into one of Renraku's local subsidiaries, get to the top floor, access one of the research labs work stations to get a file name for the schematics on the new "Bust-A-Move II, now with twice the krumping action" and then hack the local Renraku host, locate the file by its name and then after removing the protections on the file copy it and turn it into the Johnson.
Physical security isn't slated to be very tight, although the Johnson did say to expect a few rent-a-cops in the meat world you might have to deal with. Once you were in the host he suggested things might get a bit more difficult but that’s why he's offered you the job and not some know-nothing ganger or street sam for this job.
After a little bit of leg work you find the lay out of the building and get a decent idea of how to navigate the place. After hours there is a rent a cop at the front desk and 1 more per floor patrolling at any given time.
Response times for knight errant is about 8 mins to the location from when the call is sent out. security alarms and cameras are on all doors except the front entrance which is left open for late night deliveries and employees working overtime. All security devices are hardwired to a commlink in the front office manned by one of the rent a cops and slaved to an offsite cyberdeck. Each device is wired to the commlink using its only data port so hacking individual devices requires unplugging the device from the network or using a datatap. You can tap devices with data taps but this will be rather difficult due to cameras angles and the way things are wired. The Matrix security for the building security system is protected by an agent running from an offline location. The agent travels through the matrix to each devices location and looks for icons inside the building running silent or for any of the devices to be disconnected from the network.
You decide the best option for getting in is surprisingly through the front entrance where you will need to neutralize the guards and take an elevator to the top floor. From the buildings security schematics you notice that one of the elevators seems to be set up to only go to and from the ground floor to the third floor were as the other elevators offer access to all of the other floors. You also discover on the third floor commlink which will need to be turned on and accessed in order to get the file name of the schematics which are on the host under file protection.
Before neutralizing the guards you will need to hack the security cyberdeck via the commlink in the front desk in order to get access to the executive elevator and the camera feeds. All of the devices in this office are run on the renraku grid. The cyber deck is a novatech navigator with its asdf arranged in the following way, 4 3 5 6. Its running a level 4 agent, armor and tool box. The agent will send out an alert if any device is disconnected from the PAN and spends its time looking for icons running silent. It will ignore icons that don't attack it or the devices slaved to it.
After disabling the cameras and gaining digital access to the executive elevator you stroll up to the front entrance in your best Cicero’s Pizza uniform with a large "soy"peronni pizza in hand. At the front desk you see two of the rent a cops chatting it up over cups of soycaff. One is seated at a receptionist’s desk and the other is leaning against a wall behind the receptionist desk to the right of the other. The desk is about 20 ft. from the front entrance. They nod to you as you enter the building and ask you who the delivery is for.
They will not let the PC any further into the building and will try to contact whoever the delivery is for to pick up the food at the front desk. None of the player’s legwork revealed any names of people currently working at this late hour. While the player should be able to surprise the guards with a little finesse there isn’t really a social option for getting past the two of them. The one sitting will try to use the desk for cover and the one standing will charge the player and try to disable him with his stun baton if provoked.
Professional rating 2 corporate security with armored vest (9) and no sub machine guns.
B A R S W L I C ESS
4 4 4 3 3 2 3 3 6
Initiative 7 + 1D6
Condition Monitor 10
Limits Physical 5, Mental 4, Social 5
Armor 9
Skills
Automatics 3, Etiquette 3, Perception 2,
Pistols 4, Running 4, Unarmed Combat 3
Gear
Armor vest [9]
Fichetti Security 600 [Light Pistol, Acc 6 (7),
DV 7P, SA, RC (1), 30 (c)]
Renraku Sensei commlink (Device Rating 3)
Stun baton [Club, Acc 4, Reach 1, DV 9S(e),
AP –5, 10 charges]
The guards should be too busy fighting for there lives and trying to keep the shock of going from one boring night like any other to the most excitement either of them have ever had to call knight errant untill the fight is over. If an alert is activated during the initial hack or due to the fight with the guards going poorly a call is sent out to knight errant informing them of a breach of security. Keep track of the time at this point if they have been notified. 20 turns = 1 min and the response time is 8 mins.
It takes 2 turns to get from the security desk to the elevator.
It takes 5 turns to for the elevator doors to open.
It takes 10 turns for the elevator to reach the third floor and open up enough to let you in.
It takes 1d6 turns to find a terminal on the third floor you can access.
And 2 turns to reach the elevator from the workstation
Upon reach the top floor of the building there is a single orc guard waiting in ambush. He has taken cover behind a large receptionist desk and has taken a dose of jazz to up his game.
B A R S W L I C ESS
7 4 5 5 3 1 3 2 6
Initiative 8 + 3D6
Condition Monitor 10
Limits Physical 9, Mental 3, Social 5
Armor 12
Skills
Automatics 3, Etiquette 3, Perception 2, Pistols 4, Running 4, Unarmed Combat 3
Gear
Armor jacket [12]
Colt Cobra TZ-120 [SMG, Acc 4 (5), DV 7P, AP—, SA/BF/FA, RC 2 (3), 32 (c)]
Renraku Sensei commlink (Device Rating 3)
Stun baton [Club, Acc 4, Reach 1, DV 9S(e), AP –5, 10 charges]
Unexpectedly there are no other guards or emplyees on this floor. A brief search reveals the workstation commlink of the head developer for the prototype schematics you're after. after turning it on you can now hack the device. It has a device rating of 4. the file is listed as one of the ones recently used in the history of the device and its not hard to tell which one is the file name you need.
You can now travel via the matrix to the local Renraku Host. The host looks like a large office building on the inside not unlike the one your meat suit is currently residing in. there is a security spider and a patrol IC active on the host. No other icons appear visible this late at night. The patrol IC and the spider run matrix perception test to see if they can detect any icons running in silent mode. If you have marks on this host and aren't running in silent mode the Spider is immediately suspicious of your unfamiliar icon and will have the host deploy IC (which will ignore you since you have the host marked unless the spider says otherwise) and begin questioning you. Since the spider in the above instance is aware of you and suspicious he counts as having taken the full matrix defense action if you try to surprise attack him. A search of this host will locate the prototype schematics with an extended test threshold of 1 and a time frame of 1 minute. Each success above the threshold halves the time frame. The file is protected and also has a data bomb on it that will go off if the file is accessed; however the file will be undamaged in this event. Characters are assumed to be smart enough to search for the data bomb but if a critical glitch occurs during the disarming, it will go off. Once it’s protection is disabled and the data bomb is difused it can be copied and moved safely. both the file protection and the data bomb are rating 4.
host rating 7
A 8
S 7
D 9
F 10
Patrol IC
Spider
>> Black IC
>> Sparky
>> Killer
>> probe
Security spider
METATYPE: DWARF
B A R S W L I C ESS EDG
3 2 3 3 5 5(6) 4 2 5.0 2
Condition
Monitor
10 / 11
matrix initiative 8 or 9 + 4d6
Limits Physical 4, Mental 6 (7), Social 5
Active Skills
Cybercombat 6, Electronic Warfare 6, Electronics skill group 6,
Engineering skill group 4, Hacking (Hack on the Fly) 7 (+2),
qualities
Code Slinger (Brute Force)
Augmentations Cerebral booster (Rating 1), cybereyes [Rating 1, w/ low-light,
thermographic], datajack, skilljack (Rating 2), sleep regulator
Gear
Hermes Chariot cyberdeck [Device Rating 2, Atts 5 4 4 2, Programs 2], programs (Armor, Biofeedback Filter, Encryption, Hammer,Toolbox)
Typically run as A4 S2 D5 F4 until an alert is made where he switches to A5 S2 D4 F4 and then moves to A4 S2 D4 F5 if things start going badly. typically has armor, biofeedback filter toolbox and either encryption or hammer
Your dice pool NPC dice pool.
6,1,6,1,3,6,4,2,6, 6,2,1,1,3,3,1,2,3,
6,4,6,6,2,6,5,5,5, 6,2,4,1,1,5,5,1,1,
4,6,2,1,2,1,2,6,5, 1,6,2,2,5,6,5,4,6,
2,5,1,1,5,1,3,4,2, 4,3,6,3,5,1,5,1,2,
2,5,1,2,3,5,6,4,6, 2,1,5,4,3,2,1,5,5,
3,5,3,1,5,1,4,3,4, 2,6,3,2,3,3,5,2,3,
6,1,2,5,5,4,3,1,6, 6,3,5,2,6,3,5,2,2,
3,2,5,6,6,5,5,2,5, 1,5,1,6,2,3,3,2,5,
4,5,5,1,5,6,2,5,6, 3,1,2,6,5,1,6,5,4,
3,3,2,1,5,1,6,5,1, 6,6,6,4,1,2,1,1,2,
4,3,3,4,6,1,3,3,6, 1,3,4,1,4,3,6,1,1,
2,6,2,4,4,4,4,4,3, 4,4,6,6,1,4,6,4,1,
6,1,3,3,2,4,6,3,4, 5,2,1,1,1,6,4,4,5,
1,2,1,3,5,6,6,2,2, 1,3,5,5,2,2,6,3,1,
5,4,5,2,4,5,5,5,4, 1,6,5,4,3,1,4,5,1,
4,5,4,2,6,1,2,1,2, 5,1,6,3,2,4,4,1,1,
1,1,1,4,1,2,6,6,5, 3,1,3,1,3,3,2,4,1,
2,5,5,3,1,1,5,2,6, 6,2,6,1,3,1,5,6,6,
5,3,3,4,6,5,6,6,3, 4,5,1,2,6,5,4,6,2,
2,2,5,2,3,1,2,1,3, 4,2,3,4,3,4,1,2,6,
6,4,5,6,2,4,2,6,1, 5,6,6,4,1,3,3,4,4,
2,6,5,6,2,4,4,2,4, 5,6,3,2,5,6,6,2,2,
1,4,5,2,5,1,4,4,2, 4,3,6,6,6,4,4,3,3,
2,5,6,2,1,1,6,1,3, 3,5,5,5,1,4,4,6,4,
2,6,2,3,6,5,6,3,2, 5,6,3,5,1,4,1,4,5,
6,2,6,1,1,1,6,3,2, 6,5,2,5,4,2,6,6,1,
1,5,6,5,6,5,3,4,1, 1,4,3,3,3,3,6,5,2,
4,6,5,5,3,1,2,2,6, 4,1,1,2,2,2,5,2,6,
2,3,6,1,5,4,1,4,1, 2,3,3,3,2,6,1,5,1,
6,2,1,5,4,2,6,5,5, 3,5,2,2,6,1,3,3,4,
4,3,3,4,5,5,2,1,3, 1,6,3,6,2,6,1,1,5,
5,3,3,2,6,1,3,4,4, 3,2,3,5,1,4,3,6,1,
6,5,5,1,6,3,2,1,3, 2,3,2,2,6,4,1,5,1,
2,5,4,6,3,2,4,4,2, 3,3,6,3,5,3,5,6,5,
4,3,5,4,2,1,1,4,6, 1,2,4,1,4,6,5,6,2,
6,5,4,4,5,1,2,2,4, 3,1,4,4,3,5,5,5,2,
3,4,3,6,3,3,2,2,3, 1,2,2,2,6,1,5,2,4,
1,6,5,4,4,2,4,3,3, 6,2,2,2,1,4,5,1,4,
5,6,6,1,5,3,1,6,2, 1,1,2,1,4,6,2,4,2,
6,6,4,4,5,2,3,6,4, 5,1,2,1,2,3,6,1,1,
5,5,1,6,5,5,5,4,3, 4,2,2,4,6,1,4,3,5,
3,1,4,4,2,5,3,5,2, 2,5,6,3,3,6,6,1,6,
2,2,2,1,6,3,4,6,4, 1,1,6,1,5,5,4,1,4,
1,1,4,2,2,4,5,3,6, 1,1,2,1,3,6,6,2,3,
2,2,4,2,1,5,1,1,4, 3,3,6,1,5,3,6,3,4,
3,3,6,4,6,2,1,3,4, 6,6,1,3,1,4,4,6,3,
1,1,4,6,2,1,3,2,3, 5,3,5,3,2,5,1,5,6,
4,5,5,4,4,2,4,3,2, 6,2,5,1,6,2,2,6,6,
3,2,1,1,1,4,3,1,6, 6,6,1,4,5,6,6,5,5,