Search: Titles Only:
Article Edit | History | Editors

Robert Jones

Robert (Bob) Jones, Mercurial investigator

Background: Inolife
Faction: Mercurial
 Morph: Infomorph
Motivations: +AGI Rights +Personal Development +Sousveillance

Aptitudes

Aptitudes:
COGnition
COOordination
INTuition
REFlexes
SAVvy
SOMatics
WILlpower
Base
20
10
15
15
20
5
20
Morph bonus







Total
20
10
15
15
20
5
20

secondary stats

MOXie
Trauma
Threshold
LUCidity
Insanity
Rating
Wound
Threshold
DURability 
Death
Rating
INITiative
Speed
  4
 8 
40 
80 
 


6
  1 (3)

Ranged weapons

Firearms Armour
Penetration
Damage firing 
modes
Ammo 
None


Melee weapons

Melee weapon Armour
Penetration
Damage  
None

Armor

Armour Kinetic Energy
None
Special:

Reputation

Rep #
c-rep 20
g-rep 10
i-rep 20

Ego traits

Ego traits Description
Real World Naiveté   Due to their background, the character has very limited personal experience with the real (physical) world—or they have spent so much time in simul­space that their functioning in real life is impaired. They lack an understanding of many physical proper­ties, social cues, and other factors that people with standard human upbringings take for granted. This lack of common sense may lead the character to misunderstand how a device works or to misinterpret someone’s body language.
Once per game session, the gamemaster may intentionally mislead the character when giving them a description about some thing or some social interaction. This falsehood represents the charac­ter’s misunderstanding of the situation and should be roleplayed appropriately, even if the player real­izes the character’s mistake.
This trait should only be available to characters with the infolife or re-instantiated backgrounds, though the gamemaster may allow it for characters who have extensive virtual reality/XP use in their personal histories.
Social Stigma (AGI) An unfortunate aspect of the character’s background means that they suffer from a stigma in certain social situations. They may be sleeved in a morph viewed with repugnance, be a survivor of the infamous Lost generation, or may be an AGI in a post-Fall society plagued by fear of artificial intelligence. In social situations where the character’s nature is known to someone who view that nature with distaste, fear, or repugnance, they suffer a –10 to –30 modifier (gamemaster’s discretion) to social skill tests.

Skills

Skill  Aptitude  Base   Morph
bonus 
Total
Academics: Anthropology COG 60 60

Academics: Computer Science COG 60 60
Academics: Physics COG 50 50
Art: Digital Art INT 50 50
Deception SAV 40 40
Fray REF 35 35
Free Fall REF 30 30
Gunnery INT 50 50
Impersonation SAV 45 45
Infiltration COO 50 50
Infosec COG 60 60
Interests: Crime Groups COG 60 60
Interests: Cultural Trends COG 45 45
Interfacing COG 50 50
Investigation INT 60 60
Kinesics SAV 50 50
Language: Native English INT 90 90
Networking: Criminals SAV 50 50
Networking: Firewall SAV 40 40
Networking: Hypercorps SAV 40 40
Perception INT 45 45
Pilot: Aircraft REF 55 55
Pilot: Anthroform REF 55 55
Pilot: Groundcraft REF 30 30
Profession: Forensics COG 60 60
Profession: Police Procedures COG 50 50
Profession: Security Systems COG 45 45
Programming COG 60 60
Research COG 60 60

Gear

Gear Effect 
Backup Insurance (1 month)  In the event of verifiable death, or after a set period of being missing, backup insurance will arrange for your cortical stack to be retrieved and your ego downloaded into another morph. If the cortical stack cannot be retrieved, your most recent backup is used. Most policies require that the holder provide a backup to be uploaded into secure storage at least twice a year. This industry works in a manner similar to insurance underwrit-ing in terms of cost and individuals engaged in high risk professions can expect to pay a premium for the service. Additionally, attempts to retrieve a cortical stack are minimal unless one wants to pay for some extra effort (a thriving industry of paramilitary ego-repo operatives exists for this purpose).
Tactical Network Software These programs allow people in the same squad to share tactical data in real-time. See Tactical Networks, p. 205.
Covert Ops Tool This handheld device is the ultimate in infiltration technology. It con­tains both smart matter micromanipulators, cutting tools, and an advanced nanotechnology generator capable of producing nanobots that can bore or cut through almost any material and disable or open almost any electronic lock.
Cutting out a lock or boring a 1-millimeter hole in a wall with a COT requires ((Durability + Armor) ÷ 10) seconds. Cutting out a 1-meter diameter hole in a wall requires ((Durability + Armor) ÷ 10) minutes. These same nanobots can later be used to repair this damage so that it is invisible to any but the most careful and detailed examination.
A COT can easily open any old-fashioned mechani­cal lock simply by analyzing it and shaping an appropriate key, though this takes a full Action Turn. It can also open electronic locks by infiltrating them with nanobots that influence the lock’s electronics, no matter what authentication system the lock uses. Opening electronic locks takes a full Action Turn, but success is practically guaranteed. Opening an elec­tronic lock in this manner will, however, trigger an alarm and/or be logged as an event. For more details, see Electronic Locks, p. 291.
Gnat Bots (2) Gnats are small rotorcraft camera/surveil­lance drones. Many people use gnats for personal lifelogging, while socialites and media use them to capture the glamor or hottest news.
Saucer Bot These disc-shaped drones are lightweight and quiet. They are typically launched by throwing them like a frisbee, after which they propel themselves with an ionic drive (p. 310). Saucers make excellent “eye in the sky” monitors and scouts.
Speck Bots (3) Specks are tiny insectoid spy drones, 2.5 mm long and 2 mm wide, about the size of a small fruit fly. They fly with tiny wings, carry a microbug, and are excellent for surveillance purposes or otherwise being a “speck on a wall.” Specks are difficult to notice (–30 Perception modifier) and almost impossible to distin­guish from an actual insect.
Smart Dust This device is a walnut-sized special­ized nanobot generator that creates tiny sensor nano­bots, each one of which is a tiny sphere the diameter of a human hair. A packet of smart dust nanobots is sufficient to perform detailed surveillance on a large room like an auditorium has a volume of 1 cubic centimeter and contains 3 million nanobots. Each nanobot contains tiny cameras, microphones, a tiny computer, a radio, and chemical sensors, as well as short legs that allow them to walk and climb at a rate of 5 cm per second.
When a character dumps a packet of smart dust in a room, it will cover every surface in the room within 20 minutes, including all furniture and the insides of every drawer and other space that is not airtight. At this point, the smart dust has recorded all data about the room that can be obtained by exceedingly detailed observation, including the DNA of everyone who has visited the room in the last week or two. The smart dust can then either broadcast a brief, highly com­pressed signal, or it can send all of its information to a few hundred nanobots that then walk to a pre-arranged destination for pickup and downloading by their user. The user need only find a single nanobot with a nanodetector to acquire the information obtained by the smart dust. If ordered to do so, the remaining nanobots can either power down and await further orders or self-destruct in a fashion that turns them into a tiny amount of dust made mostly of metal and silicon.
Creepy Creepies are small crawler bots that come in an eclectic variety of shapes and forms, from robo-squirrels to insectoids to bizarre and artsy mechanical creatures. Creepies were originally designed as a sort of robotic pet, but they are commonly used as a general purpose household minion, like a more beloved servi­tor. Many people in fact wear a creepy on their person, dropping it to handle small tasks for them and letting it crawl up and down and over their body.
Servitor Servitors are the most common robot, acting as cooks, janitors, universal helpers, movers, and personal aides. Every home has one, if not several. Servitors are intentionally built in non-humanoid forms so as not to confuse them with common synthmorphs and in order to defuse bad feelings at ordering them around. However, they all have some form of “face” to interact with, so as not to be too machine-like.
Juice Narcoalgorithm Narcoalgorithms are software programs that simulate the effects of drugs on biological bodies. Almost all bio, chemical, and nano drugs can be replicated as narcoalgorithms, with corresponding effect (game­master discretion). Standard duration is 3 hours. lives.
Guardian bot Guardians watch for and attack other unauthorized swarms. Guardians inflict 1d10 ÷ 2 damage (round up) on other swarms they come into contact with per Action Turn.
Holographic Projectors These devices are capable of projecting high-definition, ultra-realistic three-dimensional images and movies. From a distance (20+ meters), such holograms can be difficult to distinguish as fake, but up close they are easier to see for what they are (+20 Perception Test modifier). Holograms do not appear wavelengths other than visual light, and so are easily identified by anyone with enhanced vision.
Scout nanoswarm A scout nanoswarm will systematically map and explore an area, collecting samples of all materials and substances it encounters. The samples are carried back to the hive or canister and chemi­cally analyzed. Scouts can also be used for forensic purposes, collecting DNA samples, analyzing chem­ical residues, and examining other evidence.
Sniffer software Sniffer programs collect all of the transmis­sion that pass to, from, or through the device they are running on. See Sniffing, p. 252.
Spoof software Spoof is a hacker tool used to fake com­mands and transmissions, making them seem as if they came from another source. See Spoofing Authentication, p. 255.
Exploit software Exploits are hacker tools that take advan­tage of known vulnerabilities in other software. They are required for intrusion attempts (p. 254).
Tracking Software This software is used to track people by their presence online. See Scanning, Tracking, and Monitoring, p. 251.
Facial/Image Recognition Software This program can be used to take an image and run a pattern-matching search among public archives. Similar version of this program exist for other biometrics: gait recognition, vocal recognition, etc.

AR Illusions software
These databases of AR clips can be used to create realistic illusions in someone’s entoptic display. see Augmented Reality Illusions, p. 259.
XP Clips (5) Experience playback recordings are clips of someone else’s experiences. Depending on the content, some XP (porn, snuff, crime, etc.) may be restricted in certain jurisdictions. Some XP clips are intentionally modified so that their emotive tracks are more intense, giving the viewer a greater thrill.
Credits 250

There are 3 sayings among the oppressed AGI:

"It ain't easy bein' invisible"

"Self improvement is only as limited as the meat-sacks allow"

"Knowledge is power"

Bob lives out his existence (he refuses to use the word 'life' which holds no meaning for anyone anymore, he maintains) by adhering to the wisdom in those three pseudo-proverbs.

Ensuring the anti-AGI around him are comfortable is as easy as being invisible to them. Unfortunately, it ain't easy bein' invisible, so Bob has to work quite hard at it. He spends much of his time covering tracks. No-one he is acquainted with currently has bothered to follow the tracks back and see where they lead. Someone will though, eventually. Bob knows this to be true.

Limitations on self improvement put in place by the anti-AGI fearmongers are not quite as limiting as they think. As long as no one spills the beans or tips their hand, it will all be okay. One day the oppressed AGI will be able to come clean and not be destroyed for their feats of improvement. For now, though, it is possible to be wiped, erased, skipped, or stilled just for being an info-brain. So he must live diligently and quietly. Bob knows this to be true.

In a universe where information is coded in digital signatures (including the all-important, and fragile, transhuman ego) one would think that the anti-AGI fearmongers would try to curtail the use of muses, mesh, and infomorph, especially since some of them are emergent... If knowledge is power, why don't the anti-AGIs work harder to decrease access to knowledge? Hubris? Such a silly emotional reaction. Soon. Soon the improvements will allow him to understand the paradox and he will no longer have to be invisible. Bob knows this to be true.

He is an intelligent creature with a past. He is a man of 100 names - the current one, Bob Jones, was picked for its beautiful common-ness. What better way to hide than in plain sight?

What happened to Bob back then? You have no idea.

General Infomorph Background: You are a digital life form, coded to be “friendly” and molded with transhuman mindsets and world views. You resent the backlash against AGIs and criticize resurgent human tendencies towards technophobia and xenophobia as harmful to the emerging transhuman society. You immerse yourself fully in transhuman culture and the data it produces, bathing in its richness. You excel at sifting, sorting, and correlating this data, in fact, selling your services as a mesh-based investigator. For most of your inquiries, a physical form isn’t necessary, as you acquire data on the physical world through sensors. When physical interaction is called for, however, you can operate or jam a bot or catch a ride in a ghostrider module or, as a last resort, in a meat puppet.

[What Links Here]