Velara is a Virtuous Hotshot who Explores Cyberspace in a Cyberpunk world
-------------------------------------------------------------------------

Might:     ______ Pool: 14 Edge: 1 Defense: Practiced
Speed:     ______ Pool: 10 Edge: 0 Defense: Practiced
Intellect: ______ Pool: 12 Edge: 0 Defense: Trained
Initiative: Practiced

Effort: 1
Armor: 1
Experience Points: 0

Recovery Roll: 1d6+1
	Rested > 1 Action > 10 Minutes > 1 Hour > 10 Hours

Damage Track:
	Hale > Impaired > Debilitated


Special Abilities
-----------------

Computer programming
	You are trained in using (and exploiting) computer software, you know
	one or more computer languages well enough to write basic programs, and
	you are fluent in internet protocol. Enabler.

Practiced in armor
	You can wear armor for long periods of time without tiring and can
	compensate for slowed reactions from wearing armor. You reduce the Speed
	cost for wearing armor by 1. You start the game with a type of armor of
	your choice. Enabler.

Datajack
	Costs 1 Intellect point
	With computer access, you jack in instantly and learn a bit more about
	something you can see. You get an asset on a task involving that person
	or object. Action.

Datajack
	Costs 1 Intellect point
	With computer access, you jack in instantly and learn a bit more about
	something you can see. You get an asset on a task involving that person
	or object. Action.

Hacker
	Costs 2 Intellect points
	You gain quick access to a desired bit of information in a computer or
	similar device, or you access one of its primary functions. Action.

Sensor scan
	Costs 2 Intellect points
	You scan an area equal in size to a 10-foot (3 m) cube, including all
	objects or creatures within that area; the results of your scan are
	compared to a database of information (facial recognition, object
	recognition, police database, and so on) to determine what it is you're
	looking at. The area must be within short range. Scanning a creature or
	object always reveals its level. You also learn whatever facts the GM
	feels are pertinent about the objects and creatures in that area. For
	example, you might learn that a device is made of metal, plastic, and
	electronics. You might learn a person's name, occupation, whether or not
	they have any standard cybernetics, and that they have several
	outstanding parking tickets. You might learn that the creature in front
	of you is an exotic mammal (such as a tapir), and that owning it
	requires an expensive permit. However, this ability doesn't tell you
	what the information means. Thus, in the first example, you don't know
	what the metal and plastic device does—it might be a radio or a land
	mine. In the second, you don't know whether the person is intent on
	harming you. In the third, you don't know if the creature is dangerous.
	The information you do get from the initial scan probably gives you
	enough of a lead to perform an internet search to find more information.
	Many materials (such as lead shielding, a Faraday cage, or concrete)
	prevent or hinder scanning. Action.


Skills
------

Discerning people's true motives or seeing through lies (Trained)
	You are trained in discerning people's true motives or seeing through
	lies.

Intellect defense tasks (Trained)
	Your adherence to a strict moral code has hardened your mind against
	fear, doubt, and outside influence. You are trained in Intellect defense
	tasks.

Light firearms (Practiced)
	Light Firearms

Light weapons (Practiced)
	Light Weapons

Medium firearms (Practiced)
	Medium Firearms

Medium weapons (Practiced)
	Medium Weapons

Heavy weapons (Inability)
	Heavy Weapons


Attacks
-------

Punch
	A light might attack doing 2 damage.
	A right jab.

Cyphers
-------
Limit: 2

Death Bringer (Level 4, Manifest)
	For the next minute, when the user strikes an NPC or creature of the
	cypher level or lower, they can choose to make a second attack roll. If
	the second attack roll is a success, the target is killed. If the target
	is a PC, the character instead moves down one step on the damage track.

Remote Viewer (Level 2, Manifest)
	For one hour per cypher level, the user can see everything going on in
	the vicinity of the cypher, regardless of the distance between them.


Equipment
---------
Money: 5,300

- Appropriate clothing, a communicator implant, and $5,300. Granted from
Starting Equipment.
- Armor of your choice.  Granted from Practiced In Armor.

Advancements
------------
Tier: 1

[ ] Increase Capabilities
[ ] Move Toward Perfections
[ ] Extra Effort
[ ] Skill Training
[ ] Other


Background
----------
Hotshot
The Hotshot type is a cyberpunk variant of the Explorer with a knack for using
technology. Burglars, drivers, and scouts are usually Hotshots, as are some
hackers and soldiers. You are a person of action and physical ability,
fearlessly facing the unknown. You travel to strange, exotic, and dangerous
places, and discover new things. This means you're physical but also probably
knowledgeable. Although Hotshots can be academics or well studied, they are
first and foremost interested in action. They face grave dangers and terrible
obstacles as a routine part of life.

Virtuous
Doing the right thing is a way of life. You live by a code, and that code is
something you attend to every day. Whenever you slip, you reproach yourself for
your weakness and then get right back on track. Your code probably includes
moderation, respect for others, cleanliness, and other characteristics that most
people would agree are virtues, while you eschew their opposites: sloth, greed,
gluttony, and so on.

Explores Cyberspace
You've always been fascinated by cyberspace, its architecture, and the wealth of
data it contains. You may have started out as a hacker, programmer, or data
administrator, but viewing the internet on a screen was never enough for you.
You're driven by the urge to transcend your body, to enter a complete simulation
of that nonsensical nonspace. You're a netrunner, hooked on the thrill of
jacking into the matrix, where you interact with physical manifestations of AI,
software, and viruses.

 You might enter the matrix for legitimate reasons, such as for your job or
education—or maybe you make a point of going where you're not welcome, stealing
and selling proprietary data. With access to a computer or terminal, you plug
yourself in and you're off to the races.

Choose how you became involved in the adventure:
• The PCs are doing something virtuous, and you're all about that.
• The PCs are on the road to perdition, and you see it as your task to set them
on the proper moral route.
• One of the other PCs invited you, hearing of your virtuous ways.
• You put virtue before sense and defended someone's honor in the face of an
organization or power far greater than you. You joined the PCs because they
offered aid and friendship when, out of fear of reprisals, no one else would.

Background Connection
---------------------
You were kidnapped as a small child under mysterious circumstances, although you
were recovered safely. The case still has some notoriety.

Focus Connection
----------------
Pick one other PC. You recently had a possession go missing, and you're becoming
convinced that they took it. Whether or not they did is up to them.

Notes
-----

Possible player intrusions based on your character type:
Fortuitous Malfunction
A trap or a dangerous device malfunctions before it can affect you.

Serendipitous Landmark
Just when it seems like the path is lost (or you are), a trail marker, a
landmark, or simply the way the terrain or corridor bends, rises, or falls away
suggests to you the best path forward, at least from this point.

Weak Strain
The poison or disease turns out not to be as debilitating or deadly as it first
seemed, and inflicts only half the damage that it would have otherwise.

Cue the AI
You activate an app or device that has a fast-acting helpful AI with broad
knowledge on a lot of topics. This grants you four “floating” assets that you
have to use in the next few rounds. You choose which of your tasks gain the
assets and how many to use on any particular task. The normal limit of two
assets per task still applies. For example, you could use two assets on a
hacking roll, one on a Speed defense task, and one on an attack; two on a Speed
defense task and two on an attack; or one each on four separate tasks. Once the
time expires, any unused assets are lost.

Instant ICE
Your emergency countermeasures against hacks take effect, easing your defense
tasks against them for one minute, reducing their damage by half for one minute,
or throwing the hacker off your trail (forcing them to start over from scratch
against you).

Magic Touch
You manipulate a device in an unexpected way to quickly get the result you want.
This might be a secret override code, pressing too many keys at once in just the
right configuration, activating a digital child's toy to emit confusing wireless
signals, or punching the interface panel from a certain angle to briefly unlock
its admin mode. Generally this gives you one round of access before the device
reverts to its default behavior, allowing you to treat any task appropriate to
that device as routine (difficulty 0). For example, you could use this time to
unlock an electronic door, activate or deactivate a security system, or patch in
to a surveillance camera, so long as doing so would normally take one round or
less. If the task requires multiple successful rolls, this player intrusion
counts as one success toward that goal.

Dauntless
+2 to your Might Pool.
Granted from Virtuous
