cybergeneration Logo

Networkers are the juves who know too much, who have seen behind the curtain and need to look deeper to find the conspiracies, cover-ups, and corruption. Some people say it's an addiction, but they prefer the term "passion"— they’ve gotta know the truth. So, they've connected with likeminded people who live to fish for facts, who build theories out of random data, and who know the Net like the backs of their hands. They see the Net as a deep, swirling ocean of knowledge from which bits of the truth can be plucked by someone with the right eye. Then in realspace or in Net flap rooms, they can gather with their goboys to share what secrets of the world they've found.

They’re Networkers, not Netrunners. They don't make daring, suicidal netruns to plow through Arasaka's security system and make off with the goodies. It's too dangerous; besides, why risk it? There is another Networker who calibrates the monitors for the Arasaka building, and she has access to all sorts of juicy data. The corporate machine is so sloppy with the way it runs its public-access information, everything needed can be gleaned from it until they hit a wall, and then HIRE a Netrunner. And they can supply them with everything but the access codes to the buried data.

The Machine has many feelers in the Net, so sometimes they bug out and go Meatworld. When they're not siphoning data from the company's active files, the gang continues to trade in realspace, passing out datachips and hardcopy pages from their personal conspiracy database. There are a few local hotspots where Networkers are likely to be found: the public or corporate library, the NetGame Entertainment Center, a telephone junction box in a parking lot, or anywhere they can hop onto a dataline.

What They Look Like

Networkers know that anonymity is the key to survival. When they're not spending time in the Net, they dress to fit the crowd. If they're getting dragged along to a party with their parents, they comb their hair and wear a tie; if they're headed to the mall with their realspace friends, they put on suspenders and sneakers. But they don't advertise. This is tougher than it sounds — most Networkers have a hard time shedding their passions when they're roaming Meatworld. Occasionally you see someone with an identifying mark: X-Files jewelry, tee shirts with slogans like "It's All Just Ones and Zeroes", or even baseball caps with names of famous investigators or old news channels (the ones that really sought the truth, before the media monoliths crushed them). Clues like these usually indicate a fellow Networker. If he's carrying a portable V-term or cyberdeck, it's a lock.

The Net is where appearance really counts: A wicked callsign and an ICON of an obscure personality are critical. They emulate the legendary Networkers, like "Deep Throat" — the faceless ISA expert who wears a different trenchcoat icon every time you meet him — or "PsiKick" — the resident paranormal guru who appears as a ghostly apparition. Once they’ve got their own leet handle and an ICON that mystifies those they meet, they can hit the electronic streets.

Allies & Enemies

Networkers are so careful in dealing with outsiders that most other yogangs don't know of their existence. When they do deal with outsiders, it's only after an extensive data check has been conducted. Of the few yogangs who have successfully worked with them, the Rads and the Vidiots are the only ones who come back. They get along well with these two groups because they're both interested in exposing the ugly truth about the ISA, CorpSec, and other powerful organizations.


Networkers require callsigns that will disguise their identities on the Net. They have a strong penchant for choosing handles that refer to a person who battled the corrupted powers in search of the truth.


Back Scratching trading data between networkers
Blushing Fish misinformation, outdated files
Code Key a friend or associate who works at a large corporation or government institution and has access to its computer system
Kelped overwhelmed with data; had enough and just hit by a new wave of data
Nixon a file with missing data
Owl someone suspected of being an Overwatch undercover agent
Reagan a "completed" file with sections you "forgot" or "don't recall"
Sliding acquiring confidential files or otherwise being cool
Syssie a weak data system, full of internal leaks
Unknown the best Networkers; ones too paranoid to show their face

Yogang Benefit

  • Investigator: Networkers started with the Investigator Edge, even if they don’t meet the requirements for it.
  • Datahound: Networkers start with Hacking at d4.

Yogang Complication

  • Suspicious: Networkers start with the Suspicious Minor Hindrance.


Networkers start with a cyberdeck (most likely the Silicon Graphics Iris Cyberdeck). In addition, choose two things from the list below:

  • Wyzard Handcomp with cellular option
  • Raven Microcyb Data Tap
  • "Wrangler" Codegun

Then, choose three of the following programs:

  • Kenobi program: (Stealth) to disguise your signal with other transmissions on a phone line (illegal)
  • DataBrowser program: (Utility) to find inconsistencies in file structures
  • Snoop program: (Detection) to locate masked or invisible datafiles
  • Beancounter program: (Utility) to sniff out accounting anomalies


Tags: yogang:networker

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License