Decker

A Decker deals in properties more valuable than any other commodity; information. It's worth its weight in Nuyen to the right person. The payload however, is not easy to come by. With the use of custom-built computers, cyberdecks, Deckers are able to travel into the deepest corners of the Matrix. They use a variety of programs to accomplish these operations; including those used to aid in their own defenses, attack secure networks, and to retrieve data. They run search routines, tap phone calls, and tap into sensitive systems to reap their rewards.

The Many Hats of Deckers
A Decker is classified by the type of work it commits to over the matrix. Decking utilizes illegal activities to achieve one's goals is known as a Black Hat. A White Hat is an ethical decker, who specializes in testing security to secure an organization's information systems. A decker that datamines by illegal means, without malicious intentions, though has good will is a Grey Hat.

Decker Programs
Tools of the trade can be classified into three distinct types: System Operations, Utilities, and Intrusion Countermeasures. Nearly all of a decker's capabilities are expressed as System Operation; a procedure for determining success of an intended action. Utilities allow a decker to manipulate and ascertain aspects of the Matrix. Intrusive Countermeasures are virtual robots, which act as defensive and offensive units of defense programs.