Can be used to break into secured computer systems.
Requires:
Systems Operator
Can be used to break into secured computer systems. You can bypass and subvert them to fit your own needs. For example, you can slice into a the secured door system of a military base and override the lockdown protocol.