CONTAINS CARDS 41-60 of the "SPIN CYCLE."
The cyberstruggles of Android: Netrunner have always been a risky affair for all involved, but Mala Tempora, the third Data Pack in the Spin Cycle, raises the stakes to all-new heights. Will you be able to plug its upgrades into your deck and find success? Or are you the one who will fall behind?
Whatever the outcome, it won’t be dull. The runners and corporate executives who direct the struggles of Android: Netrunner lead frantic lives full of fantastic highs and staggering lows, and the pace doesn’t slow a beat in Mala Tempora. Many of its sixty new cards (three copies each of twenty different cards) encourage daring gambles, staking health and fortunes against opportunities to rapidly accelerate wealth and success. Of course, in an age of technological one-upmanship, why play fair? Mala Tempora also introduces a number of programs and ice that allow runners and corps to “cheat” these wagers by stealing information about their opponents’ cards.
Meanwhile, leave it to the Anarchs to do their own thing; while the other factions bid for greater efficiencies and more devious tricks, a new Anarch runner arrives to play the game by another entirely different set of rules.
|41||, Freedom Fighter||Anarch||Identity|
ALIAS: Reina Roja
HEIGHT: 5’8”/172.72 cm
WEIGHT: 143 Ibs/64.86 kg
HAIR: Unknown (currently dyed red with a white streak)
>PROFILE: The cyber-terrorist known as Reina Roja has shown advanced tactical training and use of military-grade equipment consistent with SpecOp training. It is possible she was a member of US elite Electronic Warfare Service. The psychological profile is consistent with a veteran, mercenary, or soldier from the war — thorough, goal-oriented, fearless, and tenacious.
All indications show she is incredibly intelligent and likely has a number of psychological disorders. There appears to be enough evidence to support a tentative diagnosis of intermittent explosive disorder, paranoid personality disorder, and schizoid personality disorder.
>SUMMARY: Based on multiple piggy-backed packets, she is well-connected in both the runner and Ecuadorian insurrection communities. She is one of the prime suspects in the Philips affair. Current location unknown. It is also believed she is responsible for a number of sensitive files finding their way into the hands of an Opticon investigator, as well as proprietary information found on various grey and black market eCommerce sites. Weyland Consortium and associates have been the primary target in the majority of her hacking activity. See files 32Az-32Fd for the details of each cyber assault. The inability to make a positive ID suggests multiple reconstructive surgeries and mods. Opal Protocols are in place.