Chapter 4: Life on the Fringe
"Not everyone gets to be a hero. Some of us just try to survive."
Character creation for morally complex protagonists operating outside the law.
📖 Modifies STA Core Rulebook, Chapter 4: Reporting for Duty
New Lifepath Options
Criminal backgrounds and underworld origins
Early Childhood Events
- Born in refugee camps
- Raised in criminal families
- Orphaned by violence or disaster
- Grew up in poverty despite post-scarcity
Education Experiences
- Expelled from Starfleet Academy
- Street education and survival skills
- Technical training in illegal applications
- Learning from criminal mentors
Career Path Diversions
- Discharged from military service
- Corporate whistleblower consequences
- Failed legitimate business ventures
- Forced into crime by circumstances
Formative Criminal Events
- First arrest or close call
- Betrayal by trusted authority
- Witness to government corruption
- Family member imprisoned or killed
Modified Species
How different cultures approach crime and morality
Orion Syndicate Influences
- Traditional criminal culture
- Honor among thieves concepts
- Family loyalty vs. law
- Business-first mentality
Ferengi Commercial Ethics
- Profit motive justifications
- Rules of Acquisition applications
- Family financial obligations
- Gender role complications
Klingon Honor Concepts
- Personal honor vs. legal systems
- Warrior culture in criminal context
- Revenge and vendetta traditions
- Clan loyalty implications
Human Cultural Variations
- Earth colony cultural differences
- Economic disparity effects
- Religious or ideological extremism
- Regional criminal traditions
Career Paths
Professional roles in the criminal underworld
Smuggler
- Transportation specialist
- Route knowledge and contacts
- Ship modification expertise
- Customs evasion techniques
Key Skills: Conn, Engineering, Command Focuses: Evasive Maneuvers, Ship Systems, Leadership Talents: Skilled Pilot, Black Market Contacts, Lucky Break
Fence
- Stolen goods specialist
- Market knowledge and evaluation
- Buyer and seller networks
- Authentication and forgery detection
Key Skills: Science, Medicine, Command Focuses: Appraisal, Negotiation, Cultural Knowledge Talents: Market Connections, Quick Appraisal, Silver Tongue
Enforcer
- Muscle and intimidation
- Combat and weapons expertise
- Territory control and protection
- Debt collection specialist
Key Skills: Security, Medicine, Conn Focuses: Combat Training, Intimidation, Physical Conditioning Talents: Threatening Presence, Combat Specialist, Hardy Constitution
Information Broker
- Intelligence gathering and sales
- Computer systems expertise
- Social manipulation skills
- Network maintenance
Key Skills: Science, Engineering, Command Focuses: Computer Systems, Psychology, Investigation Talents: Data Mining, Social Manipulation, Encrypted Communications
Former Operative
- Ex-military or intelligence
- Specialized training and contacts
- Classified knowledge and skills
- Burned asset seeking redemption
Key Skills: Security, Science, Command Focuses: Tactics, Investigation, Leadership Talents: Military Training, Intelligence Contacts, Operational Security
Underworld Contacts
Your network in the criminal world
Contact Types
- Information sources and tipsters
- Equipment suppliers and fences
- Safe house operators
- Transportation providers
Contact Reliability
- Trustworthy long-term allies
- Mercenary business relationships
- Unreliable desperate contacts
- Potentially dangerous connections
Contact Costs
- Financial payment requirements
- Favor exchanges and obligations
- Information trading
- Protection or services rendered
Contact Risks
- Government surveillance
- Criminal organization pressure
- Personal safety concerns
- Betrayal possibilities
Values & Directives
Personal codes that guide grey characters
Modified Values
- Family over law
- Survival over ideals
- Profit over principles
- Justice over legality
Personal Directives
- Never harm innocents
- Always honor agreements
- Protect the crew first
- Information is power
Moral Flexibility
- Situational ethics
- Lesser of evils choices
- Gradual compromise acceptance
- Redemption possibilities
Code Enforcement
- Self-imposed limitations
- Peer pressure and expectations
- Consequences of code violations
- Adapting codes to circumstances
Heat Tracking
How much attention you've attracted
Heat Sources
- Law enforcement attention
- Criminal organization interest
- Government agency surveillance
- Media or public attention
Heat Levels
- Cold: Operating under the radar
- Warm: Minor attention, routine monitoring
- Hot: Active investigation, increased patrols
- Burning: Manhunt, shoot-on-sight orders
Heat Effects
- Travel restrictions and checkpoints
- Increased security measures
- Contact reluctance and fear
- Price increases for services
Cooling Down Heat
- Laying low and avoiding attention
- Bribing or intimidating officials
- Completing jobs for powerful allies
- Eliminating witnesses or evidence
Reputation Systems
Standing with various factions
Reputation Scales
- Hostile: Shoot on sight
- Unfriendly: Refused service, higher prices
- Neutral: Standard business relationships
- Friendly: Preferred customer, discounts
- Allied: Protected status, special privileges
Reputation Effects
- Service availability and pricing
- Information access and quality
- Protection and support levels
- Mission opportunities and restrictions
Managing Multiple Reputations
- Balancing competing interests
- Secret identity maintenance
- Reputation washing and rehabilitation
- Faction conflict navigation
Reputation Recovery
- Proving loyalty and commitment
- Completing difficult missions
- Making significant sacrifices
- Time and consistent behavior