Alright, here's another question about drones...
A security rigger is 'jumped into' a Doberman drone.
He sends the drone out to fight some intruders.
Another rigger spots the drone and wants to spoof it.
She rolls for intercepting the wireless signal (Electronic Warfare+Sniffer(3))... success.
Next action, she analyzes the ID (Computer+Analyze(1))... success.
Now she can send false orders with the Spoof program (Hacking+Spoof vs. Pilot+Firewall)...
And here are the questions:
How does the rigger who is actively controlling the drone affect this?
Is there some kind of opposed test, wrestling for the control of the drone?
Is it even possible to send false commands to an actively controlled drone?
Can the intruding rigger somehow prevent the security rigger from controlling his drone?
What does the drone do, and when?
How would you resolve this?
Bye
Thanee
Well if this was Ghost in the Shell: Stand Alone Complex, you would just remove yourself from the drones sensors, and then get it to shoot itself in the foot.
i would add another step in the process of spoofing yourself into control of the drone's actions. you would have to switch the drone to accept orders from remote control or to receive orders. while the drone is set to be rigged, it wouldn't accept orders that would normally be rigged (movement, basically). you could still do it, you'd just basically have to boot the rigger off first, and then you could control the actual drone remotely.
as far as it goes, though, right now the hacking rules are so wide open that you could get any number of answers and they would all be equally valid
| QUOTE (Jaid @ Feb 21 2007, 02:29 AM) |
| as far as it goes, though, right now the hacking rules are so wide open that you could get any number of answers and they would all be equally valid |
| QUOTE |
| i would add another step in the process of spoofing yourself into control of the drone's actions. you would have to switch the drone to accept orders from remote control or to receive orders. while the drone is set to be rigged, it wouldn't accept orders that would normally be rigged (movement, basically). you could still do it, you'd just basically have to boot the rigger off first, and then you could control the actual drone remotely. |
| QUOTE |
| How does the rigger who is actively controlling the drone affect this? |
| QUOTE |
| Can the intruding rigger somehow prevent the security rigger from controlling his drone? |
| QUOTE (Sir_Psycho) |
| Well if this was Ghost in the Shell: Stand Alone Complex, you would just remove yourself from the drones sensors, and then get it to shoot itself in the foot. |
| QUOTE (Thanee) |
| Is it even possible to send false commands to an actively controlled drone? |
Since spoofing can only be done against drone/agents I dont think that you could spoof a ”jumped-in” drone as it essentially becomes the rigger – That means that you try to spoof the rigger not the drone.
For simplicity I have the following house rule for Rigger commands and spoofing.
Spoof (User Access)
-All Free Actions
-Issue Command / Observe In Detail
-Jam Signal
-Fire Weapon System
Spoof (Security Access) [-3D6 Dicepool]
-All User Access Commands
-Jump Into / Leave Drone
Spoof (Admin Access) [-6D6 Dicepool]
-All Of The Above
-Actively Subscribe A Drone
Subscribing the drone is the same as Admin access since out of a game balance viewpoint it is far to simple to steal drones and vehicles (depending on the GM of course.)
I use drones and technomancers a lot. Here are some ways I can think of to ramp up difficulty:
A) Encrypt communications between your commlink and the drone and have the commands/monitoring between the agents and pilot (detailed below) be encrypted seperately. This makes it take longer to affect the drone and ties up the opposing hacker giving you more time to detect them and either neutralize them or power off wireless as you set the drone to wireless-offline-but-still-shooting mode. There is currently no disadvantage to having a seperate encryption key for each and every link between two programs so a seperate decrypt is necessary to affect each and every thing operating within a node.
B) Play the numbers by getting more rolls with the drone to detect and intruder than the intruder has to detect/affect them in return. Remember that if the commlink onboard the drone has a response or system of 4 the opposing hacker's utlities cap at 4 so the opposing hacker/rigger will have a maximum of 8 dice to spoof or stealth. With a threshold of 3 that means on average it will take 2 passes to succeed if they don't spend edge. In the case of a heavy electronic warfare scenario if you aware of it you could try turning off wireless long enough to load response 3. This will lose 1 point off Pilots and agents guarding the pilot but the opposing hacker/rigger will lose 2 dice from spoofing and exploiting in. While this would seem to be a double edged sword your ability to fire a smartgun and use a sensor lock for bonus firearms dice will still allow a weapon system to be effective.
C) Have agents and IC loaded with analyze, stealth, black hammer, armor, and attack onboard the Doberman monitoring the actions of the pilot program as well as looking for intruders. Instruct the agents to powerdown the drone if they are not instructed with a change of orders at the same time as the pilot program is instructed with the same change of orders. With 1 pilot and 2 agents you get three rolls to detect an intruder and they all have to be spoofed or the unspoofed one powers down the drone making it ineffective but also unhacked. Alternatelt have a spoofed agent get the crap kicked out of it by the other agents. The latter option is better with sprites you can command and monitor via resonance link.
D) Tell the drone what to do then reduce signal to 0 or even off using a timer so it 'surfaces' electronically like a submarine seeking radio contact at an interval. The opposing rigger/hacker will need to Exploit in which often will take more than one phase so if it is only exposed for 1 action every other combat turn you will frustrate your opponent. Set an agent in your own commlink to tell the drone what to do and when it surfaces its automatic. Of course, have your commlink ironclad as much as possible because spoofing the agent would be as good as spoofing the drone...
E) Set a skinlink on the drone with a biometric sensor (palm reader) and if a friendly authorized to do so wishes to change its orders they have to slap it and give it the change of command(s). Only really viable for semi-stationary drones since they can travel so fast a human cant run as quickly.
F) Have IC loaded on the drone who only exists to monitor for logins. If someone logs in via Exploit it should still be logged albeit as a legit entry. If a new user logs in and isn't on the IC's 'nice list' then have the IC attack them and notify the agents of an intruder. 1 pass later have the signal reduced to zero and any long distance hackers are ejected.
Powered by Invision Power Board (http://www.invisionboard.com)
© Invision Power Services (http://www.invisionpower.com)