![]() |
![]() ![]() |
![]() |
![]()
Post
#101
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,351 Joined: 19-September 09 From: Behind the shadows of the Resonance Member No.: 17,653 ![]() |
Get the players for the thrill of it, not the monotony of a daily grind. Hacking a thousand accounts a day for 5 nuyen each would be like doing customer service and helping 100 customers a day for the same thing. Might as well classify yourself as a wageslave at that.
Also try getting them in the reputation. Word spreads through the shadows in mysterious ways, and a particular contact could make a disparaging remark about the mass robbing-the-poor style of earning cash. And in the case of hacking, there's always the Honeypot (see Unwired). Something I had set up for a player of a magician who wanted to start earning extra cred by mugging people (by using a Fichetti Pain Inducer), his first mark was going to actually let him walk away with a relatively big score of five thousand nuyen. That nuyen, unbeknownst to the player until he tried to spend it (easy enough), was going to be forged and automatically set off alerts when used. Now I know a smart player might actually check the cred first and pitch the stick it's on, but this one wasn't all that bright. |
|
|
![]()
Post
#102
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,389 Joined: 20-August 12 From: Bunbury, western australia Member No.: 53,300 ![]() |
I'm personally thinking of doing a little bit of hacking to try and recoup the losses from our current run. 40 grand between six characters isn't much to begin with and factor in that most of us needed to buy new vehicles for the terrain and I'd lost money on the run before it even started!
Let me explain: The person that got the call was our uncouth sniper adept, who didn't bother to contact any of the three primary faces and instead went with the dwarf hermetic mage as his face *Facepalm*. he got the mission without asking for any details ("It's a manhunt." "Tell us more about..." "I always wanted to do a manhunt! Let's go!" "We'll give you 40 grand for it." "Let's nego..." "Sounds great, done deal!" *Facepalm*) The only reason the rest of us agreed to come along is that a) It's not fair on the GM to just turn down his missions and b) Our group has a 'Stick together, so that if one day you're the one in trouble someone's got your back' philosophy. The first commlink I hack is going to be his. Seriously, if I'm getting paid less than it costs for a second-hand dirtbike and a second-hand antique rotordrone then I expect the mission to be straightforward, not scour 400 square km for a gone-to-ground paranoid survivalist who's security clearance at Ares was so high that our middle-manager contact can't even find his job description on the system! Oh, and have I mentioned that he's buddies with the local authorities who patrol the area in armoured rovers sporting machine guns?!? Yeah, Malcolm (the pc) really dropped the ball on this one. |
|
|
![]()
Post
#103
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
I'm personally thinking of doing a little bit of hacking to try and recoup the losses from our current run. 40 grand between six characters isn't much to begin with and factor in that most of us needed to buy new vehicles for the terrain and I'd lost money on the run before it even started! Let me explain: The person that got the call was our uncouth sniper adept, who didn't bother to contact any of the three primary faces and instead went with the dwarf hermetic mage as his face *Facepalm*. he got the mission without asking for any details ("It's a manhunt." "Tell us more about..." "I always wanted to do a manhunt! Let's go!" "We'll give you 40 grand for it." "Let's nego..." "Sounds great, done deal!" *Facepalm*) The only reason the rest of us agreed to come along is that a) It's not fair on the GM to just turn down his missions and b) Our group has a 'Stick together, so that if one day you're the one in trouble someone's got your back' philosophy. The first commlink I hack is going to be his. Seriously, if I'm getting paid less than it costs for a second-hand dirtbike and a second-hand antique rotordrone then I expect the mission to be straightforward, not scour 400 square km for a gone-to-ground paranoid survivalist who's security clearance at Ares was so high that our middle-manager contact can't even find his job description on the system! Oh, and have I mentioned that he's buddies with the local authorities who patrol the area in armoured rovers sporting machine guns?!? Yeah, Malcolm (the pc) really dropped the ball on this one. So just ambush one of the patrols and take their stuff (I assume that your team is somewhat competent, so this should not be all that difficult). Why you got to buy your own? |
|
|
![]()
Post
#104
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,102 Joined: 23-August 09 From: Vancouver, Canada Member No.: 17,538 ![]() |
I'm not sure the word "buy" should really be in your vocabulary for many jobs. Just figure out who has what you need and swipe it so long as it isn't specialized gear.
|
|
|
![]()
Post
#105
|
|
Horror ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,322 Joined: 15-June 05 From: BumFuck, New Jersey Member No.: 7,445 ![]() |
So just ambush one of the patrols and take their stuff (I assume that your team is somewhat competent, so this should not be all that difficult). Why you got to buy your own? Kill a bunch of cops and hijack an armored security vehicle that's going to be filled to the nines with a bare minimum of tracking devices, if not mechanisms by which the vehicle may be remotely shut down? Good plan! |
|
|
![]()
Post
#106
|
|
Moving Target ![]() ![]() Group: Members Posts: 428 Joined: 23-September 11 From: Vegas Member No.: 38,733 ![]() |
HERF gun? (IMG:style_emoticons/default/biggrin.gif) Though, if I remember right, that might not work on all dohickeys.
|
|
|
![]()
Post
#107
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,351 Joined: 19-September 09 From: Behind the shadows of the Resonance Member No.: 17,653 ![]() |
HERF gun? (IMG:style_emoticons/default/biggrin.gif) Though, if I remember right, that might not work on all dohickeys. Like stealth tags. (IMG:style_emoticons/default/nyahnyah.gif)
|
|
|
![]()
Post
#108
|
|
Moving Target ![]() ![]() Group: Members Posts: 428 Joined: 23-September 11 From: Vegas Member No.: 38,733 ![]() |
What's the range of a broadcasting stealth tag anyways?
|
|
|
![]()
Post
#109
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,351 Joined: 19-September 09 From: Behind the shadows of the Resonance Member No.: 17,653 ![]() |
The default is Signal 1, which is good for roughly 40m, though I'd wager it's possible to augment that to a 3 (a range of 400m), and I recall reading somewhere about a Signal 5 tag.
|
|
|
![]()
Post
#110
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,018 Joined: 3-July 10 Member No.: 18,786 ![]() |
Even at just 40m, usually that's good enough to bounce off something with a higher signal.
|
|
|
![]()
Post
#111
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
Kill a bunch of cops and hijack an armored security vehicle that's going to be filled to the nines with a bare minimum of tracking devices, if not mechanisms by which the vehicle may be remotely shut down? Good plan! There are ways around everything. And it is not like your keeping them. Unless you are, of course. *shrug* |
|
|
![]()
Post
#112
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,389 Joined: 20-August 12 From: Bunbury, western australia Member No.: 53,300 ![]() |
QUOTE ('ShadowDragon8685' date='Nov 16 2012 @ 06:05 PM') Kill a bunch of cops and hijack an armored security vehicle that's going to be filled to the nines with a bare minimum of tracking devices, if not mechanisms by which the vehicle may be remotely shut down? Good plan! There are ways around everything. And it is not like your keeping them. Unless you are, of course. *shrug* Who said anything about cops? The patrols are military. Yeah, there is no way we're getting paid enough for this one. |
|
|
![]()
Post
#113
|
|
Horror ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,322 Joined: 15-June 05 From: BumFuck, New Jersey Member No.: 7,445 ![]() |
Good plan! Who said anything about cops? The patrols are military. Yeah, there is no way we're getting paid enough for this one. Which military, specifically? You might be able to get paid twice by impersonating a rival military and framing them for a border raid. |
|
|
![]()
Post
#114
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,351 Joined: 19-September 09 From: Behind the shadows of the Resonance Member No.: 17,653 ![]() |
Even at just 40m, usually that's good enough to bounce off something with a higher signal. As long as your transmitter with the activating key code is within range, and depending on how the stealth tag is programmed (maybe it'll only connect to the device that gave it said key code despite how every wireless data is a router?).
|
|
|
![]()
Post
#115
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,289 Joined: 2-October 08 Member No.: 16,392 ![]() |
As long as your transmitter with the activating key code is within range, and depending on how the stealth tag is programmed (maybe it'll only connect to the device that gave it said key code despite how every wireless data is a router?). Stop, stop right there. Don't question how it works, because Shadowrun's matrix does NOT function like the real world. A stealth tag can, and will, phone home without an "activating source" and will perform signal relays. |
|
|
![]()
Post
#116
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,389 Joined: 20-August 12 From: Bunbury, western australia Member No.: 53,300 ![]() |
|
|
|
![]()
Post
#117
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,351 Joined: 19-September 09 From: Behind the shadows of the Resonance Member No.: 17,653 ![]() |
Stop, stop right there. Don't question how it works, because Shadowrun's matrix does NOT function like the real world. I know that, but I used terminology that's used in the books.A stealth tag can, and will, phone home without an "activating source" and will perform signal relays. And right from the book: QUOTE (SR4a, page 329) Stealth Tags:Stealth tags are encoded to remain silent and only respond to transmissions with the proper passcodes. They cannot be located with a commlink or bug scanner (unless the codes are known). They typically use special frequencies and other tricks to avoid detection. These tags are also disguised so as not to look like RFID tags (an additional –2 Concealability). Stealth tags are often used as a backup for security tags, and may be implanted in the same way. That there says they're not even acting as a passthrough for data for other devices, and unless you've got the passcode they're very difficult to find.Of course it's also possible for a stealth tag to be programmed to periodically 'phone home', but they'll be found by the paranoid hacker that leaves his Scan and Sniffer programs running 24/7/365 or the TM who happens to sense an occasional pulse of data on a regular basis. |
|
|
![]()
Post
#118
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
|
|
|
![]()
Post
#119
|
|
Horror ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,322 Joined: 15-June 05 From: BumFuck, New Jersey Member No.: 7,445 ![]() |
Thought you said it was a Bad Plan ShadowDragon8685. It is, but they seem to be stuck with it. Therefor, if they can get away with pinning the blame on someone else - and making enough money to turn a profit, or at least break even - so much the better. |
|
|
![]()
Post
#120
|
|
Moving Target ![]() ![]() Group: Members Posts: 356 Joined: 3-April 10 Member No.: 18,409 ![]() |
There are a few deterrents to this kind of mass-hacking:
1) Banking transactions should typically require biometric authorization, even for a $1 soycafe. They could also possibly require other autorization schemes (confirmation dialogues, passcodes, etc.), that come from the banking system, and not from the user's commlink. Meaning you'd have to hack the bank's node to bypass these schema. 2) Assuming you got by #1, most people will notice that their accounts are shortchanged in due time, and report the descrepancy. Even that $5 slice of pizza or coffee is likely to alert a decent percentage of people. If the banks start getting alerts about fraud (and it's entirely reasonable to believe banks share fraud alert information to better combat fraud), they'll likely assign an analyst to look into it. If it appears to be widespread (i.e. you're hacking enough people to make this profitable), they'll assign a team to analyst the fraud. 3) One hack might go undetected, and be impossible to trace. 1000 hacks will not only be detected, but will provide much more information for the investigators. They could pull security footage, correlate the locations of victims to determine where the attacker was sitting/standing/idling in their van, etc. Even if they cannot locate the current whereabouts of the hacker, they could easily determine a modus operandi, and set baits and traps for them. The honeypots, as someone else said, or just people on the lookout for this sort of fraud. 4) Someone has likely already tried this. Busy locations may very well already have the occasional plain-clothes hacker-cop keeping an eye out on wireless traffic for these kinds of schemes. But, really, #1 should be enough to shut this sort of thing down. A simple "What's your secret confirmation passcode for this purchase?" sent from the bank's own node via an encrypted subscription for any purchase should be enough to prevent unauthorized purchases. Sure, some dumb people will have their passcode stored somewhere on the commlink (there's no accounting for human stupidity), but there's no reason to think the majority will, since responding to such a query is easy, and likely has been drilled in to the populace by the banks to prevent this sort of fraud. |
|
|
![]()
Post
#121
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,289 Joined: 2-October 08 Member No.: 16,392 ![]() |
1) Banking transactions should typically require biometric authorization, even for a $1 soycafe. They could also possibly require other autorization schemes (confirmation dialogues, passcodes, etc.), that come from the banking system, and not from the user's commlink. Meaning you'd have to hack the bank's node to bypass these schema. Uh. No you don't. If it's any kind of request from the bank to the compromised comlink, then it's bypassable at the comlink level. The bank queries a security question, the hacker gets the opportunity to spoof the response. |
|
|
![]()
Post
#122
|
|
Moving Target ![]() ![]() Group: Members Posts: 356 Joined: 3-April 10 Member No.: 18,409 ![]() |
Uh. No you don't. If it's any kind of request from the bank to the compromised comlink, then it's bypassable at the comlink level. The bank queries a security question, the hacker gets the opportunity to spoof the response. Sure. Spoof or hack. Regardless, the hacker would be spoofing the much more secure bank system than the personal commlink. |
|
|
![]()
Post
#123
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Validating Posts: 2,492 Joined: 19-April 12 Member No.: 51,818 ![]() |
There are a few deterrents to this kind of mass-hacking: 1) Banking transactions should typically require biometric authorization, even for a $1 soycafe. They could also possibly require other autorization schemes (confirmation dialogues, passcodes, etc.), that come from the banking system, and not from the user's commlink. Meaning you'd have to hack the bank's node to bypass these schema. A small-amount transaction is probably not going to require biometric authorisation. Also: if you ever need more than your own commlink to spend money, then effectively, you can't spend money. IOW: no matter what the bank does, if simply having (or controlling) the commlink in question is not sufficient to initiate, conduct, and successfully conclude even a SMALL transaction ... the entire premise of how SR4 handles money and electronic transfers breaks down completely. QUOTE 2) Assuming you got by #1, most people will notice that their accounts are shortchanged in due time, and report the descrepancy. [...] Key words, "in due time". True story: the other day, I glanced over the family cellphone bill out of curiousity, and because we've been discussing ways to tighten up our budget and save some money lately. I noticed two charges on my g/f's phone that seemed out of place - insurance for $7/month, and some download subscription for $4/month. The insurance has been getting paid, without being noticed, since she got the phone three or four years ago (and those payments have now exceeded the price of her phone, twice over). The download charge started LAST MAY, six months ago. And we're only JUST noticing it now. QUOTE 3) One hack might go undetected, and be impossible to trace. 1000 hacks will not only be detected, but will provide much more information for the investigators. They could pull security footage, correlate the locations of victims to determine where the attacker was sitting/standing/idling in their van, etc. Even if they cannot locate the current whereabouts of the hacker, they could easily determine a modus operandi, and set baits and traps for them. The honeypots, as someone else said, or just people on the lookout for this sort of fraud. That's why you (a) use a disguise, (b) pick a VERY busy place, © never go back to fetch the commlink, (d) set the commlink to delay the onset of it's hack attempts for 1 or 2 hours (it can spend the intervening time scanning and analysing the surrounding nodes to pick out he ones that aren't mobile - and pu them on it's "don't bother" list), and (e) use the Palming skill to surreptitiously Gecko-tape the commlink to the underside of something. As for the modus operandi, that's why I said you never repeat the same scam in the same location less than three months apart. Preferably less often than that. QUOTE But, really, #1 should be enough to shut this sort of thing down. A simple "What's your secret confirmation passcode for this purchase?" sent from the bank's own node via an encrypted subscription for any purchase should be enough to prevent unauthorized purchases. Sure, some dumb people will have their passcode stored somewhere on the commlink (there's no accounting for human stupidity), but there's no reason to think the majority will, since responding to such a query is easy, and likely has been drilled in to the populace by the banks to prevent this sort of fraud. Even if the system works that way, you know what happens? Your self-replicating Agent program is under orders: "Sit back and watch. When transactions are made, RECORD THE SECRET PASSCODE. Then and only then, send 5¥ to ____, and upon confirmation of the transaction, delete EVERYTHING from the commlink.... including yourself, last of all." And with Admin access to the commlink, even an encrypted subscription doesn't matter. The Agent would have the decryption keys. |
|
|
![]()
Post
#124
|
|
Running Target ![]() ![]() ![]() Group: Banned Posts: 1,105 Joined: 23-August 10 Member No.: 18,961 ![]() |
And there'd be a log of that particular access ID being the last thing in the node before everything crashed. Quick way to get caught.
|
|
|
![]()
Post
#125
|
|
Moving Target ![]() ![]() Group: Members Posts: 356 Joined: 3-April 10 Member No.: 18,409 ![]() |
A small-amount transaction is probably not going to require biometric authorisation. Also: if you ever need more than your own commlink to spend money, then effectively, you can't spend money. IOW: no matter what the bank does, if simply having (or controlling) the commlink in question is not sufficient to initiate, conduct, and successfully conclude even a SMALL transaction ... the entire premise of how SR4 handles money and electronic transfers breaks down completely. Hrm, I disagree (though that does not preclude me from being wrong). An example transaction from Bob to Sally, for $5: 1) Bob tells his commlink to transfer $5 to Sally's commlink. 2) Bob's commlink notifies Sally's commlink that a transfer shall take place. It gives her his banking information, and receives her banking information. Effectively a banking handshake. 3) Bob's commlink notifies his bank (hereforth known as Bank) to transfer funds to Sally's banking information (hereforth known as Recipient). 4) Bank sends a verification ping to Bob's commlink, for a verification passcode, biometric scan, (perhaps parental consent sent to a guardian's 'link), whatever, via encrypted subscription (basic encryption software baked into the banking software the commlink comes with). 5) Upon verification, Bank releases the funds to the Recipient, and logs the transaction. The handshake, and verification, are nigh instantaneous. So you can easily have it apply to any and all transactions. The only reason we forgo needing a signature for credit card purchases for amounts less than $20 today is because it's a hassle for the merchant (cost/benefit/risk analysis). Given the ease of obtaining verification there's no reason to not do it for every transaction. Can the verification be spoofed? Sure. But you're spoofing the bank's system, not the more vulnerable commlink. Key words, "in due time". True story: the other day, I glanced over the family cellphone bill out of curiousity, and because we've been discussing ways to tighten up our budget and save some money lately. I noticed two charges on my g/f's phone that seemed out of place - insurance for $7/month, and some download subscription for $4/month. The insurance has been getting paid, without being noticed, since she got the phone three or four years ago (and those payments have now exceeded the price of her phone, twice over). The download charge started LAST MAY, six months ago. And we're only JUST noticing it now. Certainly. I've had a similar situation happen to me. But when you're hacking large numbers of people, some of them quite possibly will notice something funny. Even if only 1% of people pay attention to their spending habits, that's still 1 person out of 100 that'll notice, which may (or may not) invite the banks to investigate for similar behaviors. If we're talking anecdotes, what about those people who get hacked, and are on a really tight budget? Suddenly they're getting overdraft notices for no reasons, because that $5 charge sent them over the edge. Or their rent check bounced because they had less money than they expected. All I'm saying, is that if you're hacking one or a handful of people for petty larceny, fine. Large scale? Odds become good that it gets noticed quickly by someone. That's why you (a) use a disguise, (b) pick a VERY busy place, © never go back to fetch the commlink, (d) set the commlink to delay the onset of it's hack attempts for 1 or 2 hours (it can spend the intervening time scanning and analysing the surrounding nodes to pick out he ones that aren't mobile - and pu them on it's "don't bother" list), and (e) use the Palming skill to surreptitiously Gecko-tape the commlink to the underside of something. As for the modus operandi, that's why I said you never repeat the same scam in the same location less than three months apart. Preferably less often than that. The "deployed commlink auto-hacking and stealing from people around it" bit has numerous problems, off the top of my head. From what happens when it fails a hack-on-the-fly (which will happen), to being detected, to being too-sophisticated for all but the most high-end agents (making it not cost effective), etc. IMO. Even if the system works that way, you know what happens? Your self-replicating Agent program is under orders: "Sit back and watch. When transactions are made, RECORD THE SECRET PASSCODE. Then and only then, send 5¥ to ____, and upon confirmation of the transaction, delete EVERYTHING from the commlink.... including yourself, last of all." And with Admin access to the commlink, even an encrypted subscription doesn't matter. The Agent would have the decryption keys. The main point I am trying to make, is that the banks will have had quite a bit of time to come up with ways to combat simple fraud/theft such as this. If this sort of hack is possible, confidence in the banking industry would be pretty shot. Any wiz wanna-be street hacker likely would try their hand at stealing from the patrons of the nearest Stuffer Shack. What if it's not just a passcode, but current biometrics, and a rotating "Secret Question" style sheet. Maybe it asks what the last transaction was, where you were the last time you made a transaction (or other meta-type questions). There's a bajillion potential verification methods the banks could use to prevent this sort of fraud. Can they prevent a dedicated hacker from doing a one-off? No. Can they limit mass theft scenarios? Hopefully. |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 6th June 2025 - 02:54 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.