IPB

Welcome Guest ( Log In | Register )

2 Pages V  < 1 2  
Reply to this topicStart new topic
Tarantula
post Oct 23 2008, 04:49 PM
Post #26


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



QUOTE (cryptoknight @ Oct 23 2008, 09:43 AM) *
It's missions... it gives a timeframe for whats going to happen. There's very few times where I could see you needing to hack on the fly.


No security around connection to the network at all? No guards that patrol? They didn't notice the guy over in the corner slumped in full VR for a few hours?
Go to the top of the page
 
+Quote Post
cryptoknight
post Oct 23 2008, 06:30 PM
Post #27


Moving Target
**

Group: Members
Posts: 697
Joined: 18-August 07
Member No.: 12,735



QUOTE
What’s Up Chummer
As Belenkiy is a fast climbing executive, he is
privy to a wide collection of information. To protect
the company from his security codes falling into the
wrong hands, he has a Security RFID chip
embedded in his left thigh. That signal in
combination with his personal access codes will
grant access to the entire Ares R&D datastore.

Behind the Scenes
The PCs may attempt to hack the personnel files
of Ares to find out if he has an RFID chip, its
frequency, and attempt to triangulate his position
through a trace. If a hacker is able to brute force his
way into the commlink (see: The Kidnapping Site)
without the data being purged, it’s possible to
reverse engineer the security protocols and find out
what frequency the commlink is expecting the RFID
chip to transmit on. (Computer+Analyze(3))
Ares host Stats: (Response 6, Signal 6, System
6, Firewall 10, presume the device has all necessary
programs for associated tests at rating 6) PCs with
a greedy bent, will be able to download schematics
for several of the weapons still in development and
testing. Each success beyond the threshold on a
(Data Search + Browse (10, 30 seconds)) will gain
one point of paydata to a maximum of 10. See
Picking up the Pieces for resolution.
If the team succeeds at getting the frequency,
triangulating Belenkiy’s position will require an
extended search of the Denver LTG. Data Search +
Browse (16, 30 seconds) This threshold already
takes into account the static interference of the area
he’s in.
Rather than hacking, the PCs may try a more
diplomatic solution. Any Contact with a connection
rating of 4 can be used (Etiquette + Charisma(3)). If
the contact is within Ares, the connection rating only
needs to be 2. See Legwork for resolution.

Debugging
If Ares discovers the infiltration, they will launch
a trace. Once they have located the hacker, a
Knight Errant security team will be dispatched for the
arrest. (SR4, p. 275)
A diplomatic action resulting in a critical glitch,
tells Ares that someone is looking for Belenkiy. This
will confirm some of upper management’s fears.
The PCs won’t see the resolution here until much
later, contacts will come back with the phrase that
“Belenkiy is Sigma Nine� rather than the info that the
runners sought. If this condition is mentioned to
Belenkiy, he will visibly pale. This cryptic phrase is
an Ares’ internal designation for an individual who
has reached the glass ceiling for their career.
Primarily for someone who will now be regularly
passed over rather than an executive at the pinnacle
of his career, it’s a sign that upper management no
longer trusts the individual and may take more direct
action if substantiated proof can be found.


Tell me where in the mission it says this thing is not on the matrix?

I think they though that the firewall 10 would be a deterrent... it wasn't.
Go to the top of the page
 
+Quote Post
Tarantula
post Oct 23 2008, 06:46 PM
Post #28


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



The personnel files of ares, just chilling live connected to the matrix, directly?

No. They don't specify anything other than "the personnel files of Ares". To me, you'd have to actually get into an areas building to gain access to the link with that data.

By the same token, tell me where it says that it is on the matrix.
Go to the top of the page
 
+Quote Post
cryptoknight
post Oct 23 2008, 07:16 PM
Post #29


Moving Target
**

Group: Members
Posts: 697
Joined: 18-August 07
Member No.: 12,735



Simple...

it's Shadowrun Missions.

If you're supposed to actually raid Ares HQ, then information on raiding the Ares HQ would be in the mission.

It's not. Just the info on the node, ergo you have to hit it from the Matrix.

Also note that Ares will run a trace and dispatch Knight Errant.

If I were Ares and somebody had broken into my facility to hack my computer. Running a trace and then dispatching Knight Errant? On campus security should handle it. And if they're incommunicado, you send the HTR teams, not Knight Errant cops.


Also, there is no info on the node being in a room with RF inhibiting paint, and it has a signal of 6 so it's accessible from as far away as 10 KM.
Go to the top of the page
 
+Quote Post
Tarantula
post Oct 23 2008, 07:38 PM
Post #30


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



QUOTE (cryptoknight @ Oct 23 2008, 12:16 PM) *
Simple...

it's Shadowrun Missions.

If you're supposed to actually raid Ares HQ, then information on raiding the Ares HQ would be in the mission.

It's not. Just the info on the node, ergo you have to hit it from the Matrix.

Also note that Ares will run a trace and dispatch Knight Errant.

If I were Ares and somebody had broken into my facility to hack my computer. Running a trace and then dispatching Knight Errant? On campus security should handle it. And if they're incommunicado, you send the HTR teams, not Knight Errant cops.


Also, there is no info on the node being in a room with RF inhibiting paint, and it has a signal of 6 so it's accessible from as far away as 10 KM.

(IMG:style_emoticons/default/rotate.gif) My bad. And since they don't list clothing in the items the contacts have, they must run around naked too! How do they launch a trace? They don't have any IC or Deckers statted either! Oh, and it doesn't say you have to find the node either, so you just logon to your matrix, and just pull up the equivilent of "www.areshrdept.com" and get to work! In fact, it doesn't even mention any IC, so even if you did get caught, they can't start a trace because they have no one to start it with, and, even so, they don't even kick you out, and let you keep rummaging around in thei files until KE is able to get to where you're at. Of course, once you've spend a virtual eternity in their system (1-2 minutes in hot VR), you can just log out, spoof your comm id, and get some coffee down the street.


In fact, you could do this with a rating 1/1/1/1 commlink with an exploit program of 1, and browse 1. Why? Because they don't even kick you out when you're detected. And have absolutely no IC to speak of. Hell, with that kind of security, you could just edit yourself into their HR files, and start getting a paycheck.
Go to the top of the page
 
+Quote Post
AllTheNothing
post Oct 23 2008, 07:43 PM
Post #31


Moving Target
**

Group: Members
Posts: 997
Joined: 20-October 08
Member No.: 16,537



I'm to lazy to reread all the post for a check but, did anyone point the Ottimization option (Unwired p.115) allowes to run up to rating 12 on a response 6 comlink?
Go to the top of the page
 
+Quote Post
cryptoknight
post Oct 23 2008, 09:52 PM
Post #32


Moving Target
**

Group: Members
Posts: 697
Joined: 18-August 07
Member No.: 12,735



QUOTE (Tarantula @ Oct 23 2008, 02:38 PM) *
(IMG:style_emoticons/default/rotate.gif) My bad. And since they don't list clothing in the items the contacts have, they must run around naked too! How do they launch a trace? They don't have any IC or Deckers statted either! Oh, and it doesn't say you have to find the node either, so you just logon to your matrix, and just pull up the equivilent of "www.areshrdept.com" and get to work! In fact, it doesn't even mention any IC, so even if you did get caught, they can't start a trace because they have no one to start it with, and, even so, they don't even kick you out, and let you keep rummaging around in thei files until KE is able to get to where you're at. Of course, once you've spend a virtual eternity in their system (1-2 minutes in hot VR), you can just log out, spoof your comm id, and get some coffee down the street.


In fact, you could do this with a rating 1/1/1/1 commlink with an exploit program of 1, and browse 1. Why? Because they don't even kick you out when you're detected. And have absolutely no IC to speak of. Hell, with that kind of security, you could just edit yourself into their HR files, and start getting a paycheck.



Running a penetration of an Ares facility would not fit within the 4 hour targeted time limit of Shadow Run Missions. Are you familiar with them at all?

http://www.shadowrun4.com/missions/downloads/

There are entire sections about things to assume that NPCs have and things they don't have. For instance, all the ratings of an unstatted commlink are (Tablerating/2)+1. If they thought that the PCs would have to run a penetration of the Ares facility to hack the node that they spent half of one paragraph summarizing, then they'd have given more details. They didn't.

And if they had, they'd have blown the allotted convention time slot limit of 4 hours. Yet this node is apparently important enough to put it into a module, give it a firewall of 10 and let the hackers at it. They even put 10 points of paydata in the thing and gave it a cash value for after the mission sales.

The module itself takes place over about 16 hours of game time. If the players had planned a physical penetration of an Ares facility and done it, in a home game, I'd have given them bonus karma. The maximum karmic reward for this particular mission was 7 with great roleplaying.

I brought up the rating 10 firewall because this was about exceeding rating 6 on anything program wise. Since they did it in the missions games, which should be vetted by the same people who make the RPG, its quite possible that the ratings of programs may exceed 6. Because they also handwave hardware storage, bandwidth, etc for 4th edition, everybody carries a super-computer in their pocket that they paid no more than about ¥20,000 for.
Go to the top of the page
 
+Quote Post
damaleon
post Oct 23 2008, 10:28 PM
Post #33


Moving Target
**

Group: Members
Posts: 108
Joined: 12-March 06
From: TX
Member No.: 8,363



QUOTE (Prime Mover @ Oct 22 2008, 10:05 AM) *
Now onto "Why can't I make/program it, I have a 7 skill, run a cracker gang and am worth several hundred K?" Well other then interval time constraints whats a GM to do?

When I read this in the core book:
QUOTE
MATRIX ATTRIBUTES
Matrix attributes generally range in scale from 1 to 6, with the
lower ratings indicating cheap, outdated, or salvaged components/
soft ware and higher ratings refl ecting well-made parts/code. Some
cutting-edge and prototype models may exceed rating 6 attributes,
but these are exceptionally rare and hard to come by.

I see little problem in having it exist, and no problem adding some house rules adding requirements for it's development or aquisition.

Looking through Unwired, the only two places I remember having hardware higher than 6 were an Azzie facility and a Zurich Orbital ground station, both of which is going to have multi-million, if not billion nuyen, IT and development budgets.

A fully decked out commlink at 6, before programs, costs a little under 17000, with all rating 6 programs (not counting the new ones in Unwired) it jumps to just under 100k (IMG:style_emoticons/default/nuyen.gif) . That's at mass market pricing (or as close to mass market as high end and hacking software gets), taking full production runs for hardware, volume sales, etc. for reducing the end user cost. That isn't going to happen when it's prototypes or custom-built hardware.
I see it something like this, a console game these days can run more than 2 million dollars to make, so at $60, even if it was pure profit, would need to sell over 30,000 units to gross 2 million, and the game probably wouldn't be considered a rating 7+ program. If a hacker has a million nuyen to burn, I could see a possibility of being able to buy rating 7 hardware and some programs to make full use of it.

Since 1-6 covers what is fairly available on the market (legit or pirated) for hardware and software, I'd say if you want something at 7+, I see 3 straightforward ways you could go about getting it: (to reduce the size of the post I'm putting my thoughts on each in spoiler tags)

1. Raid on a Corp development/research lab.
[ Spoiler ]

2. Have a high rated contact in the right corp/shadow group (at least 5 connection rating) and you pay black market prices for it (the guy's most likely risking his life to get it to you).
[ Spoiler ]

3. Find a way to write it yourself.
[ Spoiler ]

Lastly, don't forget that new items/programs are always being developed, so that SOTA response chip you put in today could be the norm 6 months later. I'd degrade the rating on Response by 1 every 6 or 12 months of gametime until it's at 6 to reflect new hardware released.

On a slightly related note, as a house rule, I would apply a rating to Lifestyles (1 for Street, 6 for Luxury), average (rounding to nearest) which ones you were at after a year in game, and if you have any legal programs or commlink ratings above the average, you have to pay to keep them there.
[ Spoiler ]

Using something like this would give you a way to calculate the cost for keeping a rating 7 system and programs at 7, once you developed a cost structure.

As a quick touch on the Missions discussion, to probe the node you make a Exploit+Hacking(16, 1 hour) extended test (assuming your in VR) just to get basic access (the threshold is 22 if you want admin rights). If you average 4 hits, that's 4-7 hours to break into the node, as apposed to on the fly at (10, 1 IP) or (16, 1 IP) for admin (about 2 combat turns). Depending on how much time the rest of the mission has already taken, you may not have time to probe the target, so you risk the system's Analyze+Firewall (Stealth, 1 IP) test to detect your hack (which would likely start a trace if you triggered an alert). Given the nature of the module, limited play time, and with the given information, I don't see why this wouldn't be a matrix accessible node for the Denver Ares corp office (I think that's were that mission takes place). Heck, given the description given in previous posts, I wouldn't even have IC or spiders reveal themselves until a trace was completed, if then; just backhack the commlink to provide a location and guide KE in for the capture.
Go to the top of the page
 
+Quote Post
Tarantula
post Oct 23 2008, 10:39 PM
Post #34


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



QUOTE (cryptoknight @ Oct 23 2008, 02:52 PM) *
Running a penetration of an Ares facility would not fit within the 4 hour targeted time limit of Shadow Run Missions. Are you familiar with them at all?

http://www.shadowrun4.com/missions/downloads/

Yes, I know what they are.

QUOTE (cryptoknight @ Oct 23 2008, 02:52 PM) *
There are entire sections about things to assume that NPCs have and things they don't have. For instance, all the ratings of an unstatted commlink are (Tablerating/2)+1. If they thought that the PCs would have to run a penetration of the Ares facility to hack the node that they spent half of one paragraph summarizing, then they'd have given more details. They didn't.

Does it say to assume they are clothed? If not, do you assume they aren't?

QUOTE (cryptoknight @ Oct 23 2008, 02:52 PM) *
And if they had, they'd have blown the allotted convention time slot limit of 4 hours. Yet this node is apparently important enough to put it into a module, give it a firewall of 10 and let the hackers at it. They even put 10 points of paydata in the thing and gave it a cash value for after the mission sales.

My point, is such that because it is a missions game, they have chosen to have it on the matrix. I think, from a game standpoint, especially with how they'd handle it (trace and send KE) that its utter bullshit. As I said, a solid rating 1 commlink could be used to probe and hack the node, and get the information out, as well as hack around and edit pretty much whatever you wanted. With a rating 1 commlink. Due to area, a AAA megacorp, being too stupid to apparently employ security deckers or IC in their HR node.

QUOTE (cryptoknight @ Oct 23 2008, 02:52 PM) *
The module itself takes place over about 16 hours of game time. If the players had planned a physical penetration of an Ares facility and done it, in a home game, I'd have given them bonus karma. The maximum karmic reward for this particular mission was 7 with great roleplaying.

So, what do you do if they ask whats next to the building not described? Go, "Uhh, well... uhhh.... its in the city... so... theres part of the city next to it." What if they want to meet at a coffee shop to plan things out? "It doesn't say there are coffee shops so you can't do that."
Sounds to me like you let yourself get boxed in by what the missions game explicitly states exists, and put on blinders to anything else that could possibly be. It doesn't say if the node is on or off line. Thats your call to make.

Looking at the adventure... 1800 is when they meet. They have until 900 the next day, to get it done. Thats 15 hours. Assuming it takes about an hour for the meet, and then another hour before they even hear about the ID, they have 13 or so left. Its a threshold 16 test to get into the ares node. Up to 22 if they want admin access. (It also doesn't specify what kind of access they need to the node to get the info). Depending on what their hacking pool looks like, they might not be able to even get in in the time constraints. I realize you don't like that a rating 10 firewall is so easy to break into, but when the designers of the mission are so horrible as to say "well, its just sitting online for you to probe" basically is saying "I want you to hack this and theres no real consequences to doing so.

QUOTE (cryptoknight @ Oct 23 2008, 02:52 PM) *
I brought up the rating 10 firewall because this was about exceeding rating 6 on anything program wise. Since they did it in the missions games, which should be vetted by the same people who make the RPG, its quite possible that the ratings of programs may exceed 6. Because they also handwave hardware storage, bandwidth, etc for 4th edition, everybody carries a super-computer in their pocket that they paid no more than about ¥20,000 for.

Firewalls are not programs. They are a software attribute of a node. Your example fails for even your stated purpose.

Also, how does handwaving storage and bandwidth equate to computers can run programs of huge complexity? Oh, look, we made good hard drives and networking protocols, so obviously that makes computers run programs better. Sorry, I don't buy it. Especially since the basic 1-6 programs you run, tax your system and can cause penalties if you run too many of them.
Go to the top of the page
 
+Quote Post
JoelHalpern
post Oct 24 2008, 02:28 AM
Post #35


Moving Target
**

Group: Members
Posts: 656
Joined: 18-January 06
From: Leesburg, Virginia, USA
Member No.: 8,177



QUOTE (Tarantula @ Oct 23 2008, 06:39 PM) *
...
Firewalls are not programs. They are a software attribute of a node. Your example fails for even your stated purpose.

Also, how does handwaving storage and bandwidth equate to computers can run programs of huge complexity? Oh, look, we made good hard drives and networking protocols, so obviously that makes computers run programs better. Sorry, I don't buy it. Especially since the basic 1-6 programs you run, tax your system and can cause penalties if you run too many of them.


On the sescond part, note the optimization and ergonomics options which mean that you can run up to systems * 2 programs of system * 2 rating.

On the first point, it seems pretty odd to say that Firewalls are not programs. You write them with the software skill. It is a somewhat odd programs as it does not use program options (it is always running and does not count against limits, nor is it limitted) but it is software independent of a node. I can see maybe saying it is not a "program" the way the rules use the term. But it is not an "attribute of a node." It is a separate piece of software.

Joel
Go to the top of the page
 
+Quote Post
Fortune
post Oct 24 2008, 02:45 AM
Post #36


Immoral Elf
**********

Group: Members
Posts: 15,247
Joined: 29-March 02
From: Grimy Pete's Bar & Laundromat
Member No.: 2,486



Actually, it is an Attribute of a Node. Node Attributes include Signal, System, Response and Firewall.
Go to the top of the page
 
+Quote Post
fistandantilus4....
post Oct 24 2008, 02:59 AM
Post #37


Uncle Fisty
**********

Group: Admin
Posts: 13,891
Joined: 3-January 05
From: Next To Her
Member No.: 6,928



Tarantua, stop being deliberately antagonistic.
Go to the top of the page
 
+Quote Post

2 Pages V  < 1 2
Reply to this topicStart new topic

 

RSS Lo-Fi Version Time is now: 17th May 2025 - 09:24 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.