![]() ![]() |
Jan 16 2010, 11:43 AM
Post
#1
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 881 Joined: 31-July 06 From: Denmark Member No.: 8,995 |
How does everyone play this?
How often do you have cyberware scanners being used? Are cybered characters as much unable to go through security checkpoints as if they were carrying guns, so they're prevented from doing social infiltrations at secure facilities ("Hi, we're here to look at the plumbing")? Do cops and security patrols carry around cyberware and MAD scanners to check on suspicious intervals and at confrontations? With the low cost and long range of cyberware scanners, doesn't sammies stand out like a sore thumb? |
|
|
|
Jan 16 2010, 11:48 AM
Post
#2
|
|
|
jacked in ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 9,737 Joined: 26-February 02 Member No.: 463 |
Only use cyberware scanners in installations. No portable ones. That's simply too much. (IMG:style_emoticons/default/wink.gif)
But yeah, a sammy won't be bluffing his way into a secure facility like that. Bye Thanee |
|
|
|
Jan 16 2010, 11:56 AM
Post
#3
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,899 Joined: 29-October 09 From: Leiden, the Netherlands Member No.: 17,814 |
I was going to write a guideline to scanning people. I haven't gotten around to it yet, but I'll post it when I do.. it should also feature difficulties of scanning for nonmetal stuff. I figure it'd be nice to have one paper covering all the different things to scan for.
|
|
|
|
Jan 16 2010, 01:21 PM
Post
#4
|
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,849 Joined: 26-February 02 From: Melbourne, Australia Member No.: 872 |
Man on Computer: Who are you?
Fletch: Hello, I'm Peter Lemon-Jello and they told me to tell you your house is on fire. Man on Computer: Thank you! Good bless you! Fletch: [to himself] Thank you for believing this shit! - J. |
|
|
|
Jan 17 2010, 08:31 AM
Post
#5
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,705 Joined: 5-October 09 From: You are in a clearing Member No.: 17,722 |
I've said it before and i'll say it again.
You can buy/make badges. No matter what sort of restricted, illegal or openly hostile shit you've got going on, you can pretend to be a guy who is supposed to have that on him. Pretending to be the plumber isn't going to work though. |
|
|
|
Jan 17 2010, 09:18 AM
Post
#6
|
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
i am reminded of the movie version of johnny mnemonic, where the airport security gate things the implant is for medical reasons.
checking the tables in the back of augmentation brings up some interesting stuff. Most of whats there is either not regulated (altho some are hard to get hold of) but interestingly enough, bone lacing is forbidden. I would have thought that at least the basic plastic one would be highly interesting for geriatric medical use... oh wait, there is a unregulated bioware called bone density, costs a arm and a leg, but is unregulated. the rating 1 version would probably be a grandma option. still, most of this stuff is not illegal, tho i guess a guard would raise a eyebrow on some of the clearly weaponized variants. |
|
|
|
Jan 17 2010, 01:37 PM
Post
#7
|
|
|
Incertum est quo loco te mors expectet; ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 6,548 Joined: 24-October 03 From: DeeCee, U.S. Member No.: 5,760 |
It would be nice if the book presented cyberware from the point of view of legitimate buyers (if only noting 'this is a medical implant', 'this is a common security implant', etc.)
However, yes, you have a few options... 1) generate credentials justifying your having them by virtue of rank 2) generate notes jutifying your having them because of a civilian, non-dangerous necessity 3) have your decker bust into the system to edit it as necessary 4) have your mage use a spell which fools scanners 5) find a way to sneak around the scanners/get on at a later point 6) hand over sufficient bribes/take advantage of contacts 7) shoot your way through I'm sure you can think of more! |
|
|
|
Jan 17 2010, 03:15 PM
Post
#8
|
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,289 Joined: 2-October 08 Member No.: 16,392 |
It would be nice if the book presented cyberware from the point of view of legitimate buyers (if only noting 'this is a medical implant', 'this is a common security implant', etc.) Agreed. Same with bioware, so we have a means of comparison (bone lacing vs. bone density). |
|
|
|
Jan 17 2010, 04:54 PM
Post
#9
|
|
|
The back-up plan ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Retired Admins Posts: 8,423 Joined: 15-January 03 From: San Diego Member No.: 3,910 |
If you have a copy of Runner's Companion, Chapter 2 discusses travel and smuggling. In that section, it discusses specific techniques for bypassing security, such as false credentials, bribery, cons, and the ever famous rope-a-dope. There is also gear included at the end of the section to help with smuggling. Fluff for the win!
|
|
|
|
![]() ![]() |
|
Lo-Fi Version | Time is now: 14th May 2026 - 07:16 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.