A Shadowrunners Best Practices v0.1, -or- Standard Operating Procedure & Tricks of the Trade |
A Shadowrunners Best Practices v0.1, -or- Standard Operating Procedure & Tricks of the Trade |
Apr 4 2009, 02:59 AM
Post
#1
|
|
Moving Target Group: Members Posts: 115 Joined: 27-March 08 Member No.: 15,819 |
Maybe it’s the corps with their seemly unlimited resources and thirst for revenge. Or perhaps it’s the house of cards that is organized crime, where a runner inevitably gets burned first and buried last. Or it could be the nest of vipers that populate the shadowrunning underground. With everyone potentially an enemy, paranoia is a necessary survival skill.
I’m working on a checkpoint list of a “runner’s best practices.� I’ve been reading the forums for clever ideas, and I’d like thoughts and contributions. Ideally, this list could be handed to my GM as a kind of Standard Operating Procedure. So, what tricks would a runner have in place to watch his back, outsmart problems before they arrive, and generally keep as safe as possible? Cyberware • Cyberware: Skillwires, Skillwire Expert System, Cyberhand, Nanohive, Autoinjector & Datajack are hardwired, no wireless connection. These are hardwired connected to internal Commlink, with a connection that is disabled until activated with a manual switch hidden inside fingertip compartment. Commlink • Internal Commlink is turned off via DNI until needed. When activated, defaults to run encrypted and in hidden mode. • “Public� Commlink contains no files and secure wipes after every communication. Public Comm is physically turned off on runs. • Sensors records are all encrypted and stored at secure anonymous off-site. Files are protected with data bomb, and can only be accessed by providing approved biometrics within the correct 1/4 second time period per day. Content auto-deletes after two weeks unless specifically saved. • All software code and interface is in Arabic, and uses personalized, nonstandard OS with custom input protocols. • Facial/Image/Gait analysis software continually compares sensor records looking for potential tails. Alert is posted if unrecognized, improbable matches are detected. • Radio Signal Scanner and Scan program continually and automatically run passively, and work to identify, catalog, triangulate and associate transmissions in area. • Agents on Commlink constantly scans with Analyze to detect signs of intrusion. Alert posts if intrusion detected. • Separate instance of Analyze runs continually on Commlink to detect intrusion and status of Agent. Alert posts if intrusion detected. • Agents will initiate dynamic (re)encryption if decryption attempt detected. Gear • All gear has RFID tags physically removed. • Admin access required for all devices. All other levels disabled. • Signal transmission power for all gear automatically scales down to minimum distance based on proximity. • All signals are encrypted. Procedure • During meets, no food or drink is consumed, even if ordered. Surfaces are wiped down afterwards to remove fingerprints. • Every night, gear is cleaned and tag erased. Gear is weighed to identify hardened and stealth tags. • After every run, all software (including BIOs) is scanned and compared against backup copies at secure anonymous off-site. |
|
|
Lo-Fi Version | Time is now: 18th January 2025 - 07:14 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.