![]() |
![]() ![]() |
![]() |
![]()
Post
#1
|
|
Moving Target ![]() ![]() Group: Members Posts: 661 Joined: 23-March 03 Member No.: 4,322 ![]() |
In Slacker's First Run game that we are doing with 4th edition rules, we just had the lights go out. Now, it didn't occur to me til after about a turn in the dark, that with my commlink and Cyber eyes, I could probably bring up the map of the Stuffer Shack, and put dots in place to represent my teammates (the ones with commlinks anyway). I could almost certainly do that in a window.
I wonder if I couldn't do that as an ARO, overlaying the map of the store over my Thermo so I would know where the shelves, aisles, cash registers, etc are. Which brings up the question, how integrated can you get. Take the example above, make a window thats a map of the store, could I inject objects that my teamates are seeing (assume cyber-eyes/camera) and have red dots pop up to represent those hostiles that my teamates are targeting, or yellows for npcs? Is there an actuall limit on this sort of thing? |
|
|
![]()
Post
#2
|
|
Target ![]() Group: Members Posts: 26 Joined: 26-February 02 Member No.: 1,679 ![]() |
I guess you would need several complex actions to program up the AROs to get data flowing unless you had prepared certain pieces of software beforehand.
It would also require the store to have a VR map, I can imagine the big superstores having one, mom and pop stores are less likely or more likely to be out of date (where did that case of SoyPOP come from?). Other than practicalities I can't see any problem with the idea, with sufficient data it should be possible to completely negate darkness penalties. |
|
|
![]()
Post
#3
|
|
Chicago Survivor ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,079 Joined: 28-January 04 From: Canton, GA Member No.: 6,033 ![]() |
This is why it's goog to invest in an agent or have the hacker play the additional role of tactical data manager. What you describe is in the Buzzkill fluff fiction. Someone took camera, map, and other data and put it all together as an overlay to what each person saw, with big red X's representing the bad guys.
|
|
|
![]()
Post
#4
|
|
Moving Target ![]() ![]() Group: Members Posts: 112 Joined: 26-February 02 Member No.: 1,896 ![]() |
Does anyone have the specific actions and thresholds required to do what was done in Buzz!Kill? The compilation of the data into a tactical overlay and broadcast to teammates?
|
|
|
![]()
Post
#5
|
|
Moving Target ![]() ![]() Group: Members Posts: 268 Joined: 26-February 02 From: Brisbane, Australia Member No.: 78 ![]() |
It would involve hacking in to the security system of the building, the difficulty of which would depend on the appropriate IC/Firewall etc. Once in, I'd make it a "control devices" action to get the appropriate feeds piped to the rest of the team
|
|
|
![]()
Post
#6
|
|
Moving Target ![]() ![]() Group: Members Posts: 112 Joined: 26-February 02 Member No.: 1,896 ![]() |
Ok, so hack the building to get security access. Grab location map. Grab camera feeds (one action per camera?). Edit the map using camera feeds. Send to teammates. So something like 4 actions once you have access to the system. Would you have to do anything to keep that updating in real-time?
|
|
|
![]()
Post
#7
|
|
Moving Target ![]() ![]() Group: Members Posts: 909 Joined: 26-August 05 From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.) Member No.: 7,626 ![]() |
I haven't read Buzzkill but I'd guess the hacker simply accessed the store's broadcast map ("Find CheezNerps on Aisle 4, shelf 3!!!") and slugged it across the comms. The public map would already be GPS detailed so the stim-addled clientelle can follow their comms' glowing arrows to their soyfood.
That's maybe a datasearch test and a copy action, assuming he's part of the team's secure comm system. I might not even require a datasearch to get the data if the hacker has a habit of collecting public data. It might require a an extra copy action to get it from his public comm to his secure comm, though. (He is running with 2 comms, right?) Adding the baddies to the map would be an edit action, though I'd probably make it Perception+Edit to see how close the hacker gets the data. Unless he can hack the security system and pull up some better coordinate data he's just eyeballing them. OOOOOO! Genius moment! He can hack their Comms to get their GPS data! Hmmm. This has implications...... |
|
|
![]()
Post
#8
|
|
Chicago Survivor ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,079 Joined: 28-January 04 From: Canton, GA Member No.: 6,033 ![]() |
if you've hacked that far, might as well screw up their data feeds, like having all their "targets" running out the door.
|
|
|
![]()
Post
#9
|
|||
Running Target ![]() ![]() ![]() Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 ![]() |
If they are all subscribed as one to the controlling node then it'd be one action to control them. If they are subscribed individually, then yeah it'd be one Control action per camera. |
||
|
|||
![]()
Post
#10
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,086 Joined: 26-February 02 Member No.: 364 ![]() |
Someone had commented in one of these threads that they'd wished that the Tactical Computer headware had been included in the main book. At this point though, you have to wonder do we even need it anymore? Aside from the inititiave boosts, we've already got most all its functions duplicated.
|
|
|
![]()
Post
#11
|
|
The Dragon Never Sleeps ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 6,924 Joined: 1-September 05 Member No.: 7,667 ![]() |
Tactical Computer -- Dedicated hardware performs better at the cost of not being as flexible.
|
|
|
![]()
Post
#12
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,420 Joined: 30-October 03 Member No.: 5,776 ![]() |
Well in the game she is talking about, besides it being dark and the question of if the cameras have thermographic vision, the cameras are also completely deactivated, so in this particular case, she can't do what the hacker did in Buzz Kill, which was hack the cameras to spot enemies and setup designators to display in the vision of the team members (any enemies out of camera view 'disappeared').
For this game, I've just said that Stuffer Shack has a map available to customers to help their shopping needs, with specials connected to the map breaking up pop-up adds as she moves around the store. She'll have to talk to the resident hacker if she wants anything more than that. |
|
|
![]()
Post
#13
|
|||
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,651 Joined: 23-September 05 From: Marietta, GA Member No.: 7,773 ![]() |
The Tactical Computer implant and BattleTac gear were some of my favorite toys in SR3, likely due to the eternal love I have for the Tribes (1 & 2) FPS game. It's true that AR can accomplish all of those functions and more at this point; however, it looks like it still requires a hacker to be sitting there and manually correlating the data feeds. Maybe the TacComp/BattleTac in 2070 would be nothing more than a program that handles all of those administrative actions for you automagically. |
||
|
|||
![]()
Post
#14
|
|
Chicago Survivor ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,079 Joined: 28-January 04 From: Canton, GA Member No.: 6,033 ![]() |
I'm thinking an agent dedicated to the correlation and dissemination. It runs browse or analyze on the hacker's feeds picking out pertinent data and sending it out.
|
|
|
![]()
Post
#15
|
|
Moving Target ![]() ![]() Group: Members Posts: 112 Joined: 26-February 02 Member No.: 1,896 ![]() |
Would that Agent require Tranfer as well in order to send the files?
|
|
|
![]()
Post
#16
|
|
Chicago Survivor ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,079 Joined: 28-January 04 From: Canton, GA Member No.: 6,033 ![]() |
I don't see transfer as a program.
|
|
|
![]()
Post
#17
|
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 ![]() |
You could replace the System of your Commlink with a Pilot, too.
|
|
|
![]()
Post
#18
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,651 Joined: 23-September 05 From: Marietta, GA Member No.: 7,773 ![]() |
There we go, we just built us a BattleTac.
Now we slap some frontline dobies and defensive autoturrets into the network and proceed to zerg the opposition via telepresence. The more reliable, less replaceable meatbodied participants will likely appreciate the covering fire and live intel. The hacker is then freed up to attempt more dastardly deeds. |
|
|
![]()
Post
#19
|
|||
Moving Target ![]() ![]() Group: Members Posts: 238 Joined: 18-August 05 Member No.: 7,569 ![]() |
It's Edit. |
||
|
|||
![]()
Post
#20
|
|||
Moving Target ![]() ![]() Group: Members Posts: 112 Joined: 26-February 02 Member No.: 1,896 ![]() |
Oops... Transfer is an action that may or may not require an Edit utility. :oops: |
||
|
|||
![]()
Post
#21
|
|||
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,086 Joined: 26-February 02 Member No.: 364 ![]() |
Mostly, anyway. It's always a good idea to check and monitor that kind of setup on a periodic basis to make sure that the opposition hasn't compromised it. |
||
|
|||
![]()
Post
#22
|
|||
Running Target ![]() ![]() ![]() Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 ![]() |
Pilot's can only use an EW Autosoft to aid in this, though, right? Their perception is so horrendous I can't imagine not using an Agent or Sprite... |
||
|
|||
![]()
Post
#23
|
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 ![]() |
Not quite.. when required Computer, Cybercombat, Data Search, and Hacking, they use Pilot - for Electronic Warfare, use the Autosoft.
So, actually, Agents or Sprites don't have the Electronic Warfare Skill at all, just letting those programs run themselves. |
|
|
![]()
Post
#24
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 ![]() |
Can they use Cybercombat without an Attack/Blackout/Blackhammer Program?
[I know, I know, it might be a judgment call by the GM...] |
|
|
![]()
Post
#25
|
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 ![]() |
No Program, no Roll.
|
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 11th February 2025 - 05:05 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.