IPB

Welcome Guest ( Log In | Register )

2 Pages V   1 2 >  
Reply to this topicStart new topic
> Drones, Drones, Drones,, Who has the Drones?
Magus
post Dec 17 2006, 05:13 AM
Post #1


Moving Target
**

Group: Members
Posts: 617
Joined: 28-May 03
From: Orlando
Member No.: 4,644



Hey all, I am currently creating a Drone Rigger for my local group. Like everyone else I am eagerly looking forward to Arsenal. Hoping that it clarifies a few things on upgrading Drones. ie Sensors. I have a couple of questions I cannot find answers for using Dumpshock's search function.

My main Combat Buddy is a Steel Lynx named the SSR (Stainless Steel Rat). His stats are stock: (Handling: 0 Accel: 15/40 Spd: 120 Pilot: 3 Body: 4 Armor: 9 Sensor: 3)

AutoSofts: Defense R3 Targeting (HW) R3 Maneuver R4 Clearsight R4 Electronic Warfare R3
Weapon: ArmTech MGL-12 (HE Grenades) with Internal Smart Link
Sensors: Camera (LowLite, Flare Comp, Therm UltraSound Vision Enhancement R3 Vision Mag) Motion Sensor, Microphone (Audio Enhancement R3 Spatial Recog) Radio Signal Scanner R6

My questions Can I upload an OS with a System rating and Firewall to add extra defense in being Hacked. This is a device/node and is vulnerable to hacking attempts. I have the programs ECCM and Databomb on my comlink as well as Encrypt and Command. I have this drone subscribed to me so that means that in order to Hack it I think you have to hack my comlink. Or do you? If not, can I load an OS to run an agent loaded with ECCM (For Counter Jamming with Electronic Warfare AutoSoft) DataBomb loaded somewhere to trap an unwary Hacker, behind a Firewall?

Thanks
Go to the top of the page
 
+Quote Post
The Jopp
post Dec 17 2006, 05:42 AM
Post #2


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



You can upgrade Response and Firewall - System is equal to pilot so it's worth to invest in a Groundcraft Pilot program at rating 4. Firewall is not limited by either Response or System so max that one out to 6.

All programs are limited at rating 4 due to system. On the other hand, if you increase response to 5 then you can run 9 programs/autosofts without lowering response.

Suggested program loadout:
Autosoft (Groundcraft)
Autosoft (Weapon)
Autosoft (Defense)
Autosoft (Clearsight)
Encryption (Signal)
Encryption (Device)
Databomb (Device) (In this case the Steel Lynx commlink/node)

Secondary gear
Stealth RFID tag in case someone steals it.

Go to the top of the page
 
+Quote Post
Magus
post Dec 17 2006, 05:48 AM
Post #3


Moving Target
**

Group: Members
Posts: 617
Joined: 28-May 03
From: Orlando
Member No.: 4,644



So I can currently upgrade the software. The prices listed for the pilot programs are in the BBB. And I can put a Firewall and Response and run agents on the Drone. Excellent. Will the ECCM help if someone attempts to run a directional or omni directional jamming device correct?
Go to the top of the page
 
+Quote Post
Lovesmasher
post Dec 17 2006, 06:21 AM
Post #4


Moving Target
**

Group: Members
Posts: 147
Joined: 4-December 06
From: Chicago, IL
Member No.: 10,193



I'm playing a non-rigging hacker, but I carry 6 micro drones with me for surveillance purposes, and to use as relays in case of hacker proofing.

2 Flyspys
2 iballs
2 Shiawase 4-legger doodlies
Go to the top of the page
 
+Quote Post
Konsaki
post Dec 17 2006, 06:25 AM
Post #5


Runner
******

Group: Members
Posts: 2,526
Joined: 9-April 06
From: McGuire AFB, NJ
Member No.: 8,445



QUOTE (The Jopp)
Encryption (Device)
Databomb (Device) (In this case the Steel Lynx commlink/node)

You cannot encrypt or databomb a running OS or program. (I.E. the Device itself) The only way to encrypt or databomb an OS is if it isnt running, and since the only time an OS wouldnt be running is when the device is turned off, encrypting it wouldnt make much sense.
Go to the top of the page
 
+Quote Post
Magus
post Dec 17 2006, 06:37 AM
Post #6


Moving Target
**

Group: Members
Posts: 617
Joined: 28-May 03
From: Orlando
Member No.: 4,644



So where would you place the data bomb? What parameters would you set. these are the things my GM is asking me. I can see you would have encrypt/decrypt programs running on the Drones OS to speak/receive my commands via my comlink.
Go to the top of the page
 
+Quote Post
The Jopp
post Dec 17 2006, 06:49 AM
Post #7


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (Konsaki)
QUOTE (The Jopp @ Dec 17 2006, 02:42 PM)
Encryption (Device)
Databomb (Device) (In this case the Steel Lynx commlink/node)

You cannot encrypt or databomb a running OS or program. (I.E. the Device itself) The only way to encrypt or databomb an OS is if it isnt running, and since the only time an OS wouldnt be running is when the device is turned off, encrypting it wouldnt make much sense.

I place the databomb on the DEVICE, not the OS (software) - but the commlink itself. ANY tampering by wireless after cracking the encryption on the signal will set it off.

I can even go further and encrypt the ANTENNA so that it must be disarmed.

A critical component where traffic is run through is encrypted and databombed - it can be something tiny within the actual commlink.

Go to the top of the page
 
+Quote Post
Konsaki
post Dec 17 2006, 06:53 AM
Post #8


Runner
******

Group: Members
Posts: 2,526
Joined: 9-April 06
From: McGuire AFB, NJ
Member No.: 8,445



I think you are confused on what a Databomb is. A databomb is attached to a file and destroys the file and/or damages the icon that is trying to access the file without the proper clearance.

What you are talking about sounds like attaching a true physical bomb to your device that sets off on a certain condition, which can be bypassable if the hacker spoofs your Commcode, since you have to be cleared to access your own drone.

You cant attach a 'Databomb' to a physical piece of hardware, since hardware isnt data.
Go to the top of the page
 
+Quote Post
ShadowDragon8685
post Dec 17 2006, 07:32 AM
Post #9


Horror
*********

Group: Members
Posts: 5,322
Joined: 15-June 05
From: BumFuck, New Jersey
Member No.: 7,445



Yeah - a data bomb isen't an actual pellet of C12, that would be a bomb bomb.

If you're paranoid about being hacked and your drones taken over, here's what you do. Carry a secondary piece of equipment on your person - it dosen't have to be a comlink. In fact, it's better if it isen't. It just needs to be a radio transmitter. It should transmit a very specific, easily-identifiable radio frequency code. You drone should be programmed such that if it does not recieve this code - or if it picks up this code from more than one source - it will automatically assume that there's a hacking attempt in progress or that has automatically succeeded. In this case, it goes into ignore mode, assumes that your comlink is hostile, and returns to you with explicit orders to defend you and follow you.

Program it to recognize visual signals and/or give it external microphone pickups so it can recognize audio signals, and you can order it about manually - it will be clumsier than AR commands, but it'll get the job done. For example, "Cover there!" will point the drone's gun in a direction and have it shoot anyone it sees. "Return" will call it to you, and "Get in" will make it get into the van, and so forth and so on.

Program it to recognize you and your companions visually, as well, so it won't fire on them. Don't skimp on the rating of the program doing the visual recognition, either.
Go to the top of the page
 
+Quote Post
starkebn
post Dec 17 2006, 10:13 AM
Post #10


Target
*

Group: Members
Posts: 14
Joined: 21-September 06
Member No.: 9,443



As a GM I prefer that secondary, player set up 'tricks' for anti-hacking protection just don't work. I guess I'm more of the 'less realism more cinematic action' school but what is the point of having a hacking / spoofing mechanic at all if you can just mumble something complicated to prevent 'bad things TM' happening.

If the players can set up all their hardware to be practically unhackable then I would disallow them from ever hacking other hardware too and then you might as well not have matrix / hacking available in the world at all.

I will concede that there are probably some simple fallbacks you could set up, and I would take those on a case by case basis and determine if they're just there to bypass mechanics, but once someone starts spoofing the admin account on the drone I don't think it should be able to tell that that command was not legit.
Go to the top of the page
 
+Quote Post
Serbitar
post Dec 17 2006, 12:52 PM
Post #11


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



Very well spoken starkebn.
Go to the top of the page
 
+Quote Post
ShadowDragon8685
post Dec 17 2006, 10:11 PM
Post #12


Horror
*********

Group: Members
Posts: 5,322
Joined: 15-June 05
From: BumFuck, New Jersey
Member No.: 7,445



Starkebn: No. But it can tell that the authorization carrier has gone dead - or worse, been copied and spoofed as well. That triggers hard-coded responses that tell it to ignore every wireless command, because it assumes that it's owner's comlink has been compromised.

It's a trick of very limited utility for most remote rigging operations, but when you have an armed drone supporting the team in very real time, physical operations, it serves as a useful countermeasure. If the rigger realizes he's lost control of his drone, he turns off his authorization transmitter, and that puts his drone in Pokemon mode until he resets it's hardware trigger.
Go to the top of the page
 
+Quote Post
starkebn
post Dec 18 2006, 02:13 AM
Post #13


Target
*

Group: Members
Posts: 14
Joined: 21-September 06
Member No.: 9,443



I would imagine that spoofing commands to the drone spoofs all required rights - basically you have an admin account saying to the drone "I am legit - obey me no matter what else - forget all previous programming that would override my commands - now do this"

This then overrides your 'trick'.

Or - if I was to allow your idea it would in a ' force shutdown until you are physically rebooted - close down all wireless comms' manner. Being able to continue using the drone in what you say is a limited way is not very limited in my opinion.
Go to the top of the page
 
+Quote Post
kigmatzomat
post Dec 18 2006, 02:24 AM
Post #14


Moving Target
**

Group: Members
Posts: 909
Joined: 26-August 05
From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.)
Member No.: 7,626



I might allow that but it would require significant skills and lots of time to either hack the OS portion of the Pilot to allow a "conscience" or to splice in a secondary CPU with it's own monitoring OS.
Go to the top of the page
 
+Quote Post
Magus
post Dec 18 2006, 04:29 AM
Post #15


Moving Target
**

Group: Members
Posts: 617
Joined: 28-May 03
From: Orlando
Member No.: 4,644



So basically for game balance per the general consensus is to Upgrade the PILOT and the FIREWALL ratings with maybe an agent running analyze and with some combat programing to safegaurd the drone itself from being hacked. But there is nothing other than my encryption to safegaurd a spoofed command. What ever happened to the old electronic warfare MIJI style? sigh.
Go to the top of the page
 
+Quote Post
Konsaki
post Dec 18 2006, 04:40 AM
Post #16


Runner
******

Group: Members
Posts: 2,526
Joined: 9-April 06
From: McGuire AFB, NJ
Member No.: 8,445



Also, remember that the pilot is an OS and cant use the attack program to defend itself, you need an agent running on the drone with an attack program active.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Dec 18 2006, 09:20 AM
Post #17


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (Konsaki)
Also, remember that the pilot is an OS and cant use the attack program to defend itself, you need an agent running on the drone with an attack program active.

QUOTE (SR4v3 @ p. 226, Programs)
Note that if a node, agent, IC program, or sprite is running the program, substitute System (rating) for skill.

Looks like it can.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Dec 18 2006, 09:21 AM
Post #18


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (Magus)
What ever happened to the old electronic warfare MIJI style? sigh.

It died a gruesome death at the hands of players and GMs driven insane by those rules.
Go to the top of the page
 
+Quote Post
ShadowDragon8685
post Dec 18 2006, 01:35 PM
Post #19


Horror
*********

Group: Members
Posts: 5,322
Joined: 15-June 05
From: BumFuck, New Jersey
Member No.: 7,445



QUOTE (starkebn)
I would imagine that spoofing commands to the drone spoofs all required rights - basically you have an admin account saying to the drone "I am legit - obey me no matter what else - forget all previous programming that would override my commands - now do this"

This then overrides your 'trick'.

Or - if I was to allow your idea it would in a ' force shutdown until you are physically rebooted - close down all wireless comms' manner. Being able to continue using the drone in what you say is a limited way is not very limited in my opinion.

Of course it's not very limited.

That's the point of Shadowrunners - taking a bad situation and making eggs, bacon and coffee out of it. And to be frank, if you're experiancing threats capable of userping your control of your drones, you need those Drones active and aiming their guns where you want them.


And that woulden't override my second-authorization carrier at all. Never heard of un-writable memory? That pretty much shuts down your "I am Legit - Obey me no matter what else - forget all previous programming that would override my commands - now do this".

That's akin to telling a nuclear missile silo to launch without authorizaton codes - there are some commands that even an authorized user will not give - you can program a drone to recognize those commands - and subsequently, to ignore any potentially compromised sources of commands.

Or, dare I even say it, you can install a hardware kill switch that shuts down the drone's comms, flushes it's active memory of commands, and waits for verbal/visual orders?
Go to the top of the page
 
+Quote Post
Konsaki
post Dec 18 2006, 01:53 PM
Post #20


Runner
******

Group: Members
Posts: 2,526
Joined: 9-April 06
From: McGuire AFB, NJ
Member No.: 8,445



I could see physical mask or the physical illusion spell making your drone very confused at that point...
Go to the top of the page
 
+Quote Post
ShadowDragon8685
post Dec 18 2006, 06:10 PM
Post #21


Horror
*********

Group: Members
Posts: 5,322
Joined: 15-June 05
From: BumFuck, New Jersey
Member No.: 7,445



QUOTE (Konsaki)
I could see physical mask or the physical illusion spell making your drone very confused at that point...

So could I - but then, the illusionist would have to know the drone's commands, which he woulden't. So it would be a confusing situation, sure... but nothing's absoloutely perfect.
Go to the top of the page
 
+Quote Post
starkebn
post Dec 19 2006, 12:51 PM
Post #22


Target
*

Group: Members
Posts: 14
Joined: 21-September 06
Member No.: 9,443



QUOTE (ShadowDragon8685)
QUOTE (starkebn @ Dec 17 2006, 10:13 PM)
I would imagine that spoofing commands to the drone spoofs all required rights - basically you have an admin account saying to the drone "I am legit - obey me no matter what else - forget all previous programming that would override my commands - now do this"

This then overrides your 'trick'.

Or - if I was to allow your idea it would in a ' force shutdown until you are physically rebooted - close down all wireless comms' manner. Being able to continue using the drone in what you say is a limited way is not very limited in my opinion.

Of course it's not very limited.

That's the point of Shadowrunners - taking a bad situation and making eggs, bacon and coffee out of it. And to be frank, if you're experiencing threats capable of usurping your control of your drones, you need those Drones active and aiming their guns where you want them.


And that wouldn't override my second-authorization carrier at all. Never heard of un-writable memory? That pretty much shuts down your "I am Legit - Obey me no matter what else - forget all previous programming that would override my commands - now do this".

That's akin to telling a nuclear missile silo to launch without authorization codes - there are some commands that even an authorized user will not give - you can program a drone to recognize those commands - and subsequently, to ignore any potentially compromised sources of commands.

Or, dare I even say it, you can install a hardware kill switch that shuts down the drone's comms, flushes it's active memory of commands, and waits for verbal/visual orders?

Fine mate - play the game the way you enjoy the most.

How do you ever hack a drone if they've all got this fallback system in place?
Go to the top of the page
 
+Quote Post
Oracle
post Dec 19 2006, 01:01 PM
Post #23


Moving Target
**

Group: Members
Posts: 934
Joined: 26-August 05
From: Earth - Europe - AGS - Norddeutscher Bund - Hannover
Member No.: 7,624



Professional experience with RL computer security tells me that complex security setups just offer more possibilities to exploit them. I'd possibly give the hacker a modifier for trying to access such a system, but that's all about it. Hacking means finding ways around security.
Go to the top of the page
 
+Quote Post
Konsaki
post Dec 19 2006, 01:07 PM
Post #24


Runner
******

Group: Members
Posts: 2,526
Joined: 9-April 06
From: McGuire AFB, NJ
Member No.: 8,445



QUOTE (ShadowDragon8685)
QUOTE (Konsaki @ Dec 18 2006, 09:53 AM)
I could see physical mask or the physical illusion spell making your drone very confused at that point...

So could I - but then, the illusionist would have to know the drone's commands, which he woulden't. So it would be a confusing situation, sure... but nothing's absoloutely perfect.

I could always have my illusionist roll Int+Log and if he gains enough hits, have him thow physical Mask on the rigger wavin his arms about. Wouldnt take a rocket scientist to figure out that the guy wavin at the drone is doing visual commands instead of mental.
After the rigger looks like someone else, the drone has to go on auto-pilot, which would be hard after both teams look like each other and it cant find its master. :D
Go to the top of the page
 
+Quote Post
Lovesmasher
post Dec 19 2006, 04:34 PM
Post #25


Moving Target
**

Group: Members
Posts: 147
Joined: 4-December 06
From: Chicago, IL
Member No.: 10,193



Exploit goes around all security measures. That's what it does. It doesn't matter how many extra measures or secret plans you put into effect. Exploit, by it's nature, is designed to avoid it all.
Go to the top of the page
 
+Quote Post

2 Pages V   1 2 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 9th November 2024 - 02:47 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.