Drones, Drones, Drones,, Who has the Drones? |
Drones, Drones, Drones,, Who has the Drones? |
Dec 17 2006, 05:13 AM
Post
#1
|
|
Moving Target Group: Members Posts: 617 Joined: 28-May 03 From: Orlando Member No.: 4,644 |
Hey all, I am currently creating a Drone Rigger for my local group. Like everyone else I am eagerly looking forward to Arsenal. Hoping that it clarifies a few things on upgrading Drones. ie Sensors. I have a couple of questions I cannot find answers for using Dumpshock's search function.
My main Combat Buddy is a Steel Lynx named the SSR (Stainless Steel Rat). His stats are stock: (Handling: 0 Accel: 15/40 Spd: 120 Pilot: 3 Body: 4 Armor: 9 Sensor: 3) AutoSofts: Defense R3 Targeting (HW) R3 Maneuver R4 Clearsight R4 Electronic Warfare R3 Weapon: ArmTech MGL-12 (HE Grenades) with Internal Smart Link Sensors: Camera (LowLite, Flare Comp, Therm UltraSound Vision Enhancement R3 Vision Mag) Motion Sensor, Microphone (Audio Enhancement R3 Spatial Recog) Radio Signal Scanner R6 My questions Can I upload an OS with a System rating and Firewall to add extra defense in being Hacked. This is a device/node and is vulnerable to hacking attempts. I have the programs ECCM and Databomb on my comlink as well as Encrypt and Command. I have this drone subscribed to me so that means that in order to Hack it I think you have to hack my comlink. Or do you? If not, can I load an OS to run an agent loaded with ECCM (For Counter Jamming with Electronic Warfare AutoSoft) DataBomb loaded somewhere to trap an unwary Hacker, behind a Firewall? Thanks |
|
|
Dec 17 2006, 05:42 AM
Post
#2
|
|
Runner Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
You can upgrade Response and Firewall - System is equal to pilot so it's worth to invest in a Groundcraft Pilot program at rating 4. Firewall is not limited by either Response or System so max that one out to 6.
All programs are limited at rating 4 due to system. On the other hand, if you increase response to 5 then you can run 9 programs/autosofts without lowering response. Suggested program loadout: Autosoft (Groundcraft) Autosoft (Weapon) Autosoft (Defense) Autosoft (Clearsight) Encryption (Signal) Encryption (Device) Databomb (Device) (In this case the Steel Lynx commlink/node) Secondary gear Stealth RFID tag in case someone steals it. |
|
|
Dec 17 2006, 05:48 AM
Post
#3
|
|
Moving Target Group: Members Posts: 617 Joined: 28-May 03 From: Orlando Member No.: 4,644 |
So I can currently upgrade the software. The prices listed for the pilot programs are in the BBB. And I can put a Firewall and Response and run agents on the Drone. Excellent. Will the ECCM help if someone attempts to run a directional or omni directional jamming device correct?
|
|
|
Dec 17 2006, 06:21 AM
Post
#4
|
|
Moving Target Group: Members Posts: 147 Joined: 4-December 06 From: Chicago, IL Member No.: 10,193 |
I'm playing a non-rigging hacker, but I carry 6 micro drones with me for surveillance purposes, and to use as relays in case of hacker proofing.
2 Flyspys 2 iballs 2 Shiawase 4-legger doodlies |
|
|
Dec 17 2006, 06:25 AM
Post
#5
|
|||
Runner Group: Members Posts: 2,526 Joined: 9-April 06 From: McGuire AFB, NJ Member No.: 8,445 |
You cannot encrypt or databomb a running OS or program. (I.E. the Device itself) The only way to encrypt or databomb an OS is if it isnt running, and since the only time an OS wouldnt be running is when the device is turned off, encrypting it wouldnt make much sense. |
||
|
|||
Dec 17 2006, 06:37 AM
Post
#6
|
|
Moving Target Group: Members Posts: 617 Joined: 28-May 03 From: Orlando Member No.: 4,644 |
So where would you place the data bomb? What parameters would you set. these are the things my GM is asking me. I can see you would have encrypt/decrypt programs running on the Drones OS to speak/receive my commands via my comlink.
|
|
|
Dec 17 2006, 06:49 AM
Post
#7
|
|||||
Runner Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
I place the databomb on the DEVICE, not the OS (software) - but the commlink itself. ANY tampering by wireless after cracking the encryption on the signal will set it off. I can even go further and encrypt the ANTENNA so that it must be disarmed. A critical component where traffic is run through is encrypted and databombed - it can be something tiny within the actual commlink. |
||||
|
|||||
Dec 17 2006, 06:53 AM
Post
#8
|
|
Runner Group: Members Posts: 2,526 Joined: 9-April 06 From: McGuire AFB, NJ Member No.: 8,445 |
I think you are confused on what a Databomb is. A databomb is attached to a file and destroys the file and/or damages the icon that is trying to access the file without the proper clearance.
What you are talking about sounds like attaching a true physical bomb to your device that sets off on a certain condition, which can be bypassable if the hacker spoofs your Commcode, since you have to be cleared to access your own drone. You cant attach a 'Databomb' to a physical piece of hardware, since hardware isnt data. |
|
|
Dec 17 2006, 07:32 AM
Post
#9
|
|
Horror Group: Members Posts: 5,322 Joined: 15-June 05 From: BumFuck, New Jersey Member No.: 7,445 |
Yeah - a data bomb isen't an actual pellet of C12, that would be a bomb bomb.
If you're paranoid about being hacked and your drones taken over, here's what you do. Carry a secondary piece of equipment on your person - it dosen't have to be a comlink. In fact, it's better if it isen't. It just needs to be a radio transmitter. It should transmit a very specific, easily-identifiable radio frequency code. You drone should be programmed such that if it does not recieve this code - or if it picks up this code from more than one source - it will automatically assume that there's a hacking attempt in progress or that has automatically succeeded. In this case, it goes into ignore mode, assumes that your comlink is hostile, and returns to you with explicit orders to defend you and follow you. Program it to recognize visual signals and/or give it external microphone pickups so it can recognize audio signals, and you can order it about manually - it will be clumsier than AR commands, but it'll get the job done. For example, "Cover there!" will point the drone's gun in a direction and have it shoot anyone it sees. "Return" will call it to you, and "Get in" will make it get into the van, and so forth and so on. Program it to recognize you and your companions visually, as well, so it won't fire on them. Don't skimp on the rating of the program doing the visual recognition, either. |
|
|
Dec 17 2006, 10:13 AM
Post
#10
|
|
Target Group: Members Posts: 14 Joined: 21-September 06 Member No.: 9,443 |
As a GM I prefer that secondary, player set up 'tricks' for anti-hacking protection just don't work. I guess I'm more of the 'less realism more cinematic action' school but what is the point of having a hacking / spoofing mechanic at all if you can just mumble something complicated to prevent 'bad things TM' happening.
If the players can set up all their hardware to be practically unhackable then I would disallow them from ever hacking other hardware too and then you might as well not have matrix / hacking available in the world at all. I will concede that there are probably some simple fallbacks you could set up, and I would take those on a case by case basis and determine if they're just there to bypass mechanics, but once someone starts spoofing the admin account on the drone I don't think it should be able to tell that that command was not legit. |
|
|
Dec 17 2006, 12:52 PM
Post
#11
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
Very well spoken starkebn.
|
|
|
Dec 17 2006, 10:11 PM
Post
#12
|
|
Horror Group: Members Posts: 5,322 Joined: 15-June 05 From: BumFuck, New Jersey Member No.: 7,445 |
Starkebn: No. But it can tell that the authorization carrier has gone dead - or worse, been copied and spoofed as well. That triggers hard-coded responses that tell it to ignore every wireless command, because it assumes that it's owner's comlink has been compromised.
It's a trick of very limited utility for most remote rigging operations, but when you have an armed drone supporting the team in very real time, physical operations, it serves as a useful countermeasure. If the rigger realizes he's lost control of his drone, he turns off his authorization transmitter, and that puts his drone in Pokemon mode until he resets it's hardware trigger. |
|
|
Dec 18 2006, 02:13 AM
Post
#13
|
|
Target Group: Members Posts: 14 Joined: 21-September 06 Member No.: 9,443 |
I would imagine that spoofing commands to the drone spoofs all required rights - basically you have an admin account saying to the drone "I am legit - obey me no matter what else - forget all previous programming that would override my commands - now do this"
This then overrides your 'trick'. Or - if I was to allow your idea it would in a ' force shutdown until you are physically rebooted - close down all wireless comms' manner. Being able to continue using the drone in what you say is a limited way is not very limited in my opinion. |
|
|
Dec 18 2006, 02:24 AM
Post
#14
|
|
Moving Target Group: Members Posts: 909 Joined: 26-August 05 From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.) Member No.: 7,626 |
I might allow that but it would require significant skills and lots of time to either hack the OS portion of the Pilot to allow a "conscience" or to splice in a secondary CPU with it's own monitoring OS.
|
|
|
Dec 18 2006, 04:29 AM
Post
#15
|
|
Moving Target Group: Members Posts: 617 Joined: 28-May 03 From: Orlando Member No.: 4,644 |
So basically for game balance per the general consensus is to Upgrade the PILOT and the FIREWALL ratings with maybe an agent running analyze and with some combat programing to safegaurd the drone itself from being hacked. But there is nothing other than my encryption to safegaurd a spoofed command. What ever happened to the old electronic warfare MIJI style? sigh.
|
|
|
Dec 18 2006, 04:40 AM
Post
#16
|
|
Runner Group: Members Posts: 2,526 Joined: 9-April 06 From: McGuire AFB, NJ Member No.: 8,445 |
Also, remember that the pilot is an OS and cant use the attack program to defend itself, you need an agent running on the drone with an attack program active.
|
|
|
Dec 18 2006, 09:20 AM
Post
#17
|
|||||
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Looks like it can. |
||||
|
|||||
Dec 18 2006, 09:21 AM
Post
#18
|
|||
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
It died a gruesome death at the hands of players and GMs driven insane by those rules. |
||
|
|||
Dec 18 2006, 01:35 PM
Post
#19
|
|||
Horror Group: Members Posts: 5,322 Joined: 15-June 05 From: BumFuck, New Jersey Member No.: 7,445 |
Of course it's not very limited. That's the point of Shadowrunners - taking a bad situation and making eggs, bacon and coffee out of it. And to be frank, if you're experiancing threats capable of userping your control of your drones, you need those Drones active and aiming their guns where you want them. And that woulden't override my second-authorization carrier at all. Never heard of un-writable memory? That pretty much shuts down your "I am Legit - Obey me no matter what else - forget all previous programming that would override my commands - now do this". That's akin to telling a nuclear missile silo to launch without authorizaton codes - there are some commands that even an authorized user will not give - you can program a drone to recognize those commands - and subsequently, to ignore any potentially compromised sources of commands. Or, dare I even say it, you can install a hardware kill switch that shuts down the drone's comms, flushes it's active memory of commands, and waits for verbal/visual orders? |
||
|
|||
Dec 18 2006, 01:53 PM
Post
#20
|
|
Runner Group: Members Posts: 2,526 Joined: 9-April 06 From: McGuire AFB, NJ Member No.: 8,445 |
I could see physical mask or the physical illusion spell making your drone very confused at that point...
|
|
|
Dec 18 2006, 06:10 PM
Post
#21
|
|||
Horror Group: Members Posts: 5,322 Joined: 15-June 05 From: BumFuck, New Jersey Member No.: 7,445 |
So could I - but then, the illusionist would have to know the drone's commands, which he woulden't. So it would be a confusing situation, sure... but nothing's absoloutely perfect. |
||
|
|||
Dec 19 2006, 12:51 PM
Post
#22
|
|||||
Target Group: Members Posts: 14 Joined: 21-September 06 Member No.: 9,443 |
Fine mate - play the game the way you enjoy the most. How do you ever hack a drone if they've all got this fallback system in place? |
||||
|
|||||
Dec 19 2006, 01:01 PM
Post
#23
|
|
Moving Target Group: Members Posts: 934 Joined: 26-August 05 From: Earth - Europe - AGS - Norddeutscher Bund - Hannover Member No.: 7,624 |
Professional experience with RL computer security tells me that complex security setups just offer more possibilities to exploit them. I'd possibly give the hacker a modifier for trying to access such a system, but that's all about it. Hacking means finding ways around security.
|
|
|
Dec 19 2006, 01:07 PM
Post
#24
|
|||||
Runner Group: Members Posts: 2,526 Joined: 9-April 06 From: McGuire AFB, NJ Member No.: 8,445 |
I could always have my illusionist roll Int+Log and if he gains enough hits, have him thow physical Mask on the rigger wavin his arms about. Wouldnt take a rocket scientist to figure out that the guy wavin at the drone is doing visual commands instead of mental. After the rigger looks like someone else, the drone has to go on auto-pilot, which would be hard after both teams look like each other and it cant find its master. :D |
||||
|
|||||
Dec 19 2006, 04:34 PM
Post
#25
|
|
Moving Target Group: Members Posts: 147 Joined: 4-December 06 From: Chicago, IL Member No.: 10,193 |
Exploit goes around all security measures. That's what it does. It doesn't matter how many extra measures or secret plans you put into effect. Exploit, by it's nature, is designed to avoid it all.
|
|
|
Lo-Fi Version | Time is now: 9th November 2024 - 02:47 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.