Signal Jamming with Commlink, Software Jamming perhaps? |
Signal Jamming with Commlink, Software Jamming perhaps? |
Jan 16 2007, 12:29 PM
Post
#1
|
|
Runner Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
Software Jamming
(Electronic Warfare + Attack) VS (Signal + ECCM) A character who has intercepted a wireless signal can attempt to scramble the connection and effectively jam the signal. The attacker inserts a random stream of data and tries to disrupt the connection. Make an opposed test and any net successes reduce the signal rating by one for each net success. ECCM adds to the signals rating for calculating signal as normal. What do you think? It's not a blanket jamming of an area but rather a disruption of a specifik signal. |
|
|
Jan 16 2007, 02:38 PM
Post
#2
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
I like it. I wonder if is shouldn't be Electronic Warfare + Edit vs. Signal + ECCM to represent the alteration of the original signal, but that's probably immaterial. It's a nice idea either way.
|
|
|
Jan 16 2007, 02:49 PM
Post
#3
|
|||||
Runner Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
Well, the reason I choose the attack program was from it's description:
I focused on the part of killing processes and introducing random input as an attempt to disrupt the connection or to insert as much random noise into the signal as possible. |
||||
|
|||||
Jan 16 2007, 03:38 PM
Post
#4
|
|
Genuine Artificial Intelligence Group: Members Posts: 4,019 Joined: 12-June 03 Member No.: 4,715 |
I think this is a very cool idea.
Using Attack seems somehow wrong to me. I see your point, but it still seems very different. Of course, I'm not sure what should be used either. Honestly, I think it's worth considering making into it's own program entirely. It's a pretty powerful idea, and that would add some balance. Also, the quality of the jamming (i.e. program rating) should probably be limited to the program rating (as normal) OR the commlink's signal rating, whichever is lower. A cheap commlink with a few dozen meter range just shouldn't be able to "talk loud enough" to jam a powerful transmitter effectively. |
|
|
Jan 16 2007, 08:39 PM
Post
#5
|
|
Moving Target Group: Members Posts: 745 Joined: 2-January 07 From: Los Angeles, CA Member No.: 10,510 |
Awesome. I like!
I have some comments though. Let me know what you think: 1) You might want to use the word "distortion" instead of jamming since that seems to be cause some confusion. Jamming tends to imply interference rather than distortion, given the way the rules read. 2) Who opposes this test? Is it the sender or the reciever? I could kind of see the argument for both, but I think the reciever would make more sense. Can you "jam" someone at your location to prevent them from calling for help (or at least giving accurate details)? Could you "jam" someone who was with you to prevent them from properly recieving all incoming transmissions? Could you be sitting in your home and "jam" some random phonecall you found on the Matrix? Could you choose either the sender or the reciever? Can you sit at home, see a news broadcast you don't like, and then get online and "jam" its transmission? 3) If successful, the reciever just gets Noise. Would this count as "encrypted" or just be totally useless? 4) I agree that the description of Attack sounds appropriate enough, but I'm with Moon-Hawk. I think it should be its own program. Although, I'm personally of the opinion there should be different Attack programs much like there are different weapons, but that's niether here nor there... 5) Why Signal? Signal of reciever or signal of sender? Neither seems to make sense under your description of how this "jamming" works. Firewall doesn't really make sense either, but given that its the omni-defense against all hacking assaults as things stand now, why not use Firewall + ECCM? |
|
|
Jan 16 2007, 08:43 PM
Post
#6
|
|||
Moving Target Group: Members Posts: 777 Joined: 22-November 06 Member No.: 9,934 |
seems great for if you don't know the origin point...but... wouldn't it be faster easier and just altogether more effective to shoot the comlink with a taser? |
||
|
|||
Jan 16 2007, 08:47 PM
Post
#7
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
You might not be there!
Comments: - why restrict to wireless? -Signal should be irrelevant. As this is purely about data integrity. Make the test: Electronic warfare + X vs System + ECCM - Let the weakest link (sender, reciever) do the test (per number of dice) |
|
|
Jan 16 2007, 08:49 PM
Post
#8
|
|||
Moving Target Group: Members Posts: 745 Joined: 2-January 07 From: Los Angeles, CA Member No.: 10,510 |
You could always tell when a street jam tries to post on the hacker forums... :) You think all your problems can be dealt with just be shooting whatever's bothering you? You're probably right, but that doesn't mean we shouldn't try for a little style, a little finesse. It's the Wireless World after all; he who controls the signal controls the world!!! Muahahahahaha! |
||
|
|||
Jan 16 2007, 08:51 PM
Post
#9
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
The rules for finding and supressing a specific connection using are found in the Electronic Warfare Chapter.
|
|
|
Jan 16 2007, 09:09 PM
Post
#10
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
Not software jamming that can sever non-wireless connections.
Though, I think it should be much harder, because you could throw back a hacker into his home node by severing his data trail. |
|
|
Jan 16 2007, 10:09 PM
Post
#11
|
|||
Moving Target Group: Members Posts: 777 Joined: 22-November 06 Member No.: 9,934 |
if there's no signal you control nothing... |
||
|
|||
Jan 16 2007, 10:50 PM
Post
#12
|
|||||
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
But you can't stop the signal :grinbig: |
||||
|
|||||
Jan 16 2007, 11:07 PM
Post
#13
|
|||||
Moving Target Group: Members Posts: 745 Joined: 2-January 07 From: Los Angeles, CA Member No.: 10,510 |
Control is an illusion. Power, control, even the world - these are transitory, illusionary beliefs of our limited existance. Only two things really exist - Signal and Noise, and the battle between the two is the only true constant worth believing in. Y0u can n3v3r st0p the s1gnal. |
||||
|
|||||
Jan 17 2007, 12:06 AM
Post
#14
|
|||
Moving Target Group: Members Posts: 777 Joined: 22-November 06 Member No.: 9,934 |
bzzzzzzt. I just did |
||
|
|||
Jan 17 2007, 07:01 AM
Post
#15
|
|
Moving Target Group: Members Posts: 375 Joined: 15-November 06 From: Salem, Dwarven Hell (Tir Tairngier) Member No.: 9,865 |
Actually if you "Attack" their drivers you might be able to sever the signal between the signal "chip" and the system. Of course then you probably couldn't do anything with their commlink, but it would get it out of the way for a while.
|
|
|
Jan 18 2007, 12:28 AM
Post
#16
|
|
Moving Target Group: Members Posts: 107 Joined: 21-December 06 Member No.: 10,413 |
Its already covered in the rules. :)
First locate the wireless target. Electronic Warfare + Scan ( Variable target number) Second Intercept its wireless signal Electronic Warfare + Sniffer ( 3) Third decrypt the signal Decrypt + Response ( 2x encryption) Fourth insert static Computer + Edit per combat turn This method can't be detected due to step two, and allows you to avoid having to connect to the device in question. The drawback is the time limit imposed by the edit command when your not in control of the device rather then the signal. Heck you can even get snippy, once you've established the intercept you can get an Agent to continue to loop the Edit leaving you to enjoy what ever else your doing. |
|
|
Lo-Fi Version | Time is now: 2nd January 2025 - 03:33 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.