IPB

Welcome Guest ( Log In | Register )

4 Pages V   1 2 3 > »   
Reply to this topicStart new topic
> Wi-Fi Detection to easy?, Shadowrunners better go primitive
Lorka
post May 2 2007, 07:17 PM
Post #1


Target
*

Group: Members
Posts: 19
Joined: 4-November 02
Member No.: 3,556



I stumbled on this paragraph: Wi-Fi Detection its on page 256.

It say that security will more likely than not be scanning for hidden networks, since an unknow hidden network equals an intruder.

Now this seems reasonable, in fact having seen it, I cannot imagine matrix security not doing something like this.

Now scanning for hidden networks in generel is on page 225 under Detecting Wireless Networks: Electronic Warfare + Scan (15+, 1 Combat Turn).

Lets say you have an automated system with good rating concidering a starting or low Karma team that would be a dice pool of 8. Lets just do the convert to hits meaning 2 hits each combat turn. So after 8 combat turns the system have found and possibly triangulated the location of the intruders.

In other words do to this rules you either have to hack into the system and stop the scanning or you will fail unless you can do the run in 8 combat turns or less.

Now you can also choose to go primitive and not use any Wi-Fi at all and more and more points me into the direction that Shadowrunners should use no Wi-Fi in most cases.

Any comments, something I have misunderstood?
Go to the top of the page
 
+Quote Post
Bigity
post May 2 2007, 07:21 PM
Post #2


Shooting Target
****

Group: Members
Posts: 1,840
Joined: 24-July 02
From: Lubbock, TX
Member No.: 3,024



I would imagine the scanning is not done every combat turn, but at periodic intervals, as you are just eating up resources in a massive way otherwise.

So maybe every 10 minutes, until a passive alert or IC notifies a security decker that something fishy is going on, and then it can be ramped up to a more frequent interval.
Go to the top of the page
 
+Quote Post
Lorka
post May 2 2007, 07:27 PM
Post #3


Target
*

Group: Members
Posts: 19
Joined: 4-November 02
Member No.: 3,556



Hmm what sounds reasonable, if it generates 2 hits every 10 mins then you have about and hour to an hour and half before your cover is blown should you be using commlinks in hidden mode.

I guess that is workable, as long as all shadowrunners know that is how it is, if you dont hack the system you have to do the sneaky work in one hour - seems ok to me.
Go to the top of the page
 
+Quote Post
Moon-Hawk
post May 2 2007, 07:46 PM
Post #4


Genuine Artificial Intelligence
********

Group: Members
Posts: 4,019
Joined: 12-June 03
Member No.: 4,715



QUOTE (Bigity)
as you are just eating up resources in a massive way otherwise.

Are you though? Does this require more than a commlink, a program, and an agent?
Go to the top of the page
 
+Quote Post
2bit
post May 2 2007, 07:52 PM
Post #5


Moving Target
**

Group: Members
Posts: 749
Joined: 28-July 05
Member No.: 7,526



actually Lorka it just says scanning for local networks, not hidden networks.
QUOTE (SR4 pg 256)
Many security networks—especially those monitored by
spiders—automatically scan local wireless networks within
range for signs of unusual activity. Th ese networks will take note
of new networks, perhaps even intercepting the signal to monitor
or sniff out illicit activity. Security may even triangulate a
network using multiple signals to determine of the network
is originating from within its own boundaries. For this reason
smart shadowrunners operate in hidden mode while on runs.
For more details on detecting networks, see p. 225.

So... whew! Good thing they aren't smart enough to search for hidden networks every now and then! :sarcasm:
Go to the top of the page
 
+Quote Post
Bigity
post May 2 2007, 07:56 PM
Post #6


Shooting Target
****

Group: Members
Posts: 1,840
Joined: 24-July 02
From: Lubbock, TX
Member No.: 3,024



Actually, I would still have highly secure sites periodically scan for hidden nodes, especially after suspicious activity begins to occur.
Go to the top of the page
 
+Quote Post
2bit
post May 2 2007, 07:57 PM
Post #7


Moving Target
**

Group: Members
Posts: 749
Joined: 28-July 05
Member No.: 7,526



But seriously, the problem is just that the test is way, way too easy. I would make generous use of the plus in "15+" for the threshold if I were you.
Go to the top of the page
 
+Quote Post
Demon_Bob
post May 2 2007, 08:03 PM
Post #8


Moving Target
**

Group: Members
Posts: 511
Joined: 24-March 05
From: On a ledge between Heaven and Hell
Member No.: 7,226



Always wondered why a infiltration team would be constantly broadcasting.

Even if the signal was encripted, and in short bursts it still is detectable.
For an mission going on in a more open, public area there reality of hidden comms being discovered in with all the other transmissions are nigh improbable.

In a secure office building with Wi-Fi blocking paint where only the strongest broadcasts get through, a radio scanner running constantly could detect transmissions. Combined with an analyze progam looking for unauthorized or encripted transmissions, and stealth becomes more difficult. They don't need to find unauthorized nodes just unauthorized broadcasts.

The more broadcasts in the area, the harder it is to find the ones that are not supposed to be there. A candle at night in the desert can be spotted fairly easily unless your in Los Vegas.

Always imagined a good team as knowing each others locations and movement, and acting as one, without the need of fancy electronics. Each team member is resposible for gathering info in thier fields of expertise, covering the areas the others can not so that thier team mates can concentrate on the areas that they need to. Create overlappin fields of fire, and if it is not your zone keep an eye on the flanks. Finding out that your surrounded after your buddy goes down is never good.

I got sidetracked. My vote is to maintain radio silence. Communicate with hand signals. Blend into the background as much as possible. Leave no evidence of your passing.
Go to the top of the page
 
+Quote Post
2bit
post May 2 2007, 08:15 PM
Post #9


Moving Target
**

Group: Members
Posts: 749
Joined: 28-July 05
Member No.: 7,526



yeah, good points. For my taste, the flavor is - security networks don't scan for hidden nodes until an alert is triggered. And then, it takes as long as is dramatically appropriate... usually minutes, not seconds. because really, once their signals are triangulated, the hammer will fall hard.
Go to the top of the page
 
+Quote Post
Thane36425
post May 2 2007, 08:34 PM
Post #10


Moving Target
**

Group: Members
Posts: 548
Joined: 21-December 06
Member No.: 10,416



Since most intruders would probably be roaming around at night, they could just reset the existing wireless system to watch for unauthorized networks. If the system would be up and running all during the day, letting it run at night at a lower level just listening for activity wouldn't be that much more expensive. It would be like many places leaving computers on all night and many of the lights.

My teams have also gone back to hand signals and such, using the comms only when they are detected already. If the building isn't completely shielded, a rigger or another lookout will broadcast updates, but the team will remain silent. Frustrating for the lookout, which is why they are usually a trusted NPC or secondary PC character, but it works.

If the teams split up, to take multiple objectives, it is assumed the other team is doing alright unless and alert goes off or they call to say they are pulling out or whatever. In those cases, both teams withdraw immediately.

Also, everyone either uses skinlinks or wires to connect their personal networks. No broadcasting, no way to hack in.
Go to the top of the page
 
+Quote Post
Lorka
post May 2 2007, 08:43 PM
Post #11


Target
*

Group: Members
Posts: 19
Joined: 4-November 02
Member No.: 3,556



Well ok so you all agree its better to go with out wireless, its just build into the game that Shadowrunners go in with hidden commlinks, its states this explicitly somewhere.
My point was that it would be stupid to do so.

But if you assume it makes a test every 10 mins or so, that would give you 1 hour before your networks are discovered this seems ok with me. And in that case there is no reason not to take advantage of full simsense by the team.
Go to the top of the page
 
+Quote Post
Dread Polack
post May 2 2007, 09:18 PM
Post #12


Moving Target
**

Group: Members
Posts: 160
Joined: 14-November 03
From: MSP Metroplex
Member No.: 5,822



Well, when a PC scans for hidden nodes, for the most part, he's finding nodes that have stayed within his signal range during the scan. Also, it's 15+, being up to the GM quite a bit. If a security hacker/decker decided at 2:00 am to begin scanning for hidden nodes, got 2 hits per combat turn, he'd start turning them up round 2:00:24, but some would pop up and drop off like if you were walking down the street with a laptop, scanning for wireless routers. Cars, pedestrians, drones, etc. would be turning up, and the person scanning would have to decide what's an intruder or not.

Of course, if the building is insulated, any hidden nodes could be considered an intruder.

The question is: with a 15+ threshold, when exactly is a particular node detected when a device is constantly and automatically scanning? You could say that the scanning device begins accumulating hits when the node enters its signal range. Even then, with a 15+ threshold to find [I]all[i] hidden nodes, how do you know when a [i]particular[i] PC's node is found?

In addition, in order to triangulate a signal, shouldn't you have to hack into the device and do a trace first? Maybe not if you have a number of devices under your control that are all detecting the device directly.

Dread Polack

Go to the top of the page
 
+Quote Post
mfb
post May 2 2007, 09:25 PM
Post #13


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



realistically, scanning for hidden networks should be impossible. a hidden network is going to be one that changes its frequency several hundred times per second. that's just encryption, though, so in SR, it actually shouldn't be that hard to crack.
Go to the top of the page
 
+Quote Post
Cheops
post May 2 2007, 11:27 PM
Post #14


Shooting Target
****

Group: Members
Posts: 1,512
Joined: 26-February 02
Member No.: 392



You could also say that if you wanted to scan for hidden nodes using the EW skill instead of the Data Search skill (BBB 220) you must be within direct signal range of the target. In that case it'd need to have a decent signal making it vulnerable to external hacking (barring paint) or else to jamming (the action probably can't tell the difference between jamming and regular interference). So if it isn't an actual person sitting there constantly scanning for signals, just turn on an area jammer every 10 seconds or so to force the scan to redetect you.
Go to the top of the page
 
+Quote Post
WhiskeyMac
post May 2 2007, 11:53 PM
Post #15


Moving Target
**

Group: Members
Posts: 433
Joined: 26-February 02
From: Somewhere in Iraq
Member No.: 1,789



To stay in touch just use the Micro-Transceiver. For Rating 6 it's only 1200 :nuyen: and available at chargen. From canon it can be hacked but it has a device rating of 6 (all stats are 6: Response; Signal; Firewall; System) so you can load it up with Encrypt 6 and even some heavy-duty IC or Agents. Personally though, as GM, I would just have the Micro-Transceiver be able to be jammed, not hacked.
Go to the top of the page
 
+Quote Post
hobgoblin
post May 3 2007, 12:09 AM
Post #16


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



Big question is, how noisy is the building after hours in data traffic terms? That seems to be the biggest key.
Go to the top of the page
 
+Quote Post
Thane36425
post May 3 2007, 12:23 AM
Post #17


Moving Target
**

Group: Members
Posts: 548
Joined: 21-December 06
Member No.: 10,416



QUOTE (hobgoblin)
Big question is, how noisy is the building after hours in data traffic terms? That seems to be the biggest key.

That's a good point. If the building should be quiet, like most office buildings after hours, then any signal would be much easier to detect.

Breaking encryption wouldn't matter so much. If the signals can be detected and tracked, that's all that is really important. You can always break the encryption later on the recordings of the signals and ask the targets what they were up to when you catch them.

AR and such could still be used by the characters, so long as they aren't transmitting. Each character could have the layout of the building programmed into their system so they could have a map on display all the time. Other things like codes, locations of cameras and all that could also be included. Need to update something between team members? If they are close, why bother with wireless when a handshake connected skinlink between PANs could do the job? That or gather round and use a quick burst with a meter or two transmission range, enough to hit all the team mates but not enough to go very far.
Go to the top of the page
 
+Quote Post
hobgoblin
post May 3 2007, 01:38 AM
Post #18


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



Still, unless everything is turned off, And i do mean everything, there will still be things like cleaning bots and similar going on. And how do patroling guards communicate back if not by wifi? How much of the system is wired when you can slap some blocking paint on the outer walls and forget about it? Will there not be devices left on all over the building?

edit:

re-read the part about locating nodes. and it seem that that as long as the node is in hidden mode, it makes it much harder to detect. you may detect a burst of traffic, but as it will only talk to other nodes that it has on its subscription list, any attempt at making it say "yes, im here" will fail. this is unlike a active node that continually broadcast where it is, and the passive node that while not broadcasting, will reply if queried.

so while the spider may go "hmm, what was that" unless there is continual, high-density traffic (like say streaming video or audio) it will be hard to lock it down and the spider may disregard it as just a glitch or maybe a echo. radio signals have a habbit of bouncing of stuff, thats how radar works. and UWB, ultra wide band, can even bounce off flesh and water. and they are planning to use that both to look for items under peoples clothing, and to transmitt high amount of data short distances (next gen bluetooth, wireless USB and similar).

another open question is if one can select to dial back a devices signal rating. of one can, then yes, having short range coms may be workable. that is unless there is a wifi spot in every corridor or similar. maybe each camera is a wifi device.

but all in all, the matrix rules are so open that different groups can play this differently. it also leads to endless debates like this one ;)
Go to the top of the page
 
+Quote Post
WhiskeyMac
post May 3 2007, 03:09 AM
Post #19


Moving Target
**

Group: Members
Posts: 433
Joined: 26-February 02
From: Somewhere in Iraq
Member No.: 1,789



I just had an idea. If the guards communicate using Wi-Fi themselves, would it be possible to utilize their channel for your communication by just using a different encryption? Since the spider would expect the guards to communicate on that channel, what would be the chances he/she would be able to find the runners using that channel? Is that even possible?
Go to the top of the page
 
+Quote Post
hobgoblin
post May 3 2007, 03:14 AM
Post #20


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



given that real life wifi works not on so much a single channel but a list of channels, jumping between them to get the best signal to noise and so on (all iirc), the way to tell guards from runners would be by their comlinks access id...

remember, wifi is bursts of data, not walkie talkie style "press to talk, release to listen" systems. they are like cabled data networks, only using radio rather then cables.
Go to the top of the page
 
+Quote Post
KarmaInferno
post May 3 2007, 03:14 AM
Post #21


Old Man Jones
********

Group: Dumpshocked
Posts: 4,415
Joined: 26-February 02
From: New York
Member No.: 1,699



I'd hazard a guess that some 'runners would probably be among the last people in the world to have old all-hardwired equipment and use it regularly.

I know my merc character follows a policy of absolute minimum RF emissions during a run. All equipment running via datajack and optic cable, tightbeam laser comms when possible.

Certainly having stuff wired is archaic in the current game timeframe, but being that much less detectable can only be a positive when you don't want anyone to know you're there.


-karma
Go to the top of the page
 
+Quote Post
Fix-it
post May 3 2007, 04:04 AM
Post #22


Creating a god with his own hands
***

Group: Members
Posts: 1,405
Joined: 30-September 02
From: 0:0:0:0:0:0:0:1
Member No.: 3,364



QUOTE (hobgoblin @ May 3 2007, 03:14 AM)
given that real life wifi works not on so much a single channel but a list of channels, jumping between them to get the best signal to noise and so on (all iirc), the way to tell guards from runners would be by their comlinks access id...

remember, wifi is bursts of data, not walkie talkie style "press to talk, release to listen" systems. they are like cabled data networks, only using radio rather then cables.

you're assuming that the runners would be using the building's system as an access point (really stupid), instead of point to point links.


they COULD just use the same frequencies to try and avoid detection, but without logging into the building's system, they have no traffic control, thus major interference starts happening. also a giveaway.

the easiest way to avoid detection would be to use nonradio links. laser. ultrasound. fiberoptic cable.
Go to the top of the page
 
+Quote Post
kzt
post May 3 2007, 04:10 AM
Post #23


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (Bigity)
I would imagine the scanning is not done every combat turn, but at periodic intervals, as you are just eating up resources in a massive way otherwise.

So maybe every 10 minutes, until a passive alert or IC notifies a security decker that something fishy is going on, and then it can be ramped up to a more frequent interval.

No, if you are going to do it it's done automatically by the network management system. And it will be able to locate the transmitter to less than 10 feet as soon as it transmits. Look at what Cisco's WCS or Airmagnet Enterprise can do these days, and consider 50 years of tech advances. It's also perfectly possible to do a complete data capture of this traffic.

In the real world captures of intruder traffic are pretty useless as non-stupid encryption provides protection that ranges from effectively unbreakable to totally unbreakable. But in Shadowrun everyone can only use ROT13 so this is very useful.

Whether anything is done in either a useful period of time or at all with data is another question. Depends on how security conscious the site is and whether they have both cleaned up the RF environment and have assets to respond. Though if they are listening to you as you plan how to kill them it's likely security will do something aggressive.

I'd suggest not using any RF if you are sneaking in.
Go to the top of the page
 
+Quote Post
hobgoblin
post May 3 2007, 04:11 AM
Post #24


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



no, what i assume is that wifi in SR behaves at least a bit like wifi in real life, and in real life wifi have a set number of channels it can use.

as for interference. again, its data based. package based. that means that the system starts and stops sending 100+ times pr second or so.

its the same reason (plus dividing a given area into smaller cells) that make modern mobile phone networks work.
Go to the top of the page
 
+Quote Post
mfb
post May 3 2007, 07:30 AM
Post #25


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



QUOTE (WhiskeyMac @ May 2 2007, 10:09 PM)
I just had an idea. If the guards communicate using Wi-Fi themselves, would it be possible to utilize their channel for your communication by just using a different encryption? Since the spider would expect the guards to communicate on that channel, what would be the chances he/she would be able to find the runners using that channel? Is that even possible?


the guards would get static, and so would you. think of encryption as a language, like spanish. if the guards are talking in spanish on their channel, you can't understand them unless you also speak spanish. but if you choose to speak german on their channel, they'll be able to hear you--again, they won't understand you, because they don't speak german, but they'll be able to hear you talking.

in communication, if you can hear what someone's saying but you don't understand the language--you can't decrypt his signal--you hear static.

QUOTE (hobgoblin)
as for interference. again, its data based. package based. that means that the system starts and stops sending 100+ times pr second or so.

yeah, but he's talking about using different encryption over the same hopset. if you're using their network so that your traffic blends in, they'll get static. if you don't use their network, you're not blending in--it'd be like someone logging onto your wireless router to steels ur wifis. the router would be like "hey, that dood is steelin' my wifis" and you'd be all "zomgz send teh gards!"

QUOTE (kzt)
No, if you are going to do it it's done automatically by the network management system. And it will be able to locate the transmitter to less than 10 feet as soon as it transmits. Look at what Cisco's WCS or Airmagnet Enterprise can do these days, and consider 50 years of tech advances. It's also perfectly possible to do a complete data capture of this traffic.

ten feet? man, i bet there's nowhere you can go in any 2070 office building where you're not within ten feet of twenty different wireless transceivers. your office chair checks for firmware updates for the automatic comfort adjustment system. your desk, assuming you maintain such an archaic conceit, sends out a signal letting the office system know that your second drawer is still open after you've left for the day. the door checks in constantly to let the system know it's closed and locked. your window receives time updates so that it knows when to dim so that the sun doesn't shine too brightly into your office at 2pm every day. monitoring all of that traffic for unauthorized transmissions? pshaw, i say.

pshaw.
Go to the top of the page
 
+Quote Post

4 Pages V   1 2 3 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 26th April 2024 - 10:51 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.