IPB

Welcome Guest ( Log In | Register )

6 Pages V   1 2 3 > »   
Reply to this topicStart new topic
> Luddite Ninja Shadowrunners Vs. E-War Commando's, Running in the Wireless World
Spike
post May 9 2007, 06:50 PM
Post #1


Moving Target
**

Group: Members
Posts: 941
Joined: 25-January 07
Member No.: 10,765



Since the release of SR4 I have been pondering and debating the role of wireless communications and the average shadowrunner. This may not apply to you if you let your runners 'have fun', but if you are trying for a gritty 'realistic' approach to Shadowrunning, then this could be a valuable topic.

Note: This entire discussion will not handle the role of magic. In some cases the mage is identical to the E-war specialist, in some ways not. His presence can trip alarms that mundanes would breeze through, but he can do things his mundane counterparts can only dream of. There are significant differences, but they are beyond the scope of this discussion.

The writers of the MRB make one common error. They assume that the ubiquity of an item/phenomenon in the dominant culture must have a corresponding impact in the criminal subcultures.

This is prevelant across multiple spectrums. This is why you see images of Shadowrunners wearing loud colors, or 'action movie violence' in almost every tale told of almost any run. This leads to the culture of 'Shadowrunners' who live their lives 'on the job'. They hang out with other shadowrunners, use only their handles and hang out on popular, well known 'shadow havens'.

And they carry their commlinks on every job.

I'm not going to address every issue, just that last one.

In the default mode, Shadowrunners go on the job with a commlink set to hidden mode, every man jack of them, their PANs swapping data left and right, and maybe the hacker running a little C&C for them, pulling down additional tactical data from the security net.... if he's not busy swagging pay-data in the middle of the firefight.

Sound good, right?

Actually its the worst way to run. You have one guy who MIGHT be watching to see that your network isn't infiltrated and corrupted. You leave data trails all over the place, and any half competent security team will know the moment you go where you aren't supposed to. Lets look at why before we cover the alternatives.

First of all, one hacker, even two hackers are going to be busy with other tasks. Tasks like trying to sweep up the data trail the runners leave. Security hackers can act much like snipers, waiting in ambush for the right moment to reveal their hand. A hidden network is far from 'invisible'. It's a protocol, not magic, and the MRB shows that security drones and teams are very capable of detecting a Hidden Network's existance. Breaking and entering for the sec teams will start with the weakest links, the muscle and the mages. Once they've infiltrated one commlink they can monitor every movement, every action, every bit of data that the entire network shares from that one commlink.

The other aspect is the ease of detection. See, unlike the public street, corporate offices are 'closed environments'. Patrolling guards, even drones are increasingly rare due to cost/benefit analysis. They'll never completly go away, a visible guard being necessary for human psychology, but they aren't really there to stop anyone determined to go in. Security however will map every node, every WiFi chair, coffee machine and door. Even spoofing will only cover so much when it only takes one node out of a thousand to go 'hey! There's a signal here where there shouldn't be'... and make no mistake, there will be a signal. You can't have electronic communication without it. Even ONE RFID tag will give the team away in a hot second to any half competent security system...


And that's just the quick overview of the flaws.

There are two solutions. One is simple, requires almost no skill or work, but is at the same time incredibly limiting. The other is the exact opposite.

The simple solution, the one many pro's will use, and many wannabe pro's might chose to emulate, is cheap and simple. It does require altering your mindset, however.

Go clean. Scrub every item, make sure you have no nodes, no RFID tags, nothing. Only designated team members carry commlinks, and those are in the 'Off position'. Smarter teams will buy commlinks and programs specifically for that run and dispose of them the moment they don't need them, preferabbly with thermite.

In the Wireless World, these guys are ninjas. With increasing use of 'reality filters' there is a good chance a significant percentage of the population on a crowded street can't even SEE them, they don't exist. Security teams, reliant as they are on electronic detection will be ignorant of their existance. Good old fashioned stealth techniques are still necessary, perhaps even more important as they can't rely on their hacker to spoof more conventional sensors for them.

On that note, many security devices, particularly older devices (more than ten years old) and in 'High Security Areas' are probably hardwired, making them immune to conventional wireless spoofing. Newer, cheaper, security setups are less predictable (as the sensors can be moved around regularly) but are vulnerable to hackers.

It is easier to go clean that the MRB would suggest. Off the shelf clothes will naturally have more options, but I doubt handicrafts have gone completely away, and there will still be people making their own. Guns have a very long shelf life, and in many cases the gun-owners can be sold 'traditional' guns at higher costs. Traditional guns lack the bells and whistles... like nodes. They may still be tagged, but tags can be detected and 'burned' relatively simply.

More to the point, as many 'pros' will use Clean techniques, the gear available for sale through select sources may even brag about how it lacks extranious electronics. Merchants might even cater to certain crowds of 'extremists' who like to 'get away' from it all.

The Luddite Ninja team is not limited to 'low tech' either. Hackers can turn on commlinks when necessary, or once the 'shit has hit the fan' to function in an 'E-War' capacity. Drones with solid pilot software can remain outside the 'job site' until called in as 'cavalry', either by a signal sent from the hacker or if their wireless has been deliberately disabled then by a visual signal such as a flare. If you are calling in the drones, then stealth is no longer an option.

The weaknesses are manifold and obvious. Loss of solid communications, loss of any PAN bonuses the GM might give out, loss of spoofing and on the fly hacking of security systems. Everything must be dealt with physically or not at all. Against older security systems the Luddite Ninja's actually will have a harder time of it, as there will be more physical sensors than electronic, and the Hacker typically won't be trying to subvert the security central.

On the other hand, in addition to being 'Ghosts' they are immune to the Security teams most valuable members, the E-War specialists. In theory a team of Adepts and mages is more effective at 'Luddite Ninja' work than conventional cybered operatives, but this not generally proven in actual use. Cyber/bioware can easily be rendered 'wireless' in most cases, and should by any runner with a sense of self preservation.



The other option is to ensure that as many members of the team are fully kitted out electronic warfare specialists as possible. This team requires more brains than brawn, and their commlinks and associated skills are even more important than their ability to fire a gun.

The Goal of the E-War commando isn't to fly below the radar, it's to fucking OWN that radar and anyone who ever touched it. They aren't quiet, no they are like the earthquake, where everything around you moves so in sync that you are almost fooled into thinking that nothing is moving at all. E-War teams will have two or three guys just neutralizing the security network, subverting it, paralysing the enemy by shutting down their every move before they can make it. Drones will be flying shotgun, and any node that looks even remotely useful will be subverted at the earliest convienence.

All this is not unusual, however. Where the E-war team really earns it's money is when they don't get eveything fully locked down, when security finally mobilizes it's high threat response teams, their drones and jammers and so forth.

E-War teams dominate electronic combat. Sec teams never run 'clean'. Defenders try to use every advantage in their favor, and stealth isn't important. A good sec team has one or more E-War spec's of their own, guys who's job it is to own the attacker's network, to jam their comms and otherwise monkey-wrench the Runners.

The E-War team is in an armsrace against these guys, and they brought the biggest guns they could get. Cyberware get's spoofed, IFF tags change from freind to 'foe'. The loser in such a battle winds up doing more harm to his own side than the enemy.

That said, its probable that even the E-War guys don't use drones that rely on wireless communications. It's a vulnerability they can't afford. Security has to monitor their drones, it's a liabilty issue and a security issue. An attack team can't afford to let their assets be left vulnerable to a hack. E-war teams probably run multiple overlapping networks, so that a loss of any network security (or network specific jamming) doesn't cripple them.

Sorry if I've abbreviated the e-war team, but I will come back to it if necessary.
Go to the top of the page
 
+Quote Post
ornot
post May 9 2007, 07:05 PM
Post #2


Running Target
***

Group: Members
Posts: 1,266
Joined: 3-June 06
From: UK
Member No.: 8,638



I don't fully understand your point. Gritty or not, it's a game, and what is 'realistic' is determined by the GM.

As written, spoofing your data trail is a reasonably simple activity, and it is not unreasonable to suggest that in amongst all the other wireless noise, a team of runners might still communicate without being noticed.

If you wish to ditch 2 archetypes for your ninja luddite team or require 2 hackers for every other team member as in your E-war commando team, go to it. But interesting as your discourse is, it seems to lack a point.
Go to the top of the page
 
+Quote Post
mfb
post May 9 2007, 07:14 PM
Post #3


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



interesting take. to comment on the applicability of these ideas, i think there's room in SR for all three styles of running--the standard way presented in the book, the luddite ninja way, and the e-shock-and-awe way. most runners go with the standard way, because it's the easiest. they depend on getting in and out fast enough that their sloppy e-habits don't get them in much trouble, and they depend on the generally sloppy e-habits of their fellow runners to protect them from being singled out. shadow ops are rampant, in the sixth world, and corps don't generally want to waste time and resources chasing down spillers of milk--they're more interested in cleaning up the mess. occasionally, a runner team will get well and truly screwed by their sloppy e-habits, but that's only to be expected. most runners think it will never happen to them--and most runners are right.

it's only when you get into the high-class runners that you start seeing luddite ninjas. these guys are canny and smart. they've realized that while swimming in the school with the rest of the fish is PGP against sharks, it's much safer to not be seen at all. you might also see a few green operators--Salish-Sidhe strike teams, for instance--go with the luddite ninja concept.

runners, in general, don't do the e-shock-and-awe thing. they're not good enough, and they don't have the support necessary. if you're that good, there's really no reason to keep running the shadows--somewhere, somebody will hire you, pay you a much higher wage than you can make hustling jobs, and ignore or even bury whatever sins you've committed that put you out on the street in the first place. Ghosts, Wildcats, and the like go in for e-shock-and-awe, because they can afford to and because it's the best way to do it.
Go to the top of the page
 
+Quote Post
Spike
post May 9 2007, 07:39 PM
Post #4


Moving Target
**

Group: Members
Posts: 941
Joined: 25-January 07
Member No.: 10,765



That's some good points too, mfb. I don't think the bar for entry is so high necessarily for shock and awe tactics, or that shadowrunners are necessarily restricted to 'money grubbing' either, but certainly there is some heavy requirements to get a team of E-War ops together and fully equipped.

On that, I see Shadowrunners filling a spectrum... your grim and dirty street punks on up to elite 'world class' mercs who get millions per run, and probably spend most of it keeping in the very top ranks.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post May 9 2007, 07:43 PM
Post #5


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



They sure as hell will, if they burn everything that could even remotely compromise after a job... even more as that includes burning their entire body and getting a new cyborg one.

Those ideas are fancy and all, but hardly something people can reliably pull.
Basically, everything is a tradeoff, and the point is to maintain the balance of cost and return.
Go to the top of the page
 
+Quote Post
Whipstitch
post May 9 2007, 07:43 PM
Post #6


Runner
******

Group: Members
Posts: 2,883
Joined: 16-December 06
Member No.: 10,386



My current group is DEFINITELY an E-Warrior squad, and yeah, we're about as subtle as Godzilla on a PCP bender. 5 man team, consisting of a combat hacker, Mage, Technomancer, Face and a Hacker/Drone rigger. Both the mage (me) and the Face also have a couple points of Computer skill and SkillWire systems dedicated to approximating the Cracking Skill group and some pretty hefty commlinks suped up courtesy of the Hacker/Rigger. Honestly though, me and the face's commlinks are mostly there to provide extra horsepower to run Agents and drones without straining the real professional's response any. The way we operate is pretty simple, although it probably depends a bit more on the Technomancer than many people would be comfortable with (yes, that's right, the TM). Basically, the TM brute forces and makes the network ours, after which the rest of us drops some Agents, and generally run interference so the TM doesn't have to risk Fading/Damage or use Sprite services until his sheer power becomes necessary, at which point he and the Hacker/Rigger promptly boots opposing forces off the 'trix. Still, I must admit, things get pretty hairy if we're stuck trying to multi-task the 'trix work and physical operations too much simultaneously; we're dangerously dependent on spirits and stolen drones for muscle, and pretty weak in terms of traditional stealth. So far, it's mostly been a theoretical weakness, but if and when we lose the 'trix war, my group will be pretty well boned. It's been fun so far, but I can see how it wouldn't be feasible for a group that doesn't really plan their whole team together. BP wise though, it's not really that expensive as long as you have a hacker or two who can copy/pirate a few high end vital programs. Umm, that and somebody has to take one for the team and be a TM with the physical constitution of wet tissue paper.
Go to the top of the page
 
+Quote Post
Kyoto Kid
post May 9 2007, 08:25 PM
Post #7


Bushido Cowgirl
*********

Group: Members
Posts: 5,782
Joined: 8-July 05
From: On the Double K Ranch a half day's ride out of Phlogiston Flats
Member No.: 7,490



...ahh this makes me long for the good old pre-wireless days of shadowrunning.
Go to the top of the page
 
+Quote Post
hobgoblin
post May 9 2007, 08:28 PM
Post #8


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (Kyoto Kid)
...ahh this makes me long for the good old pre-wireless days of shadowrunning.

complete with npc deckers?
Go to the top of the page
 
+Quote Post
Kyoto Kid
post May 9 2007, 08:39 PM
Post #9


Bushido Cowgirl
*********

Group: Members
Posts: 5,782
Joined: 8-July 05
From: On the Double K Ranch a half day's ride out of Phlogiston Flats
Member No.: 7,490



QUOTE (hobgoblin)
QUOTE (Kyoto Kid @ May 9 2007, 09:25 PM)
...ahh this makes me long for the good old pre-wireless days of shadowrunning.

complete with npc deckers?

...small price to pay for being able to run in truly SINless style...

Actually, I did have two decker PCs: Diamond IC and the original Violet. Even figured out how to build a cyberdeck and create programmes from scratch.
Go to the top of the page
 
+Quote Post
X-Kalibur
post May 9 2007, 08:39 PM
Post #10


Runner
******

Group: Members
Posts: 2,579
Joined: 30-May 06
From: SoCal
Member No.: 8,626



QUOTE (hobgoblin)
QUOTE (Kyoto Kid @ May 9 2007, 09:25 PM)
...ahh this makes me long for the good old pre-wireless days of shadowrunning.

complete with npc deckers?

And the comm systems that cost :nuyen: 30,000?
Go to the top of the page
 
+Quote Post
Kyoto Kid
post May 9 2007, 08:43 PM
Post #11


Bushido Cowgirl
*********

Group: Members
Posts: 5,782
Joined: 8-July 05
From: On the Double K Ranch a half day's ride out of Phlogiston Flats
Member No.: 7,490



...yeah, but you also could start with up to 1 mil in resources, 2 mil if you used the MR J's LBB advanced chargen rules.
Go to the top of the page
 
+Quote Post
X-Kalibur
post May 9 2007, 09:31 PM
Post #12


Runner
******

Group: Members
Posts: 2,579
Joined: 30-May 06
From: SoCal
Member No.: 8,626



Still excessive when you think about how much a walkie talkie costs...
Go to the top of the page
 
+Quote Post
Kyoto Kid
post May 9 2007, 09:53 PM
Post #13


Bushido Cowgirl
*********

Group: Members
Posts: 5,782
Joined: 8-July 05
From: On the Double K Ranch a half day's ride out of Phlogiston Flats
Member No.: 7,490



...I agree, some of the costs in SR3 were out of line (like Fake IDs) This doesn't prevent a GM from modifying them If he/she feels they are too out of line.

It's just that things felt so much more "Shadowrun" before the crash.
Go to the top of the page
 
+Quote Post
hobgoblin
post May 9 2007, 10:04 PM
Post #14


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



and how does it feel now?

btw, this looks strangely like the threads about CPv3 over on vfte forum...

oh, and this thread is officially derailed ;)
Go to the top of the page
 
+Quote Post
toturi
post May 10 2007, 02:45 AM
Post #15


Canon Companion
**********

Group: Members
Posts: 8,021
Joined: 2-March 03
From: The Morgue, Singapore LTG
Member No.: 4,187



My question is simple:

Given the RAW and with as little GM house rules as possible, which style of running is mathematically the easiest? Then that is the style that is by default the most probable style.
Go to the top of the page
 
+Quote Post
psychophipps
post May 10 2007, 03:33 AM
Post #16


Running Target
***

Group: Members
Posts: 1,192
Joined: 6-May 07
From: Texas - The RGV
Member No.: 11,613



Don't forget how easy it is to spoof your RFID and comlink sig... "So you're saying that Bucktusk Bertha, the infamous Troll hooker of many a sorrid street tale, crept past you guys, dropped a Hiroshima-sized e-bomb on our servers and crept back out without a single trace...all 2.7m and 300 kg of her...with that limp..."

I would imagine that there is a fairly strong network of hackers just surfing the streets looking for some chump who is too cheap to buy a decent comlink/OS combo so they can do a run with their ID. I can tell you that CorpSec would start getting pretty frustrated the 15th time they raided a BTL-whore or pizza delivery boys conapt looking for the Shadowrunner team that took out their last chipset shipment while it was en-route down I-5.

Not that I've ever done this myself... :D
Mark(psycho)Phipps( HAHAHA! )
Go to the top of the page
 
+Quote Post
laughingowl
post May 10 2007, 03:36 AM
Post #17


Moving Target
**

Group: Members
Posts: 615
Joined: 26-February 02
Member No.: 1,895



QUOTE (psychophipps)
Don't forget how easy it is to spoof your RFID and comlink sig... "So you're saying that Bucktusk Bertha, the infamous Troll hooker of many a sorrid street tale, crept past you guys, dropped a Hiroshima-sized e-bomb on our servers and crept back out without a single trace...all 2.7m and 300 kg of her...with that limp..."

I would imagine that there is a fairly strong network of hackers just surfing the streets looking for some chump who is too cheap to buy a decent comlink/OS combo so they can do a run with their ID. I can tell you that CorpSec would start getting pretty frustrated the 15th time they raided a BTL-whore or pizza delivery boys conapt looking for the Shadowrunner team that took out their last chipset shipment while it was en-route down I-5.

Not that I've ever done this myself... :D
Mark(psycho)Phipps( HAHAHA! )

/Agree

In fact I see low-level pay-data being exactly this.

Hacker moonlights for 'chump' IDs.

Begining hackers get jobs waiting in malls and scanning / compromising IDs to sell to fixers to provide short use IDs for runs.
Go to the top of the page
 
+Quote Post
psychophipps
post May 10 2007, 03:40 AM
Post #18


Running Target
***

Group: Members
Posts: 1,192
Joined: 6-May 07
From: Texas - The RGV
Member No.: 11,613



Hell, take it a step further. Use a fly-ass honeypot elf contact to get in the targets pants and get the goods that way. Nothing says 'successful shadowrun' like hearing the building's LAN ask you, "Would you like to see who's on guard duty tonight, Mr. Tolliver?" right as you walk through the back door.

Mark(psycho)Phipps( HAHAHA! )
Go to the top of the page
 
+Quote Post
Demonseed Elite
post May 10 2007, 02:03 PM
Post #19


Neophyte Runner
*****

Group: Members
Posts: 2,078
Joined: 26-February 02
Member No.: 67



I'm with mfb. I don't really see how the rulebook doesn't accept those various styles, but instead what style a runner team uses will depend on the runner team and the job.
Go to the top of the page
 
+Quote Post
Fix-it
post May 10 2007, 02:31 PM
Post #20


Creating a god with his own hands
***

Group: Members
Posts: 1,405
Joined: 30-September 02
From: 0:0:0:0:0:0:0:1
Member No.: 3,364



QUOTE (toturi)
My question is simple:

Given the RAW and with as little GM house rules as possible, which style of running is mathematically the easiest? Then that is the style that is by default the most probable style.

that depends on the enviroment, which is entirely GM-dependant.
Go to the top of the page
 
+Quote Post
nathanross
post May 10 2007, 02:37 PM
Post #21


Moving Target
**

Group: Members
Posts: 811
Joined: 30-January 07
From: Portland, OR
Member No.: 10,845



Spike! :love:

I really like this take on things. Ive been missing the nitty gritty shadowrun reality ever since SR3 was tossed out. I think this gives the new wireless proliferation some balance.

This is some of the best realistic thinking Ive seen in a while, keep it up. :)
Go to the top of the page
 
+Quote Post
toturi
post May 10 2007, 02:47 PM
Post #22


Canon Companion
**********

Group: Members
Posts: 8,021
Joined: 2-March 03
From: The Morgue, Singapore LTG
Member No.: 4,187



QUOTE (Fix-it)
QUOTE (toturi @ May 10 2007, 02:45 AM)
My question is simple:

Given the RAW and with as little GM house rules as possible, which style of running is mathematically the easiest? Then that is the style that is by default the most probable style.

that depends on the enviroment, which is entirely GM-dependant.

Not entirely. The environment may be GM controlled but how the environment actually reacts in terms of game mechanics shouldn't change. The GM may decide in favor of certain responses, but (without house ruling) how the responses deal with the hacker should mechanically be about the same.
Go to the top of the page
 
+Quote Post
hobgoblin
post May 10 2007, 03:34 PM
Post #23


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (psychophipps)
Don't forget how easy it is to spoof your RFID and comlink sig... "So you're saying that Bucktusk Bertha, the infamous Troll hooker of many a sorrid street tale, crept past you guys, dropped a Hiroshima-sized e-bomb on our servers and crept back out without a single trace...all 2.7m and 300 kg of her...with that limp..."

i think the issue is that some here on the forum have the mindset that any comlink signal after hours would have every piece of available security thrown at it .0001 second after detection.

how, having a signal generator smuggled in that will transmit a signal at semi random intervals after office hours would be interesting ;)

cry wolf enough times and no-one will care as its most likely a glitch. that is as long as they don't find said generator...
Go to the top of the page
 
+Quote Post
Whipstitch
post May 10 2007, 04:06 PM
Post #24


Runner
******

Group: Members
Posts: 2,883
Joined: 16-December 06
Member No.: 10,386



In my experience, going E-War is easier, but has higher minimum requirements. Not all groups are going to have enough players to do it and still have a semblance of a balanced team, after all, and even then you're assuming that even the non-hackers are willing to divert some resources to being able to at least have beefy commlinks and Agent programs.
Go to the top of the page
 
+Quote Post
Kyoto Kid
post May 10 2007, 05:15 PM
Post #25


Bushido Cowgirl
*********

Group: Members
Posts: 5,782
Joined: 8-July 05
From: On the Double K Ranch a half day's ride out of Phlogiston Flats
Member No.: 7,490



QUOTE (hobgoblin)
and how does it feel now?

...kind of like how some reality shows make me feel. Or maybe like Today's NASCAR compared to the days when they actually raced stock cars.
Go to the top of the page
 
+Quote Post

6 Pages V   1 2 3 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 2nd July 2025 - 03:36 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.