![]() |
![]() ![]() |
![]() |
![]()
Post
#1
|
|
Moving Target ![]() ![]() Group: Members Posts: 941 Joined: 25-January 07 Member No.: 10,765 ![]() |
Since the release of SR4 I have been pondering and debating the role of wireless communications and the average shadowrunner. This may not apply to you if you let your runners 'have fun', but if you are trying for a gritty 'realistic' approach to Shadowrunning, then this could be a valuable topic.
Note: This entire discussion will not handle the role of magic. In some cases the mage is identical to the E-war specialist, in some ways not. His presence can trip alarms that mundanes would breeze through, but he can do things his mundane counterparts can only dream of. There are significant differences, but they are beyond the scope of this discussion. The writers of the MRB make one common error. They assume that the ubiquity of an item/phenomenon in the dominant culture must have a corresponding impact in the criminal subcultures. This is prevelant across multiple spectrums. This is why you see images of Shadowrunners wearing loud colors, or 'action movie violence' in almost every tale told of almost any run. This leads to the culture of 'Shadowrunners' who live their lives 'on the job'. They hang out with other shadowrunners, use only their handles and hang out on popular, well known 'shadow havens'. And they carry their commlinks on every job. I'm not going to address every issue, just that last one. In the default mode, Shadowrunners go on the job with a commlink set to hidden mode, every man jack of them, their PANs swapping data left and right, and maybe the hacker running a little C&C for them, pulling down additional tactical data from the security net.... if he's not busy swagging pay-data in the middle of the firefight. Sound good, right? Actually its the worst way to run. You have one guy who MIGHT be watching to see that your network isn't infiltrated and corrupted. You leave data trails all over the place, and any half competent security team will know the moment you go where you aren't supposed to. Lets look at why before we cover the alternatives. First of all, one hacker, even two hackers are going to be busy with other tasks. Tasks like trying to sweep up the data trail the runners leave. Security hackers can act much like snipers, waiting in ambush for the right moment to reveal their hand. A hidden network is far from 'invisible'. It's a protocol, not magic, and the MRB shows that security drones and teams are very capable of detecting a Hidden Network's existance. Breaking and entering for the sec teams will start with the weakest links, the muscle and the mages. Once they've infiltrated one commlink they can monitor every movement, every action, every bit of data that the entire network shares from that one commlink. The other aspect is the ease of detection. See, unlike the public street, corporate offices are 'closed environments'. Patrolling guards, even drones are increasingly rare due to cost/benefit analysis. They'll never completly go away, a visible guard being necessary for human psychology, but they aren't really there to stop anyone determined to go in. Security however will map every node, every WiFi chair, coffee machine and door. Even spoofing will only cover so much when it only takes one node out of a thousand to go 'hey! There's a signal here where there shouldn't be'... and make no mistake, there will be a signal. You can't have electronic communication without it. Even ONE RFID tag will give the team away in a hot second to any half competent security system... And that's just the quick overview of the flaws. There are two solutions. One is simple, requires almost no skill or work, but is at the same time incredibly limiting. The other is the exact opposite. The simple solution, the one many pro's will use, and many wannabe pro's might chose to emulate, is cheap and simple. It does require altering your mindset, however. Go clean. Scrub every item, make sure you have no nodes, no RFID tags, nothing. Only designated team members carry commlinks, and those are in the 'Off position'. Smarter teams will buy commlinks and programs specifically for that run and dispose of them the moment they don't need them, preferabbly with thermite. In the Wireless World, these guys are ninjas. With increasing use of 'reality filters' there is a good chance a significant percentage of the population on a crowded street can't even SEE them, they don't exist. Security teams, reliant as they are on electronic detection will be ignorant of their existance. Good old fashioned stealth techniques are still necessary, perhaps even more important as they can't rely on their hacker to spoof more conventional sensors for them. On that note, many security devices, particularly older devices (more than ten years old) and in 'High Security Areas' are probably hardwired, making them immune to conventional wireless spoofing. Newer, cheaper, security setups are less predictable (as the sensors can be moved around regularly) but are vulnerable to hackers. It is easier to go clean that the MRB would suggest. Off the shelf clothes will naturally have more options, but I doubt handicrafts have gone completely away, and there will still be people making their own. Guns have a very long shelf life, and in many cases the gun-owners can be sold 'traditional' guns at higher costs. Traditional guns lack the bells and whistles... like nodes. They may still be tagged, but tags can be detected and 'burned' relatively simply. More to the point, as many 'pros' will use Clean techniques, the gear available for sale through select sources may even brag about how it lacks extranious electronics. Merchants might even cater to certain crowds of 'extremists' who like to 'get away' from it all. The Luddite Ninja team is not limited to 'low tech' either. Hackers can turn on commlinks when necessary, or once the 'shit has hit the fan' to function in an 'E-War' capacity. Drones with solid pilot software can remain outside the 'job site' until called in as 'cavalry', either by a signal sent from the hacker or if their wireless has been deliberately disabled then by a visual signal such as a flare. If you are calling in the drones, then stealth is no longer an option. The weaknesses are manifold and obvious. Loss of solid communications, loss of any PAN bonuses the GM might give out, loss of spoofing and on the fly hacking of security systems. Everything must be dealt with physically or not at all. Against older security systems the Luddite Ninja's actually will have a harder time of it, as there will be more physical sensors than electronic, and the Hacker typically won't be trying to subvert the security central. On the other hand, in addition to being 'Ghosts' they are immune to the Security teams most valuable members, the E-War specialists. In theory a team of Adepts and mages is more effective at 'Luddite Ninja' work than conventional cybered operatives, but this not generally proven in actual use. Cyber/bioware can easily be rendered 'wireless' in most cases, and should by any runner with a sense of self preservation. The other option is to ensure that as many members of the team are fully kitted out electronic warfare specialists as possible. This team requires more brains than brawn, and their commlinks and associated skills are even more important than their ability to fire a gun. The Goal of the E-War commando isn't to fly below the radar, it's to fucking OWN that radar and anyone who ever touched it. They aren't quiet, no they are like the earthquake, where everything around you moves so in sync that you are almost fooled into thinking that nothing is moving at all. E-War teams will have two or three guys just neutralizing the security network, subverting it, paralysing the enemy by shutting down their every move before they can make it. Drones will be flying shotgun, and any node that looks even remotely useful will be subverted at the earliest convienence. All this is not unusual, however. Where the E-war team really earns it's money is when they don't get eveything fully locked down, when security finally mobilizes it's high threat response teams, their drones and jammers and so forth. E-War teams dominate electronic combat. Sec teams never run 'clean'. Defenders try to use every advantage in their favor, and stealth isn't important. A good sec team has one or more E-War spec's of their own, guys who's job it is to own the attacker's network, to jam their comms and otherwise monkey-wrench the Runners. The E-War team is in an armsrace against these guys, and they brought the biggest guns they could get. Cyberware get's spoofed, IFF tags change from freind to 'foe'. The loser in such a battle winds up doing more harm to his own side than the enemy. That said, its probable that even the E-War guys don't use drones that rely on wireless communications. It's a vulnerability they can't afford. Security has to monitor their drones, it's a liabilty issue and a security issue. An attack team can't afford to let their assets be left vulnerable to a hack. E-war teams probably run multiple overlapping networks, so that a loss of any network security (or network specific jamming) doesn't cripple them. Sorry if I've abbreviated the e-war team, but I will come back to it if necessary. |
|
|
![]()
Post
#2
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,266 Joined: 3-June 06 From: UK Member No.: 8,638 ![]() |
I don't fully understand your point. Gritty or not, it's a game, and what is 'realistic' is determined by the GM.
As written, spoofing your data trail is a reasonably simple activity, and it is not unreasonable to suggest that in amongst all the other wireless noise, a team of runners might still communicate without being noticed. If you wish to ditch 2 archetypes for your ninja luddite team or require 2 hackers for every other team member as in your E-war commando team, go to it. But interesting as your discourse is, it seems to lack a point. |
|
|
![]()
Post
#3
|
|
Immortal Elf ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 ![]() |
interesting take. to comment on the applicability of these ideas, i think there's room in SR for all three styles of running--the standard way presented in the book, the luddite ninja way, and the e-shock-and-awe way. most runners go with the standard way, because it's the easiest. they depend on getting in and out fast enough that their sloppy e-habits don't get them in much trouble, and they depend on the generally sloppy e-habits of their fellow runners to protect them from being singled out. shadow ops are rampant, in the sixth world, and corps don't generally want to waste time and resources chasing down spillers of milk--they're more interested in cleaning up the mess. occasionally, a runner team will get well and truly screwed by their sloppy e-habits, but that's only to be expected. most runners think it will never happen to them--and most runners are right.
it's only when you get into the high-class runners that you start seeing luddite ninjas. these guys are canny and smart. they've realized that while swimming in the school with the rest of the fish is PGP against sharks, it's much safer to not be seen at all. you might also see a few green operators--Salish-Sidhe strike teams, for instance--go with the luddite ninja concept. runners, in general, don't do the e-shock-and-awe thing. they're not good enough, and they don't have the support necessary. if you're that good, there's really no reason to keep running the shadows--somewhere, somebody will hire you, pay you a much higher wage than you can make hustling jobs, and ignore or even bury whatever sins you've committed that put you out on the street in the first place. Ghosts, Wildcats, and the like go in for e-shock-and-awe, because they can afford to and because it's the best way to do it. |
|
|
![]()
Post
#4
|
|
Moving Target ![]() ![]() Group: Members Posts: 941 Joined: 25-January 07 Member No.: 10,765 ![]() |
That's some good points too, mfb. I don't think the bar for entry is so high necessarily for shock and awe tactics, or that shadowrunners are necessarily restricted to 'money grubbing' either, but certainly there is some heavy requirements to get a team of E-War ops together and fully equipped.
On that, I see Shadowrunners filling a spectrum... your grim and dirty street punks on up to elite 'world class' mercs who get millions per run, and probably spend most of it keeping in the very top ranks. |
|
|
![]()
Post
#5
|
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 ![]() |
They sure as hell will, if they burn everything that could even remotely compromise after a job... even more as that includes burning their entire body and getting a new cyborg one.
Those ideas are fancy and all, but hardly something people can reliably pull. Basically, everything is a tradeoff, and the point is to maintain the balance of cost and return. |
|
|
![]()
Post
#6
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,883 Joined: 16-December 06 Member No.: 10,386 ![]() |
My current group is DEFINITELY an E-Warrior squad, and yeah, we're about as subtle as Godzilla on a PCP bender. 5 man team, consisting of a combat hacker, Mage, Technomancer, Face and a Hacker/Drone rigger. Both the mage (me) and the Face also have a couple points of Computer skill and SkillWire systems dedicated to approximating the Cracking Skill group and some pretty hefty commlinks suped up courtesy of the Hacker/Rigger. Honestly though, me and the face's commlinks are mostly there to provide extra horsepower to run Agents and drones without straining the real professional's response any. The way we operate is pretty simple, although it probably depends a bit more on the Technomancer than many people would be comfortable with (yes, that's right, the TM). Basically, the TM brute forces and makes the network ours, after which the rest of us drops some Agents, and generally run interference so the TM doesn't have to risk Fading/Damage or use Sprite services until his sheer power becomes necessary, at which point he and the Hacker/Rigger promptly boots opposing forces off the 'trix. Still, I must admit, things get pretty hairy if we're stuck trying to multi-task the 'trix work and physical operations too much simultaneously; we're dangerously dependent on spirits and stolen drones for muscle, and pretty weak in terms of traditional stealth. So far, it's mostly been a theoretical weakness, but if and when we lose the 'trix war, my group will be pretty well boned. It's been fun so far, but I can see how it wouldn't be feasible for a group that doesn't really plan their whole team together. BP wise though, it's not really that expensive as long as you have a hacker or two who can copy/pirate a few high end vital programs. Umm, that and somebody has to take one for the team and be a TM with the physical constitution of wet tissue paper.
|
|
|
![]()
Post
#7
|
|
Bushido Cowgirl ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,782 Joined: 8-July 05 From: On the Double K Ranch a half day's ride out of Phlogiston Flats Member No.: 7,490 ![]() |
...ahh this makes me long for the good old pre-wireless days of shadowrunning.
|
|
|
![]()
Post
#8
|
|||
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
complete with npc deckers? |
||
|
|||
![]()
Post
#9
|
|||||
Bushido Cowgirl ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,782 Joined: 8-July 05 From: On the Double K Ranch a half day's ride out of Phlogiston Flats Member No.: 7,490 ![]() |
...small price to pay for being able to run in truly SINless style... Actually, I did have two decker PCs: Diamond IC and the original Violet. Even figured out how to build a cyberdeck and create programmes from scratch. |
||||
|
|||||
![]()
Post
#10
|
|||||
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,579 Joined: 30-May 06 From: SoCal Member No.: 8,626 ![]() |
And the comm systems that cost :nuyen: 30,000? |
||||
|
|||||
![]()
Post
#11
|
|
Bushido Cowgirl ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,782 Joined: 8-July 05 From: On the Double K Ranch a half day's ride out of Phlogiston Flats Member No.: 7,490 ![]() |
...yeah, but you also could start with up to 1 mil in resources, 2 mil if you used the MR J's LBB advanced chargen rules.
|
|
|
![]()
Post
#12
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,579 Joined: 30-May 06 From: SoCal Member No.: 8,626 ![]() |
Still excessive when you think about how much a walkie talkie costs...
|
|
|
![]()
Post
#13
|
|
Bushido Cowgirl ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,782 Joined: 8-July 05 From: On the Double K Ranch a half day's ride out of Phlogiston Flats Member No.: 7,490 ![]() |
...I agree, some of the costs in SR3 were out of line (like Fake IDs) This doesn't prevent a GM from modifying them If he/she feels they are too out of line.
It's just that things felt so much more "Shadowrun" before the crash. |
|
|
![]()
Post
#14
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
and how does it feel now?
btw, this looks strangely like the threads about CPv3 over on vfte forum... oh, and this thread is officially derailed ;) |
|
|
![]()
Post
#15
|
|
Canon Companion ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 8,021 Joined: 2-March 03 From: The Morgue, Singapore LTG Member No.: 4,187 ![]() |
My question is simple:
Given the RAW and with as little GM house rules as possible, which style of running is mathematically the easiest? Then that is the style that is by default the most probable style. |
|
|
![]()
Post
#16
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,192 Joined: 6-May 07 From: Texas - The RGV Member No.: 11,613 ![]() |
Don't forget how easy it is to spoof your RFID and comlink sig... "So you're saying that Bucktusk Bertha, the infamous Troll hooker of many a sorrid street tale, crept past you guys, dropped a Hiroshima-sized e-bomb on our servers and crept back out without a single trace...all 2.7m and 300 kg of her...with that limp..."
I would imagine that there is a fairly strong network of hackers just surfing the streets looking for some chump who is too cheap to buy a decent comlink/OS combo so they can do a run with their ID. I can tell you that CorpSec would start getting pretty frustrated the 15th time they raided a BTL-whore or pizza delivery boys conapt looking for the Shadowrunner team that took out their last chipset shipment while it was en-route down I-5. Not that I've ever done this myself... :D Mark(psycho)Phipps( HAHAHA! ) |
|
|
![]()
Post
#17
|
|||
Moving Target ![]() ![]() Group: Members Posts: 615 Joined: 26-February 02 Member No.: 1,895 ![]() |
/Agree In fact I see low-level pay-data being exactly this. Hacker moonlights for 'chump' IDs. Begining hackers get jobs waiting in malls and scanning / compromising IDs to sell to fixers to provide short use IDs for runs. |
||
|
|||
![]()
Post
#18
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,192 Joined: 6-May 07 From: Texas - The RGV Member No.: 11,613 ![]() |
Hell, take it a step further. Use a fly-ass honeypot elf contact to get in the targets pants and get the goods that way. Nothing says 'successful shadowrun' like hearing the building's LAN ask you, "Would you like to see who's on guard duty tonight, Mr. Tolliver?" right as you walk through the back door.
Mark(psycho)Phipps( HAHAHA! ) |
|
|
![]()
Post
#19
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,078 Joined: 26-February 02 Member No.: 67 ![]() |
I'm with mfb. I don't really see how the rulebook doesn't accept those various styles, but instead what style a runner team uses will depend on the runner team and the job.
|
|
|
![]()
Post
#20
|
|||
Creating a god with his own hands ![]() ![]() ![]() Group: Members Posts: 1,405 Joined: 30-September 02 From: 0:0:0:0:0:0:0:1 Member No.: 3,364 ![]() |
that depends on the enviroment, which is entirely GM-dependant. |
||
|
|||
![]()
Post
#21
|
|
Moving Target ![]() ![]() Group: Members Posts: 811 Joined: 30-January 07 From: Portland, OR Member No.: 10,845 ![]() |
Spike! :love:
I really like this take on things. Ive been missing the nitty gritty shadowrun reality ever since SR3 was tossed out. I think this gives the new wireless proliferation some balance. This is some of the best realistic thinking Ive seen in a while, keep it up. :) |
|
|
![]()
Post
#22
|
|||||
Canon Companion ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 8,021 Joined: 2-March 03 From: The Morgue, Singapore LTG Member No.: 4,187 ![]() |
Not entirely. The environment may be GM controlled but how the environment actually reacts in terms of game mechanics shouldn't change. The GM may decide in favor of certain responses, but (without house ruling) how the responses deal with the hacker should mechanically be about the same. |
||||
|
|||||
![]()
Post
#23
|
|||
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 ![]() |
i think the issue is that some here on the forum have the mindset that any comlink signal after hours would have every piece of available security thrown at it .0001 second after detection. how, having a signal generator smuggled in that will transmit a signal at semi random intervals after office hours would be interesting ;) cry wolf enough times and no-one will care as its most likely a glitch. that is as long as they don't find said generator... |
||
|
|||
![]()
Post
#24
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,883 Joined: 16-December 06 Member No.: 10,386 ![]() |
In my experience, going E-War is easier, but has higher minimum requirements. Not all groups are going to have enough players to do it and still have a semblance of a balanced team, after all, and even then you're assuming that even the non-hackers are willing to divert some resources to being able to at least have beefy commlinks and Agent programs.
|
|
|
![]()
Post
#25
|
|||
Bushido Cowgirl ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,782 Joined: 8-July 05 From: On the Double K Ranch a half day's ride out of Phlogiston Flats Member No.: 7,490 ![]() |
...kind of like how some reality shows make me feel. Or maybe like Today's NASCAR compared to the days when they actually raced stock cars. |
||
|
|||
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 2nd July 2025 - 03:36 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.