Creating a THOR node |
Creating a THOR node |
Jul 19 2007, 06:17 AM
Post
#1
|
|||
Shooting Target Group: Members Posts: 1,677 Joined: 5-June 03 Member No.: 4,689 |
From the Dragon challenge thread:
Is anyone willing to make up a node worthy of guarding a THOR shot? complete with all the counter-security that would entail? |
||
|
|||
Jul 19 2007, 06:21 AM
Post
#2
|
|
Runner Group: Members Posts: 2,598 Joined: 15-March 03 From: Hong Kong Member No.: 4,253 |
I guess it depends on what the THORs get classified as. Does the rest of the world simply views them as conventional weapons or as NBC type weapons? If they are view as NBC type weapons, then one likely security setup is for the weapons to be manually fired from a manned platform. I'd assume the actuall weapons would be made on the moon and then return to earth orbit. Shooting big rocks into orbit only to drop them back down again costs way too much (unless you want to build a space elevator or sky-hook first).
|
|
|
Jul 19 2007, 06:24 AM
Post
#3
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Assume ( Rating 6 ) programs across the board, as much IC as the node(s) can handle (Which depending on how you view Agents as working might either be near infinate or pitiful.) and Security Deckers with ( Skill 4 ) and ( Rating 6 ) commlinks/programs "on call" the moment an alarm is tripped.
|
|
|
Jul 19 2007, 07:05 AM
Post
#4
|
|
Moving Target Group: Members Posts: 556 Joined: 28-May 04 From: Moorhead, MN, USA Member No.: 6,367 |
THOR shot platform? Why not go higher than 6 on the ratings? This is a mega's or large government's very security sensitive equipment. I think this would be one of the times where pulling out the GM discretion on exceeding a 6 would be totally called for and acceptable.
|
|
|
Jul 19 2007, 11:33 AM
Post
#5
|
|
Mr. Johnson Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
I think 6's are plenty. And to hell with spiders "on call," they'd be patrolling. As would a bunch of IC programs. All of which would be first encountered in the choke-point node that connects to the actual control node. Same thing with the control node. Plus, both nodes would probably be "ultra-violet," which hasn't been defined yet, but is scary.
This is even assuming that the actual launch mechanism doesn't require two metahumans with keys that have to be turned at the same time, like in "War Games." |
|
|
Jul 19 2007, 12:07 PM
Post
#6
|
|
Neophyte Runner Group: Members Posts: 2,162 Joined: 31-December 06 Member No.: 10,502 |
You know how a lot of the time the hackers/deckers have to actually go on runs because of isolated systems? This is like that, only moreso.
I think after the whole deuce business any vestiges of "our system is just to badass to ever be cracked" would be gone. It's an isolated system. linked at most to other sattelites in a group, there are a couple metahumans who need FOB codes or something to fire the things up there somewhere. |
|
|
Jul 19 2007, 12:24 PM
Post
#7
|
|
Running Target Group: Members Posts: 1,246 Joined: 8-June 07 Member No.: 11,869 |
Not to rain on your guys' parade, but despite War Games' claim, nuclear missile silos aren't accessible from the outside world, only the personnel stationed inside have the launch keys and there's a big book of verification protocols to authenticate initiation commands. I've worked at a military satellite subcontractor site and even they were completely cut off from the internet. I doubt very seriously that a Thor control station would have ANY access the matrix. There's no reason in the world it would need it.
These MIGHT succeed:
|
|
|
Jul 19 2007, 02:29 PM
Post
#8
|
|
Great Dragon Group: Members Posts: 5,430 Joined: 10-January 05 From: Fort Worth, Texas Member No.: 6,957 |
One node? More like 15. All set up in a mazelike matrix with no signposts. And all constantly patrolled by agents and security hackers. Basically you set it up as deep as you need to in order to ensure almost 100% probability of someone's stealth 12 CF being seen through before they can find the actual node that controls the aiming mechanisms, much less the node that contains the firing commands, the other node that holds the load commands, etc.
Then you turn off all of the power until you need to fire something or run a randomly scheduled test. |
|
|
Jul 19 2007, 02:51 PM
Post
#9
|
|||
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Because I hate the the very idea of allowing ( Rating 8+ ) programs to exist in the world at all, (I used to make expections for AIs, but seeing that they are handled as Sprites, that is covered via Threading.) and see ( Rating 7 ) as literally being prototypes and experiments. (Or perhaps as belonging in an UV Node.) <><><><><> As for the rest, well I guess I see Thor Shot platforms as being unmanned, so it would have to have communications, and figure that there are probably enough of them in the sky that they aren't going to all be crawling with Security Deckers. As for multiple protected nodes and the like, yeah I agree, and I figure that in order to actually launch two Admin Level Users has to enter the command in the same IP pass. Oh and forget about using the probing rules, you have to hack-on-fly because the system's connection "flickers" 1-4 times an hour unless an Admin Level user disables the feature in the first node. Of course, doing so is hardwired to send out an alert to the corp. |
||
|
|||
Jul 19 2007, 03:07 PM
Post
#10
|
|
Shooting Target Group: Members Posts: 1,677 Joined: 5-June 03 Member No.: 4,689 |
One question to ask in designing these systems, perhaps, is how many successful "hijackings" have happened (every one of which would be documented in canon) -- as opposed to how many runner-level attempts (not necessarily documented)?
The lower the fraction, the higher the level of security which is standard. |
|
|
Jul 19 2007, 03:15 PM
Post
#11
|
|
Great Dragon Group: Members Posts: 5,430 Joined: 10-January 05 From: Fort Worth, Texas Member No.: 6,957 |
I think it's safe to assume that a system which can level nations and multinationals, including that of its owner, is probably protected as much as humanly possible. Moreso if its owner happens to be a dragon.
|
|
|
Jul 19 2007, 03:37 PM
Post
#12
|
|
Neophyte Runner Group: Members Posts: 2,162 Joined: 31-December 06 Member No.: 10,502 |
Only thing I remember from anything remotely cannon was the Lone Eagle incident. Where some native americans manage to take a missle silo long enough to launch an ICBM at russia (which didn't reach it's target). However it looks like they didn't have the capacity to change the missles target or anything. And they got taken out shortly after that.
They may have had access to magic at a time when almost no-one else did. (Daniel Howling Coyote was a powerful shaman, quite possibly an initiate, two years after the incident, the immortal elves were able to do some weak magic decades earlier, and the first known awakened critter appeared seven years prior, so it is quite possible they had a little mojo on their side. ) |
|
|
Jul 19 2007, 03:39 PM
Post
#13
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Node X
Reponse 6 / System 6 / Firewall 6 / Analyze 6 IC A 6 / Attack 6 / Armor 6 / Analyze 6 / Trace 6 IC B 6 / Black Hammer 6 / Armor 6 / Analyze 6 / Trace 6 Medic 6 / Attack 6 / Black Hammer 6 / Trace 6 are stored on the Node for the IC to change their payload as needed. (If an AR hacking attempt is detected then IC B will change Black Hammer for Attack, and visa-versa.) Both the IC and the Node are programmed to use Analyze every IP Pass until an intruder is detected. If the IC believes an user to be legal, they will start a Trace and if an illegal access point is discovered then an alarm is raised. Also the system is running at ( Reponse 5 ) due to system load, so unless one of the IC is crashed treat everything (Except Firewall) as being ( Rating 5 ). Note that the Node's Matrix connection "flickers" once every 15 minutes unless deactivated by someone with Admin Level access. However, the system is hardwired to send and alert to it's control station in that event. The system gives routine warnings about the connection flicker to avoid dumpshocking their own people. (So you have to hack-on-the-fly, but at least you'll have warning before you are dumped.) ... Repeat as often as you think the corps would spend on Matrix Security, personally I see 2-5 such Nodes to go through. ... Node A Reponse 6 / System 6 / Firewall 6 / Analyze 6 IC A 6 / Attack 6 / Armor 6 / Analyze 6 / Stealth 6 IC B 6 / Black Hammer 6 / Armor 6 / Analyze 6 / Stealth 6 Medic 6 / Attack 6 / Black Hammer 6 / Stealth 6 are stored on the Node for the IC to change their payload as needed. (If an AR hacking attempt is detected then IC B will change Black Hammer for Attack, and visa-versa.) Both the IC and the Node are programmed to use Analyze every IP Pass until an intruder is detected. Also the system is running at ( Reponse 5 ) due to system load, so unless one of the IC is crashed treat everything (Except Firewall) as being ( Rating 5 ). This is the actual control node, in order to fire, two Admin Level users has to issue the command in the same IP Pass. It's not impossible for a Decker, Technomancer, or an AI to hack into by any means, but it generally shouldn't be worth the effort either. *Edit* I didn't stat out any Security Deckers that might be logged on since I figure there are enough Thor Platforms to make paying a Security Decker to sit in each system not cost effective, but if an alarm is raised, or if one happens to be logged into the system at any given time assume that they have Physical Stats ( Rating 2 ) / Mental Stats ( Rating 3 ) / Decking Skills ( Rating 4 ) / Commlink ( Rating 6 ) / Program Load ( Rating 6 ). *Edit 2.0* Made a few error corrections. *Edit 3.0* I made a few more changes to bring the Node more in line with what I was envisioning. Oh, and assume that in order to even gain access to the Node in a first place, you have to first crack a dedicated communications net as well as per Buster's suggestion. |
|
|
Jul 19 2007, 03:59 PM
Post
#14
|
|||
Dragon Group: Members Posts: 4,664 Joined: 21-September 04 From: Arvada, CO Member No.: 6,686 |
It can get higher than 12 with submersion. |
||
|
|||
Jul 19 2007, 04:02 PM
Post
#15
|
|||
Running Target Group: Members Posts: 1,246 Joined: 8-June 07 Member No.: 11,869 |
True, if they are unmanned then they would definitely be remotely accessible, however that doesn't necessarily mean that those comm lines have any connection to the matrix. If I owned a weapon like that, I'd communicate with it via a chain of dedicated direct-line-of-site microwave/laser comm lines that have no connection to anything else. I would have a dedicated stream from ground-base to geosynchronous relay-satellite, then dedicated streams to relay-satellites around the globe until reaching the actual weapon platform. To bust into that system you'd need to fly a drone right into one of its streams and spoof it with a (literal) man-in-the-middle attack. Also, if I was a country with a megabillion-nuyen weapon that can take out any of my hardened bunkers and make a mess of any of my cities, I would spend a huge chunk of my national budget on security. I would have at least a few security deckers online 24/7 on the platform and each of the dedicated relay nodes and have hordes of agents on top of that just in case someone spoofed the comm lines with a drone-based man-in-the-middle attack. |
||
|
|||
Jul 19 2007, 04:07 PM
Post
#16
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Aye, with the exception of Security Deckers I agree with everything you just said. :cyber:
|
|
|
Jul 19 2007, 04:11 PM
Post
#17
|
|
Dragon Group: Members Posts: 4,664 Joined: 21-September 04 From: Arvada, CO Member No.: 6,686 |
But then all I have to do is get a hold of a microwave/laser transmitter, and spoof commands to it. Even easier.
|
|
|
Jul 19 2007, 04:16 PM
Post
#18
|
|||
Running Target Group: Members Posts: 1,246 Joined: 8-June 07 Member No.: 11,869 |
True, on second thought: never send a human to do the job of a machine. As an aspiring supervillain, I would never trust my superweapons in the hands of mere mortals, I'd go agents/IC all the way. |
||
|
|||
Jul 19 2007, 04:21 PM
Post
#19
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
I don't think Spoof actually works like that Tarantula, because even with a dedicated communications network you could still pile on the Node System I posted on top of that, so spoofing your way into the communications grid would only allow you a crack at hacking your way into the platform itself.
|
|
|
Jul 19 2007, 04:26 PM
Post
#20
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
If it has to be a matrix node, I´d have a rather simple device check the list of accounts vs. an offline list every round (every IP if you are even more paranoid). If the online list contains unknown entries, the node is SWAMPED by IC and the THOR controller taken offline.
|
|
|
Jul 19 2007, 04:31 PM
Post
#21
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Ok, question, exactly what type of device are you using to check an offline list against an online list in orbit? And how exactly do you update the ofline list which you would want to do on a regular basis?
|
|
|
Jul 19 2007, 04:42 PM
Post
#22
|
|
Moving Target Group: Members Posts: 398 Joined: 16-August 06 Member No.: 9,130 |
All of these fail-safes people keep mentioning could all be worked around by a simple hacking+exploit or hacking+spoof test. You have to remember that hacking in SR4 is very abstract.
One last thing, for those of us that don't know what a THOR platform is, what is it? |
|
|
Jul 19 2007, 04:54 PM
Post
#23
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Sure, a ( Hacking + Exploit Test ) gets you into the node, but you still have to deal with it's defenses, including IC, hacking isn't quite that abstract.
And basically a THOR Platform is an orbital railgun that launches metal rods at ground based targets. |
|
|
Jul 19 2007, 05:21 PM
Post
#24
|
|
Creating a god with his own hands Group: Members Posts: 1,405 Joined: 30-September 02 From: 0:0:0:0:0:0:0:1 Member No.: 3,364 |
something like a THOR or nuclear weapons would not be controllable via the matrix.
period. end of story. you don't put the security of something like that in the hands of a system that can be manipulated maliciously. I'm pretty sure everyone in SR has seen the Terminator trilogy. |
|
|
Jul 19 2007, 05:23 PM
Post
#25
|
|
Cybernetic Blood Mage Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Ok, then how do you control your unmanned orbital rail guns?
|
|
|
Lo-Fi Version | Time is now: 13th November 2024 - 04:49 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.