IPB

Welcome Guest ( Log In | Register )

2 Pages V   1 2 >  
Reply to this topicStart new topic
> What matrix Actions can do against shortwave radio, Can I jam/intercept/
Cthulhudreams
post Oct 2 2007, 05:38 AM
Post #1


Runner
******

Group: Members
Posts: 2,650
Joined: 21-July 07
Member No.: 12,328



I get a pair of modern CB radio or a brace of walkie talkies and I take them to 2070.

What matrix actions if any can be viably used against them?

Ones that occur to me as being entirely logical are "Jam" and "Intercept", and using "Sniffer" to find the node.

But can I also hack the transmission and replace it with something else, and can I launch an exploit attack against the receiver?

Edit: If you don't think I could intercept it with my commlink and software suite, why not?

Edit2: Changed analogy from shortwave to Walkietalkies/CB radio.
Go to the top of the page
 
+Quote Post
Kronk2
post Oct 2 2007, 05:48 AM
Post #2


Moving Target
**

Group: Members
Posts: 490
Joined: 29-August 06
From: Texas
Member No.: 9,245



Locally, aside from hacking the transmitter I would think that there would not be much a comlink would be able to do to it.

Logic.
What is in the air is in the air. You may be able to Yankee jam it by hot broadcasting over the frequency that it is using, if you time it very carefully and get a strong enough transmitter, you may be able to totally highjack his frequency and run your own show. However the best way to handle hijacking the show is to hack the originating stations playlist. All the DJ does is keep the audience happy. Heck there are radio stations now that don't even bother having DJ's, its all done by the programing directer ahead of time, or by pressing random on the corp sponsored playlist.

Not going to start my rant against the death of radio in America.
Go to the top of the page
 
+Quote Post
Cthulhudreams
post Oct 2 2007, 05:52 AM
Post #3


Runner
******

Group: Members
Posts: 2,650
Joined: 21-July 07
Member No.: 12,328



Shortwave radio was a fairly arbitary, and thinking about it possibly bad example. Maybe a CB radio would make the problem I am trying to draw out via analogy clearer.

Hell, two walkie talkies.
Go to the top of the page
 
+Quote Post
Kronk2
post Oct 2 2007, 06:13 AM
Post #4


Moving Target
**

Group: Members
Posts: 490
Joined: 29-August 06
From: Texas
Member No.: 9,245



So let me get this sorted in my head. You are trying to sort out what kind of interference one could generate with a comlink to a radio style device, yes?

<Given that a comlink can broadcast in the same frequency range as the radio device you are trying to affect>

I could totally see sniffer being somewhat useful if they are using Spread Spectrum
Go to the top of the page
 
+Quote Post
Cthulhudreams
post Oct 2 2007, 06:18 AM
Post #5


Runner
******

Group: Members
Posts: 2,650
Joined: 21-July 07
Member No.: 12,328



I'm aware of the real life uses of RF devices, jamming there of etc.

What I'm asking is, Can I use a commlink to: Intercept the communication between the walkie talkies (seems logical?)

Haxor out the message going between the walkie talkies and replace it with my own?

Use exploit to hack into one of the walk talkies wireless-ly?

:)
Go to the top of the page
 
+Quote Post
Kronk2
post Oct 2 2007, 06:19 AM
Post #6


Moving Target
**

Group: Members
Posts: 490
Joined: 29-August 06
From: Texas
Member No.: 9,245



QUOTE (Cthulhudreams)
Edit: If you don't think I could intercept it with my commlink and software suite, why not?

My main contention is that I don't think that they would be able to operate on the same set of frequencies.

On the software side, the software should be able to handle this. It might be a bit taxed because this is an odd usage for the programs, but I feel that you should be able to use the detect wireless node if you are in range of the broadcast.

Once you get inside the frequency range and establish what transmit/ receive protocol they are using, disrupting a signal gets to be pretty easy.

What you need is to be able to decrypt the transmission, alter it, and resend it with the proper protocol. The more information based and less voice based the transmission is the more difficult this will be.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Oct 2 2007, 08:00 AM
Post #7


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (Cthulhudreams)
What I'm asking is, Can I use a commlink to: Intercept the communication between the walkie talkies (seems logical?)

Sure, it's a soft-radio. Tune in and have fun.

QUOTE (Cthulhudreams)
Haxor out the message going between the walkie talkies and replace it with my own?

The rules for a MitM-Attack only exists for wired connections.

QUOTE (Cthulhudreams)
Use exploit to hack into one of the walk talkies wireless-ly?

GM call. Even in 2070, there will be devices simply to dumb to be hacked, especially if they offer no data connections.
Go to the top of the page
 
+Quote Post
Buster
post Oct 2 2007, 12:00 PM
Post #8


Running Target
***

Group: Members
Posts: 1,246
Joined: 8-June 07
Member No.: 11,869



CB/walkie-talkies are called "micro-transceivers" in SR (p. 320). A Scan program can run for cheap on your commlink that will scan all frequencies for you and find the CB/walkie-talkie/micro-transceiver traffic (if they are not frequency hopping).

If the cb/walkie-talkie/micro-transceiver jock keeps hopping frequencies, you need a (very expensive) Sniffer program on your commlink and use electronic warfare to keep listening to his conversation. See Intercept Wireless Signals (p. 225).
Go to the top of the page
 
+Quote Post
The Jopp
post Oct 2 2007, 12:49 PM
Post #9


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (Rotbart van Dainig)

The rules for a MitM-Attack only exists for wired connections.

MITM attacks can easily be done with wireless as well, if not even easier.

Intercepting wireless signal SR4 page 225:

“If you want to block out some parts of the traffi c or add in your own, you must make an Edit action�
Go to the top of the page
 
+Quote Post
Cthulhudreams
post Oct 2 2007, 12:57 PM
Post #10


Runner
******

Group: Members
Posts: 2,650
Joined: 21-July 07
Member No.: 12,328



So falling back to 'old school' technology - in this case 70 year old radios doesn't actually do anything? Though the exploit question is undecided.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Oct 2 2007, 12:58 PM
Post #11


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



Actually, that only references towards recording/forwarding said traffic.

There is no rule for inserting fake traffic like there is for wired connections. Yet.
Go to the top of the page
 
+Quote Post
The Jopp
post Oct 2 2007, 01:07 PM
Post #12


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (Rotbart van Dainig)
Actually, that only references towards recording/forwarding said traffic.

There is no rule for inserting fake traffic like there is for wired connections. Yet.

I would believe that the "block" and "insert your own" kinda included that part.

1.Block undesired traffic
2.insert your own traffic in its place.
Go to the top of the page
 
+Quote Post
Blade
post Oct 2 2007, 01:09 PM
Post #13


Runner
******

Group: Members
Posts: 3,009
Joined: 25-September 06
From: Paris, France
Member No.: 9,466



I'd go with Robart: falling back to old school radios won't do anything as far as signals are concerned: they send and receive wireless signals just like any other wireless node except that they use a simple protocol to do so.

I'd also say that they are protected from exploit simply because you can't change any settings by sending wireless signals to them. You can't even log on them!

But you don't need a 70 year old radio to achieve this: a transceiver with everything hardwired will give the same results.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Oct 2 2007, 01:43 PM
Post #14


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (The Jopp)
QUOTE (Rotbart van Dainig @ Oct 2 2007, 12:58 PM)
Actually, that only references towards recording/forwarding said traffic.

There is no rule for inserting fake traffic like there is for wired connections. Yet.

I would believe that the "block" and "insert your own" kinda included that part.

1.Block undesired traffic
2.insert your own traffic in its place.

No, that's not quite it - look across the page. The wired section uses exactly the same wording... but has an additional rule how to handle faking.
Go to the top of the page
 
+Quote Post
The Jopp
post Oct 2 2007, 02:32 PM
Post #15


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (Rotbart van Dainig)
QUOTE (The Jopp @ Oct 2 2007, 03:07 PM)
QUOTE (Rotbart van Dainig @ Oct 2 2007, 12:58 PM)
Actually, that only references towards recording/forwarding said traffic.

There is no rule for inserting fake traffic like there is for wired connections. Yet.

I would believe that the "block" and "insert your own" kinda included that part.

1.Block undesired traffic
2.insert your own traffic in its place.

No, that's not quite it - look across the page. The wired section uses exactly the same wording... but has an additional rule how to handle faking.

Interesting.

I read it as when inserting fake traffic across a wired medium there is a higher chance of being detected as you try to pass as someone else (the sender).

With the wireless medium you simple insert traffic and would be immediately found out? Sounds odd as you CAN insert traffic according to the RAW - you just cannot insert faked traffic in the wireless medium.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Oct 2 2007, 02:39 PM
Post #16


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



Sounds like:
QUOTE (Rotbart van Dainig @ Oct 2 2007, 10:00 AM)
The rules for a MitM-Attack only exists for wired connections.

Go to the top of the page
 
+Quote Post
Adarael
post Oct 2 2007, 02:58 PM
Post #17


Deus Absconditus
******

Group: Dumpshocked
Posts: 2,742
Joined: 1-September 03
From: Downtown Seattle, UCAS
Member No.: 5,566



I find it very hard to believe that an area broadcast is capable of being hacked and edited in real time, especially since unlike with wireless matrix traffic there's no source and target node(s). It's simply RF manipulation on a broad scale. I mean, if I have a 5km range, and you have a 5km range, and we're 2.5 km apart.. okay, maybe you can futz with my transmission as it passes through yout strong signal zone. But the people 5km on the other side of me, that are 2.5 km outside of your signal range? How are you hacking signal being broadcast to an area you can't even reach?

I think jamming is your only realistic solution.
Go to the top of the page
 
+Quote Post
Blade
post Oct 2 2007, 03:30 PM
Post #18


Runner
******

Group: Members
Posts: 3,009
Joined: 25-September 06
From: Paris, France
Member No.: 9,466



I guess it's possible to do so by, to take a contemporary example, tricking the collision prevention system.

It's a bit technical but I'll try to explain it as simply as possible:
when A tries to reach B, if C is emitting in the middle, there could be collisions between the two signals which will block A's messages to B.
There are ways to prevent this from happening.

But let's consider that you're C, and you're preventing A and B from sending anything to each other but you trick them into believing that they can. They'll send signals, your own signals will collide with them anb both will receive whatever you're sending.

So it's technically possible. It's a bit like jamming, but far more subtle.
Go to the top of the page
 
+Quote Post
Buster
post Oct 2 2007, 03:31 PM
Post #19


Running Target
***

Group: Members
Posts: 1,246
Joined: 8-June 07
Member No.: 11,869



You can capture, block, and re-send edited data on wired lines because the medium is contained within the wire. However, wireless traffic is broadcast in all directions and goes right past you as you intercept and read the transmission. You'd have to capture the transmission and then smother it before that same transmission passed you at the speed of light and reached the recipient.

Therefore, you'd need some way of jamming the incoming transmission so that jammer does not block that incoming transmission for you so you can read the original message, but no one else can. Then you'd need some way to re-send your edited transmission to the original recipient without jamming yourself. I'm not sure jammers have that kind of control even in 2070.

Maybe in 2070, electronic warfare has progressed to the point where wireless signals can be selectively manipulated the way active noise-cancelling headphones selectively block and transmit sound.

I don't have a degree in electromagnetic theory, but you can always say that technomancers can do it, but no one else can.
Go to the top of the page
 
+Quote Post
Adarael
post Oct 2 2007, 04:57 PM
Post #20


Deus Absconditus
******

Group: Dumpshocked
Posts: 2,742
Joined: 1-September 03
From: Downtown Seattle, UCAS
Member No.: 5,566



QUOTE (Blade)
I guess it's possible to do so by, to take a contemporary example, tricking the collision prevention system.

It's a bit technical but I'll try to explain it as simply as possible:
when A tries to reach B, if C is emitting in the middle, there could be collisions between the two signals which will block A's messages to B.
There are ways to prevent this from happening.

But let's consider that you're C, and you're preventing A and B from sending anything to each other but you trick them into believing that they can. They'll send signals, your own signals will collide with them anb both will receive whatever you're sending.

So it's technically possible. It's a bit like jamming, but far more subtle.

And far more difficult. I'd still personally vote no on this without a dedicated device to do it. That's because with the "Edit" program, I can envision packet substitution, packet deformation, and a general sense of real-time subtle manipulation based on altering things that have their general shape and size determined by digital protocols. With RF, it's POSSIBLE, but I think it would be unrealistic to suggest a commlink has the kind of processing required to manipulate analog RF in real-time without an add-on module, just because it's not something it's designed to do on a day-to-day basis.

Same rationale as to why area and directional jammers and bug scanners are objects separate from the commlink, for me.
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 2 2007, 05:12 PM
Post #21


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (The Jopp)
QUOTE (Rotbart van Dainig @ Oct 2 2007, 08:00 AM)

The rules for a MitM-Attack only exists for wired connections.

MITM attacks can easily be done with wireless as well, if not even easier.

Intercepting wireless signal SR4 page 225:

“If you want to block out some parts of the traffi c or add in your own, you must make an Edit action�

i think it was found that said quote was only ever supposed to work on any recording done. so that if you want to remove something from the recorded traffic, or insert something in it, you can do. but you can do so on traffic as it happens.
Go to the top of the page
 
+Quote Post
Cthulhudreams
post Oct 2 2007, 11:17 PM
Post #22


Runner
******

Group: Members
Posts: 2,650
Joined: 21-July 07
Member No.: 12,328



QUOTE (Adarael)
With RF, it's POSSIBLE, but I think it would be unrealistic to suggest a commlink has the kind of processing required to manipulate analog RF in real-time without an add-on module, just because it's not something it's designed to do on a day-to-day basis.

Why wouldn;t a commlink have this sort of processing power? The processing power on an advanced commlink is unbelievable by todays purpose

Agents are actually capable of taking instructions like "Find me rental properties in in the inner north of Sydney that cost less than 500 bucks a week, that have large bedrooms and an ensuite, then book me in to inspect them against my calendar" and then actually do it.

Which is just astounding by modern standards. Thats not even touching on the ability to actually decrypt one time pads!!11!!!11! (Sic!)

Which they can also do.

I think their processing power is essentially unlimited, and anything that can be attempted by a modern supercomputer is a snap.

Why would they be limited?
Go to the top of the page
 
+Quote Post
Adarael
post Oct 2 2007, 11:29 PM
Post #23


Deus Absconditus
******

Group: Dumpshocked
Posts: 2,742
Joined: 1-September 03
From: Downtown Seattle, UCAS
Member No.: 5,566



Simply this: the commlink is designed to process, create, and manipulate matrix data, not RF signals. This is why the commlink is not also an area jammer, also a bug scanner, and also a laser microphone.
Also why they are not keycard spoofers, retinal scan spoofers, cellular glove molders, or anything like that. While commlinks are extremely powerful, they are not extremely powerful at every type of calculation possible. I've sort of assumed that other devices used in security operations have specialized processors and chips that enable them to do their jobs in real-time more effectively than commlinks, which is why they exist rather than people just using software for the same functions. This is also why using hacking to open a maglock is a very different process than just swiping a keycard spoofer.

Or, to put it another way: your commlink is very powerful. But is it powerful enough to use software to effectively emulate the functions of items such as the "Select Sound Filter" without a specialized hardware add-on? The jury says no, because there would be cheaper software options for doing so rather than the still relatively cheap disposable earplugs, in that case. The architecture for such devices is necessarily highly specialized, which is why it isn't included in all-in-one devices like a commlink. Same reason my cellphone doesn't come with an MP3 player unless I pay extra - there's no reason for that chip architecture UNLESS I wanna play MP3s.

It's not that they can't if you mod them, it's that as stock they don't have the hardware to do it.
Go to the top of the page
 
+Quote Post
Cthulhudreams
post Oct 3 2007, 12:15 AM
Post #24


Runner
******

Group: Members
Posts: 2,650
Joined: 21-July 07
Member No.: 12,328



Isn't Matrix data an RF signal? I assumed RF comes into play at this part? Thats why I asked about CB radios etc because you could look at them as an extremely primitive 'trix' node.

Go to the top of the page
 
+Quote Post
Adarael
post Oct 3 2007, 01:38 AM
Post #25


Deus Absconditus
******

Group: Dumpshocked
Posts: 2,742
Joined: 1-September 03
From: Downtown Seattle, UCAS
Member No.: 5,566



Different frequencies and different properties because of that. WiFi (assuming the same freq band as now) is 2.4 GHz. CB is 27 MHz, Emergency and military radios run between 30 and 950 MHz.

A good rule of thumb is "The higher the hertz of a radio band, the higher the datarate and consequently the clearer the signal." That's why despite ELF radio being able to reach submarines while they're under water, they wouldn't use ELF to transmit complex data, simply to signal the sub to rise enough for a regular antenna to protrude from the water. As ELF is between 3 and 30 Hz, subs can only recieve a couple of letters per second.

Basically standard RF just isn't the band commlinks are designed to work on - at least not stock commlinks.

PS: This is a gross, gross simplification of all of the differences in datarate, freq band and all that. I know this. But this is, at base, why commlinks don't talk to radios unless you mod them.
Go to the top of the page
 
+Quote Post

2 Pages V   1 2 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 26th April 2024 - 01:49 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.