IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> building security and security riggers - how does it work?
Hat
post May 14 2008, 06:41 PM
Post #1


Target
*

Group: Members
Posts: 80
Joined: 14-September 05
Member No.: 7,739



I have a number of questions about security riggers and attacks / defenses on physical sites.
Assumptions / Understanding:
  1. The majority of intrusion detection features (alarms, cameras, sensors and scanners) are wireless in 2070 at least for light or medium security facilities.
  2. An alarm, camera, sensor, etc. counts as a node that can be hacked. There are obviously limits to what can be done with it (if it’s a camera that doesn’t actually save the data directly but just feeds it, then even full Admin rights won’t get you much).
  3. As a node, an alarm, camera, sensor etc. it serves as a gateway / platform for hacking the security center.
  4. The Response stat of an alarm, camera, etc. would be equal to its device rating which by default would be 3.
  5. Attempting to hack the security center through the alarm, camera etc. is possible, but would be limited by the response of the device.
  6. A rigger / hacker can attempt to compromise any of the wireless security features provided they’re within signal range of the particular devices. Doing so would require an Intercept check to isolate the signal and likely a decrypt check to properly decode it.


Questions:
  1. I recall that Response limits hacking attempts or something similar, but can’t find a reference. Can someone point me to it?
  2. Arguably any or at least most intrusion detection features could be intercepted and decrypted. Can they be spoofed directly or does that require hacking the device itself?
  3. Is the advantage of detecting and decrypting a signal before attempting to hack a device that the decryption will be required anyway? Doing so in advance simply saves time and limits the possibilities of being detected, right?
  4. There’s a nice piece of fiction on the Shadowrun site (http://www.shadowrun4.com/fiction/r2_1.shtml) showing a run from a security rigger’s perspective. The protagonist physically compromises a sensor tower (presumably hard wired as opposed to wireless) and challenges the security hacker for control of the building. How does that work in SR4 from a mechanics perspective?
  5. When a rigger is monitoring a wide number of feeds such as having dozens of cameras subscribed through several groups, how do you set a target for Matrix perception to notice something happening in one of the cameras?
  6. For someone defending a location, if a trace indicates that a hacking attempt is coming in through a camera node for example, can that attempt be shut down by simply unsubscribing the camera?
  7. Given the large number of cameras, sensors, scanners, etc. how is that handled from a mechanics standpoint in terms of subscribing, monitoring, etc?
  8. Proximity wires – what kind of sensors are used to detect them?
  9. Alarms – other than close physical examination, is there any way to detect an alarm?


Thanks!

With a sweep of his…

Hat
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 28th September 2020 - 12:04 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.