![]() ![]() |
Sep 23 2008, 04:21 PM
Post
#1
|
|
|
Target ![]() Group: Members Posts: 13 Joined: 16-September 08 From: Bournemouth, England Member No.: 16,351 |
I'm running a game reasonably soon and am just trying to iron out some bugs. I will be using an npc hacker for my group and, to simplfy things for me, he won't accompany the group on runs, rather will live in his little cocoon. What i need to know is, prvided he has access to another runners comm-link, can he us it to hack low signal devices near the runner in question, essentually using the runners commlink as a signal booster? If so can he use his own programs through it or does he need to use ones loaded into that runners comm-link?
Secondly, if the runners infiltrate an area with a wired computer system, can the basically hook up to that system, with their comm-links and the hacker use them to try and access the data, basically using their comm-links as uplinks? If not, is there anyway that this can be done. Got to say, the new matrix is baffling me just a little. Cheers in advance. |
|
|
|
Sep 23 2008, 04:28 PM
Post
#2
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 400 Joined: 8-September 08 From: St. Louis, UCAS Member No.: 16,329 |
First off, welcome.
Second, yeah, he could access other links and wireless devices that are meshed or accessible by your runner team, because his persona takes his active programs with it. However if you were going to go into a facility with a closed, non wireless system, chances are he wouldn't be able to access it unless he was on the spot. This is because while your team and link into the system with their comms and that would be a link for him, most complexes with a closed system use radio wave blocking paint and faraday cages to prevent outside signals from getting in and theirs from getting out. That being said, if you have a means of creating a link to the outside world, yeah he could access that system. |
|
|
|
Sep 23 2008, 04:30 PM
Post
#3
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 829 Joined: 26-February 02 Member No.: 770 |
It's not impossible, but it'd be fairly tricky to pull off.
The limitation is that any two directly connected nodes would have to be within each other's signal range...so to do this the easy way, both commlinks would need the satellite uplink attachment, and he'd still be next-to or absolutely worthless anywhere with EW or WIFI-inhibiting materials. The hard way doesn't need to hack the satellites, but does need to go through potentially dozens of individual nodes to reach said commlink, and has the same limitations with the addition of static or dead zones. |
|
|
|
Sep 23 2008, 04:31 PM
Post
#4
|
|
|
Target ![]() Group: Members Posts: 13 Joined: 16-September 08 From: Bournemouth, England Member No.: 16,351 |
Thankyou kindly. It's been a long time since I played or ran the game and some I'm a bit rusty. Was all wired back in my day. I'll think on a way of getting the signal through, even if it involves the runners going in blind and then having to deactive the jammers.
|
|
|
|
Sep 23 2008, 04:32 PM
Post
#5
|
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 1,755 Joined: 5-September 06 From: UCAS Member No.: 9,313 |
Our teams Hacker has the other team members commlinks slaved to his for added security and teamwork bonus's. Certainly all comms are part of the "mesh" network so any comm you can reach with your signal acts as a retrans unit for range purposes. The drone bug in unwired can be carried by a team for those physical hookups or as long as one of the slaved comms in your network is plugged in that would seem to work too. His programs are still run from his comm/node unless he loads them on another node he has admin access for.
|
|
|
|
Sep 23 2008, 04:41 PM
Post
#6
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 400 Joined: 8-September 08 From: St. Louis, UCAS Member No.: 16,329 |
His programs are still run from his comm/node unless he loads them on another node he has admin access for. That's what I meant. technically his persona and his programs never leave his comm, but they can interface with any device that it is connected to. Unless you, as stated above, gain admin access on a system and dump programs on it to use its system resources (namely save your response). |
|
|
|
Sep 23 2008, 05:29 PM
Post
#7
|
|
|
Awakened Asset ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
Thankyou kindly. It's been a long time since I played or ran the game and some I'm a bit rusty. Was all wired back in my day. I'll think on a way of getting the signal through, even if it involves the runners going in blind and then having to deactive the jammers. You can have one signal 6 node in the getaway vehicle (matrix access however), and one signal 6 node as a relay link. Both are hidden, but have each other on their "authorised" list. Both are running ECCM. Should take care of jammers completely. WiFi-blocking paint is not a complete stop-gap if you keep the rating low. Then your hacker could use a personal mobility vehicle, and simply go along for the ride in an armored rigger cocoon. Then maybe I can interest you in this, even if it does not deal with networking (shameless plug): An Introduction into the Matrix Rules. |
|
|
|
Sep 23 2008, 05:47 PM
Post
#8
|
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,629 Joined: 14-December 06 Member No.: 10,361 |
Also, if the jamming or wi-fi inhibiting security architecture are too much, don't forget that wired connections still exist. You can use a fiber-optic tap to get access to a closed system and then run the cable either to a hardwired out line, a satlink on the roof, a high signal device like a nearby wireless hardware/node/commlink/drone, or depending on silliness of cable length, all the way back to the car! This also could be a major source of activity of your runners, to set up the relays without getting tagged by security and blowing the run, or if you have a combat focused team, they have to shoot their way in, defend the uplink as the hacker works and jet before backup arrives.
Also, if the matrix confuses, don't forget you can generalize the NPC hacker's job into a single hacking roll, or even just handwaive it. An example is you could have the hacker roll Hacking+Exploit opposing the Node's Firewall+System. OR Make the threshold the Firewall+System, double the IC's rating or the security hacker's Cybercombat+Attack/Blackout/Blackhammer/Response/System/Logic/etc. Just abstract it. |
|
|
|
Sep 23 2008, 06:38 PM
Post
#9
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 400 Joined: 8-September 08 From: St. Louis, UCAS Member No.: 16,329 |
I ran a campaign once when the team had a matrix connection in a dead zone because they had laid down a line of higher signal RFID tags and were piggybacking signals to a nearby building a few blocks away that had wired access.
|
|
|
|
Sep 24 2008, 06:57 AM
Post
#10
|
|
|
Target ![]() Group: Members Posts: 13 Joined: 16-September 08 From: Bournemouth, England Member No.: 16,351 |
Thats pretty much what i thought. I was going to get my hackers signal as high as possible and likewise for one or two of the runners. The games is going to be almost exclusively based in and around seattle so i don't see the range as being too much of an issue. I didn't actually think of running ECCM, so thanks for that. In wi-fi restricting paint zones i'm quite keen on the idea of the runners having to run wired access to area's outside to get me in, adds a bit of something extra to the game.
|
|
|
|
Sep 26 2008, 04:55 PM
Post
#11
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 385 Joined: 20-August 07 Member No.: 12,766 |
To summarize, it's entirely possible, even in facilities with a wi-fi conscious defense layout. However, your runners are going to have to do a whole lot of both pre-preparation and on-site plan changes to make sure he can get in that network. Your average runner's personality probably wouldn't tolerate so much bullshit just so the geek dosen't have to show his face.
|
|
|
|
Sep 26 2008, 05:19 PM
Post
#12
|
|
|
Cybernetic Blood Mage ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,472 Joined: 11-March 06 From: Northeastern Wyoming Member No.: 8,361 |
Disclaimer, I STILL have not had the time to read Unwired or Runner's Companion has well as I would have liked, so I'm not entirely sure that the rules back me up.
You know, since this is a NPC anyways, instead of being a Bunker Decker, have him really be an AI, and the "custom relay" that the team has to plug into the closed system is it's host. Of course, the AI is perfectly content with the rest of the team believing that he is just a geek who is deathly afraid of losing any of his tech. OF course with Runners being who they are, the AI is likely to wind up stranded sooner rather than later... (IMG:style_emoticons/default/cyber.gif) |
|
|
|
Sep 26 2008, 06:36 PM
Post
#13
|
|
|
Shadow Cartographer ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,737 Joined: 2-June 06 From: Secret Tunnels under the UK (South West) Member No.: 8,636 |
Just to add that the whole wireless areas, wi-fi inhibiting paint, etc. are just a device for GMs to use to stop a player leaving his hacker safe at home. There's no actual reason why a site has to have a seperate area for security and in fact a number of reasons why, once you give up GM fiat ruling them out, everything should be connected. So if you as GM actually want the hacker remotely accessing all the time, then just allow it to be possible. |
|
|
|
Sep 26 2008, 07:31 PM
Post
#14
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 194 Joined: 30-October 07 From: Sadly, NE Member No.: 13,962 |
OF course with Runners being who they are, the AI is likely to wind up stranded sooner rather than later... (IMG:style_emoticons/default/cyber.gif) Rigger: "Chums, this is getting tight, we're gonna have to blow the van." AI: "Wait... what?" |
|
|
|
Sep 27 2008, 09:38 AM
Post
#15
|
|
|
Target ![]() Group: Members Posts: 13 Joined: 16-September 08 From: Bournemouth, England Member No.: 16,351 |
Not a bad idea, to just restrict the amount of wi-fi inhibiting tech until a runner decides to play his own hacker. My group is pretty good, so if I explain that the stuff does exist but i'm waiving it for now for the npc so i don't have to worry about him having to get involved in gun fights and such, they'll get over it.
Hacker being an AI? Hmm, I was figuring an ex hacker who got horribly maimed by something and now lives in a life sustaining cocoon and has serious drug dependence issues (bit like ravenor from Dan Abnets novels really), but could be an AI instead. I'll leave some hints and see how the group take it. The basic premise is that they have never met the guy and won't until he is tracked and kidnapped and they have to find and resuce him.... Either than or he betrays them at some point, haven't figured which yet, both maybe.... |
|
|
|
Sep 27 2008, 10:29 AM
Post
#16
|
|
|
Awakened Asset ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
I would suggest to give a straight matrix connection to very few chokepoint nodes (say rating 4, IC, the works). Onsite devices are kept from connecting to the outside as far as possible. (Slaving, WiFi-inhibiting paint, low signal ratings). Your teams hired help will have to come through the matrix security chokepoint, while any character that has some hacking skills can deal with the comparativly weak onsite nodes (low-rated nodes can´t defend against qualified attackers anyway, so no corp would sink money into making them just a bit stronger).
Your players would only have to deal with circumventing the wireless block if the target node is not even indirectly connected to the matrix. Should be rare. The security of the chokepoint determines the cost of outside help. As for the hacker, I would suggest a heavily damaged, run-away cyborg. All her money is going to maintenance, and she´s trying to scrape up the money for repairs. Could almost be an AI, because all physical contact is to be avoided, if you are an obvious cyborg (damage), and on the run. "Kidnapped" as in "brought home" here... |
|
|
|
Sep 27 2008, 10:44 AM
Post
#17
|
|
|
Target ![]() Group: Members Posts: 13 Joined: 16-September 08 From: Bournemouth, England Member No.: 16,351 |
You can tell it's been a long long time for me. never considered chokepoints either. that also seems like a good idea. Seems i can mix it up for various runs, chokepoints on one, open matrix on another, no wireless contact on another. Keeps the group guessing and I like that.
I really like the cyborg idea, and it's one i may do in the future. Doesn't work for me know though because i am making the hacker by the same rules as the rest of the group. Helps me get to know how to make one, how they work and what their disadvantages are, hence the reason i won't just decide if the hacker succeeds or not. |
|
|
|
Sep 27 2008, 12:30 PM
Post
#18
|
|
|
Awakened Asset ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
Kyoto Kid´s Matrix Specialist Archtype
Note that the above character was created with the main book only, and that both Augmentation and Unwired offer tons of additional options. |
|
|
|
![]() ![]() |
|
Lo-Fi Version | Time is now: 30th March 2026 - 09:31 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.