Following the datatrail |
Following the datatrail |
Sep 16 2005, 04:26 PM
Post
#1
|
|||
Target Group: Members Posts: 15 Joined: 20-August 05 Member No.: 7,576 |
How do you use the datatrail to track someone? I would guess that you use the track action (page 219). The description of the track action, however, seems to imply that you can only track someone from his icon, ie. while he is still around. Do you use the same mechanic to trace him through the access ID that he has left behind? Also: How long does it take to spoof your access ID? Only a complex action? - Magnus |
||
|
|||
Sep 16 2005, 05:09 PM
Post
#2
|
|
Running Target Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 |
The way I read it the Access ID must be determined using a Scan in case you wish to spoof a command as if sending from that person. If the person is not there, you can't Scan them in order to spoof them.
As far as Track goes, my reading of it says the datatrail leads TO the Access ID so if the user has logged off thats not possible. (and one tactical reason why Black IC ties up the user where they can't log off!) If they are visible to matrix perception, then you test and try to get all the way to their commlink which is the origin of their Persona and Access ID. If you succeed you get both Access ID and physical location at that point. |
|
|
Sep 17 2005, 02:15 PM
Post
#3
|
|
Target Group: Members Posts: 15 Joined: 20-August 05 Member No.: 7,576 |
I agree that if someones matrix icon is actually present you can roll Matrix Perception to get their Access ID. You can also use the Track command to get both their Access ID and their physical location.
What I'm looking for, however, is a system for tracking someone who HAS accessed a node, but isn't right now. The book says that you can do this. Your Access ID is supposed to be "logged on any device you access" and this datatrail "may be used by hackers to track you down or by law enforcement to link you to certain crimes or activities". That's why you regularly spoof you Access ID. |
|
|
Sep 17 2005, 02:26 PM
Post
#4
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
You need do hack the node, get at least security access and read the logs, then do so on any nodes near this node and recreate a path...
|
|
|
Sep 17 2005, 10:53 PM
Post
#5
|
|
Karma Police Group: Dumpshocked Posts: 1,358 Joined: 22-July 04 From: Gothenburg, SE Member No.: 6,505 |
This is why such a trace can be made by law enforcement, but only very rarely by others. (Maybe you could hack Lone Star and get some kind of universal access to the information, thereby saving a lot of time, but that would be very hard)
|
|
|
Sep 17 2005, 10:55 PM
Post
#6
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Beware the grid providers.
|
|
|
Sep 22 2005, 07:31 PM
Post
#7
|
|
Target Group: Members Posts: 15 Joined: 20-August 05 Member No.: 7,576 |
OK, but if you have gotten hold of a (valid) Access ID, what can that tell you?
1) Can you track down the Comlink (or other device) it belongs to physically? I would guess not, but I'm not sure. (Can you do this with a modern MAC address?) 2) Can you find out who the owner is? According to page 216 the Access ID is "often registered with the local telecomm authorities", but I would guess that these records aren't public. |
|
|
Sep 22 2005, 07:41 PM
Post
#8
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Yes & yes - if you can hack your way. ;)
|
|
|
Sep 22 2005, 10:07 PM
Post
#9
|
|||
Target Group: Members Posts: 13 Joined: 13-September 05 Member No.: 7,735 |
My understanding (mostly from other posts) is that your physical position is automatically triangulated by the system constantly while in active or passive mode, and is independent of any commcode used. (no, you can't do this with a modern MAC address) Sure you can find out who a commcode belongs to, if you hack the info from someone who knows. Of course, most of the people a runner will trace will come up "Mr. Smith/Johnson/White" etc. |
||
|
|||
Sep 23 2005, 09:35 AM
Post
#10
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
and the reason why you cant do 1) with a MAC address is that it dont exist past the first router (if at all, like say if one is using a dialup).
so the accessID would be more like a permanent IP Address assigned to your device. kinda like how the envision IPv6 to be as it gives access to so many more numbers. err in fact, with IP6 you can use a MAC address to trace the hardware as you an use the MAC address to generate a IP6 address. basicly both are based on groups of hex number, but as the IP6 address is longer then existing MAC addresses. so by filling out the extra numbers by lead zeros you have your very own address :P routing in that kind of enviroment may be a bitch tho as you can just forget about static routes. |
|
|
Lo-Fi Version | Time is now: 28th April 2024 - 05:53 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.