IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Following the datatrail
Magnus Jakobsson
post Sep 16 2005, 04:26 PM
Post #1


Target
*

Group: Members
Posts: 15
Joined: 20-August 05
Member No.: 7,576



QUOTE (sr4 page 216)
Every time you are online—which is usually all of the time—your presence is logged. Every wireless device, terminal, and wired jackpoint has a unique serial number assigned by the manufacturer (and often registered with the local telecomm authorities as well). This access ID is associated with all of your online transactions and typically logged by any device you access. This record is called your datatrail, and it may be used by hackers to track you down or by law enforcement to link you to certain crimes or activities.


How do you use the datatrail to track someone?

I would guess that you use the track action (page 219). The description of the track action, however, seems to imply that you can only track someone from his icon, ie. while he is still around. Do you use the same mechanic to trace him through the access ID that he has left behind?

Also: How long does it take to spoof your access ID? Only a complex action?

- Magnus

Go to the top of the page
 
+Quote Post
Wasabi
post Sep 16 2005, 05:09 PM
Post #2


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



The way I read it the Access ID must be determined using a Scan in case you wish to spoof a command as if sending from that person. If the person is not there, you can't Scan them in order to spoof them.

As far as Track goes, my reading of it says the datatrail leads TO the Access ID so if the user has logged off thats not possible. (and one tactical reason why Black IC ties up the user where they can't log off!)

If they are visible to matrix perception, then you test and try to get all the way to their commlink which is the origin of their Persona and Access ID. If you succeed you get both Access ID and physical location at that point.
Go to the top of the page
 
+Quote Post
Magnus Jakobsson
post Sep 17 2005, 02:15 PM
Post #3


Target
*

Group: Members
Posts: 15
Joined: 20-August 05
Member No.: 7,576



I agree that if someones matrix icon is actually present you can roll Matrix Perception to get their Access ID. You can also use the Track command to get both their Access ID and their physical location.

What I'm looking for, however, is a system for tracking someone who HAS accessed a node, but isn't right now. The book says that you can do this. Your Access ID is supposed to be "logged on any device you access" and this datatrail "may be used by hackers to track you down or by law enforcement to link you to certain crimes or activities". That's why you regularly spoof you Access ID.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Sep 17 2005, 02:26 PM
Post #4


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



You need do hack the node, get at least security access and read the logs, then do so on any nodes near this node and recreate a path...
Go to the top of the page
 
+Quote Post
mintcar
post Sep 17 2005, 10:53 PM
Post #5


Karma Police
***

Group: Dumpshocked
Posts: 1,358
Joined: 22-July 04
From: Gothenburg, SE
Member No.: 6,505



This is why such a trace can be made by law enforcement, but only very rarely by others. (Maybe you could hack Lone Star and get some kind of universal access to the information, thereby saving a lot of time, but that would be very hard)
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Sep 17 2005, 10:55 PM
Post #6


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



Beware the grid providers.
Go to the top of the page
 
+Quote Post
Magnus Jakobsson
post Sep 22 2005, 07:31 PM
Post #7


Target
*

Group: Members
Posts: 15
Joined: 20-August 05
Member No.: 7,576



OK, but if you have gotten hold of a (valid) Access ID, what can that tell you?

1) Can you track down the Comlink (or other device) it belongs to physically? I would guess not, but I'm not sure. (Can you do this with a modern MAC address?)

2) Can you find out who the owner is? According to page 216 the Access ID is "often registered with the local telecomm authorities", but I would guess that these records aren't public.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Sep 22 2005, 07:41 PM
Post #8


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



Yes & yes - if you can hack your way. ;)
Go to the top of the page
 
+Quote Post
Aeros
post Sep 22 2005, 10:07 PM
Post #9


Target
*

Group: Members
Posts: 13
Joined: 13-September 05
Member No.: 7,735



QUOTE (Magnus Jakobsson)
1) Can you track down the Comlink (or other device) it belongs to physically? I would guess not, but I'm not sure. (Can you do this with a modern MAC address?)

2) Can you find out who the owner is? According to page 216 the Access ID is "often registered with the local telecomm authorities", but I would guess that these records aren't public.

My understanding (mostly from other posts) is that your physical position is automatically triangulated by the system constantly while in active or passive mode, and is independent of any commcode used. (no, you can't do this with a modern MAC address)

Sure you can find out who a commcode belongs to, if you hack the info from someone who knows. Of course, most of the people a runner will trace will come up "Mr. Smith/Johnson/White" etc.
Go to the top of the page
 
+Quote Post
hobgoblin
post Sep 23 2005, 09:35 AM
Post #10


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



and the reason why you cant do 1) with a MAC address is that it dont exist past the first router (if at all, like say if one is using a dialup).

so the accessID would be more like a permanent IP Address assigned to your device. kinda like how the envision IPv6 to be as it gives access to so many more numbers. err in fact, with IP6 you can use a MAC address to trace the hardware as you an use the MAC address to generate a IP6 address. basicly both are based on groups of hex number, but as the IP6 address is longer then existing MAC addresses. so by filling out the extra numbers by lead zeros you have your very own address :P

routing in that kind of enviroment may be a bitch tho as you can just forget about static routes.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 28th April 2024 - 05:53 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.