QUOTE (GreyBrother @ Apr 17 2009, 03:55 AM)
A Node is just one Place. There is no "strolling around" for an IC. If it is active, it can detect you if it is programmed to scan for Intruders, whether it is near you or not. The same reason you can't hide behind a pillar icon, it's just not there and the Analyze-Tool won't get any penalties for detection (Except your Stealth uses that as preprogrammed metaphor)
I try to play along. AFAIK it is written somewhere that the "Location" of an icon in a node represents the point where it focuses its attention. So, a hacker who is decrypting a file hovers in the vicinity of the file, a Sec-Hacker reviewing the access log is near the access log icon and so on. "On Patrol" would then be a metaphor for the sweeping of access logs or memory banks and so on. Would you agree?
Well... maybe. I freely admit I'm working in a "reverse logic" method here. If the Analyze program of an IC can observe all things at all times then that creates an unplayable situation where the GM must roll every IP to see if an IC program detects an intruding Hacker. Besides that taking way too long, it creates nearly unhackable systems since the laws of probability say that if you roll enough times,
eventually the IC will roll well and the Hacker will roll poorly and they'll be discovered.
There is precedent in the rules that Analyze programs must be "focused" on a particular Icon in order to determine more detail. One must make a Matrix Perception test on the
specific file for instance to determine if it Encrypted or if it has a Data Bomb attached to it. An action must be spent "observing in detail" a particular icon in order to gain more detail about it. A Stealth program disguises a user's icon to appear to be "mundane" or just "part of the landscape" of a node. Ergo, without "observing in detail" and spending time to look "specifically" at that icon a Hacker running Stealth will go completely unnoticed from casual inspection. There are far too many icons flying through most Matrix system for any one (or even a group) of IC to analyze
every icon in detail. Therefore, IC must split their attention by either randomly scanning different icons as they move through the system ("random stop checks"), or refining their interest to a particular sub-system that may be especially sensitive (the research datastore, for instance).
An IC simply looking at the access log would be like a Spider or Security Guard sitting at the security desk and watching the building's automated system. They might see signs of suspicious activity or they might not. It might take them time to mobilize to a part of a system where a possible intrusion has happened or is happening. Yes, I do think that their is some form of "space" in the Matrix. This could mainly take the form of "focus of attention." An IC program could be monitoring the system at a very high level ("at the desk" so to speak) and if it sees something suspicious it could then "move" to that area by shifting its attention to the specific programs and processes involved in that particular sub-process.
I'm a Software Developer and I have a degree in Electronic Engineering. I know how computers of today do their thing, but I have absolutely
no interest in translating that into any direct manner into my Shadowrun game. Accurate dice simulation of computers would be extremely boring. I was talking to another engineer friend of mine and we agreed that the entire concept of Cybercombat with variable "program damage" that can be "healed" is utterly ridiculous from a contemporary standpoint. So too is the concept that there are "locations" inside of a computer that programs must "move to." However, Cybercombat does make a very fun and exciting
game, therefore I like it. Also, I find that thinking about SR computers as physical "places" that have "rooms" in them were someone can "hide" while IC programs "walk by" is also
fun, so that's how I play.