QUOTE (Method @ Nov 11 2009, 03:10 PM)

Not necessarily. If it is obvious who is controlling the drone you can just get their Access ID and then transmit new commands. Even if the drone is "Hiding" from queries by your Access ID, it is still actively "Listening" for commands from the riggers Access ID.
Also, if you have good reason to suspect the presence of a Hidden node (like say, a drone's) you only need 4 hits to detect it. Finding hidden nodes is only really difficult if you are just randomly searching for hidden nodes in a sea of wireless traffic.
Ah, this is something that didn't occur to me. I assumed that to send data, such as a message or command, you need to designate a recipient. How do you spoof a command to a specific drone if it's not sent directly to it's node or commcode? I assume that a rigger has a list of subscribed drones listed by some sort of designation, like "DAL-234" or "Jimmy". Just because you see the Dalmation doesn't mean you can simply send out a spoofed command into the airwaves and expect it to listen, can you?
QUOTE (Method @ Nov 11 2009, 03:10 PM)

No. The Access ID is what gives the node a presence in the Matrix, and a node has to transmit its Access ID in order to be connected to the Matrix. Its part of the machine language that is required for the node to send and receive data, otherwise things would get mis-routed. You *do* have to detect a node first if it is Hidden and/or decrypt a node if it is encrypted, but baring those security measures the node has to give up its Access ID. The only exception to this is a node which has its wireless disabled. In such cases you cannot detect the node at all (and it doesn't really need an Access ID except maybe for communication between PAN devices).
CollateralDynamo said he "set a sniffer waiting for someone to log in with security access, took his comm code and decrypted his logs." This sounds to me like an Intercept Traffic action, which, according to the book "To do this, you must have access to a node through which all of the traffic passes." That means you'd have to hack into one of the commlinks or drones (I assume a user account will do). In order to Spoof a command, "You must have an access ID from which the target accepts commands (usually by making a Matrix Perception test on the authorized source or by tracing its icon)." Which requires, in CollateralDynamo's case, hacking the master K-E node or another node it is currently logged onto and tracing it back. He also said "comm code" and not "access ID" which are actually 2 different things. Maybe he meant access ID. To spoof a command, you need an authorized access ID- a comm code won't do.
Pg. 223 of SR4, anniversary editions says that "Your
persona also bears your access ID." This says to me that even if you're logged onto the rigger's commlink, any commands coming from you are still coming from your persona, not the authorized rigger's persona. The access ID is associated with the persona, not the node. However page 232, under Spoof Command, says "You send a command to a device or agent, pretending it is from an authorized
source." Does source mean node, or persona, in this case?
If you've hacked the rigger's Commlink, spoofing might be unnecessary as long as you're still logged onto his commlink, but I can see situations where you don't want to stick around in his commlink, and having rolled a matrix perception check and recorded his access ID, you can then log off and use his access ID from your own commlink to spoof commands to his drones. I think you'd still need to specify what drone you're issuing a command to, however, and so you'd need to either detect it's node or also copied down it's comm code from the Rigger's subscription list.
I hope I'm not being a huge pain about this, but this one is really killing my brain. I'm either missing something or this is just another one of those vague areas I might have to make a GM call on. Thanks again for the help.
-The Dread Polack