NEWS

How to deal with those questions as a GM - Matrix stuff again.....

  • 14 Replies
  • 4023 Views

Superman

  • *
  • Chummer
  • **
  • Posts: 110
« on: <09-13-14/2202:27> »
As a GM, how would you deal with those questions (I'll add the best answer under each one):

1. I want to erase the history of the 5 cameras in front of the building ?
Answer : It looks like that having 1 file containing the security video feed is the way to go. We almost all agree on this. I would add that the file would be protected by Firewall (from the corp host or a security service host). For a data bomb on the file, I would say that you don't want it because it will destroy the file if it detonates (and you don't want this). The sequence could look like this :

  0. Matrix perception on the host to know what you are about to hit (Attribute, rating, etc)
  a. Hack on the fly the host. Get 1 mark, jump in. Gain OW.
  b. Find the file. Matrix search (1 min base time since you are in the host).
  c. Analyse the file. Matrix perception test to get rating, data bomb, protection, etc. Now you should have all the info you need.
  d. Mark the file. Hack on the fly will do. Get 1 mark. Gain OW. 
  e. Go silent, to give you time for the next step if it goes bad.
  f. If no data bomb, Crack the file (Hack+Logic vs Protectionx2). Attack action !!! Gain OW alert the security if you succeed.
  g. When it is open, Edit file action to delete the file.
  h. Log out

   Make sens ?


2. I want to find Paydata that I can sell to competitors ?
From Purvue : There are a number of ways you can do this, You can put it in a host (even in a Host Archive), requiring the decker/Technomancer to go toe to toe with the Host rating of your choice, or you can give the team more flexibility, putting it on a sararyman's commlink (as per the example in the core book). Or anywhere in between.
If you are looking for the general sequence of events for getting at a file (also relevant for #1) then it is generally:
a. Gain access to host (direct connection to a device in its WAN for a mark or mark the host directly)
b. Matrix Search (or Matrix Perception) to find the file
c. Matrix Perception to look for Data Bombs on the file
d. Mark file
e. Crack File - this alerts the host if you are successful as it is an Attack action
f. Optional - Disarm Data Bomb
g. Edit file to copy or delete
h. GTFO with all haste.

If it is in an Archive, you basically have to trick an employee or other legitimate user into accessing it so that it is in the main storage again, then perform steps A-H.


3. I want to have the plan of this building (ventilation, security, etc) ?
From Purvue : Might be on the host for the building or in the Host at the city records office. Or, most likely, both - the city probably has the original plans, the corp itself has the nasty bits they added afterward.
Spy drones could also be useful here for reconnaissance.

4. I want to have the list of the personnel and there job inside this corp (address, phone, etc) ?
From Purvue: Likely on the host - see #2. Or you could have the face sweet talk the receptionist into forwarding it to him.

5. I want to find the Spiders, security riggers for this corp ?
From Purvue : Trip the host defenses, stay alive long enough for him to show up, mark him, then Trace Icon. Or you could make it available on a file in the host, but chances are they contract out to another company, in which case you have to hit THEIR host for the employee schedule to see who is on duty at any given time.

6. I want to know the sequence of the ICE ?
From Namikaze : IC Protocols vary by host.  But I like to tell the players what the default IC loadout is from the manufacturer (get a mark on the host and you can query that info, along with the Device Rating of the host), and that at least gives them a baseline expectation.  It's up to the players then to determine the likelihood that the spider has changed the IC loadout and security protocols.  For a mom & pop shop, it's unlikely they'd change anything.  For a corporate host, you can bet anything that came with the setup isn't there anymore.  If they really want to know, they can send an agent to go and trip the alarms.  This is actually easier for a sprite, in my opinion, as some of the sprite powers and technomancer complex forms are really conducive to this kind of surveillance.

7. I want to edit the security file to accept 6 more marks (the group) for doors, elevator, etc. This mean I could reboot my deck, reset my OW and then return inside the host as a legitimate user ?
Nothing in the book, only house rules can apply to this one.
From Namikaze : Trick 7 will likely become a more feasible option with the introduction of "Deep Dives" in Data Trails.  Unfortunately, we aren't really sure what a "Deep Dive" is, but based on the wording the working theory is that it is some sort of long-duration hacking solution.  This would probably be viable for preparatory hacks and such.

Look the answer of The Wyrm Ouroboros (couple of chat bellow) for good house rules.



Please start with something like Question 1:and your answer for us to find quick reference.

EDIT : Guys, I must admit that we have solid answers here. Good job.

Tx
« Last Edit: <09-18-14/0124:03> by Superman »
Jezz the matrix rule sucks..

8-bit

  • *
  • Guest
« Reply #1 on: <09-13-14/2246:04> »
I'll just answer 7 really quickly.

I'm not exactly sure why you want 6 more marks, but rebooting your deck does not work. MARKs basically designate you as a legitimate user, but they are all wiped anytime you reboot a device. Most devices very rarely need to reboot, and most legitimate operations will gladly reinvite MARKs. Hackers don't have this convenience, so they have to illegally get their marks every time they reboot and want to access something.

Superman

  • *
  • Chummer
  • **
  • Posts: 110
« Reply #2 on: <09-13-14/2304:51> »
I'll just answer 7 really quickly.

I'm not exactly sure why you want 6 more marks, but rebooting your deck does not work. MARKs basically designate you as a legitimate user, but they are all wiped anytime you reboot a device. Most devices very rarely need to reboot, and most legitimate operations will gladly reinvite MARKs. Hackers don't have this convenience, so they have to illegally get their marks every time they reboot and want to access something.

Question 7
What I meant is that I want to modify the security file for my marks to be a legitimate one. When it's done I'm considered a normal user for the corp. It's like adding me into the list of employee working for the corp.

I might have to hack the security Decker and use spoof command to simulate a new legitimate account into the system or just find the security file and edit it to had me as legitimate user. Yes, all the mark used to do this trick will be erase when I reboot but the next time I enter, the host will see me as the normal Joe that as the right to be there.

To summarize, when they hire a new guy inside a corp, they have a process that give him specific right and security level (depending on the job he has). As a hacker I want to edit this process to have a long term pass for the corp (until they do a investigation to find fake user).

Another option might be to modify the account of an actual employee for your persona to be registered under his name and make sure this person is sick for the next three days (just enough time for the run). Why having only temp mark if you can have longer access.
« Last Edit: <09-13-14/2328:18> by Superman »
Jezz the matrix rule sucks..

Malevolence

  • *
  • Ace Runner
  • ****
  • Posts: 1552
  • Matrix Addict
« Reply #3 on: <09-13-14/2338:52> »
As a GM, how would you deal with those questions :
Not an easy list...
1. I want to erase the history of the 5 cameras in front of the building ?
You could do this in one of two ways - you could make them delete a file for each camera, or you could just rule that the footage for the whole building is written to a single file. The latter makes sense as I tend to consider files as being different from what we are familiar with today. I figure with the massive amounts of information a system manages, representing it as individual files would be overwhelming, and so I view them as more akin to the files used by Office Documents or on OSX - the OS represents them as a file, but they are really a folder (possible with sub folders) and many files and resources. In the Office case, it is effectively zipped up into one file at the OS level, but whn it is opened in Word or excel it is a number of different data streams. So, in 2075, "Security Footage" would be one "file".

2. I want to find Paydata that I can sell to competitors ?
There are anumber of ways you can do this, You can put it in a host (even in a Host Archive), requiring the decker/Technomancer to go toe to toe with the Host rating of your choice, or you can give the team more flexibility, putting it on a sararyman's commlink (as per the example in the core book). Or anywhere in between.
If you are looking for the general sequence of events for getting at a file (also relevant for #1) then it is generally:
a. Gain access to host (direct connection to a device in its WAN for a mark or mark the host directly)
b. Matrix Search (or Matrix Perception) to find the file
c. Matrix Perception to look for Data Bombs on the file
d. Mark file
e. Crack File - this alerts the host if you are successful as it is an Attack action
f. Optional - Disarm Data Bomb
g. Edit file to copy or delete
h. GTFO with all haste.

If it is in an Archive, you basically have to trick an employee or other legitimate user into accessing it so that it is in the main storage again, then perform steps A-H.

3. I want to have the plan of this building (ventilation, security, etc) ?
Might be on the host for the building or in the Host at the city records office. Or, most likely, both - the city probably has the original plans, the corp itself has the nasty bits they added afterward.
Spy drones could also be useful here for reconnaissance.

4. I want to have the list of the personnel and there job inside this corp (address, phone, etc) ?
Likely on the host - see #2. Or you could have the face sweet talk the receptionist into forwarding it to him.

5. I want to find the Spiders, security riggers for this corp ?
Trip the host defenses, stay alive long enough for him to show up, mark him, then Trace Icon. Or you could make it available on a file in the host, but chances are they contract out to another company, in which case you have to hit THEIR host for the employee schedule to see who is on duty at any given time.

6. I want to know the sequence of the ICE ?
I'm not sure on this one. I think the Host chooses the IC based on the current situation, so it will change depending on what the target does, etc. But maybe it is scripted by the owner (or his designated representative) and is always the same. Your call as GM. If scripted, then it's just another file, or maybe you can get one of the matrix security guys drunk and pick his brain.

7. I want to edit the security file to accept 6 more marks (the group) for doors, elevator, etc. This mean I could reboot my deck, reset my OW and then return inside the host as a legitimate user ?
I don't think that mark invites are a file, but an intrinsic feature of a device/host that requires 4 marks (owner status) to change. In this case only spoof command would do the trick, but it specifically does not work on Hosts, so you are out of luck. A Technomancer's Puppeteer Complex Form might work, but the description of it is vague enough that this is pretty much house rule territory.

The better option might be to fool a security guard or secretary into thinking you have legitimate business there and requesting that you be granted legitimate marks. But really, OW score is supposed to be an inconvenience, so maybe just live with it. It only takes a few seconds to reboot your device and clear your OW score. If you choose your time and location right, you can stay safe and use a convenient direct connection to a device on the WAN to regain your marks and continue on.

If you are a Technomancer, you can just run a low level Cleaner whenever you aren't doing anything. To save dice rolling, assume one success per 4 dice and always use it at a level that would not cause damage form Fade (normally you wouldn't allow auto success on a Fade roll due to the risk of failure, but as GM this might be a good exception to make). With 12 dice Fade Resist, you can cast a Level 2 Cleaner once per six seconds (must sustain for 1 CT per level) with a pretty safe 2 hits (limited by the level). So, 2 OW cleared every 6 seconds (10 per minute). So long as you aren't hacking, you gain up to 12 every 15 minutes, or less than 1 per minute. In less 4 minutes you would have an OW of 0.

This is STRONGLY house rule, and many on the forum here would balk at trivializing OW (and Fade) in this fashion (and I have to agree), but it's your table and if it fits in with your campaign, it solves your problem.
[/quote]
Speech Thought Matrix/Text Astral

8-bit

  • *
  • Guest
« Reply #4 on: <09-13-14/2340:03> »
I'll just answer 7 really quickly.

I'm not exactly sure why you want 6 more marks, but rebooting your deck does not work. MARKs basically designate you as a legitimate user, but they are all wiped anytime you reboot a device. Most devices very rarely need to reboot, and most legitimate operations will gladly reinvite MARKs. Hackers don't have this convenience, so they have to illegally get their marks every time they reboot and want to access something.

What I meant is that I want to modify the security file for my marks to be a legitimate one. When it's done I'm considered a normal user for the corp. It's like adding me into the list of employee working for the corp.

I might have to hack the security Decker and use spoof command to simulate a new legitimate account into the system or just find the security file and edit it to had me as legitimate user. Yes, all the mark used to do this trick will be erase when I reboot but the next time I enter, the host will see me as the normal Joe that as the right to be there.

To summarize, when they hire a new guy inside a corp, they have a process that give him specific right and security level (depending on the job he has). As a hacker I want to edit this process to have a long term pass for the corp (until they do a investigation to find fake user).

Assuming you hacked the host to be "friendly" to you; you would need the host to know your device's (in this case a cyberdeck) Shadowrun version of a MAC address, know when it's online, know when it's rebooted so that it can resend MARKs and then give you legitimate MARKs to let you in. All of this raises flags (95% of devices don't really ever reboot) and they basically have a tracker on your device while you have access. Perfect setup for when they do find out you have a hacked account then they can ambush you in cyberspace.

The only way I can think to get actual legitimate access is to actually bribe/convince a spider to set you up. If you got that, I would think you were fine, but any hacking attempts will eventually get noticed by security and it will not end well. I mean, yes, your method basically spoofs the legitimate method, but just the fact that under scrutiny it will be revealed as false would make it pretty unlikely to work in my opinion. Any host w/ paydata (or protecting a physical location with valuables) worth the nuyen will be paranoid enough to check registries and files to make sure they haven't been tampered with.

Namikaze

  • *
  • Freelancer Ltd
  • Prime Runner
  • **
  • Posts: 4068
  • I'm a Ma'fan of Shadowrun!
« Reply #5 on: <09-13-14/2350:23> »
Agree 100% with purvue on answers 1-5.  Here's my take on the other two.

Question 6:
IC Protocols vary by host.  But I like to tell the players what the default IC loadout is from the manufacturer (get a mark on the host and you can query that info, along with the Device Rating of the host), and that at least gives them a baseline expectation.  It's up to the players then to determine the likelihood that the spider has changed the IC loadout and security protocols.  For a mom & pop shop, it's unlikely they'd change anything.  For a corporate host, you can bet anything that came with the setup isn't there anymore.  If they really want to know, they can send an agent to go and trip the alarms.  This is actually easier for a sprite, in my opinion, as some of the sprite powers and technomancer complex forms are really conducive to this kind of surveillance.

Question 7:
There's not a "security file" with a list of marks on the host.  Instead, the users simply get marks.  The best way to get legitimate access for nefarious purposes is through social engineering.  Since that's not the topic here, I'll try to stick with technical details.  Basically, what you want to do is get the host to invite marks for the party.  The way I'd do that is with a Spoof command that convinces the host that it should offer marks to the specific commlinks of the team.  When the run is over, make sure you slag those commlinks really really fast.  Like...  melt them on the pavement with thermite.
Feel free to keep any karma you earned illicitly, it's on us.

Quote from: Stephen Covey
Most people do not listen with the intent to understand; they listen with the intent to reply.

Malevolence

  • *
  • Ace Runner
  • ****
  • Posts: 1552
  • Matrix Addict
« Reply #6 on: <09-14-14/0057:58> »
Agree 100% with purvue on answers 1-5.  Here's my take on the other two.

Question 6:
IC Protocols vary by host.  But I like to tell the players what the default IC loadout is from the manufacturer (get a mark on the host and you can query that info, along with the Device Rating of the host), and that at least gives them a baseline expectation.  It's up to the players then to determine the likelihood that the spider has changed the IC loadout and security protocols.  For a mom & pop shop, it's unlikely they'd change anything.  For a corporate host, you can bet anything that came with the setup isn't there anymore.  If they really want to know, they can send an agent to go and trip the alarms.  This is actually easier for a sprite, in my opinion, as some of the sprite powers and technomancer complex forms are really conducive to this kind of surveillance.
I really like that way of handling it. Again, you don't get the exact order of deployment (that will change depending on the Host's analysis of the situation), but you do get a list of the IC available - at least when it was freshly installed. Do some additional legwork and you can maybe find out what changes (if any) were made, but yeah, bottom line is you can get a list of the IC it has available but not the order it will deploy them in (this isn't Pac-Man where the ghosts follow the same pattern regardless of what the player does).

Thank you for sharing this.

Question 7:
There's not a "security file" with a list of marks on the host.  Instead, the users simply get marks.  The best way to get legitimate access for nefarious purposes is through social engineering.  Since that's not the topic here, I'll try to stick with technical details.  Basically, what you want to do is get the host to invite marks for the party.  The way I'd do that is with a Spoof command that convinces the host that it should offer marks to the specific commlinks of the team.  When the run is over, make sure you slag those commlinks really really fast.  Like...  melt them on the pavement with thermite.

Unfortunately, Spoof Command only works on Agents and devices, not hosts, personas, IC, sprites or any other icons.

But yeah, Social Engineering ("Wake up the Face, he's got work to do!") is probably the best solution.
Speech Thought Matrix/Text Astral

ZeConster

  • *
  • Prime Runner
  • *****
  • Posts: 2557
« Reply #7 on: <09-14-14/0717:10> »
Question 7
What I meant is that I want to modify the security file for my marks to be a legitimate one. When it's done I'm considered a normal user for the corp. It's like adding me into the list of employee working for the corp.

I might have to hack the security Decker and use spoof command to simulate a new legitimate account into the system or just find the security file and edit it to had me as legitimate user. Yes, all the mark used to do this trick will be erase when I reboot but the next time I enter, the host will see me as the normal Joe that as the right to be there.

To summarize, when they hire a new guy inside a corp, they have a process that give him specific right and security level (depending on the job he has). As a hacker I want to edit this process to have a long term pass for the corp (until they do a investigation to find fake user).

Another option might be to modify the account of an actual employee for your persona to be registered under his name and make sure this person is sick for the next three days (just enough time for the run). Why having only temp mark if you can have longer access.
So you want to hack their personnel files, add a fake employee (you) with a security clearance level specified by you, then erase the logs so they don't know they were hacked and have someone create a keycard (or whatevs) that matches the data you put in?

Superman

  • *
  • Chummer
  • **
  • Posts: 110
« Reply #8 on: <09-14-14/0921:03> »
Question 7
What I meant is that I want to modify the security file for my marks to be a legitimate one. When it's done I'm considered a normal user for the corp. It's like adding me into the list of employee working for the corp.

I might have to hack the security Decker and use spoof command to simulate a new legitimate account into the system or just find the security file and edit it to had me as legitimate user. Yes, all the mark used to do this trick will be erase when I reboot but the next time I enter, the host will see me as the normal Joe that as the right to be there.

To summarize, when they hire a new guy inside a corp, they have a process that give him specific right and security level (depending on the job he has). As a hacker I want to edit this process to have a long term pass for the corp (until they do a investigation to find fake user).

Another option might be to modify the account of an actual employee for your persona to be registered under his name and make sure this person is sick for the next three days (just enough time for the run). Why having only temp mark if you can have longer access.
So you want to hack their personnel files, add a fake employee (you) with a security clearance level specified by you, then erase the logs so they don't know they were hacked and have someone create a keycard (or whatevs) that matches the data you put in?

Question 7
Yes ZeConster, that was the idea, longer term access which mean you can do start your job before the run.

Purvue, I think the idea is to spoof the admin decker deck (prob owner right) and send the command via his deck to add you inside the system as a legitimate user. You spoof the device of the decker to do edit file on the host (need 3 marks on the decker deck because edit file is a complex).
 A - I guest the first thing would be to find who's the owner with admin right to add employee inside the register. Do you think this can be done by a matrix perception test ? Or Search action ?
 B - Them find the security administrator of #A station/deck. Matrix perception or automatic if you are inside the host.
 C - Them put 3 marks on him. Hack on the fly will do the job.
 D - Them Spoof is deck/station to add 1 employee (you) as legitimate user with nice security level or to modify one existing employee security info to add your card info (ex: the MAC adress of the card you'll use).
 E - Them spoof again to erase #D actions from the log.

The problem is we don't know how it works for this important legit user file/data.... When we know how it works we can counter it. It could be a physical chip inside the Archive and every morning it is downloaded on the host to give access. That would mean you need to access the chip during the very small time it is available during the morning.
« Last Edit: <09-14-14/0934:05> by Superman »
Jezz the matrix rule sucks..

Malevolence

  • *
  • Ace Runner
  • ****
  • Posts: 1552
  • Matrix Addict
« Reply #9 on: <09-14-14/1842:24> »
Purvue, I think the idea is to spoof the admin decker deck (prob owner right) and send the command via his deck to add you inside the system as a legitimate user. You spoof the device of the decker to do edit file on the host (need 3 marks on the decker deck because edit file is a complex).
The wording of Spoof Command is a bit vague, but when it says that it does not work on Personas, hosts, etc, it means as the target device. So, I suppose you could get a mark on the owner's persona (we don't know how hosts work, but they probably allow the actual owner to designate subordinates to create users/invite marks, otherwise the CEO has to spend a large portion of his day keeping on top of personnel changes for the entire company) to spoof a command to his deck to then attempt to edit the file? I don't think you can chain commands like that, besides the fact that the deck isn't likely the authorized party - the spider's persona would be.

To be more clear - getting a mark on the persona (who is likely to be the icon with the rights to add users to a host - not the unattended deck), then using that to spoof a command from the persona to the host to add a user would fail because the host is the target of the Spoof Command action, and it is an invalid target. If you tried to use your mark on the persona to Spoof Command  to the deck to request a new user on the host, the host would reject the command as the deck is not authorized - only the persona.

Also, Spoof Command only requires 1 mark, regardless of the command issued. The mark has to be on the device you are Spoofing however, not the target of the Spoofed Command (you do not need any marks here).
Speech Thought Matrix/Text Astral

Namikaze

  • *
  • Freelancer Ltd
  • Prime Runner
  • **
  • Posts: 4068
  • I'm a Ma'fan of Shadowrun!
« Reply #10 on: <09-15-14/0051:18> »
Trick 7 will likely become a more feasible option with the introduction of "Deep Dives" in Data Trails.  Unfortunately, we aren't really sure what a "Deep Dive" is, but based on the wording the working theory is that it is some sort of long-duration hacking solution.  This would probably be viable for preparatory hacks and such.
Feel free to keep any karma you earned illicitly, it's on us.

Quote from: Stephen Covey
Most people do not listen with the intent to understand; they listen with the intent to reply.

Superman

  • *
  • Chummer
  • **
  • Posts: 110
« Reply #11 on: <09-15-14/1506:12> »
I've updated all the info inside the first post.
Jezz the matrix rule sucks..

The Wyrm Ouroboros

  • *
  • Prime Runner
  • *****
  • Posts: 4471
  • I Have Taken All Shadowrun To Be My Province
« Reply #12 on: <09-16-14/0232:53> »
... geez, barely two days for anyone to answer, and already you're declaring 'best answers' and stuff.  :P :)  Give us ancients a chance to get bored and respond!!

1) The same file ... maybe.  I'm of two minds on this.  Several things apply: how secure is the building?  How old are the files?  Technically, each one should probably go into a seperate file, but they might have a program concatenating all the feeds into one file instead, so that's a GM decision.  If the building is secure, then accessing the file may require having to target a different host; if it's a really secure building, you may have to target multiple hosts in order to get all copies of the file.  If the building is ultra secure, well, you need to get into the security office and do it in person.
          As well, if the files are more than a week / day / hour old (again depending on the security level), you're going to have to go hunting backups.  But for my money, editing the file in order to scrub the presence of that-which-you-don't-want-to-be-there is wiser than just nuking the file.  Up to your boys, though...

2) Old editions used to have a program that would riffle through the files on a host, looking for just this sort of thing.  You can, if you want, let the player purchase this sort of thing - but I would also require such a purchase every time they go on a run, minimum every 2 weeks (if your run goes on that long) for updated information on 'what's hot right now', i.e. what is old news and what's actually valuable paydata.
          Purvue's answer tells you how to get the file once you're aware of its existence - but to be honest, you need a way to locate 'Random File Worth Money', which is not gonna be the file's name, and which does not, so far as I am aware, exist in 5E.  You need a program that does keyword searches on files ... hm.  The old Evaluate program is the one you want; for SR5, I would probably charge your player's character 2000¥ for a Stage 1 Evaluate (max hits 8 ), and 5000¥ for a Stage 2 Evaluate (max hits 24).  The program would enable the character to probe a host - and only a host - by performing a modified Matrix Search Extended action  - Computer + Intuition [Data Processing] vs. Host Rating - with the incredibly-vague 'looking for something valuable' keywords.  The Evaluate program itself of course possesses the actual keywords that its creators have assembled based on knowledge skills like Biotechnology, Cybertechnology, Weapon Design, High-Energy Physics, and other erudite skills; having that program loaded allows you to wave your hand vaguely and say, "find me somethin' worth sellin'."
          Good news is, since the decker can only probe a host, you'd be looking at a base time of 1 minute per test.  Bad news is, since this is automatically an illegal act - look, buddy, you're not trying to locate a file you know exists, you're going through all their files - your Overwatch score is going to be going up by the Host's hits on the opposed test.  For every 8 hits, however, you locate a file worth selling - 1 file using a Stage 1 program, or up to 3 (if you can stand the heat in the kitchen) using a Stage 2 program.  (GM to GM, that's the highest I'd allow the program to go.)
          "But Wyrm," you ask, "what's the file worth?"  Well, that depends on the quality of the host you pulled it off.  As a benchmark, though, I'd say each one would be able to be sold for between 250-400¥ per host level - the higher the host level, the more likely you're going to find something juicy, y'know?  A small policlub isn't likely to have much worth selling; you might break even.  That regional corporate host on the other hand, will be worthwhile - if you can persuade it to give up its secrets in time.
          Once the Analyze gives you the name of the file(s), you can extract it (or them) as purvue says.

3) Depends on the building's ownership.  A megacorporation (AA or AAA) will give a basic setup to the county, but they might not even be told where the A/C unit is going, much less the entire system.  If that's all you need, then you're in luck - but in some cases, not even that is going to be useful.  What you would want is most likely going to be found in the building's security host - because building security always needs up-to-the-second maps.
          A clever decker will 'borrow' said file several days before, copy the information, make a modified version while the rest of the group plans the infiltration, then slips into the security host just before the run.  This allows him to a) compare the stolen plans to their most up-to-date ones and alert the team to any alterations, and b) substitute his fake ones for the real plans, in order to screw up security response.

4) Several places.  Personnel host.  Security host.  What 'etc.' you need is going to determine, in a large part, where the information is to be found - because the security file may have name, job type, phone, address, biomonitor information (i.e. fingerprint, retinal print, voice print) and office location, while the personnel host is going to have the name, job type, job title, specialist knowledge/duties, phone number, and office location (and maybe pay rate!!).  Different information in different places.  And of course the research host is going to have what they're actually working on ....

5) Not as tough as it might seem.  Identify if their security is in-house; most corporations from A-rated on up are going to have their own for the critical areas, contracting out only for low-level security zones, like warehouses full of Goopee Galoshees for next week.  Presuming it's in-house security, finding out where they physically are, though, should be found in the security host - by which I mean my answer to #3 and #4.  If he's on the job, he'll be in the security office - where-ever the security office for this building is.  If he's not on duty, then his address information is going to be in his security file.

6) This is the sort of thing that you need a 'find me this file' hunt to get, honestly.  The host needs to know this information; it isn't going to be hardwired, which means it's going to be in an executable file (or some damn thing) somewhere on the host.  What you really need is to figure out the name of the file - which may require you to deduce their naming conventions, which can be a pain.  However, at that point you're hunting for seriously private protocols, and I'd require you to perform a heavily-contested Matrix Search action (as I described for the Evaluate program above) and give you a minimum Threshhold on that hunt of [Host Rating x 2].  Maybe [Host Rating x 3]; Sux2BU.  Rewriting/replacing that file should be even tougher ... but also theoretically possible.
          Theoretically.

7) Prior editions (3rd) did bring forth the idea of creating a valid user ID for yourself on a host; depending on the access given to the user ID, it became harder, and lasted for a shorter period of time.  The best thing to do, however, was to slice into a host, hack yourself superuser / sysadmin / security idents, and then pull back for a day or so to let the system reset.  Then you logged in with your fake ID, scrubbed all OTHER superuser / sysadmin / security idents, and basically owned the system while the security deckers found their own IC pounding the shit out of them.
          How would I do it, until Happy Trails comes out?  Probably the above Matrix Search to find the file, then give the Host its Rating x 2 (baseline security), x 3 (superuser), or x 5 (sysadmin) when it comes to its turn to oppose you trying to tamper with it.
          Yes, this shit should be hard.  Deal.  ;)
« Last Edit: <09-17-14/2237:55> by The Wyrm Ouroboros »
Pananagutan & End/Line

Old As McBean, Twice As Mean
"Oh, gee - it's Go-Frag-Yourself-O'Clock."
New Wyrm!! Now with Twice the Bastard!!

Laés is ... I forget. -PiXeL01
Play the game. Don't try to win it.

Superman

  • *
  • Chummer
  • **
  • Posts: 110
« Reply #13 on: <09-16-14/1318:35> »
Thanks Wyrm, you have a lot of good house rule and examples. Very useful info for GM that want a temporary fix before Data Trail.
Jezz the matrix rule sucks..

faffner

  • *
  • Newb
  • *
  • Posts: 30
« Reply #14 on: <09-17-14/1727:50> »
Great stuff Superman. Very usefull.