Excellent, thank you for confirming my train of thought.
EDIT:
A followup if I might.
Can you edit a data stream you have previously performed Snoop on, or does the specific wording of "Snoop" override the "Edit File" action?
Edit File on page 239 states that you can continuously edit a video feed by expending one Complex Action per combat turn. Snoop on page 242 specifies that you can "listen to, view, or read this data live" as long as you have a MARK on your target. Does this mean the only way to edit a video feed is to obtain a MARK on the video file, wherever that might be stored? Or am I reading too much into things here.
Take the following example. Decker X and his team are breaking into a warehouse protected by cameras, and they have to pass 4 of them on their chosen route in and out (8 total). He wants to hack into the host the cameras are slaved to and edit the team out of the video recordings.
Assumption: I was under the impression that one could use Snoop and Edit File to accomplish the above, but I'm now starting to wonder if this is not possible. I see three options for Decker X in terms of minimizing the number of hacks needed.
Preferred (least amount of hacks, possibly not viable):
1. Decker X uses a Complex Action: Hack on the Fly [Sleaze] and obtains a MARK on Host Y
2. Decker X uses a Complex Action: Snoop [Sleaze] all traffic going to and from the host
3. Decker X uses a series of Complex Action: Edit File [Data Processing] actions as the team moves through the building in order to edit out the team's movements from the video feeds coming from individual cameras slaved to the host
2 opposed tests, no attack actions needed.
Verdict: Ghost in the Machine.
Option 1 (more hacks needed, builds more OS):
1. Decker X uses a Complex Action: Hack on the Fly [Sleaze] and obtains a MARK on Host Y
2. Decker X uses a Complex Action: Enter Host [Data Processing, presumably]
3. Decker X uses a Complex Action: Hack on the Fly [Sleaze] and obtains a MARK on File Z
3a. OPTIONAL - Decker X uses a complex action to Crack File [Attack] to gain access to the video recording file stored on the host (assuming the file is protected)
3b. OPTIONAL - If the file is protected and the protection is broken, the host is now alerted that it's under attack and Patrol IC may be looking for the hacker
4. Decker X uses a Complex Action: Edit File [Data Processing] to remove the team's movements from the video recording file
At least 3 opposed tests, probable alert.
Verdict: Not bad, grasshopper.
Option 2 (significantly more hacks needed, builds an insane amount of OS in a very short time)
1. Decker X uses a Complex Action: Hack on the Fly [Sleaze] to hack an individual camera
2. Repeat 1
Potentially 7 or 8 individual opposed tests; tricky for large buildings with multiple key locks and cameras.
Verdict: Nuke it from orbit...
Thoughts?