NEWS

Trace and Email

  • 6 Replies
  • 3178 Views

kwixson

  • *
  • Newb
  • *
  • Posts: 11
« on: <02-20-13/1104:42> »
I'm having a hard time getting started with Matrix rules. There seems to be a lot of situations popping up that aren't explicitly covered, and I'm unsure about how to infer the correct process for resolution.

For example, the On The Run module that comes in the Shadowrunner's Toolkit box set has <spoiler> a hacker who sends email to a comlink the runners are likely to gain physical access to in the course of the run.</spoiler>

So, can a team hacker trace that email back to the source? The rules seem to suggest that there needs to be a currently active session (a subscription) to initiate a trace. But the rules also refer to the data trail that any Matrix use invariably produces, which suggests the email could be traced.

If you can trace an email, does it lead back to the MSP, or the Access ID?

If you can't trace an email, then that seems broken. Why wouldn't runners, Johnsons, and assorted lowlifes use email exclusively? Why would you ever meet when you can hide behind an email exchange in perfect security?


Csjarrat

  • *
  • Prime Runner
  • *****
  • Posts: 5108
  • UK based GM + player
« Reply #1 on: <02-20-13/1119:30> »
you should be able to find out which server the message originated from, ie the MSP/mail provider fairly easily.
the problem is that a good hacker will have an anonymous account with a shadow MSP and will have been routed through many different servers to obscure the datatrail.
you'd need a hacker/security expert of equal skill to find him
Speech
Thought
Matrix
Astral
Mentor

Hsere

  • *
  • Newb
  • *
  • Posts: 10
« Reply #2 on: <02-20-13/1316:10> »
Agreed.  Whenever I'm unsure about a situation like this, I generally assume that the Matrix is complex enough that the "limiting factor" is usually the skill of the hacker(s) involved.  So most times the question "can the team hacker do X?" arises, the answer is "yes -- if they're good enough."

If what "good enough" means isn't covered by the rules, I try to estimate based upon similar situations that are.  If I have no idea, I go with what I think will make a better game/story.  If there's no real preference in that regard, I just roll a die.
“There is a very fine line between 'hobby' and 'mental illness'.”  -Dave Barry

kwixson

  • *
  • Newb
  • *
  • Posts: 11
« Reply #3 on: <02-20-13/1445:02> »
I'd still like to figure out a game mechanic so that I can apply it somewhat consistently. Especially as I start to run Shadowrun Missions, people will expect some consistency.

Csjarrat

  • *
  • Prime Runner
  • *****
  • Posts: 5108
  • UK based GM + player
« Reply #4 on: <02-24-13/0737:35> »
well you could always go with an opposed test of Electronic Warfare + Trace Vs Electronic Warfare + Stealth as a rough approximation.
the hacker with the most hits wins.
stealth could approximate the enemy hacker's server routing and IP obscuring efforts, while the trace software rating shows the ability of the PC to follow the data trail left by the enemy hacker (however well obscured).

if you want to do it more in favour of your PC, do the roll for the enemy hacker (E.warfare + Stealth + Edit to show he had lots of time to clean his datatrail) and have your PC roll an extended test every hour using trace and e.warfare.
that way its not about *if* he's good enough, but *how long* it takes to do the trace, with higher skills finding the enemy datatrail more quickly. the time sensitive nature could be built into the run, with the team having X amount of hours to find the guy. the trace taking too long might mean the team arrive after the hacker has left the city for example
Speech
Thought
Matrix
Astral
Mentor

RHat

  • *
  • Prime Runner
  • *****
  • Posts: 6317
« Reply #5 on: <02-24-13/1622:29> »
I'd still like to figure out a game mechanic so that I can apply it somewhat consistently. Especially as I start to run Shadowrun Missions, people will expect some consistency.

Simple fact is, there's a lot of vagueness to the Matrix rules.
"Speech"
Thoughts
Matrix <<Text>> "Speech"
Spirits and Sprites

I_V_Saur

  • *
  • Chummer
  • **
  • Posts: 244
« Reply #6 on: <02-24-13/1751:38> »
Yeah, the Matrix rules are kinda vague. Far as I know, it isn't explicitly stated that you can hack the 'Ware of a dead Sammie. Makes sense, though, so long as the wireless is on. Scared the hell out of my party last session, when the dead elven Sammie in the women's washroom dropped their Bio-ed soldier with a kick between the legs.

Most of the time, you need to apply a level of rationality to things. IRL, you can hunt an email back to the server that hosted the sending account. From there, they have the IP address of the sender. Which means, in SR terms, Email leads back to MSP, which should have a record of the sender's Commcode. If it was forwarded from another account, then you get bounced around from x to y to z to x to a to z, which is where it starts chewing up your time, but if you can keep your head on straight, and have the time to go through all the records, after hacking into so many databases, you'll eventually find the Commcode of their disposable Link. You can then, through complicated programs, figure out where they are, based on what nodes they're pinging to reach the other side of the world.

Sending messages is pretty damn safe, if you've got the right safety procedures in place.

The Matrix does relate to our Internet, but it's on a whole new scale of complexity. It's totally possible to comprehend it, but a headache to try.

Ruling-wise, personally, I would have thresholds based on, primarily, how many servers the message was bounced off. (+1 per 3) If the sender uses a disposable Link, then it's a race against time - can you triangulate the rough area they sent the message from, before they're well away from it, blending with the crowd?

High-residence areas will be considerably harder to cope with, but easier to reach, while secluded areas will have less nodes to narrow down from, and less people to confuse, but it'll take longer to get there.

 

SMF spam blocked by CleanTalk