Needle picked up the commlink, turning it over in her hand several times as she looked it over. Nothing special about it on the outside, of course. It was what was on the inside that she was interested in.
"I expect my share of the payoff on an untraceable credstick upon completion of the job. Nothing against the rest of the people here, but I prefer to have my share given directly to me, and not put in some community trust fund.
"Interesting words, 'trust fund'. A community pool of some type of currency or otherwise barterable goods that is doled out at given points to specified individuals. Did you know that the concept of a trust, or a relationship whereby property is held by one person for the benefit of another - dates back to Roman law in the 12th and 13th centuries? While the law itself has merit, I don't like to gamble with what I'm supposed to get paid for doing a job.
"Anyhow, if you'll all excuse me, I have work to do."With that, Needle pushes her public - but fake - commcode of Jesse Holton from the CMT Clip to the rest of the team, readying it to also receive the commcodes from the others. She knows better than to push the commcode of her Erika Elite to anybody she doesn't know very well. And the list of people she knows well is rather short. In fact, there's nobody on that list outside of Dr. Hall.
"Don't call me Needle on that, please."She stands up and, without even saying so much as goodbye, walks out of the restaurant, heading towards the bus.
Saving the below so I don't lose the rolls.
Once there, she gives the pilot program instructions to head towards The Skeleton, and then she climbs into her rigger cocoon.
Now, let's see what secrets this commlink has on it.
Commlink stats: Erika Elite/Novatech Navi OS, Response 5, Signal 5, Firewall 6, System 6, Hardening 6, Customized Interface, Non-Standard Wireless Link 6
Running Programs: Browse 6, Decrypt 6, Exploit 6, Stealth 6
Response Degradation: None until I am running 5 programs at once.
Ok, I'm going to pick through the commlink with a fine toothed comb. For starters, I'm going to hack the central node on it so that I have access to EVERYTHING on it. Although I've got some time, I'm going to do this with Hacking on the Fly.
Hacking on the fly is an Hacking + Exploit (target’s Firewall, Complex Action) Extended Test. Reaching the threshold will get you a user account on the node. If you want a security account, increase the threshold by +3, for an admin account increase it by +6. When you beat the threshold and gain the account, you are automatically logged onto the node with that level of access, and do not need to spend a Log On action (unless you log off ).
Such brute force hacks can attract attention. Each time you take a Hack on the Fly action, the target node makes a free roll on an Analyze + Firewall (hacker’s Stealth) Extended Test. If the node detects you an alert is triggered, even if you have succeeded in your attempt (Alerts, p. 238).
I'm going for an Admin account here, so the threshold is going to be the commlink's Firewall + 6. Every attempt I make is going to allow the commlink itself a chance to detect me, with its target threshold equal to my Stealth rating. The commlink gets to roll Analyze + Firewall, but only gets Analyze if that program is running on the commlink itself.
Roll 1:
17d6.hits(5) = 5Roll 2:
16d6.hits(5) = 6I doubt that her commlink has a Firewall rating of 11+, so that should do it. At this point, I'm going to stop running Exploit as I should no longer need it, replacing it with Sniffer. Now I'm going to start picking through her commlink as an Admin, running several data searches through her phone. Remember that I have an admin account, so nothing should be off-limits to me on her phone.
Data Search 1, Incoming Messages (All incoming messages for 1 hour prior to and 1 hour after her disappearance):
17d6.hits(5) = 3Data Search 2, Incoming Messages (extended test, continuing on the previous data search):
16d6.hits(5) = 8Data Search 3, Outgoing Messages (same as data search 1, but for outgoing messages):
17d6.hits(5) = 5Data Search 4, Outgoing Messages (same as data search 2, but for outgoing messages):
16d6.hits(5) = 6Data Search 5, Internet Activity (same parameters as Data Search 1, but for any internet activity):
17d6.hits(5) = 7Data Search 6, Internet Activity (extended test of Data Search 5):
16d6.hits(5) = 5Data Search 7, AR Information (same as data search 1, except for AR information viewed):
17d6.hits(5) = 8Data Search 8, AR Information (extended test of Data Search 7):
16d6.hits(5) = 6If anything brings back an encrypted file, let me know and I'll start Cryptanalysis to decrypt it. If there are any other rolls you need, let me know and I'll add them.[/spoiler]