NEWS

Tracking RFID Tags

  • 12 Replies
  • 8462 Views

firebug

  • *
  • Errata Coordinator
  • Prime Runner
  • *****
  • Posts: 2996
  • Scraping the bottom of the Resonance Barrel
« on: <03-29-13/1337:49> »
This is a quick question I have concerning a game I intend to run where a missing exotic pet will have a RFID tag in its collar.  I understand the Trace User action can find a node's physical location (or close to it) and it seems in-tone with the game that RFID tags are supposed to be easy to track.  However, my understanding is that the Trace User action target's an "icon" which the book says is a "program, file, or other virtual object".    So what exactly is needed to intiate that sort of tracking?  It doesn't have an "access ID" because those are only given to things capable of running persona programs (as in, prettymuch only commlinks or similar things that can be the core of a PAN) right?

I'm curious as to what you'd need to be able to track it, then...  And I guess the same would go for trying to track any other peripheral device as well.
I'm Madpath Moth on reddit (and other sites).  Feel free to PM me errata questions!
Jeeze.  It would almost sound stupid until you realize we're talking about an immortal elf clown sword fighting a dragon ghost in a mall.

Automaton

  • *
  • Chummer
  • **
  • Posts: 164
« Reply #1 on: <03-29-13/1358:10> »
All Commlinks have RFID scanners. HOwever RFID tags can only be scanned at close range.

So you cant actually track anything or anyone through an RFID tag unless you are walking behind them with a few meter between. Its basically the tags used to prevent clothes theft now adays. Or at least comparible.

If you actually want to track a pet through the matrix then I suggest putting a commlink in the pet's colar or implanting a small actual tracker device under its skin.

Mirikon

  • *
  • Prime Runner
  • *****
  • Posts: 8986
  • "Everybody lies." --House
« Reply #2 on: <03-29-13/1432:04> »
Not quite true. An RFID only has a signal of 0 (3m), true, but as long as it is within signal range of a wireless device connected to the Matrix, it can relay its tracking data via the Matrix anywhere in the world. Which is why a Tag Eraser is required gear for any runner.
Greataxe - Apply directly to source of problem, repeat as needed.

My Characters

firebug

  • *
  • Errata Coordinator
  • Prime Runner
  • *****
  • Posts: 2996
  • Scraping the bottom of the Resonance Barrel
« Reply #3 on: <03-29-13/1442:08> »
The book says their range only starts mattering in a deadzone, though.  Makes sense, since as long as as it's within the signal range of something else, all that routing business happens.  I feel the need to quote this...

Quote from: SR4, page 329
Tags can be used as tracking devices, periodically transmitting to local scanners or to the wireless Matrix (along with the local access point’s GPS data), though their limited range makes them useless in dead zones.

EDIT: Ah, thanks Mirikon.  Everyone seems to forget that the idea of the matrix is that every node is also a router.  I suppose it does overcomplicate a lot of stuff...

I mean, the whole point of security tags in Tracker Rounds (Arsenal, page 35) is that you -can- use RFID tags to find someone's physical location.  The books seem to be plastered with mentions on doing so, I just don't quite understand how...  It mentions using a Radio Signal Scanner, but that seems like it's really just a Sniffer program, and my understanding of sniffer programs is that I can't make heads or tails of the differences between the two extremely similar uses for the one program.

That said, it probably does still make more sense to just use a commlink to track a pet.
I'm Madpath Moth on reddit (and other sites).  Feel free to PM me errata questions!
Jeeze.  It would almost sound stupid until you realize we're talking about an immortal elf clown sword fighting a dragon ghost in a mall.

Mirikon

  • *
  • Prime Runner
  • *****
  • Posts: 8986
  • "Everybody lies." --House
« Reply #4 on: <03-29-13/1539:08> »
You use a radio signal scanner (or a Scan program) to search for hidden nodes, which is what the RFID tag would be. You use a Sniffer program to intercept wireless traffic.
Greataxe - Apply directly to source of problem, repeat as needed.

My Characters

Mithlas

  • *
  • Omae
  • ***
  • Posts: 919
« Reply #5 on: <03-29-13/1555:35> »
In other words, the radio signal scanner finds the radio signals. The Sniffer program tells you "this comm traffic is going from node A to node B".

firebug

  • *
  • Errata Coordinator
  • Prime Runner
  • *****
  • Posts: 2996
  • Scraping the bottom of the Resonance Barrel
« Reply #6 on: <03-29-13/1659:54> »
The Radio Signal Scanner does the sniffer program part, and doesn't say anything about being a Scan program unless its description implies it just automatically succeeds.

Quote
Radio Signal Scanner: The radio signal scanner locates and locks in on radio traffic from RFID tags, wireless networks, and other transmitters, and is especially useful at capturing signals originating from nearby. The scanner can also measure a signal’s strength and pinpoint its location. Treat the scanner as if it were a Sniffer program (p. 234) equal to its rating; see p. 229 for rules on detecting and intercepting wireless signals.

Also, RFID tags have a Signal rating of 1, not 0.

Quote
RFID (Radio Frequency Identification) tags form an integral part of every product that leaves the production line. Ranging in size from microscopic to the size of a price tag, tags have a stick-to-anything adhesive backing and can sometimes be difficult to spot. Tags are pro-grammed to transmit small amounts of data: serial numbers, product specs, and pricing (for distribution and retail); arrows and advertise-ments (for geo-tagging locations and objects, leaving a virtual AR message for anyone who comes by); ID (for employee tracking and access control); owner contact information (in case an item is stolen); vehicle registration; etc. Tags can be used as tracking devices, periodically transmitting to local scanners or to the wireless Matrix (along with the local access point’s GPS data), though their limited range makes them useless in dead zones. RFID Tag data is often fixed, but in some cases is reprogrammable. Tags are readable by anyone with a commlink. They have a Signal rating of 1.

The physical location of a tag can be found with a radio signal scanner (p. 334). Tag data can be erased with a tag eraser (p. 330) or programmed with an Edit program (which is what runners do to create fake tags). Fixed tag data can only be altered if the tag is physically accessed, requiring a Hardware + Logic (5, 1 minute) Extended
Test. Data on a tag may be encrypted.

I don't think most RFID tags would be hidden, either.  Though it doesn't say either way, aside from specifying in the entry about Stealth tags that they're apparently impossible to just find on their own.

Intercepting wireless traffic only works if you've got access to a node that all the information passes through (" When information is routed between devices, it is non-sequentially sliced into a number of pieces and sent to the recipient via multiple paths; this makes it almost impossible to intercept the traffic except within Signal range of the sender or the receiver") (thus why it says it's mainly useless outside of wired networks), and capturing wireless traffic only works if you're within mutual signal range explicitly (being one of the few actions that requires it).  Does this mean that in order to use an RFID to track something, you'd need for it to constantly be set to send out data (via routing) to a single specific node?  Though at that point, you could just Trace User it from the data the second node received and there'd be no use in using Sniffer...


I am confused because Sniffer seems almost entirely useless (save for one use-- stealing a copy of a message someone within mutual signal range of you is sending) and just want to know what's needed to use Trace User on an RFID chip.  What accounts as an "icon" from a chip so you could trace it back to the chip.  I'm so confused that I can't even remember the thought behind the question anymore.  x.x

« Last Edit: <03-29-13/1703:54> by firebug »
I'm Madpath Moth on reddit (and other sites).  Feel free to PM me errata questions!
Jeeze.  It would almost sound stupid until you realize we're talking about an immortal elf clown sword fighting a dragon ghost in a mall.

Automaton

  • *
  • Chummer
  • **
  • Posts: 164
« Reply #7 on: <03-29-13/1925:02> »
Wait, every RFID tag is a node??

I dont see an RFID tag as a node. it doesn't come anywhere near to being a node?
It;s just a tag, not an entire node. The thing doesnt even have a power source. It needs to have a mechnatic field to be able to send anything, which is what the RFID scanners provide.

If its an RFID tag that transmits it location/presence ot the matrix every once in X time its gonna need its own power source.

I dont see how staring at the matrix hoping to see an RFID tag pop up in it is going to help to track someone or something.

Mirikon

  • *
  • Prime Runner
  • *****
  • Posts: 8986
  • "Everybody lies." --House
« Reply #8 on: <03-29-13/2004:37> »
Yes, an RFID is a node. A very basic, very simple node that can't do much, normally, but it is a node. Any device that stores data or relays information is a node.
Greataxe - Apply directly to source of problem, repeat as needed.

My Characters

I_V_Saur

  • *
  • Chummer
  • **
  • Posts: 244
« Reply #9 on: <03-29-13/2018:07> »
Your average Street Samurai has several nodes slaved to his PAN. Technically, you can have a Sprite waiting in every one of his limbs, running a Stealth prog, waiting to Hammer the first thing to try to access that node.

Automaton

  • *
  • Chummer
  • **
  • Posts: 164
« Reply #10 on: <03-30-13/1150:03> »
Does that mean you can run a program in an RFID tag?

Or that criminal organizations can have meetings inside an RFID tag to hide their meeting point?

Can RFID tags be fitted with virusses to cause a nearly unstoppable virus infection in no time if you manage to hack into a RFID tag factory and have ot thrown in with the process?

Do all RFID tags continually make contact with the matrix, can it be shut off?

And what exactly are RFID tags without their own power source being powered by then? Electricity from the human body?

Can a program run on an RFID tag? could it jump from tag to tag?

Xzylvador

  • *
  • Prime Runner
  • *****
  • Posts: 3666
  • Ask me about NERPS! 30% Sales!
« Reply #11 on: <03-30-13/1234:07> »
It can be a node with System 1, Signal 1.
Loading a number of programs equal to System, drops the System by 1. So it'd be signal 0 if you run anything else on it.
Or just have it be System 0, Signal 1.

firebug

  • *
  • Errata Coordinator
  • Prime Runner
  • *****
  • Posts: 2996
  • Scraping the bottom of the Resonance Barrel
« Reply #12 on: <03-30-13/1256:15> »
According to Unwired, an RFID tag has 1 in all Matrix Attributes.  On the same page, it says that as peripheral nodes, they can only hold one Persona at a time (as in, only enough processing for one user to 'enter' at a time) and while they do have 1 Response and 1 System, they can only run programs they are designed to use (so you'd need to hardwire them all to project viruses, and essentially refitting an entire factory's schematics would be difficult--  But not impossible.  Good cyber-terrorist scheme).

Also on that page it says that every node has an Access ID, which I guess answers my own question about what you'd need to track them.  It'd be like tracking any other node through the matrix with that, I guess.
I'm Madpath Moth on reddit (and other sites).  Feel free to PM me errata questions!
Jeeze.  It would almost sound stupid until you realize we're talking about an immortal elf clown sword fighting a dragon ghost in a mall.