NEWS

[IC] Urban Brawl 9 -- Finished

  • 144 Replies
  • 44342 Views

Ren

  • *
  • Ace Runner
  • ****
  • Posts: 1364
« Reply #45 on: <08-27-13/0632:48> »
The presence of the stealth tag explained things. It would even broadcast its signals when the power source of the drone itself was disconnected. And the combination of stealth and hardening technology was a good move by the manufacturer. It was usually not that easy to combine both advantages, so it would be profitable just to check the chip itself. It was enough information on the tag itself, so Stake turned his attention to the attached folder.
[spoiler=Matrix actions]Matrix perception, complex: INT(6) + Computer(5) + hot sim(2) – hidden(2) [Data Processing(5)] (11d6.hits(5)=4); Simple test, I’d like the following information: Device rating of the folder, Is there a data bomb, Protection rating, The most recent edit date[/spoiler]
"Speech", Matrix, >>Text<<, Thoughts, Astral
Bulldog
Stake

inca1980

  • *
  • Ace Runner
  • ****
  • Posts: 2294
« Reply #46 on: <08-27-13/0822:36> »
@Stake:
You find that the folder is protected with rating 6 encryption and it also has a databomb on it.  The last edit date was the same time as the last transmission, i.e. only seconds ago.  That suggests to you that the folder might contain some access logs.

OOC: by encryption I mean just normal SR5 protection.
« Last Edit: <08-28-13/1828:27> by inca1980 »

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #47 on: <08-27-13/1327:34> »
Quote
Intuition(4)+Perception(7)[Mental:4] (11d6.hits(5)=5) 4 hits counts

Quote
AGI(4)+Gymnastics(7)+LightBody(2)[Physical:6] (13d6.hits(5)=6)

Zach climbs quickly up and observes for the hole that can be used by drone. Or, if possible, the roof access point that enables himself to get on the roof and back quick. Sometimes places like this have those. He relies on his own eyes, still not sure about dwarf hacker`s ability to keep their nodes out of reach for possible intruders, and given what kind of opposition they met recently, there is no doubt that they will be matrix capable.

Thermo

  • *
  • Omae
  • ***
  • Posts: 883
« Reply #48 on: <08-27-13/1502:17> »
Storm settles into a support role for the other two runners. She tries to find a location with decent cover that gives her a clear vantage point over the inside of the hangar, as near to the dwarf as she dared. She keeps an eye on Zach, ready to cast Levitate on the burly ork if things don't go well for him up in the rafters.

The natural hunting instinct took over. Being on the defensive was getting rather tedious, and she took this opportunity to set a trap for anyone who might come looking for the drone. Before returning to her defensive position, she throws a tarp over the drone to hide it from view.

Storm casts Improved Invisibility: Self

Improved Invisibility (Self) [Limit (Force): 5]: Spellcasting(10)+Magic(4)+Specialization(2)+Power Focus(4)-Sustaining(3) (17d6.hits(5)=5)
Drain(5) Resist: Cha(11)+Wil(9) (20d6.hits(5)=5)

Storm casts Improved Invisibility: Stake

Improved Invisibility (Stake) [Limit (Force): 5]: Spellcasting(10)+Magic(4)+Specialization(2)+Power Focus(4)-Sustaining(4) (16d6.hits(5)=5)
Drain(5) Resist: Cha(11)+Wil(9) (20d6.hits(5)=11)

Storm casts Silence: AOE centered on Storm

Silence [Limit (Force): 5]: Spellcasting(10)+Magic(4)+Specialization(2)+Power Focus(4)-Sustaining(5) (15d6.hits(5)=5)
Drain(4) Resist: Cha(11)+Wil(9) (20d6.hits(5)=5)

Storm casts Trid Phantasm: [see below]

Trid Phantasm [Limit (Force): 5]: Spellcasting(10)+Magic(4)+Specialization(2)+Power Focus(4)-Sustaining(6) (14d6.hits(5)=4)
Drain(5) Resist: Cha(11)+Wil(9) (20d6.hits(5)=8)


In a few short seconds, Storm and Stake were shielded from view. They would be difficult to detect with ultrasound as well, which is something Storm had failed to consider in the past and it had nearly gotten her killed. Lesson learned.

20 meters away, a realistic depiction of the three runners appeared, hunched over a work table with a disabled drone appearing to lay on it. They appeared to be working on dismantling and hacking into its circuits, engrossed in the work. The illusion is placed such that it would be an ideal place to draw in the enemy, allowing for sniper fire from both Zach's position in the rafters and Storm's hidden position among the machinery and boxes. The illusion is placed just out of range of Storm's Silence spell so as to not alert anyone of anything out of place if they used ultrasound to target the phantasm.

Ren

  • *
  • Ace Runner
  • ****
  • Posts: 1364
« Reply #49 on: <08-28-13/1231:52> »
Stake knew it was time to make his move. He spent a second to decide which task to begin with then decided to put the marks on both the tag and the file first. The data bomb was, however, hiding threateningly in the folder, so he decided it would be better to try and determine the contents and the target of the chip’s communication first.
[spoiler=Matrix actions]reconfigure deck, free, swap Toolbox for Exploit; no test
Hack on the fly, complex, target is the chip: LOG(7) + Hacking(6) + hot sim(2) – hidden(2) [Sleaze(7)] (13d6.hits(5)=4); opposed test: INT + Firewall, note: unattended devices use device rating instead attributes
Hack on the fly, complex, target is the folder: LOG(7) + Hacking(6) + hot sim(2) – hidden(2) [Sleaze(7)] (13d6.hits(5)=5); opposed test: INT + Firewall
reconfigure deck, free, swap Exploit for Stealth; no test
Snoop, complex, target is the RFID tag’s communication: INT(6) + Electronic Warfare(6) + hot sim(2) – hidden(2) [Sleaze(6)] (12d6.hits(5)=2);spending Edge on that;
INT(6) + Electronic Warfare(6) + hot sim(2) – hidden(2) - hits(2) (10d6.hits(5)=4); 6 hits altogether; opposed test: LOG + Firewall, can only try this if I succeeded at putting a mark on the chip with the first hack on the fly action

Note: I found the sidebar for Snoop on p. 242, where it states how to find the other end of communication. I will still roll for snoop if you want to use that method.[/spoiler]
"Speech", Matrix, >>Text<<, Thoughts, Astral
Bulldog
Stake

inca1980

  • *
  • Ace Runner
  • ****
  • Posts: 2294
« Reply #50 on: <08-28-13/1929:32> »
@Stake:
OOC:  Intuition + Firewall = (9d6.hits(5)=3).  You get a mark on the tag.
Rolling for the folder now.  Intuition + Firewall = (9d6.hits(5)=1).  You also get a mark on the folder.  This doesn't trigger the databomb, only reading, editing, copying, deleting and trying to place another bomb do.  Log + Firewall = (9d6.hits(5)=2).  You succeed at Snooping.


You bend the grid protocols to your will and find a way for the chip and the folder to each accept one of your marks.  That's enough for you to take a look for the outgoing feed that you suspect, and sure enough it's there.  The transmissions are sent out to the host for Tacoma UCAS Veteran's Hospital and all that is being transmitted are gps coordinates.

@Zach:
Once you get up into the rafters you find a small hole in the tin that is big enough for your fly spy but aside from that you don't find any roof access point.  You send Sylvia through the little hole and you start picking up the feed from her sensors.
OOC: Make a Perception + Intuition [Sensor=3] test for looking through her sensors..
« Last Edit: <08-29-13/1227:50> by inca1980 »

Ren

  • *
  • Ace Runner
  • ****
  • Posts: 1364
« Reply #51 on: <08-29-13/1422:55> »
So, Veterans’ Hospital? Stake wasn’t sure that place would be the end of the transmission, he suspected a relay point hidden somewhere within the host. He took a peek at the host, to get a general feeling, then prepared to take care of the data bomb. Before he started, though, he contacted the other two. ”Found something interesting. The drone continuously sends its GPS coordinates to the host of the UCAS Veterans’ Hospital in Tacoma. I suspect a relay point but I have to enter the host to get more info. Unfortunately, we have to leave the broadcast as it is, to be able to find the target inside. Just wanted to ask what you want to do, shut down the broadcast or try to follow it later. I say later because I found a heavily protected folder attached to the drone and I want to take care of it first.”
[spoiler=tests]Thinking through if the hospital is connected to any of the most prestigious corporations: LOG(7) + History: Big Ten(3) + Mnemonic enhancer(2) [Mental(11)] (12d6.hits(5)=5)

Reconfigure deck, free: swapping Defuse for Signal Scrub; no test
Matrix Perception, complex, target is the hospital host: INT(6) + Computer(5) + hot sim(2) – hidden(2) [Data processing(5)] (11d6.hits(5)=5); if on different grid, still 5 hits, taking the last two dice; simple test, with 3 points of noise reduction; I’d like the following information: Spot the host, Host rating, Commcode, What grid is it using, Firewall rating
Reconfigure deck, free: swapping Signal Scrub for Defuse; no test[/spoiler]
"Speech", Matrix, >>Text<<, Thoughts, Astral
Bulldog
Stake

inca1980

  • *
  • Ace Runner
  • ****
  • Posts: 2294
« Reply #52 on: <08-29-13/2133:18> »
@Ren:

From your extensive knowledge of the history of mega-corporations you know that public institutions like the Veteran's Hospital in Tacoma are practically a joke compared to their privately owned counterparts that have an almost inexhaustible pool of resources.  Ever since the Shiawase decision at the beginning of the century and even before that, public institutions began to be eroded by business friendly policy makers to the point where by 2075, the fragmented governments of this day and age basically keep places like Tacoma Vet's Hospital running for the sole purpose of maintaining a semblance of legitimacy.  No penny is pinched when it comes to providing the boys and girls of the UCAS army with state of the art guns, armor and training, but once they take too much damage to be useful on the battlefield, they're pretty much just seen as a liability.  Places like TVH serve as the proverbial carpet under which they're swept.  Care just barely good enough so SINless parents don't riot, and plenty bad enough so that it doesn't cost UCAS too much to keep open.

You turn your attention way from the little black spider icon and look up into the night sky following the data trail your deck has highlighted for you.  In the blink of an eye you fly up and instantly stand in front of a giant rotating red cross symbol with the UCAS armed forces logo stamped on it and the Tacoma Veteran's Hospital in big shiny letters in front.  A typical Doc Wagon hospital would have a non-stop stream of persona's entering and exiting as doctors, nurses and other staff log-on or log-off from the systems even between shift changes.  In the 1.2 seconds that you've been watching the host, you've seen maybe 2 icons go in or out.   As you probe how sophisticated the security of the host is you are surprised to see the whole analysis summary clock it in as a rating 7 host.  That's rather high for a place that's supposedly falling apart.  Maybe it's the military affiliation, but you doubt UCAS would invest heavily in costly matrix security and then skimp on cyber-eyes, pacemakers and building repairs.  You even remember about a year ago an embarrassing story broke of a particularly nasty awakened mold infestation they had to deal with.  Had to evacuate the whole place and it cost millions to clean out and then move everyone back in.

All of the firewall subroutines average out to be defending the system at about a whopping rating 10. 

OOC: you don't need to spot hosts with Matrix perception and commcodes don't seem to really exist anymore in 5e, you can just identify icons as if they were people I guess.  Hosts aren't on any grid, they're just fragments of the matrix. So that gives you 3 more pieces of information you can ask for.

@Storm & Zach:

With the illusion in place you both sit patiently while Stake lies motionless.  By the fluttering of his eyes you know he's definitely quite active decking away at whatever it is.  Zach also pays close attention to the flyspy's sensor feed AR window as it starts climbing through the little hole in the tin roof.
« Last Edit: <08-29-13/2158:27> by inca1980 »

Ren

  • *
  • Ace Runner
  • ****
  • Posts: 1364
« Reply #53 on: <08-30-13/1015:16> »
[spoiler=OOC]In the list of what information you can get from Matrix Perception, on p. 235, there is an entry for the commcode of an icon. Also, from p. 215 (Matrix jargon sidebar): “Commcode: combination email address, phone number, and IM name that identifies an individual for communications; if people want to get a hold of you, this is what they need.” You’re right that a host doesn’t have a commcode, but it has to have some information that identifies it, like the IP address of a computer today, by which other devices can find and identify it. I wanted to get that information with one of my successes. As for the other two remaining successes: marks on the host, attack rating[/spoiler]

Stake’s virtual eyes widened at seeing the reinforced algorithms of the TVH host. A rating 7 host? What is this, the Seattle Institution for Technology and Thaumaturgy? This could have been a recent upswing of security-consciousness, but he seriously doubted that. Upgrades like this cost lots of nujen. It was so obviously a cover that it hurt the eyes. He switched back to Storm and Zach.
”Actually, just forget what I said about the hospital host. It packs some serious security, I won’t be able to get inside without some form of help. Let’s hope I can find something in the folder that helps our cause.”

It was time to come out of hiding. He would need all the advantage he could get when trying to disarm the data bomb and crack the folder’s protection. He set his deck so he could deal with the task better, then started with the virtual wires of the bomb. Small beads of sweat started to glisten on his meat body.
[spoiler=matrix actions]reconfigure deck, free: swap Stealth for Decrypt; no test
reconfigure deck, free: exchange Attack and Sleaze ratings; no test

Current deck configuration: Attack 5(6), Sleaze 3, Data Processing 5, Firewall 6(7); Encrypt, Decrypt, Defuse programs running

come out of running silent, free; no test
Disarm Data Bomb, complex: INT(6) + Software(5) + hot sim(2) [Firewall(7)] (13d6.hits(5)=6); opposed test, (Data Bomb Rating) x2[/spoiler]
"Speech", Matrix, >>Text<<, Thoughts, Astral
Bulldog
Stake

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #54 on: <08-30-13/1039:36> »
Do you need the drone to continue your search?
« Last Edit: <08-30-13/1307:24> by Sichr »

inca1980

  • *
  • Ace Runner
  • ****
  • Posts: 2294
« Reply #55 on: <08-30-13/1723:48> »
@Zach:
OOC: rolling visual perception test for you looking through drone:  Inuition 4 + Perception 7 [Sensor 3] = (11d6.hits(5)=2)

You look through your fly spy's sensors and as soon as it pops out through the hole in the roof you see up in the night sky something that makes your heart skip a beat.  A ring of rotodrones holding steady about 20m over head in perfect formation, just like the ones you saw at the Puyallup Lodge.  They merely hover there.


@Stake:
OOC: 12d6.hits(5)=3.  You succeed.
After optimizing your deck to defuse the data bomb you hold your breath for second and give it a shot.  A little puff of smoke when you clip the right wire shows you that the bomb has been defused.  Now just remains the protection which shouldn't be too hard to crack.
« Last Edit: <08-31-13/1004:51> by inca1980 »

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #56 on: <08-31-13/1352:58> »
Shit

OK. No point in further transports of drone. Are there any other exits, possibly some sewers or Undergound entrance anywhere close? Since we got company incoming, multiple contacts. Probably also on the ground level. We need to defend the hacker until he gets some solid leads.

Zach readies the weapons, in such close range he preferes his SMGs. He checks his ammo.

@Stake: I have drone outside, well since our oposition is really hi-tech wise, I need to have it protected from hacking or manipulation. Can you do that for me?

Thermo

  • *
  • Omae
  • ***
  • Posts: 883
« Reply #57 on: <08-31-13/1422:57> »
Storm reads the chatter on the comm channel and readies herself for combat. Her head is spinning from maintaining all the spells she's woven, but she's confident that with the illusions firmly in place, they'll get a least a couple seconds to ambush anything that comes looking for them.

She sends a quick message to the team:
>>My 'ware is also susceptible to interference, if they're as good as Zach thinks they are then I'll need help keeping them from messing with my systems. Don't want to go blind at the wrong moment. You've got an invisibility and sonic cloak on you, should be enough to keep them from geeking you. At least not right away, that is. Zach, I am capable of extending the invisibility cloak to you as well but we'll need to do it now.<<

Finally, she sends a telepathic message to the summoned spirit:
"Mighty and crafty thundercloud, there are enemies outside that wish to destroy us. If we are attacked, you are to attack the intruders with your lightning bolts."

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #58 on: <08-31-13/1446:59> »
Copy. Don`t overextend yourself, we maz have some use for your lightning storms, there is plentz of drones out there. But if it could be done easy, invisibility sure can help. And Storm...just don`t get yourself killed. I got your back. And Ill try to figure out some escape vectors if things go south.

INT(4)+Urban Navigation(5) [4 (+1 mapsoft)] (9d6.hits(5)=3)

Zach checks map of the surroundings and looks for best escape route and Underground district entry points. Strange, to think about Underground as about some legitimate place. he has mixed feelings about the change, well it was up to locals to made the choice and so they did, no need for siberian traveler to interfere. Well it would be nice to have the escape route planned, Zach wasn`t sure he wants to run some kind of trench warfare here...

Ren

  • *
  • Ace Runner
  • ****
  • Posts: 1364
« Reply #59 on: <08-31-13/1617:15> »
Stake watched the little puff of smoke. He started to work on the protected folder when Zach's and Storm's message came in. "Easy way is to slave your PANs to my deck, it has quite good firewalls. Approve and i'll do it. By the way, what the hell happened? Invisibility and lightning storms - are we under attack?" Shit, i knew it will be a fragging mojo-slinger. Why does it have to be one every fragging time?

Whatever happened, he knew time was running out, so he had to get every possible bit of information out of the drone. He started up the algorithms that would crack the protection on the folder.
[spoiler=matrix action]Crack file, complex: LOG(7) + Hacking(6) + Hot sim(2) [Attack(6)] (15d6.hits(5)=3); opposed test, (protection rating) x 2[/spoiler]
"Speech", Matrix, >>Text<<, Thoughts, Astral
Bulldog
Stake