"Whew..." Brian was relieved that Mercedes was sooo damned good at talking people into crazy shit. Also, that these guys were strictly low-tech. If they had any scanners around here, Mercedes would have had to talk a dude's face off to explain why there was a tiny man with a fully silenced PDW ready to spring at them like out a bad horror sim. As Woofer climbed back into the car and Mercedes back to her bike, Brian decided it's a good idea to at least hack into their comms frequency.
"Those boys get to arguing over rights and Johnny Blueballs back there might put word ahead to intercept us in force for a closer look. Should crack the mage's comm first since he's most likely to radio ahead so they'll expect us. When slash if he does, I'll let you know what he says." B. B. set his bit-flooder to attach a massive hex header to all his outgoing commands, and it easily overwhelmed the the sad little firewall the souped up walkie-talkie relied on. He used the newly gained security access to first hook into the sound feed and then dropped a ruin package to take care of the link's logs and ID datastore.
<<@ team: About a minute from now, their comms are going to be pretty scrambled. They might be able to receive incoming calls if they're not set to auto-reject unknown numbers, but they definitely won't be calling out. At least not to anyone they know.>> [OOC: Going for a security level access, in order to access the audio feed on a different account, so I'd only need 4 hits to beat his firewall.
4 skill + 2 Improved Skill (hacking) + 5 program + 1 PuSHeD + 3 nanites =
15d6.hits(5) → [1,3,4,1,6,3,5,2,5,4,2,5,2,6,1] = (5) breeze in as I please.
Rolling Firewall + Analyze extended.
2d6.hits(5) → [4,6] = (1) so one against the threshold of 5. Needs four more, and I only need two more actions, so he needs all hits to detect the intrusion.
2d6.hits(5) → [2,5] = (1)
2d6.hits(5) → [6,1] = (1)So, that's for the two actions.
I want to set a timed Corrupt "bomb" on his access log and his ID registry (basically, his saved phone numbers,) set to activate in 60 seconds. Corrupt, should, instead of deleting the data, just alter it slightly into uselessness. He'll have a list of ID numbers to call, but they'll not work, or they'll call wrong numbers. All of this should have taken Brian about 3 seconds/IPs to accomplish. Since it's so easy to do, can I just handwave the next two? There's no way that they're going to get 5 hits in the time it takes to set this up. Especially since I only need to take the one action since I'm not listening in, and I don't (think I) need security access just to corrupt files.
[Additional OOC: Since I have the time and the inclination, can I use my current access to their links to set up a Reusable Exploit (Unwired p97) on the two cybered-up guy's PANs? That way I can get a +6 dp bonus if I need to get back into their biz at an admin level later to bruce their cybernetics. It's a hacking + exploit test with a threshold equal to system + firewall (so 2) and an interval of 1 IP. Buying hits, I can hack, corrupt and set up the exploit hole all in 3 seconds for each of the two grunts. Should be able finish the whole thing, all three comms, in about the same time it would take you to read this sentence out loud. Something to consider though is that setting up the exploit would give the other two an additional roll to spot my presence since it's more activity. That takes their chances of spotting me from zero to very near zero. I wasn't sure how you wanted to use diminishing DP on a firewall test since, once inside the node, the interval isn't timed, but is instead every time I take an action.