Rules.
1. This is the description of a patrol IC:
Attack: n/a
Patrol IC acts more like an agent than other intrusion
countermeasures. Its job is to patrol a host, scanning
people’s marks and looking for illegal activity using the
Matrix Perception action on all targets in the host. While
the act of placing a mark is an illegal activity, the act of
simply having a mark is not. Once you have the mark,
you are considered a legitimate user. Patrol IC has no
attack, but it shares its information with its parent host.
Since the Patrol IC doesn’t use Attack actions, it doesn’t
take Matrix damage when it fails. Most hosts have Patrol
IC and keep it running all the time.
This is why I think that while if the patrol IC had noticed Mark perform hack on the fly - it would have alerted the system. Once Mark accepted a Mark he DOES belong there. There is no alternative hacker proof list of authorized users - Mark's device is part of the list of authorized user and any security protocol has authenticated that Mark is allowed to enter the host. The patrol IC after all enforces the host's policy and Mark was granted access.
Sure Mark faked it all and this is why he is gaining overwatch as time passes and his ruse becomes more apparent. But a combat with IC should not happen before Mark is cauhgt or his overwatch climbs too high. If there is a combat - it will not be with a patrol IC because they are just doing perception checks.
2. Is a search even possible with a host if Mark illegally hacked his way inside?
The reason I am asking is that a search takes minutes and a combat turn is 3 second and in that turn a patrol IC can perform multiple scans. Mark and any other decker has limited dice for avoiding matrix perception when running silent - if the patrol scan's Mark 1000 times there is no need to roll, Mark will be discovered - and the patrol IC just knows that Mark should not be there. So Mark raises all the red flags, if in this game it is impossible to break in a host and remain there for several minutes without raising alarms then Mark's goal is unattainable and we need to talk about what kind of things can and can't be done with decking.
What I had in mind was enter the host and search it legally - then steal the file while running silent and hiding from IC and so forth. Because the way I read these things - I can be inside the host for a while as long as I am not caught doing illegal matrix actions. It is not how you do it so Mark's behavior should fit the way the matrix is in your game.
So the question asked: Is a matrix search inside a host an attainable goal?
Because it require Mark to be undetected for several long minutes where just spotting him causes the IC to fight him. Mark or any other decker can only successfully avoid matrix perception so many times - if you roll 100 times you'll find Mark.
3. Is there a list of matrix actions/configurations that result in Mark's getting the paydata without fighting IC? What sequence of actions do you see Mark doing to get that thing done? Because we seem to see things differently.
To the obvious problem of a program spotting Mark and calling the alarm if Mark is spotted there is a solution:
Hide:
12d6t5 6Since I assume that the next op of the patrol IC will be to try and spot Mark:
Defend from matrix perception:
13d6t5 4But I still feel odd that Mark is so quickly in troubles. So Perhaps with your interpretation Mark need to run silently ? I was thinking that running silently is only needed when performing illegal stuff (like stealing a file) rather then browsing around - this is why Mark is hiding in plain sight not doing anything illegal instead of raising suspicion by running silent. (How long can you remain undetected while doing somthing illegal like running silent - that obviously means I SHOULD NOT BE HERE - so I assumed I'll do what legal actions I do and then switch to silent, steal the file and get out preferably without suffering 100 of matrix perception attempts.
This is not how you see it - as we ended up in combat before Mark even touched the file. So please I need to understand how it can be done correctly according to the way you want the matrix to be.
5. The patrol IC text I quoted say that they cannot attack - so if Mark is fighting somthing it is other IC's summoned by the patrol IC.
The way I see it:
The good result is:
1. Mark get data undetected.
So So results:
2. Mark leave undetected - without data.
2. Mark is detected and get data. ** Taking the data will cause problems but at least we have it.
The worst that can possibly happen:
4. Mark is detected and leaves without data.
Somehow it feels like we reached 4 - even tough Mark had a very good hack on the fly roll and successfully marked the host. We rolled back so this is the only action Mark did so far, that and matrix perception.
Now did you intend for Mark to switch to silent running after marking the host?
It seems reasonable (providing that searching the host - is even feasible)
In that case why didn't Mark run silent ? - I'll need some help here as we see things differently about the matrix so I am not sure what the 'comon sense' is.
So please to avoid confusion: A list of actions of how an ace decker get to the host, search and get the file without setting off alarms. (Then I can check if Mark is an ace decker or not.)