I take it Yani got nothin' on his search? That's cool.
Gonna try checking the rumor mill on these "Black Men" characters. Interested in finding out what they do and who they know:
Data Search 5 + Browse 2 = 7 dice,
7d6.hits(5) → [5,2,6,6,6,2,1] = 4 hits.
Mmm... While we are here, might as well check ol' Uncle Good Advice's e-mail. He said he has leads on more money... Maybe Yani doesn't wanna rely on Uncle being nice to get more money...

(1) First, gotta find his comlink. If it's not hidden, then I found it. If it is hidden, then the following rolls are to find it. If it is not hidden, then skip to number (2)
Threading Scan Complex Form:
Software 5 + Resonance 6 = 11 dice,
11d6.hits(5) → [2,1,2,2,1,2,5,5,1,4,6] = 3 hits.
Fading DV = 3 S
vs
Charisma 6 + Resonance 6 = 12 dice,
12d6.hits(5) → [1,3,5,6,5,1,4,3,3,1,5,1] = 4 hits. Fading Soaked.
Yani asks the Paladin sprite to stop sustaining the browse complex form and to sustain the Scan complex form for the rest of the 6 combat turns left in it's task... I estimate 4 are left.
Yani Detects Hidden Node, looking for Uncle Good Advice's Coms (this will be vs a threshold of 4, that's a static threshold for finding a hidden node that the hacker is pretty sure exists):
Electronic Warfare 5 + Scan 3 = 8 dice,
8d6.hits(5) → [2,6,5,1,1,5,3,4] = 3 hits. fail.
Yani tries again, he has 3 more tries before he has to burn another task with the paladin sprite.
Electronic Warfare 5 + Scan 3 = 8 dice,
8d6.hits(5) → [4,2,5,4,4,1,5,5] = 3. fail.
Electronic Warfare 5 + Scan 3 = 8 dice,
8d6.hits(5) → [3,5,3,2,4,5,2,5] = 3. fail.
Electronic Warfare 5 + Scan 3 = 8 dice,
8d6.hits(5) → [4,6,2,5,2,3,5,5] = 4. wow, barely got it. And the paladin sprite drops the Scan Complex form.
(2) Next, gotta get his access ID. Yani uses matrix perception to see what Uncle Good Advice's Access ID is that he is using to access his own comlink.
Computer 5 + Analyze 6 + Technomancer Bonus 2 = 13 dice,
13d6.hits(5) → [4,4,4,1,4,2,6,2,3,1,5,6,5] = 4 hits. That's enough for 4 pieces of info, so that's good enough for Uncle's Access ID and other info about the node if you wanna reveal anything else like programs being run, yada yada.
Now, yani will spoof a command to the Uncle Good Advice's comlink using Uncle's access ID to foreward all e-mails and text messages he's got in his in-box and out-box to Yani's Biological node. From there, Yani will mentally transfer them to a datachip.
opposed test between Yani's Spoof + Hacking and Uncle's System + Firewall:
Hacking 5 + Spoof 6 =
11 dice, 11d6.hits(5) → [6,2,1,4,4,3,4,4,1,5,4] = 2 hits. Ouch.
Spending a point of edge to re-roll misses:
9 dice, [url=9d6.hits(5) → [2,6,1,3,6,5,5,1,3] = 4 hits. So 6 hits total. That's more like it.
So, Kot should handle Uncle's roll, since I don't know his system or firewall ratings.