NEWS

[OOC] Missions 2 - Best served cold

  • 498 Replies
  • 142899 Views

Boer_Kommando

  • *
  • Omae
  • ***
  • Posts: 435
« Reply #60 on: <02-07-11/1907:36> »
why do you guys torment poor Mata with your metatype choices  :o

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #61 on: <02-08-11/0641:48> »
Stryker will try to remember what that knife and feather could mean. They have obviously mystical meaning, even if they're not magical themselves.
Logic(4)+Arcana(2) (6d6.hits(5)=2)


obsidian knife - may be linked with Aztlan mysticism
crow feather - may be linked with shamanism with crow or raven as a mentor spirit
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #62 on: <02-08-11/0657:21> »
Cursor will data search the victim, run a trace using falcone's link and then examine and/or hack the commlink from the room.
the commlink found in Belenkiy's room has been shut down and is currently waiting for authentication from either a security RFID or passkey.

short analysis confirm that commlink's hardware is taken from Transys Avalon and it is running an Ares Proprietary OS (Response 4, Signal 4, System 4, Firewall 6). Initial log on responses indicate, that the commlink have as purge security measure. You may try to hack in (Hacking+Expolit(6, Complex Action) Extended Test) but in case of detection, it'll go off and clear the content.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #63 on: <02-08-11/0712:45> »
Cursor will data search the victim, run a trace using falcone's link and then examine and/or hack the commlink from the room.

what exactly you're trying to trace?
browsing the message logs, you see a text message requesting the ransom, with threat to kill the victim and spread the word on streets,  message originating node and access_id of the sender. However there is no icon of the sender, he is not subscribed, and thus there is no link you could trace.

Trace User (Track)
You trace an icon back to its originating node. This is a Computer +
Track (10, Complex Action) Extended Test. The target may increase
the threshold with the Redirect Trace action, and a Stealth program
run by your target acts as a negative dice pool modifier.
When you reach the threshold of the Extended Test, you have
successfully traced the target, learning the target’s access ID and the
location of the device housing the originating node (usually the user’s
commlink). If the target is using a wired connection to the Matrix, you
learn his exact location. If he is using a wireless connection, you have
his location triangulated to within about 50 meters. As long as you
keep your Track program running and the target remains connected
to the Matrix, you may continue to monitor the target’s location. Black
IC can make the trace easier.
You can also use this action to trace a subscription to its other
end. For example, you may trace the subscription from a drone to the
rigger controlling it.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Chrona

  • *
  • Prime Runner
  • *****
  • Posts: 3794
« Reply #64 on: <02-08-11/0718:57> »
First I encode communications, my commlink, my goggles, my arm and my crossbow in 2.5 seconds. I'll encode everyone's commlinks in 2 more seconds. Anything else anyone wants will be 0.5 seconds per node but no ones responded to cursors offer yet.

After that I drop the thread and thread browse: Thread Browse (10d6.hits(5)=4)
Rating 4 Browse.
Resisting 4S. Fade Resist (10d6.hits(5)=4)
Resisted. 1S total.

Data Search Jonathan Belenkiy, Limited Extended, Ignore glitches:
Broswe (4) + Data Search (3) + Analytical (2) (9d6.hits(5)=0)
Broswe (4) + Data Search (3) + Analytical (2) (8d6.hits(5)=3)
Broswe (4) + Data Search (3) + Analytical (2) (7d6.hits(5)=2)
Broswe (4) + Data Search (3) + Analytical (2) (6d6.hits(5)=1)
Broswe (4) + Data Search (3) + Analytical (2) (5d6.hits(5)=2)
Broswe (4) + Data Search (3) + Analytical (2) (4d6.hits(5)=2)
Broswe (4) + Data Search (3) + Analytical (2) (3d6.hits(5)=1)
Broswe (4) + Data Search (3) + Analytical (2) (2d6.hits(5)=0)
Broswe (4) + Data Search (3) + Analytical (2) (1d6.hits(5)=1)
12 Hits.

Dropping Browse Thread.

Compile Rating 4 Sleuth:
Compile Sleuth (6d6.hits(5)=1)
Sleuth Resist (4d6.hits(5)=0) GLITCH
Compiled with 1 Task.
Quote
You trace an icon back to its originating node. This is a Computer +
Track (10, Complex Action) Extended Test.
Cursor will data search the victim, run a trace using falcone's link and then examine and/or hack the commlink from the room.

what exactly you're trying to trace?
browsing the message logs, you see a text message requesting the ransom, with threat to kill the victim and spread the word on streets,  message originating node and access_id of the sender. However there is no icon of the sender, he is not subscribed, and thus there is no link you could trace.

I realised I cant actually run a trace as they're gone while typing >.<, damn.

Take a good look inside falcone's commlink in case thy left -anything- traceable behind like a back-door: Analyze (2) + Computer (3) + Techno (2) (7d6.hits(5)=1)

Quote
the commlink found in Belenkiy's room has been shut down and is currently waiting for authentication from either a security RFID or passkey.

short analysis confirm that commlink's hardware is taken from Transys Avalon and it is running an Ares Proprietary OS (Response 4, Signal 4, System 4, Firewall 6). Initial log on responses indicate, that the commlink have as purge security measure. You may try to hack in (Hacking+Expolit(6, Complex Action) Extended Test) but in case of detection, it'll go off and clear the content.

Cursor will see hat the others think then

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #65 on: <02-08-11/0725:55> »
Cursor will data search the victim, run a trace using falcone's link and then examine and/or hack the commlink from the room.

I am not sure (correct me if I'm wrong) but you can probably use the same compelx form as before.


8d6.hits(5)=4,
7d6.hits(5)=1,
6d6.hits(5)=1,
5d6.hits(5)=3,
4d6.hits(5) =1


3d6.hits(5)=1,
2d6.hits(5)=1,
1d6.hits(5)=0
<- glitch

total 12 hits - nice (you got public and two levels of classified)

Public knowledge
Jonathan Belinkiy - Executive Manager at the Downtown Ares office.

Restricted/limited availability information
He was the driving force behind the Mark IV flak jacket, he pushed his people to get it into production an extra six weeks early.
Word has it that he’s moving up in the world. He’s on the short list for the next VP position.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Chrona

  • *
  • Prime Runner
  • *****
  • Posts: 3794
« Reply #66 on: <02-08-11/0732:12> »
I had to drop the thread from before to avoid -2 sustaining, meh 12 hits either way! =D



Ah-Hah! I have the message they sent! So my Sleuth can do it!

Quote
Traceroute
The Traceroute power allows a sprite to sniff out the
datatrail left by an individual’s daily interactions with the virtual
world—credit transactions, phone calls, video surveillance
shots, email, driving a car with GridGuide, or even using a passkey
to get through a corporate enclave’s security gate. In 2070,
almost everyone leaves a constant trace of themselves within the
Matrix on a daily basis, every time they access their commlinks.
Traceroute gives a sprite the ability to home in on the most recent
interactions.
To use Traceroute, the sprite “sniffs” some data relating to
the target and makes an Extended Test pitting its Rating + Track
against a variable threshold as determined by the Traceroute Table
(p. 157) with a base time of 1 hour. If it succeeds, the sprite can
locate the node that the target is currently in, if that person is online,
or the most recent physical location from which the target
interacted with the Matrix.


TRACE ROUTE TABLE

Subject Interacts with the Matrix: Threshold
Constantly                                            4
Infrequently (a few hours a day)          8
Rarely (once a day)                              12
Very rarely (less than once a day)        16

Complications Threshold Modifier
Subject’s most recent transaction/access was logged –1
Subject using Stealth during transactions +Stealth
SIN, commcode, MSP address known –3
P.156-157 Unwired

Gimme a threshold and he can start looking

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #67 on: <02-08-11/0732:26> »
please each of make a roll at Etiquette + Charisma
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Chrona

  • *
  • Prime Runner
  • *****
  • Posts: 3794
« Reply #68 on: <02-08-11/0737:14> »
please each of make a roll at Etiquette + Charisma

Gulp

Charisma (3) + Etiquette (1) (4d6.hits(5)=4) HOLY SHIT

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #69 on: <02-08-11/0803:19> »
Gimme a threshold and he can start looking

I can't - I'd give you too much information that way, but make 14 rolls (time until deadline). I'll let you know when (if) he find him/her.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry


Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #71 on: <02-08-11/1101:20> »
Had to edit, footage post (reply to Beast). It was inconsistent with the previous one, and you don't need any more fogging, you're already deep in the forest *evil grin*

time is ticking
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #72 on: <02-08-11/1111:48> »
(1) Wilco, notices the watch tries to determine it's value. (2)Makes a mental note to lookinto the achievement made on the last quarter and last quarter and to see if anyone may have a grudge. Also, Wilco is interested in the feather "ask group if it may be a focus of some sort?" Being he is not awaken, hes heard of such but doesn't actually know what 1 may look like. Informs the group the the van is ready to roll when needed. Wilco then goes to the van to make sure his drones are ready. starting with the stormcloud. (3) Ask the group subvocially about leaving a fly-spy drone in the room.

(1) make o roll please: Intuition + Locksmithing (4)
(2) mental note made ;), you want to do anything further about it?
(3) I assume, you share the frequency. It may lead to certain difficulties as seen on last run ;)
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Bewilderbeast

  • *
  • Omae
  • ***
  • Posts: 957
« Reply #73 on: <02-08-11/1241:20> »
Eight-Stone's roll, with predictable results:
Charisma (2) + Etiquette (1) = (3d6.hits(5)=1)
I believe that's a glitch, yes?
"Dialogue"
<<Matrix/Comm>>
"Astral"
Thoughts

Boer_Kommando

  • *
  • Omae
  • ***
  • Posts: 435
« Reply #74 on: <02-08-11/1429:00> »
my etiquette roll, as asked for:

BBCode13d6.hits(5)=3

pretty pathetic  :-[

I say we hold off any calls to our contacts till we get in the van. Atleast that's what Mata will be doing.

 

SMF spam blocked by CleanTalk