NEWS

What exactly is Electronic Warfare?

  • 7 Replies
  • 2347 Views

hulka

  • *
  • Newb
  • *
  • Posts: 54
« on: <10-25-19/1413:28> »
Look at this.
In Battle Royal Adventure ofrom Beginner Box p.6
"The gates can also be bypassed with a series of Cracking + Logic (3) tests to bypass the locking systems. If any character tries to gain access to the apartments, make sure to mention how secure they look. If they proceed into the building, start with the same Cracking + Logic (3) test to get through the door."

But in CRB p.240,Locked Doors and Other Mechanisms and
p.241
Is Mechanical key They can be picked with a lockpick kit and an Engineering + Agility test with a threshold equal to the lock’s rating.
Slightly more complicated are transponder-embedded keys, which have a specifically calibrated resistor to complete a circuit on the lock. An electronics kit is needed to attempt to pick the lock. This is also an Engineering + Agility (lock rating) test.
Maglock, in two steps.
1-the case protecting the internal mechanism needs to be removed, which requires an Engineering + Agility (lock rating x 2, 1 combat round) Extended test.
2-keypads, the internal circuitry needs to be rewired with an Engineering + Agility (lock rating x 2, 1 combat round) Extended test. A sequencer can be used instead; this is a straight-up Opposed test between the rating of the sequencer and the rating of the maglock. This same process can be used for cardreaders, but there is another option—using a maglock passkey (p. 278) with an Opposed test between the passkey rating vs. the maglock rating.

There is no mention cracking+logic test. Nowhere.

But when im Decker i can use Control Device or Spoof Comand action.
What it means in BRA cracking+logic (3)?
One more qustion. When electronic lock or camera has DR3, mean it that Firewall is 3?


CigarSmoker

  • *
  • Chummer
  • **
  • Posts: 237
« Reply #1 on: <10-25-19/1427:19> »
Look at this.
In Battle Royal Adventure ofrom Beginner Box p.6
"The gates can also be bypassed with a series of Cracking + Logic (3) tests to bypass the locking systems. If any character tries to gain access to the apartments, make sure to mention how secure they look. If they proceed into the building, start with the same Cracking + Logic (3) test to get through the door."

Thats a simplified "Spoof Command" CRB p.184. The locking system allready rolled and has 3 hits ... thats the simple way to interpret that.

Look at this.

One more qustion. When electronic lock or camera has DR3, mean it that Firewall is 3?

Thats not mentioned anywhere in the 6th CRB. So GM is free to decide ... Firewall 3 seems reasonable.

Xenon

  • *
  • Prime Runner
  • *****
  • Posts: 6471
« Reply #2 on: <10-25-19/1450:27> »
Quick start rule matrix rules are different from the real matrix rules. This was true in SR5 and it was also true in SR6.


To control a device you first need access to the network the device belong to. Either you force your way into the network with Brute Force or your take your time and probe the network for weaknesses that you may exploit to create a backdoor.

After you have access to the network you can take a legal opposed Electronics + Logic vs Firewall + Willpower test to open the maglock or controlling an elevator or disabling an alarm or turning on the sprinkler system or turn off the lights etc.

As long as you have access to the network you can also control drones connected to the network (as long as they are not currently controlled by someone else).

Since you are now considered a legit user and you are taking legit electronics actions your overwatch score will not increase.


Another method is to instruct a device to take an action of its own by using the Spoof Command action which is resolved as an Illegal Opposed Cracking + Logic vs Data Processing test. Depending on your reading this action can be used to open a maglock or to control an elevator or disabling an alarm or turning on the sprinkler system or turn off the lights etc.

You can also take the Spoof Command action to instruct the autopilot of a drone to take an action using its own ratings (at least as long as it is not controlled by someone else). This is resolved as an Illegal Opposed Cracking + Logic vs Pilot + Firewall test.

The advantage of using Spoof Command is that it can be done without first gaining access to the network, but the drawback is that each command is considered an illegal action which will influence your overwatch score.


Devices normally don't have a firewall or data processing of their own, instead they use the firewall of the network they are part of. A device that is not part of a network at all will typically have a firewall rating and/or data processing rating equal to 0 which mean that they are typically very easy to hack.
« Last Edit: <10-25-19/1514:59> by Xenon »

hulka

  • *
  • Newb
  • *
  • Posts: 54
« Reply #3 on: <10-25-19/1539:13> »
The 5th edition has described the connection via universal acces point or something like that.
In the 6e isnot. Only p.283. "Datajack: A datajack gives you a direct neural interface. It also comes with a retractable spool of micro-cable (a meter long) that lets you directly interface with any electronic device via a universal access cable."
Is it the same? Can I connect directly and I don't have to hack network or Host?

CigarSmoker

  • *
  • Chummer
  • **
  • Posts: 237
« Reply #4 on: <10-25-19/1601:23> »
Each Matrix Action has listed what access level you need to do it.

"Outsider" access you have always. So either wireless or not doesnt matter for the Matrix Actions.


Some Actions need "User" or "Admin" Access. For those Actions you need to do Brute Force or Probe+Backdoor first to use the approriate Matrix Action (Trace needs Admin access for example)

hulka

  • *
  • Newb
  • *
  • Posts: 54
« Reply #5 on: <10-25-19/1627:41> »
Example:
Doorlock with keypad is part of Host.
When i want access, I have to hack the Host first (Brute Force or Probe, Backdoor). If I succeed, I have access to all devices in the Host. So, I can send command to unlock "Open". It includes illegal action followed legal action.
But If I connect directly with the cable of cyberdeck, then I bypassed the protection of the Host and can send command "Open" It is only legal action. No overwatch.

Can I play it like this?
Or
But If I connect directly with the cable of cyberdeck, then I bypassed the protection of the Host. Hack (Brute Force) the unprotected device and can send command "Open" It includes illegal action followed legal action. But easy.
« Last Edit: <10-25-19/1633:36> by hulka »

CigarSmoker

  • *
  • Chummer
  • **
  • Posts: 237
« Reply #6 on: <10-25-19/1635:12> »
Example:
Doorlock with keypad is part of Host.
When i want access, I have to hack the Host first (Brute Force or Probe, Backdoor). If I succeed, I have access to all devices in the Host. So, I can send command to unlock "Open". It includes illegal action followed legal action. [...]

Yes.

[...]
But If I connect directly with the cable of cyberdeck, then I bypassed the protection of the Host and can send command "Open" It is only legal action. No overwatch.
Can I play it like this?

No. When you connect directly that only helps connecting to non-wireless devices. (And it is without Noise.)

To send the command "Open" you need as minimum the Matrix Action "Spoof Command" with Outsider Access. When the Device is not connected to the Matrix - you dont get Overwatch score - otherwise you get Overwatch score as usual.

Xenon

  • *
  • Prime Runner
  • *****
  • Posts: 6471
« Reply #7 on: <10-26-19/0355:15> »
As CigarSmoker is saying, in this edition there does not seem to be a Direct Connection concept where you may ignore firewall ratings of the network the device is connected to by establishing a direct connection to it.

The only listed advantage of using a Direct Connection in this edition seem to be to ignore noise.

Note that in this edition you also no longer seem to be considered Directly Connected to devices that are part of a host network while you are inside the host (you no longer seem to ignore noise due to distance).


Having said that, there is also this sentence to consider:

SR6 p. 185 Host Security and Architecture
Because you must hack each host in succession from the outside, having inside access to a site with a direct connection to the deepest host (if one exists) is valuable
« Last Edit: <10-26-19/0358:38> by Xenon »