Almost (but you can roll for the other node already)
IP3:Data Search Access Log: Thread Browse (10d6.hits(5)=5)
Browse 4, 4S fade: fading (10d6.hits(5)=4)
2P overall.
Data Search 3 + Browse 4 + Analytic 2 + VR 2 (11d6.hits(5)=1) I'm looking for traces of myself, in the last 6 seconds so that should be enough, if not Data Search 3 + Browse 4 + Analytic 2 + VR 2 (11d6.hits(5)=6) and bump everything down an IP.
Turn 3
IP1: The access log rules aren't great, it hasn't been 5 turns (unwired p.65) so the logs haven't been updated yet so I've no trace of m login to delete but waiting around 2 more turns makes no sense, can we assume I can cover my tracks by using the action to make sure it doesn't update? Delete Raw Log Data? Ignore next Log out? it says hackers can do it, but not how.
IP2: Log Out then Renew Assist Exploit
IP3: Hack on the fly Target 7 : Hacking 3 + Exploit 5 + VR 2 + Assist 3 (13d6.hits(5)=5)
Unfortunately for the spider, hackers
tend to change both their location and their access ID on a regular
basis, so this information is usually dated and no longer accurate. A
successful Track Test using access log information will only give the
location from which the hacker performed the last action recorded
in the access log, and the access ID that she used at the time.
this means, that they can pinpoint your physical location (within 50m) and your access_id. I don't know if/how Technomancer can change his access_id. But you've changed the location already.
There is no problem with finding the logs of your presence, but to alter them you'd need admin accounts.
Since I see that is what you intended to do, and there is enough time space to do this, I'll rule that you made it to the admin account, the alarm was fired up but supressed. You deleted both camera files and raw data for accesslog.
On future rolls however, keep in mind
With User - you have access to main node functions and operate them
With Security - you have
read access to monitoring tools and can load/unload security programs
With Admin - you have
full access to each and every file including AccessLog.
Proceed with next node and if you intend to delete the access log you need to go for the admin account.