Oh wow, we now have nanos in play.

You guys put up quite a fight really

I'd like to understand what you try to achieve, however.
Assuming I'm healed up by now.
It was a most of day break - you finished your lates queries by the noon, divided. it is near midnight by now. So you can count about 12 hours rest - assuming you did just that - slumping through the bars, eating and meeting people.
Compile Sleuth Sprite R.4: Compile (6d6.hits(5)=3)
Sprite resist (4d6.hits(5)=1)
Compiled with 2 tasks, I'll buy hits on the 2S fading. Optionl CF: Decrypt.
"Trace this photo", he was heading out the door.
I assume you wan't to know access_id and location of the device that posted the message?
Activator Nanites R.6:
Vector: Contact, Inhalation, or Injection
Speed: 1 minute
Penetration: 0
Power: 8
Effect:A new hazard in the Sixth World, intruder nanites are a
specialized form of nanoinfectors. Intruders are hard machines
that carry simple firmware and are designed to subvert electronic
devices and cyberware. Once deployed—normally in a sticky
gel solution—they seek out the nearest input-output electronic
circuitry and feed the processor preprogrammed instruction sets.
Since this is a hardware-based attack, it circumvents standard
device protections (such as Firewalls). Specific effects must be preprogrammed
when the system is acquired. Once inside a person,
intruders will latch onto the first cyber system they find (barring a
called shot this is left to the gamemaster’s discretion).
Intruders have no Signal rating and rely on physical contact. To
subvert a device the intruder nanites must win in an Opposed Test
between their rating and the target item’s Device or System rating
(see Sample Devices, p. 214, SR4). While the user can simply command
an infected device to behave normally, the intruders will simply
re-execute their instruction set on the next Combat Turn (and will
continue to do so until deactivated or ordered to stop). A tag eraser
or system reboot destroys all of a device’s active intruders. Most intruders
cannot defeat encryption, so are ineffective against encrypted
devices (gremlins, however, are unaffected by encryption).
Activators: Activators infect wireless-capable devices and
perform one of two simple, yet annoying tasks: They either subscribe
the infected device to nodes without the user’s permission,
or open the device to universal unrestricted access. Such changes
in access status are not necessarily apparent if the device isn’t being
directly monitored.
I'm going for subscription to me
[/quote]
1. I assume you try to take control over the van?
2. can nanites move over mechanic parts of the van? This is quite different thing than crossing the skin and using blood stream to access the piece of cyber equipment.
3. what does the subscription of wireless capable node to your node means - that you gain admin access? or that you gain user access? (thinking that it cost 3000 yen per dose, I'd think the prior not the latter)
On any case, I need a little time to read this section.