@BB:
Firewall 6 + Analyze 6 = (12d6.hits(5)=3). Firewall 6 + Analyze 6 = (12d6.hits(5)=6). You get a user account but get detected by the firewall, but Mute gives you 1 CT before alert goes off. Using a simple action for analyze in detail you see 2 spiders ARACHNID420 and SUBZERO2053. Checking to see if they see you log on: ARACHNID420: Analyze 6 + Computer 5 + Enceph 1 = 12 (12d6.hits(5)=4). SUBZERO2053: Analyze 6 + Computer 5 + Enceph 1 = (12d6.hits(5)=4). Neither of the beat your 5 hits on Stealth roll to see you log on. Using another Simple to issue command to shut off alarm....System checks to detect bogus command: Firewall 6 + Analyze 6: (12d6.hits(5)=1). Now both Spiders also roll to see if they detect you issue command, i'll use same Stealth roll for you: ARACHNID420 & SUBZERO2053: Analyze 6 + Computer 5 + Enceph 1 = (12d6.hits(5)=4, 12d6.hits(5)=3). Neither of them beat your Stealth roll!
Remember, when you do any action that's not part of your User privileges, roll a stealth roll and the System and 2 Spiders will roll against it. That's 3 rolls so think wisely on what you want to do.
You fool the heavy firewall of the Central Node into letting you in and as soon as you log-on, you startle as an AR window outputting a detailed scan of the node shows two user personas that come up as ARACHNID420 and SUBZERO2053 logged in and they look to be running a sleuth of programs which shout "security spider". They are busy at work installing updates. Obviously they haven't seen you yet....very few could and it's clear that this must be where the "heavy" security of the whole system is concentrated. It's not enough to scare you but definitely enough to have to be extra careful. KE definitely didn't install bleeding edge hardware to run their jail, but it's definitely as good as anything a runner is able to find out on the streets. The muting function of your Exploit program is holding steady and you ever so gently send a bogus command to shut down the restricted alert in progress...flinching for a few seconds you breathe a sigh of relief as the system command goes unnoticed and the alert protocols stand down.
The AR windows which have been pelting your field of view in a steady stream throughout your hack trickle to a just a few blinking reminders as you sit there under cover of your Stealth program, happy the system thinks your just a routine filing agent, but busy at work thinking out your next move.
Your User level privileges encompass: Communication through the telecomm system, Interface to key a card system which allows you to initiate a card swipe, Check prisoner roster which looks the same as the previous roster you saw, View a video feed of each prisoner. A host of other very minor clerical functions and maintenance functions are available as well. It seems that User access is reserved for maintenance, cleaning staff, and social workers of different kinds as well as certain KE civilian employees.
There is also a map which lines up with the one you have. The Central Node's hardware is shown to be located inside the control center. Even though there is a Control Center room on each floor, each of these are on top of each other and connected by their own dedicated elevator and all are governed by 1 node.
The awakened detainment tower only shows 1 entrance. This is from a short bridge-walk which when activated slides from the 20th floor small helo-pad to the tower.
The Sally Port room also shows to have a separate cargo sized elevator which is for moving prisoners and cargo from one floor to the next.
New nodes:There are hundreds of slaved nodes (doors, cameras, etc.). All of them require security access on the Central Node in order to be sent commands. User access commands can be sent to doors with a proper card swipe. This is governed by 1 slaved node to Central which is called "Control Center Card Reader". From your knowledge of sec. systems it is likely that this card swiper/s is located in the Control Center Room and allows any door to be open. Then each of the slaved door nodes also have their own card swiper near each door which governs only that one door. This means a user could swipe their card at a door and open it, or swipe the same card in the Control Center and then remotely open any door they have clearance for.
Edge: BB 0/3, Cynthia 1/3, Mercedes 2/2
Ammo: Cynthia-4/4 (1 clip, 2 darts used), BB--25/50