Inside the node Mouse was looking around. Immediately after the alarm two security hackers were scrambled fully loaded with offensive software. They are sculpted like the Shaolin Monks assuming battle stances. There are two IC present sculpted like a ghosts or spirits of air. Closer inspection would be needed to identify their purpose and loaded software.
You got five combat turns (15 complex actions) breathing space before they'll find out it was two of you hacking in. they will know so after the access log will be updated. until that you expect them to run trace on Omar and sniff around to see if he managed to do any damage before he left
Any way to deal with my trace in memory before it's written to the log files? I'm thinking that if the data is not logged, they probably won't know I'm here. Machine sprite, maybe?
Can I analyze their icons w/o alerting them to my presence?
How long would it take to create another security account and spoof a log in command by one of the spiders access id. The thought being that they would be less likely to remove an account "used by one of their own" which could buy me another way in.
Can my Sleuth Sprite erase my data trail?
Is it necessary to deal with the spiders and agents or can i slip past them on to Red Wire's node?