I was thinking about something like checking the access logs on the scrurity node and running a trace. Everything done on a node should be logged if the person has an account, legit or not. Hackers erase their logs, but for a Spider, that would be illegal.
So, the idea is to find the spider's ID in the logs and try and find him on the local network so that I can hack his personal node and get his password type stuff.
Just trying to find a faster way to get around the telematics infrastructure software than hacking through who knows how many nodes. Could I at least fool the TI software by feeding bad info to the signal scanners in the reception area? Otherwise, there's likely to be questions about why everyone decided to use the john at once.