Welcome! These forums will be deactivated by the end of this year. The conversation continues in a new morph over on Discord! Please join us there for a more active conversation and the occasional opportunity to ask developers questions directly! Go to the PS+ Discord Server.

Hacking in combat questions...

10 posts / 0 new
Last post
Duke Rollo Duke Rollo's picture
Hacking in combat questions...
I have the skills needed for hacking and a fair amount of stealth. You are a team of bastards that have invaded my Habitat. You want to shoot me. With guns. In the face. Many many times in the face. I do not want to be shot in the face. Not even once. Blowing your team out of an airlock isn't an option. I have to deal with you directly. Your team is wirelessly communicating & running a tactical network. Before I go further, is there a section that deals with hacking this? If so, ignore what comes next and give me the book & page number, please. If your team doesn't have a fork or infomorph devoted to the tactical network, does it count as an unmonitored system? Would I go up against the muse of one member of the group? Of all the muses of the group? If everyone on your team has a fork with an infosec skill, do I need to beat all of them? Let's say I do hack your tactical network. Can I try to brainhack synthmorphs or pods in your group? If I have admin rights, can I just kill your entire group instantly? (i.e. command vac suits to open in vaccums on biomorphs, command grenades to set their detonation countdown to less than a second and go off, command your gun to go off when it's pointed at a team member or thin outer wall, etc.) Can I kill you without admin rights? Can I get live information from your morph? See what you bastards see & hear what you hear? If you have slaved devices in the tactical network, can I hack those and control them? Can I make your team see things that aren't real? Like making an airlock look like an elevator? Can I create false communications? Can the one guy off alone by himself get trapped somewhere... and then the rest of your groups hears me saying in his voice "HOLY MULE censored! THEY HAVE A MECH! ABORT ABO*tzzzshssshhhhhtt*". Assuming I make it into your network, how do you get me out or deal with me? Can you just reboot the network and force me to rejoin it and thus start all over again? Can you "counter-hack" me? Trace my wireless signal to mess with my system or figure out where in the habitat I am to shoot me in the face? Is there a way for you to run your tactical network without being wireless? Like a line of sight laser transmission? If so, wouldn't that stop working if there was a lot of smoke or if you lost line of sight?
-Duke Rollo
Xagroth Xagroth's picture
Re: Hacking in combat questions...
I will assume you are a private person, living alone in its own habitat (or with a limited number of forks / LAIs) unless I mention it specifically. I always assume, even if it was never mentioned, that a tactical network is always monitored, because it is a system composed by several systems that ARE monitored (the mesh implants or morphs of the characters running the network are monitored by their Muse). Since it can be very confusing, I run it as separate systems, so the smart thing to do is to find the weakest Muse against hacking to get yourself into the network. If you are detected, you can be counterhacked and tracked, but unless they can correlate your physical position with the mesh one (or access something that can tell them where you are, like your eyes, some cameras, or even a map) it is quite useless. The best way to solve the issue of a compromised tactical network is to turn off all the wireless communication of the morphs that were using it, wait for some time, and then run it again, with a new set of codes that are impossible to hack: a random string of symbols stored into a physical support inside a protected carrier that has to be open manually and can be destroyed if the ego is killed is a good option, and of course none of the members of the team know that string (but each carries a copy): if compromised, they will go offline, check their system and read the new set of codes they did not knew before. First: You don't want to see your comms hacked, intercepted or negated? Use cables. One can rule that it is easy to set up a small fabber with enough components to produce kilometers of cabling, and as long as the enemy don't cut it, it will be safe, plus some ingenuity is needed for that (variations in signal quality can be monitored, specially if the exact parameters of the cable are known, which is easy since instead of buying it you are "making" it). Second, What can you do against a boarding group in your habitat? Step one: Detect the incursion. If they get in undetected, and reach your input/output systems, you are very screwed, because they can (and most surely will) start connecting stuff like dozens of ectos (or an equivalent system) to the habitat's mesh, placing there egos, forks, muses, or whatever they want. If you have the "manpower" to counter that, congratulations, you might be able to stall them. Step 2: gain time. A boarding is a game of knowledge: they want to know all they can about you and the habitat, and the chances are that they already have some, lots or even all the intel. Pay for materials and "hollow" containers where to build yourself a non-standard system, or use different contractors. Maybe even building different parts of your habitat in different locations, and after that you will ship it all to the place you wanna live. Making sure that their plans get modified (bribery, hacking, and ego-editing are good ways to ensure that) can be a good idea, but do not delete the data, just alter it. So observe the invaders, and see what can you discover. Step 3: separate the invaders. While they can cut through anything you lay between them, it will take them time. Step 4: hack their comms. And this is my list of favourite stuff to do when I have hacked a tactical network: - Sensor messing: make them see stuff that it is not there, or to miss things that are there. Like that door that leads to space, which instead leads inside of the reactor chamber... - Transponder messing: make some of them to be read as hostiles to the rest of the team... - Infopump: learn who is their boss, what do they want and how did they found where you are. Chances are, however, that their data about that questions is either absent or false (be it because they were psychosurgery'ed, lied to, or they did not ask...). If you cannot hack their comms, wait for the best moment to fill their comms with interference, and miss it for some seconds... It is best to shoot, then disable, than to disable and then shoot. Doing both at the same time would be best, though. Step 5: locate their exit route. Make sure they can't use it (and don't even try to use it yourself). Funny things to do: - Send some drones here and there, small enough to fit through the ventilation system. When they are on the same location of the enemy, make a small burst of interference, and switch the transponder data so the tactical network will think the drone is a member (and the member the drone was close enough stops being noticed by the network as an ally...). Make the drone to follow him, for a while... Final step: Egocast out from your secure transceiver (neutrino farcasters are the best option) after setting the main reactor to blow up two seconds after you left... Preventive countermeasures: - Have a "dummy mesh". Simply adding a number, letter or symbol before the "adress" of your network can go a long way to be sure that foreigners won't access the "real" network. - Good sensors. Input/Output detectors are the first step, a pro team will cut the hull after placing a "bubble" to prevent a difference in air pressure. The simplest solution is to have a double hull and rotate randomly the amount of atmospheres it contains inbetween... - Have several forks in ice ready to step in an fight for you. Delete them afterwards, but keep the stuff they learned if possible. - Modular building. Imagine you can rearrange the whole habitat from one layout to another in minutes or even seconds... quite the way to confuse their mapping software, specially if you can arrange for the movement and connections to not be sensed inside. All this shit, and I didn't really had to think about it. There is something seriously wrong with me... XD
DivineWrath DivineWrath's picture
Re: Hacking in combat questions...
I have some difficulty with hacking rules myself. It seems that the game was made to make hacking a very viable option. It has the potential to be more damaging that what a well designed system should allow. So keep that in mind.
Quote:
Your team is wirelessly communicating & running a tactical network. Before I go further, is there a section that deals with hacking this? If so, ignore what comes next and give me the book & page number, please.
Well, chapter 6, The Mesh, (p. 234) is all about the mesh and it does have hacking as one of its topics. While the whole thing is worth reading, the specific would likely be "Mesh Abuses" (p. 231), "Scanning, Tracking, and Monitoring" (p. 251), and well everything beyond that until similspace. Skip similspace, and resume reading "AIs and Muses" (p. 264) and "AGIs and Infomorphs" (p. 265). You know what, you're probably going to want to read the entire chapter... twice. ---- If I were going to try to send a team into an abandoned habitat, or one owned by a known enemy, I would restrict communications to prevent hacking. Chances are, you probably have things set up to bombard my team with hacking attempts by forks running through the local mesh. Its very hard to shoot anything in the face when it moves through the mesh. Likewise any information I could gather through the mesh could be false or misleading. I think it would be much better and safer, for me and my team, to set their mesh inserts and any non-slaved devices to run on some communication method that isn't wireless. I would probably use laser communication (which can be disrupted by hot smoke) or Skinlink nanoware (which would make it possible to control my devices or communicate with my team mates through touch). It is my understanding that any device that is told to or programmed to not to accept input from some source can not be hacked by that source. So if I were to tell my mesh inserts to not accept wireless communication, it could not be hacked by wireless communication. Of course I would not be able to talk to my team mates through wireless then. If however the device was hacked by some other means, it would probably be a simple task to turn that device's wireless communication on. If I had more money than what I knew what to do with, I would add QE comm (Quantum Entanglement) to the mix. They suffer from some problems, but they would not be hackable (you would need one of the 2 devices to do so). If I were employing pods or synthmorphs, I would not let them go alone. They would need escort by at least 1 biomorph, as biomorphs can't be hacked, controlled, or have their egos replaced (egos could be replaced in a cyberbrain with a few turns of hacking) like a synth and pod. If something went wrong, I would ask the biomorph what happened, or if the biomorph is dead, I would have good reason to suspect that something bad happened to the synthmorph. I would also have their Access Jacks removed to prevent anyone from overwhelming the synthmorph, and then hacking them by wired connection. I would not rule out that my enemy might have some technology to physically modify the synthmorph so it could be hacked. If I were going to employ hackers, I would keep them on a separate network from the team who are supposed to find you and shoot you in the face. I would also expect them to use ectos which could be used to do most of the stuff you could use mesh inserts for. Many many ectos, just in case some of them get hacked.
Geonis Geonis's picture
Re: Hacking in combat questions...
You will want to read page 204 for information on tactical networks, also I would consider a tactical network a VPN (page 260). Also keep in mind, it takes one complex action to turn off an insert or ecto. My reaction would vary on the invaders. If a full blown team is coming for me on my habitat, I am probably going down, either by their hands or my own. Unless I have one hell of an ace up my sleeve. Even blowing the airlocks will just slow a determined team down at best.
Jaberwo Jaberwo's picture
Re: Hacking in combat questions...
If the team is even halfway competent, they will have an encrypted tacnet which you can't hack as long as they don't stay in range for days or weeks. If it is one time pad encrypted you won't even be able to find out what they were saying and what data they were sending to each other after everything is over. You would have to sneak up on someone (use a tiny drone) and find a physical acces point or perhaps you can use a skinlink system, but that might get detected by the enemy nanodetector or guardian swarm. Alternatively you could try to trick them into accepting some kind of trojan via social engineering, AR or just an infected data storage. They have to let some kind of data in if the want to see AR or acces the habitat's systems like doors and downloading maps etc., but that data will be treated with extra suspicion, and might only be fed sparsely to the tacnet itself. Once you are in you should first update your status to the maximum and then subvert the muse so it won't get in your way and pretends that everything is fine. After all your muse probably knows pretty good how to lie to you. Then you lock the user out from controlling his meshinserts and the devices connected to it (i.e. everything). Now you can do everything you like, but be mindful of the fact that your victim's comrades might be able to help him once they notice something is wrong, e.g. jam all signals and physically jack into the poor guys mesh inserts to hack them back under his own control. A lot of the things you mentioned are good ideas how to uses your influence over your victim. One other possibility is using the AR channels to block every information your enemy gets from his senses, so he won't hear, see or feel anything, and be trapped in a black and empty void. Also, you could probably force him to go into VR. And remember: If you can hack it, it can hack you.
Xagroth Xagroth's picture
Re: Hacking in combat questions...
Geonis wrote:
Also keep in mind, it takes one complex action to turn off an insert or ecto.
I can't remember if it's in the rules, but I'd rule that the Muse can do that for you. Also, I just had a "sudden insight" (a night of sleep can give you that XD): Basilisk hacks are very sought because they can go straight to the brain (regardless of the ego being in a pod, synthmorph or biomorph), which means turning off the WIFI, using cables, etc... is not a safe option. And a Faraday cage offers some time, at best...
mark.felmo mark.felmo's picture
Its nice blog for us, it is a bunch of good info
Very interesting and useful blog. Thanks for share this information to others.Buying a [url=http://www.electrocomputerwarehouse.com/]refurbished laptops[/url] with durability and reliability is becoming more affordable. Can save big amount of money.i like this blog thanks for sharing.
Coleman Coleman's picture
Hi to all, guys, I'm a newbee
Hi to all, guys, I'm a newbee! I'm interested in the use of hacking in combat situations and I'd like to know the answers to some of duke rollo's questions.
Duke Rollo wrote:
If your team doesn't have a fork or infomorph devoted to the tactical network, does it count as an unmonitored system? Would I go up against the muse of one member of the group? Of all the muses of the group? If everyone on your team has a fork with an infosec skill, do I need to beat all of them? If I have admin rights, can I just kill your entire group instantly? (i.e. command vac suits to open in vaccums on biomorphs, command grenades to set their detonation countdown to less than a second and go off, command your gun to go off when it's pointed at a team member or thin outer wall, etc.) Can I kill you without admin rights? Can I get live information from your morph? See what you bastards see & hear what you hear? If you have slaved devices in the tactical network, can I hack those and control them? Can I make your team see things that aren't real? Like making an airlock look like an elevator? Can I create false communications? Can the one guy off alone by himself get trapped somewhere... and then the rest of your groups hears me saying in his voice "HOLY MULE censored! THEY HAVE A MECH! ABORT ABO*tzzzshssshhhhhtt*". Assuming I make it into your network, how do you get me out or deal with me? Can you just reboot the network and force me to rejoin it and thus start all over again?
Reading le rules i think the answers is "yes" to most questions but i'm not that sure. Thank you
NewtonPulsifer NewtonPulsifer's picture
A lot of equipment where
A lot of equipment where safety is an issue is going to have fail safes. That is, there will still be a pin or button on many grenades that needs to be pulled or pushed to engage it, and a vac suit will have to be unsealed by a button or latch, and the smartgun will still need its trigger pulled. Unwary or ignorant people may override these fail safes or buy poorly engineered equipment that doesn't even have them, but it is not likely to happen to professionals or organizations with procedures. Even things like airlocks would have failsafes, such that a manual override becomes necessary. For instance, if the airlock sensors detect a decompression would result from opening - they simply don't. This isn't a mesh hackable subsystem, as it is an override that exists off the network. So you still need to hack the maintenance bot to snip the sensor wire and pull the big red lever at the airlock. A networked control of the override system certainly might exist, but there's a good chance it would not be on the mesh. It would be on its own hard-wired network. You could certainly bridge that gap by installing your own hardware to tap that private sub-net. It may only give you access to that airlock, or all of them, depending on how paranoid the design was. Otherwise you'd need to physically tap the central control point to control them all.
"I fear all we have done is to awaken a sleeping giant and fill him with a terrible resolve."- Isoroku Yamamoto
Coleman Coleman's picture
Thanks a lot!!!!
Thanks a lot!!!!