NEWS

101 decker shadowrunning SOPs

  • 8 Replies
  • 5974 Views

DigitalZombie

  • *
  • Omae
  • ***
  • Posts: 744
« on: <12-01-14/1601:49> »
Ive created some standard operation procedures (SOP) primarily for deckers in shadowrunner teams.
The SOP will be abbreviated to COMMLINKS hopefully making it easier for the decker to remember. Its meant to be a checklist for the decker, both before a run in the preparation phase, during a run in the surveillance phase and in the matrix combat phase and finally post encounter.
Im looking for feedback to expand and improve the COMMLINKS and of course to see if Ive understood the rules correctly

COnnection = What grid to operate on?
Mode = public, silent or offline mode?
Marks = marks on team members to assist them
Liason = share data and protect files
INtelligence = gather intel
Kill = destroy/control hostile matrix devices
Secure = secure/delete/manipulate data



Preparation phase

Default Deck setting= high firewall, encryption, configurator, sneak, blackout etc.

COnnection
Public, local or global grid
Decision on grid should be influenced by location and type of run, the barrens, EVO domain etc. Using brute force or hack on the fly to jump to other grids will risk accumulating overwatch score. Instruct and check team members CO .
Public grid: available to all. Imposes a -2 matrix action penalty due to lag, including hostile attacks against the persona/devices/files.
Local grid: requires a Bruteforce: Logic+cybercombat[attack] vs 4 dice or hack on the fly: Logic+hacking[sleaze] vs 4 dice to jump too. Or middle lifestyle to legally jump to.
Global grid: Each of the 10 megas have their own global grid. requires a Bruteforce Logic+cybercombat[attack] vs 6 dice or hack on the fly Logic+hacking[sleaze] vs 6 dice to jump too. Or high lifestyle to legally jump to one specific global grid. And luxury lifestyle to jump to any one of them.

Mode
Public, hidden or offline
Decision on whether to run in public mode, silent mode or offline, and when to change mode type depends on the type and location of the run. Instruct and check team members M
Public: Icons are visible to all, this is required in some areas. Requires a successful matrix perception test: intuition+computer[data processing] vs Logic+sleaze to detect public icons outside 100 meters.
Hidden: Icon is hidden from normal view. Requires a successful matrix perception test: intuition+computer[data processing] vs Logic+sleaze to detect hidden icon. Hidden icons suffer a -2 penalty on matrix actions.
Offline: device is not on the grid and cant be detected by matrix perception tests.


Marks
Get mark invites from team mates (legally as to not get overwatch score) no test required.
0 marks =  matrix perception tests to detect enemy marks and matrix damage
1 mark =  free actions(control device), edit file
2 marks = simple actions (control device), trace icon
3 marks =standard/complex actions (control device), erase marks, jumped into rigged device (requires control rig)

More marks grants more options. Decide whether team members should give each other M



Liaison
share video/trideo/simsense feeds, biomonitor data, etc with all members, secure files not often used, including team members.

Coordinating the level of information flow is essential, too much and the characters will suffer distraction modifiers. Too little and the characters will miss important information or auto injector/drone options. Decide whether or not the team should have a spoofing secure line of communication (coverterms, offline microtransceivers, manifesting mages etc) in case of a compromised net

Edit file to set protection on non-active files: logic+computer[data processing] successes  equals the protection rating, or alternatively have sensitive data stored offline in datachips.


Surveillance phase
Default deck setting= data-processing with toolbox and/or agent or sleaze with exploit, babymonitor, stealth, track

INtelligence
matrix perception tests on team members to spot hostile marks. Intuition+computer[data processing]
Matrix perception tests to spot public and hidden personas, devices and hosts. Intuition+computer[data processing] vs logic+sleaze against hidden devices and public devices outside 100 meters.
Further actions starts overwatch and a time limit to either reboot or move on to Kill or Secure phase
Hack on the fly to obtain marks (starts overwatch and can be detected) Hack on the fly: Logic+hacking[sleaze] vs intuition+firewall
1 mark= snoop, marked target cant hide
2 marks= trace icon
3 marks= set-up for dataspike in combat phase

Continuous perception tests both targeting own self/team and surrounding area, using an agent would free up hacker actions. In depth surveillance requires hack on the fly, this triggers the overwatch score.



Combat phase
Default deck setting= attack with decryption, hammer, mugger (if many marks), high firewall with defensive programs.

Kill
0 marks =brute force or hack on the fly to obtain marks, data spike, jam signals, erase marks (requires 3 marks on marked device/persona)
1 mark = free actions (control device), edit file, crack file, crash program, spoof command.
2 marks = simple actions (control device)
3 marks = standard/complex actions(control device), format device, jump into rigged device (requires control rig), reboot device.

Most actions increases overwatch score and are easily detectable.

Brute force: logic+cybercombat[attack] vs Willpower+firewall
Hack on the fly: Logic+hacking[sleaze] vs intuition+firewall
Data spike: logic + cybercombat[attack] vs intuition +firewall
Data spike damage: attack rating + net hits on data spike attack+ 2 for each mark on target (+3 instead if mugger program is runnnig)+ 2 hammer VS device rating+firewall


Secure data
Deck default setting: high firewall and defuse program when disarming databombs. high attack rating when cracking files.

Secure enemy commlinks/decks and other essential matrix active devices, including recording devices in the area. Physical search for offline data storage devices.

Matrix perception test to detect icons, databombs unknown marks: Intuition+computer[data processing] (vs logic+sleaze if hidden)
Disarm data bomb: software+intuition[firewall] vs databomb rating*2 (does not cause overwatch)
Crack file: logic+hacking[attack] vs protection rating*2
Edit file to copy/delete/manipulate data/files: logic+computer [data processing] vs intuition+firewall





« Last Edit: <12-05-14/0453:24> by DigitalZombie »

TormDK

  • *
  • Chummer
  • **
  • Posts: 121
« Reply #1 on: <12-02-14/0228:45> »
I would very much like to see a readup on the "Lewtz!" phase of hacking captured comlinks.

Xenon

  • *
  • Prime Runner
  • *****
  • Posts: 6468
« Reply #2 on: <12-02-14/0259:14> »
COnnection
Grids only defend with 4 or 6 dice so Deckers should have no problems using Grid Hop.
Technomancers should probably always use Transcendent Grid.

Using public grid as some sort of matrix protection is mostly viable to non-deckers.
...just remember that public grid also give you a negative dice pool modifier to non-deckers when they try to protect their SR5 File Icons, Searching the Matrix and using Matrix Perception etc.


Marks
If your team-mates trust their hacker, then there is no downside of giving him or her 3 marks on all devices.

If you really trust your decker then you should grant your decker ownership of your devices....

In order for a hostile decker to use Spoof he need one mark on the owner of the device, not on a decker that have been invited to take 1-3 marks on the owners devices.


Liaison
Each individual team-mate choose what feeds he want to view and what information to filter away.
So from that perspective you might as well share everything with everyone in your team.

But if a hostile hacker snoop you, then he can intercept all the traffic sent both to and from you.
(he would get all the feeds from your entire team with just one single mark and one single successful Snoop).


INtelligence
If you slave a device to your cyberdeck then a hostile hacker will get a mark on your cyberdeck when he get a mark on the device. Checking your cyberdeck for marks will alert you if a hostile decker have placed a mark on any of the slaved devices. Checking your cyberdeck just to realize that there is still no hostile marks on it will get boring quickly. Most hackers would probably automate this in some way (I know I would... for SR5 that would probably mean the use of an Agent).

If you Spot an Icon (that you have 0 Marks on) then it will be visible to you until it successfully use Hide or Reboot. You will still Spot it even if it goes into Silent Running. No need to bend the matrix to get a Mark on the Icon just to keep seeing it. If you have at least 1 Mark on the Icon then it can't even Hide from you (Hide is a Sleaze action so this would only be an issue with Living Personas and Personas formed on a Cyberdeck).

Technomancers that have access to the Cleaner complex form dominate the intelligence side as she can stay on-line vastly longer than a decker can ever dream of. Repeat threading low ranks of Cleaner is a great tactic for gaining multiple Marks on multiple Icons, Trace multiple Icons, Snoop multiple Icons and use multiple Cookie Sprites. A Technomancer can make them all last for many many hours before she is forced to reboot.

Reboot device only work on Devices that does not have a Persona formed on them.
Does not work on Sprites, Agents, commlinks/RCC/cyberdecks where someone formed his or her Persona on, Living Personas, IC, Vehicles where a rigger formed his persona directly on the vehicle rather than his RCC etc.
« Last Edit: <12-02-14/0304:16> by Xenon »

Xenon

  • *
  • Prime Runner
  • *****
  • Posts: 6468
« Reply #3 on: <12-02-14/0323:55> »
I would very much like to see a readup on the "Lewtz!" phase of hacking captured comlinks.
Matrix Perception to spot any SR5 File Icons it may carrying
(Computer action, no need to bend the matrix. Target will not notice that you are looking for his SR5 File Icons).


Matrix Perception to check if the SR5 File Icon is Protected, if it have a Data Bomb and Rating of Protection and Bomb.
(Computer action, no need to bend the matrix).


Disarm Data Bomb if you spotted a Data Bomb
(Firewall action, no need to bend the matrix. Bomb goes off if you fail. Don't fail)


Hack on the Fly to place a Mark on the File you want to steal
(This is an illegal Sleaze action. The owner will not notice you as long as you don't fail. Don't fail)


Crack File if the SR5 File Icon is Protected (paydata always is).
(This is an illegal Attack action! Once you successfully crack the protection the owner will know!)

The owner can react in a number of different ways:
- Owner can turn wireless Off as a Free action.
- Owner can go into Full Matrix Defense as an Interrupt Action.
- Owner can place a  new Protection on the SR5 File Icon.
- If owner is a hacker he can Set Data Bomb on the SR5 File Icon that was just cracked...
- Owner can use Matrix Perception to try Spotting the attacking Icon (you).
(you better run silent before cracking...)


Edit File to copy the SR5 File Icon
(This is a Data Processing action. No need to bend the matrix for this).




You don't need to be physically close to the commlink in order to do any of the above.
Remember penalties for being on different Grids, Public Grid, Running Silent, Noise due to distance and other noise modifiers...
« Last Edit: <12-02-14/0330:28> by Xenon »

Lucean

  • *
  • Ace Runner
  • ****
  • Posts: 1159
« Reply #4 on: <12-03-14/0143:13> »
The owner can react in a number of different ways:
- Owner can turn wireless Off as a Free action.
- Owner can go into Full Matrix Defense as an Interrupt Action.
- Owner can place a  new Protection on the SR5 File Icon.
- If owner is a hacker he can Set Data Bomb on the SR5 File Icon that was just cracked...
- Owner can use Matrix Perception to try Spotting the attacking Icon (you).
(you better run silent before cracking...)
The problem here is the timing.
Quote
If you succeed with an Attack action, your target becomes aware that it is under attack by another icon, but it doesn’t automatically spot you.
Are you supposed to do a surprise test? Does surprise even work in the matrix?
How do you prevent the enemy from just rebooting the device and trying to cause you Dumpshock damage?

It somehow seems very hard to succeed when you have to deal with protected files. Edit needs a complex action. Leaving the host would be another complex action and switching interface with jacking out takes two simple actions.

Do your deckers crack the protection in cold sim to lessen the impact of possible dumpshock or do you give them some time to go on before dropping the hammer?

DigitalZombie

  • *
  • Omae
  • ***
  • Posts: 744
« Reply #5 on: <12-03-14/0333:51> »
@TormDK I will include a Strip data section at the end, thank you

@Xenon thanks for your view on the matter.... I hadnt noticed that spoof could only spoof the owner. Which I find kinda odd, I mean if the troll hacker with 3 marks on the riggers drone could order the drone to fire its weapons, why cant an enemy hacker spoof the trolls deck and make the drone attack the party? but oh well, makes spoof less dangerous for the party I guess.

the COMLINK SOP isnt meant to give a definitive answer to the hacker, its meant like a checklist the hacker should go through before, during and after a run. As he is the matrix specialist any matrix f%¤ ups will come back and haunt him, even when the primitive NAN adept forgot to turn of his AZTEC RFID on his underwear inside a Horizon facility. Thats why the hacker need to go through the CO part not only for himself but for the whole team. And if need be instruct the high lifestyle elven face to switch to the less fancy public grid etc.

Its also about making a conscious choice on when the hacker can choose to go on to the active part on INtelligence and begin acquiring Marks and overwatch score, too soon and he would need to reboot before the party is ready to strike, too late and he wouldnt have enough marks/intelligence on the enemy team to be 100% effective.

About the Liaison part: the GM may impose a -2 distraction modifier on physical actions, if the character is too focussed on the AR part. And I would believe having 5 biomonitors, 5 full sensory AR input from simrigs, 12 drones sensor feeds, 5 smartlink gun cam feeds, etc open in a gunfight would qualify :)
Not to mention that the team should have a mode of communication that would not run one way or the other through the matrix ( if the hacker finds out that the enemy hacker has placed a mark on him and is snooping everything, it would be nice to have a password he could say to get the team mage to go astral and inform everyone that they are being snooped) That way the party could play along for a while until they would be ready to strike and then reboot everything for instance.


Question: at what point would a hacker feel the need to hack into the public grid? couldnt he just jump to the grid without a hack on the fly/brute force test?

Herr Brackhaus

  • *
  • Prime Runner
  • *****
  • Posts: 3041
« Reply #6 on: <12-03-14/0716:15> »
Lucean
The decker wouldn't suffer dumpshock unless his own deck were to be rebooted. Having a MARK on a device that gets rebooted won't dump you from the Matrix.

DigitalZombie
Nice work!

About the Liaison part and distractions; I'm with Xenon on this, in that the Decker could freely share all of the information, with each character deciding what is "critical enough" information to keep open, so to speak. Instead of having all of the inputs you mentioned open, perhaps the character (or decker, if the others aren't tech savvy) could program the biomonitor feeds to pop up under certain conditions (flatlining heart rhythm/tachycardia, (extreme) spike in heartrate, etc), or have a single window cycling through simrig feeds, and so on and so forth. I completely agree that information overload is a very real possibility, but I also think that characters (not players) who are used to this kind of tech can be reliably expected to have found a working compromise where HUD technology is concerned.

The public grid is always available as far as I know; the opposed dice pools given for hacking into grids are 4d6 for the local grid and 6d6 for any global grid, so he should indeed be able to just jump onto the public grid without issue.


EDIT
Re. spoofing; that brings up an interesting point. How do you spoof a device whose owner is not currently online?

For example; Sammy the Samurai is the owner of an Ares Predator (complete with smartgun system) which is currently connected to the Emerald City Local Grid,  as well as an implanted Smartlink that is also connected to the Emerald City Local Grid.

Is it possible for both of these devices to even be online if Sammy the Samurai has not currently formed an online Persona through his Hermes Ikon commlink? If yes, then does Sammy have to register ownership of his devices to a specific Device? Because if not, then the best defense against spoofing is just to have a bunch of devices owned by someone who is not online, since it would be impossible to MARK said owner.

My guess is that the "primary" device of Sammy the Samurai's PAN would be the "owner" of the other devices in this case.
« Last Edit: <12-03-14/0723:21> by Herr Brackhaus »

DigitalZombie

  • *
  • Omae
  • ***
  • Posts: 744
« Reply #7 on: <12-03-14/1647:45> »
Ive updated the original topic: its now called COMMLINKS. I will add in dice pools later I think

Yeah Spoofing seems a bit odd, because a gun will take orders from anyone with marks on it, or the owner itself. Yet spoof cant give it orders if it emulates a device with several marks (legitimate or otherwise) if its not the owner. And yeah the owner could technically be offline, meaning you cant get marks on him, yet any other device with marks on the gun could send data to the gun and control it.  :o

The public grid is always available as far as I know; the opposed dice pools given for hacking into grids are 4d6 for the local grid and 6d6 for any global grid, so he should indeed be able to just jump onto the public grid without issue.
Doh! got public and local grid mixed up :)

About the Liaison part. When going through the COMMLINK checklist the hacker (and all the players and the GM at the table) should agree on what is shared and what isnt. This is mostly to avoid situations like= GM:  you try to contact the B&E troll in the secure facility, but he doesnt answer  Player: oh damn... eh can we see his biomonitor readouts? is he hurt?  GM to B&E player: is your biomonitor online and have you shared it with the rest of the team? B&E player: uuhh hmm I dunno...I thought it was best to break in completely offline, no?
Hacker player: what? I thought you were online? so now I cant trace him either? wouldnt I have noticed that before he went in?

Or another example: The rigger is using some surveillance drones to scan a large crowd, he is looking for a foxy elven courier, when suddenly a large troll is seen by one of the drones, but only the team mage knows and recognises that troll, and knows him as a nasty fleshform roach spirit .... should the GM presume the rigger is sharing everything automatically, and thus inform the mage with a note? What if the rigger knows the troll as a contact willing to give him some money ( which he doesnt intend to share with the rest of the party) in that case the rigger would feel cheated if the mage suddenly blows it all, because the rigger didnt openly tell the others at the table that he was sharing the video feeds of his drones to them. Thats what Liaison is about, to make a proactive choice on information sharing. And not a reactive one based on hindsight and opportunism.
« Last Edit: <12-03-14/1650:23> by DigitalZombie »

Xenon

  • *
  • Prime Runner
  • *****
  • Posts: 6468
« Reply #8 on: <12-07-14/0828:56> »
How do you prevent the enemy from just rebooting the device and trying to cause you Dumpshock damage?
In SR5 you never "enter node".
Rebooting device will not cause dump shock to the hacker (unless he is also a rigger and the device is a drone or a vehicle with a rigger interface and the hacker actually jumped into it).


the GM may impose a -2 distraction modifier on physical actions
Not infront of books atm, but pretty sure you only get -2 on meat world perception tests.
Not physical actions.
While hacking in AR you are free to switch between hacking and shooting as you see fit.


at what point would a hacker feel the need to hack into the public grid? couldnt he just jump to the grid without a hack on the fly/brute force test?
Never. He can just change to the public grid if he want to.