Well i thought about how different Buildings could be secured. Useful for GMs. Using only Stuff from 6th Edition Core Book. Written for a dystopic world ^^
Example 1:
A supermarket in a suburb. Mixed Population between Low and Squatter Lifestyle.
The supermarket uses a Host level 1 (which provides Firewall 4, Data Processing 3 to Devices)
Under normal circumstances the supermarket has no Security Devices at all.
The supermarket is protected by a PR1 gang. For this service they become protection money. They may or may not show up if an Employee calls them. How many of them come may vary, but probably they all come together.
The local Police does not care what happens to the supermarket. One exception being corpses start dropping in the dozens. This would mean bad publicity. In this case after an unknown time span PR5 Swat Teams arrive.
Matrix Security
A host can launch one IC program per combat round, at the beginning of the turn, and can have up to its rating in IC programs running at once. Hosts may only run one
copy of each type of IC. You can read that on the pages 186 and further.
White Ice (Patrol) per Default (note: when a Player Hacker has used for example Probe/Backdoor entry there is no reason for the IC to see the Hacker as intruder as long as he does legal actions nothing happens, I C means Intruder Countermeasures, no Intruder, no Measure.
Robotic security:
If the supermarket owner is very security affine he might have set up a Smart firing platform (SR 6th Core Rules p.260) behind the door with a licensed AK97. The Smart firing platform is instructed to shoot on everything bigger than a rat when in „night time mode“.
The Smart firing platform is slaved to the Host.
Magic Security:
Non
Mundane Security:
Non or a huge Gang (PR1)
Entrances/Exits:
One huge Door in Front.Structure Rating 5 (lowest as p.240 suggests) Secure with a Maglock Rating 2, which is slaved to the Host making it double vulnerable. Can be hacked via Matrix or be opened with Sequencer/similar tools. The walls are made of brick and have Structure Rating 12.
Response teams:
It depends, when the Group made a massacre the response team goes in for kill. If its unclear who made the mess(corpses) the response team wants to take everybody into custody and if the Group is captured their Fake SINs hold and they can go after 24 hours. (if Fake SIN doesnt hold would basically be a game over ...)
Default Team has explosive Ammunition loaded, i wouldnt change much.
2x3 Swat Officers PR5 fighting as Grunt Group (split them if you want them to win)
2x Mages PR5
1x Rigger PR3 with buffed Stats driving their Car, Rigger uses a Deck Device Rating like PR so 5. He is the Hacker and Driver.
They come in a Range Rover Model 2080 (and they are not in a hurry)
If they have casualties they call in the super heavy cavalry - the Runner team should at least then start retreating.
SHC being PR7 Team - similar from the Member specialities like the other team - coming in hot with a GMC Banshee (1000 km/h)
Example 2:
An office building in an industrial area.
The building uses a Rating 3 Host. There is only one entrance. The entrance is supervised by a single wireless camera. Close to the camera - but hidden - is a GM Nissan-Doberman Drone (p.302) equipped with a licensed AK97.
Drone and Camera are slaved to a Rigger (PR3). That Rigger supervises half a dozen Buildings at the same time. If he notices someone trying to break in he will use the Doberman Drone to slow them down and call in help. Depending on what he reports PR5 Swat Teams will arrive shortly (5 min - 45 min depending how lucky he is)
If he encouters something that seems magical he can call in a collegue that is an astrally active Mage coming by Astral Projection able to conjure Force 4 Spirits. (PR3ish Mage, no stats in the book, reduce the one from PR5 Mage)
Matrix Security
p. 185Host Security and Architecture
A host can launch one IC program per combat round, at the beginning of the turn, and can have up to its rating in IC programs running at once. Hosts may only run one
copy of each type of IC. You can read that on the pages 186 and further.
The Host calls Sparky and Killer IC if in alarm mode. Default is Partol IC which just searches for illegal actions. (p.186 ff). The security Hackers are generaly adviced to preserve life for publicity reasons. The Security Rigger use Decks instead of RCC with Device Rating equal to their PR.
The Building Security Host is separate from Hosts containing Data and can be directly accesses from anywhere in the world, this allows the security Rigger to log in from far away they suffer from 5Noise for Distance but they reduce that to 3 using SignalScrubber program. (like in the Matrix chapter important stuff is under many layers of Hosts so you have to get direct access.)
Robotic security:
Doberman Drone; Both the Doberman Drone have only Camera and Sound no fancy Sensors; The Doberman Drone has regular Ammo loaded but he can switch to "Gel" doing Stun damage instead.
Magic Security:
1 mage by Astral Projection, only when called
Mundane Security:
Non
Entrances/Exits:
has only one Entrance. (single entrance could be a secure staircase, meaning the building has a kind of "tower" attached to it which works as a fire/smoke free area) The Runners can only sneak in through the single Entrance or force their way in trough windows or walls. Windows have Structure Rating 9 (as p.240 suggests) the Walls are made of Brick Rating 12. Windows and Brick wall contain inside wires that are connected to the Host. When you cut the Wires by Force that informs the Host. (P.241 A wire ....)
Then - when informed - the Rigger will Jump into the Doberman Drone and go looking.
The walls are made of brick and have Structure Rating 12.
Optional: In case you want to include Fire Exits the building has several Fire Exits but you can only open them from the inside. There is no lock on the outside. From the inside they can be opened without a roll. Their Structure Rating is 11 (same as the Windows in case you use lower Structure Rating).
"best" way in
a) legwork allows finding out that the Rigger has 5 other Buildings to watch. Group produces distractions at the other buildings and then just walks in the one they need.
b) Group Hacker takes Over the Host and stops the Alarm from reaching the Rigger and the Runners simply destroy a Window.
c) weak spots designed for the group to be found and tailored to their specialties
Response teams
Either 2 PR3 Security Officers arrive at first using a car. They are checking whats going on. They were called by someone - for example a pedestrian seeing something suspicious going on.
If something messy happens the same team like in example 1 (see above) arrives, just faster they will need between 5 minutes and 45 minutes to arrive.
Example 3:
A mildy important Corporation building.
The building uses a Rating 3 host, there are several Entrances all secured by Cameras. Every floor of the building is secured by one Steel Lynx Drone (p.302) equipped with a licensed RPK HPG = Heavy Machine Gun (or when there are many floors the Steel Lynxes can use an Elevator and there are never more than 3 for a moderate sized building)
each Steel Lynx is controlled by a Rigger (PR3) each Rigger is only responsible for 3 buildings max (so less distraction than in example 2).
The building has several Meeting rooms that are warded by Force 8 Astral Wards. Those are active for several weeks - until they are refreshed.
If the Rigger(s) encounter(s) trouble he/they might call in a PR5 Mage (using Astral Projection) who is able to summon Force 5 Spirits.
Matrix Security
Host Security and Architecture
A host can launch one IC program per combat round, at the beginning of the turn, and can have up to its rating in IC programs running at once. Hosts may only run one
copy of each type of IC. You can read that on the pages 186 and further.
The Host calls Sparky and Killer IC if its in Alarm mode. Default is Partol IC which just searches for illegal actions. (p.186 ff). The security Hackers are generaly adviced to preserve life for publicity reasons. The Security Rigger use Decks instead of RCC with Device Rating equal to their PR.
The Building Security Host is separate from Hosts containing Data and can be directly accesses from anywhere in the world, this allows the security Rigger to log in from far away they suffer from 3 Noise for Distance but they reduce that to 1 using SignalScrubber program. (like in the Matrix chapter important stuff is under many layers of Hosts so you have to get direct access.)
Robotic security:
Steel Lynx (up to 3); Both the Steel Lynx Drone and Cameras have only Cameras and Sound no fancy Sensors. The Steel Lynxes have regular Ammo loaded but he can switch to "Gel" doing Stun damage instead. Deeper inside the Building (2 rooms away from outside wall) there are Jammers Rating 6 active, they exlude anyone who registers his Device at the Host as "legal".
Magic Security:
1 mage by Astral Projection, only when called or when a ward informs him (but the meeting rooms are just that: meeting rooms)
Mundane Security:
5 PR3 Patrolman are in the Building.
Exits/Entrances
it has many Entrances but all of them are equally secure. (equally secure in a sense that they all have the same Ratings) The Windows are Rating 11. This means all Doors have at least Rating 11 too. The building has several Fire Exits but you can only open them from the inside. There is no lock on the outside. From the inside they can be opened without a roll. Their Structure Rating is 11 (same as the Windows in case you use lower Structure Rating).
The walls are made of brick and have Structure Rating 12.
"best" way in
a) legwork allows finding out that the Rigger has 3 other Buildings to watch. Group produces distractions at the other buildings and then just walks in the one they need.
b) Group Hacker takes Over the Host and stops the Alarm from reaching the Rigger and the Runners simply destroy a Window.
c) weak spots designed for the group to be found and tailored to their specialties
Response teams
If informed the same team as in example 1 (see above) arrives, just a lot faster.
Example 4
A Corporation Blacksite building. Containing very dirty research and production of insanely dangerous products.
Matrix Security
The building uses a Rating 6 host. But that entire host is just fake. Basically it is a dummy that does not control anything in the building,
Group Hacker should find that out after a while or just knows it when he knows that its a Blacksite
Host Security and Architecture
A host can launch one IC program per combat round, at the beginning of the turn, and can have up to its rating in IC programs running at once. Hosts may only run one
copy of each type of IC. You can read that on the pages 186 and further.
Inside the building is a second Host Rating 9 that can be accessed at several workplaces deep inside the building. Its buried as deep as possible under other Hosts so almost impossible to be accessed from outside. As long as he seems to be a legitimate User the Host lets the Runner Hacker change stuff like as if he were a Researcher. Default login is "User Access" if you log in from one of the Workplaces inside. (if that works is unclear rulewise, so adapt for your table of necessary!)
Once alarmed the Host calls in Tar Baby, Black IC and then Killer in that order.
Inside the Building are at all times 2 Hackers PR 9 . 12 Hackers are employed to rotate shifts every 4 hours. One of them is logged in the Host, one is watching the Entrance.
Robotic security:
Every floor of the building is secured by 2 Steel Lynx Drones (p.302) equipped with RPK HPG = Heavy Machine Gun loaded with Explosive Rounds. The Drones are set on autonomous mode, they recharge once every 3 days and can only be reprogrammed then. During this maintenance the Drones can be loaded with additional facical recognition patterns. When someone is not known to the drone it starts shooting to kill. There are Jammers Rating 6 active everywhere in the building
Magic Security:
1 Mage sitting in the front Lobby. He has PR 9 (increase stats of the PR5 Mage) . The BlackSite employs altogether 6 Mages that rotate 4 hours shifts at the Entrance.
Mundane Security:
2 PR 9 at the Entrance at all Time in 4 hour shifts. The BlackSite employs altogether 12 PR9 Mercenary types that rotate 4 hours shifts at the Entrance.
Exits/Entrances
It has only 1 Entrance, the whole building is a Faraday cage (except entrance area) so its very hard to get even a microdrone in (would need a cable as antenna to get a signal in) The single Entrance is long and wide secured with everything in the book sensor wise all Rating 8 (max possible rating p.277).
The whole building is covered with algae containing tubes from the inside blocking Astral Access. The Entrance is warded with an Astral Ward Force 12 set up by the 6 security mages together they refresh it after a few weeks.
The outside walls of the Building have Structure rating 19 (reinforced concrete) and are 3 meters thick, so need a lot of explosives to get trough. The Door has Structure rating 16, there are no windows.
"best" way in
a) blackmailing the mage (hacker might work too) on security duty, kidnap relatives or whatever. Use Physical Mask inside to avoid getting attacked by Steel Lynxes.
b) block the call for help by cutting the landline (Cutting the landline means you need to spoof a signal there every combat round to fake that everything is just fine. Since by cutting it the alarm would go off. ) and jamming the Security Hackers Deck, he has DR6 and Signal Scruber thus need 9 Noise from Electronic Warfare to disable him. (When the defending Hacker uses the "Signal Scream" 2 Edge Action need to spoof his Call to prevent him getting out. PR9 means the Defenders have 9 Edge together.)
And the mage will try to astrally project to call help, so kill him too.
c) be creative ^^
Response teams
Attacking with guns blazing, pink mohawk style is - insane - but possible. Since its a Blacksite the Corporation cannot send their full force.
Once the Defense Team gets call for help out all employees that are not on site are called in. Only half of the Mundane Team is ready the others are spread over the globe and wont arrive in time for participating in any combat. They will just look for other Jobs once they discover the Blacksite is compromised.
The 5 Mages all come in by astral projecting together with Spirits (each one with three Force 9)
The 10 remaining Hackers come in remotely by RCC launching Ares Black Sky Drones from 6 hatches in the Roof (only access to the Drone Hangar there) They use RCC DR 6 and each hacker can control Data Processing *3 Ares Black Sky drones while using RCC. The building contains 60 of those Drones, all equipped with different deadly weapons from the book, each Hacker controls 6 Drones remotely.
After 5 minutes the 4 Mundane Security arrive from inside the Site, they need time to equip their gear and were sleeping.
Once or rather if the Runner team beats them the site is defeated and nothing more will come for several days.