So you only need one mark on the host (or slaved device) to be able to enter, right?
They do have a social engineering option to fall back on if the host camera-hacking fails.
Anyhoo see below for Coyote's entry for regular border hosts.
It says Killer IC is loaded and running at all times, so the host always has Killer IC on patrol?
If so then it would make sense that at least one of those Patrol IC is running at all times, but the text says nothing about this...oddly....
I think I'm going to change it up and have one copy of Patrol IC running and if it notices anything it will summon a Track IC and then Killer IC in that order.
Sound good?
Device Rating: 8
Default Ratings: Attack 10, Data Processing 9, Sleaze 8, Firewall 10
Running Programs: Rating 6 Agent (see below), 3 copies of Patrol IC, 1 copy of Track IC, 1 copy of Killer IC
The agent is responsible for collecting the information of anyone who wishes to pass by the border and forwarding that information to a processing center at head of office. As with other borders, the host offers a mark to any device that is not running silent. The agent approaches every avatar that enters the host, as well as every AR device that accesses the host, and asks each device for a SIN and a visa. It then collects the information and transmits it in encrypted format to the head office, where the SIN and visa are checked. The results of the check are sent back to the agent, which then allows valid visitors to progress by opening gates and ordering the emplacements not to fire. Separate messages are also sent to any magical or physical security present.
Note that it is possible to spoof the agent to open the gates, though this will be almost immediately noticed by the head office, and appropriate steps taken. Not to mention the physical and magical security will not have received the “all clear” signal.
Normal border hosts are more aggressive than easy and very easy borders, with Killer IC loaded and running at all times. Track IC is usually used in tandem with Killer IC, so that security can attempt to find the physical location of any hackers and bring them into custody—or at least ensure they are not on their side of the border. When security notices any evidence of hacking, that evidence will be sent back to the head office for analysis. This analysis can give GOD and any Matrix detectives a bonus to track or recognize any hackers who have been involved in the hack. To determine if the security forces learn anything, make a Logic (7) + Software (9) (Data Processing) Test opposed individually by the Intuition + Hacking (Sleaze) of any hackers involved in the breach. Net successes for security on this test subtract from the Sleaze attribute of hackers for any tests on the host. As with any information, this evidence degrades over time, at a rate of one net success per 24 hours until the signature is obsolete. Alternately, hackers can get rid of the penalty by logging out of the host and staying out for three hours.