Part 1: Happy Hour

load previous
Feb 21, 2020 11:11 am
SavageBob says:
OOC:
Sorry! I completely missed the last post by mcneils5.
"Damn," Zoey says. "Yeah, I could get it off with some tools, but I can't make any promises about alarms. Any tricks up your sleeve, Aditi?"
OOC:
Incidentally, I realize now that the release-versions of the pregen characters from FFG have different load outs of equipment. The con game version of Zoey has a utility belt and lock picks, but not the version released with the official version of the adventure. Note to self: Buy Zoey some tools at the first opportunity!
OOC:
No worries, seemed really quiet in general on the site over the last week or so so I just figured peeps were busy :)

Well you can always spend a Story Point and the credits to say Zoey previously picked a set of lock picks up so she'd have them to hand now and can add them permanently to her inventory
SavageBob says:
OOC:
Can Zoey try to hack the security system with her rig and Computers?
OOC:
Yeah that would be an option but again I'd be looking for a Story Point to say their is a convenient access point on this side of the door. If you did it that way it would be a Average Computers check to gain access to the back end system and then we'd run it as a Network Encounter. Up to you which way Zoey would proceed
Feb 21, 2020 5:51 pm
"Hold up—is that an access port? Let's see if I can get us in through the systems side of things."
OOC:
Tools cost 200 credits, so I'll have to save up for them. But, sure, let's hack the door. How does it work?
Feb 21, 2020 5:56 pm
OOC:
Start with that Average (two purple dice) Computers check.
Feb 21, 2020 6:09 pm
Zoey jacks her rig into the port and attempts to establish access.
OOC:
Took a boost for Zoey's presumed familiarity with these systems based on her former employment here. Ignore if unwarranted.

Rolls

Computers (Hacking)

4 Success, 1 Advantage, 2 Threat

Total: 4 Success, 1 Threat

Feb 24, 2020 1:25 pm
Zoey makes quick work of gaining access to the system but nearly trips the security protocols making her sweat a little (take 1 x Strain from the Threat). As she studies the door access system she rather unsurprisingly finds quite a simple setup with just two subsystems, the door control sub-system which is not protected and the intrusion alert sub-system which is protected by an ICE.
OOC:
Ok, you have successfully gained access to the system and can view the subsystems. You are currently at the top level of the system and can spend an incidental to move between the various sub-systems. Once you are in a sub-system you can spend perform an 'Enact Command' maneuvre which the specifics of which can vary depending on the sub-system. In the case of the door control sub-system you would use the maneuvre to open the door but if you don't do something about the intrusion alert system then you'll probably have to expect company real soon.

The other sub-system is protected by an ICE (Intrusion Countermeasures Electronics) and in order to access it you would need to move to that sub-system and 'encounter' the ICE, then you'd need to perform a 'Break ICE' action to get through. Each piece of ice has a program strength. To break the ice, the runner’s attempt must generate a strength that exceeds the strength of the ice they are targeting. To determine that strength, the runner makes an Average Computers check. If the check succeeds, their strength is equal to the number of Successes generated on the check. If you are using an ICEbreaker to help you you add the Strength of that to the number of successes you have rolled.

Zoe has a Crypsis ICEbreaker on her rig which is Strength 3 but is quite a slow and methodical program meaning if you use it to attempt when performing a 'Break ICE' action you also need to spend a Maneuvre, if you don't Cryptis becomes damaged by one step (same penalties apply to using it as normal for equipment damage).

The ICE on the intrusion alert sub-system is a simple ICE Wall Barrier ICE with a Strength of 5 so if Zoey uses Crypsis to try and break the ICE then she would need to get at least 3 successes on an Average Computers (Hacking) check (using the Break ICE Action).

Hope that's all clear, will try and put some more general notes in about the Network Encounter Rules later (they are quite indepth)
Feb 24, 2020 2:57 pm
"OK," Zoey tells the others. "I'm in. Let's see... OK nothing too tough. Let's see if we can't override this security system."
OOC:
So, sounds like an incidental to get to the security layer, then a maneuver to use the Crypsis. Then an action to use Computers (Hacking). Let's see if we can get the 3 extra successes we need.... Custom Code talent adds +1 advantage. Damn. Came up short. 2 Success, 1 Advantage. What does that mean?
Last edited February 24, 2020 2:57 pm

Rolls

Computers (Hacking)

3 Success, 2 Advantage, 1 Failure, 2 Threat

Total: 2 Success

Feb 24, 2020 3:08 pm
SavageBob says:
OOC:
So, sounds like an incidental to get to the security layer, then a maneuver to use the Crypsis. Then an action to use Computers (Hacking). Let's see if we can get the 3 extra successes we need.... Custom Code talent adds +1 advantage. Damn. Came up short. 2 Success, 1 Advantage. What does that mean?
OOC:
Slight clarification - it is an Incidental to move to the protected sub-system but it's just an action to try and break it, the extra Manoeuvre is simply to demonstrate taking time to avoid damaging the Crypsis ICEbreaker (other ICEbreakers would not need you to spend the manoeuvre).

In this case there's not a lot of risk, the ICE is pretty basic and you can keep trying to bypass it until you reach the required level of successes - sufficient Threat's could lead to you being detected though. In a more Structured encounter obviously you'd have wasted your turn and sitting hooked up to the terminal could leave you pretty vulnerable. Your next attempt you could use the Advantage from this roll for a Boost and remember you still have some Story Points if you want to use them
Feb 24, 2020 3:11 pm
Zoey curses in Spanish. "I'm out of practice with these things." She tries again to override the system, using a slight exploit she thinks she spotted.
OOC:
OK, so do the successes accumulate? Or is it 3 successes on a single roll? I just rolled again on the assumption it was the former, but if not, I'd like to try with a SP.
Last edited February 24, 2020 3:12 pm

Rolls

Computers (Hacking)

4 Success, 4 Advantage, 2 Failure, 1 Threat

Total: 2 Success, 3 Advantage

Feb 24, 2020 3:21 pm
SavageBob says:
Zoey curses in Spanish. "I'm out of practice with these things." She tries again to override the system, using a slight exploit she thinks she spotted.
OOC:
OK, so do the successes accumulate? Or is it 3 successes on a single roll? I just rolled again on the assumption it was the former, but if not, I'd like to try with a SP.
OOC:
Based on my look over the rules at the moment it appears not thought I could be wrong, will have another look through them all later to be sure for future runs. For now lets just say you can spend those 3 advantage to have found a vulnerability in the ICE and treat it's Strength as being 1 lower for this attempt so the 2 x Successes are sufficient
Zoey works on her rig quickly and efficiently and Mila and Aditi note that the red status light on the access pad flickers and switches to green before there is a satisfying click and the door opens in front of you all.
Feb 24, 2020 3:40 pm
OOC:
Cool, sounds good. I could see it either way; in combat you don't have to overcome the enemy's wound threshold in one single roll, for instance. But maybe this is more like crafting, where you accumulate boosts on previous attempts until you can finally overcome the thing.
Zoey puts the rig away. "Right behind you," she tells the others.
Feb 24, 2020 3:45 pm
"Nice work!" Mila says, clapping Zoey on the back before squeezing through the access hatch. "Jab me if I'm about to take a wrong turn."
Feb 24, 2020 3:54 pm
Aditi goes in after Mila. This feels very risky and possibly stupid but she's not going to play the scaredy-cat in front of her friends
Feb 25, 2020 2:43 pm
Mila takes the lead through the access corridors and Zoey closes and re-seals the door behind you all. After a short distance Zoey get's her bearings and quickly directs Zoey to the inside of another entrance where an increasingly twitchy looking Jane is standing waiting. As you come into view she jerks in surprise "How did you....never mind. I'm due on shift soon, lets find somewhere where we can look over what you've got". She turns and leads you a short distance into the building you are within and quickly take you into what appears to be a meeting room of some sort. Given the lack of people and covers over most of the furniture you guess this area isn't currently in use.
OOC:
I've created a subforum for rules discussions and clarifications and added a thread about Network Encounters (found some good resources online which cover things quite well)
Feb 25, 2020 3:08 pm
"It's been a minute, Jane," Zoey says with a smile. "We got a bit turned around getting over here." She takes out the rig (or pad?) with the code on it and shows Jane what they found. "Would you believe me if I told you a weird guy in an alley gave this to us? Because that's that happened."
Feb 29, 2020 9:33 pm
"Yeah," Mila says, "And there were some thugs who seemed to be looking for it, so we're a bit uneasy about what might have just dropped into our laps."
Mar 2, 2020 11:45 am
Jane looks somewhat dubious at the explanation of where the code came from but soon gets drawn into taking a look over it. After a few minutes she nods "Yeah. I can see the bits I wrote but this isn't something I worked on directly. Most of my code that's been used in there was taken from an algorithm I developed for prioritising Pod traffic on the Beanstalk but as for the rest of it I'm not sure". The more she looks over it the more worried she seems to get before she takes a step back from the screen. "Look, I'm really not sure what you've got here but it looks way over my pay grade. If you want to have a poke around and see if you can turn anything up then be my guest" she say's gesturing to a nearby wall plug "But you get caught then you're on your own". She moves to the door and glances back before she leaves "Be careful ok? This might be something you'd be best off forgetting you've seen"
OOC:
Zoey would know that details about most code developed internally within the SEA would be stored in a Program Archive and if she can get access to one then she should be able to pull up the details of what the program was developed for. She'll need to make an Average Computers (Hacking) check to gain access to the information storage data network and then an Easy Knowledge (The Net) check to find the right sub-systems within the huge SEA system (further check may be needed at that point if the subsystem is protected by an ICE). She can have a boost die on all her checks in here due to her familiarity with the SEA network
Mar 2, 2020 12:12 pm
"We made it this far", Aditi suggests nervously. "We should at least try to get more info out of the system while we're here."
Last edited March 2, 2020 12:12 pm
Mar 2, 2020 3:11 pm
"Definitely," Mila says, moving to a position next to the door. "You two work on getting what you can out of the system. I'll keep a look out."
Mar 2, 2020 4:57 pm
"Thanks, Janey," Zoey says as the woman leaves. "We'll be out of your hair in no time." As she prepares her rig to jack in, she tells the others, "Wish me luck."
OOC:
Net Search lets me upgrade the first knowledge check twice, along with upgrading the difficulty once. Let's use the advantages to maybe find a more vulnerable place to go next based on the knowledge Zoey finds?
Last edited March 2, 2020 4:59 pm

Rolls

Computers (Hacking)

2 Success, 4 Advantage, 4 Threat

Total: 2 Success

Knowledge (The Net) with Net Search talent

3 Success, 3 Advantage, 1 Failure, 1 Threat

Total: 2 Success, 2 Advantage

Mar 5, 2020 9:47 pm
As Zoey jacks in the SEA network opens up before her. Quickly calling up a query she locates the information storage archive and moves into the relevant subnet. She finds 3 subsystems in the archive: the Program Archive, the Petty Cash Account Database, and the Visitor Registration Subsystem - all of them are protected by separate ICE.
OOC:
Zoey can either use the Advantages to get some details about the various ICE on the subsystems before she moves to encounter them or she can keep them for floating boosts.
As Zoe is absorbed in her work Mila and Aditi keep a watch out, for now everything seems very quiet.
load next

You do not have permission to post in this thread.