20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Matrix overview . . . . . . . . . . . . . . . . . . . . . . . . . . . .<br />

30<br />

who cater to special interest groups have to really watch their toes<br />

now, because too many votes against their constituencies’ wishes<br />

means they won’t get re-elected. Or worse yet, the scandal will get<br />

them shunned by the rest of Congress … and the special interest<br />

group nuyen will all dry up.<br />

> Kay St. Irregular<br />

Voting, at least in the UCAS, is done via encrypted transmissions<br />

of an individual’s votes within a voting “window”—generally<br />

a week long period that the virtual voting booths are open. Other<br />

governments that rely on a voting system follow similar structures,<br />

although the time required to transmit and count the votes varies.<br />

Generally speaking, though, to register to vote you need a SIN<br />

and a certified electronic address. Some governments, more security<br />

conscious than the UCAS, send voters a biometrically keyed<br />

encrypted ballot. It requires that the voter provide biometric<br />

verification, such as a thumb print or retinal scan in order to fill<br />

it out. In the UCAS, the system is pretty much that each ballot is<br />

provided with an encryption system for when it is returned via the<br />

wireless Matrix. Voters are required to sign electronically that they<br />

did, in fact, fill out the ballot themselves. How’s that for trust?<br />

> And remember, in the UCAS, it’s One SIN, One Vote. That means<br />

if you buy multiple SINs, you get multiple votes. Now go out there<br />

and do your civic duty.<br />

> Snopes<br />

> It seems like it’d be easy to rig an election just by hacking voters’<br />

commlinks, or intercepting the wireless transmissions, decrypting<br />

them, and editing the votes as you’d like. However, the system actually<br />

works pretty well (for that part, at least). Since every citizen<br />

sends their votes in individually during a week-long voting window,<br />

the votes come trickling in during the entire Election Week. To make<br />

a measurable difference in the results, you’d have to hack tens of<br />

thousands of commlinks (hoping they hadn’t already mailed the<br />

vote) or attempt to intercept the transmissions—easy for maybe<br />

a handful, but hard to coordinate large scale. If you want to screw<br />

with elections, you have to do it at the vote-tally office and ever<br />

since the California Magestone debacle, UCAS keeps their voting<br />

results ICier than Antarctica. It’d be possible to screw with a minor<br />

election, or even a major one with enough nuyen and backing, but<br />

it’d be easier—and cheaper—to just hire a PR firm like Charisma<br />

Associates to convince folks to vote the way you want.<br />

> Kay St. Irregular<br />

HackerS, riggerS, and SpiderS<br />

With the world’s reliance on the Matrix, people who can<br />

manipulate it are a corp’s worst nightmare and biggest asset. To<br />

a corporation, having someone who can protect their data while<br />

stealing their competitors’ gives them the advantage. To the<br />

average citizen, hackers and riggers are mostly known through<br />

sims and newsfeeds. An employee probably only interacts with<br />

someone at an outsourced helpdesk, never actually meeting the<br />

security hackers that work for his company unless he screws<br />

up. Likewise for corporations that employ spiders, riggers who<br />

hook into a building or campus and “wear” it like a second skin.<br />

Most employees probably don’t even realize they’re in a spidercontrolled<br />

facility. Runners better know, ‘cause that’s the kind of<br />

ignorance that’ll get you killed.<br />

In the media, hackers are portrayed as either scummy identity<br />

thieves who rob innocent bystanders to feed their drug habit or<br />

brainy, socially inept members of a runner team—the teammate<br />

that solves complex puzzles but can’t speak coherently in front of<br />

the opposite sex. There’s little of the romanticism that you see with<br />

mages, more’s the pity. And even more unfortunately, the wildly<br />

popular EpSin-Team trid show has cast-type riggers such as Jerry<br />

Drone, the surly dwarf with a creepy spider-like drone always<br />

clinging to his shoulder, a man who can hot-wire a tank or crash a<br />

747 with a few wild waves of his short arms.<br />

> Well, there’s public opinion and there’s fact. Hackers today need<br />

to be more than just brains. You can’t hide in a basement and do<br />

overwatch anymore. IC or a bad biofeedback filter used to be the<br />

worst thing a hacker came up against. Now, a hacker who doesn’t<br />

know how to handle themselves in a fight—or at least how to duck—<br />

isn’t going to last through the first run.<br />

> Glitch<br />

But the public spotlight certainly isn’t on hackers and riggers<br />

anymore. With the unveiling of technomancers, AIs, and sprites,<br />

suddenly hackers don’t seem quite so threatening or interesting.<br />

Combine that upstaging with the fact that hackers have taken a<br />

lot of the heat directed towards technos, and there’s been a large<br />

upswing in the amount of animosity between the two groups.<br />

The threat of technomancers has led to a new crackdown on<br />

hackers and an increase in the punishment for electronic crimes.<br />

Hackers have been mistaken as technomancers and given radical<br />

Unwired<br />

Simon Wentworth (order #1132857) 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!