comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
systeM security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .<br />
78<br />
tially via cable, with wireless access available to each node from<br />
each corresponding level of the club. Each of Nodes 1 through<br />
9 act as a gateway to the next node in sequence. Node 11 is connected<br />
to each of the nodes via fiber optic cable. Nodes 1–10 also<br />
have holographic systems and cameras slaved.<br />
BiS Büro, Hamburg, germany<br />
The Bundesamt für Innere Sicherheit (Bureau of Internal<br />
Security) does not have much sway in the Free City of Hamburg.<br />
They do have enough of a presence to warrant an office in Wandsbek.<br />
Their system is typical of many non-secret government offices.<br />
Sculpting: The sculpting is clean and utilitarian, with marble<br />
and wood finishes. The BIS emblem is prominently displayed.<br />
Hardware: One MCT Sentinel II (Persona Limit 10,<br />
Processor Limit 60) and one NeoNET Office Genie (Persona<br />
Limit 5, Processor Limit 20)<br />
Authentication: Passkey<br />
Privileges: Standard<br />
Attributes:<br />
Node 1: <strong>Firewall</strong> 5, Response 4, Signal 4, System 5<br />
Node 2: <strong>Firewall</strong> 5 Response 3, Signal 2, System 4<br />
Spiders: 1 Security Consultant on duty at all times<br />
IC:<br />
Node 1: 1 MCT Bloodhound 5 (patrolling), 1 Three<br />
Musketeers Suite 5 (loaded)<br />
Node 2: None<br />
Resident Programs:<br />
Node 1: Analyze 5<br />
Node 2: Analyze 4<br />
ARC: Launch IC (Three Musketeers Suite)<br />
Topology: Node 1 is accessible from the Matrix via wireless,<br />
and acts as a gateway for Node 2. Node 1 is the production node,<br />
Node 2 is an archival node where the office’s records are kept.<br />
choson Lair, various Locations<br />
This is actually one of many similar systems used by the<br />
Choson for their operations. Each Lair is run on hardware that is<br />
easily packed up and transported, so they can create a Lair, use it<br />
for as long as necessary, and then shut it down and store it or move<br />
it to a new location as needed.<br />
Sculpting: The sculpting for each Lair is different, based on<br />
the purpose of the node and the preferences of the administrators,<br />
but all have a red-and-yellow yin-yang design worked into<br />
the design.<br />
Hardware: Custom Choson portable nexus (Persona Limit<br />
5, Processor Limit 45)<br />
Authentication: Passcode<br />
Privileges: Standard<br />
Attributes: <strong>Firewall</strong> 4, Response 3, Signal 5, System 4<br />
Spiders: 1 Professional Spider on duty at all times.<br />
IC: Juhseung Saja 4 (loaded), Watanabe Electric Kitsune 4<br />
(patrolling)<br />
Resident Programs: Analyze 4, Encrypt 4<br />
ARC: Launch IC ( Juhseung Saja)<br />
Topology: Single encrypted node.<br />
tux’s, Seattle, UcaS<br />
There’s no hotter spot on the ‘Trix than Tux’s, the VR night<br />
club for the preeminent hacker. Tux’s requires that its patrons hack<br />
their way in, and moves its physical location almost every day (sometimes<br />
hiring shadowrunners to insure the secrecy of the move).<br />
Sculpting: The sculpting in Tux’s is completely random,<br />
and subject to the whims of its patrons. Normally a consensus is<br />
reached at some point each night, but the occasional “sculpting<br />
battle” rages through the VR landscape.<br />
Hardware: [need info from Topology chapter] Changes access<br />
ID every night.<br />
Authentication: No access allowed.<br />
Privileges: All privileges moved to admin.<br />
Attributes: <strong>Firewall</strong> 5, Response 4, Signal 6, System 5<br />
Spiders: none, except for the patrons, usually Security<br />
Consultants and Risk management engineers<br />
IC: 1 Rumpelstiltskin 4 (patrolling)<br />
Resident Programs: Analyze 5<br />
ARC: Terminate Connection<br />
Topology: Single node connected to the Matrix via wireless.<br />
diez de octubre airbase, aztlan<br />
This installation is an open secret in the heart of Durango.<br />
Many wild rumors of magical jet fighters and unnatural research<br />
abound about this military base, including one that states that this<br />
is the site of an ultraviolet node.<br />
Sculpting: The sculpting is a sterile white environment. The<br />
flag of Aztlan is here, along with a number of military insignias.<br />
Hardware: Custom system (Persona Limit 20, Processor<br />
Limit 65). Access ID changes every night.<br />
Authentication:<br />
Node 1–3: Passkey<br />
Node 4: Alchemical Passkey<br />
Privileges: Standard<br />
Attributes:<br />
Node 1–3: <strong>Firewall</strong> 6, Response 5, Signal 4, System 5<br />
Node 4: <strong>Firewall</strong> 6, Response 7, Signal 2, System 7<br />
Spiders: 1 Matrix Support Specialist and 1 Risk Management<br />
Engineer on duty at all times<br />
IC: 3 Renraku Oniwaban in each node (patrolling)<br />
Resident Programs: Analyze 6, Encrypt 6 on all nodes<br />
ARC: Scramble Security Hacker (Matrix Support<br />
Specialist)<br />
Topology: Node 1 serves as the air control node. Node 2<br />
handles physical security and drone command. Node 3 is the administrative<br />
node for the base. Node 4 can only be accessed on site<br />
within a Faraday cage, and has no connections to other nodes.<br />
zurich orbital terrestrial Substation, new York<br />
This network handles unimaginable amounts of transactions<br />
worth an indescribable amount of money. Many a hacker has been<br />
left brain dead trying to make a run on this system.<br />
Sculpting: An impressive stone hall greets users logging on<br />
to the system. Archways lead to different nodes, each carefully<br />
secured for privacy and against intrusion.<br />
Unwired<br />
Simon Wentworth (order #1132857) 9