Simon Wentworth (order #1132857) 9survival tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24is that you can conceal your real data under a torrent of falsehoodsand misdirection. That is, of course, if you have the hacking talentnecessary on tap. If it ever comes under scrutiny, you’re one step(or a dozen) removed from reality.Data veracity and integrity verification systems, like Web ofTrust networking, are too difficult to apply to the open Matrix,because of the data balkanization mentioned above. So, seedingmisinformation is a viable tactic; whether it’s editing your date ofbirth and prior corporate affiliation out of your government recordsor having agents edit your daily buying and travel patterns.If you don’t know a hacker, befriend one. Someday, he’ll saveyour life.> Or a competent forger.> Sticks> Aren’t the two one and the same?> Pistons> You have a point.> SticksTRICKS OF THE TRADEA good runner is proactive. He knows the exploits. He knowshow to play the system against itself. So here are some tips on protectingyourself and exploiting the holes in the system. If you readand commit this to memory, maybe, just maybe, you’ll stay alivelong enough to develop your own tricks.> Although I’m offering up some generic wisdom for the youngsters,anyone who wants to chime in with their favorite tricks, pleasedo so.> GlitchBack to the Stone Age!Sometimes known as the Drop-Out option: subtract yourselffrom the system and eliminate your data footprint. Most ID forgeryrings also have “eraser” services, where they’ll erase all thoselittle bytes of data on you, and on your SINs, from the system.They aren’t cheap, but they’re worth every nuyen. Eliminate unnecessaryrecords, consumer data, tax records, licenses, and falseIDs. If you drop out of the system, there’s nothing for the Manto find.Reduce your dependence on tech in all aspects of yourlife—even those convenient household drones. Believe me, it’sembarrassing to have several safehouses and get caught in one ofthem because your fridge gave you away by ordering food. Youdon’t need a system that turns on the light for you. Do it yourself.A mental command with your sim-module is all it takes. You mighteven consider touching a physical switch! You don’t need dronesto bring you food. Do it yourself. Live in the Stone Age!> It bears reminding—don’t “throw away” an old fake ID, get it professionallyerased. Or, better yet, replace your biometrics on file witha squatter’s, wire the SIN to an old commlink and give it to the guywith a couple of hundred nuyen loaded. Then let him loose.> Slamm-0!> Radio signal scanners and tag erasers are cheap. Scan and Eraseeverything before you use it. Yeah, it might be a pain in the ass toscan your candybar and then have to erase the tag in it, but really, doyou want Azzie corporate security wondering why someone’s in theirfacility with a Horizon CaramelCluster bar in their stomach? Hmm?> Pistons> After a run, you should scan yourself too. Corps like to spray RFIDtag “mists” onto intruders … so make sure you haven’t broughthome any hitchhikers.> CosmoUse technology. Don’t be used!For every technology, there is a counter technology. This isespecially true in the Sixth World. You use the stuff regularly onruns. Don’t stop using it when the run is over. And, for goodnesssake, know what all those technical gadgets do and what theybroadcast.Never, ever use technology without knowing that you do.Take nothing for granted and be aware of the risks. People todayare so used to certain items that they are not even aware of themany more. Being able to look up anything within seconds with yourcommlink and sim module is not the natural state of things. Don’tget used to this. Try to minimize your contact with the wirelessworld and, if you have to use it, do so consciously. You’re an outcastand should be able to live without technology, if necessary.> At a minimum, you should have a very high firewall on all your personalelectronic devices, not just your commlink. Operate in hiddenmode and use a “public” commlink when you go out.> Pistons> Use a disposable commlink when you go to a meet with Mr. J, andtoss it after the run. Double crosses happen. Don’t make it easyfor them.> Cosmo> Nothing says you can’t walk around in public with an area jammer.Or, get fancy and use a camera neutralizer—you can even get themsubtly disguised and built into clothing. Cameras have blackoutsall the time, even in the higher-class neighborhoods. Ditto with awhite-noise generator. As long as it only lasts a few seconds, noone will bother coming to find out why. Don’t forget you’re carryingone and have a leisurely picnic outside the Azzie pyramid though—right, Mika?> Ma’fan> EMPs can be very, very fun … especially if you’re being trailed andneed to disappear in a pinch. Likewise, areas with low or impededsignals—sewers, tunnels, dense forests—are good for giving tracersthe slip.> Sounder> Cyberware routinely sends maintenance reports or downloadspatches. Disable the feature. Getting caught in the middle of a runbecause your move-by-wire system just sent its biannual maintenancereport to its manufacturer is not funny.> KiaRunner’s <strong>Companion</strong>
Simon Wentworth (order #1132857) 9> Gridlink monitors and directs every car on the sprawl streets. Itcan be dangerous to disable it (since the system won’t recognizethat your vehicle is “there” and may just put another vehicle in the“empty” space). Better to make Gridlink think you’re someone else—hacking the local DMV is fun and takes less time than registeringyour car/bike/aircraft/tank legally!> Sounder> When you do use technology, take nothing for granted. Do yourmatrix research yourself or have a hacker you trust do it. Don’talways rely on agents; they’re not subtle at all. If you’re planningon extracting a hot research scientist, having an agent blunderingaround the Matrix querying every public datahaven about said scientistis gonna send up a big red flag.> Pistons> Most people believe what technology tells them. If you think thecops are following you, nothing gets them off your tail faster thanan “officer down” call that is supposedly just two blocks over. Knowthe codes the cops and corp security use, and have your hacker goto town using them.> Hard ExitExtraterritorality is your friend. No, really!The cops only have access to what they can get from publicdata sources. Lone Star has access to its datastores, maybe Interpoland Federal agencies they have co-op programs with, but notKnight Errant’s or Aztech security’s. It would take an act of theCorporate Court to get the Big Ten to share data on criminals,much less their own employees. Want to evade Shiawase pursuit?Change vehicles in the carpark of an Evo Metaergonomics departmentstore—even if the opposition are in hot pursuit, they’re onsomeone else’s turf.I’ve already mentioned data balkanization, but it bears repeating.Everyone hordes their own and won’t share with theirneighbors—at least not for free. This creates plenty of holes foryou to exploit, and it isn’t even limited to the Big 10.> Physical extraterritoriality is easy to understand. Run away fromShiawase goons onto Aztech property, and the Shiawase goons willbe screwed. Astral tails work the same way—a spirit following youonto corporate territory is liable to be killed by the guardian spiritsof that facility or stymied by a ward. Matrix extraterritoriality is a bitharder to grasp, sometimes, but functionally the same. Someonedoing a data-search on you can’t poke their fingers into Shiawasedatabases and Horizon direct-marketing datahavens without hackinginto them (and corporate hackers get into a lot of trouble whenthey get caught peeking in another corp’s nodes). Likewise, considerhacking some low-level corporate nodes when you’re on a run beforehitting your main node—any traces you trigger will likely be stoppedcold as soon as your datatrail crosses from their territory onto anothercorp’s. This also works with certain governments. Nothing’squite so fun as hacking an Azzy facility from the Tir Tairngire grid… ‘cause, believe you me, those Azzies aren’t gonna be calling uptheir black-ops squad to go run into Portland without triggering aninternational “incident.”> PistonsRunner’s <strong>Companion</strong>> I’d always suggest hacking via multiple grids, or satellite uplinksand corporate systems, before hacking into the store across thestreet from you. The more Matrix territories you cover, the less likelythey’ll be able to trace you.> Slamm-0!(Dis)Information is powerAs it gets harder (and more expensive) to erase all your dataand traces from the Matrix, one way to stay off the radar is the timehonored solution of chaff. If you know they will be looking, justmake sure what they find won’t let them get a bead on you. Hideyour digital tracks with excess, contradictory information or paysomeone to do it. The next best thing to them not picking up yourtrail, is giving them a dozen trails to follow. There’s a whole lot ofinfo out there about you. You can make sure a lot of it is deceiving.Use multiple IDs and make sure they’re linked to different placesof residence, known acquaintances, dates of birth, shopping preferences,and criminal records. Even use different personas.Same goes for real life. Hang at different places with differentcrowds. Mix things up. Disinformation is power.> It only goes so far, but it’s a good tip. Make sure to follow some ofthe other tips. Paying with certified ‘sticks keeps your cred movementsoff the Matrix for the most part. Move every few months,keeping your alternative IDs active enough to not arouse suspicionwhen you need to rely on them.> 2XL> The same techniques used for forging SINs and IDs and hackingthe support databases work here. Keep a running tab with a forgeror the right hacker, and they’ll make sure to keep the databases onyour fake IDs up to date. Nothing tattles on a false ID more thanyour (fake) banking movements abruptly ending 2 months ago whenyou bought it.> PistonsEvery single monetary transaction is logged, archived,analyzed, and cross-referenced. The only way to avoid somebodyhaving a total profile of everything you like and do is by usingseveral IDs (or using the Drop-Out strategy).> Fake IDs and fake SINs work fine, but there’s also certified credor anonymous cred and ID tokens. If you shop online, you shouldconsider only using an ID token. There are a variety of black-marketbanks that’ll issue them. The real high roller institutions do too,but you’ve got to have a sizeable balance to get their preferredclient services.> Mr. BondsIf you have to give a name for whatever reason, and you’re surethat your SIN won’t be checked, give the name of somebody wholooks like you. Highjack IDs from social websites. If you use a latexfacemask or nanopaste, don’t cook up a fake identity from thinair—copy existing people. Try to adopt different styles of talkingand walking. Be somebody else, especially if there’s absolutely noreason for it. The more confusion there is, the harder it will be tofind the clue that leads to the important data … and to you.25survival tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .