Thursday, 18 October 2018

Paydata PLUS [D10]

Inside Job by Clark Huggins

Following on from my previous Paydata post, and to help you avoid simply recycling those results after a while, here's another take on a D10 list of saleable or useful files, links and vulnerabilities your sneaky netrunner might discover in the corporate grid she's infiltrating.

Roll a D10:

  1. The Science Division techs working the labs have biomonitors contractually implanted, as standard, synced with the network for 'safety' (plus, it allows the company to keep tabs on them). And their unique identifiers are left exposed after an incomplete system update. How long have you got to manipulate, tag or trace them?
  2. One of the Rapid Response Team managers has left their memory chip connected to their terminal, after a particularly hectic nightshift, followed by a brutal debrief. The chip contains the designated wireless frequencies for the team's smart weapons, apparently good for the next 36 hours.
  3. Looks like a company commtech forgot to turn off the 'share' settings for the video-phones on the 14th and 15th floors, after a routine installation. The v-phone cameras and contact lists for Marketing, Analytics & Modelling and Public Relations are all currently accessible. With the right software, you just might be able to worm your way through the rest of the comms network.
  4. This part of the system is haunted by fragments of a partially de-rezzed AI 'ghost', who is clearly quite insane, but courteous and happy to chat. If you ask the right questions, who knows what secrets it's deteriorating mind will reveal? Can it's unstable psyche be trusted?
  5. An innocuous branch of the network leads to an unsecured terminal currently running the route-planning software for the company ad blimps. Also, the GPS system for each dirigible can be accessed by the reasonably intuitive guidance application, each blimp's current location mapped in real-time.
  6. A hot-desking account manager has accessed the network using a private cloud account, which is still connected. Wading through the spreadsheets, DRM-hacked music and porn, the netrunner may realise that the cloud is quietly auto-syncing with any and all enabled devices in the vicinity. Smartphones, tablets, cheap neural processors, robovacs, autonomous trashcans and the office smart-fridge, all pop up and drop out of the wireless network, periodically. Perhaps the same cloud can lead the hacker to the employee's home system.
  7. The system exposes the central hub for an intelligent washroom on one of the executive floors. A versatile software suite manages a plethora of voice-activated assets - cubicle doors, an air freshening system, soap dispensers, taps and the all-important power flush. And that means there are mics in there…
  8. A glitch reveals the LAN of office environmental sensors across three floors - the locations and operating systems of the smoke alarms, air conditioning, atmospheric regulation, fire suppression and acoustic weapon sensors are all disclosed to the netrunner. There's only D6 minutes until the glitch is corrected, and any tampering will be detected.
  9. A link to the company spam filter is being used by an operator. Normally handled by an expert system, an employee has logged in to double-check that it's performing correctly. The netrunner can see the database being altered in front of them, v-mails slowly being white-listed and others moving to trash. The netrunner, of course, moves at the speed of thought, so has a narrow window of opportunity before any useful v-mails are reclassified by the wage-slave in meatspace.
  10. A very recent update to the OS creates an as-of-yet unknown vulnerability in the building's air traffic control system, giving the netrunner access to the company IFF database. Only identifiable aeros are permitted to land on the rooftop pads, but some subtle changes to that stored data could change everything. 

No comments:

Post a Comment