Difference between revisions of "Pinehurst Memorial Library"
(→Host) |
|||
Line 64: | Line 64: | ||
Behavior: Nested hosts all share the same Foundation as their parent host; a run against the accommodating host’s Foundation affects all nested hosts as well. Spiders are blind to nested hosts (unless they are security nests, in which case they cannot control devices outside their nest). | Behavior: Nested hosts all share the same Foundation as their parent host; a run against the accommodating host’s Foundation affects all nested hosts as well. Spiders are blind to nested hosts (unless they are security nests, in which case they cannot control devices outside their nest). | ||
===Host Icons=== | |||
====Destination==== | |||
====Security==== | |||
===Magic Security=== | ===Magic Security=== |
Revision as of 14:58, 12 September 2024
Location Creator | Fangblade_ |
---|---|
Archetype | Library |
Metroplex | Everett |
Neighborhood | Fairmont |
Background Count | Cultivated 3 (Academia) |
Noise | 0 |
Faction | Pinehurst Memorial Security Team |
Description
A library based in Everett that has a collection of secured and stored knowledge related to magic. They have a public section and focus on history, but also have a large amount of events going on for community engagement.
GM Notes
Map is available at request. Please message @Fangblade_ on discord for more info.
Distinctive Features
Physically Security
- Thick Stone Walls
- Barred Windows
- Security alarmed doors
- One way-entrances (outside access prevented)
- keycode, maglock with passkey
- Laser sensors in vents
- Security Turrets
- MAD / Ware scanner
Host
Rating 6 nested Destination/Security Hosts
- Info TBD
Destination Host. A=4 ,S=3 ,D=9 ,F=8 IC: Every IC program on a destination host is particular to each persona. Instead of only being able to send out 1 IC per Combat Turn, destination hosts can send out 1 IC per Combat Round per persona. These IC never patrol, report on, or attack any persona other than the one they are assigned to. If a hacker doesn’t fight the IC and doesn’t take any further illegal action, IC will no longer attack, and the host will not be alerted. Patrol, Probe, and Track IC are preferred by destination hosts. Patrol IC will not actively scan for personas with only 1 mark.
Security Procedure: Patrol IC running at all times. One Junior Security Specialist patrolling at all times. Once alarmed, the Host will launch IC in this order: Probe, Track, Scramble, Marker, Jammer, Binder, and Acid. If one of its IC gets bricked, it will use the next Combat Turn to reboot that IC rather than moving on to the next one. In general, the host will only use “white” IC that seek to crash intruders as quickly as possible but do no damage to users or their equipment. The reason is simply that the city gets a lot of young punk script kiddies doing their best to cause trouble, and the government’s legal department has gotten tired of settling lawsuits from angry parents and other activist groups. So the government’s security staff is resigned to booting any intruders expediently but gently.
Behavior: Destination hosts Invite Marks from all personas. They only invite one mark, but it is of indefinite duration. Running silent is disabled in destination nodes. Despite this, because anyone can enter these hosts, the host won’t react to them as intruders until a hacker fails Sleaze actions or succeeds in Attack actions. Due to the large number of users inside them at any time, destination hosts expect Matrix mob attacks; their code is designed to prevent large-scale attacks. For each attack after the first they receive in a Combat Turn, the host’s Firewall increases by 1 for two Combat Turns. A user can stand down at any time and the host won’t even acknowledge it was attacked, desiring to keep things quiet. If an attack is persistent or the host has two or more marks on the hacker, a security spider will be alerted.
Nested Security Host. A=7 ,S=6 ,D=8 ,F=9 IC: If either the accommodating host or the nested host is on alert, the other host is put on alert as well. IC is launched in accommodating and nested hosts at the same time; a hacker exiting one will find several fresh IC waiting in the other.
Security Procedure: Patrol IC running at all times. Once alarmed, the Host will launch IC in this order: Probe, Track, Scramble, Marker, Jammer, Binder, and Acid. If one of its IC gets bricked, it will use the next Combat Turn to reboot that IC rather than moving on to the next one. A Standard Security Spider arrives (1D6/2, rounded up) Combat Turns after an alarm is triggered.
Behavior: Nested hosts all share the same Foundation as their parent host; a run against the accommodating host’s Foundation affects all nested hosts as well. Spiders are blind to nested hosts (unless they are security nests, in which case they cannot control devices outside their nest).
Host Icons
Destination
Security
Magic Security
- Awakened / Aware team
- Mana barriers ranging in force depending on area
- Watcher spirits
- Roaming Spirit patrols
Security Team
- Security conjurer
- Spider or technomancer depending on days
- FLR Mundane team
- See Pinehurst Memorial Security Team for more info.
- Notable members
- Monica Faulkner
- FLR, Face / longarms
Monica is the lead of the security team. She's the face of the library in terms of security, and often hangs out on the weekends to help run events.
- Pyra Robbins
- Mysad
IC Information
Notable Associated Characters
Matrix Search Table
Threshold | Result |
---|---|
1 | |
3 | |
6 |
Area Knowledge:Seattle Table
Threshold | Result |
---|---|
1 | |
3 | |
5 |
Runs Featuring This Location
No runs yet. This list will auto-populate when this location is tagged in a run AAR.