Difference between revisions of "Pinehurst Memorial Library"

From ShadowHaven Reloaded
Jump to navigation Jump to search
Line 23: Line 23:


<!-- If the location is owned by any faction, you can note it here. -->
<!-- If the location is owned by any faction, you can note it here. -->
|Faction=Pinehurst Memorial Security Team
|Faction=Pinehurst Memorial Library Security Team


}}
}}

Revision as of 07:11, 8 November 2024

Pinehurst Memorial Library
PHML intro.jpeg
Location CreatorFangblade_
ArchetypeLibrary
MetroplexEverett
NeighborhoodFairmont
Background CountCultivated 3 (Academia)
Noise0
FactionPinehurst Memorial Library Security Team


Description

A library based in Everett that has a collection of secured and stored knowledge related to magic. They have a public section and focus on history, but also have a large amount of events going on for community engagement.

GM Notes

Map is available at request. Please message @Fangblade_ on discord for more info.


Distinctive Features

Physically Security

  • Thick Stone Walls
  • Barred Windows
  • Security alarmed doors
  • One way-entrances (outside access prevented)
  • keycode, maglock with passkey
  • Laser sensors in vents
  • Security Turrets
  • MAD / Ware scanner

Host

Rating 6 nested Destination/Security Hosts

  • Info TBD

PHML Host.png

Destination Host. A=4 ,S=3 ,D=9 ,F=8 IC: Every IC program on a destination host is particular to each persona. Instead of only being able to send out 1 IC per Combat Turn, destination hosts can send out 1 IC per Combat Round per persona. These IC never patrol, report on, or attack any persona other than the one they are assigned to. If a hacker doesn’t fight the IC and doesn’t take any further illegal action, IC will no longer attack, and the host will not be alerted. Patrol, Probe, and Track IC are preferred by destination hosts. Patrol IC will not actively scan for personas with only 1 mark.

Security Procedure: Patrol IC running at all times. One Junior Security Specialist patrolling at all times. Once alarmed, the Host will launch IC in this order: Probe, Track, Scramble, Marker, Jammer, Binder, and Acid. If one of its IC gets bricked, it will use the next Combat Turn to reboot that IC rather than moving on to the next one. In general, the host will only use “white” IC that seek to crash intruders as quickly as possible but do no damage to users or their equipment. The reason is simply that the city gets a lot of young punk script kiddies doing their best to cause trouble, and the government’s legal department has gotten tired of settling lawsuits from angry parents and other activist groups. So the government’s security staff is resigned to booting any intruders expediently but gently.

Behavior: Destination hosts Invite Marks from all personas. They only invite one mark, but it is of indefinite duration. Running silent is disabled in destination nodes. Despite this, because anyone can enter these hosts, the host won’t react to them as intruders until a hacker fails Sleaze actions or succeeds in Attack actions. Due to the large number of users inside them at any time, destination hosts expect Matrix mob attacks; their code is designed to prevent large-scale attacks. For each attack after the first they receive in a Combat Turn, the host’s Firewall increases by 1 for two Combat Turns. A user can stand down at any time and the host won’t even acknowledge it was attacked, desiring to keep things quiet. If an attack is persistent or the host has two or more marks on the hacker, a security spider will be alerted.

Nested Security Host. A=7 ,S=6 ,D=8 ,F=9 IC: If either the accommodating host or the nested host is on alert, the other host is put on alert as well. IC is launched in accommodating and nested hosts at the same time; a hacker exiting one will find several fresh IC waiting in the other.

Security Procedure: Patrol IC running at all times. Once alarmed, the Host will launch IC in this order: Probe, Track, Scramble, Marker, Jammer, Binder, and Acid. If one of its IC gets bricked, it will use the next Combat Turn to reboot that IC rather than moving on to the next one. A Standard Security Spider arrives (1D6/2, rounded up) Combat Turns after an alarm is triggered.

Behavior: Nested hosts all share the same Foundation as their parent host; a run against the accommodating host’s Foundation affects all nested hosts as well. Spiders are blind to nested hosts (unless they are security nests, in which case they cannot control devices outside their nest).

Host Icons

Destination

Books.jpg Bulletin board.jpg Foundation.jpg Map room.jpg Newsletter.jpg Restricted Area.jpg Security Spider 1.jpg

Security

Alarms 1.jpg Elevators.jpg Filing cabinet.jpg Laser Tripwire Alarm.jpg Locks 1.jpg Security Cameras.jpg Security Spider.jpg Smoke Detectors.jpg Speaker System.jpg Vault Door.jpg Workstations.jpg

Magic Security

  • Awakened / Aware team
  • Mana barriers ranging in force depending on area
  • Watcher spirits
  • Roaming Spirit patrols

Security Team

  • Security conjurer
  • Spider or technomancer depending on days
  • FLR Mundane team
See Pinehurst Memorial Security Team for more info.
Notable members
Monica Faulkner
  • FLR, Face / longarms

Monica is the lead of the security team. She's the face of the library in terms of security, and often hangs out on the weekends to help run events.

Pyra Robbins
  • Mysad

IC Information

Notable Associated Characters

Matrix Search Table

Threshold Result
1
3
6

Area Knowledge:Seattle Table

Threshold Result
1
3
5

Runs Featuring This Location

No runs yet. This list will auto-populate when this location is tagged in a run AAR.