Difference between revisions of "Knight-Errant Seattle Police Host"

From ShadowHaven Reloaded
Jump to navigation Jump to search
Tag: visualeditor-wikitext
Tag: visualeditor
 
(13 intermediate revisions by the same user not shown)
Line 1: Line 1:
[[File:KE Badge.png|alt=|thumb|303x303px|A Knight-Errant Police badge.]]
==Description==
==Description==
This is the host used by Knight-Errant's police force for the Seattle metroplex. It consists of three parts representing different areas in a police station: Reception, Administration, and Dispatch.
This is the host used by Knight-Errant's police force for the Seattle metroplex. It consists of three parts representing different areas in a police station: Reception, Administration, and Dispatch.


==Scaffolding==
==Scaffolding==
The Knight-Errant police host has a KE police badge as its icon. It always faces you no matter which direction you approach it from.
[[File:Keseattlehost.png|alt=|frame|A map of the K-E Seattle Police host with brief descriptions. IC are listed alphabetically instead of their load order.]]
The Knight-Errant police host has a KE police badge as its icon. It always faces you no matter which direction you approach it from. Entering will place you in Reception; a mark will be invited automatically, making it publicly accessible.


===Reception===
===Reception===
Line 24: Line 27:
|Patrol, Probe, Track, Tar Baby, Jammer, Marker
|Patrol, Probe, Track, Tar Baby, Jammer, Marker
|}
|}
This node serves as the public face of Insert Organization Here. It is the first node you enter when you access the host. It looks like a normal office building with a friendly receptionist to give you a tour, and its IC look like staff. Its files contain public contact information and press releases. No devices are slaved to this node. A spider is in charge of the security, but they are normally in the nested security node and so will take a turn or two to respond to an alert.
This is the public face of Knight-Errant's Seattle police force. It looks like a police station, with notice boards, help desks, and contact information for anonymous tips, records requests, departments, and anything else one might expect to find on a police department's website for the public to see. From here, two doors lead to the nested hosts Administration and Dispatch. These are staff-only areas.
 
=====IC Behavior=====
Patrol is deployed at all times, but the others are kept in reserve. The host will spawn the IC highest up in the load order (see IC Tray) that is not currently deployed. IC were chosen with the goal of tracing an offending hacker without causing harm to any script kiddie who might access the host and try something stupid.
 
As a destination host, the restriction on spawning 1 IC at the beginning of each combat turn is lifted, instead spawning 1 IC per attacking persona at the beginning of each combat turn. IC will not attack unless a hacker succeeds in an Attack action or fails a Sleaze action. If a hacker does not fight the IC or attempt any further illegal activity, the host will not enter alert, and the IC will stand down. Continued attacks will cause the host to enter emergency response mode; for each attack after the first a host suffers in a combat turn, its Firewall increases by 1 for 2 combat turns. If a user's attacks persist longer than 1 combat turn, a spider will be alerted.
 
Personas with only 1 mark are not subject to Patrol IC scanning.
 
====Devices====
There are no devices slaved to Reception.
 
====Spiders====
Reception is not normally patrolled by a spider, though if an alert goes out, the spider from Administration will enter Reception to deal with the situation.


===Administration===
===Administration===
Line 45: Line 61:
|Patrol, Blaster, Probe, Track, Tar Baby
|Patrol, Blaster, Probe, Track, Tar Baby
|}
|}
This node contains Insert Organization Here's client and employee records. It looks like a series of rooms filled with book cases and filing cabinets. Client and employee files are labeled with anonymous ID numbers known only to the clients and employees themselves, though an offline ID lookup database exists. The files of former employees or clients who have not used Insert Organization Here's services in X months are stored in the host's archive; otherwise, they are accessible to users in the node. Each file is protected by a databomb with a password known only to the client and employees handling the client's case. There are no devices slaved to this node. This node is closed to the general public, primarily used by employees as a data repository. The host's spider normally spends time here, so expect faster responses to alerts.
The administration node looks like a series of offices and rooms full of filing cabinets. This is accurate, as it is a file repository used by police officers and detectives to manage their active cases. Think about what files you might find looking at an officer's desk, the evidence room, or in any filing cabinets in the offices of police HQ. You're likely to find such things here. Case files, evidence descriptions, criminal records - anything in active use. Closed cases and files not accessed in a long time will be stored in the host's archive, meaning they have to be retrieved by a spider or the file's owner, or a hacker will have to look for them in the host's foundation.
 
====IC Behavior====
Patrol is deployed at all times. The host will spawn the IC highest up in the load order (see IC Tray) that is not currently deployed. IC were selected with the goal of immobilizing, marking, and tracing the offending hacker for physical arrest. IC follow standard deployment and behavior rules.
 
====Devices====
There are no devices slaved to Administration.
 
====Spiders====
An on-duty spider resides in Administration to call up archived files and handle evidence for police officers. Expect them to be fairly well trained and equipped, likely with a cyberdeck of rating 3. They will be exceedingly bored, however.


=== Dispatch ===
===Dispatch===
{| class="wikitable"
{| class="wikitable"
|+
|+
dispatch.kepolice.ec
!Type
!Type
!Rating
!Rating
Line 66: Line 92:
|Patrol, Killer, Sparky, Blaster, Black IC, Probe
|Patrol, Killer, Sparky, Blaster, Black IC, Probe
|}
|}
The dispatch node resembles a war room, in some respects. A big display of the Seattle metroplex contains icons for cars and drones, and operators sit around it coordinating emergency calls and police vehicle/drone response. Files here will see heavy, constant use, as they contain recent communications records before being sent to administration.
====IC Behavior====
Patrol is deployed at all times. The host will spawn the IC highest up in the load order (see IC Tray) that is not currently deployed. IC were selected with the goal of eliminating any threats in Dispatch as soon as possible to protect police personnel and materiel. They follow standard IC rules with the exception they are deployed at the ends of combat turns instead of the beginnings, due to the processing lag required to manage all the devices with network security protocols.
====Devices====
This node protects nearly all Knight-Errant police devices in Seattle. All police vehicles and drones are slaved to this host, as are security devices in in the physical K-E police HQ building. These devices run silent, so anyone looking to hack them will need to have some idea what they're looking for first. High-priority vehicles and drones will be slaved to an RCC that is slaved to the host in order to allow a rigger-spider to manage them. Because Dispatch is an industry host, hackers inside do ''not'' have a direct connection to all slaved devices. Be very careful.
====Spiders====
There is one on-duty decker inside Dispatch at all times, coordinating with the Administration decker and ensuring all the expensive equipment inside remains functional. There is also a rigger-spider on duty to oversee high-priority operations such as SWAT teams. The spiders of Dispatch are better trained and equipped than those of Administration, and they are ruthless. Expect device ratings of 4 and better skillsets.


==Physical Integration==
==Physical Integration==
Some hosts correspond with physical locations. They may act as a WAN to manage devices in a building, protect the personas of a business’ clientele from prying eyes, or serve as a data repository for staff reference. A few rare, outdated hosts have physical hardware they run on. Use this section to describe how the host is integrated with meatspace, if at all. Remember that because direct connections to slaved devices are a backdoor into a host’s firewall, slaved devices will be physically protected. It is better to have an easily accessible device not be slaved to a host at all than to have it compromise your network security. Whether a given host’s owners subscribe to that philosophy is up to you.
All devices in the host are slaved to the Dispatch node, meaning they are not easily accessed from the matrix. They are not usually easy to access physically, either.
 
Security devices in the police station will be placed outside of reach, such as cameras being on the ceiling behind glass cages. Locks will not be slaved to the host due to how easily they can be accessed. If someone can access a lock to hack it, it should be about as secure as the door's physical integrity, which is to say the average person can't deal with it, but a shadowrunner could easy smash it. Accordingly, it won't provide them a backdoor to all other devices.
 
Police vehicles can be found all across the sprawl, but getting a direct connection to them requires you to get inside the car, usually. The universal connector port to access the vehicle is always on the dashboard, and the data cables one could clip a tap onto are under the vehicle's hood, running to the back above panels below. In short, they're normally only found in areas a mechanic or police officer would have access to.


Insert Organization Here has a modest building protected by a cheap private security force. It's in an old building with wired, offline electronics, so security devices are placed in a cavalier fashion. The spider's office on the third floor contains an offline terminal they can use to match employee/client names with ID numbers when needed.
Police drones are even harder to get physical access to in a way a hacker would want, as disabling or jamming them will cause them to lose connection to Dispatch and thus the mark one could gain on it. If they are somehow accessed physically while online, the hacker runs the risk of alerting Dispatch before they even enter it, as the drone will almost certainly send an emergency alert.


==Foundation==
==Foundation==
Use this section to describe a host’s foundation, if it has one. The only static, unchanging feature of a host foundation is its logic map: a set of seven specific nodes and the data trails connecting them with the requirement each node be connected to the rest. If the host’s foundation paradigm has been locked down for some reason (such as a persistent portal anchor), you may describe it as well. This is a rare occurrence, as keeping the paradigm randomized helps the host’s owners recognize when the portal node has been anchored by an unauthorized user.
The foundation of the KE Seattle Police host is unanchored and therefore random. The Archive and Slave nodes are of high importance due to the files and devices contained therein. Note that all nested hosts share the same foundation, so Reception, Administration, and Dispatch can all be affected from within.


[[File:Sample_foundation_map.png]]
[[File:Keseattlefoundation.png]]


<br />
<br />
[[Category:Hosts]]
[[Category:Hosts]]

Latest revision as of 23:27, 12 March 2020

A Knight-Errant Police badge.

Description

This is the host used by Knight-Errant's police force for the Seattle metroplex. It consists of three parts representing different areas in a police station: Reception, Administration, and Dispatch.

Scaffolding

A map of the K-E Seattle Police host with brief descriptions. IC are listed alphabetically instead of their load order.

The Knight-Errant police host has a KE police badge as its icon. It always faces you no matter which direction you approach it from. Entering will place you in Reception; a mark will be invited automatically, making it publicly accessible.

Reception

www.kepolice.ec
Type Rating Attack Sleaze Data Processing Firewall IC Tray
Destination 6 5 3 12 10 Patrol, Probe, Track, Tar Baby, Jammer, Marker

This is the public face of Knight-Errant's Seattle police force. It looks like a police station, with notice boards, help desks, and contact information for anonymous tips, records requests, departments, and anything else one might expect to find on a police department's website for the public to see. From here, two doors lead to the nested hosts Administration and Dispatch. These are staff-only areas.

IC Behavior

Patrol is deployed at all times, but the others are kept in reserve. The host will spawn the IC highest up in the load order (see IC Tray) that is not currently deployed. IC were chosen with the goal of tracing an offending hacker without causing harm to any script kiddie who might access the host and try something stupid.

As a destination host, the restriction on spawning 1 IC at the beginning of each combat turn is lifted, instead spawning 1 IC per attacking persona at the beginning of each combat turn. IC will not attack unless a hacker succeeds in an Attack action or fails a Sleaze action. If a hacker does not fight the IC or attempt any further illegal activity, the host will not enter alert, and the IC will stand down. Continued attacks will cause the host to enter emergency response mode; for each attack after the first a host suffers in a combat turn, its Firewall increases by 1 for 2 combat turns. If a user's attacks persist longer than 1 combat turn, a spider will be alerted.

Personas with only 1 mark are not subject to Patrol IC scanning.

Devices

There are no devices slaved to Reception.

Spiders

Reception is not normally patrolled by a spider, though if an alert goes out, the spider from Administration will enter Reception to deal with the situation.

Administration

admin.kepolice.ec
Type Rating Attack Sleaze Data Processing Firewall IC Tray
Data 5 7 5 6 8 Patrol, Blaster, Probe, Track, Tar Baby

The administration node looks like a series of offices and rooms full of filing cabinets. This is accurate, as it is a file repository used by police officers and detectives to manage their active cases. Think about what files you might find looking at an officer's desk, the evidence room, or in any filing cabinets in the offices of police HQ. You're likely to find such things here. Case files, evidence descriptions, criminal records - anything in active use. Closed cases and files not accessed in a long time will be stored in the host's archive, meaning they have to be retrieved by a spider or the file's owner, or a hacker will have to look for them in the host's foundation.

IC Behavior

Patrol is deployed at all times. The host will spawn the IC highest up in the load order (see IC Tray) that is not currently deployed. IC were selected with the goal of immobilizing, marking, and tracing the offending hacker for physical arrest. IC follow standard deployment and behavior rules.

Devices

There are no devices slaved to Administration.

Spiders

An on-duty spider resides in Administration to call up archived files and handle evidence for police officers. Expect them to be fairly well trained and equipped, likely with a cyberdeck of rating 3. They will be exceedingly bored, however.

Dispatch

dispatch.kepolice.ec
Type Rating Attack Sleaze Data Processing Firewall IC Tray
Industry 6 7 8 6 9 Patrol, Killer, Sparky, Blaster, Black IC, Probe

The dispatch node resembles a war room, in some respects. A big display of the Seattle metroplex contains icons for cars and drones, and operators sit around it coordinating emergency calls and police vehicle/drone response. Files here will see heavy, constant use, as they contain recent communications records before being sent to administration.

IC Behavior

Patrol is deployed at all times. The host will spawn the IC highest up in the load order (see IC Tray) that is not currently deployed. IC were selected with the goal of eliminating any threats in Dispatch as soon as possible to protect police personnel and materiel. They follow standard IC rules with the exception they are deployed at the ends of combat turns instead of the beginnings, due to the processing lag required to manage all the devices with network security protocols.

Devices

This node protects nearly all Knight-Errant police devices in Seattle. All police vehicles and drones are slaved to this host, as are security devices in in the physical K-E police HQ building. These devices run silent, so anyone looking to hack them will need to have some idea what they're looking for first. High-priority vehicles and drones will be slaved to an RCC that is slaved to the host in order to allow a rigger-spider to manage them. Because Dispatch is an industry host, hackers inside do not have a direct connection to all slaved devices. Be very careful.

Spiders

There is one on-duty decker inside Dispatch at all times, coordinating with the Administration decker and ensuring all the expensive equipment inside remains functional. There is also a rigger-spider on duty to oversee high-priority operations such as SWAT teams. The spiders of Dispatch are better trained and equipped than those of Administration, and they are ruthless. Expect device ratings of 4 and better skillsets.

Physical Integration

All devices in the host are slaved to the Dispatch node, meaning they are not easily accessed from the matrix. They are not usually easy to access physically, either.

Security devices in the police station will be placed outside of reach, such as cameras being on the ceiling behind glass cages. Locks will not be slaved to the host due to how easily they can be accessed. If someone can access a lock to hack it, it should be about as secure as the door's physical integrity, which is to say the average person can't deal with it, but a shadowrunner could easy smash it. Accordingly, it won't provide them a backdoor to all other devices.

Police vehicles can be found all across the sprawl, but getting a direct connection to them requires you to get inside the car, usually. The universal connector port to access the vehicle is always on the dashboard, and the data cables one could clip a tap onto are under the vehicle's hood, running to the back above panels below. In short, they're normally only found in areas a mechanic or police officer would have access to.

Police drones are even harder to get physical access to in a way a hacker would want, as disabling or jamming them will cause them to lose connection to Dispatch and thus the mark one could gain on it. If they are somehow accessed physically while online, the hacker runs the risk of alerting Dispatch before they even enter it, as the drone will almost certainly send an emergency alert.

Foundation

The foundation of the KE Seattle Police host is unanchored and therefore random. The Archive and Slave nodes are of high importance due to the files and devices contained therein. Note that all nested hosts share the same foundation, so Reception, Administration, and Dispatch can all be affected from within.

Keseattlefoundation.png