Difference between revisions of "Neural Chip V3"
Jump to navigation
Jump to search
Tag: visualeditor |
Tag: visualeditor |
||
Line 53: | Line 53: | ||
==Background== | ==Background== | ||
A cyber collective hacked into SONY and found the issue, and | A cyber collective hacked into SONY and found the issue, and then brokered favors to get the money to do a run against this. | ||
==The Meet== | ==The Meet== | ||
Tülay Meier-Adler, the Johnson told the runners of the payment plan, then informed them of the general security of the target. this included how heavy the drone swarms were relied upon, the | Tülay Meier-Adler, the Johnson told the runners of the payment plan, then informed them of the general security of the target. this included how heavy the drone swarms were relied upon, the cyber security of the area as well as other operational details that could be known. | ||
==The Plan== | ==The Plan== | ||
Line 70: | Line 70: | ||
==Game Quotes== | ==Game Quotes== | ||
{{Gamequote| | {{Gamequote|"Is power ball loud? I guess you can hear the flesh burning." | ||
--OB}} | |||
==Player After Action Reports (AARs)== | ==Player After Action Reports (AARs)== | ||
[[Category:Runs]] | [[Category:Runs]] |
Revision as of 16:25, 28 March 2020
Neural Chip V3 | |||||||||
---|---|---|---|---|---|---|---|---|---|
| |||||||||
Factions Involved | |||||||||
Messenger_7 |
Sony Corporation | ||||||||
Commanders and leaders | |||||||||
ShadowHaven | The on-site Administrator | ||||||||
Casualties and losses | |||||||||
ChopShop Wolfheart, Messanger 7's dignity |
12 MCT Roto Drones w/ HVAR |
Summary
The Sony corporation is developing a new piece of gear that lets them rig people. Someone hired Runners to put a stop to this.
Background
A cyber collective hacked into SONY and found the issue, and then brokered favors to get the money to do a run against this.
The Meet
Tülay Meier-Adler, the Johnson told the runners of the payment plan, then informed them of the general security of the target. this included how heavy the drone swarms were relied upon, the cyber security of the area as well as other operational details that could be known.