CosmicGamer
SOC-14 1K
Just some thoughts on Spooks with agency assigned computers.
1) COMPUTER: Good chance it is a custom computer with one of these two customizations:
A) Computer CAN run a higher level intrusion/hacking program than a similar tech level computer
B) Computer CAN run a higher level security program than a similar tech level computer - keeping your records safe.
Yes I know you want both but hacking into a network/computer is a different program than securing a computer. Rules don't allow that. Here is a possible justification: Would you take the computer with your secure files out into the field with you where it could be damaged or lost? I think not. It would be on a separate more secured computer.
An agency PDA, in my opinion would not have the brawn to be either. It probably is specialized for encripting files if anything.
2) PROGRAMS: There is a good chance the computer was given to you with programs for hacking and doing searches.
Those L3 programs cost 6 figures.
I think maybe only agents with a current assignment in Intrusion/Hacking would get a L3 program. They would turn in the computer at the end of their assignment. The quality of the programs installed might vary depending on the rank of the person the computer is assigned to also.
The tech level of the computer can help determine what level programs would be possible too. Don't think you would be running a L3 hacking program if you have to shut down your L3 security program since the computer can't run them both at once. Leaves your computer vulnerable to attacks while your hacking.
3) HACKING: This computer will be an asset when trying to get into those secured corporate and private computers - in the right hands. It is actually more useful to someone with high Int and low computer skill than someone with a decent computer skill and an average IQ. Having High skill and Int is, of course the best.
For heavily secured networks with multiple firewalls and High level security programs you would need a direct link to be more successful [a stealth op to get into the server room]. Pulling a hard drive from a personal computer also makes it easier. Eliminates the need to Just need get through the local security software and now you just need to break the encryption.
===
This may be aplicable to other versions of traveller but since I don't know the details of those systems I put it in the MGT forum.
===
This message will self destruct in 5, 4, 3, 2, [it will get flamed in the next post most likely]
1) COMPUTER: Good chance it is a custom computer with one of these two customizations:
A) Computer CAN run a higher level intrusion/hacking program than a similar tech level computer
B) Computer CAN run a higher level security program than a similar tech level computer - keeping your records safe.
Yes I know you want both but hacking into a network/computer is a different program than securing a computer. Rules don't allow that. Here is a possible justification: Would you take the computer with your secure files out into the field with you where it could be damaged or lost? I think not. It would be on a separate more secured computer.
An agency PDA, in my opinion would not have the brawn to be either. It probably is specialized for encripting files if anything.
2) PROGRAMS: There is a good chance the computer was given to you with programs for hacking and doing searches.
Those L3 programs cost 6 figures.
I think maybe only agents with a current assignment in Intrusion/Hacking would get a L3 program. They would turn in the computer at the end of their assignment. The quality of the programs installed might vary depending on the rank of the person the computer is assigned to also.
The tech level of the computer can help determine what level programs would be possible too. Don't think you would be running a L3 hacking program if you have to shut down your L3 security program since the computer can't run them both at once. Leaves your computer vulnerable to attacks while your hacking.
3) HACKING: This computer will be an asset when trying to get into those secured corporate and private computers - in the right hands. It is actually more useful to someone with high Int and low computer skill than someone with a decent computer skill and an average IQ. Having High skill and Int is, of course the best.
For heavily secured networks with multiple firewalls and High level security programs you would need a direct link to be more successful [a stealth op to get into the server room]. Pulling a hard drive from a personal computer also makes it easier. Eliminates the need to Just need get through the local security software and now you just need to break the encryption.
===
This may be aplicable to other versions of traveller but since I don't know the details of those systems I put it in the MGT forum.
===
This message will self destruct in 5, 4, 3, 2, [it will get flamed in the next post most likely]