Future Tech

From Shadowrun
Jump to navigation Jump to search

System Identification Numbers (SINs)

People are identified by many identifiers in many systems, but the System Identification Number is the gold standard. Every SIN is tied to at least a name, a picture, and a fingerprint. While every SIN holder has been fingerprinted, many registrations include retinal scans, limited DNA profiles, and voice samples. Maintained by Global Systems Registries, the SIN is used by most governments and corporations to identify citizens and employees.

GSR provides for the vast majority of identification-check services throughout the system. With even a basic scanner, and a service contact, GSR can identify whether a particular subject's biometrics match a provided SIN. Authorized customizers, such as law enforcement agencies, can retrieve a SIN based on provided biometrics.

Many older SIN holders have a UV-reactive barcode tattoo on their wrist of their number, with younger citizens often relying solely on embedded short-range radio transmitters.

Radio Systems

The following rules generally relate to all electromagnetic systems used for performing communication, detecting communication, and interfering with communication.

Comms

Radio comms include cellular devices, point-to-point radio, peer-to-peer dynamic communication webs, and all other forms of radio communication. This includes devices for interpersonal communication, communication between intelligent system, the control of drones, and other uses. Radio comms include personal, vehicle, and fixed devices. These systems are generally assumed to work normally when operating in their intended environment. They may be impacted by ECM and benefit from ECCM.

Radio Sensors

Radio sensors can be used to detect, track, identify, and intercept radio signals, such as those used for cellular, point-to-point radio, and other electromagnetic communications. These passive sensors are distinct from radar, which involves the use of an active broadcast.

Note that as most radio signals are encrypted, radio sensors might not necessarily empower remote eavesdropping of the contents of intercepted communications. Encryption may be overcome through decking (typically requiring knowledge of an exploit or weakness) or determining decryption keys through alternate means (e.g., social engineering).

Generally, using radio sensors involves a skill check that may be modified by various factors. Typical causes of Disadvantage include (non-exclusive):

  • Sensor system damage
  • Significant obstacles (a common disadvantage of urban environments)
  • Significant competing signal traffic (a common disadvantage of urban environments)
  • Negative atmospheric conditions (electrical storms or solar flares)
  • Facing specialized radio equipment (e.g. frequency-hopping radios)
  • ECM

Typical causes of Advantage (non-exclusive):

  • Direct line-of-sight (a common advantage of aerial operations)
  • Powerful source broadcasts (e.g., identifying a radio tower rather than a personal radio)
  • Specific knowledge (e.g., knowing the frequency a target is going to use)
  • ECCM

ECM

Electronic countermeasures (ECM) generate a field of electromagnetic noise that jams radio waves. This jamming can be broad-band (shutting down, for instance, all cellular channels) or narrow-band (disrupting a particular radio communication).

ECM systems come in three ratings: civilian, security, and military, each being progressively more powerful and expensive to acquire.

ECCM

Electronic counter-countermeasures (ECCM) are the ability of a radio system to resist ECM.

ECCM systems come in three ratings: civilian, security, and military, each being progressively more powerful and expensive to acquire.

Electronic Warfare

The most basic of radio equipment simply fails when any ECM is in use: consumer-grade cellphones, walkie-talkies, consumer drones, etc. However, professional-grade civilian systems offer sufficient controls to attempt communication, albeit at a disadvantage.

Attempting to communicate when ECM is in operation requires an opposed role between the operator of the radio system and the operator of the ECM system. Radio systems that can resist do so in four grades: professional, civilian ECCM, security ECCM, and military ECCM. ECM systems come in three grades: civilian, security, and military.

A professional-grade radio system without ECCM faces Disadvantage in establishing communication when civilian ECM is in operation and cannot operate against higher-level systems. A radio system with ECCM faces Disadvantage against a system one level higher than it and cannot penetrate a system two levels higher than it (e.g., civilian ECCM against military ECM). A radio system with ECCM gains Advantage against a system one level lower than it and ignores a system two levels lower than it (e.g., military ECCM against civilian ECM).