Matrix Architecture: A Project Built By Many Minds Answers to None

"Are you telling me that we don't know where the data is?" "Sir, we don't know where any data is, it's a security precaution."

The needs of data management are an ever hungry Mammon which hungers always for more power. As new things become possible to track, managing them becomes assumed, and then additional workload is piled upon the data pushers. As the powers of computers become greater, the ability to do harm with them likewise increases, demanding even more powerful computing to defend against it. This in turn creates more data management possibilities, more workload for the wageslave, more potential for the Hacker and more demands for more powerful computer networks.

Icons

"It's full of stars. And chicken. Chicken and stars."

Everything you interact with in the Matrix is represented by multisensory iconography. Having better sense links can allow you to perceive this iconography better, but all of it is capable of being projected into the minds of people who don't have any direct neural connections on their brain or sensory organs at all.

Program Icons

An Armor program might appear as literal armor or as a horde of weasels which devour incoming attacks, but there is always a tangible representative of any program's activities in the Matrix. Sustained programming does not have condition tracks, but instead merely has the number of hits made when putting them up in the first place. Should that total be zero (or reduced to zero), the program fades away and the icon is destroyed.

Bonus Rule Programming that doesn't even count as a sustained program, such as Pilot, IC, or an Autosoft, can change the appearance of the Network that it's running on, but you cannot target it individually for crashing.

Device/Network Icons

Real devices have an Icon Condition Track, and they have a System, a Response, a Signal, and a Firewall. They can appear as pretty much anything. A full network appears the same as a lone device save that its distributed status is visible to anyone with any hits on a Matrix Perception test. Whether a network is running off a real brain or not can be determined with 2 hits.

Server Icons

Servers are basically hardware whose purpose is to connect multiple networks and datastores together. Servers appear as buildings, parks, caves, or some other spatial metaphor. Many of them are simply open, leaving security to the subunits which connect to them. Others attempt to regulate who and what can use their interchanges for Matrix travel and chicanery. In this case, the building metaphor is often extended with some sort of gate guards or locks or whatever. This manifests as having the server refuse connections to those who don't give the proper passcode. One can still hack in of course, and if the network or device which runs the server is taken down, anyone can log in to the server until it reboots. Since the routing is done with fiberoptics and such, shutting down the core computer does not actually stop hackers from forging connections if that's what they want to do.

Sprite/Technomancer Icons

Technomancers have icons which represent them in much the way that any network does. However there are several important distinctions. A technomancer suffers actual stun damage whenever subjected to Icon damage. A technomancer does not have a separate Icon Damage condition track. Also, a technomancer's icon does not copy itself into servers that it makes connections with. Her icon stays pretty much where she is, and she can act on nearby devices as if she had already established a connection. This positioning is well outside of the capabilities of firewall programming to handle, and IC cannot respond to a technomancer until she takes an action on the device or network that the IC is running on.

A technomancer can also drop her body and move through VR. However, unlike a hacker, her perceptions do not jump through connections along the Matrix, but instead moves physically through the world at the speed of light. This is as if she were physically present at whatever location her icon is, and she can act as if connected with devices and networks within her Signal radius.

Servers

Servers are no longer the source of powerful code crunching powers that the were in ages past. Now that distinction is ironically held by the terminals. Servers are really just glorified routers. Getting into one is rarely much of a challenge for an experienced hacker, and is usually just a backdrop for the real hacking challenge: overcoming enemy security hackers and finding the proper data store with the macguffin in it. If the defenders want to break the connections in any reasonable amount of time, they have to sever the connection that each data store and network has with the server and hope for the best.

Ultraviolet Hosts and Resonance Gateways

There is little practical difference between a Resonance Gateway and an Ultraviolet Host. Both are points in the Matrix which are so powerful of a draw that everyone's networks are automatically Connected to them as if they were a Server while within Handshake Range. Termination of Connection cannot be achieved by any means so long as the Ultraviolet Host or Resonance Gateway still functions.

Some UV Hosts or Gateways have criteria by which they can force networks into full VR or even pull them deep into a Resonance Realm.

Resonance Nodes

Technomancers build crazy collections of computers and equipment that is all supposed to interact in some way to create resonance with the Deep Resonance. These are like networks except that they are really really weird. Think Lain's room in Serial Experiments. They get liquid cooled by having water fall on open circuitry. This doesn't seem to harm anything. These nodes do not run programming particularly, but they are required for submersion and registering. It takes 1 day and 500 nuyen times the next rating point worth of various electronics (one need not have actually purchased any of them) to increase the rating of a Resonance Node. A technomancer can ultimately increase a Resonance Node to up to twice their Resonance. They always know where all the parts go, and while active it is nigh impossible to hack something which is inside (the rating acts as an additional Firewall). Resonance Nodes are not particularly portable.

Resonance Realms

"Where we're going we don't need... roads."

The Resonance Realms are as bizarre as required to tell the story. Similar to Astral Metaplanes, the Resonance Realms don't get any explanation. Sometimes one wanders through them and they are like an extended server where characters run through as networks in VR, keenly aware of the limits and capabilities of their software. Other times, characters appear to be in VR so realistic that it holds the appearance of an alternate, yet fully real physical world. We could take up hundreds of pages ranting on this subject without shedding a whole lot of light on it, so best we cut it here.

Background

"How long will you live with small ram rod?!"

Most of the civilized world has a pretty solid Matrix connection. There are places where connectivity is, for one reason or another, crap. And those areas are said to have Background. Matrix Background and Astral Background are similar concepts game mechanically. Background makes it hard to get wireless signals in and out, which may or may not be a problem for a Hacker if they have sufficient spools of fiber optic cabling. But technomancers and sprites rely heavily upon the Deep Resonance, and when it becomes harder to hear it (for whatever reason) their powers diminish massively. Like Astral Background, the Background in the Matrix is measured from 0 to 6, with more being worse.

Dead Zones

Areas with a dearth of Matrix connections and backbone infrastructure can be annoying. The rating represents how far away connectivity starts up again. A hacker must have a Signal Rating higher than the rating of the Dead Zone or they can't use any Matrix ranged actions. They can still connect directly to things of course. This harder on Technomantic icons, who simply have their Resonance (or Rating) reduced by the rating of the Dead Zone. Dead Zones are not affected by ECCM under any circumstances.

Spam Zones

Areas filled with malicious or merely unwanted traffic can also be annoying. The rating of the Spam Zone indicates how pervasive they are. The Signal Rating of any network in a Spam Zone is reduced by the rating of the Spam Zone (as is the effective Signal if attempting to broadcast through one, whether you're in it or not). In addition, if the rating of a Spam Zone exceeds the Firewall of a network that is in it the poor victim is subject to penalties as if in uncompensated heavy rain as they are pelted with urgent notices offering them Osamandan riches, troll penises, and knock-off BTL chips that are "just as good" as the brand names. Resonance users have their Resonance (or Rating) decreased by the rating of the Zone.

Static Zones

Like a Spam Zone only they aren't trying to sell you anything. Static Zones are what is created by Jamming. If a Static Zone overwhelms the Signal of a network, that network is off the wireless, but nothing actually happens to them over and above that.

Ratings above 6

It's entirely possible that something bad happens to a technomancer who goes into a Background Zone with a rating higher than 6 and tries to connect with the Deep Resonance anyway.

The Power and the Weakness of Drones

"KY-4? I want all of that on fire."

People are wont to ask "If my drone can roll around shooting people in the face, why can't it send off a hacking attempt? Aren't those both actions done by a Matrix entity?" To which my answer is to go play Duck Hunt. See, pointing and shooting is actually not very difficult. You can do a lot of those tasks on an old school NES. Meanwhile, attempting to destabilize large networks from the outside via signal management is something which modern computers are incapable of doing. And frankly, the computer in your Kriegshund Mobile Weapon Mount is likewise incapable of pulling that off. Attempting the kinds of actions that Hackers do requires not just the processing capacity of several machines hooked together in some crazy fashion, it also requires the kind of pattern recognition and central processing that is normally found only with the brain of a sapient creature. Cameras can record continuously whether anyone is watching or not, and a drone can fly around and shoot things even, but genuine hacking actions just aren't going to happen that way.

What Would Dalmatian Shoot?

When you want to have a drone shoot things, you have a number of options. The best option as far as control is of course to directly control the drone through a VR or AR interface. The drone shoots with your skills and it goes where you tell it to and it acts when you act. But if you can't spare your actions to do that, you have a number of other possibilities. A drone acting on its own gets 2 IPs and has an Initiative of Response + Sensors. But they aren't real sapients, and their decision making abilities are suspect.

Highlighting Targets

Even if you aren't directly controlling a drone, you can designate a target for it to move to or fire upon as a Free Action. It's a separate Free Action to highlight a target for each Drone, and the Drone acts on its own Initiative and uses its own Pilot + Targeting to make attack rolls.

Fire at Will

If you can't be bothered, you can just tell a drone to fire on anything that is in its kill zone. It will draw upon its own motion sensors, IR scanners, range finders, and whatever else to identify potential targets and then it will fire upon them during all of its initiative passes. This can use a lot of ammo, especially if the other side is deliberately messing with it by throwing flares around or whatever.

Identify Targets

Drones can attempt to distinguish friend from foe on their own, but this reduces their firing rate substantially. As in the Basic Book, attempting to identify a target with its own dog brain is a Complex Action. The drone makes a Pilot + Clearsight test and if it succeeds it can identify which targets are friend and which are foe. Remember, it's just a computer program, so it can be thrown off by anything sufficiently well disguised or simply surreal. Once a target has been identified, the drone can happily fire away every subsequent pass until it runs out of targets (so it only fires once in the first round, but twice in the second).