Hacking Hardware: Meat and Machine

"Seriously. Now mom lets me stay out as late as I want."

Computer networks in Shadowrun contain real humans in addition to the more familiar electronic devices. So it should come as no surprise that adept hackers can hack their way into people as well as machines. How does that work? I don't know, it's based on revolutionary technology that in the Shadowrun timeline will be invented in 2029, so I don't even feel obliged to explain it.

But regardless of the how, the what is that a hacker in 2071 can induce genuine neural impulses in your brain from across the room. This is not something as crude as a taser (though those also exist in 2071, and can also be used from across the room). This is a targeted generation of specific neural impulses. The energy demands are quite modest, the part which is beyond our current technology is getting the energy to convey itself to specific portions of a brain across the room. But that is a technical hurdle which has been crossed in 2071. And that means that the 2071 hacker spends a lot less time drinking Mountain Dew in his mother's basement and a lot more time running around shooting mind control rays at people than his counterpart in the 2010s did.

Hacking a lone device or empty network.

Whether it's a camera, a trid set, or a refrigerator, the number of times your shadowrunners will run into a device with a computer in it is uncountably large even on a daily basis. And yet, most of these devices don't have a real metahuman being looking after them at all. It is established canon that such devices are child's play to a hacker in the mid twenty-first century. This is a difficult pill for people familiar with 20th century computing to swallow; but in 2071 a device which is simple is not unhackable. Quite the opposite.

In 1989 (or even today for that matter), a computer had to invite logins before they could occur. In 2071 this is blatantly not the case. Instead, enterprising hackers can create connections out of nothing. A simple chip can be mapped, influenced, and co-opted from across the room through induction. The only defenses against this sort of intrusion are jamming (which makes inductive signaling more difficult), a Faraday cage (which makes inductive signaling impossible below a certain signal threshold), and increased complexity. Yes, because of the way computers work in 2071, creating vast expanses of spaghetti code actually makes hacking more difficult, rather than "allowing it at all" the way it does today.

When interacting "legally" (as in, with a proper passcode) with a lone device or empty network, a user has the following options:

Subscribe to Network: Devices are added to and removed from PANs all the time. A device which is not presently part of a PAN is generally speaking capable of being added to one.

Send Commands: This could be as simple as sending an email to start toasting, or a complicated set of instructions which include provisions for potential future events. While some devices only act upon the instructions of their own PAN, there are a lot of machines which are intended to be given simple instructions. From light switches to fire sprinklers, there are a lot of wireless devices which can activate in response to a simple "activate" command.

Submit Data: Devices draw upon a number of data stores in order to go about their daily routines. Facial recognition cameras don't store the biometrics of everyone on the planet, they submit data to archives and draw potential matches from them. A legally subscribed system can submit data along with a request for reply (which is how those biometrics get done), or just send information along with a request to store it somewhere (which is how your credit report keeps getting worse).

Which means that at the core, most things a Hacker does to a lone device or empty network is convincing the machines that one of those things has been done and that the device should respond accordingly. A Hacker can also send destructive impulses: they can jam signals, wipe data, and destabilize devices. This isn't crude 20th century data deletion, where at it's heart the hacker was always trying to convince the target computer that it had a legitimate command to start deleting its own files (though a Hacker can try to do that too). In 2071, a Hacker can directly wipe information right off a system from across the room by inducing random noise into the storage device.

Hacking an orphan brain.

Human brains that are not connected to computers are quite vulnerable to a number of attacks. While the complexity of the metahuman brain is quite high, the properties and weaknesses of the organ are quite well understood by 2070s science. A human with cybernetics is generally never without a PAN, and getting someone with a datajack to the point where they are actually an orphan brain generally requires destroying or shutting down all the cybernetics and is usually outside the realm of possibility outside of a prepared facility.

Adding a PAN: Just as an orphan device can be added to a preexisting PAN, a human brain can have a PAN attached to it at pretty much any time. This is why most people in 2071 go around with a PAN already attached, because there's no reason to believe that they'd have any control over a PAN that someone else added to their brain. This is the basis of BTL, serious brain washing, and many of the other Matrix related horror stories. Once a person has been stripped of an active PAN, any other PAN can be put in its place. The human brain simply evolved long before there was any possibility of Hacking or Direct Neural Interface; and most humans simply have no meaningful natural defenses against such attacks.

Reading: Every brain is different and such, but only to a limited extent. The contents of a brain that is not directly interacting with a computer (and thus having the purity of the organic signal disrupted) can be passively read at a distance with relatively trivial effort.

Direct Attack: An orphan brain can have conformational changes created in it by computers. That is how PANs get established, after all. But if the changes are designed to instead shut off the automatic breathing response or induce a coma state, well that's just unfortunate.

Shadowrun characters will generally not be in a position to be on either side of this cruel equation. Even magicians will put computers onto their bodies and have them set up as exclusive PANs. If they don't know how to do this themselves because they are fresh off the boat from the Amazonian back country or whatever, they will get their teammates to do this for them in the same way as most mundane characters will at some point get a magician team mate to ward off an area for them to hide in. Security guards, wage slaves, mad scientists, and even guard dogs will all have direct neural interfaces set up already when it's time to throw down in the Wuxing office complex. However, if one is truly in the middle of the wilderness, or one has a victim under your complete power, it is entirely possible to brain wipe someone or turn them into a bunraku or whatever.

It is highly advisable to not get captured.

Hacking an occupied network.

The majority of the time a Hacker will be interested in a network which already contains a controlling brain and one or more computer devices as well. In this case, you could potentially influence either the brain or the machines in the network, but the two reinforce themselves defensively.

If you directly attempt to affect the meat in the network, you'll have to be able to target the meat (generally requiring signal range and LOS), and the machines that the brain is already attached to provide a defense. If you attempt to hack into the machines, the processing power arrayed against you is many orders of magnitude more effective as there is a whole human brain that is dedicating part of its massive computing power to network all the devices together to counter the actions of potential hackers.