The BlackHammer CyberPunk Project

Netrunning in the
PoliceState 2020
An alternate environment for CyberPunk 2020


Front Page | Traders & Transit | Corporate Welfare | Netrunning | Agents

This article is still a work in progress

The Walled Cities of America 2020 are even more apparent from the net. Each city has been disconnected from the internet as a whole and a seperate internal net has been created, governed by a pirated version of the Ihara-Gubb algorithms which have their run-times constantly monitored by Data Control. Personal logins to the city-nets have their physical locus (location) masked by the IG systems, but in exchange, Data Control has complete access to the lists of logins as well as their locations and login number (personal access code).

Upon logging into the local grid, a netrunner's locus and login method are logged by Data Control. Actual travels and interaction in the net are not logged in this fashion, but several other pieces of software monitor much of the activity in many of the sub-nodes on-line.

If the netrunner is currently wanted by Data Control for whatever reason(s) (telespace violations, job interviews, whatever), the runner will be confronted by a MACSystem (Monitor Access Control) which will address him or her by name ("Murphy-Space-Spider, login four-one-seven-forwardslash-sixteen-fourty-four-ess, your login has been monitored and your telepresence is requested by Data Control"). At this point the runner has less than 8 seconds of on-line telepresence before Data Control cuts his or her access unless the runner accepts the invitation to Data Control and steps through the LDL opened by the MAC.

For these very reasons, many of the more illegal "Black ICE" softs include the entire DOG series of software, as they are capable of tracing a netrunner's signal to their login locus - something that only Data Control wants to have access to. (Prices on all DOG softs is increased 5-fold)

Once in the local grid, travel is pretty much as normal, with the net conforming to most of the standard rules. Long distance travel on the other hand is far more difficult, as net-link capable long-distance lines are also monitored by Data Control. To access an LDL, a runner has to approach one of the standard LDL locations and present the resident MAC (see above) with a valid LDL link code. With the proper code, the MAC will open a window to an LDL for the runner to access. Cracking a MAC is difficult, as they are considered to be STR 9 Codegates, and have recognition ability, so when a crack attempt is done by a soft, on the second attempt by the same software, the MAC shuts down for 2d10 rounds while alerting Data Control to an illegal access attempt. MACs will not react in this way to failed attempts to present a password by a runner, but will take 2d6 turns to attempt to process the failed password before it can accept a new password. Since MACs are often in demand, within 20 turns of arriving at a MAC, another user (netrunner or software) will arrive to use it too, often foiling hacking attempts with their very presence.
MonaLisa