View Issue Details

IDProjectCategoryLast Update
0029570Heart Of The MachineGameplay IdeaOct 25, 2024 5:43 am
ReporterLiam Assigned To 
Status newResolutionopen 
Product Version0.592.9 Compute Time And Hacking 
Summary0029570: Decrypted Data Uses
DescriptionAt the moment there's a segment near the end of chapter two where you steal some data from a military base, and then construct structures to decrypt it.
I think this could be an interesting source of storylines, specifically related to corprate espionage. In general it could be used as a jumping off point - a way of discovering tasks, potentially with an element of randomness.

Here's some ideas:
- Blackmail: "Survelliance recordings show a suspicious pattern of behaviour from a mid level exec at {corp x}."
  - Leads to side content around uncovering something incriminating (maybe they're doing fraud on their corp?)
  - Follows up with blackmailing them in exchange for their silence, with a list of immediate rewards.
  - Could then start a random timer for a dialog where they ask for your help with {corp x}'s internal security department
  - Finally, they end up dead, and you have to ransack their office/apartment to get rid of anything pointing to you
- Heist: "Shipping manifests indicate a prototype for a new {man portable anti mech weapon} is being moved from the lab to a military proving ground for testing"
  - Several possible approaches: overt attack which will invite massive retaliation, swap it out for a dud, try to pin it on another org (resulting in the escalation of a city conflict)
  - Other org approach could involve stealing their signature equipment, luring them to the location
  - Swap for a dud could involve breaking into the lab to get (redacted) schematics? Or even creating a replica of the transport craft to swap into place?
  - Overt approach could involve temporary deterrence operation around the crash site for the transport
- Development of a corp specific tech/idea:
  - "Espia telecom are working on improved high speed interconnectors. Steal the schematics for use in your mainframe towers."
  - "{Mining company x} have started deploying a new model of mining robot. Break into their compound and subvert one for study."
  - "{construction company y} are prepping a marketing campaign for new microbuilders. Get your shell corp invited to the trade show where they will be publicly demonstrated and study them"
- Tapping: "This decrypted data stream is proving invaluable. Finding a way of getting ongoing access has consequently moved up your priority list"
  - Overt: Seize control of an Epsia Telecom exchange. Deterrence? Eventually fails once they build a new exchange?
  - Less overt: Investigate to find a site for installing a tap. Could eventually have to remove the tap to avoid discovery.
  - Both cases result in it not working, and spawns the follow up idea of installing passive sniffers throughout the city (could be an area coverage type of building, to encourage you to grow your network?)

Decrypted data could also be spent:
- during hacking ("Decrypted data on standard security protocols")
- for an improved hackamajig ("In addition to the usual wide spectrum attack, data recovered on targeting systems and predictive algorithms is used to degrade the effectiveness of units attempting to damage this one" - applies a damage dealt debuff for a few turns to units taunted by the improved hackamajig)
- on temporary clearance ("Stolen security credentials")

In order to smooth over the issue of "I've stolen data from org X, but the storyline I've uncovered relates to org Y", we could specifically state that the first batch of stolen data also contains data from the the intelligence part of the sec force.
TagsNo tags attached.

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
Oct 25, 2024 5:43 am Liam New Issue