Triangulate Signal
Tool
Image | |
Description | Investigate the system for comm signals |
Memory Size | 2 |
Target | Special |
Combat Message(s) | You check the node's data trails, but don't see any strange activity. (If site isn't infected or subverted) You follow the data trails flowing through this node back to a larger viral network. (Site is infected but not subverted) You follow the data trails flowing through this node back to a larger network controlled by [target network owner]. (For subverted and subverted/infected sites) You can't get a very clear picture of the node's data trails. If there's anything strange going on, it's deeper in the system |
Sources
Notes
page revision: 4, last edited: 04 Feb 2015 23:52