Triangulate Signal

Tool

Image triangulate.jpg
Description Investigate the system for comm signals
Memory Size 2
Target Special
Combat Message(s) You check the node's data trails, but don't see any strange activity. (If site isn't infected or subverted)
You follow the data trails flowing through this node back to a larger viral network. (Site is infected but not subverted)
You follow the data trails flowing through this node back to a larger network controlled by [target network owner]. (For subverted and subverted/infected sites)
You can't get a very clear picture of the node's data trails. If there's anything strange going on, it's deeper in the system

Sources

Notes

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License