Black ICE
The infamous “Black ICE” programs are generally Complexity 5+ Trigger sequences that monitor a particular ICE program, and attempt to Analyze, Search for, penetrate the defenses of, and Damage the cyberdeck of anyone attempting to Breach or Spoof it.
Analyze fires to identify the unauthorized user; once it has enough information, it Searches for the user’s physical access point. That found, Breach (or Spoof) takes down the cyberdeck’s onboard firewall, leaving the decker vulnerable to one or more invocations of the Damage program.
At each stage, the Trigger retries failed programs (subject to the normal penalties for subsequent attempts) until they succeed, or until it loses the target. The most ruthless repeatedly invoke Damage programs, even after succeeding . . .