Jump to content

Johny boi's RFA Application


Johny boi

Recommended Posts

In-Game Name: Johny boi

Steam ID: STEAM_0:0:10013504

Current Research Rank: RS

Foundation Test Log(s) (graded 8+/10 only): 

 

Your Operations Advisor Overseer, has informed you there is a group of insurgents collecting foundation data at a field operating base on the surface. They are armed and well secured. How would you approach it? (100+ words): 

Considering they are stealing Foundation data and came well-armed and prepared, it's safe to say they are hostile and prepared for a fight. I would assess the FOB from a safe distance by getting a good idea on the number of insurgents and the type of weaponry they are armed with. After assessing the FOB, I would contact MTF and organize a strike team to take out the insurgents and resecure the data. I would use this time to find any weak points in their defenses and identify key points of interest in the FOB(Armory, Command Center, Data/Upload Center, Medical Station) that may aid the MTF strike team in securing the FOB. Using the information gathered previously, it would be best to target key personnel among the insurgents first in order to destabilize their command structure and defensive capabilities. If the insurgents prove to be gathering data in manner that would result in too much lost data by the time MTF would be able to respond, an airstrike could be called to eliminate the FOB in a timely fashion. After the FOB has been destroyed, the surrounding area should be searched for insurgents that had possibly escaped as well as civilians who may have witnessed the strike team or come into contact with the insurgents prior to foundation discovery of the FOB.

There is a strange SCP that calls himself the “targeter”. When the name of another individual is said within earshot of the “targeter” the “targeter” will teleport to the individual that has had their name said, and run off. How would you suggest the foundation approach apprehension and / or termination of this individual? (100+ Words):

Seeing as the targetter poses no immediate threat to human life, termination attempts should be used as a last resort and we should use this initial interaction time to watch the targetter to see what happens after he runs off, making sure to mitigate his interaction with personnel outside the foundation. Due to the targetter's ability to teleport, restraining him would prove futile so in this observation time, 2 field agents should be sent to watch the targetter as they are able to say each other's names in order to draw the targetter away from civilians if necessary. While this is occurring, a soundproof chamber outfitted with an external speaker system should be constructed, such that sound can leave, but not enter. Once it has been constructed, it's just a matter of placing a D-class into the containment chamber and having them say their own name in order to have the targetter teleport into the chamber to be contained. If termination is the best course of action, the chamber could be outfitted with a ventilation system capable of pumping gas into or removing the air from the chamber. After the targetter has been successfuly contained, the area around it's first discovery location should be swept for any civilians who may have come in contact with it.

An abandoned camp site has been discovered on the surface, hidden incredibly well within the brush. There are documents, newspaper scraps, as well as an old laptop with unknown data being transferred to a suspicious I.P. address. How do you react?
(100+ Words):


Since the laptop is currently uploading data, it's likely the person responsible for the camp is not too far away, so MTF units trained for surface missions should be contacted immediately to secure the site and establish a perimeter to ensure only authorized personnel leave or enter. While waiting for MTF, it's best to leave the site untouched and back off to a safe distance for monitoring in the event the person responsible arrives before MTF do. Once a perimeter has been secured, all documents and newspaper scraps should be secured and sent for analyzation to determine whether or not the information poses a threat to the Foundation. The laptop should be secured and analyzed to determine the sensitivity of the data being transferred. The IP address receiving the transferred data should be tracked geographically and additional teams should be sent to locate the device receiving the data to ensure nothing is able to be leaked. After all information and data has been successfully secured by foundation personnel, the camp site and laptop should be examined by a forensics team in order to determine the person responsible for the transferring of data so that they can be located and interrogated. 

  • Like 1
Link to comment
Share on other sites

YOUR MESSAGE HAS BEEN RECEIVED.
WE WILL BE WATCHING YOU CLOSELY.
STAND BY FOR YOUR NEXT MESSAGE.

OA-3

The Double Barrel Bandit...

Former Ranks: RRH Analyst Echo-39 - G9 Wendigo GF5 - Elite Medic - Deputy Head of Medical Research D5 2nd Lieutenant - Deputy Head Raptor Operative - GOC Private x2 - CI Sergeant - O1 Specialist x2 (first O1 enlisted) - Event Team Executive AWPD Office Manager - RAU Advanced Unit - Advanced Medic - RFA Secretary of Investigations and Counter Intelligence - RAU Sentinel Unit - D5 Sergeant Major Head of Research - CI Captain - EOI Capulet - E4 Goon

CCs owned: Class D Special Forces - Horizon Initiative Legion I II and III Horizon Initiative Apollyon Unit

Link to comment
Share on other sites

  • 3 weeks later...
  • Curtis locked this topic
Guest
This topic is now closed to further replies.
×
×
  • Create New...