Jump to content

Bucks RFA application


Its Buck

Recommended Posts

In-Game Name: Buck

Steam ID:  STEAM_0:1:570251076

Current Research Rank:  AR

Foundation Test Log(s) (graded 8+/10 only):  

Wanderers Library:

 

Your Operations Advisor Overseer, has informed you there is a group of insurgents collecting foundation data at a field operating base on the surface. They are armed and well secured. How would you approach it? (100+ words):  There are two ways I could go about this:

1) Stealth mission

Firstly I would attempt to get any information on the base and its surroundings, whether it be blueprints, satellite images or a 3D map. I would then examine the base and its surroundings to see what the best course of action would be to infiltrate the base. once I had obtained the needed information I would request that E11 Recon division attempt  to scout the base from a distance and mark down the number of guards and which entrance they are stationed at. I would then inform my operations advisor overseer of my findings and request to send in operatives from the Nu7 Covert Agent division to assist in the infiltration. If given the greenlight to continue with the operation I would have E11 recon division take out any guards that may be on the outside of the base or provide intel on personnel inside the base.  Using the intel from Recon division I would send in the Covert Agents and have them locate the stolen data and either erase/destroy it or recover it and return it to myself.

2) Hard Push

Similar to the stealth mission I would attempt to get any information on the base and its surroundings, whether it be blueprints, satellite images or a 3D map. I would then determine what the weakest spot in the defense was and begin plotting an attack from there. assuming that I outnumber the group of insurgents I would request that any available E11 personnel on surface assist me with the attack. I would start a push from two directions that had the weakest security. utilizing their tactics and weaponry I would have E11 push and clear all the buildings whilst I have a foxtrot helping me search for the data and or any other information on the group of insurgents.

There is a strange SCP that calls himself the “targeter”. When the name of another individual is said within earshot of the “targeter” the “targeter” will teleport to the individual that has had their name said, and run off. How would you suggest the foundation approach apprehension and / or termination of this individual? (100+ Words):  In order to gain a better understanding of the SCP I would treat it as a humanoid entity and attempt standard humanoid containment. whilst containing the SCP no personnel are to speak in front of or around the SCP. Once in custody I would implant a tracking device into the cranium of the SCP so that the foundation can track his location in the event of a containment breach. Once I had secured the SCP in a testing chamber I would obtain 3 Class D personnel. I would give one a nickname and say that nickname in front of the SCP. if the SCP teleports I will note that nicknames can not be used around the SCP.  for the second Class D I would say his designation of "D-####" If the SCP would attack the D class I would note that designations would not and to not use foundation personnel's designations or callsigns. I would have the third D class put a pair of noise cancelling headphones on the SCP and see how it reacted. I would then proceed to say the Class D name and watch if it attacked him or not. If the noise cancelling headphones proved effective then we would attempt to have the headphones on the SCP at all times to avoid a containment breach. I would then draft a special containment procedure and SCP file for my Operations Advisor to read and doccument.

An abandoned camp site has been discovered on the surface, hidden incredibly well within the brush. There are documents, newspaper scraps, as well as an old laptop with unknown data being transferred to a suspicious I.P. address. How do you react? (100+ Words): I would first swab the area for any fingerprints or any strands of DNA such as hair. If able to find any I would test it to see if I could get a positive ID on whom had interacted with this set up. I would then attempt to trace the IP address and get a location on where the data was being sent to. Once I have a location on where it was going I would stop all transmissions and download the files onto a USB hard drive. once completed I would take a photo of the setup and collect any scraps of newspaper and doccuments and place them in an evidence bag so they could be used for further examination and testing. after this I would either destroy the setup or report it to an MTF group depending on the technology being used. 

RETIRED

SCP-RP:Delta-5 CPT | Deputy Head G9| Medical DHFW Doctor. | E11 1LT | Head Ranger | D4 Vanguard FF5 | RnD EOI V3 Canibal

ImperialRP: MC 1LT Bacon 3817 |  DT SGT FF5

 

Link to comment
Share on other sites

Inducted

Welcome to RFA!

Former SCPRP: CI R&D Chief Director of Operations || Research Administrator || RFA Operations Advisory || RRH Analyst Xray 77 || CI General || Senior Event Team || CI Lieutenant Commander || Exemplary Investigator Award Recipient || STF D4 Poseidon PL7 || A1 SPC "Quantum"

Former ImperialRP: Naval Captain || Security Director || GM VI 

Former PoliceRP:  EMS Captain || RRU Rapid Response Team Manager || FBI Assistant Director 

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...