Jump to content

Ren's RFA Application


ren1point0

Recommended Posts

In-Game Name: Ren 

Steam ID: STEAM_0:0:192965920

Current Research Rank: AR

Foundation Test Log(s) (graded 8+/10 only):  

 

 

 

Your Operations Advisor Overseer, has informed you there is a group of insurgents collecting foundation data at a field operating base on the surface. They are armed and well secured. How would you approach it? (100+ words): Contact reconnaissance elements from Mobile Task Force Epsilon 11 "Nine Tailed Fox" to monitor said FOBs activities. Said recon element will also record the number of enemy insurgents present at the FOB, which will determine the response by the Foundation, listed below.

2-15 enemy insurgents: 5-10 operatives from Mobile Task Force Nu-7 Covert Agency and Delta-5 Cryptography Task Force will participate in a night raid on said camp, with 1-2 RFAs present to coordinate the operatives. Operatives will sweep the camp terminating or capturing any enemy insurgents as they see fit. Operatives will only be permitted to use small-arms as to preserve things such as computers, servers, radios, and paper. Once the FOB has been cleared, RFAs will move in to collect and preserve aforementioned evidence present. If any enemy operatives have been captured, they will stripped and held at the camp until all MTF and RFA have moved out of the camp, and will be interrogated inside Site-50. RFAs will store paper clippings, newspapers, as well as upload all data they find on computers and servers onto flash drives for further investigation back at Site-50.

15-30 enemy insurgents: Three squads with ten operatives each of Mobile Task Force Nu-7 "Hammer Down" will make a small hidden perimeter around the camp. All three squads will surround the FOB, then open fire once night falls. Said squads will press the element of surprise, speed, and violence of action by moving rapidly into the camp, quickly clearing out all hostiles as a team. Nu-7 operatives will only be allowed to use small-arms. Operatives will also be permitted to use fragmentation grenades, but only when deemed absolutely necessary as to preserve evidence. After all hostiles have been terminated, RFAs will move in, collecting information in a similar manner to the aforementioned situation. Operations Advisory Agents will perform command and control for this mission back at Site-50, and coordinate all three squads. Analyzation of evidence collected will be performed back at Site-50.

There is a strange SCP that calls himself the “targeter”. When the name of another individual is said within earshot of the “targeter” the “targeter” will teleport to the individual that has had their name said, and run off. How would you suggest the foundation approach apprehension and / or termination of this individual? (100+ Words): Inform all personnel in the containment zone said "targeter" is present in to remain absolutely silent. Four squads consisting of three Mobile Task Force Nu-7 "Hammer Down" operatives each will be dispatched to clear out said containment zone to find the "targeter". Once said "targeter" has been located, Nu-7 will attempt to restrain the "targeter" and move him to Temporary Euclid Class Containment. Nu-7 operatives will be permitted to terminate the "targeter" if he violently resists restraint. Once the "targeter" has been moved to Temporary Euclid Class Containment, RFAs will interview the "targeter" to gather more information about the anomaly, as well as conduct several more basic tests like weight and height measurement.  Using this information, RFAs will classify and devise containment procedures for said "targeter".

An abandoned camp site has been discovered on the surface, hidden incredibly well within the brush. There are documents, newspaper scraps, as well as an old laptop with unknown data being transferred to a suspicious I.P. address. How do you react?(100+ Words): 1-2 RFAs as well as 1-3 Mobile Task Force Delta-5 "Front Runners" Cryptography Agents will arrive at the camp site and begin collecting, preserving, and reading information. Delta-Five Cryptography Agents will geolocate said I.P. address for further investigation. If possible, they will also transfer some data to a flash drive. RFAs will read over then collect said documents, newspaper scraps, and  items that could possibly reveal who the occupiers of the now abandoned site were. Once the IP address has been geolocated, RFA will collect the laptop for further investigation back at Site-50. Depending on how close the IP address is, RFA and D5 agents will either move towards the geolocated position to investigate or return to base. CTF D5 agents will attempt to extract all information from the laptop when back at Site-50, and utilize said information to find what and why information is being transferred to said IP address. RFAs will also analyze all aforementioned pieces of evidence. 

BECAME R

  • Dislike 1
Link to comment
Share on other sites

+support

-this man was a Nu7 CMD and was really great a research, combat and positioning

Freedom at last.

Former: Assistant Inspector, Head of Longshot, Research Assistant Supervisor & Operations Supervisor, G.O.C. Officer & Head of bulldozers, CI COL, EOI D-2, DJ

Former: Scout Captain, Second Lieutenant, Senior Crewman, Storm Commando Captain.

Link to comment
Share on other sites

+Support The most pog gamer also great guy and player 

Ranks: Former DHWD SEC MAJ | Former Nu7 SM | Former Research RM | Former Foxtrot-15 | EXM

CCs: (Owns) Omnipurpouse Furry Force, (On) MTF Rev 26 'Vigilant Hero' , Snowmen , MTF Unit Heaven Ascendants A Normal D-Class 

"Efforts and courage are not enough without purpose and direction." --- JFK

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...