Jump to content

Grape's RFA Application


Stuffstealer

Recommended Posts

In-Game Name: Grape

Steam ID: STEAM_0:0:102584739

Current Research Rank: Senior Researcher

Foundation Test Log(s) (graded 8+/10 only): 

 

Your Operations Advisor Overseer, has informed you there is a group of insurgents collecting foundation data at a field operating base on the surface. They are armed and well secured. How would you approach it? (100+ words): 

     My first priority would be to collect as much information about the base and the insurgents in them as possible. I would collect information about the base layout, how long this base has been active, any security weaknesses that can be exploited, if the insurgents belong to any known GOI, as well as any other information that could help us in developing an entrance strategy. All of this information will be acquired by interviewing locals, conducting surveillance of the base with drones or from an elevated point, tailing any vehicles that are seen coming to or from the base, attempting to hack into any security cameras (if they have them), and any other source of information that we can get our hands on. Since the insurgents are heavily armed and secured, all of this information will be needed to decide the perfect time and place to strike. For example, if the insurgents were known to not have possession of thermal or night vision goggles, we would know to stage our attack at night. Once we strike, because of all the careful planning, the insurgents won't stand a chance against our forces. Once the area is secured, the new top priority is to see what information was being collected, where it came from, and where it is going/went. We will also try to collect any information about the insurgents, as well as any of their other bases and operations.

There is a strange SCP that calls himself the “targeter”. When the name of another individual is said within earshot of the “targeter” the “targeter” will teleport to the individual that has had their name said, and run off. How would you suggest the foundation approach apprehension and / or termination of this individual? (100+ Words): 

     To first contain the targeter, we need to know how hostile this anomaly is, how hard it is to contain, and how resilient it is, all of this information can be found out relatively quickly. Once we find the targeter we should detain it in a suitable temporary containment cell while a permanent containment cell is under construction. During this period of time, there should be earmuffs applied to the anomaly and temporary soundproofing should be installed. An ideal containment cell for the targeter would be a small cell with intense soundproofing installed. The cell should be located underground with a soundproof chamber leading to the cell. There should be absolutely no PA system connected to or in range of the cell, and all personnel going into the CC to conduct tests must be informed of the anomaly’s properties and told not to utter the names of anyone under any circumstance. There should be cameras that have audio recording capabilities throughout the cell. All phones should be left outside the cell, as well as any other technology connected to the internet that possesses a speaker. Also, if possible, ear muffs should be attached to the anomaly at all times. If the targeter ever breaches containment, a D-class will be brought to the CC and gagged. Once the name of the person the targeter teleported to is discovered, as well as their approximate location, we should dispatch agents to play the name of the D-Class on a megaphone throughout the area. Once the targeter hears this, it will teleport to the D-Class and RC itself. The D-Class should also be either collected from the CC or terminated once the targeter is RCed.

An abandoned camp site has been discovered on the surface, hidden incredibly well within the brush. There are documents, newspaper scraps, as well as an old laptop with unknown data being transferred to a suspicious I.P. address. How do you react?
(100+ Words): 

     Firstly, the camp should be searched for any remaining possible threats, when none are found and the site is deemed abandoned, we should examine the laptop for clues about its origin, its last user, when it was manufactured, what kind of data is being transmitted, where is it being sent, etc. We should also trace the IP to a location, which can then be investigated by field agents in that area at a later date. The next step should be to sever the laptop’s connection to the internet and take it, along with any other suspicious/useful objects and documents back to the site (everything we take back should be searched for trackers just in case this whole thing was a trap). Once we are in the site, we will have access to many different tools which will let us figure out information about the computer and the campsite. This will hopefully let us learn about what information the laptop has in it.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...