Covert Ops and Security: Difference between revisions

From gurps
Jump to navigation Jump to search
 
(2 intermediate revisions by the same user not shown)
Line 73: Line 73:
* [[Security Fences]] ([[TL6]]-[[TL8|8]])
* [[Security Fences]] ([[TL6]]-[[TL8|8]])
* [[Sonic Barrier]] ([[TL9]])
* [[Sonic Barrier]] ([[TL9]])
* [[Security Fences#Wire Fences]] ([[TL9]]-[[TL11|11]])
* [[Security Fences#Wire Fences (TL9-11)|Wire Fences]] ([[TL9]]-[[TL11|11]])
* [[Neural Disruptor Field]] ([[TL10]]^)
* [[Neural Disruptor Field]] ([[TL10]]^)
* [[Gravity Web]] ([[TL10]]^)
* [[Gravity Web]] ([[TL10]]^)
Line 130: Line 130:
* [[Electronic Cuffs]] ([[TL9]])
* [[Electronic Cuffs]] ([[TL9]])
* [[Explosive Collar]] ([[TL9]])
* [[Explosive Collar]] ([[TL9]])
* [[Explosive Implant]] ([[TL10]])
* [[Power Damper]] ([[TL9]]^)
* [[Power Damper]] ([[TL9]]^)
* [[Sensory Control Restraints]] ([[TL9]])
* [[Sensory Control Restraints]] ([[TL9]])

Latest revision as of 07:41, 6 July 2014

This page covers gadgets intended for law enforcement, secret agents, criminals, and special ops teams... although as technology advances, many of these gadgets may also be used by ordinary citizens to maintain their own security.

Deception and Intrusion

Sometimes the most important items in an adventurer's toolkit are the ones that allow him to get into places where he shouldn't, find out things that he isn't supposed to, and get away undetected. At times like that, technology may be the only ally that he can trust! This section presents devices that are useful to commandos, spies, and thieves – anyone who has to tangle with a security system or elude detection.

Burglary, Infiltration, and Sabotage

These gadgets are useful for cracking security measures, or entering hard-to-reach places. Items listed elsewhere that are helpful for burglars include explosives, laser torches, plasma torches, sonic probes, and tool kits.

Gadgets mentioned elsewhere that are especially useful for infiltration include diver propulsion, flight packs, and stealth drop capsules. Demolitions and gremlins are useful for sabotage operations. Portable fabricators, nanofacs and replicators are extremely useful for any black ops team!

Forgery and Counterfeinting

Most ultra-tech forgery involves the gaining of passwords, personal information, or biometric data through computer hacking, the breaking of encryption, corruption, theft, coercion, or simple carelessness. However, some special tools are also available.

Disguises and Smuggling

This section covers innovations in personal conceal- ment and the smuggling of people or items. [[Distortion chips]] are another useful technology

ECM and Stealth

These electronic countermeasures are used to jam or deceive surveillance sensors.

Computer Intrusion

These hardware devices retrieve data from computers or their interfaces. For online intrusion, use software tools for Computer Hacking or Computer Programming. For hacking encryption, see Quantum Computers.

Security and Surveillance

Even as technology gives thieves and spies the ability to bypass old security systems, it creates new ones to replace them. In addition, as the average criminal becomes more sophisticated, so does the cop who has to track him down. This chapter covers security systems that protect against both physical and electronic intrusion, as well as advanced law-enforcement tools that allow police and security forces to track, identify and detain criminals more effectively – or simply suppress a riot.

It might be possible to build an impregnable security system – but the more layers of security that are added, the harder it is get anything else done. If an executive has to go through six different scans every time she enters or leaves her office for a cup of coffee, or a computer requires 20 minutes of identity verification before it will let anyone use it, personal convenience and efficiency will be sacrificed. Most systems compromise between security and ease of use. A system that is too complex or too sensitive can easily be degraded, overloading its monitors with input. The simplest method of fooling an electronic security system is to convince the human component of the security system that the electronic element is malfunctioning. After receiving several false alarms, a human operator or self-programming computer may ignore input from a sensor or just turn it off, leaving a hole in the defenses.

Barriers, Mines, and Traps

Many dangerous traps have low LC. Even low-CR societies frequently ban lethal traps, on the principle that property is not as important as life.

In addition to the systems described here, construction foam, force screens, stasis webs, and wards make useful barriers.

Security Scanners

Security scanners are fixed sensor installations designed to identify intruders.

Surveillance and Tracking Devices

Passive sensors and audio-visual recorders are the basic tools of surveillance. Active sensors are useful if the subject lacks appropriate detection gear, or if letting him know he's being watched isn't a problem.

The devices that follow are useful for covertly obtaining information, or for following people or objects.

Counter-Surveillance and ECM

These devices are used to warn of or defeat surveillance attempts.

Enforcement and Coercion

This equipment is used to enforce laws, control populations, and compel obedience. It can also easily be used for sinister purposes, such as torture and mind control.

Forensics and Lie Detection

Forensic equipment is used to analyze clues, usually at crime scenes. In addition to this specialized gear, investigators use chemsniffers, portable labs, medscanners, ultra-scan, or even time-scanners.

Lie detectors help determine whether the subject believes he is telling the truth. It's up to the investigator to decide if that subject is correct, or if he has a faulty memory, is delusional, or was brainwashed. Within these limits, ultra-tech gear using advanced neurotech is much more reliable than the polygraphs used at lower TLs.

Restraint and Riot Control Devices

This equipment is used by security forces to restrain individuals, or to control and disperse crowds of demonstrators or rioters. Other useful equipment includes:

Barricades: Construction foam, construction swarms, slipspray, and wards allow quick erection of barricades to channel crowds and block streets. Holoprojectors may create illusionary barriers to divert an unwary mob.

Dispersion: Techniques useful for scattering crowds without leaving a field of stunned, injured, or dead bodies are microwave pain beams (MAD) and sonic nauseators. Launchers or sprays may deliver riot gas, sonic nauseators, warbler warheads. Shock clubs and neurolashes let an officer defend himself, and can be a painful but non-lethal deterrent.

Shields: Riot shields, or force shields can be used not only as defenses, but also to push or slam rioters.

Interrogation, Brainwashing, and Animal Control

Unlike passive lie detection gear, these systems are used to actively retrieve information, as well as to alter, erase, or enslave the minds of people or animals. See also Drugs and Nano.

Black Ops Robots

Robots are perfect for many security and intelligence missions. They don't fall asleep during boring patrols or on surveillance missions, they can be relied on to sacrifice themselves or act without remorse as necessary, and they may willingly self-destruct or wipe their memories to avoid capture.

In addition to the types covered below, bush robots, combat androids, scoutbots, and warbots are often used for these jobs. Nursebots or medical bushbots also make effective interrogators.