Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech FO-C.O.M.L.I.N.K. Mk I

Status
Not open for further replies.

Isobel Nakano

Guest
I


OUT OF CHARACTER INFORMATION

  • Intent: Create a fun new piece of tech/spy gadgetry for First Order Security Bureau operatives and others.
  • Image Source: Hitman 2 video game, edited by me
  • Canon Link: Comlink
  • Primary Source: N/A
PRODUCTION INFORMATION
  • Manufacturer: Black Lotus
  • Affiliation: First Order, Closed-Market
  • Model: First Order Camouflaged Ordnance, Modular: Lethal, Incapacitating, or Nuisance Kit | FO-C.O.M.L.I.N.K.
  • Modularity: Base component consisting of comlink housing, screen, receiver, etc. is standard; battery packs with different deployment kits can be chosen and installed to the base component. The battery packs contain one of three deployment kits: explosive, which detonates an explosive charge on activation; incapacitating, which emits a non-lethal electrical stun charge; and nuisance, which disperses an aerisolized emetic gas in the immediate vicinity, synthesize to induce an overwhelming urge to vomit in human and near-human species.

  • Production: Minor
  • Material: Glass, plastic, metal, circuitry, signal receiver, explosive, electronic pulse, or emetic gas
SPECIAL FEATURES

  • Non-Descript: The devices are meant to blend into their surrounding, resembling contemporary comlinks.
Strengths:
  • Multi-purpose: The device can be activated multiple ways: the primary method of activation is that it activates when a call to the comlink is answered. This is the primary method of use because, due to the constraints on the device and its clandestine nature, the impact of any of the kits is minimal unless the device is held close to the head. However, it can also be activated by declining a call if this mode is selected prior to deploying the device. The device can also be activated by sending a text message to it, containing a specific activation code word, which can be modified by adding a number of seconds to delay the activation, up to 300 seconds for five minutes.
  • Stealth: The device is designed to be concealed both by social stealth (i.e. looking exactly like a plain old comlink) and by construction, since it uses materials designed to pass through basic security scanners.
  • Secretkeeper: Once the device is activated, the device's internal mechanisms are destroyed, making it extremely difficult to trace any identifiable data from the device.
Weaknesses:
  • Not fully functional: While the device looks like a real comlink, it does not function like one aside from receiving calls and messages. It does not have a full operating system or run apps, etc. Therefore, it cannot be substituted for someone's fully-featured comlink and expected to pass.
  • Mediocre range and power: The explosive charge, shock unit, and emetic gas are designed to operate at close range -- with the device held to one's head or at least close to one's body. It could presumably cause injury if it is activated close to the body, but for best results it should be used in as close proximity to the target as possible.
  • One and done: For obvious reasons, the explosive device can be used only once. However, upon activating any of the models, the mechanism is destroyed, preventing re-use of the base unit as well as the modular attachment.
DESCRIPTION
Imagine a comlink that, when answered, explodes. This, in a nutshell, was the impetus behind Project COMLINK. Designed to blend into surroundings and not raise suspicions, it appears as a nondescript communicator, but once activated, will cause one of three nasty surprises: a lethal explosion, a non-lethal but incapacitating electric shock, or an emetic gas, designed to cause severe nausea and vomiting in human and near-human species. The operation of the device is reasonably simple: each is assigned a comm frequency, like a normal comlink. When a calls is placed to the number, a typical 'accept or reject' prompt appears on the screen. Depending on the configuration of the device prior to deployment, accepting the call will cause the device to activate, while rejecting the call may or may not cause activation (this option can be modified prior to deploying). The finesse is getting the device into the possession of its target without them noticing. The device counts on the inherent curiosity of its target and muscle memory -- that someone will activate a ringing comlink without thinking much of it. As a secondary function, the device can be set on a timer by sending a text message to its number. This text command is a codeword, with the option of modifying it for a number. For example, texting 'showtime 300' will set a timer to activate the device in 300 seconds, or five minutes. Unfortunately, unless the device is close to the target, remote activation outside approximately half a meter will be unlikely to cause significant damage, but enterprising agents could use them for a distraction, to blast door locks open, start fires, etc.
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom