Post by STAFF on Nov 25, 2010 11:57:08 GMT -5
THE ELITE PROCEDURES
[/color]
- Assassination - Killing people is sometimes an essential thing in life. Sure it might not be one of the more glamorous occurrences, but it does need to happen in order for the world to progress. The Elite will be tasked with taking out targets that are given to them with the utmost precision and expertise. Failure is not an option and will simply not be tolerated. If failure occurs, then the Elite's secrecy becomes compromised, which is simply unacceptable.
Sabotage - The members of the Elite will be tasked with carrying out different methods of sabotage. Through this the Elite are being tasked with employing corporate sabotage against Ark Industries. In addition, the Elite will be tasked with sabotaging the efforts of the United States government and the Registration Task Force.- Extortion - The Elite will be tasked with using their muscle and showing their force. By doing so the Elite will be able to attain the things that they are required to achieve. By doing so, the Elite will be able to achieve their tasks with more ease by having their enemies bend to their will.
- Espionage - The Elite will carry out missions of espionage where they will need to become invisible to all others around them. In this, they will be tasked with spying and collecting information on their targets. This must be done without their targets knowing. Once again, maintaining secrecy is of the utmost importance and cannot be lost.
- Stealing - Theft may seem like a simple, petty thing to do. Yet, it is an important aspect of the Elite's daily routines. The Elite will be tasked with acquiring certain objects and bringing them back to the HQ for further appropriate actions.
- Infiltration - In addition to espionage, the Elite will also carry out missions where they must infiltrate buildings in complete and total stealth. By doing so, the Elite will be able to gain access to buildings and areas that would not normally have access to.
- Kidnapping - The Elite will be required to do some more than unsavory things. The Elite will be asked to kidnap certain people. By doing this, the Elite will bring them back to the Hive where they will be detained and put in a cell, where they will be kept until the Elite have achieved the the things that they need.
- Interrogation - With their captives in the Hive back at headquarters, the Elite will be tasked with interrogation in an effort to receive information from their subjects. Whether this can be done peacefully or violently is to the discretion of the member carrying out the procedure.
- Torture - Once the Elite has a target in their possession in the Hive, they will be tasked with conducting torture. In doing this the Elite will be required to torture these targets in an effort to receive information and knowledge that is vital to the needs of their missions. Whether it be physical or mental, this torture is necessary, regardless of how the members feel about such matters.
MISC
[/color]
- Hacking - Breaking into computer security without authorization is something The Elite do a lot of. They have some of the smartest or most advanced hackers who are said to be on "the cutting edge" of computing and network technology. Many of the hacking jobs will circulate and focus on breaking into computer security without authorization or using technology (usually a computer, phone system or network) for retrieving information from the subject in question. Using the most advanced techniques they would be able to use their skills to tap into the targeted technology and use it in a way of retrieving valuable and needed information.
Methods:
- Security Exploit - A security exploit is a prepared application that takes advantage of a known weakness.
- Vulnerability Scanner - A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses.
- Password Cracking - Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system.
- Packet Sniffer - A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
- Spoofing Attack - A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program.
- Rootkit - A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators
- Social Engineering - Social Engineering is the art of getting persons to reveal sensitive information about a system. This is usually done by impersonating someone or by convincing people to believe you have permissions to obtain such information.
- Key Loggers - A keylogger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data.
- Cyberterrorism - Cyberterrorism is a phrase used to describe the use of Internet based attacks, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. It can also be defined much more generally as any computer crime targeting computer networks without necessarily affecting real world infrastructure, property, or lives. - Undercover - Being undercover is disguising one's own identity or using an assumed identity for the purposes of gaining the trust of an individual or organization to learn secret information or to gain the trust of targeted individuals in order to gain information or evidence. Working undercover is something The Elite members will do a lot of; it’s the easiest and most efficient way of tackling a job which is required to handle information on a target from the inside. By getting up close and personal with the desired target the agent would be able to gain a lot of information and trust from the individual, this approach is less time consuming then possibly any other forms of approach.
- Rescue - As an Elite it is your job to help those around you, be them fellow specials, members of the public or otherwise. You have a part to play in ensuring the safety of others. Do whatever it takes to keep those you are assigned to safe as they may prove useful in the future.
- Misc - Misc assignments are simply assignments that do not fall under any of the above caterogies.
- Observation - The Observation procedure is simply that. As an agent you are expected to sometimes observe the behaviour of a potential target. Observing doesn’t always necessarily mean making contact with the target as it can be done from afar. However, during observation we hope to learn information on a specific target i.e frequently used hang outs, possible details that can help us keep tabs on them, general information YOU think is important.
Contact is not frowned upon, but some of our targets are dangerous. They are not to know who you work for and the true intentions behind your pressence.
Do whatever it takes to gain information (without blowing your cover) and within reason i.e sleeping with them isn't acceptable.
- Protection Program - The Elites will often stumble upon those who are perfect candidates for the Protection Program. Though the Elites will not be handling these situations, they may be asked to protect and escort targets to the hands of The Company. Remember anyone under your protection is YOUR responsibility, until the hand over has taken place.
The Protection Program was put into action after the Registration Law was put into effect. This program's aim is for the Company to protect and aid anyone who wishes to escape the Registration Law and it's effects. Moreover, the Protection Program will be utilized to protect anyone wanted by the Registration Strike Force.
Through the Protection Program the Company will be offering these people their full support. In this, agents will be paired with the person requesting help. These agents will be be on call 24/7 and will be tasked with assisting their assignment in any way, shape or form.
- Security - The Company may sometimes request that an Elite agent is assigned to protect either a serving Company Agent or a current Company Assignment (most likely in the relocation/support program or protection program) during this assignment it is the agents duty to protect the target from any danger.