Q MANUAL
SECTION 3:  PERSONAL EQUIPMENT

Surveillence Equipment
Countersurveillence Equipment
Personal Protection
Other Tools


SURVEILLENCE EQUIPMENT
 

AJ-1800 PERSONAL KIDNAPING RECOVERY SYSTEM
This is a small transmitter and receiver group that is designed to allow the tagged object -- a briefcase, person, or vehicle --
to be tracked by the person with the receiver.  the unit is the size of a small remote contorl unit.  Range is about 1 km
using a radio system or worldwide using the new cellular units.

CHP-1 PINHOLE CAMERA
this camera is a CCD chip that is directly connected to the lens, offering a resolution of 400 lines of color and a 72
degree field of vision.  the unit boradcasts a good half mile, but is susceptible to electronci countermeasures and interference.
It is about the size of an American quarter.

DECORDER
A small device, about the size of a pager, that can decipher the signals from a telephone, giving the monitoring
personnel the correct phone number dialed by the person under surveillence.

DF-42 DIRECTION FINDING SYSTEM
the DF-42 uses a series of antenna that are placed a certain distance apart and linked to a central processor unit that
traingulates the direction of a signal based ion time-strength received from each receiver.  The operator gives an INT EF5
roll to determine the direction oft he signal.  A result of 1 or 2gives a fix, a result of 3 gives a cut (usually
within a few yards or miles of the target), and a 4 a line of bearing.

RDF-50 DIRECTION FINDING SYSTEM
The RDF-50 is an improved version of teh DF-42.  Receiver antenna units can be remotely placed, either in vehicles
or manpacked bases.  the units can be spaced up to 2 km apart and send their data via radio to the base unit with
the CPU.  With this system, the chance of error is lower, but the units malfunction more often.  INT EF5 to
use with a result of 1 or 2 giving a fix, a 3 a cut, or a 4 a line of bearing from the CPU.

EARRING BUG
Inside a large earring is an Echo-style bug, one that is keyed by the wearer, then is voice-activiated after that.
the bug can broadcast only a short distance to a recorder, usually secreted nearby.  It operates for 2 hours only,
then the battery must be replaced.

EARRING TRACER
Much like an earring bug in size and performance, the tracer is usually tied to an AJ-1800 system or similar setup and allows
the wearer to be tracked from a remote location.  The earring broadcasts when it reeives a query from the base unit, so
it does not transmit continuously to conserve battery power and avoid detection.  The average battery life is around 6 hours.

ELBIT SC3 SNIPER COORDINATION SYSTEM
A unique system that ties the telescopic sights of various shooters to a base station through wire or radio.
this allows a mission comander to coordinate sniper fire for maximum efficiency and stealth, as well as assess
the situation of his operatives.  Range is about 5km in the open, 1 km in urban environments.  The batteries
provide 8 hours of power.

FIBRE-OPTIC CAMERA
These are CCD cameras attached to a flexible length of optical fibre with a lens at the end.  they are small and can be planted
very discretely.  The length of the fibre does not matter, but if the transceiver can be placed far enough away from the
target, it will not be compromised by electronic sweeps.  Usual field of vision is about 72 degrees.

LASERMICROPHONE
Using a laser to measure vibrations in a window or light wall bweteen the observer and target, the lasermike
uses a complex receiver/computer to decipher the data and turn it into sound.  the mike is accurate up to 3 km with
line of sight, but can be jammed by heavy background noise causing vibration on the listening surface, or by smoke refracting
the beam.  PER EF5 to understand pickup.

NECKLACE DIGITAL CCD CAMERA
Disguised in a guady lady's necklace is a CHP-1 camera that records its data on a special memory chip (2MB) inside
the necklace.  The chip is accessed by way of a special PCMCIA card that slots into a computer for processing.
Image quality is comparable to a cheap 35mm camera.

PROTRAK SYSTEM
This monitoring systme uses a special cellular transmitter/GPS locator to locate the position of the tagged
person or vehicle and send that information to the base unit.  The range of the tracker bug is a kilometer to
a klick and a half, but can be detected with an active search at PER EF7.  The ProTrack can be modified to accept
RF communications, cutting down on the chance of discovery, but also limiting the range to target.

REARVIEW SUNGLASSES
These shades allow the wearer to watch his back by way of a special lens in the arms of the glasses.  Another
version of this device has a heads-up display that receives its data from a remote camera...possibly in a pack of
cigarettes.

SHOTGUN MICROPHONE
An ultrasensitive microphone capable of picking up sounds out to 100 meters, but best when the target is within
50 meters.  Sensitivity varies, but it allows a PER EF5 roll to hear conversations.

SONY ZBOX-1 VIDEO RECORDER
The smallest, most portable recorder available, the ZBox uses 8mm resolution and can tape five hours of data.

X-RAY SUNGLASSES
These shades use a special lens and a faint ultraviolet transmitter in the arm of the glasses to 'x-ray' through
clothing.  they will not penetrate a thick wall or door, nor metal, allowing the user to spot hidden weapons, etc...

2.4GHZ VIDEO TRANSMITTER
About the size of a pack of cigarettes, this unit can be used to send footage from a CCD camera or a monitor
base to another site, acting as a repreater.  It can only transmit about 100 meters.
 

COUNTERSURVEILLENCE EQUIPMENT

B-411 WIRETAP DETECTOR
Like the VL-34, this is a countermeasures system that detects surveillence devices on a phone line.  It will detect
a bug on the phone as well as increased resistance on the phone line, indicating a bug in the wiring or at the
junction box.  It will detect surveillence 90% of the time.

CC-7000 ROLLING CODE SCRAMBLER
Mode by Communications Control Systems, the CC-7000 coded telephonic communications by way of a
rolling code that changes every 1/10th of a second.  Decoding requires special equipment and a Cryptography
vs. EF2.

CCX-1000 EXPLOSIVES VAPOR DETECTOR
Made by Communications Control Systems, this is a hand-held detector that reacts to the vapors of most
explosives.  It is battery-powered and requires two minutes warm-up.  It is 80% effective.  A larger version,
the CCX-2000 is a booth-like system using heated air currents to draw off molecules from the outer layers
of an explosive.  It is used in airports around the world and is 95% effective.

EDE ADVANCED BUG DETECTOR
Working like a Geiger counter, the detector clicks as the person gets closer to a bug.  It can be used
for video, audio, and recording devices, as well as on phones, picking up on signals between .5 and 2.5 GHz.
the detector is 80%accurate.  Anothing version acts like a buzzer, instead of an audio cue.

SC-1000 SATELLITE COMMUNICATIONS
Packed inside a ballistic Samsonite case is a telephone receiver, special transmitter, antenna, and a laptop
computer allowing full communications, including datafeeds through stecured satellite communications.
The US military has a version called the MX-2020 by Motorola.

VOXBOX
A digital voice disguise device, the VoxBox uses sixteen different voice types to disguise the user's voice.
It obscures vocal and stress patterns as wel, making identification improbable.  It connects to the phone's
mouthpiece.

PERSONAL PROTECTION

AL-22 'SAFETY BLANKET'
Essentially a very powerful flashlight, the AL-22 stuns the victim by flashing a ultra-bright beam of light.
A stun roll versus EF6 must be made.  Any success is read as the negative modifier to any action for that number
of rounds (i.e. a success of two would yield a -2EF to actions for two rounds.)  A failure leaves the victim stunned
completely for 1d6 rounds.

AIR TASER
Used as a contact or short distance weapon, the air taser uses 'T-waves', a type of ultrasonic wave, to attack the
nervous system, causing the vicim to 'short-circuit' and render them temporarily incapacitated.  Victoms make a stun
roll vs. the success of the shot.  Effects are as per the AL-22 above.

CHOATE BLET KNIFE
This ceramic blade is undetectable by metal detectors.  It holds a good edge, but is mostly for thrusting.
+1DC, CON -2, DRAW +1

STINGER SELF-DEFENSE WEAPON
the Stinger, also know as the Fox, is the creation of a Romanian inventior.  It is a smal binary propellant gun that
fires a dart, bullet, or gas pellet at a target.  It can be disguised as a key ring, car remote, or article of makeup.  It is
discovered on a PER EF3.

PM
S/R 
AMMO 
DAMAGE
CLOSE
LONG 
JCON 
JAM 
DRAW 
RELOAD 
-1 
0-1 
3-5 
-3 
99 
+1 
Game Information:
Any poison or drugged dart/pellet will have inly a stun effect at WIL EF10, plus the effect of the drug/poison.

STUN GUN
Delivering an intense shock of up to 40,000 volts, the stun gun does no permanent damage.  The victim rolls versus STR EF3.
Failure renders the victim unconscious for 1d6 minutes, success effects the person as per the AL-22 above.  Most stun guns
have a charge for 6 attacks.
 

OTHER TOOLS

ELECTRIC PICK GUN
An electrically-powered version of teh lockpick gun, this toll aids the user in opening a lcok without fuss,
quickly.  Gives a +2EF to lockpicking rolls and halves the time for success.

ELECTRONICS DISTRUPTOR
A handheld device that creates an electromagnetic field that will disrupt most electronci devices out to
10 meters.  It is 75% effective against unshielded equipment.

ELECTRONIC EARPLUGS
Using a special electronic sensor, these earplugs amplify small sounds PER +1EF, but still protect from loud
noises, like gunfire and explosions.  (WIL +1EF vrsus stun rolls.)  They generally operate for 3 hours.

FLASE FINGERPRINTS
Made of a micropore latex, these prints are pasted to the ends of a person's fingertips and leave the prints
of a chosen person.  the micropore allows oil to escape and leave the prints.

MAGNETIC CODEBREAKER
Consisting of a magnetic keycard, tied to a small computer, the codebreaker is used in this way:
the card is slid into an ATM or door lock, then the computer cycles through coding sequences until the lock or
device is defeated.  Successful use requires an Electronics or Lockpicking at EF4.  A failure will not open
the lock or account and will alert any moniotrs.  A success of 4 will succeed but alert any monitors.

MANUAL PICK GUN
Like the electric pick gun, this mechanism manipulates locks quickly, but is actuated by squeezing the handle
of the gun to workl the picks.  Gives +2EF to lockpicking attempts but does not alter the time of success.

STEALTHSUIT
Not for the claustrophobic, the stealthsuit is made of light neoprene and another polymer with a low coefficient of friction.
The stealthsuit is designed to cut down on the amount of forensic evidence left at a crime scene.  From foot to neck,
the suit encases the person like a wet suit, preventing skin, blood, or other substances from being lost in the area.  Boots, gloves,
and a hood of the same material complete the coverage.  Tactical webbing on the outside of the suit allows the storage
or equipment and hooks for climing gear.
The suit is very warm and cuts back on stamina times by 1/2.