Well-Known Member
OUT OF CHARACTER INFORMATION
Intent: To submit a useful utility belt for future RP submissions.
Image Source: [X]
Canon Link(s):
- Individual Field Disruptor
- Multi-Spectrum Disguise Suite
- Stealth Field Generator
- False Eye
- False Touch
- Slicer’s Kit
- Belt-mounted No-Show
PRODUCTION INFORMATION
Manufacturer: Visanj T’shkali
Affiliation: Closed-Market
Model: Occultation Belt
Modularity: No
Production: Semi-Unique
Material(s): Heavy-duty Nylon Web Belt, Electronic Components, Segroth Shocksteel, Segroth PGA Coating, Gabonna Memory Crystal, and Gungan Plasma Energy Battery.
SPECIAL FEATURES:
- Belt-mounted Individual Field Disruptor allows wearer to pass through basic energy shields, briefly disrupting those shields by emitting energy signatures which interrupt shield integrity.
- Belt-mounted advanced Multi-Spectrum Disguise Suite, able to hold up to four pre-programmed disguises, including voice changers, bio-sign generators, etc. This even includes False Eye, False Touch, and False Voice capabilities, allowing the user to effectively masquerade as another person to such a degree to be sufficient to fool most basic biometric security locks requiring fingerprint, palm print, retinal scan, or voice identification to open. Users will appear as their intended disguises, able to fool most casual onlookers and technological scanners and systems.
- Belt-mounted Stealth Field Generator provides active camouflage, allowing wearer to blend seamlessly into their surroundings, and even to move stealthily while maintaining the effect. Combines with No-Show to produce total stealth envelope of the wearer.
- Belt appears to be simply a fashionable belt with four small pouches or compartments attached and can be worn generally surreptitiously and doesn’t otherwise hinder mobility. Further, it contains a small slicer’s kit.
- Allows the wearer to pass through most basic and commonly-encountered energy fields without triggering detection protocols, however users are strongly encouraged to pass through quickly so as not to overtax the system and risk it potentially shutting down mid-crossing.
- Allows the wearer to be enveloped in a highly-detailed and exceptionally convincing disguise, which to most onlookers and scanners will register as what they see without detection. If, for example, the wearer was Rodian and wished to appear as a small Rancor, she would look, sound, and even appear to give off the appropriate life-sign readings for that species. If appearing as a specific person, the wearer’s disguise is so good it will allow them to pass fingerprint, palm print, retinal scan, and even voice identification, enabling them to pass through biometric security or open biometric locks effectively in most cases.
- The stealth generator causes the wearer to ‘disappear’, masking them from normal means of detection and to look as they if they merely blend into their surroundings. They can move about under this ‘invisibility cloak’ but must move slowly and carefully to avoid the tell-tale ‘flicker’ that can give them away.
- Hardened against EMP/Ion damage or risks.
- Moving too quickly or too clumsily while using either the stealth field generator or the disguise suite will disrupt the effects, creating a ‘flicker’ effect which can temporarily make one easily detected.
- If the field disruptor becomes over-taxed, as by staying beneath a shield too long, it may shut down, placing the user at significant of death, being horribly disfigured or damaged, or detected.
- While water-resistant (i.e. to rain, mist, or snow), being submerged or hit with a large blast of water, as by a hose, will cause the unit to short out and will not be able to operate again until it has dried out entirely.
- Where the disguise suite or stealth generator may escape naked eye detection or detection by most general scanners, etc. it will not fool highly sensitive scans nor will it work against certain creatures such as dogs, whose scent recognition abilities will ‘see through’ the effect.
- The three units are each powered by the same battery, and therefore can only be used one at a time.
- The memory required for these systems to work effectively is massive, and therefore only four preprogrammed disguises can be held at once – as they include life-signs, species indicators, voice patterns, everything. To change these requires time to fully construct and program, and cannot be done quickly or easily, i.e. in the field.
Designed for covert field work, this simple belt houses three distinct items, together with a battery and a computer slicing kit, all meant to enable an operative to successfully infiltrate a restricted location or situation and gain access to protected spaces or systems without being noticed. Able to provide a decent general form of active camouflage, enabling the wearer to stealthily move about or hide undetected by guards or scanners, making it easy to approach and depart one's target unnoticed and once inside, to move about stealthily. It can allow the wearer to pass through most basic energy shields as well, making penetration of protected areas significantly easier. The disguise suite provides a convincing alter-ego to the wearer and can even fool biometric security, gaining access to restricted files, locations, and materials as if they were the rightful owner. Sharing a single power source and memory however, only one of these devices can be used at any given time, and users must be careful not to do any of several things which might cause the effects to be neutralized or interrupted, exposing them to danger.
For a thief, a slicer, or other nefarious types however, this handy belt holds all the needed elements to get the job done!