Tomas Nightengale

Character information
-
AliasNightingale
-
Mentalhas a pretty solid mental state
-
Moraleneutral
-
Date of birth1999-12-29 (23 years old)
-
Place of birthforgotten
-
Nationalityhispanic
-
Languagesenglish
-
Familyno family
-
Religionspiritual
Description
-
Height152 cm
-
Weight58 kg
-
Buildstocky
-
Hairshort black
-
Eyesbrown
-
AlignmentNeutral Good
-
Occupationhunter
-
Affiliationnone
-
Rolestealth ops
Background
The critical elements of deception in military operations are activities intended to hide the
presence, movements, strength, and intention of friendly forces from the adversary. Many
activities listed in table 1 are operational means to achieve these goals. They are all of the
utmost importance to the success of any military action, and they are together referred to in this
report as stealth operations, although they include both forms of force projection—hiding and
magnifying. The stealth operations are supported, for example, in the U.S. Army’s field manuals
FM 90-2 (1988) and FM 20-3 (1999) as camouflage, concealment, and decoys (CCD) tactics to
hide, disguise, decoy, or disrupt the appearance of military targets. The CCD tactics are based
on seven critical rules of avoiding detection or identification:
1. Identify the adversary’s detection capabilities,
2. Avoid detection by the adversary’s routine surveillance,
3. Take countermeasures against the adversary’s sensors,
4. Employ realistic CCD countermeasures,
5. Minimize movement,
6. Use decoys properly, and
7. Avoid predictable operational patterns.
In support of these tactics, the U.S. Military developed various CCD systems to protect real ships
(e.g., nulka decoys, chaff decoys), aircraft (e.g., ALE-55 towed fighter, decoy drones), and land
vehicles (e.g., inflatable M1 Abrams tanks) from being targets of missile attack and to be able to
develop a stealth attack on their own.
The criticality of stealth operations to military success is evident by their inclusion in the tactics,
techniques, and procedures (TTPs) of the U.S. Army. Stealth operations are also addressed in
the U.S. Army MANPRINT program in the Soldier Survivability (SSv) Domain requirements.
The SSv Domain was established in 1994 to assist developers, evaluators, and decision-makers
in assessing the degree of protection a system provides. One of the six components of SSv
addresses “Reduction of Detectability of the Soldier” that focuses on the detectability of the
system signature (visible static and moving, visible optical, thermal/infrared, radio frequency,
etc.) The agent known as (Nightingale) specializes in missions on the outskirts of society patrolling the wilderness and keeping the outsides territories safe and secure, weather that being supplying food, weapons, ammo, gear and whatever else is needed. he is highly respected by his allies and those he calls friend but to those that know him as a enemy dread the day that they meet him combat. For on the battlefield he is a ghost, hardly seen by his enemies. but when he strikes there is no mistake that it is him. He is a ghost a phantom/spirit of the wilderness. He is the Nightingale....
presence, movements, strength, and intention of friendly forces from the adversary. Many
activities listed in table 1 are operational means to achieve these goals. They are all of the
utmost importance to the success of any military action, and they are together referred to in this
report as stealth operations, although they include both forms of force projection—hiding and
magnifying. The stealth operations are supported, for example, in the U.S. Army’s field manuals
FM 90-2 (1988) and FM 20-3 (1999) as camouflage, concealment, and decoys (CCD) tactics to
hide, disguise, decoy, or disrupt the appearance of military targets. The CCD tactics are based
on seven critical rules of avoiding detection or identification:
1. Identify the adversary’s detection capabilities,
2. Avoid detection by the adversary’s routine surveillance,
3. Take countermeasures against the adversary’s sensors,
4. Employ realistic CCD countermeasures,
5. Minimize movement,
6. Use decoys properly, and
7. Avoid predictable operational patterns.
In support of these tactics, the U.S. Military developed various CCD systems to protect real ships
(e.g., nulka decoys, chaff decoys), aircraft (e.g., ALE-55 towed fighter, decoy drones), and land
vehicles (e.g., inflatable M1 Abrams tanks) from being targets of missile attack and to be able to
develop a stealth attack on their own.
The criticality of stealth operations to military success is evident by their inclusion in the tactics,
techniques, and procedures (TTPs) of the U.S. Army. Stealth operations are also addressed in
the U.S. Army MANPRINT program in the Soldier Survivability (SSv) Domain requirements.
The SSv Domain was established in 1994 to assist developers, evaluators, and decision-makers
in assessing the degree of protection a system provides. One of the six components of SSv
addresses “Reduction of Detectability of the Soldier” that focuses on the detectability of the
system signature (visible static and moving, visible optical, thermal/infrared, radio frequency,
etc.) The agent known as (Nightingale) specializes in missions on the outskirts of society patrolling the wilderness and keeping the outsides territories safe and secure, weather that being supplying food, weapons, ammo, gear and whatever else is needed. he is highly respected by his allies and those he calls friend but to those that know him as a enemy dread the day that they meet him combat. For on the battlefield he is a ghost, hardly seen by his enemies. but when he strikes there is no mistake that it is him. He is a ghost a phantom/spirit of the wilderness. He is the Nightingale....
0 Comments
There are no comments to display.
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now