Function: Strategic long-range surveillance and intelligence infiltration.
Specifics: A team of certified pilots operating a fleet of high-altitude long-endurance (HALE) stealth drones and micro-drone swarms. Their specialization is undetected surveillance, communications interception, and data exfiltration from hostile environments.
Function: Field deployment of intelligence equipment and countermeasures.
Specifics: A team of technicians specialized in Electronic Warfare (EW) capable of installing jammers, interceptors, or bypassing complex security systems on-site.
Function: Creation and dissemination of targeted propaganda and disinformation.
Specifics: A team of psychologists, media experts, and technicians that orchestrates campaigns to demoralize, confuse, or deceive enemy forces (both human and sentient).
Function: Interpretation of real-time data streams to create a clear operational picture.
Specifics: The pivotal role of the department. An expert in analyzing sensory data, communications, and intelligence to identify patterns and provide predictive analysis.
Function: Infiltration, disruption, and defense of computer and communication networks.
Specifics: An "ethical hacker" capable of neutralizing digital security systems, intercepting enemy transmissions, or protecting the Foundation's networks.
Function: Decryption of coded communications and data, both conventional and anomalous.
Specifics: An expert in cryptography capable of decoding enemy messages, non-human languages, or data patterns based on anomalous principles.
Function: Development of predictive models on threat behavior.
Specifics: An analyst who uses advanced software ("Oracle") and data-mining to predict the future actions of an anomaly or a hostile group.
Function: Creation of psychological profiles of sentient entities and enemy leaders.
Specifics: An expert in psychology and abnormal behavior who provides analysis on the motivations, weaknesses, and probable mental patterns of a target.
Function: Identification and neutralization of internal threats and infiltrated agents.
Specifics: An investigator tasked with discovering security flaws, identifying "moles," and preventing information leaks within the Site.
Function: Active defense of the Site network (SCiPNET) or external networks from anomalous cyber attacks.
Specifics: An "elite ethical hacker," specialized in identifying and neutralizing memetic viruses, hostile AIs, and informational agents that attempt to infiltrate the Foundation's systems. The first line of defense against Digital threats.
Function: Translation and interpretation of non-human or extra-dimensional languages.
Specifics: An academic specializing in anomalous forms of communication, from extra-dimensional languages to signals based on colors or pheromones.
Function: Detection and analysis of Psionic/Telepathic communications.
Specifics: A technician equipped with sensitivity or special equipment to detect, but not block, mental transmissions, identifying their source and nature.