- Cover Page
- SCAL User Guide
- Preface
- Overview
- Proper Deployment and Usage
- Maintenance
- Frequently Asked Questions
- Glossary
This is the SCAL user guide. It is meant to serve as an orientation manual and field reference point. The user guide is capable of answering most questions concerning the utilization of SCAL units, but it is not meant to be an in depth guide to their method of operation or history.
For more information on the SCAL unit, feel free to consult the following sources:
1. "Cognitohazards in the art of hating people to death"; R. Grant et. al.; Foundation; Vol 32.6; pp 12-16; 1966
2. "Reality benders: How much power is will power?" M. Metzler, R. Deacon;
Foundation; Vol 55.2; pp 33-37; 1989
3. "Possible vectors of transmission of infohazards in an urban setting"; O. Clayton et. al.; Foundation; Vol 110.1; pp 97-103; 2004
4. "SCP-████, and the power of words"; D. Vargas et. al.; Foundation; Vol 17.5; pp 15-20; 1988
5. "A treatise on the similarities between reality manipulation and causality manipulation"; S. Cross; Foundation; Vol 7.2; pp 7-9; 1952
6. "Dreams and Ambitions: How real are they?" M. Sharpe; Foundation; Vol 12.6; pp 19-22; 2003
7. "Ideas and Reality; Which is more real?" R. Lambert; Foundation; Vol 21.2; pp 14-20; 1999
8. "Words and ideas, and their usage in detecting causal anomalies" R. Spencer, M. Spencer, C. Spencer; Foundation; Vol 20.9; 2009
The Spencer Causal Anomaly Locator (SCAL) is an apparatus designed to detect and locate causality manipulating anomalous objects. It does so by recognizing disparities in the output of random word generators to determine their presence and general location.
The SCAL shall be considered to consist of 3 parts:
1. The Device
The devices themselves are designed to be small and inconspicuous. They constantly generate a series of random words and upload the generated words to the Network as they are produced.
2. The Network
The Network is the data produced by the devices being transmitted along the [Redacted] radio frequencies. All SCAL devices are produced already attuned to this frequency. The data produced by the devices is then directed via [Redacted] to the Detector.
3. The Detector
The detector is a comparator designed to determine the presence of variances between baseline Device readings and projected device readings, and, if said variances exist, to determine the degree of divergence from baseline readings.
If there is a malfunction within the SCAL unit, it is within one of those three areas.
There are several situations and environments that one may have to deal with when deploying a SCAL device. While this guide will attempt to outline some basic rules and procedures, most deployments will require situational knowledge and a degree of creativity on the part of the operator.
Urban Deployment
Deployment of a device in an urban setting has a few benefits and drawbacks. For example, you will require the SCAL devices to be more densely placed than in say, the Saharan desert. In the Saharan desert, one square mile of area is roughly one square mile. In New York City, one square mile could potentially be several, due to the presence of multiple large buildings. Conversely, powering the device would be relatively easy, due to the presence of electrical wiring throughout the city. Though again, avoiding discovery would be much more difficult. Possible avenues of deployment include: Installation in foundation front companies, concealment in everyday objects such as payphones and streetlights, and installation in sewers and waterways, etc.
Rural Deployment
As with the urban setting, Rural settings have their own set of pros and cons. For example, sources of constant power are scarce, but discovery is a much smaller concern. They can also be buried in the ground, and rural areas will only require extra SCAL devices in populated areas. Possible avenues of deployment include: Burial of device and power source underground, disguise as a transformer in a transmission tower, etc.
Remote Deployment
Remote Deployments are defined as any terrestrial location in which human presence is virtually nil. Such locations as the Saharan desert, The Kerguelen Islands, and Antarctica. Some of the benefits and drawbacks of remote deployment are that, for example, The chances of discovery are almost nonexistent. However, powering the device can be difficult. Photovoltaic panels are an option, if they can be properly concealed. Large SCAL devices are also needed in order to cover the larger distances. Possible avenues of deployment include: Burial of device and power source underground, disguise as a large rock, disguise as a radio tower, concealment inside of dilapidated vehicles, etc.
Maritime Deployment
Maritime Deployment is deployment within the ocean, or on the sea floor. The main difficulty with maritime deployment is power. It's almost impossible to keep a SCAL device powered for a meaningful length of time in the ocean. Therefore, it is recommended that users of the SCAL only deploy oceanic devices temporarily, preferably to identify an anomaly in a particular place. Possible avenues of deployment depend on where the anomaly is situated. If it is believed to be an area, or a floating object, SCAL devices can be floated on the surface, disguised as waste from boats, etc. If it is believed to be an object situated on the sea floor, SCAL devices can be sunken in containers, or installed in ships, then scuttled.
Anomalous Deployment
[Redacted]
Maintaining the SCAL itself is a monumental task. However, most of the issues that a field operative will have to deal with, will have to do with the SCAL devices. There are a myriad of issues that one could face, and the operative will have to deal with each issue accordingly. Therefore, this section will deal in basic guidelines for dealing with particular situations.
Discovery
The discovery of a SCAL device by an average citizen will usually not be a great concern. Simply recovering the SCAL device and amnesticizing the witness will be sufficient in most situations. However, recovery by a group of interest may be a greater concern. Luckily, all data is encrypted and transmitted in real time, and nothing is kept within the device itself, so any attempt to glean information from them will be pointless. As a related note, SCAL devices can be tracked through their radio frequency.
Destruction
SCAL devices can be destroyed in any manner. By accident or design. Simply replace the devices whenever this happens. Groups of intrest may and have attempted targeted destruction of SCAL devices. Multiple SCAL devices being destroyed in a short period of time may be evidence of GOI activity.
Malfunction
In the event of a malfunction, SCAL devices should be recovered, shut down, and analyzed. The source of the error should then be identified. If there is evidence of tampering, it may warrant a further investigation. On a further note, if the device can be repaired easily, you may choose to do so, but it is almost always easier to simply replace it.
Sabotage
SCAL - Spencer Causal Anomaly Locator