DMG Operations

The Device Management Group undertakes a variety of different mission profiles in their pursuit of the aims of the POWER Act.

Each operation is given a code name, with a specific naming regime in place to reflect the key objectives and specifics of the operation.

The DMG Operation Naming Protocols break down into three component parts – an Activity type, an Objective type, and a Location.

Activity types are based on the suspect pool for the detected POWER breaching activity.
Each operation will have a word that is a bug, an animal, or a flower based on the suspected targets.

  • Activities relating to a suspected single technomancer have a bug name.
  • Activities relating to a group of technomancers working together have an animal name.
  • Activities relating to rogue technomantic devices without an active controller get a flower name.

Objective types are based on the desired outcome of the mission. Each operation will have a word that is either a colour, a metal, a type of measurement, or a weather related term.

  • Missions to retrieve items and capture targets get a colour name.
  • Missions to eliminate targets and retrieve or destroy items get a metal name.
  • Missions to observe get a measurement name.
  • Missions to rescue hostages get a weather name.

Locations are based on which DMG Operations Squadron group is responsible for the territory that the mission takes place in. The first two letters of the first word of the codename will relate to the Location.

  • Alpha Group, within the sequences ai-ap, na-nh, ta-th
  • Beta Group, within the sequences ba-bh, eq-ex, wa-wh
  • Epsilon Group, within the sequences bq-bx, ei-ep, gq-gx, li-lp
  • Phi Group, within the sequences fq-fx, ma-mh, pa-ph
  • Gamma Group, within the sequences da-dh, ga-gh, ra-rh
  • Tau Group, within the sequences ci-cp, iq-ix, tq-tx

A list of known DMG Operations

DMG Operations

Their Own Devices gregpdawson gregpdawson