games-pc tom clancy s-rainbow six Manual Do Utilizador

Página de 38
of sniper/observer posts, the placement of spike mikes and fiber
optic cameras, even through the use of millimeter wave radar that
renders exterior walls essentially invisible to the scanning source.
Since the focus of Rainbow Six is on the assault itself, not intelli-
gence gathering responsibilities, these types of operations have
been simulated for you. To determine what intelligence they have
gathered, you need to access the Recon tab on the Plan screen.
Left click on the tab and you will notice that the bottom left display
changes to show four radio buttons: Hostages, Terrorists,
Landmarks and Legend. Select Hostages. You will notice that the
blueprint of the structure in the main display moves to center on
the first known hostage location. If the icon is clear and distinct, it
means that it is an exact location based on perfect intelligence. If
there is a degree of uncertainty about the precise location, the icon
will indicate that clearly. That means that the last known location
of that hostage was somewhere in that room. They may still be
there, or they might have been moved. Use the arrows to cycle for-
ward and backward through all known hostage locations. Terrorist
locations are handled in exactly the same fashion.
The difficulty level you specified for the campaign determines the
accuracy of reporting for both terrorist and hostage locations. 
At the lowest level, you enjoy near perfect intelligence. All of 
the hostage locations will be exact, as will the locations of all 
stationary terrorists guarding hostages or other specific areas 
of the building. Some terrorists may still be roaming, however, 
and the locating data on them will become less precise after the
mission begins.
Now click on the Landmark button and begin cycling through these
items as well. Landmarks are structural features that will help to
orient the team once they have entered the space. Some examples
would be “Main Foyer” or “Ambassador’s Bedroom.” They can also
be locations that are important to the specific mission such as
“telephone,” if you need to place a bug at that location or “bomb,”
if there is a device present that you will need to disarm.
Legend also contains structural features, but these are the ones
that specifically affect the traffic pattern of the team once they
have entered the space, such as ladders, stairs, windows and
TT
TT
oo
oo
mm
mm
  
  
CC
CC
ll
ll
aa
aa
nn
nn
cc
cc
yy
yy
’’
’’
ss
ss
  
  
RR
RR
AA
AA
II
II
NN
NN
BB
BB
OO
OO
W
W
W
W
  
  
SS
SS
II
II
XX
XX
34
RR
RR
ee
ee
dd
dd
  
  
SS
SS
tt
tt
oo
oo
rr
rr
mm
mm
  
  
EE
EE
nn
nn
tt
tt
ee
ee
rr
rr
tt
tt
aa
aa
ii
ii
nn
nn
mm
mm
ee
ee
nn
nn
tt
tt
33
multiple teams with complex paths, numerous ROE changes and
lots of special actions and go-codes attached to waypoints.
Figure 10. Default
plans are available
for the first four mis-
sions of the cam-
paign. After that, if
you do not specify a
plan before execut-
ing the mission, all
of your fire teams
will simply begin
somewhere in the
insertion zone with-
out further orders, as
was done in the
Quick Start instruc-
tions at the begin-
ning of this manual.
Creation of a plan involves three major things: review of all avail-
able reconnaissance data, determination of the path each fire team
will take throughout the space and determination of what actions
will be taken at specific points along that path. The first of these
is handled by the “Recon” submenu, which is accessed by clicking
on the Recon tab in the lower left corner of the Plan screen. See
the subhead immediately following this one for details. We shall
deal with the commands associated with constructing and modify-
ing the path under the “Plotting Movement” subhead, which imme-
diately follows “Recon.” The tactical interface, which includes
rules of engagement, the use of go codes and other similar inter-
face functions are handled under the subhead “Tactical Behaviors.”
Recon
Prior to any deliberate assault, real world hostage rescue teams
(HRT’s) will have amassed as much locating data as possible on
hostage and terrorist locations within the structure through the use