Item #: SCP-XXXX
Object class: Safe
Special Containment Procedures: SCP-XXXX is kept in a standard object storage container, locked under level 2 security clearance. Under no circumstances should SCP-XXXX be directly handled by foundation personnel for risk of triggering its anomalous effects. All personnel working in close proximity to SCP-XXXX are to be screened for a psychological examination before being deemed fit to work with SCP-XXXX. Under no circumstances should undesignated research personnel anyone with a desire for material gain be allowed access to SCP-XXXX.
Description: SCP-XXXX consists of numerous stacks of 1 dollar bills, the total value of which has been calculated to be 1 million US dollars. When inert, each of the bills are virtually identical to a piece of legitimate tender in colour, size, shape and weight. If a person comes into contact with SCP-XXXX with the intent of personal possession, SCP-XXXX will activate. Owners of SCP-XXXX have displayed extraordinary success in the further acquisition of wealth regardless of its statistical improbability. The owner of SCP-XXXX will begin to amass unprecedented and unlimited wealth in the form of singular US dollar bills.
Within approximately 5 minutes of initial activation, every dollar bill of the original 1 million will change appearance to match the owner; the image of George Washington will change to a photo realistic image of the current owner. All dollar bills the subject encounters from this point forward will have the updated image. Acquiring any form of wealth, aside from singular US dollars will become impossible. Any attempts to barter or trade any other valuable items will always result in payment in US dollars. Online transactions will anomalously fail, and if the money is physically withdrawn, it will do so in modified US dollars. 100% of attempted purchases with money affected by SCP-XXXX will be rejected. Any donations with money affected by SCP-XXXX will be rejected by the recipient. Attempting to destroy, discard, or otherwise remove possession of SCP-XXXX will result in a greater quantity of modified US dollars coming into possession of the owner. SCP-XXXX's anomalous affects will persist until the death of the current owner, or the seized possession of SCP-XXXX without the permission of the current owner.
Following incident OS-2353-1 and the recent actions of the late Agent ██████, any access requests for SCP-XXXX will be dealt with by me personally. We will not repeat our previous mistakes. -Senior Researcher DR. Rohen
[[footnote]]Agent ██████ came into contact with SCP-XXXX triggering its effects after an access request was authorized by Lead Researcher [REDACTED]. The death of Agent ██████ is presumed to be suicide.[[footnote]]
Protocol #500
Your request for access of Document Protocol #500 has been reviewed and summarily accepted. Your access level is: [DATA EXPUNGED]. This document has been amended and information has been redacted for your access level. Any further access requests on Document Protocol #500 are to be directed to [DATA EXPUNGED].
—-Requested logged on ██/██/███
NOTICE:
This document must be read in its complete entirety, regardless of any and all external factors and circumstance, by all personnel working for and/or in conjunction with the Foundation. It is the due responsibility of Site Overseers and Induction officers to ensure all staff are briefed and familiar with Protocol#500. Personnel are NOT under any circumstances to be cleared for active duty unless the aforementioned procedure has been observed without omission of any kind.
The following protocol, to be hereby referenced as Protocol #500, has been devised by the O5 Council and in part by Ethics Committee representative █████████ and Former Site ██ Director ████████
The intent of this document, and by extension Protocol#500, is to provide a means by which the SCP Foundation and its constituents, the containment of SCP objects and the preservation of human life can be safeguarded in the event that the observation of Special Containment Procedure can no longer reasonably be maintained. In the event of a containment breach, Protocol#500 is to be carried out as applicable and as per the instruction of the assigned leading personnel (the process by which this person(s) is assigned should follow the set protocol as devised in this document)
O5-█
To re-iterate a previous point made from Staff Induction Document █ for the sake of explanation, any personnel working with, or in close proximity/relation to an SCP object will be required to follow the given protocol as devised by their immediate superiors. The exact nature of given instructions will be strictly only relevant to the role you have been assigned. There is, however, one certain procedure that must be carried out by all personnel regardless of department or position:
- Special Containment Procedures are to be followed precisely to written specification under all circumstances. There is NO scenario, stated or otherwise, wherein this protocol is to not be observed. This instruction may, and only, be voided with direct and verified instruction from O5 command. Unauthorized dismissal of Special Containment Procedures under exceptional circumstances will be handled on a case-by-case basis as per the discretion of O5 command.
Foundation personnel are reminded that a Protocol#500 scenario is not a justifiable reason for any member of staff to void the aforementioned prerogative of the O5 in circumstances unnecessary to warrant that course of action. Any judgement and/or Admonishment on the observation of proper procedure will be decided during the post incident report.
- ███████████████
Breach Levels:
In the event of a containment breach, descriptions of the following four Breach Levels should be used as a guideline to aide in the determination for the course of action undertaken. These guidelines are not entirely strict, and are subject to a degree of flexibility as dictated by individual circumstance, as is the designation of the Breach Level.
Breach Level 1:
A Breach Level 1 scenario may be distinguished from any minor incidents that occur during research/transportation/etc by the following qualities:
- Special Containment Procedure has been either partially or fully voided
- Breach is not temporary or self resolving
- Breach poses a minor to substantial threat to human life/foundation property or equipment
Note that a Breach Level 1 scenario can be distinguished from a Level 2 scenario by the following:
- Long lasting consequences will not arise from beyond the initial implications of the breach
- Breach cannot not undermine Foundation stability, security or anonymity
- Breach affects a small radius (under 30 metres)
- injury to personnel and loss of life is marginal in quantity
If a Breach Level 1 scenario takes place on-site, during custody, research or otherwise the following protocol is to be observed:
Facility guards (or MTF units if facility guards are not present) within the immediate facility are to escort uninjured non-military personnel at risk to a safe location. Compromised personnel should not be prioritised for evacuation if external factors dictate an inability to safely evacuate all personnel simultaneously. personnel should not be evacuated if conditions are unsafe, or if evacuation would increase the extent of the breach. If possible, higher command is to be made aware of the breach before evacuation takes place, excluding time critical operations wherein evacuation must be carried out instantly. In the latter scenario, Site managers (or the most senior personnel in command where a site manager is not present) should be informed of the breach immediately after or during initial evacuation. Senior research personnel will ensure that appropriate procedure is undertaken to re-contain relevant SCP objects to minimise further damage. If personnel with sufficient knowledge required are not present, it is essential that assistance from higher command is IMMEDIATELY requested as to ensure proper procedure is observed and damage mitigated.
If a Breach Level 1 scenario takes place during the transportation of an scp object within, or between, foundation sites, the additional following protocol is to be observed:
Transportation of the given SCP objects is to cease immediately. If the breach occurs in an location where significant damage could be caused, and there is time available to relocate the object(s), relocation to a more secure environment should be attempted as far as reasonably and safely possible. In the event that re-containment is unattainable, personnel must call: Secure Line EF#██████ _ _ _ _ _ _. The last 6 characters will be provided to you by your superior. This secure line will be your access point for any requests of staff, resources or otherwise external assistance from the foundation.
Breach Level 2:
In the event of a Breach Level 2 scenario it is paramount that, should all other protocol be voided in practical application, the following order is observed at all costs:
- Re-containment is the first priority
There is no acceptable reason to void this order, regardless of any and all external factors. It is the duty of all available and able bodied staff to follow this order and assist in its completion until higher command declares the breach quarantined. In order to contain a Breach of this magnitude it is vital that the chain of command is strictly followed. Senior staff will be accountable for the actions of junior personnel under their jurisdiction and, by extension, it is the duty of junior personnel to obey the instruction of their superiors without delay or question. Senior personnel are best equipped with the knowledge and authority nessecary to contain the breach with minimal casualties. Therefore, it has been the unanimous decision of the O5 council that the most effective strategy in resolving Breach scenarios of level 2 and above is to ensure the chain of command is kept intact and that re-containment is not jeopardised by the actions of improperly qualified and inexperienced individuals.
Due to the nature of containment for SCP objects capable of a Level 2 Breach, it is not realistically conceivable for a Breach Level 2 scenario to take place, in its initial stages, outside of Foundation custody on a secure site.
In the event of a Breach Level 2 scenario, the following protocols are to be enacted:
- Personnel in the immediate facility must send a GAMMA-R5 Alert to the Site Overseer and Breach control and vacate the area of the breach in whichever order circumstance dictates
- Breach control must raise a Breach Level 2 scenario site-wide alarm
- All non-military personnel must evacuate to the Site Evacuation chamber, or to the nearest available exit if the chamber or its associated pathways are compromised.
Breach Level 3:
Breach Level 4: