Kawatora: Veiled Threat

ARMA Calendar

Event details

Veiled Threat

With the disappearance of the Marine Force Recon team and the Yangon’s continued and rapid expansion in the Golden Triangle, the situation in Cambodia has risen to its boiling point.



While extended periods of no-contact can be expected with long range reconnaissance, the sudden lack of communication from the Force Recon team is highly unusual given their expertise and the non-military nature of the target. Their latest reports however have suggested that the Yangon are more than the usual crime lords; they have managed to amass a staggering amount of military grade equipment and weapons, while at the same time coercing any rival gangs to capitulate territory or recruiting entire organizations in days.

With the Yangon soon threatening to expand outside of the Golden Triangle, it is imperative that we cripple and destroy the organization before it becomes a global problem.

Your SEAL team is to do just that.

You will be inserted under the cover of darkness via UH-1Y Hueys with RHIB assault craft and conduct further recon of the Tonle Sekong river, and disrupt, destroy, and dismantle the Yangon’s drug production along with any weapons caches you find. We will also need you to garner any information on the missing Marines, as there has been no word or sight of them in over a week.

Stealth is paramount here SEALs, as we still do not know the nature of the relationship between local government forces and the Yangon; if you’re discovered we can not guarantee they will be friendly.

If you are discovered, or if you find a target worth going hot for, Violence of Action will be key. You are directed to use extreme force against all hostile entities and destroy any and all production sites and equipment.

“Who Dares, Wins”



Phoenix and Harpy [ZEUS] [Copat149 & Weabus]


Team Chief [Considered Overall Lead] [cJack - Sandy]

EOD Tech [Demolitions] [Danklin - Gopher]

Scout Lead [BlackRaven - Bravo-Zulu]

Scout Sniper  [Omega - Haymaker]

Scout Spotter [AmericanCoreBoy - Cowboy]


Element Leader [Danius - Dreidel]

Mechanic [Can fix vehicles] [CS42R - Diesel]

Operator [Chris - Sparrow]

Operator [Autorifleman] [Spillner - Venator]

SARC Medic  [Lt_Tickeldik - Tinkerbell]


Element Leader

Mechanic [Can fix vehicles] [Baboking - Humbug]

Operator [Neo - November]

Operator [Breacher]

SARC Medic [Klobbson - Daybreak]

For this Campaign, we are doing something a little different. When you RSVP and choose a slot, provide a "Callsign" for your use for the rest of the campaign. You will not be stuck with this slot for the whole campaign, just the callsign. So pick something you like!

See the Forum Post for the Campaign Mod List


Recommended Comments

Eod Tech - Callsign: Gopher (Unless im allowed to use Danklin)


Edited by Jfranklin94

Share this comment

Link to comment


Callsign: BZ

Hopefully UPS pulls their head out of their ass. No computer, no gaming 🤷‍♂️

Edited by Raven
  • Like 1

Share this comment

Link to comment

I'm in for the event, just got word I'll be home!

Scout team lead, callsign: BZ

Share this comment

Link to comment

I'll take whichever slot is left, although I probably (definitely) should not be element leader lol.


Callsign: Humbug

Share this comment

Link to comment

I'm new to ARMA like fresh off the boat so if you need me choose wisley but am a fast learner.. not bad as a sniper or even suppressive fire type ,  Copat said breacher is a good place for me to start (saw it was accounted for)

I'm willing to fill in where ever as long as your willing to teach 

Call sign dustpan

Share this comment

Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Add a comment...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.