open/close all folders
Anime and Manga
- Death Note: Light goes to great lengths to protect the Death Note. Not only is it hidden in his locked bedroom in a secret panel of his desk drawer, but opening the panel without first deactivating the failsafe will incinerate the notebook before it can be found. After all, if someone else takes it he's unlikely to get it back, and it links him to hundreds of murders. If it's incinerated, all he has to deal with is a house fire, which someone as smart as Light could come up with explanations for, and it would remove any and all proof linking him to the murders.
- Lupin III: The Woman Called Fujiko Mine, in the sixth episode, "Prison of Love": The pendant Fujiko steals from Oscar is locked by a code (Ze-Ni-Ga-Ta), and the wrong code will destroy the other half of the thesis.
- Batman has this on his Batmobile. He has a number of deterrents to prevent crooks from jacking the Batmobile, up to five levels. The fifth level being detonating the Batmobile. Batman nearly became a victim of this in the final part of the Knightfall storyline, KnightsEnd when he attempts to use the Batmobile to hunt down the rogue "Az-Bats" Jean-Paul Valley and it ends up blowing up on him. The incident causes Nightwing to go on a Roaring Rampage of Revenge on Jean-Paul, but Robin later finds out Bats is safe. Turns out he realized that Valley did the same thing he would have - just not that deadly.
- Judge Dredd has a variant of this in the Lawgiver pistol. The weapon has a built-in identification device that scans the user's fingerprints for the right ID. If the person's profile doesn't match the DNA for the Lawgiver, the weapon triggers a built-in explosive device that severs the entire weapon and the limb of the wrong person attempting to use it.
- The Holy Grail in Indiana Jones and the Last Crusade is protected by many layers of secrets, guards and traps. The final resort, however, is that the Grail can never pass beyond "The Great Seal". Doing so results in the entire place self destructing and the Grail being lost forever.
- James Bond
Bond: Did any of my luggage survive with me? And my attache case?Mei-Lei: Black attache case damaged when examined. So sorry.Bond: Apologies quite unnecessary.
- From Russia with Love: Bond's attache case has numerous built-in gadgets including a magnetically attached tear-gas canister stored inside. Opening the case without first rotating the clasps triggers the grenade and gives any would-be-snoop a face full of the gas. This turns out to be just the edge Bond needs when held at gunpoint by Red Gran, whose greed Bond uses to trick him into opening the case.
- Goldfinger: As a shout out, it's implied that Bond's case still has similar defensive measures in the following film, even though they're never explicitly mentioned. After being captured, he talks to one of Goldfinger's henchwomen on the plane.
- For Your Eyes Only: Bond's car has an anti-theft measure which blows it up if it's broken into. Considering all the high tech gear in every car Bond drives, it's probably more to protect those things than the car itself.
- In The Italian Job the villain's big safe has a piece of glass inside the door; if the glass breaks - and drilling into the safe will almost definitely achieve this - the lock's tumblers will be unable to rotate properly and the safe will be permanently sealed. Doesn't actually destroy the gold inside, but the safe is huge; if you have the tools to rip the door off, doing so would have been your first option, not second. Charlize Theron's character ends up opening it the old-fashioned way, by listening and feeling out the combination, a skill she inherited from her late father.
- In Treasure Planet the planet itself has self-destruct booby trap that will activate should anyone finds Captain Flint's treasure hoard.
- In The Da Vinci Code, the cryptex protects its contents with a combination lock. Attempting to force the cryptex open will break the vial of vinegar inside, which would dissolve the papyrus along with its message before it could be read. As a result, only the right password will grant access to the message.
- This is possibly a case of Artistic License – Chemistry; vinegar isn't a powerful enough solvent to dissolve papyrus, which is fairly sturdy stuff. However, it might be able to dissolve the ink, especially if it's very dilute, rendering the message illegible.
- The Matthew Reilly short story Altitude Rush (Available in pdf on his website) has documents protected by a self destructing case that will release hydrofloric acid on the papers unless properly accessed. The case also has an altitude sensor that will trigger the self-destruct if it goes above 1000 feet or below 10 feet, necessitating the thieves to execute a frantic escape across the NY skyline.
- In The Dresden Files the stolen Shroud of Turin is kept like this, with a remote to deactivate the security. In this case it's a precaution against the seller being subjected to You Have Outlived Your Usefulness after handing it over.
- The Dark Is Rising series novel The Dark is Rising. The Book of Gramarye is kept in a grandfather clock with a magical security mechanism. If the Book touches the clock's pendulum while it's being removed or returned, it is totally destroyed. The same thing will occur if an Old One tries to remove the book and they're not touching a specific human beingnote at the time.
- In the Tom Clancy novel The Cardinal Of The Kremlin, the information from the title spy would be typed up in the American Embassy on flash paper and inserted into a container which would ignite if anyone tried to mess with it. It was then transported by diplomatic couriernote to CIA headquarters, where it was disarmed in the office of the CIA Director.
- It's mentioned a couple of times that with the case actually in the courier's breast pocket (it looks like a cigarette case), if it went off, the courier would likely be set on fire.
- One of the later books mentions that this practice has been done away with because it was too easy to set them off by accident, and nowadays couriers are simply given CD-Rs (and later Flash drives) protected by the best file encryption the CIA's considerable R&D budget can buy.
- Robert A. Heinlein's The Number of the Beast. Computer software expert Deety mentions that if anyone except herself attempts to access her college computer account it would show them her "clean" financial records while secretly deleting the "dirty" copy.
- In Jeffery Kooistra's Dykstra's War, the eponymous Dykstra receives a thumbprint-coded package that, if accessed by the wrong person, will explode with sufficient force to take out the whole building. Clearly one wants to be very careful about checking the address labels.
- In Harry Harrison's The Ethical Engineer (second book of the Deathworld series), Jason crash-lands on a Lost Colony where remains of technology are venerated with a religious-like fervor by various clans/cities. One of them builds primitive cars and have booby-trapped the engines should someone attempt to open and reverse-engineer them (or repair them - they make the cars so that they break after a few months). Jason is trying to break the monopoly and allow progress, currently working for the group making petroleum (to run said cars). He tries to make an impression by making repairs to one car. One of the traps (poison gas canisters) is triggered by attempting to remove the screws holding the cover. Jason figures out that the screws are deliberately threaded the wrong way (i.e. you have to turn clockwise instead of counterclockwise). Attempting to turn counterclockwise tightens them and smashes the canisters. He then defeats another trigger mechanism by using melting ice to slowly lower the engine from the housing. The reason he can't build a crude vehicle without reverse-engineering it is because no one in his time remembers how an internal combustion engine is supposed to work.
- In Carter Beats The Devil, the plans for the prototype television are in a safe set to spill acid on the plans if the wrong combination is set three times.
- In Atlas Shrugged, John Galt protects the shed containing his utopia's power source (a Perpetual Motion Machine) and his secret laboratory in his obscure flat in New York City in such a way that anyone trying to break into the rooms or force the locks will cause everything in the rooms to disintegrate into dust by the time they get the door open. How? Who is John Galt?
- An anti-handling device kills some MI-5 safecrackers in the Bernard Samson Series. According to the mission post-mortem, the confines of the safe turned the document destruction device into an accidental bomb. However there's also the possibility that it was a Booby Trap meant to kill Bernard Samson.
- Mentioned in the Artemis Fowl series. After pulling off a heist for a painting, Artemis checks for pyrophoric/explosive chemicals in the storage tube, in case the person he's stealing from is particularly spiteful.
- In the finale to the third book to the Saga of the Grey Death Legion trilogy (part of the BattleTech Expanded Universe), the planet Helm was the site of a secret Star League weapons depot 300 years ago. The GDL manages to open the vault using a ceremonial data slate given to the planetary governor, while the pursuing House Marik company are forced to breach it using explosives, causing the facility to enter a self-destruct mode. A buried fusion reactor heats up underwater lakes, causing them to boil off and explode through the surface, returning the mysteriously vanished sea to Helm's surface and destroying the facility in the process. Luckily, the GDL managed to save a copy of the Star League library in the facility and its cache of Lost Technology specifications.
Live Action TV
- In Season 4 of Burn Notice, an important MacGuffin is buried in a graveyard in an airtight container, which also contains highly reactive chemicals that would explode when exposed to the air. Filling the grave with machine oil allows them to get inside safely.
- In the New Year's Day 2012 Sherlock episode "A Scandal in Belgravia," Irene Adler's phone, containing lots of politically-sensitive data, contains miniature explosives that will destroy it if anyone attempts to physically remove the hard drive, or enters the wrong passcode too many times. Which begs the question, since the good guys aren't after the info itself, but containing it and preventing her from blackmailing important officials with it, why don't they just let it self-destruct?
- A better and more logical fail-safe for her to use would have been if it were set up to broadcast and release the info if the security was breached or if she didn't enter the security code every day. That way, anyone she had info on, would have an incentive to keep her phone secure and in her possession.
- A variation on that is actually done in the season 3 ending where Sherlock kills Charles Augustus Magnussen, all of whose blackmail information is in his head, to prevent him from revealing Mary's secret identity. In retrospect, it was probably a mistake for Magnussen to reveal this to Sherlock.
- The pilot episode for the show White Collar features this in the beginning. Peter and his team are attempting to crack open a safe that has a counterfeiter's information in it. If they can get into the safe, they'll have enough evidence to arrest the counterfeiter. Unfortunately, as soon as they crack the safe, an explosive charge destroys everything inside, showing Peter and his men with confetti.
- In Farscape, the ancient Luxan ship is equipped with a self-destructing security mechanism powerful enough to blow up the ship it's parked in. Thankfully, it also loops through a vocal message explaining how to defuse it: It requires any one of three keys only a Luxan is supposed to have; Qualta blades are one of them.
- In La Femme Nikita, some sensitive information is stored on shadow drives — hard drives which must be read backwards, or they will erase their data.
- In the first episode of UFO, Colonel Straker is carrying a briefcase chained to his wrist with taped evidence of a Flying Saucer. When a British minister wants to look at the contents, Straker flicks a catch hidden under a nameplate, exposing the words DESTRUCT NEGATIVE, before opening the briefcase. Unfortunately the aliens who subsequently attack the vehicle are more interested in destroying this evidence than stealing it.
- Matrix software
- The Scramble IC program is often used to protect computer datastores with valuable information. If a decker tries to break through the Scramble and fails, it will overwrite the stored information with random characters, rendering it worthless.
- A decker tries to disarm a Data Bomb protecting a file and fails. If the Data Bomb was programmed to do so, it will erase the file it was protecting.
- Matrix software
- Dungeons & Dragons
- Basic D&D module CM1 Test of the Warlords, Encounter 1 "The Ruins of Alinor". The PCs can find a golden box that radiates magic. If they smash or pry open the box, its contents burn up in a flash. If it is unlocked normally or its lock is picked by a thief, they will find two magical scrolls and a diary.
- In early editions the Explosive Runes spell could be used like this. The caster would cast the spell on the object to be protected. If anyone read the runes, they would explode and destroy the object and whatever it contained.
- Occurs in the adventure T1-4 Temple of Elemental Evil:
- In one room there's a chest with a chlorine gas trap that functions no matter how the PCs try to disarm it. When they open the chest they find what appears to be spell books and a magical scroll that have been partially dissolved by the gas. In fact they were covered with gibberish and therefore worthless - it was just a trick to make the PCs think they had lost a chance to gain valuable items.
- Hot Chicks RPG. Escorts from the Arcturus Escort Corporation have built-in cybernetic data recorders to capture their clients' secrets. If anyone tries to tamper with an escort's recorder it overloads, destroying the stored data and killing the escort.
- In Uplink one of the security measures you can purchase for your gateway is a self-destruct mechanism as a last resort if the Feds are closing in on you. You lose all the hardware, but get to keep your reputation and avoid being disavowed (ie, gameover).
- In Minecraft, Desert Temples contain a room with four treasure chests, each containing rare and valuable loot. At the center of the room, however, is a pressure plate linked to nine blocks of TNT hidden beneath the floor. One must tread carefully, because if exploded, the TNT will destroy the chests and everything inside, and probably kill the player as well.
- In Infocom's Enchanter there's an mechanical egg with a scroll inside. No matter how you open it, the egg shreds the scroll so it's unusable. You later get a spell that allows you to reconstitute the scroll and learn the spell on it.
- In System Shock 2, if you trigger an ICE node when hacking open a security crate, it sets off a built-in explosive charge, destroying the crate and its contents (and on any difficulty higher than Easy, probably kills you in the process).
- Downplayed in The Riddle of Master Lu: When Ripley finally grabs the MacGuffin from the tomb of the first emperor of China, he finds out that Master Lu had some final mechanism designed to keep it from falling to the wrong hands whose secret Ripley didn't uncover, and which causes liquid mercury to start flooding the place. It happens so slowly you can just walk away, so it should be useless, but it just happens that the game's last villain shows up to slow Ripley's escape and ends up taking the MacGuffin with him as he gets flooded by the mercury, effectively helping the mechanism do what it was supposed to do.
- Spy missions in Warframe task you with breaking into a number of secure facilities to retrieve sensitive data from the terminals inside, eluding various security mechanisms as you go. Being detected by security will trigger a destruction program on the terminal, giving you a strict time limit to reach your target and retrieve the data before it's lost.
- Star Trek: The Animated Series episode "The Slaver Weapon". The title device had an A.I. computer programmed to make sure its user was a Slaver authorized to operate it. When the Kzinti that found it asked ignorant questions of it, it assumed that it had captured by its master's enemies and tricked them into activating a self-destruct setting which destroyed it...and them.
- This might be more accurately described as a Cyanide Pill, if the AI was truly making a decision rather than simply executing a built-in program. The episode doesn't give enough information to tell either way.
- In Teenage Mutant Ninja Turtles (2012), Donatello has a failsafe on the T-Phone (their personal communicators and cell phone service), just in case. If anyone yells "T-Phone, Self-destruct", the tech inside will blow out, making getting any information off the phone impossible.
- U.S. top-secret documents are carried in briefcases that are booby-trapped with oxidizer bricks, which incinerate the documents if the case is opened without the disarm key inserted.
- WW2 Uboat codebooks were printed on paper that would dissolve in water. Not only did this make the codebook easy to destroy, even if the crew were killed before they could do so, an attack on the sub would be very likely to cause the codebooks' destruction anyway. That didn't stop the Allies from seizing half a dozen of them.
- Most naval codebooks by the Second World War were printed in ink that would run when it was wet, primarily because the practice of NOT doing so had been very costly to Imperial Germany in World War I. Most of the major navies also went so far as to put the majority of their "secret" writings and maps (for example those that showed the locations of their minefields) in the same ink. The only major navy which did not follow either practice was the Imperial Japanese Navy. They had ample cause to regret this decision during the war.
- Modern ATMs have devices designed to contaminate the entire monetary content with a permanent dye rendering the money unusable if anyone breaks into one. The machine's owners can exchange the money at the country's central bank, but anyone trying to pass dyed notes in everyday life will attract law enforcement attention in no time.
- iOS devices (iPhone, iPad, iPod Touch) have an option to erase all content on the device after ten failed passcode attempts.