ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Gunchicks

Updated on October 12, 2014

Gunchick thoughts

A couple of years ago I felt like creating something different from what I normally do. But it still have my touch. The idea of Gunchicks came to me probably from watching Aliens or T2, both had very strong determined women with crazy weapons and attitudes. The book took me just as long as a graphic novel because of the style and beauty I was trying to capture. I am most proud of the cover art, the nod to Rosie is so obvious. I might return to make a second novel, since I've had so many posters come out of the art of this book. Still there are several prints I haven't tried to sell as posters (only because of money constraints)

I've added some of the Gunchicks that are offered in my book here so you can enjoy them. Some of these are my personal favorites, I also included ones that are visually interesting. Rosie, biker chick are two of my favorites; there's a German Gunchick which I didn't add because it was topless and I don't know if that is acceptable content here. I also added the Iranian Gunchick which is covered to remain respectful. I will have to do a Israeli Gunchick too; somehow I left that one out of the first book.

From Gen-Eg;

Childhood
Commander Dockery followed the group of Military Special Projects Officers into the target building. As an unwanted observer from the Internal Security Directorate, the I.S.D. the other officers had been courteous but also standoffish. The Commander understood; not many people ever felt comfortable around members of the I.S.D. especially one who wasn't invited. He knew there had been heavy infighting between the I.S.D. and military special branch hierarchy. Apparently, for now, the I.S.D. had won, and he was sent to observe the operation or should he say the end of it? He arrived late into an ongoing search and destroy mission, a nationwide investigation for terrorists.


Several weeks before a group of criminals had hacked into several government directorates. Most attacks were minor, but they did grow in severity. The attack into the Power and Light Directorate was the worst. Five hundred miles of Westfor’s eastern seaboard found their electrical power shut off one busy afternoon. The deaths, damage, and sheer confusion that swept the affected area were severe. The I.S.D. was originally tasked with the investigation, and within days they had narrowed down the people who were responsible. They had three cells under surveillance, when the military suddenly stepped in. Overnight, the I.S.D. was given the backseat to the operation and the military’s special projects branch was put in charge. Now, the Commander had been sent to observe the military’s operation first hand. Groups of military policemen now sealed the streets and access ways into the large building block. According to the surveillance teams, the terrorist cell was operating on the twelfth floor. Now after fifteen seconds after the military had given the covert strike team the go code, it was over. The strike team had responded that they had secured the target. As the group walked through the garbage-filled hallways, the Commander thought that somehow the strike had failed.
The Commander smirked; somehow the targets must have slipped surveillance and escaped. He could not wait to report how the military had screwed up the operation; his superiors would be so pleased. As the officers entered the smoke-filled twelfth floor hallway, the Commander noticed a dozen armed soldiers of the strike team at key points. The Commander was stunned to see how young the soldiers were, they were children. He stopped and looked at a boy
who must have been no older than twelve years old. The Commander stopped smiling when he saw the bodies of the dead terrorists being dragged out of the apartment and neatly lined up on the floor.

66 looked up at the tall I.S.D. Commander, the one who had been staring at him as if he knew. 66 turned away as the Officer walked past him and observed the clean team work. The young super soldier concealed his nervousness. He wondered if the Officer knew. He had to; he was an Officer. 66 felt both frightened and disappointed by his performance. The Gen-Eg strike team had been given the target building layouts and photos minutes before the go code. The team leader quickly organized the roles of the assault force. 66 was given the task as the lead assaulter, the first through the door. As the team closed in on the apartment, the front door was rigged with explosives. Once set, the assault was green lighted. 66 followed the breeching explosion and entered the apartment. His training took over, and the team moved as they had been taught. 66 moved quickly to his assigned area of responsibility, where he encountered the first surprised terrorist. He then froze. The woman was standing in the kitchen holding a box of cereal, with a shocked expression on her face. To 66 she looked a lot like Mrs. Corwin. The similarity caused 66 to freeze. It only lasted seconds until another assaulter bumped into him as he passed 66. Then 66 reacted as he had been trained. He fired his compacted submachine gun into the woman’s chest. She screamed as she dropped, blood splattering onto the wall around her. 66 stared at her as she died on the dirty kitchen floor. He then moved on to clear the apartment. 66 eventually entered the living room which had been converted into a workshop. Tons of jerry-rigged computers and electronic gear crammed every inch of the living room. From floor to ceiling were machines and equipment. The team cleared the apartment, killing all the occupants as ordered. The terrorist leadership was to be arrested as they shopped in a nearby supermarket while the assault was taking place. Once the apartment was secured 66 walked back into the kitchen and looked at the woman he had killed. She seemed even more lifeless, as the pool of blood widened around her. At twelve years old, a lifetime of training and suffering, 66 had finally killed an enemy of the State. Something for which he had been created.


Gunchicks art

Rosie cover
Rosie cover
One of the most popular posters I sell at Con's. It also one of my personal favorites. I might rework the poster at one point.
One of the most popular posters I sell at Con's. It also one of my personal favorites. I might rework the poster at one point. | Source
During creation of this piece I decided to place the number six on the woman on the left. I think deep down I wanted to draw "Six" from BSG.
During creation of this piece I decided to place the number six on the woman on the left. I think deep down I wanted to draw "Six" from BSG. | Source
Source

How I create stuff!

Agent Butch Simms

Thoughts

Maybe I don't belong here, it seems that no matter what I do to this post it will not be approved. I have posted on many websites before but I have never had so much trouble being approved to post my work before. It has been a incredibly frustrating experience. I have very little time to spend on trying to understand just what is being asked "needs improvement" is not detailed enough information. I added videos, added more artwork, and still "needs improvement". Like I said maybe this isn't a site for struggling artists...

Can anyone name any of these artistically fashioned weapons?

    0 of 8192 characters used
    Post Comment

    No comments yet.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)