INTELLIGENCE OPERATIONS · COMPARTMENTED ACCESS
You are accessing the operational command terminal for covert intelligence gathering missions. This is not a combat simulator. This is an intelligence warfare platform. Your primary objective is not elimination—it is information extraction.

⚠ MISSION PRIORITY DIRECTIVE ⚠

PRIMARY OBJECTIVE: INTELLIGENCE GATHERING

Every terminal accessed. Every document read. Every conversation recorded. Every pattern recognized. The commander who returns with dead enemies and no intelligence has failed. The commander who returns with intelligence and living squad members has succeeded.

Information has mass. Intelligence has velocity. Knowledge is ammunition.
SQUAD ROSTER MANAGEMENT
Select four operatives from your available roster. These individuals will accompany you through multiple missions. They will learn. They will adapt. They will die if you fail them. Choose carefully.

CRITICAL: PERMADEATH PROTOCOLS

Dead operatives do not return. Their experience is lost. Their intelligence dies with them. Replacement personnel exist, but they start untrained. Every loss weakens your capability. Protect experienced operatives above all else.
AVAILABLE SPECIALIZATIONS

TACTICAL ANALYST

Intelligence Specialist
• Pattern recognition
• Terminal hacking
• Dialogue analysis
• Data synthesis
Essential for intel operations

INFILTRATOR

Stealth Operative
• Covert movement
• Security bypass
• Silent elimination
• Surveillance
Low profile, high value

COMBAT SPECIALIST

Security Element
• Squad protection
• Threat elimination
• Defensive tactics
• Exfiltration support
Last resort, not first option

TECHNICAL EXPERT

Systems Infiltration
• Network penetration
• Data extraction
• Communications intercept
• Electronic warfare
Turns systems against enemies

FIELD MEDIC

Life Support
• Medical treatment
• Casualty stabilization
• Augmentation analysis
• Biological intelligence
Keeps squad operational

MARKSMAN

Precision Elimination
• Long-range overwatch
• Target elimination
• Perimeter security
• Escape route coverage
One shot, mission saved
Squad Composition Doctrine: No optimal configuration exists. Mission parameters determine requirements. Urban infiltration demands different specialists than facility raids. Adapt or die.
MISSION PREPARATION PROTOCOLS
Before every operation, assess mission parameters and configure squad loadout accordingly. The correct equipment can mean the difference between intelligence success and catastrophic failure.
LOADOUT CONFIGURATION
Equipment directly affects mission capability. Every kilogram carried reduces mobility. Every weapon selected determines tactical options. Every tool chosen enables specific intelligence gathering methods.
PRIMARY WEAPONS
Coilguns, plasma rifles, neural disruptors. Lethal force is authorization, not requirement. Suppressors recommended.
INTELLIGENCE TOOLS
Data extraction devices, terminal bypass kits, quantum decryption modules. Mission critical.
SURVEILLANCE GEAR
Audio pickups, visual recorders, network sniffers. Every conversation contains intelligence.
MEDICAL SUPPLIES
Trauma kits, nano-suppressants, consciousness stabilizers. Dead operatives gather no intelligence.
ENVIRONMENTAL GEAR
Atmosphere suits, radiation protection, thermal regulation. Hostile environments kill efficiently.
SPECIALIZED EQUIPMENT
Mission-dependent. Varies by operation type, threat assessment, and environmental factors.

WEIGHT MANAGEMENT

Every operative has carry capacity limits. Exceed them and movement speed decreases, fatigue increases, combat effectiveness plummets. Heavy weapons mean slow infiltration. Light loadouts mean limited engagement capability. Balance is survival.
INTELLIGENCE GATHERING DIRECTIVES
Your mission is information warfare. The battlefield is data. Your weapons are observation, analysis, and pattern recognition. Follow these operational protocols:
  • TERMINAL ACCESS: Every computer system contains intelligence. Hack terminals. Read files. Download databases. 67% of mission-critical intelligence comes from electronic sources.
  • DIALOGUE INTELLIGENCE: Every conversation is an interrogation. Listen for inconsistencies. Recognize deception patterns. Ask questions that reveal more than they request.
  • ENVIRONMENTAL ANALYSIS: Every room tells a story. Empty coffee cups indicate recent presence. Worn paths show traffic patterns. Temperature variations suggest hidden chambers.
  • DOCUMENT COLLECTION: Every paper trail leads somewhere. Personnel files reveal relationships. Financial records expose corruption. Technical manuals identify vulnerabilities.
  • PATTERN RECOGNITION: Every date has significance. Every name implies allegiance. Every technology suggests capability. Connect information across missions.
  • BEHAVIORAL ANALYSIS: Every person reveals themselves through action. Nervous gestures indicate deception. Confident posture suggests authority. Hesitation betrays uncertainty.
  • STATISTICAL ANALYSIS FROM PREVIOUS OPERATIONS:

    • Commanders who prioritize intelligence gathering: 73% mission success rate
    • Commanders who prioritize combat: 34% mission success rate
    • Average intelligence value per hacked terminal: Critical to mission completion
    • Percentage of vital intel found in optional conversations: 58%
    • Squad survival rate when intelligence prioritized: 3.2x higher

    Conclusion: Information warfare wins wars. Shooting starts them.
    OPERATIONAL SECURITY

    ⚠ COMPROMISE PROTOCOLS ⚠

    If your squad is compromised:

    1. Transmit gathered intelligence immediately
    2. Destroy sensitive equipment
    3. Execute exfiltration protocols
    4. If capture inevitable, engage termination protocols

    Dead operatives cannot be interrogated. Ensure they stay that way.
    Enemy forces will attempt to extract intelligence from captured operatives. Resistance training provides 48-72 hours before psychological breakdown. Assume all captured intelligence is compromised after 72 hours. Plan accordingly.
    POST-MISSION DEBRIEFING
    After every operation, you will compile an intelligence report. This is not optional. This is not bureaucracy. This is how information becomes actionable intelligence.
    Required Intelligence Report Components:

    • Terminal data extracted and significance assessment
    • Personnel encountered and behavioral profiles
    • Environmental observations and tactical implications
    • Pattern connections to previous operations
    • New questions generated by gathered intelligence
    • Threat assessment updates
    • Recommended follow-up operations

    Intelligence not documented is intelligence lost.

    KNOWLEDGE PERSISTENCE

    Your gathered intelligence persists across missions. Patterns recognized in Mission 1 become survival tools in Mission 7. Names encountered early become critical contacts later. Dates mentioned casually reveal themselves as turning points.

    This is hardcore intelligence warfare: The game remembers everything. You must too.
    FINAL DIRECTIVE
    Commander, understand this: You are not training soldiers. You are training intelligence operatives who occasionally use weapons. Success is measured in data extracted, not enemies eliminated.
    The enemy can replace every soldier you kill.
    They cannot replace the intelligence you steal.
    Gather intelligence. Protect your squad. Learn the truth.
    SYSTEM: OPERATIONS COMMAND · CLASSIFICATION: COMPARTMENTED · STATUS: OPERATIONAL