INTELLIGENCE OPERATIONS · COMPARTMENTED ACCESS
You are accessing the operational command terminal for covert intelligence gathering missions. This is not a combat simulator. This is an intelligence warfare platform. Your primary objective is not elimination—it is information extraction.
⚠ MISSION PRIORITY DIRECTIVE ⚠
PRIMARY OBJECTIVE: INTELLIGENCE GATHERING
Every terminal accessed. Every document read. Every conversation recorded. Every pattern recognized. The commander who returns with dead enemies and no intelligence has failed. The commander who returns with intelligence and living squad members has succeeded.
Information has mass. Intelligence has velocity. Knowledge is ammunition.
Select four operatives from your available roster. These individuals will accompany you through multiple missions. They will learn. They will adapt. They will die if you fail them. Choose carefully.
CRITICAL: PERMADEATH PROTOCOLS
Dead operatives do not return. Their experience is lost. Their intelligence dies with them. Replacement personnel exist, but they start untrained. Every loss weakens your capability. Protect experienced operatives above all else.
TACTICAL ANALYST
Intelligence Specialist
• Pattern recognition
• Terminal hacking
• Dialogue analysis
• Data synthesis
Essential for intel operations
INFILTRATOR
Stealth Operative
• Covert movement
• Security bypass
• Silent elimination
• Surveillance
Low profile, high value
COMBAT SPECIALIST
Security Element
• Squad protection
• Threat elimination
• Defensive tactics
• Exfiltration support
Last resort, not first option
TECHNICAL EXPERT
Systems Infiltration
• Network penetration
• Data extraction
• Communications intercept
• Electronic warfare
Turns systems against enemies
FIELD MEDIC
Life Support
• Medical treatment
• Casualty stabilization
• Augmentation analysis
• Biological intelligence
Keeps squad operational
MARKSMAN
Precision Elimination
• Long-range overwatch
• Target elimination
• Perimeter security
• Escape route coverage
One shot, mission saved
Squad Composition Doctrine: No optimal configuration exists. Mission parameters determine requirements. Urban infiltration demands different specialists than facility raids. Adapt or die.
Before every operation, assess mission parameters and configure squad loadout accordingly. The correct equipment can mean the difference between intelligence success and catastrophic failure.
Equipment directly affects mission capability. Every kilogram carried reduces mobility. Every weapon selected determines tactical options. Every tool chosen enables specific intelligence gathering methods.
PRIMARY WEAPONS
Coilguns, plasma rifles, neural disruptors. Lethal force is authorization, not requirement. Suppressors recommended.
INTELLIGENCE TOOLS
Data extraction devices, terminal bypass kits, quantum decryption modules.
Mission critical.
SURVEILLANCE GEAR
Audio pickups, visual recorders, network sniffers. Every conversation contains intelligence.
MEDICAL SUPPLIES
Trauma kits, nano-suppressants, consciousness stabilizers. Dead operatives gather no intelligence.
ENVIRONMENTAL GEAR
Atmosphere suits, radiation protection, thermal regulation. Hostile environments kill efficiently.
SPECIALIZED EQUIPMENT
Mission-dependent. Varies by operation type, threat assessment, and environmental factors.
WEIGHT MANAGEMENT
Every operative has carry capacity limits. Exceed them and movement speed decreases, fatigue increases, combat effectiveness plummets. Heavy weapons mean slow infiltration. Light loadouts mean limited engagement capability. Balance is survival.
Your mission is information warfare. The battlefield is data. Your weapons are observation, analysis, and pattern recognition. Follow these operational protocols:
TERMINAL ACCESS: Every computer system contains intelligence. Hack terminals. Read files. Download databases. 67% of mission-critical intelligence comes from electronic sources.
DIALOGUE INTELLIGENCE: Every conversation is an interrogation. Listen for inconsistencies. Recognize deception patterns. Ask questions that reveal more than they request.
ENVIRONMENTAL ANALYSIS: Every room tells a story. Empty coffee cups indicate recent presence. Worn paths show traffic patterns. Temperature variations suggest hidden chambers.
DOCUMENT COLLECTION: Every paper trail leads somewhere. Personnel files reveal relationships. Financial records expose corruption. Technical manuals identify vulnerabilities.
PATTERN RECOGNITION: Every date has significance. Every name implies allegiance. Every technology suggests capability. Connect information across missions.
BEHAVIORAL ANALYSIS: Every person reveals themselves through action. Nervous gestures indicate deception. Confident posture suggests authority. Hesitation betrays uncertainty.
STATISTICAL ANALYSIS FROM PREVIOUS OPERATIONS:
• Commanders who prioritize intelligence gathering: 73% mission success rate
• Commanders who prioritize combat: 34% mission success rate
• Average intelligence value per hacked terminal: Critical to mission completion
• Percentage of vital intel found in optional conversations: 58%
• Squad survival rate when intelligence prioritized: 3.2x higher
Conclusion: Information warfare wins wars. Shooting starts them.
⚠ COMPROMISE PROTOCOLS ⚠
If your squad is compromised:
1. Transmit gathered intelligence immediately
2. Destroy sensitive equipment
3. Execute exfiltration protocols
4. If capture inevitable, engage termination protocols
Dead operatives cannot be interrogated. Ensure they stay that way.
Enemy forces will attempt to extract intelligence from captured operatives. Resistance training provides 48-72 hours before psychological breakdown. Assume all captured intelligence is compromised after 72 hours. Plan accordingly.
After every operation, you will compile an intelligence report. This is not optional. This is not bureaucracy. This is how information becomes actionable intelligence.
Required Intelligence Report Components:
• Terminal data extracted and significance assessment
• Personnel encountered and behavioral profiles
• Environmental observations and tactical implications
• Pattern connections to previous operations
• New questions generated by gathered intelligence
• Threat assessment updates
• Recommended follow-up operations
Intelligence not documented is intelligence lost.
KNOWLEDGE PERSISTENCE
Your gathered intelligence persists across missions. Patterns recognized in Mission 1 become survival tools in Mission 7. Names encountered early become critical contacts later. Dates mentioned casually reveal themselves as turning points.
This is hardcore intelligence warfare: The game remembers everything. You must too.
Commander, understand this: You are not training soldiers. You are training intelligence operatives who occasionally use weapons. Success is measured in data extracted, not enemies eliminated.
The enemy can replace every soldier you kill.
They cannot replace the intelligence you steal.
Gather intelligence. Protect your squad. Learn the truth.
SYSTEM: OPERATIONS COMMAND
·
CLASSIFICATION: COMPARTMENTED
·
STATUS: OPERATIONAL