mirror of
https://github.com/cliffe/BreakEscape.git
synced 2026-02-21 11:18:08 +00:00
Add Mission 5 Planning Summary & Implementation Guide
Comprehensive consolidation of all planning stages (0, 1, 2, 4, 5, 6): - Executive summary with core gameplay loop - Planning documentation index with key content from each stage - Character profiles (Torres, Patricia, Chen, Kevin, Lisa, Agent 0x99) - Technical implementation guide (60+ global variables, Ink tags) - Complete NPC dialogue structure examples - Campaign integration (4 ending paths, M6-M10 impact) - Success metrics (S/A/B/C ranks with requirements) - Design philosophy and unique features Total planning: 5,632 lines across 6 stages Ready for Stage 7 (Ink Scripting) and Stage 9 (Assembly)
This commit is contained in:
@@ -0,0 +1,718 @@
|
||||
# Mission 5 "Insider Trading" - Planning Summary & Implementation Guide
|
||||
|
||||
## Mission Overview
|
||||
|
||||
**Mission ID:** M05
|
||||
**Title:** Insider Trading
|
||||
**Duration:** 70-90 minutes
|
||||
**Difficulty:** Tier 2 (Intermediate)
|
||||
**Type:** Investigation / Social Engineering / VM Exploitation
|
||||
|
||||
**ENTROPY Cell:** Insider Threat Initiative
|
||||
**SecGen Scenario:** "Feeling Blu" (Bludit CMS exploitation)
|
||||
**VM Flags:** 4 flags (reconnaissance, exploitation, data discovery, Architect communications)
|
||||
|
||||
---
|
||||
|
||||
## Executive Summary
|
||||
|
||||
Mission 5 "Insider Trading" is a corporate espionage investigation where players infiltrate **Quantum Dynamics Corporation** to identify and stop an insider exfiltrating classified quantum cryptography research. The insider, **David Torres**, was systematically targeted by ENTROPY's Insider Threat Initiative due to crushing medical debt ($180K) from his wife Elena's terminal cancer.
|
||||
|
||||
**Key Design Innovation:** Torres is a **sympathetic villain** - a desperate father manipulated by ENTROPY, not a true believer. He believes he's helping "investigative journalists" expose defense corruption, unaware his data is being sold to foreign governments (China, Russia, Iran) for $68 million, which will result in 12-40 intelligence officer deaths.
|
||||
|
||||
**Core Gameplay Loop:**
|
||||
1. **Investigation** - Review security logs, identify suspicious patterns
|
||||
2. **Social Engineering** - Clone badges, interview employees, build trust
|
||||
3. **Evidence Gathering** - Search Torres' office, discover medical bills/journal/communications
|
||||
4. **VM Exploitation** - Hack Bludit CMS server for 4 flags proving ENTROPY involvement
|
||||
5. **Evidence Correlation** - Synthesize physical + digital evidence at Evidence Board
|
||||
6. **Confrontation** - Present evidence to Torres, reveal manipulation, make critical choice
|
||||
|
||||
**Four Endings:**
|
||||
1. **Turn Double Agent** (S-Rank) - Torres becomes SAFETYNET asset, helps expose 47 other targets
|
||||
2. **Arrest** - By-the-book justice, Torres faces espionage charges
|
||||
3. **Sympathetic Release** - Let Torres go with warning (moral mercy, operational risk)
|
||||
4. **Public Exposure** - Leak to media, destroy ENTROPY's program + Torres' life
|
||||
|
||||
---
|
||||
|
||||
## Planning Documentation Index
|
||||
|
||||
### Stage 0: Initialization (888 lines)
|
||||
**File:** `stages/stage_0_initialization.md`
|
||||
|
||||
**Key Content:**
|
||||
- **Specific ENTROPY Threat:** 4.2 TB Project Heisenberg exfiltration (73% complete)
|
||||
- **Body Count:** 12-40 intelligence officers will die if data reaches foreign governments
|
||||
- **Financial Stakes:** $68M ENTROPY revenue, $4.2B DoD program wasted, $180K Torres' medical debt
|
||||
- **The Insider Profile:** David Torres - PhD cryptographer, wife Stage 3 cancer, 2 children (Sofia 11, Miguel 8)
|
||||
- **ENTROPY 4-Phase Plan:** Exfiltration (73%) → Analysis (2 weeks) → Distribution ($45-70M sales) → Deployment (casualties within 60-90 days)
|
||||
- **The Recruiter's Manipulation:** Posed as "investigative journalists", Torres unaware of foreign sales
|
||||
|
||||
**Critical Numbers:**
|
||||
- 847 pages classified quantum protocols
|
||||
- 14 zero-day vulnerabilities in competitor systems
|
||||
- 247 DoD facilities deployment database
|
||||
- 22 active ENTROPY insider placements
|
||||
- 47 total targets under evaluation
|
||||
|
||||
### Stage 1: Narrative Structure (1,378 lines)
|
||||
**File:** `stages/stage_1/story_arc.md`
|
||||
|
||||
**Key Content:**
|
||||
- **3-Act Structure:**
|
||||
- Act 1 (20-25 min): Corporate infiltration, narrow 8 suspects to 3
|
||||
- Act 2 (35-45 min): VM exploitation + evidence gathering, identify Torres
|
||||
- Act 3 (15-20 min): Confrontation, reveal truth, 4 branching choices
|
||||
- **60+ Global Variables:** Tracks actual player actions, not vague "approaches"
|
||||
- **Opening Briefing:** Agent 0x99 establishes stakes (12-40 casualties, specific data at risk)
|
||||
- **Closing Debrief:** Reflects on choice, consequences for campaign, Torres' fate
|
||||
|
||||
**Key Story Beats:**
|
||||
1. Arrival at Quantum Dynamics (Patricia Morgan briefing)
|
||||
2. Security log analysis (identify pattern)
|
||||
3. Badge cloning (social engineering)
|
||||
4. Torres office discovery (medical bills, journal, briefcase)
|
||||
5. Server room access (VM challenges)
|
||||
6. Evidence correlation (synthesize findings)
|
||||
7. Confrontation (reveal ENTROPY manipulation)
|
||||
8. Critical choice (4 paths)
|
||||
9. Stop upload (prevent final exfiltration)
|
||||
10. Debrief (consequences)
|
||||
|
||||
### Stage 2: Atmosphere & Environment (535 lines)
|
||||
**File:** `stages/stage_2/atmosphere_environment.md`
|
||||
|
||||
**Key Content:**
|
||||
- **Tone:** Corporate noir thriller with moral complexity
|
||||
- **Setting:** Modern Bay Area tech campus, late afternoon (4:30 PM)
|
||||
- **Torres Characterization:** CRITICAL - He's a victim, not villain
|
||||
- Manipulated through desperation
|
||||
- Genuinely believes "journalist" cover story
|
||||
- Feels remorse (journal proves it)
|
||||
- Can be turned (primary S-rank path)
|
||||
|
||||
**5 Emotional Moments:**
|
||||
1. Medical bills discovery - $380K crushing debt
|
||||
2. Journal reading - "What have I done? Elena would be horrified"
|
||||
3. Children's drawings - "Get well soon Mommy"
|
||||
4. Confrontation - Torres' horror learning the truth
|
||||
5. The choice - Justice vs. mercy
|
||||
|
||||
**Environmental Storytelling:**
|
||||
- Torres' office: Family photos + medical bills = complete tragedy
|
||||
- Break room: Empty coffee mug (Torres too stressed to drink)
|
||||
- Server room: Technical precision contrasts human desperation
|
||||
- Research lab: Cutting-edge tech shows value of stolen data
|
||||
|
||||
### Stage 4: Player Objectives (692 lines)
|
||||
**File:** `stages/stage_4/objectives_tasks.md`
|
||||
|
||||
**Key Content:**
|
||||
- **3 Objectives, 8 Aims, 32 Tasks** (24 required, 8 optional)
|
||||
|
||||
**Objective 1: Investigate the Threat**
|
||||
- Aim 1.1: Gain Access (3 tasks)
|
||||
- Aim 1.2: Initial Investigation (4 tasks)
|
||||
|
||||
**Objective 2: Gather Intelligence**
|
||||
- Aim 2.1: Exploit Bludit Server (5 tasks - VM flags)
|
||||
- Aim 2.2: Collect Physical Evidence (5 tasks)
|
||||
- Aim 2.3: Interview Team Members (5 tasks - all optional)
|
||||
|
||||
**Objective 3: Stop Operation Schrödinger**
|
||||
- Aim 3.1: Confront Insider (4 tasks - includes branching choice)
|
||||
- Aim 3.2: Prevent Final Exfiltration (4 tasks)
|
||||
- Aim 3.3: Report Mission Outcome (2 tasks)
|
||||
|
||||
**Success Ranks:**
|
||||
- **S-Rank:** All required + 6/8 optional, all flags, Torres turned, zero-days patched
|
||||
- **A-Rank:** All required + 4/8 optional, all flags
|
||||
- **B-Rank:** All required + 2/8 optional, 3+ flags
|
||||
- **C-Rank:** All required tasks, minimum 2 flags
|
||||
|
||||
**Evidence Level System:**
|
||||
- Tracks investigation progress (0-7+)
|
||||
- evidence_level >= 4 required to unlock confrontation
|
||||
- Sources: Medical bills (+1), Journal (+1), Each VM flag (+1), Briefcase (+1), Interviews (+0-2)
|
||||
|
||||
### Stage 5: Room Layout Design (1,562 lines)
|
||||
**File:** `stages/stage_5/room_layout.md`
|
||||
|
||||
**Key Content:**
|
||||
- **11 Rooms:** Hub-and-spoke design with central corridor
|
||||
- **Progressive Unlocking:** 5 unlock stages based on investigation progress
|
||||
- **Lock Variety:** 5 types (PIN, Physical Key, RFID, Password, Biometric)
|
||||
- **All 32 tasks mapped to specific room locations**
|
||||
|
||||
**Room List:**
|
||||
1. Reception Lobby (10×8 GU) - Entry, meet Patricia
|
||||
2. Main Corridor (15×6 GU) - Hub connecting all areas
|
||||
3. Break Room (8×8 GU) - Optional social, LORE Fragment 1
|
||||
4. Conference Room (10×8 GU) - Evidence Board, CyberChef workstation
|
||||
5. Open Office Area (12×10 GU) - Security logs, employee files, interviews
|
||||
6. Server Hallway (8×4 GU) - Badge-locked checkpoint
|
||||
7. Server Room (10×10 GU) - VM terminal, drop-site, LORE Fragment 2
|
||||
8. Torres' Office (8×8 GU) - Medical bills, journal, briefcase, server password
|
||||
9. Research Lab (12×10 GU) - Dr. Chen, Project Heisenberg specs, LORE Fragment 3
|
||||
10. Patricia's Office (8×7 GU) - Phone accessible, security monitors
|
||||
11. Archive Storage (6×8 GU) - Torres' background, LORE Fragment 4
|
||||
|
||||
**Critical Path Lock Sequence:**
|
||||
1. Filing Cabinet PIN (0415) → Employee directory → Identify Torres
|
||||
2. Clone Employee Badge → Server hallway access
|
||||
3. Find Torres Office Key → Access office
|
||||
4. Torres Desk Key → Server password "Heisenberg2024"
|
||||
5. Server Room Password → VM access
|
||||
6. Torres Briefcase PIN (0811) → ENTROPY communications
|
||||
|
||||
**4 Required Backtracking Moments:**
|
||||
1. Evidence Board - Correlate physical + digital evidence
|
||||
2. Server Room - Return with password to access VM
|
||||
3. Torres Office - Return after identifying suspect
|
||||
4. Badge Cloning - Return to NPCs to get employee badge
|
||||
|
||||
### Stage 6: LORE Fragments (577 lines)
|
||||
**File:** `stages/stage_6/lore_fragments.md`
|
||||
|
||||
**Key Content:**
|
||||
- **4 LORE Fragments** (3 evidence, 1 technical context)
|
||||
|
||||
**Fragment 1: Recruiting Pamphlet** (Easy - Break Room)
|
||||
- Shows systematic insider recruitment methodology
|
||||
- 22 active placements, $180-240M annual revenue
|
||||
- "Investigative journalists" cover story revealed
|
||||
- Torres fits exact profile (medical debt, access, family crisis)
|
||||
|
||||
**Fragment 2: Architect's Protocol** (Medium - Server Room Cabinet)
|
||||
- **CRITICAL EVIDENCE** - The Architect personally authorized operation
|
||||
- Specific casualty projections: 12-40 intelligence officers
|
||||
- Foreign sales: $28M China, $22M Russia, $18M Iran
|
||||
- "Asset is expendable" - proves ENTROPY's cold calculation
|
||||
- Timeline: 14 days to exfiltration complete, 60-90 days to first casualties
|
||||
|
||||
**Fragment 3: Heisenberg Specs** (Hard - Research Lab)
|
||||
- Technical context about stolen quantum crypto research
|
||||
- 847 pages QKD protocols, 14 zero-days, 247 facilities
|
||||
- Shows why ENTROPY targeted this specifically
|
||||
- Optional but enriches understanding
|
||||
|
||||
**Fragment 4: Target Selection Criteria** (Hard - Archive)
|
||||
- **CRITICAL EVIDENCE** - Database of 47 profiled targets
|
||||
- Torres listed as "QD-001" with exact vulnerability scores
|
||||
- Shows other victims: Marcus (gambling), Rachel (son's treatment)
|
||||
- Vulnerability scoring: Financial (35%), Access (40%), Psychological (25%)
|
||||
- "Torres template effective" - implies they'll recruit more like him
|
||||
|
||||
**Debrief Integration:**
|
||||
- Each fragment acknowledged by Agent 0x99
|
||||
- Complete collection unlocks `lore_completionist` bonus
|
||||
- Evidence supports "turn double agent" path (Torres sees manipulation)
|
||||
|
||||
---
|
||||
|
||||
## Character Profiles
|
||||
|
||||
### David Torres (Primary Antagonist - Sympathetic Villain)
|
||||
**Role:** Cryptography Lead, Quantum Dynamics Corporation
|
||||
**Age:** 38
|
||||
**Family:** Wife Elena (Stage 3 cancer), Daughter Sofia (11), Son Miguel (8)
|
||||
**Debt:** $180K medical bills
|
||||
|
||||
**Characterization:**
|
||||
- PhD in cryptography, top of his field
|
||||
- Clean security record (TS/SCI clearance for 8 years)
|
||||
- Desperate but not criminal by nature
|
||||
- Manipulated, not radicalized
|
||||
- Believes he's helping "investigative journalists expose defense corruption"
|
||||
- Unaware data goes to foreign governments
|
||||
- Unaware of casualty projections
|
||||
|
||||
**Critical Design:** Torres is a **victim**, not a villain. His journal shows remorse. When confronted with truth (Architect communications showing foreign sales + casualties), he's **horrified**. This creates moral complexity - he committed espionage, but was manipulated. Player must decide: justice (arrest) vs. mercy (turn/release) vs. exposure (destroy).
|
||||
|
||||
**Voice:**
|
||||
- Defensive initially ("I had no choice")
|
||||
- Desperate justification ("Elena was dying")
|
||||
- Genuine horror when truth revealed ("What have I done?")
|
||||
- NOT the evil monologue - he's broken, not defiant
|
||||
|
||||
### Patricia Morgan (Mission Handler - In-Person + Phone)
|
||||
**Role:** Chief Security Officer, Quantum Dynamics
|
||||
**Age:** 52
|
||||
**Background:** Former USMC (1976-1996), corporate security veteran
|
||||
|
||||
**Characterization:**
|
||||
- Professional, no-nonsense
|
||||
- Frustrated by breach but composed
|
||||
- Works with player as peer, not subordinate
|
||||
- Provides authorization when stuck
|
||||
- Military bearing, patriotic (safe PIN: 1776)
|
||||
|
||||
**Voice:**
|
||||
- Direct, clear communication
|
||||
- Tactical language ("status", "sitrep", "containment")
|
||||
- Trusts player's expertise
|
||||
- Concerned about DoD contracts, company reputation
|
||||
|
||||
### Dr. Sarah Chen (Optional NPC - Research Lab)
|
||||
**Role:** Chief Scientist, Project Heisenberg Lead
|
||||
**Age:** 45
|
||||
**Expertise:** Quantum cryptography
|
||||
|
||||
**Characterization:**
|
||||
- Brilliant, protective of research
|
||||
- Understands what's at stake technically
|
||||
- Shocked Torres is suspect (worked together 3 years)
|
||||
- Can provide technical context and research badge access
|
||||
|
||||
**Voice:**
|
||||
- Technical precision
|
||||
- Educational (explains quantum crypto if asked)
|
||||
- Disappointed in Torres (trusted him)
|
||||
- Focused on research security, not people drama
|
||||
|
||||
### Kevin Park (Badge Clone Target - Open Office)
|
||||
**Role:** IT Systems Administrator
|
||||
**Age:** 29
|
||||
**Relationship:** Tech ally, casual friend to Torres
|
||||
|
||||
**Characterization:**
|
||||
- Helpful, casual tech guy
|
||||
- Noticed Torres acting strange lately
|
||||
- Has employee badge (cloneable via social engineering)
|
||||
- Can provide lockpick if player builds rapport (influence >= 6)
|
||||
|
||||
**Voice:**
|
||||
- Casual, friendly
|
||||
- Tech jargon mixed with casual speech
|
||||
- Gossips about office dynamics
|
||||
- Willing to help if approached right
|
||||
|
||||
### Lisa Park (Optional NPC - Break Room)
|
||||
**Role:** Marketing Coordinator
|
||||
**Age:** 31
|
||||
**Relationship:** Office observer, casual acquaintance to Torres
|
||||
|
||||
**Characterization:**
|
||||
- Observant about office morale
|
||||
- Noticed Torres stressed, distracted lately
|
||||
- Provides humanizing details (coffee habits, family mentions)
|
||||
- Optional social path for context
|
||||
|
||||
**Voice:**
|
||||
- Conversational, empathetic
|
||||
- Office gossip (not malicious, concerned)
|
||||
- Humanizes Torres before player knows he's insider
|
||||
|
||||
### Agent 0x99 (Handler - Phone Only)
|
||||
**Role:** SAFETYNET Mission Handler
|
||||
**Background:** Player's primary contact throughout campaign
|
||||
|
||||
**Characterization:**
|
||||
- Professional spymaster, cool under pressure
|
||||
- Morally complex (understands Torres' dilemma)
|
||||
- Strategic thinker (sees bigger picture - 47 other targets)
|
||||
- Respects player's choices but provides guidance
|
||||
|
||||
**Voice:**
|
||||
- Brief, tactical communication
|
||||
- Acknowledges moral complexity
|
||||
- Provides context (campaign continuity)
|
||||
- Reflects on choices in debrief without judgment
|
||||
|
||||
---
|
||||
|
||||
## Technical Implementation Guide
|
||||
|
||||
### Global Variables (60+ tracked)
|
||||
|
||||
**Investigation Progress:**
|
||||
```ink
|
||||
VAR reviewed_security_logs = false
|
||||
VAR identified_upload_pattern = false
|
||||
VAR torres_identified = false
|
||||
VAR evidence_level = 0 // 0-7+, gates confrontation at >= 4
|
||||
```
|
||||
|
||||
**Evidence Discovery:**
|
||||
```ink
|
||||
VAR found_medical_bills = false
|
||||
VAR found_torres_journal = false
|
||||
VAR found_briefcase_comms = false
|
||||
VAR found_usb_device = false
|
||||
```
|
||||
|
||||
**VM Flags:**
|
||||
```ink
|
||||
VAR flag1_submitted = false
|
||||
VAR flag2_submitted = false
|
||||
VAR flag3_submitted = false
|
||||
VAR flag4_submitted = false // Unlocks Architect communications
|
||||
```
|
||||
|
||||
**LORE Discovery:**
|
||||
```ink
|
||||
VAR found_recruiting_pamphlet = false
|
||||
VAR found_architect_protocol = false
|
||||
VAR found_heisenberg_specs = false
|
||||
VAR found_target_criteria = false
|
||||
VAR lore_completionist = false // All 4 fragments
|
||||
```
|
||||
|
||||
**NPC Relationships:**
|
||||
```ink
|
||||
VAR patricia_trust = 5 // Starts moderate
|
||||
VAR kevin_influence = 0 // Build to >= 6 for lockpick
|
||||
VAR chen_trust = 0 // Build for research lab access
|
||||
VAR lisa_rapport = 0
|
||||
```
|
||||
|
||||
**Interviews Conducted:**
|
||||
```ink
|
||||
VAR interviewed_chen = false
|
||||
VAR interviewed_kevin = false
|
||||
VAR interviewed_lisa = false
|
||||
VAR informed_patricia = false
|
||||
```
|
||||
|
||||
**Critical Choice & Outcome:**
|
||||
```ink
|
||||
VAR final_choice = "" // "turn_double_agent", "arrest", "sympathetic_release", "public_exposure"
|
||||
VAR torres_turned = false
|
||||
VAR elena_treatment_funded = false
|
||||
VAR torres_arrested = false
|
||||
VAR entropy_program_exposed = false
|
||||
```
|
||||
|
||||
### Ink Tag Usage Examples
|
||||
|
||||
**Task Completion:**
|
||||
```ink
|
||||
=== review_security_logs ===
|
||||
You access the security terminal. Badge access logs for past 30 days displayed.
|
||||
|
||||
+ [Filter for unusual late-night access]
|
||||
2-4 AM access pattern detected. Same badge, 47 occurrences.
|
||||
#complete_task:review_security_logs
|
||||
#increment:evidence_level
|
||||
~ reviewed_security_logs = true
|
||||
-> identify_pattern
|
||||
```
|
||||
|
||||
**Unlocking New Areas:**
|
||||
```ink
|
||||
=== clone_employee_badge ===
|
||||
You successfully clone Kevin's employee badge.
|
||||
|
||||
#complete_task:clone_employee_badge
|
||||
#unlock_room:server_hallway
|
||||
The server hallway is now accessible.
|
||||
-> DONE
|
||||
```
|
||||
|
||||
**Evidence Level Gating:**
|
||||
```ink
|
||||
=== evidence_board_correlation ===
|
||||
+ {evidence_level >= 4} [Correlate all evidence]
|
||||
Medical bills. Journal. VM flags. Briefcase communications.
|
||||
Everything points to David Torres.
|
||||
|
||||
#complete_task:correlate_evidence
|
||||
#unlock_aim:stop_operation_schrodinger
|
||||
You know who the insider is. Time to confront him.
|
||||
-> DONE
|
||||
|
||||
+ {evidence_level < 4} [Try to correlate evidence]
|
||||
You don't have enough evidence yet.
|
||||
{not flag4_submitted: Complete the VM exploitation to find The Architect's communications.}
|
||||
-> DONE
|
||||
```
|
||||
|
||||
**Branching Choice:**
|
||||
```ink
|
||||
=== confrontation_choice ===
|
||||
Torres: *hands shaking* What have I done? Twelve to forty people?
|
||||
|
||||
You have the evidence. You know the truth. What do you do?
|
||||
|
||||
+ [Offer him a deal: Become a double agent]
|
||||
#complete_task:make_critical_choice
|
||||
#set:final_choice:turn_double_agent
|
||||
~ torres_turned = true
|
||||
-> turn_double_agent_path
|
||||
|
||||
+ [Arrest him. He committed espionage.]
|
||||
#complete_task:make_critical_choice
|
||||
#set:final_choice:arrest
|
||||
~ torres_arrested = true
|
||||
-> arrest_path
|
||||
|
||||
+ [Let him go with a warning. He's been through enough.]
|
||||
#complete_task:make_critical_choice
|
||||
#set:final_choice:sympathetic_release
|
||||
-> sympathetic_release_path
|
||||
|
||||
+ [Expose everything publicly. Burn ENTROPY's program.]
|
||||
#complete_task:make_critical_choice
|
||||
#set:final_choice:public_exposure
|
||||
~ entropy_program_exposed = true
|
||||
-> public_exposure_path
|
||||
```
|
||||
|
||||
### NPC Dialogue Structure
|
||||
|
||||
**Patricia Morgan - Initial Meeting:**
|
||||
```ink
|
||||
=== meet_patricia_morgan ===
|
||||
#speaker:patricia_morgan
|
||||
#location:reception_lobby
|
||||
|
||||
A woman in her early 50s approaches. Military bearing, sharp eyes. Former Marine, you'd guess.
|
||||
|
||||
Patricia: You must be the SAFETYNET consultant. Patricia Morgan, Chief Security Officer.
|
||||
Patricia: Thanks for coming on short notice.
|
||||
|
||||
+ [Glad to help. What's the situation?]
|
||||
Patricia: Data exfiltration. 4.2 terabytes over the past six weeks.
|
||||
Patricia: Project Heisenberg. Quantum cryptography research.
|
||||
-> briefing_details
|
||||
|
||||
+ [Let's skip the pleasantries. I need access.]
|
||||
Patricia: Direct. I like it.
|
||||
Patricia: Here's your visitor badge. Limited access for now.
|
||||
-> receive_badge
|
||||
|
||||
=== briefing_details ===
|
||||
Patricia: The data's classified. DoD contracts. Quantum key distribution.
|
||||
Patricia: If it reaches foreign governments...
|
||||
|
||||
+ [I understand the stakes. Who has access?]
|
||||
Patricia: Eight people with TS/SCI clearance. Cryptography division.
|
||||
-> suspect_list
|
||||
|
||||
+ [What's been exfiltrated so far?]
|
||||
Patricia: 73% of Project Heisenberg. 847 pages of protocols, zero-day exploits, deployment database.
|
||||
Patricia: We're on a timer.
|
||||
-> timer_urgency
|
||||
|
||||
=== receive_badge ===
|
||||
#give_item:visitor_badge
|
||||
#complete_task:obtain_security_badge
|
||||
|
||||
Patricia hands you a visitor badge.
|
||||
|
||||
Patricia: This gets you into public areas. For restricted zones, you'll need to... improvise.
|
||||
Patricia: I'll be available by phone if you need authorization.
|
||||
|
||||
#complete_task:meet_patricia_morgan
|
||||
#unlock_room:main_corridor
|
||||
|
||||
+ [Understood. Where should I start?]
|
||||
Patricia: Security logs in the open office area. Look for patterns.
|
||||
Patricia: And talk to people. Someone knows something.
|
||||
-> DONE
|
||||
```
|
||||
|
||||
**Torres Confrontation - Turn Double Agent Path:**
|
||||
```ink
|
||||
=== turn_double_agent_path ===
|
||||
You: I'm not here to arrest you, David.
|
||||
You: I'm here to offer you a way out.
|
||||
|
||||
Torres: *looks up, hopeful but cautious* What do you mean?
|
||||
|
||||
You: Work for us. Feed ENTROPY false data. Help us identify the other 47 targets.
|
||||
|
||||
{found_target_criteria:
|
||||
You: Yes, I found the database. You're "QD-001." There are 46 others.
|
||||
Torres: *horrified* Forty-six more people like me?
|
||||
}
|
||||
|
||||
Torres: And... Elena?
|
||||
|
||||
+ [We fund her treatment. Full coverage.]
|
||||
~ elena_treatment_funded = true
|
||||
Torres: *voice breaking* You'd do that?
|
||||
You: Conditional on your cooperation. But yes.
|
||||
-> torres_accepts
|
||||
|
||||
+ [We can't make promises. But we'll see what we can do.]
|
||||
Torres: *desperate* That's not good enough.
|
||||
You: It's better than prison, David.
|
||||
-> torres_reluctantly_accepts
|
||||
|
||||
=== torres_accepts ===
|
||||
Torres: *nods slowly* Okay. Okay, I'll do it.
|
||||
Torres: What do you need from me?
|
||||
|
||||
You: First, stop the current upload. Then we'll debrief properly.
|
||||
You: The Recruiter will contact you again. When they do, you come to us immediately.
|
||||
|
||||
Torres: And the 46 others?
|
||||
|
||||
You: We save them if we can.
|
||||
|
||||
#set:torres_turned_successfully=true
|
||||
-> stop_upload_sequence
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Implementation Checklist
|
||||
|
||||
### Pre-Implementation Requirements
|
||||
|
||||
**Stage 7: Ink Scripting** (Not yet started)
|
||||
- [ ] Opening cutscene (Agent 0x99 briefing)
|
||||
- [ ] Patricia Morgan dialogues (initial meeting, phone support)
|
||||
- [ ] Kevin Park dialogue (badge cloning, tech ally)
|
||||
- [ ] Lisa Park dialogue (optional social, office gossip)
|
||||
- [ ] Dr. Sarah Chen dialogue (technical expert, research lab)
|
||||
- [ ] Torres confrontation (4 branching paths)
|
||||
- [ ] Evidence discovery moments (medical bills, journal, briefcase)
|
||||
- [ ] VM flag submission dialogues
|
||||
- [ ] Evidence board correlation
|
||||
- [ ] Stop upload sequence
|
||||
- [ ] Closing debrief (4 variations based on choice)
|
||||
|
||||
**Stage 9: Scenario Assembly** (Not yet started)
|
||||
- [ ] scenario.json.erb configuration
|
||||
- [ ] Room definitions (11 rooms with exact coordinates)
|
||||
- [ ] Container placements (19 containers, 8 locked)
|
||||
- [ ] Lock configurations (13 locks, 5 types)
|
||||
- [ ] NPC placements (6 NPCs, positions specified)
|
||||
- [ ] Interactive object definitions
|
||||
- [ ] Objectives/aims/tasks JSON structure
|
||||
- [ ] Global variable initialization
|
||||
- [ ] VM integration configuration
|
||||
|
||||
**Additional Requirements:**
|
||||
- [ ] Sprite assets (Torres, Patricia, Chen, Kevin, Lisa, Agent 0x99)
|
||||
- [ ] Background art (11 rooms - reception, corridor, offices, lab, server room)
|
||||
- [ ] Audio (ambient office sounds, server room hum, tension music)
|
||||
- [ ] UI elements (evidence board interface, CyberChef workstation)
|
||||
- [ ] SecGen scenario "Feeling Blu" (Bludit CMS exploitation, 4 flags)
|
||||
|
||||
---
|
||||
|
||||
## Campaign Integration
|
||||
|
||||
### If Torres Turned (Double Agent Path):
|
||||
**Impact on M6-M10:**
|
||||
- Torres provides intelligence on 22 active insider placements
|
||||
- Identifies 47 targets under evaluation
|
||||
- SAFETYNET can warn/protect vulnerable employees before recruitment
|
||||
- Torres' ongoing cooperation provides ENTROPY intel throughout campaign
|
||||
- Elena's treatment funded (positive moral outcome)
|
||||
|
||||
**Mission 6+ References:**
|
||||
```ink
|
||||
=== m06_briefing ===
|
||||
Agent 0x99: Thanks to Torres, we identified three more insiders before ENTROPY activated them.
|
||||
Agent 0x99: His intelligence is proving invaluable.
|
||||
{elena_treatment_funded:
|
||||
Agent 0x99: And his wife's treatment is going well. He's motivated to help.
|
||||
}
|
||||
```
|
||||
|
||||
### If Torres Arrested:
|
||||
**Impact on M6-M10:**
|
||||
- Standard espionage prosecution
|
||||
- No ongoing intelligence from insider program
|
||||
- ENTROPY continues recruiting (47 targets still vulnerable)
|
||||
- By-the-book justice, but missed strategic opportunity
|
||||
|
||||
### If Torres Released (Sympathetic):
|
||||
**Impact on M6-M10:**
|
||||
- Operational risk (Torres could be re-recruited)
|
||||
- Elena's treatment still in jeopardy (Torres remains desperate)
|
||||
- ENTROPY likely marks Torres as compromised, burns him
|
||||
- Moral mercy, but strategic weakness
|
||||
|
||||
### If Program Exposed Publicly:
|
||||
**Impact on M6-M10:**
|
||||
- ENTROPY's Insider Threat Initiative burned
|
||||
- 22 active placements compromised
|
||||
- 47 targets now aware, unlikely to be recruited
|
||||
- Torres' life destroyed (public traitor)
|
||||
- ENTROPY retaliates in future missions
|
||||
|
||||
---
|
||||
|
||||
## Mission Success Metrics
|
||||
|
||||
### S-Rank Requirements:
|
||||
- All 24 required tasks completed
|
||||
- At least 6 of 8 optional tasks completed
|
||||
- All 4 VM flags submitted
|
||||
- Torres turned (double agent path)
|
||||
- Zero-days patched
|
||||
- All 4 LORE fragments collected
|
||||
- All interviews conducted
|
||||
|
||||
**Rewards:**
|
||||
- Torres provides intelligence for M6-M10
|
||||
- 22 insider placements exposed
|
||||
- 47 potential targets warned
|
||||
- Elena's treatment funded
|
||||
- Maximum campaign impact
|
||||
|
||||
### A-Rank Requirements:
|
||||
- All 24 required tasks completed
|
||||
- At least 4 of 8 optional tasks completed
|
||||
- All 4 VM flags submitted
|
||||
- Any ending path
|
||||
|
||||
**Rewards:**
|
||||
- Mission objectives achieved
|
||||
- ENTROPY operation stopped
|
||||
- Good campaign impact
|
||||
|
||||
### B-Rank Requirements:
|
||||
- All 24 required tasks completed
|
||||
- At least 2 of 8 optional tasks completed
|
||||
- 3+ VM flags submitted
|
||||
|
||||
**Rewards:**
|
||||
- Basic mission success
|
||||
- Operation Schrödinger stopped
|
||||
- Minimal campaign impact
|
||||
|
||||
### C-Rank Requirements:
|
||||
- All 24 required tasks completed
|
||||
- At least 2 VM flags submitted
|
||||
|
||||
**Rewards:**
|
||||
- Mission technically complete
|
||||
- Immediate threat stopped
|
||||
- Limited understanding of broader threat
|
||||
|
||||
### Failure Conditions:
|
||||
- Torres completes exfiltration (100% data stolen)
|
||||
- Player discovered as SAFETYNET (cover blown)
|
||||
- Data reaches foreign governments before intervention
|
||||
- Player killed/captured
|
||||
|
||||
---
|
||||
|
||||
## Design Philosophy Summary
|
||||
|
||||
**Core Tension:** Justice vs. Mercy
|
||||
**Moral Complexity:** Villain who's actually a victim
|
||||
**Player Agency:** Choice matters, consequences tracked across campaign
|
||||
**Evidence-Based Gameplay:** Investigation unlocks confrontation, not arbitrary timer
|
||||
**Hybrid Architecture:** VM challenges correlate with physical evidence
|
||||
|
||||
**What Makes This Mission Unique:**
|
||||
1. **Sympathetic Antagonist:** Torres can be turned, not just stopped
|
||||
2. **Systematic Evil:** ENTROPY recruits desperate people, weaponizes suffering
|
||||
3. **Concrete Stakes:** Specific casualties (12-40), specific victims (47 targets)
|
||||
4. **Moral Choice:** No "right" answer - arrest (justice), turn (strategy), release (mercy), expose (nuclear option)
|
||||
5. **Campaign Impact:** Choice affects M6-M10 (Torres as asset or missed opportunity)
|
||||
|
||||
---
|
||||
|
||||
**Mission 5 Planning: COMPLETE**
|
||||
**Total Planning Documentation:** 5,632 lines across 6 stages
|
||||
**Ready for:** Stage 7 (Ink Scripting) and Stage 9 (Scenario Assembly)
|
||||
|
||||
Reference in New Issue
Block a user