{TOP SECRET}

The Espionage Role-Playing Game

Learn more

Welcome to 1984—a world simmering with tension at the height of the Cold War, where trust is a luxury and secrets are the world’s most valuable currency. Pulled from the shadows, you serve as an elite Agent for the Thorn Corporation: a powerful, globe-spanning organization that masquerades as a multinational corporation, but in reality is a haven for the world’s most skilled spies, covert operators, and master assassins.

Thorn Corporation’s reach spans continents, with cutting-edge offices hidden in every corner of the globe, granting you access to advanced technology, limitless resources, and a vast network of allies. Here, you'll find a sanctuary from political complications—your missions sanctioned, your movements invisible, your true identity covered by a sophisticated web of corporate intrigue.

For those who dare, this is the ultimate playground for espionage, deception, and high-stakes adventure. Will you infiltrate enemy strongholds, retrieve critical secrets, or eliminate threats before they emerge? The choices—and the risks—are yours alone.

Step into the world of Thorn Corporation, where every mission shapes the balance of global power, every decision could change the course of history, and only the cleverest survive. Are you ready to accept the challenge?

Your story starts now. Join the campaign and become a legend in the shadows.

{TOP SECRET}
The Espionage Role Playing Game
TSG-001
Intelligence Gathering
OPERATION:
IRON VEIL
STATUS:
Admin Planning
PRIMARY LOCATION:
Belevont Hotel
Agents, are deployed to the heart of West Berlin, a city pulsing with Cold War tension, to undertake a covert operation at the Belevot Hotel. Your targets are Vaclav Kopecky, the notorious Prague Broker, and the shadowy figure known only as the Shadow Wolf.
TSG-000
Exfiltration and Extraction
OPERATION:
DOUBLE CROSS
STATUS:
Completed
PRIMARY LOCATION:
Hohenschönhausen Prison
Operation DOUBLE CROSS is a high-risk extraction and asset-flip mission in the heart of East Berlin, targeting Elena Petrova, a former low-level KGB asset embedded in black market operations, arrested by Stasi officials and now agents must break her out and turn her against her employer as a double agent.
Person of Interest Spotlight
Name: Karl Mueller
Codename:
Birthplace: Berlin, Germany
Primary Military Specialty:
Fence for Stolen Goods and Artifacts
Secondary Military Specialty:
Underworld Informant and Enforcer
HEIGHT: 6'2"     WEIGHT: 280
Agent Spotlight
Name: Sophie Laurent
Codename: Velvet Whisper
Birthplace: Paris, France
Primary Military Specialty:
Interrogation/Flip Specialist
Secondary Military Specialty:
Asset recruitment and evidence planting
HEIGHT: 5'7"     WEIGHT: 135
Administrator Spotlight
Name: Corporal Colonel Daniel "Danny" R. Kessler
Codename: Hawk
Birthplace: Pittsburgh, Pennsylvania
Primary Military Specialty:
Intelligence Operations
Secondary Military Specialty:
Tactical Command
HEIGHT: 5'11"     WEIGHT: 192
Agent Spotlight
Name: Tom Reilly
Codename: Dark Wheel
Birthplace: Boston, Massachusetts USA
Primary Military Specialty:
Exfiltration Driver
Secondary Military Specialty:
Transport and getaway
HEIGHT: 5'10"     WEIGHT: 180
Agent Spotlight
Name: Maria Sanchez
Codename: Phantom Key
Birthplace: Madrid, Spain
Primary Military Specialty:
Infiltration Expert
Secondary Military Specialty:
Disguise and entry specialist
HEIGHT: 5'6"     WEIGHT: 145
Organization Spotlight
Kopecky Arms Syndicate
Prague, Poland
The Kopecky Arms Syndicate (KAS) is a sophisticated black-market arms trafficking network operating primarily within the Eastern Bloc, specializing in the acquisition, smuggling, and sale of Soviet and Warsaw Pact military hardware. Founded in the early 1970s by Václav Kopecký following his discharge from the Czechoslovak People’s Army, KAS has evolved into a mid-tier syndicate with an estimated annual turnover exceeding $5 million in illicit sales. The organization exploits corruption within Communist regimes, leveraging contacts in the StB (Czechoslovak secret police), KGB, and disaffected military units to "redirect" surplus weaponry. KAS deals in everything from small arms (e.g., CZ-75 pistols, AK-47 rifles) to explosives (Semtex), ammunition, and experimental tech, supplying clients ranging from African insurgents and Middle Eastern terrorists to Western criminal organizations and separatist groups. Motivated by profit and a cynical anti-superpower ideology, KAS operates with ruthless efficiency, often eliminating rivals or informants to maintain secrecy. Thorn Corporation views KAS as a wildcard threat, capable of destabilizing regional conflicts by arming unpredictable actors.
Organization Spotlight
GRU (Main Directorate of the General Staff of the Soviet Armed Forces)
Moscow, USSR
The GRU is the Soviet Union’s primary military intelligence agency, responsible for collecting strategic and tactical military intelligence across the globe. Its operations include espionage, sabotage, and reconnaissance, often behind enemy lines or in hostile territory. The GRU maintains a highly secretive and disciplined covert network focused on gathering military, technological, and political intelligence to support Soviet military objectives and to gain an advantage over NATO and allied forces.
Organization Spotlight
Interpol
Vienna, Austria
the International Criminal Police Organization, commonly known as Interpol, is an international body that facilitates cooperation among police forces worldwide to combat cross-border crime. It is not a supranational police agency with its own arrest powers but instead acts as a clearinghouse for information exchange, coordination, and assistance between national law enforcement entities. Interpol focuses on crimes such as murder, robbery, drug trafficking, counterfeiting, art theft, and emerging threats like international terrorism and organized crime syndicates.
Organization Spotlight
Central Intelligence Agency (CIA)
Norfolk, Virgina USA
the Central Intelligence Agency (CIA) is widely regarded as a highly secretive and powerful intelligence organization that operates under the auspices of the United States government. It is tasked with gathering foreign intelligence, conducting covert operations, and safeguarding national security interests worldwide. The CIA is known for its extensive network of agents, clandestine activities, and influence in global political affairs. Its operations are often shrouded in secrecy, involving espionage, sabotage, and influence campaigns aimed at protecting American interests and maintaining a strategic advantage over adversaries. The agency is viewed with a mixture of respect and suspicion, given its significant role in shaping international events and its ability to operate outside the public eye.
Organization Spotlight
Thorn Corporation
London, UK
the Thorn Corporation is portrayed as a highly influential, multinational organization that operates as a covert agency specializing in espionage, sabotage, and strategic influence. Officially, it functions as a large-scale corporation involved primarily in the mining of rare earth minerals, but in reality, it serves as a haven for elite spies, covert operatives, and assassins. The organization boasts extensive global reach with secret offices and advanced technological capabilities, providing its agents with vast resources and a network of international allies. Thorn Corporation was founded in 1946 and has a history of supporting and outsourcing activities for the UK and US intelligence services. It became particularly significant following the Vietnam War, expanding its operations and recruiting from various Western countries. Its activities are wrapped in elaborate corporate intrigue, allowing it to operate with minimal oversight and a high degree of flexibility in carrying out clandestine missions.
THORN CORPORATION - CLASSIFIED ACCESS PROTOCOL NOTICE

Pursuant to Thorn Corporation Security Directive TC-SEC-47 (Rev. 1984), and in accordance with international protocols under the Mutual Defense and Intelligence Sharing Act (MDISA, 1952), your attempt to access restricted archival materials has been denied due to the submission of an invalid or unauthorized decryption key. This system is protected by proprietary encryption algorithms and multi-factor authentication measures designed to safeguard sensitive operational intelligence, proprietary trade secrets, and classified dossiers pertaining to Thorn Corporation activities.

Unauthorized Access Warning:
Any attempt to circumvent, tamper with, or breach Thorn Corporation secure networks constitutes a violation of corporate confidentiality agreements, as well as applicable national and international laws, including but not limited to:

The Espionage Act (U.S. Code Title 18, §§ 793-798),
The Official Secrets Act (U.K. 1911, as amended),
And equivalent statutes in allied jurisdictions under NATO intelligence-sharing frameworks.

Such actions may result in immediate logging of your IP address, device identifiers, and access timestamps for forensic analysis. Repeat or malicious attempts will trigger automated alerts to Thorn Corporation Security Operations Center (SOC) and may lead to civil litigation, criminal prosecution, asset forfeiture, or other remedial measures as deemed necessary to protect corporate and allied interests.

Compliance Directive:
If you believe this denial is in error, or if you are an authorized Thorn Corporation operative with valid credentials, contact your designated handler or submit a formal access request via encrypted channel TC-REQ-001, providing your operative ID, clearance level (minimum: Eyes Only Restricted), and justification under Operational Security Protocol OSP-12. Unauthorized personnel are advised to cease all further attempts immediately to avoid escalation.

Thorn Corporation Disclaimer:
All materials hosted on this platform are the exclusive property of Thorn Corporation and its affiliates. Reproduction, dissemination, or unauthorized viewing is strictly prohibited and may expose individuals to risks including, but not limited to, surveillance, interdiction, or neutralization pursuant to active defense mandates.

End of Notice - System Lock Engaged

Timestamp: [AUTO-GENERATED]

Reference ID: TC-DENY-[RANDOMIZED]