{TOP SECRET}

The Espionage Role-Playing Game

Learn more

Welcome to 1984—a world simmering with tension at the height of the Cold War, where trust is a luxury and secrets are the world’s most valuable currency. Pulled from the shadows, you serve as an elite Agent for the Thorn Corporation: a powerful, globe-spanning organization that masquerades as a multinational corporation, but in reality is a haven for the world’s most skilled spies, covert operators, and master assassins.

Thorn Corporation’s reach spans continents, with cutting-edge offices hidden in every corner of the globe, granting you access to advanced technology, limitless resources, and a vast network of allies. Here, you'll find a sanctuary from political complications—your missions sanctioned, your movements invisible, your true identity covered by a sophisticated web of corporate intrigue.

For those who dare, this is the ultimate playground for espionage, deception, and high-stakes adventure. Will you infiltrate enemy strongholds, retrieve critical secrets, or eliminate threats before they emerge? The choices—and the risks—are yours alone.

Step into the world of Thorn Corporation, where every mission shapes the balance of global power, every decision could change the course of history, and only the cleverest survive. Are you ready to accept the challenge?

Your story starts now. Join the campaign and become a legend in the shadows.

{TOP SECRET}
The Espionage Role Playing Game
TSG-001
Intelligence Gathering
OPERATION:
IRON VEIL
STATUS:
Admin Planning
PRIMARY LOCATION:
Belevont Hotel
Agents, are deployed to the heart of West Berlin, a city pulsing with Cold War tension, to undertake a covert operation at the Belevot Hotel. Your targets are Vaclav Kopecky, the notorious Prague Broker, and the shadowy figure known only as the Shadow Wolf.
TSG-000
Exfiltration and Extraction
OPERATION:
DOUBLE CROSS
STATUS:
Completed
PRIMARY LOCATION:
Hohenschönhausen Prison
Operation DOUBLE CROSS is a high-risk extraction and asset-flip mission in the heart of East Berlin, targeting Elena Petrova, a former low-level KGB asset embedded in black market operations, arrested by Stasi officials and now agents must break her out and turn her against her employer as a double agent.
Agent Spotlight
Name: Karl Heinrich
Codename: Sentinel
Birthplace: Stuttgart, Germany
Primary Military Specialty:
Combat Specialist
Secondary Military Specialty:
Neutralization and cover fire
HEIGHT: 6'2"     WEIGHT: 220
Agent Spotlight
Name: Elisabeth Moreau
Codename: Nightshade
Birthplace: Paris, France
Primary Military Specialty:
Infiltration and Social Engineering
Secondary Military Specialty:
Covert Operations and Surveillance
HEIGHT: 5'7"     WEIGHT: 130
Agent Spotlight
Name: Elodie Vasseur
Codename: Mirage
Birthplace: Lyon, France
Primary Military Specialty:
Covert Acquisition
Secondary Military Specialty:
Document and Art Fabrication
HEIGHT: 5'6"     WEIGHT: 125
Person of Interest Spotlight
Name: Ahmed al-Rashid
Codename:
Birthplace: Madrid, Spain
Primary Military Specialty:
Military Science/Weaponry
Secondary Military Specialty:
Technical Support/Evauation
HEIGHT: 5'9"     WEIGHT: 150
Agent Spotlight
Name: Karl Vogel
Codename: Stahlnerv
Birthplace: West Germany
Primary Military Specialty:
Explosives Expertise (Demolitions)
Secondary Military Specialty:
Stealth and Infiltration
HEIGHT: 6'0"     WEIGHT: 185
Organization Spotlight
Secret Intelligence Service (MI6)
London, UK
The Secret Intelligence Service (SIS), commonly known as MI6, is the United Kingdom's foreign intelligence agency, established in 1909 to gather and analyze information from overseas sources to protect national security and inform government policy. Operating under the Foreign, Commonwealth & Development Office, MI6 focuses on covert operations, espionage, and countering threats such as terrorism, cyber attacks, and hostile state activities abroad, while maintaining strict secrecy and collaborating with allies like the CIA. Though popularized in fiction through characters like James Bond, its real-world agents work discreetly to safeguard UK interests globally, emphasizing human intelligence (HUMINT) alongside technological advancements.
Organization Spotlight
East German Police (Volkspolizei)
West Berlin, Germany
The Volkspolizei (People’s Police) serves as the primary law enforcement agency responsible for maintaining public order, enforcing state laws, and ensuring internal security within East Germany. While its official role is routine police work—such as crime investigation, traffic control, and public safety—the Volkspolizei also functions as a key component of the East German security apparatus. It collaborates closely with the Stasi in surveillance, political repression, and managing dissidents, acting both as a traditional police force and as part of an extensive internal security network.
Organization Spotlight
Interpol
Vienna, Austria
the International Criminal Police Organization, commonly known as Interpol, is an international body that facilitates cooperation among police forces worldwide to combat cross-border crime. It is not a supranational police agency with its own arrest powers but instead acts as a clearinghouse for information exchange, coordination, and assistance between national law enforcement entities. Interpol focuses on crimes such as murder, robbery, drug trafficking, counterfeiting, art theft, and emerging threats like international terrorism and organized crime syndicates.
Organization Spotlight
Shadow Wolf Underworld Network
Unknown
The Shadow Wolf Underworld Network (SWUN) is an elusive, highly sophisticated criminal and espionage syndicate believed to operate on a global scale, specializing in high-stakes thefts, assassinations, and black-market dealings involving classified military technology, occult artifacts, and experimental serums. First whispered about in intelligence circles around 1980, SWUN appears to blend mercenary operations with potential ideological undertones, possibly rooted in post-WWII Nazi legacies or Cold War shadow games. The network's hallmark is extreme precision, minimal traces, and the consistent use of a stylized wolf's head symbol as a calling card—carved, painted, or sealed on scenes. Thorn Corporation assesses SWUN as a top-tier threat, capable of infiltrating secure facilities, neutralizing elite security, and vanishing without leads. Motives remain opaque: profit, disruption of superpower balance, or pursuit of forbidden knowledge (e.g., super-soldier programs). Estimated reach spans Europe, South America, and the Middle East, with loose affiliations to arms brokers like the Kopecky Arms Syndicate. Due to its phantom-like nature, this file is preliminary; confirmed intel is sparse, based on pattern analysis and circumstantial links. SWUN's opacity suggests a leader with deep intelligence training, possibly ex-KGB, Mossad, or rogue Special Forces.
Organization Spotlight
Thorn Corporation
London, UK
the Thorn Corporation is portrayed as a highly influential, multinational organization that operates as a covert agency specializing in espionage, sabotage, and strategic influence. Officially, it functions as a large-scale corporation involved primarily in the mining of rare earth minerals, but in reality, it serves as a haven for elite spies, covert operatives, and assassins. The organization boasts extensive global reach with secret offices and advanced technological capabilities, providing its agents with vast resources and a network of international allies. Thorn Corporation was founded in 1946 and has a history of supporting and outsourcing activities for the UK and US intelligence services. It became particularly significant following the Vietnam War, expanding its operations and recruiting from various Western countries. Its activities are wrapped in elaborate corporate intrigue, allowing it to operate with minimal oversight and a high degree of flexibility in carrying out clandestine missions.
THORN CORPORATION - CLASSIFIED ACCESS PROTOCOL NOTICE

Pursuant to Thorn Corporation Security Directive TC-SEC-47 (Rev. 1984), and in accordance with international protocols under the Mutual Defense and Intelligence Sharing Act (MDISA, 1952), your attempt to access restricted archival materials has been denied due to the submission of an invalid or unauthorized decryption key. This system is protected by proprietary encryption algorithms and multi-factor authentication measures designed to safeguard sensitive operational intelligence, proprietary trade secrets, and classified dossiers pertaining to Thorn Corporation activities.

Unauthorized Access Warning:
Any attempt to circumvent, tamper with, or breach Thorn Corporation secure networks constitutes a violation of corporate confidentiality agreements, as well as applicable national and international laws, including but not limited to:

The Espionage Act (U.S. Code Title 18, §§ 793-798),
The Official Secrets Act (U.K. 1911, as amended),
And equivalent statutes in allied jurisdictions under NATO intelligence-sharing frameworks.

Such actions may result in immediate logging of your IP address, device identifiers, and access timestamps for forensic analysis. Repeat or malicious attempts will trigger automated alerts to Thorn Corporation Security Operations Center (SOC) and may lead to civil litigation, criminal prosecution, asset forfeiture, or other remedial measures as deemed necessary to protect corporate and allied interests.

Compliance Directive:
If you believe this denial is in error, or if you are an authorized Thorn Corporation operative with valid credentials, contact your designated handler or submit a formal access request via encrypted channel TC-REQ-001, providing your operative ID, clearance level (minimum: Eyes Only Restricted), and justification under Operational Security Protocol OSP-12. Unauthorized personnel are advised to cease all further attempts immediately to avoid escalation.

Thorn Corporation Disclaimer:
All materials hosted on this platform are the exclusive property of Thorn Corporation and its affiliates. Reproduction, dissemination, or unauthorized viewing is strictly prohibited and may expose individuals to risks including, but not limited to, surveillance, interdiction, or neutralization pursuant to active defense mandates.

End of Notice - System Lock Engaged

Timestamp: [AUTO-GENERATED]

Reference ID: TC-DENY-[RANDOMIZED]