{TOP SECRET}

The Espionage Role-Playing Game

Learn more

Welcome to 1984—a world simmering with tension at the height of the Cold War, where trust is a luxury and secrets are the world’s most valuable currency. Pulled from the shadows, you serve as an elite Agent for the Thorn Corporation: a powerful, globe-spanning organization that masquerades as a multinational corporation, but in reality is a haven for the world’s most skilled spies, covert operators, and master assassins.

Thorn Corporation’s reach spans continents, with cutting-edge offices hidden in every corner of the globe, granting you access to advanced technology, limitless resources, and a vast network of allies. Here, you'll find a sanctuary from political complications—your missions sanctioned, your movements invisible, your true identity covered by a sophisticated web of corporate intrigue.

For those who dare, this is the ultimate playground for espionage, deception, and high-stakes adventure. Will you infiltrate enemy strongholds, retrieve critical secrets, or eliminate threats before they emerge? The choices—and the risks—are yours alone.

Step into the world of Thorn Corporation, where every mission shapes the balance of global power, every decision could change the course of history, and only the cleverest survive. Are you ready to accept the challenge?

Your story starts now. Join the campaign and become a legend in the shadows.

{TOP SECRET}
The Espionage Role Playing Game
TSG-000
Exfiltration and Extraction
OPERATION:
DOUBLE CROSS
STATUS:
Completed
PRIMARY LOCATION:
Hohenschönhausen Prison
Operation DOUBLE CROSS is a high-risk extraction and asset-flip mission in the heart of East Berlin, targeting Elena Petrova, a former low-level KGB asset embedded in black market operations, arrested by Stasi officials and now agents must break her out and turn her against her employer as a double agent.
TSG-001
Intelligence Gathering
OPERATION:
IRON VEIL
STATUS:
Admin Planning
PRIMARY LOCATION:
Belevont Hotel
Agents, are deployed to the heart of West Berlin, a city pulsing with Cold War tension, to undertake a covert operation at the Belevot Hotel. Your targets are Vaclav Kopecky, the notorious Prague Broker, and the shadowy figure known only as the Shadow Wolf.
Agent Spotlight
Name: Tom Reilly
Codename: Dark Wheel
Birthplace: Boston, Massachusetts USA
Primary Military Specialty:
Exfiltration Driver
Secondary Military Specialty:
Transport and getaway
HEIGHT: 5'10"     WEIGHT: 180
Person of Interest Spotlight
Name: Bodyguard Mikhail Petrov
Codename:
Birthplace: Warsaw, Poland
Primary Military Specialty:
Driver and Quick-Draw
Secondary Military Specialty:
None
HEIGHT: 5'9"     WEIGHT: 198
Administrator Spotlight
Name: Dr. Ezekiel "Zeke" B. Hawthorne
Codename: The Professor
Birthplace: Berkeley, California USA
Primary Military Specialty:
Combat Engineer (MOS 12B)
Secondary Military Specialty:
Electronics Specialist (MOS 94F)
HEIGHT: 5'11"     WEIGHT: 165
Agent Spotlight
Name: Maria Sanchez
Codename: Phantom Key
Birthplace: Madrid, Spain
Primary Military Specialty:
Infiltration Expert
Secondary Military Specialty:
Disguise and entry specialist
HEIGHT: 5'6"     WEIGHT: 145
Administrator Spotlight
Name: Ms. Helga Schneider
Codename: Eisenkrypt
Birthplace: East Berlin
Primary Military Specialty:
Cryptography & Transmission Monitoring
Secondary Military Specialty:
Forgery & Linguistics
HEIGHT: 5'6"     WEIGHT: 145
Organization Spotlight
Geheime Nationale (German Federal Police)
West Berlin, Germany
The Geheime Nationale (Secret National Police) functions as the primary law enforcement agency within West Berlin responsible for maintaining public order, investigating organized crime, and supporting counterintelligence efforts. While its official duties are routine police work, it also plays an important role in counter-espionage activities, particularly monitoring Soviet and East German operatives operating within West Berlin. The agency operates under the authority of the West German government and collaborates closely with allied intelligence agencies such as the BND, CIA, and MI6.
Organization Spotlight
Stasi (Staatssicherheit)
East Berlin, Germany
The Stasi is the most powerful and pervasive secret police agency of East Germany (GDR). It functions as both an internal security service and a foreign intelligence apparatus responsible for surveillance, political repression, and espionage. The Stasi maintains an extensive network of informants, agents, and surveillance devices that monitor East German citizens and foreign visitors alike. Its primary goal is to safeguard the authoritarian regime, prevent dissent, and gather intelligence on West Germany, NATO countries, and Western espionage activities.
Organization Spotlight
BND (Bundesnachrichtendienst)
Pullach, Munich, Germany
The BND functions as West Germany’s primary foreign intelligence service. Its mission is to gather intelligence on East Germany, the Soviet Union, Warsaw Pact countries, and other global threats to West German and NATO interests. The BND operates clandestinely, conducting espionage, surveillance, and political intelligence gathering overseas. It also plays a vital role in supporting allied intelligence efforts and providing strategic insights to West German policymakers and NATO allies.
Organization Spotlight
Komitet Gosudarstvennoy Bezopasnosti (KGB)
Moscow, USSR
The Komitet Gosudarstvennoy Bezopasnosti or KGB is a formidable and secretive intelligence agency of the Soviet Union, tasked with foreign intelligence, counterintelligence, espionage, and internal security. It operates both within the USSR and internationally, with a reputation for relentless espionage, ruthless suppression of dissent, and extensive disinformation campaigns. The KGB’s influence extends deep into global geopolitics, often working to destabilize Western countries, gather strategic intelligence, and protect Soviet interests abroad.
Organization Spotlight
Shadow Wolf Underworld Network
Unknown
The Shadow Wolf Underworld Network (SWUN) is an elusive, highly sophisticated criminal and espionage syndicate believed to operate on a global scale, specializing in high-stakes thefts, assassinations, and black-market dealings involving classified military technology, occult artifacts, and experimental serums. First whispered about in intelligence circles around 1980, SWUN appears to blend mercenary operations with potential ideological undertones, possibly rooted in post-WWII Nazi legacies or Cold War shadow games. The network's hallmark is extreme precision, minimal traces, and the consistent use of a stylized wolf's head symbol as a calling card—carved, painted, or sealed on scenes. Thorn Corporation assesses SWUN as a top-tier threat, capable of infiltrating secure facilities, neutralizing elite security, and vanishing without leads. Motives remain opaque: profit, disruption of superpower balance, or pursuit of forbidden knowledge (e.g., super-soldier programs). Estimated reach spans Europe, South America, and the Middle East, with loose affiliations to arms brokers like the Kopecky Arms Syndicate. Due to its phantom-like nature, this file is preliminary; confirmed intel is sparse, based on pattern analysis and circumstantial links. SWUN's opacity suggests a leader with deep intelligence training, possibly ex-KGB, Mossad, or rogue Special Forces.
THORN CORPORATION - CLASSIFIED ACCESS PROTOCOL NOTICE

Pursuant to Thorn Corporation Security Directive TC-SEC-47 (Rev. 1984), and in accordance with international protocols under the Mutual Defense and Intelligence Sharing Act (MDISA, 1952), your attempt to access restricted archival materials has been denied due to the submission of an invalid or unauthorized decryption key. This system is protected by proprietary encryption algorithms and multi-factor authentication measures designed to safeguard sensitive operational intelligence, proprietary trade secrets, and classified dossiers pertaining to Thorn Corporation activities.

Unauthorized Access Warning:
Any attempt to circumvent, tamper with, or breach Thorn Corporation secure networks constitutes a violation of corporate confidentiality agreements, as well as applicable national and international laws, including but not limited to:

The Espionage Act (U.S. Code Title 18, §§ 793-798),
The Official Secrets Act (U.K. 1911, as amended),
And equivalent statutes in allied jurisdictions under NATO intelligence-sharing frameworks.

Such actions may result in immediate logging of your IP address, device identifiers, and access timestamps for forensic analysis. Repeat or malicious attempts will trigger automated alerts to Thorn Corporation Security Operations Center (SOC) and may lead to civil litigation, criminal prosecution, asset forfeiture, or other remedial measures as deemed necessary to protect corporate and allied interests.

Compliance Directive:
If you believe this denial is in error, or if you are an authorized Thorn Corporation operative with valid credentials, contact your designated handler or submit a formal access request via encrypted channel TC-REQ-001, providing your operative ID, clearance level (minimum: Eyes Only Restricted), and justification under Operational Security Protocol OSP-12. Unauthorized personnel are advised to cease all further attempts immediately to avoid escalation.

Thorn Corporation Disclaimer:
All materials hosted on this platform are the exclusive property of Thorn Corporation and its affiliates. Reproduction, dissemination, or unauthorized viewing is strictly prohibited and may expose individuals to risks including, but not limited to, surveillance, interdiction, or neutralization pursuant to active defense mandates.

End of Notice - System Lock Engaged

Timestamp: [AUTO-GENERATED]

Reference ID: TC-DENY-[RANDOMIZED]