{ FOR YOUR EYES ONLY }
MISSION OVERVIEW

Operation DOUBLE CROSS is a high-risk extraction and asset-flip mission in the heart of East Berlin, targeting Elena Petrova, a 32-year-old Russian national serving as chief accountant for Václav Kopecký (codename: Prague Broker). Petrova, a former low-level KGB asset embedded in black market operations, was arrested by Stasi officials on February 12, 1984, during a routine audit of Kopecký's Prague-based warehouse front (Kopecký Trading Co.). Interrogation records intercepted via SIGINT indicate Stasi suspicions of embezzlement and unauthorized contacts with Western elements, potentially exposing Kopecký's network.

Thorn Corporation has identified Petrova as a high-value flip target due to her intimate knowledge of Kopecký's financial ledgers, arms deals, and client lists (including Soviet surplus weaponry routed to Middle Eastern and African buyers). Successful recruitment will provide ongoing intelligence on Kopecký's operations, including his upcoming handoff of stolen Project Volkodav materials to the Shadow Wolf. The operation must be executed with utmost discretion to avoid alerting Kopecký or escalating Cold War tensions.

PRIMARY OBJECTIVE

Extract Elena Petrova from Stasi custody at the Hohenschönhausen Prison complex in East Berlin. Following extraction, plant fabricated evidence (forged documents and physical traces) implicating a rival West German criminal syndicate (e.g., the Munich-based "Red Dagger" group) to divert suspicion from Kopecký and Thorn Corporation involvement. Recruit Petrova as a double agent by leveraging offers of financial incentives (50,000 USD initial payment), family relocation to the West, and protection from KGB reprisals. She must be convinced to resume her role in Kopecký's organization, providing Thorn with real-time intel drops via dead-letter boxes in Prague.

SECONDARY OBJECTIVE

Re-infiltrate Petrova back across the Berlin Wall into East Germany without detection, allowing her to reestablish contact with Kopecký's network. Gather any incidental physical evidence (e.g., interrogation transcripts or personal effects) that could reveal more about Kopecký's ties to the Shadow Wolf or Project Volkodav.

OPERATION: DOUBLE CROSS
Hohenschönhausen Prison
Genslerstraße, Lichtenberg, Germany
Agent In Charge:
Daniel Kessler
TSG-000
DOUBLE CROSS
CODENAME: Bird in Hand
Wednesday Jul 20th 1983
Genslerstraße, Lichtenberg, Germany
Exfiltration and Extraction
 
Elena Petrova
Finance/Accounting/Logistics
PRIMARY TARGET: Elena Petrova
AKA: The Ledger

Elena Petrova, born in Leningrad in 1952 amid the austere shadows of post-war Soviet reconstruction, grew up in a family of academics where numbers and secrets were the currency of survival—her father a mathematician in the Academy of Sciences, her mother a librarian harboring forbidden Western texts. Excelling in economics at Moscow State University in the early 1970s, she caught the KGB's eye for her analytical prowess and was subtly recruited as a low-level asset, trained in financial espionage and embedded in black market networks to monitor illicit flows. By 1980, Petrova had infiltrated Václav Kopecký's operation as his chief accountant, laundering millions from arms deals involving Czech Semtex and Soviet surplus to buyers in volatile regions like the Middle East and Africa. Her coded ledgers concealed a web of transactions, including payments tied to stolen Project Volkodav materials, while her gambling habit—fueled by the thrill of high-stakes poker in Prague's underground dens—nearly unraveled her cover, leading to her Stasi arrest in 1983. Now a reluctant double agent for Thorn Corporation after her extraction, Petrova balances loyalty to her vulnerable sister in Moscow with the promise of Western asylum, her intellectual sharpness masking a growing paranoia in the treacherous game of Cold War shadows.


LOCATION(S)
Hohenschönhausen Prison
East Berlin, Germany
THORN CORPORATION - CLASSIFIED ACCESS PROTOCOL NOTICE

Pursuant to Thorn Corporation Security Directive TC-SEC-47 (Rev. 1984), and in accordance with international protocols under the Mutual Defense and Intelligence Sharing Act (MDISA, 1952), your attempt to access restricted archival materials has been denied due to the submission of an invalid or unauthorized decryption key. This system is protected by proprietary encryption algorithms and multi-factor authentication measures designed to safeguard sensitive operational intelligence, proprietary trade secrets, and classified dossiers pertaining to Thorn Corporation activities.

Unauthorized Access Warning:
Any attempt to circumvent, tamper with, or breach Thorn Corporation secure networks constitutes a violation of corporate confidentiality agreements, as well as applicable national and international laws, including but not limited to:

The Espionage Act (U.S. Code Title 18, §§ 793-798),
The Official Secrets Act (U.K. 1911, as amended),
And equivalent statutes in allied jurisdictions under NATO intelligence-sharing frameworks.

Such actions may result in immediate logging of your IP address, device identifiers, and access timestamps for forensic analysis. Repeat or malicious attempts will trigger automated alerts to Thorn Corporation Security Operations Center (SOC) and may lead to civil litigation, criminal prosecution, asset forfeiture, or other remedial measures as deemed necessary to protect corporate and allied interests.

Compliance Directive:
If you believe this denial is in error, or if you are an authorized Thorn Corporation operative with valid credentials, contact your designated handler or submit a formal access request via encrypted channel TC-REQ-001, providing your operative ID, clearance level (minimum: Eyes Only Restricted), and justification under Operational Security Protocol OSP-12. Unauthorized personnel are advised to cease all further attempts immediately to avoid escalation.

Thorn Corporation Disclaimer:
All materials hosted on this platform are the exclusive property of Thorn Corporation and its affiliates. Reproduction, dissemination, or unauthorized viewing is strictly prohibited and may expose individuals to risks including, but not limited to, surveillance, interdiction, or neutralization pursuant to active defense mandates.

End of Notice - System Lock Engaged

Timestamp: [AUTO-GENERATED]

Reference ID: TC-DENY-[RANDOMIZED]