{ FOR YOUR EYES ONLY }
0% Complete
MISSION OVERVIEW

Agents, are deployed to the heart of West Berlin, a city pulsing with Cold War tension, to undertake a covert operation at the Belevot Hotel—a faded Art Deco gem near Kurfrstendamm, its neon lights casting an eerie glow on rain-slicked cobblestones. Your targets are Vaclav Kopecky, the notorious Prague Broker, and the shadowy figure known only as the Shadow Wolf. Be warned: an unexpected threat, a rival hitman, may throw your plans into disarray. The stakes are high, and the fate of nations hangs in the balance. Proceed with utmost secrecy.

PRIMARY OBJECTIVE

Your mission begins with infiltrating Suite 804, the lavish domain of Vaclav Kopecky—a fat, charming yet ruthless arms dealer with a taste for opulence, draped in tailored suits, adorned with a gold watch, and arriving in a sleek black luxury sedan. He is a man haunted by paranoia, always suspecting the watchful eyes of the KGB or CIA, and he moves with extreme caution. Between 9:00 PM and 10:30 PM, while he attends an underground card game in the basement casino, you must slip into his suite. There, you will find a leather-bound dossier sealed with a Cyrillic mark and a locked metal case holding mysterious samples—items tied to a secretive Soviet project. Your task is to photograph every page of the dossier and capture images of the case, leaving no trace of your presence, as Kopecky is guarded by three fiercely loyal bodyguards: - Boris "The Bear" Volkov, a towering ex-Spetsnaz soldier with a scarred face, a silent enforcer who watches every corner. - Elena "Whisper" Sokolova, a sharp-featured ex-Stasi operative, ever-vigilant with a keen eye for deception. - Mikhail "Sly" Petrov, a wiry ex-KGB driver with a quick draw and a love for the casino’s thrills. One of these guards will remain in the suite, patrolling with unwavering focus.

SECONDARY OBJECTIVE

While in Suite 804 during the earlier window, you must plant a hidden audio bug to capture a critical meeting. At 3:00 AM, Kopecky will hand over the mysterious materials to the Shadow Wolf, a figure shrouded in mystery, linked to daring crimes like the Buenos Aires Artifact Heist, the Lisbon Incident, and the Vienna Cipher Murders. From the safety of your nearby hotel room, you will listen live and record this exchange, hoping to capture the Shadow Wolf’s voice—a clue that may unravel their connection to a project called ‘Fenrir,’ hinted at in the dossier’s pages. Take every precaution to avoid detection by the bodyguards or the Shadow Wolf’s own watchful eyes.

OPERATION: IRON VEIL
Belevont Hotel
Berlin, Germany
Agent In Charge:
Daniel Kessler
TSG-001
IRON VEIL
CODENAME: Ebony Shroud
Wednesday Jan 18th 1984
Berlin, Germany
Intelligence Gathering
 
Vaclav Kopecky
Black-Market Arms Dealer
PRIMARY TARGET: Vaclav Kopecky
AKA: Prague Broker

Born in Prague during the post-war Soviet occupation, Vaclav rose from a modest family to become a key figure in the underground arms trade. A former logistics officer in the Czechoslovak People’s Army, he defected in 1975 after uncovering a corrupt deal, using his connections to establish a lucrative black-market empire in West Berlin. His wealth—earned from selling weapons and stolen tech to the highest bidders—funds a lavish lifestyle, including a black Mercedes-Benz 500SEL and a penthouse suite at the Belevot Hotel.


The Shadow Wolf
UNKNOWN
SECONDARY TARGET: UNKNOWN
AKA: The Shadow Wolf

The Shadow Wolf is a phantom figure whose origins remain shrouded in secrecy, first emerging on intelligence radar with the audacious Buenos Aires Artifact Heist in 1981, where a Nazi-era relic vanished without a trace, marked only by a wolf’s head symbol etched at the scene. Their trail continued with the Lisbon Incident in 1983, a daring theft of classified Soviet documents, and peaked with the Vienna Cipher Murders later that year, where three cryptographers were silently eliminated, again leaving the same cryptic symbol. Operating with unmatched stealth and leaving behind only whispers and that elusive symbol, the Shadow Wolf is believed to be meeting Vaclav Kopecky at the Belevot Hotel on July 17, 1984, to acquire materials that could unlock their next enigmatic move.


TERCIARY TARGET(S):
Boris Volkov
Muscle and Enforcer
Elena Sokolova
Surveillance and Intelligence
Mikhail Petrov
Driver and Quick-Draw

LOCATION(S)
Belevot Hotel
West Berlin, Germany
THORN CORPORATION - CLASSIFIED ACCESS PROTOCOL NOTICE

Pursuant to Thorn Corporation Security Directive TC-SEC-47 (Rev. 1984), and in accordance with international protocols under the Mutual Defense and Intelligence Sharing Act (MDISA, 1952), your attempt to access restricted archival materials has been denied due to the submission of an invalid or unauthorized decryption key. This system is protected by proprietary encryption algorithms and multi-factor authentication measures designed to safeguard sensitive operational intelligence, proprietary trade secrets, and classified dossiers pertaining to Thorn Corporation activities.

Unauthorized Access Warning:
Any attempt to circumvent, tamper with, or breach Thorn Corporation secure networks constitutes a violation of corporate confidentiality agreements, as well as applicable national and international laws, including but not limited to:

The Espionage Act (U.S. Code Title 18, §§ 793-798),
The Official Secrets Act (U.K. 1911, as amended),
And equivalent statutes in allied jurisdictions under NATO intelligence-sharing frameworks.

Such actions may result in immediate logging of your IP address, device identifiers, and access timestamps for forensic analysis. Repeat or malicious attempts will trigger automated alerts to Thorn Corporation Security Operations Center (SOC) and may lead to civil litigation, criminal prosecution, asset forfeiture, or other remedial measures as deemed necessary to protect corporate and allied interests.

Compliance Directive:
If you believe this denial is in error, or if you are an authorized Thorn Corporation operative with valid credentials, contact your designated handler or submit a formal access request via encrypted channel TC-REQ-001, providing your operative ID, clearance level (minimum: Eyes Only Restricted), and justification under Operational Security Protocol OSP-12. Unauthorized personnel are advised to cease all further attempts immediately to avoid escalation.

Thorn Corporation Disclaimer:
All materials hosted on this platform are the exclusive property of Thorn Corporation and its affiliates. Reproduction, dissemination, or unauthorized viewing is strictly prohibited and may expose individuals to risks including, but not limited to, surveillance, interdiction, or neutralization pursuant to active defense mandates.

End of Notice - System Lock Engaged

Timestamp: [AUTO-GENERATED]

Reference ID: TC-DENY-[RANDOMIZED]