Top Secret is a fan-created Role Playing Game campaign inspired by and utilizing elements from the original TOP SECRET: The Espionage Game, published by TSR in 1980 and written by Merle M. Rasmussen. This campaign is an unofficial, non-commercial project created for entertainment purposes only and is not affiliated with, endorsed by, or sponsored by TSR, Wizards of the Coast, or any related entities. All original content, including the TOP SECRET game system, mechanics, and intellectual property, remains the property of its respective owners. No copyright infringement is intended. Players participate at their own risk, and the creators of this campaign are not liable for any damages, losses, or disputes arising from its use. By engaging with this campaign, you acknowledge and agree to these terms.
Pursuant to Thorn Corporation Security Directive TC-SEC-47 (Rev. 1984), and in accordance with international protocols under the Mutual Defense and Intelligence Sharing Act (MDISA, 1952), your attempt to access restricted archival materials has been denied due to the submission of an invalid or unauthorized decryption key. This system is protected by proprietary encryption algorithms and multi-factor authentication measures designed to safeguard sensitive operational intelligence, proprietary trade secrets, and classified dossiers pertaining to Thorn Corporation activities.
Unauthorized Access Warning: Any attempt to circumvent, tamper with, or breach Thorn Corporation secure networks constitutes a violation of corporate confidentiality agreements, as well as applicable national and international laws, including but not limited to:
The Espionage Act (U.S. Code Title 18, §§ 793-798),
The Official Secrets Act (U.K. 1911, as amended),
And equivalent statutes in allied jurisdictions under NATO intelligence-sharing frameworks.
Such actions may result in immediate logging of your IP address, device identifiers, and access timestamps for forensic analysis. Repeat or malicious attempts will trigger automated alerts to Thorn Corporation Security Operations Center (SOC) and may lead to civil litigation, criminal prosecution, asset forfeiture, or other remedial measures as deemed necessary to protect corporate and allied interests.
Compliance Directive: If you believe this denial is in error, or if you are an authorized Thorn Corporation operative with valid credentials, contact your designated handler or submit a formal access request via encrypted channel TC-REQ-001, providing your operative ID, clearance level (minimum: Eyes Only Restricted), and justification under Operational Security Protocol OSP-12. Unauthorized personnel are advised to cease all further attempts immediately to avoid escalation.
Thorn Corporation Disclaimer: All materials hosted on this platform are the exclusive property of Thorn Corporation and its affiliates. Reproduction, dissemination, or unauthorized viewing is strictly prohibited and may expose individuals to risks including, but not limited to, surveillance, interdiction, or neutralization pursuant to active defense mandates.