Prologue - The President is Missing Walkthrough & Guide - GameFAQs
What do you need help on? Cancel X
  Prev Next  
Close X Secret Files Script (PC)
by jimfish

Table of Contents

BOOKMARK
Jump to:
Would you recommend this Guide? Yes No Hide
Send Skip Hide

Secret Files Script (PC) by jimfish

Version: 1.0 | Updated: 05/03/2024

Table of Contents

  1. Introduction
  2. Note to Investigator
  3. Prologue
    1. Executive Order
    2. The Prosecutorial Summary
  4. News
  5. People of Interest
    1. Amal, Moubalal
    2. Banner, William
    3. Beckworth, Teresa
    4. Berger, Jerry
    5. Bodreau, Monique
    6. Cadwallader, Drake
    7. Chatzman, Joel Arron (a.k.a. Schatzman, Joel)
    8. Christi, Nat
    9. Colonel Young
    10. Connors, Selwyn
    11. Dagon, Walter
    12. Damonkleiner, Otto
    13. Daresay, Mark
    14. Emporos, Toufeki
    15. Fouche, Joseph
    16. Gamal, Yashim
    17. Giles, Chester
    18. Gotzenopfer, Albern
    19. Khalb, Khabir
    20. Malak, Kashal
    21. Malin, Hugh
    22. Matton, Robert
    23. Medvyed, Krasni
    24. Moran, Sebastian
    25. Mulroney, Edwin
    26. Natt, Chris (a.k.a. Inatt, Chris)
    27. Pvogel, Todd (a.k.a. Vogel, Todd)
    28. Ragoul, Saghir Shamal
    29. Ritchi, Stan
    30. Sadr, Shammam
    31. Schneider, Kehle
    32. Schritt, Ian
    33. Shaw, Raymond
    34. Staud, Granger
    35. Styles, Joseph
    36. Tagir, Siggada
    37. Tanna, Douglas
    38. Tsouban, Qatzir
    39. Vine, Leo
    40. White, Donna Leman
    41. Woodhouse, Andrew John
  6. Places of Interest
    1. Adam, Oman
    2. 1 Tariq Tufaha, Adam, Oman
    3. Chah Bahar, Iran
    4. 132 Sharia Shati Arnab, Chah Bahar, Iran
    5. Halba, Lebanon
    6. 42 Sharia Wahid-Hisan Bilda, Halba, Lebanon
    7. Irbid, Jordan
    8. 114 Sharia Ahmarmoudi Hye, Irbid, Jordan
    9. Irbil, Iraq
    10. 15 Tariq Himar Hammam, Irbil, Iraq
    11. Kavak Hotel, Turkey
    12. Nalut, Libya
    13. 6 Tariq Shaar-Zayt, Nalut, Libya
    14. Nenden
    15. Rabigh, Saudi Arabia
    16. 33 Tariq Rimal Hafiza, Rabigh, Saudia Arabia
    17. Site R, Raven Rock
    18. Shaqra, South Yemen
    19. 222 Sharia Samak Waghe, Shaqra, South Yemen
    20. Tudmur, Syria
    21. 51 Tariq Qasir Tziraa, Tudmur, Syria
    22. Tallaho, Egypt
    23. 24 Tariq Asfar-Nahr, Tallaho, Egypt
  7. Objects of Interest
    1. Charon
    2. Devil Fish
    3. EM
    4. Group Six
    5. Lighthouse
    6. UN1
  8. Photo Archives
    1. Airspace Security Jet Photo
    2. Recon Satelitte Photo
    3. Computer Enhanced Map of Liechtenstein
    4. AWACS Photo of North Adriatic Shipping
    5. 1982 Israeli Photo of an Incursion into Jordan
    6. FBI Routine Surveillance Photo of an Unidentifed Man
    7. Turkish Police Photo of an Arab Man Shot to Death while Attemping to Illegally Cross the Border
    8. Photo of the President Mailed to a West Beirut newspaper.
  9. Audio
    1. News Reports
    2. Suspect Helicopter Voice Clearance Check
    3. President Matton Speaks to European Leaders in Liechtenstein
    4. Suspect Cassette Tape Found at Abduction Site
    5. Recording of the President
    6. President of France
    7. Suspect Recording
    8. Interview with First Lady
    9. Interview with Syrian Minister
    10. 1991 Speech at Oxford by Qatzir Tsouban
    11. Phone Tap on National Security Office
    12. Phone Tap on Otto Damonkleiner
    13. Phone Surveillance of Soviet Consulate
    14. Radio Call from a Lieutenant in Charge of a Convoy of Helicopters
    15. Evidence Tape - Maryland Police Dept.
  10. Official Report
  11. Records Archive
    1. Order for NATO Exercise
    2. Order for Special Meeting
    3. Known Terrorist Groups
    4. Terrorist Codes
    5. Harvard Lampoon Article 1993
    6. Austria Passport Check
    7. S.E.C. Investigations Report
    8. Dedication at the U.N.
    9. Weapons List
    10. Army Requisition Order
  12. Top Secret - Limited Access Files
    1. The Black Fog is Lifting
    2. The Sun Rises Ascaroth
  13. Timeline
  14. Epilogue

Prologue

PROLOGUE

DAY “ZERO”

The President Is Missing and presumed kidnapped by persons with hostile intent towards the United States of America.

With these words, an adventure of global proportions and diabolic intrigue begins. On June 6, 1996, in the smallest country in Europe the largest terrorist action ever conceived was flawlessly executed and within minutes the President and the leaders of ten nations of Europe were abducted. Where they were taken, by whom, and whether they are safe, no one can say. An unidentified voice on tape claiming responsibility and issuing a list of impossible demands is only the starting point in an investigation of unprecedented dimension. The case of characters ranges from the most powerful figures in Washington to most dangerous figures in terrorism.

The Vice-President - He must take the helm at the most critical period in U.S. history, but does the real power rest with the White House Chief of Staff?

The Director of the C.I.A. - He planned the security for the meeting of the Heads of State. Was he criminally negligent or is there a traitor in his midst?

The Head of Libya’s Secret Army - Is this charismatic and deadly man organizing all the world’s terrorist groups into an invincible, invisible army capable of an act of this magnitude, or is there more than meets the eyes to this mysterious leader?

The Secretary of Defense - He wants full-scale military action now! But against who? And is he prepared to sacrifice the lives of all the hostages to enact his vengeance?

The Secretary of State - He is not even a member of the President’s inner circle, but it’s his job to find the hostages before the world goes over the brink. A special independent investigator is appointed by the Secretary to plow through the haystack of evidence and find the needle of truth.

You are the investigator. The world is in your hands.

Your Executive Commission:

  1. Examine the dossiers.
  2. Study the aerial and satellite photos.
  3. Control eight field agents who can go under-cover anywhere in the world.
  4. Listen very carefully to the audio evidence tape to discover its secrets.
  5. Decipher the coded messages that may hold the ultimate truth.
  6. Monitor the events of a world crumbling into chaos.
  7. Remember your independence: No one is above suspicion.

The Investigative Methodology

  1. Study the official report on the abduction of the President of the United States found in the document files. Note the principals involved, the locations, and the timetables and equipment referred to. Look for discrepancies or weaknesses in the security system.
  2. Open your case file and begin your report with your facts and conclusions regarding the official report and the events therein.
  3. Listen to the acoustic intelligence collected on audio tape. Each piece of information may have significance relating to things already known or things yet to be discovered. It is a matter of preference whether the tape is studied in its entirety or each section is analyzed when thought to be pertinent. (A list of the material is found under audio files.)
  4. Begin to examine the subject files. There are many and so you must decide whether to see only the files on persons that have been mentioned and wait until a name appears from another source before looking at their file, or you may, of course, examine as many files as you like and analyze the data therein looking for links, connections, personality traits and the importance of a subject’s money, power or geographical location.

NOTE: Keep your case file updated. The distillation of the information that you put in there should be clearer than the totality found in the data files.

5. When you discover something you find to be of interest and you wish more information, assign afield agent to investigate.

(Follow the guidelines set down in the S.I.S. manual for giving an order.)

6.Should you find a person or an address to be of particular interest or suspicion, you should then notify the State Department to detain and question the person officially or to investigate the address.

(Remember that there are legal and international limits to the powers of the State Department.)

7.New information obtained from an agent or the State Department will usually contain further data to investigate.Use your agents liberally; they have very few legal or international limitations.

8.The most valuable information is found in coded form. All codes conform, in one configuration or another, to the deciphering tools available to you. While it can be time-consuming, do not be intimidated by an apparent complexity.

9.The photographic files are also a valuable source of insight. Look them over; do not overlook them.

10.Be aware that world events are proceeding out-side and conditions everywhere are deteriorating quickly. If you can solve this crime, you will be saving more than the hostages.

11.GOOD LUCK.We’re all counting on you.

Selwyn Connors

Secretary of State