Skip to content

KN-86 Deckline — Operations Modules Specification

Document Version: 1.0
Date: 2026-04-11
Context: Three capability modules designed to match ICE BREAKER gameplay depth and philosophical approach to sound, OODA loops, and cross-module integration.

CIPHER-LINE revision note (2026-04-24): Every “Cipher voice” quotation in this spec renders on the CIPHER-LINE OLED above the keyboard, not the main 80×25 grid. Full-sentence Cipher examples are illustrative of beat intent; the actual CIPHER-LINE rendering is clipped fragments. For authoritative vocabulary/productions/biases per module, see the standalone gameplay specs (Depthcharge, Shellfire, Takezo) and docs/software/runtime/cipher-voice.md.


MODULE 1: DEPTHCHARGE — MARITIME RECONNAISSANCE

Section titled “MODULE 1: DEPTHCHARGE — MARITIME RECONNAISSANCE”

Designation: DEPTHCHARGE (Module Class 0x4D = Maritime)
Publisher: Cascade Softworks (Seattle, WA)
Profile: Autonomous submersible pilot and deep-water reconnaissance specialist
Operator Role: Drone pilot commanding acoustic sensing operations, depth management, evasion, salvage recovery
Deck State Signature: Cartridge History bit 6 (DEPTHCHARGE completion status)

Loading Screen:

[5-SECOND BOOT SEQUENCE]
Visual: Black screen. A waveform oscillates left-to-right (green phosphor).
Waveform grows more complex. Echoes appear below the primary wave.
Text assembles line-by-line:
CASCADE SOFTWORKS
DEPTHCHARGE™ SONAR SUITE
[INITIALIZING DEPTH PROTOCOLS]
The waveform resolves into a sonar ping pattern. Three concentric
circles bloom outward from center. Text fades.
Audio: Starts: 440Hz sine wave (clean calibration tone).
Transition (1.5s): Overlaid with a single sonar ping (160Hz click,
followed by 200ms decay tail). Ping repeats 3x.
Sustain (2.5s): Underwater ambient sound — distant whale vocalization
(very low frequency, barely audible), mixed with
microbubble crackle. Professional, maritime, alien.
Ending (0.5s): Ping rises to 480Hz (ready state). Clean fade to silence.
Timing: Total 5.0 seconds. Calm, deliberate. No urgency. Confidence in depth.
Design Intent: "You are going deeper. This will take time. The ocean listens."

TypeDescriptionThreatBase PayoutPhasesRep Unlock
SALVAGE DIVERecover lost equipment/data from wreck1-3300-1200¤2-3Rep 0+
RELAY ACCESSNavigate to underwater relay station, dock silently2-4600-2200¤2-3Rep 5+
EVASION RUNFlee pursuing hunter submarine, reach safe depth3-51500-3500¤2-4Rep 15+
ACOUSTIC INTELLIGENCEMap enemy sonar signatures, record and extract2-4800-2400¤3Rep 10+
DEEP SALVAGEAccess crashed corporate submersible, extract cargo4-53000-5000¤3-4Rep 25+

SALVAGE DIVE Contract:

typedef struct {
// Wreck location
uint16_t depth_target; // 200-800m (in game units)
uint8_t wreck_integrity; // 0-100 (affects navigation difficulty)
uint16_t cargo_mass; // Weight affects ascent speed (pressure mechanic)
uint8_t acoustic_signature; // 0-255 (how visible this wreck is to hunter)
// Threat parameters
uint8_t ambient_predators; // 0-3 (wildlife encounters)
uint8_t hunter_presence; // 0-255 threshold for hunter spawn
// Reward
uint16_t base_payout;
uint8_t cargo_type; // TECH, DATA, PRECIOUS_METAL, BIOTECH
} SalvageTemplate;
// Example: Corporate R&D Submersible lost in Mariana Trench (deep salvage scenario)
SalvageTemplate mariana_rd = {
.depth_target = 750,
.wreck_integrity = 45, // Heavily damaged, unstable
.cargo_mass = 150, // Heavy R&D equipment
.acoustic_sig = 180, // Loud wreck (resonance/creaks)
.predators = 2, // Some deep-sea creatures
.hunter_spawn = 200, // Hunter will arrive if trace > 200
.payout = 4800,
.cargo_type = BIOTECH
};

RELAY ACCESS Contract:

typedef struct {
uint16_t relay_depth; // 100-600m
uint16_t approach_distance; // How far from relay before docking (0-200m)
uint8_t relay_defenses; // 0-255 (sonar countermeasures, acoustic mines)
uint8_t silence_requirement; // Max acoustic signature allowed (0-50 for stealth)
uint16_t data_payload_size; // Credits extraction potential
uint8_t encryption_depth; // 0-4 (requires ICE BREAKER swap to decrypt)
} RelayTemplate;
// Example: Corporate financial relay station
RelayTemplate finance_relay = {
.relay_depth = 280,
.approach_dist = 80, // 80m out; long silent approach needed
.defenses = 120, // Hydrophone arrays, active countermeasures
.silence_req = 25, // Acoustic signature must stay < 25 (pressure!)
.payload_size = 2200,
.encryption = 3
};

Example 1: SALVAGE DIVE — “Cascade Failure” (Threat 2)

  • Setup: Autonomous research submersible sank 6 months ago. Carrying sensor arrays worth credits. Wreck at 350m depth. Trace of old sonar scans still present (makes location easier to find, harder to access secretly).
  • Phases:
    1. Navigate to wreck (15 turns): Descend to 350m. Acoustic signature accumulates (1 per turn). At turn 10, ambient whale sounds (not threat, just noise). Sonar map reveals wreck position.
    2. Extract cargo (10 turns): Approach wreck. Cargo is loose; extraction requires careful maneuvering. Each turn of extraction, pressure increases. At turn 8, a predator shark appears (ambient threat, not ICE). Choose to engage or evade.
    3. Ascend and egress (12 turns): Return to safe depth (0m, surface). Ascent rate is limited by pressure (can’t rise faster than 2 depth units/turn without decompression penalty). Trace may spike if moving too fast.
  • Outcome: If successful: 750¤ + rep +3. If predator encounters: 550¤ + rep +2 (slower escape). If pressure incident: fail, lose cargo, return to surface damaged.

Example 2: RELAY ACCESS — “Zaibatsu Wire Transfer” (Threat 4)

  • Setup: Enemy corporate relay at 250m depth. Heavily defended sonar nets. Need to dock silently, extract 3500¤ in financial data, escape without triggering security.
  • Phases:
    1. Silent approach (20 turns): Must keep acoustic signature below 20 (extreme stealth). Each navigation choice: fast (loud, 4 sig/turn) or slow (quiet, 1 sig/turn). Pressure decision every 5 turns.
    2. Dock and access (8 turns): Physical docking procedure. Sonar ping from dock triggers relay alarm if acoustics are too hot. Each turn, pressure increases. At turn 6, hydrophones detect your position. Must decide: continue extraction or abort.
    3. Emergency egress (12 turns): Security lock closes. Submarine now at 250m with alarms blaring. Must ascend to surface while evading hunter submarine. Pressure limit makes fast ascent risky.
  • Outcome: Success at silence: 3500¤ + rep +6. Partial extraction: 2000¤ + rep +3. Caught: 0¤ + rep -2 + acoustic signature lingers for next mission.

SRAM Fields Modified by DEPTHCHARGE:

  • credit_balance — increased by salvage/relay payouts (400-3500¤ per contract)
  • reputation — increased by successful dives (+3 to +8)
  • cartridge_history[6] — DEPTHCHARGE completion flags (0=never, 1=loaded, 2=completed easy, 4=completed hard)
  • acoustic_signature (NEW 8-bit field) — lingers after dives, affects hunter spawn rates in future DEPTHCHARGE missions

Reputation Thresholds (DEPTHCHARGE Context):

  • Rep 0-4: NOVICE. Threat 1-2 contracts only. Cipher voice is instructive. “Watch your depth gauge. Pressure builds slowly.”
  • Rep 5-14: APPRENTICE. Threat 2-3 available. Cipher tone shifts to tactical. “Approaching crush depth. Manage your ascent.”
  • Rep 15-24: SPECIALIST. Threat 3-4 available. Cipher becomes cryptic. “The depths remember what you’ve done. Proceed carefully.”
  • Rep 25-34: MASTER. Threat 4-5 available. High-value deep salvage ops unlock. Cipher speaks as equal. “You’ve learned to listen.”
  • Rep 35+: LEGEND. Exclusive contracts (DEEP SALVAGE, HUNTER INTERCEPT). Cipher becomes poetic. “The abyss sends regards.”

New Hidden Stat: Acoustic Signature

  • Persists across DEPTHCHARGE missions
  • Starts at 0, increases by 1-3 per contract depending on stealth/noise
  • When > 150, hunter submarines spawn 25% earlier in next mission
  • When > 200, hunter spawns automatically at mission start
  • Resets slowly: -5 per real-time day of non-DEPTHCHARGE play
  • Operator can attempt “Silent Recon” contracts to intentionally flush signature (risky, no payout, but resets faster)

With ICE BREAKER (Primary Integration):

  • DEPTHCHARGE sonar reveals encrypted relay ICE class/depth before ICE BREAKER intrusion attempt
  • RELAY ACCESS phase 2 can be ICE BREAKER hacking (unlock via Hot Swap)
  • Encrypted underwater communication nodes become accessible with both cartridges
  • Example: DEPTHCHARGE maps relay at 350m, sonar shows “ICE-defended relay.” Operator swaps to ICE BREAKER, uses CRACK on network intrusion phase. Payout shared: DEPTHCHARGE 600¤ (phase 1) + ICE BREAKER 900¤ (phase 2).

With BLACK LEDGER (Financial):

  • Underwater “shell account” networks exist. BLACK LEDGER + DEPTHCHARGE unlock DEEP AUDIT contracts
  • DEPTHCHARGE navigates to submarine account physical location; BLACK LEDGER audits the transaction trail
  • Cross-module bonus: +200¤ if both cartridges used in same multi-phase contract
  • Operator with both cartridges can trace money movements that physically move (offshore shell networks accessed via submersible drones)

With NEONGRID (Spatial):

  • NEONGRID’s mapping interface visualizes DEPTHCHARGE sonar returns as spatial grids
  • Operator trained in NEONGRID “reads” sonar patterns faster (reduces OBSERVE phase time by 10%)
  • Shared contracts: underwater network mapping (NEONGRID provides grid, DEPTHCHARGE provides sonar truth)

Cartridge History Interactions:

  • If ICE BREAKER in history: RELAY ACCESS contracts gain phase 2 (ICE-defended relays)
  • If BLACK LEDGER in history: ACOUSTIC INTELLIGENCE contracts gain phase 3 (financial routing of intercepted data)
  • If NEONGRID in history: wreck navigation is 10% faster (spatial intuition carries over)
  • Each loaded cartridge in history adds context to Cipher voice (different tone, more specific tactical advice)

Phase Architecture: DEPTHCHARGE missions are depth-dependent sequences. Each phase takes operator deeper, accumulating acoustic signature and pressure.

Phase 1: DESCENT & NAVIGATION — Locate target, manage depth, control acoustic signature
Phase 2: ENGAGEMENT — Dock, extract, or engage (may Hot Swap to ICE BREAKER)
Phase 3: ASCENT & EVASION — Return to surface, manage pressure limits, evade hunters

Example Multi-Phase: “Cascade Salvage + Financial Audit” (3-phase, Threat 4)

MISSION BRIEFING:
Objective: Salvage R&D submersible (depth 500m) AND extract financial records
Cartridges available: DEPTHCHARGE, BLACK LEDGER (optional: ICE BREAKER for relay)
Phase sequence: DEPTHCHARGE phase 1 → DEPTHCHARGE phase 2 + BLACK LEDGER phase 2 → DEPTHCHARGE phase 3
Estimated duration: 18 turns
Payout: 2400¤ (DEPTHCHARGE) + 1200¤ (BLACK LEDGER) = 3600¤ total
Rep gain: +6 (both cartridges)
PHASE 1 (DEPTHCHARGE DESCENT): Navigate to 500m, locate wreck via sonar
- Turns 1-6: Silent descent (acoustic sig + 1/turn). Navigation choices.
- Turn 7: Whale vocalization (ambient). No threat, but masks sonar clarity.
- Turn 8: Wreck detected. Acoustic signature now +2/turn (wreck resonance increases visibility).
- Turns 9-14: Final approach. At turn 12, predator encountered (evade with cost, or ignore).
- Outcome: Wreck located, acoustic signature +8, pressure gauge at 85%.
PHASE 2A (DEPTHCHARGE ENGAGEMENT): Dock and extract submersible data
- Turns 1-4: Physical dock maneuver (pressure: +3/turn as submarine contacts wreck).
- Turn 5: Cargo breached. Data extraction begins.
- Turns 6-8: Extract financial ledgers from submersible server.
- Turn 9: Decision point: attempt BLACK LEDGER swap for financial analysis (if cartridge available).
PHASE 2B (BLACK LEDGER — OPTIONAL HOT SWAP):
- Turns 1-3: Financial routing. Trace the money's origin to corporate account.
- Turn 4: Account access secured. Bonus payout +400¤.
- Outcome: Now holding both salvaged hardware AND traced financial data.
PHASE 3 (DEPTHCHARGE ASCENT & EVASION): Return to surface, manage pressure, evade hunter
- Turns 1-6: Ascent from 500m to 250m (pressure: -2/turn, safe ascent rate).
- Turn 7: Hunter submarine detected (acoustic signature now visible to enemies). Escape tempo increases.
- Turns 8-12: Fast ascent from 250m to 0m (pressure: -4/turn, risky but necessary). Acoustic signature peaks.
- Turn 13: Surface reached. Safety. Hunter still 50m behind.
- Outcome: Successful extraction. Acoustic signature +12 (lingers, affects future missions).
TOTAL PAYOUT: 3600¤ base + 200¤ cross-module bonus = 3800¤
REPUTATION GAIN: +6
ACOUSTIC SIGNATURE: +12 (operator is now "hot"; next DEPTHCHARGE mission has 30% hunter spawn risk)

Example 2: “Evasion + Relay + ICE BREAKER Hack” (4-phase, Threat 5)

MISSION BRIEFING:
Objective: Escape pursuing hunter submarine. During escape, access underwater relay for data extraction.
Cartridges: DEPTHCHARGE (primary), ICE BREAKER (phase 2 swap)
Phase sequence:
1. DEPTHCHARGE evasion (20 turns)
2. DEPTHCHARGE relay approach (12 turns)
3. ICE BREAKER relay hack (8 turns, Hot Swap)
4. DEPTHCHARGE final escape (15 turns)
Estimated: 55 turns (33 min play)
Payout: 2500¤ (evasion) + 1500¤ (relay) = 4000¤
Rep gain: +8 (Threat 5)
PHASE 1 (EVASION — 20 turns): Hunter submarine chasing at depth 200m
- Turns 1-5: Deep dive to 400m (escape). Pressure mounting. Acoustic signature +2/turn (desperation).
- Turn 6: Hunter loses sonar contact (you're deeper than their effective range). Threat level drops.
- Turns 7-15: Navigate evasion course (3 choice points). Navigate around underwater mountains (natural cover).
- Turn 16: Hunter re-acquires sonar (you were too loud). Chase resumes.
- Turns 17-20: Final push to relay station (safe harbor). Acoustic signature maxed at +50.
PHASE 2 (RELAY APPROACH — 12 turns): Dock at relay station at 280m depth
- Turns 1-8: Silent approach. Acoustic signature now MUST drop to <30 or relay defenses trigger.
- Turn 9: Relay proximity. Decide: fast dock (loud, 4 turns) or stealth dock (quiet, 8 turns).
- If stealth chosen: Turns 10-12 are tension-filled silence. Hunter now 100m away. Close.
- Relay docking sequence triggers. Physical dock begins.
PHASE 3 (ICE BREAKER RELAY HACK — Hot Swap, 8 turns):
- Cartridge swap. ICE BREAKER loads. Scoped capability: relay network access only.
- Turns 1-3: Identify relay encryption (depth 2, moderate).
- Turns 4-6: Apply CRACK tool to relay security. Alarms sound (but hunter doesn't detect network intrusion).
- Turns 7-8: Extract encrypted data. Financial records aboard relay.
- Swap back to DEPTHCHARGE. Hunter now at relay entrance, chasing tactically.
PHASE 4 (FINAL ESCAPE — 15 turns): Eject from relay, sprint to safe depth
- Turns 1-5: Violent ascent (pressure: -5/turn, dangerous but necessary). Acoustic signature screaming.
- Turn 6: Break surface. Hunter submarine cannot surface chase (water pressure limits).
- Turns 7-15: Navigate to safe harbor. Hunter breaks off (too shallow now).
- Mission complete. Extraction successful.
TOTAL PAYOUT: 4000¤
REPUTATION GAIN: +8 (Threat 5 contract)
ACOUSTIC SIGNATURE: +25 (extremely hot; next mission at 60% hunter spawn risk)
NOTE: Operator learned multi-cartridge synchronization. Reputation now unlocks DEEP SALVAGE contracts.

Tier 1: NOVICE (Rep 0-4)

  • Available contracts: SALVAGE DIVE (Threat 1-2)
  • Capabilities unlocked: Basic sonar (ping-return distance only), depth gauge (visual indicator), basic ascent management
  • Audio feedback: Simple beeps (sonar pings), warning tones (pressure approaching limit)
  • Cipher voice: Instructive, warm. “Take your time. The ocean is patient.”
  • Typical session: 15 min, single-phase 300¤ contract
  • Unlock condition: Complete SALVAGE DIVE Threat 1 (guaranteed success path)

Tier 2: APPRENTICE (Rep 5-14)

  • Available contracts: RELAY ACCESS (Threat 2), ACOUSTIC INTELLIGENCE (Threat 2)
  • Capabilities unlocked: Sonar returns show ICE class, encryption depth; pressure management becomes critical (fast ascent risks system damage)
  • Audio feedback: Layered tones (sonar + pressure warning), predator sounds (whale, shark)
  • Cipher voice: Observant, cautionary. “Pressure is building. Manage your ascent carefully.”
  • Typical session: 25 min, 2-phase 1200¤ contract
  • Unlock condition: Complete RELAY ACCESS Threat 2

Tier 3: SPECIALIST (Rep 15-24)

  • Available contracts: EVASION RUN (Threat 3), ACOUSTIC INTELLIGENCE (Threat 3-4)
  • Capabilities unlocked: Hunter sonar signature recognition (can identify hunter sub type), silent running mode (reduce acoustic signature at cost of speed)
  • Audio feedback: Complex sonar returns (harmonics reveal ICE variants), hunter sub engine sounds (distinct from environment)
  • Cipher voice: Cryptic, tactical. “The depths remember what you’ve done. Other submarines are listening.”
  • Typical session: 35 min, 3-phase 2200¤ contract with possible Hot Swap
  • Unlock condition: Complete EVASION RUN Threat 3

Tier 4: MASTER (Rep 25-34)

  • Available contracts: DEEP SALVAGE (Threat 4-5), HUNTER INTERCEPT (Threat 5, NEW)
  • Capabilities unlocked: Predict hunter spawn locations using acoustic signature analysis, dual-sonar mode (listen to two frequencies simultaneously)
  • Audio feedback: Advanced sonar reveals node topology (ICE BREAKER contracts now show underwater relay architecture to DEPTHCHARGE)
  • Cipher voice: Equals, philosophical. “You’ve learned the language of the deep. Use it wisely.”
  • Typical session: 45 min, 4-phase 3500¤ contract with multi-cartridge Hot Swaps
  • Unlock condition: Complete DEEP SALVAGE Threat 4

Tier 5: LEGEND (Rep 35+)

  • Available contracts: LEVIATHAN HUNT (Threat 5, ultimate), ACOUSTIC CAMOUFLAGE (Threat 5, experimental)
  • Capabilities unlocked: Operator can broadcast false sonar signatures (create decoys), phase shift sonar (briefly go undetectable at cost of navigation blindness)
  • Audio feedback: Experimental audio (unreliable sonar, haunting deep-sea sounds, feedback loops)
  • Cipher voice: Mystical, sparse. “You have become the ocean. Guard that knowledge.”
  • Typical session: 60+ min, 5-phase 5000¤+ contract, emergence-heavy
  • Unlock condition: Complete HUNTER INTERCEPT Threat 5 + achieve Rep 35+

Payout Formula:

base_payout = threat_level × 350¤ + cargo_mass × 2¤
speed_bonus = max(0, (target_turns - actual_turns) × 15¤)
(bonus if completed faster than estimated time)
stealth_bonus = (100 - final_acoustic_signature) × 5¤
(bonus if acoustic signature stayed low)
successful_outcome_multiplier = 1.0 (clean extraction)
= 0.6 (partial extraction)
= 0.0 (mission failed)
total = (base_payout × successful_outcome_multiplier + speed_bonus + stealth_bonus)

Worked Examples:

  1. SALVAGE DIVE (Threat 2, 350m wreck, estimated 15 turns)

    • Base: 2 × 350 + 120 × 2 = 1240¤
    • Time: 12 turns (3 turns faster) = +45¤ bonus
    • Acoustic: 45 signature (100-45) × 5 = +275¤
    • Clean extraction: 1.0 multiplier
    • Total: 1560¤
  2. RELAY ACCESS (Threat 3, 250m relay, estimated 25 turns)

    • Base: 3 × 350 + 80 × 2 = 1210¤
    • Time: 28 turns (3 turns slower) = +0¤ (no bonus)
    • Acoustic: 78 signature (100-78) × 5 = +110¤
    • Partial extraction (alarm triggered): 0.6 multiplier
    • Total: (1210 × 0.6) + 110 = 836¤
  3. EVASION RUN (Threat 4, 500m depth, estimated 35 turns)

    • Base: 4 × 350 = 1400¤
    • Time: 32 turns (3 turns faster) = +45¤
    • Acoustic: 120 signature (100-120 = capped at 0) = +0¤
    • Clean extraction: 1.0 multiplier
    • Total: 1445¤ (stealth penalty for loud escape)
  4. DEEP SALVAGE (Threat 5, multi-phase, 750m, estimated 50 turns)

    • Base: 5 × 350 + 200 × 2 = 2150¤
    • Time: 48 turns (2 turns faster) = +30¤
    • Acoustic: 165 signature (capped 100 max) = +0¤
    • Cross-module bonus (BLACK LEDGER used): +250¤
    • Clean extraction: 1.0 multiplier
    • Total: 2430¤

Risk/Reward Curve:

ThreatBase RangeRep UnlockAvg SessionHigh-Rep PayoutFailure Cost
1200-400¤0+15min450¤-50¤ acoustic sig
2400-800¤0+20min1100¤-100¤ acoustic sig
3800-1600¤15+30min2200¤-150¤ acoustic sig
41600-3200¤25+40min4000¤-200¤ acoustic sig + rep -2
53200-6000¤35+60min6500¤rep -5, acoustic sig resets (hunted)

Single Session Example (30 min, Threat 2):

MINUTE 0:00 — Boot and contract selection
- DEPTHCHARGE cartridge loads. Cascade loading screen (5s).
- Mission board shows 4 SALVAGE DIVEs (Threat 1-2).
- Operator selects Threat 2 "Wreck at 350m" (estimated 15 min, 1200¤).
MINUTE 0:30 — Pre-dive briefing
- Cipher voice: "Autonomous drone ready. Depth limit today is 600m.
Wreck target: 350m. Acoustic signature at baseline."
- Operator presses INFO (double-tap) to see sonar calibration screen.
- Operator reviews ascent limits (can rise max 3 units/turn without pressure penalty).
MINUTE 1:00 — Descent phase (Turns 1-10)
- Operator navigates: CAR to drill into depth 100m, CDR to move laterally.
- Every turn: YM2149 Voice 1 (pressure tone, subtle). Voice 3 (ambient underwater).
- Turn 5: Whale sound (Voice 2, not threat). Operator learns "listen for ambient."
- Turn 8: Wreck first appears on sonar (Voice 1 shifts to new frequency).
- Turn 10: Wreck at 350m confirmed. Acoustic signature at +8.
MINUTE 12:00 — Engagement phase (Turns 11-18)
- Operator approaches wreck. Presses CAR to dock.
- Cargo extraction begins. Each turn requires EVAL press (commitment).
- Turn 14: Predator shark on sonar (Voice 3 spike). Operator chooses:
- Continue extraction (fast, loud +2 sig/turn, risk predator contact)
- Evade predator (slow, quiet, delays extraction by 3 turns)
- Operator chooses evasion. Predator moves away.
- Turn 18: Cargo extraction complete. Acoustic signature +13.
MINUTE 22:00 — Ascent and egress (Turns 19-27)
- Operator presses CDR to begin return. Ascent from 350m to 0m begins.
- Pressure gauge: ascent rate must stay within limit (max -3 depth/turn).
- Turns 19-24: Steady ascent. Pressure easing. Voice 1 descends in frequency (relief tone).
- Turn 25: Surface reached. Silence (all voices stop).
- Turn 26: Egress clear. No hunter detected.
- MISSION COMPLETE.
MINUTE 25:00 — Debrief
- Payout calculation:
- Base: 2 × 350 + 100 × 2 = 900¤
- Speed: 19 turns actual, 15 estimated = +0¤ (slower)
- Stealth: acoustic 56 signature = +220¤
- Outcome: clean extraction = 1.0×
- **Total: 1120¤**
- Reputation: +3 (Threat 2 contract)
- Acoustic signature: +13 (lingers for next mission)
- Cipher voice: "Well done. The ocean quiets when you listen. Return when you're ready."
MINUTE 30:00 — Next mission available
- Operator can queue another contract immediately (fatigue mechanics TBD).
- Or swap to different cartridge.

Multi-Session Campaign Example (Rep progression):

SESSION 1 (NOVICE INTRO): Load DEPTHCHARGE alone
- Run three Threat 1 SALVAGE DIVEs (45 min total)
- Rep: 0 → 9 (NOVICE tier)
- Learn: basic sonar, depth pressure, ascent management
- Acoustic signature: ~40 (operator playing safe, learning)
SESSION 2-3 (APPRENTICE): Load DEPTHCHARGE, consider ICE BREAKER swap
- Run two Threat 2 RELAY ACCESS contracts (50 min)
- Rep: 9 → 15 (advancing to SPECIALIST)
- Learn: silence as strategy, hunter detection mechanics, ICE BREAKER cross-module
- Attempt one Hot Swap to ICE BREAKER (phase 2 relay hack)
- Acoustic signature: ~80 (more aggressive play)
SESSION 4-6 (SPECIALIST): Multi-cartridge approach
- Run THREAT 3 EVASION RUN (45 min)
- Rep: 15 → 24 (deep SPECIALIST)
- Load DEPTHCHARGE + BLACK LEDGER together
- Attempt multi-phase contract: escape + relay + audit
- Acoustic signature: ~150 (now "hot," hunter more frequent)
SESSION 7+ (MASTER): Deep specialization
- Unlock DEEP SALVAGE contracts (Threat 4-5)
- Operator now has 5+ cartridges available. Routine swaps.
- Rep: 25+ (MASTER)
- Run 60-min "Cascade Salvage + Financial Audit" contract (all three cartridges)
- Acoustic signature managed carefully (resets via "Silent Recon" contracts)

Multi-Cartridge Operator Routine:

An operator who owns ICE BREAKER + DEPTHCHARGE + BLACK LEDGER + NEONGRID might:

  1. Monday evening (45 min): Run DEPTHCHARGE EVASION RUN (Threat 3). Pure submarine pilot practice. Builds acoustic intuition.

  2. Tuesday evening (60 min): Run ICE BREAKER contract with DEPTHCHARGE swaps. Navigate encrypted relay (ICE BREAKER), then swap to DEPTHCHARGE for sonar analysis of ICE class. Back to ICE BREAKER for exploit. Multi-cartridge rhythm.

  3. Wednesday (30 min): Black Ledger audit contracts (separate game mode, no direct DEPTHCHARGE use, but financial decisions informed by previous week’s DEPTHCHARGE salvage payouts).

  4. Thursday (90 min): Campaign contract spanning all three cartridges. Deep salvage + relay hack + financial trace. Emergent sessions. Unique every time.

This workflow creates long-term player investment in DEPTHCHARGE while maintaining single-cartridge completeness.


Domain-specific vocabulary for CIPHER_DOMAIN:

  • DEPTH_THRESHOLD, PRESSURE_WARNING, ACOUSTIC_SIGNATURE, SONAR_CONTACT
  • CARGO_MASS, ASCENT_RATE, WRECK_INTEGRITY, HUNTER_PROXIMITY
  • RELAY_DEFENSES, ENCRYPTION_DEPTH, FINANCIAL_ROUTING
  • CRUSH_DEPTH, EVASION_COURSE, SILENT_RUNNING, EMERGENCY_ASCENT

Cipher Voice Examples:

  1. On Load (Rep 5, APPRENTICE tier):

    “Depthcharge sonar systems active. I see your acoustic signature at baseline. The deep awaits your command. Remember: pressure builds with every sound you make. Proceed with caution.”

  2. During Navigation (Rep 5, encountering wreck):

    “Sonar return at bearing 240. Wreck signature matches database. Integrity compromised—likely unstable. Approach slowly. Anything loud disturbs the abyss.”

  3. Under Pressure (Rep 15, SPECIALIST, acoustic signature > 100):

    “You’re hot. Hunter submarines don’t forget sound. Consider running silent or aborting this approach. The choice is yours.”

  4. Error/Failure (Rep 15, pressure incident during ascent):

    “System damage detected. You rose too fast. Next dive, manage your ascent rate carefully. Pressure is patient. Haste is lethal.”

  5. Success Debrief (Rep 25, MASTER, clean extraction):

    “You’ve learned the language. The ocean doesn’t fight you anymore—you flow through it. That’s mastery.”

  6. High-Rep Cryptic (Rep 35+, LEGEND, during multi-phase contract):

    “Three cartridges singing. You’ve become something between intelligence operative and deep-sea creature. Few reach this depth.”

  7. Ambient Commentary (Rep 25, during navigation, whale sound in environment):

    “The leviathans acknowledge your presence. They’re listening too. Be respectful of the territory you enter.”

  8. Warning (Rep 20, hunter submarine approaching):

    “Acoustic contact. Another submarine has you in sonar. It’s deciding what you are. Don’t give it a reason to care.”


C-style pseudocode for DEPTHCHARGE cell types:

/* ========== MISSION BOARD CELLS ========== */
CELL_DEFINE(MissionCell) {
CellBase base;
uint8_t threat_level;
uint16_t payout;
uint8_t contract_type; // SALVAGE_DIVE, RELAY_ACCESS, etc.
ON_CAR {
/* Drill into contract details screen */
contract_detail_screen_show(self);
}
ON_CDR {
/* Next contract in board */
next_mission_cell();
}
ON_EVAL {
/* Accept contract, initialize phases */
phase_chain_init(self->contract_type);
game_state = DESCENDING;
}
ON_INFO {
/* Show contract brief + payout forecast */
display_payout_table(self);
}
};
/* ========== GAMEPLAY CELLS ========== */
CELL_DEFINE(DepthCell) {
CellBase base;
uint16_t current_depth; // 0-1000m
uint16_t target_depth;
uint8_t pressure_level; // 0-100 (danger > 80)
uint8_t acoustic_signature; // 0-255
CellList* sonar_contacts; // List of WreckCell, RelayCell, HunterCell
ON_CAR {
/* Drill into sonar contact or navigation choice */
if (sonar_contacts->length > 0) {
CellBase *contact = list_get(sonar_contacts, current_selection);
drill_into(contact); // Examine wreck, relay, or hunter
}
}
ON_CDR {
/* Navigate laterally or adjust depth slightly */
uint16_t new_depth = current_depth + nav_input; // CAR/CDR for depth, numpad for bearing
update_depth_and_signature(new_depth);
sonar_rescan(); // Recompute sonar contacts at new depth
}
ON_EVAL {
/* Commit to navigation choice; advance turn; update pressure */
advance_turn();
pressure_update();
threat_check(); // Check for hunter spawn, predator encounter
voice_update_environment(); // YM2149 ambient feedback
}
ON_INFO {
/* Double-tap: show detailed sonar scan + pressure gauge */
display_sonar_detailed();
display_pressure_forecast();
}
};
CELL_DEFINE(WreckCell) {
CellBase base;
uint16_t depth;
uint8_t integrity; // 0-100 (affects extraction difficulty)
uint16_t cargo_mass;
uint8_t cargo_type;
uint8_t acoustic_signature; // How loud this wreck is
ON_CAR {
/* Drill into extraction sequence */
drill_into(extraction_sequence);
}
ON_EVAL {
/* Begin cargo extraction; lock in commitment */
extraction_phase_start();
pressure_increase_per_turn = 2; // Extraction is noisy
}
ON_INFO {
/* Detailed wreck analysis: age, previous intrusions, fragility */
display_wreck_telemetry(self);
voice_output("This wreck is %d turns old. Integrity: %d percent.",
wreck_age, self->integrity);
}
};
CELL_DEFINE(RelayCell) {
CellBase base;
uint16_t depth;
uint8_t encryption_depth; // 0-4 (requires ICE BREAKER if > 1)
uint8_t defense_level; // Hydrophone countermeasures
uint8_t silence_requirement; // Max acoustic signature allowed
uint16_t data_payload;
ON_CAR {
/* Drill into dock procedure */
drill_into(dock_sequence);
}
ON_EVAL {
/* Attempt docking; check silence requirement */
if (current_acoustic_signature > self->silence_requirement) {
alarm_trigger(); // Relay detects intrusion
hunter_spawn_risk += 50;
} else {
dock_successful();
data_access_phase_begin();
}
}
ON_INFO {
/* Show relay encryption, defenses, payload content */
display_relay_specs(self);
voice_output("Encryption depth: %d. Defenses active. Silence required: %d.",
self->encryption_depth, self->silence_requirement);
}
};
CELL_DEFINE(HunterCell) {
CellBase base;
uint16_t hunter_depth;
uint16_t distance_to_operator; // In sonar units
uint8_t hunter_type; // PATROL, AGGRESSIVE, LEVIATHAN
uint8_t sonar_acuity;
ON_CAR {
/* Examine hunter sub; what threat does it pose? */
drill_into(hunter_analysis);
}
ON_EVAL {
/* Engage in evasion; make evasion choice */
evasion_attempt = DECISION_POINT; // Operator chooses evasion direction
}
ON_INFO {
/* Detailed hunter profile: type, capability, hearing range */
display_hunter_threat_level(self);
voice_output("Hunter detected. Type: %d. Your signature is visible at range %d.",
self->hunter_type, self->distance_to_operator);
}
};
/* ========== ASCENT/PRESSURE MANAGEMENT ========== */
CELL_DEFINE(AscensionCell) {
CellBase base;
uint16_t current_depth;
int8_t ascent_rate; // -1 to -5 depth/turn (negative = rising)
uint8_t pressure_safety; // 0-100 (danger > 80)
ON_CDR {
/* Adjust ascent rate: faster (riskier) or slower (safer) */
ascent_rate = new_rate;
pressure_safety = compute_safety(ascent_rate, current_depth);
}
ON_EVAL {
/* Commit to ascent rate; advance turn */
if (ascent_rate > PRESSURE_LIMIT) {
pressure_incident(); // System damage, mission fail
} else {
advance_turn();
current_depth += ascent_rate; // Ascend toward 0
}
}
ON_INFO {
/* Show decompression table and pressure forecast */
display_ascension_plan(self);
}
};
/* ========== COMPOSITION EXAMPLE ========== */
CellList *depthcharge_create_mission(SalvageTemplate *template) {
CellList *mission = list_create();
/* Root: mission acceptance */
MissionCell *briefing = cell_create(MissionCell);
briefing->threat_level = template->threat;
briefing->payout = template->payout;
list_push(mission, (CellBase *)briefing);
/* Phase 1: descent to wreck */
DepthCell *descent = cell_create(DepthCell);
descent->current_depth = 0;
descent->target_depth = template->depth_target;
descent->sonar_contacts = list_create();
list_push(mission, (CellBase *)descent);
/* Add wreck to sonar contacts */
WreckCell *wreck = cell_create(WreckCell);
wreck->depth = template->depth_target;
wreck->cargo_mass = template->cargo_mass;
list_push(descent->sonar_contacts, (CellBase *)wreck);
/* Phase 2: extraction sequence */
ExtractionCell *extract = cell_create(ExtractionCell);
extract->target = wreck;
list_push(mission, (CellBase *)extract);
/* Phase 3: ascent and egress */
AscensionCell *ascent = cell_create(AscensionCell);
ascent->current_depth = template->depth_target;
list_push(mission, (CellBase *)ascent);
return mission;
}

YM2149 Voice Assignments:

  • Voice 1 (Left channel): PRESSURE & THREAT. Fundamental tone representing depth pressure (frequency proportional to depth). Spikes on ICE/hunter proximity. Silence = safety.

  • Voice 2 (Center): OPERATOR FEEDBACK. Sonar pings (clicks, harmonics), tool effects (CONS arpeggios if HOT SWAP to ICE BREAKER), cargo extraction tone (steady rising tone during engagement).

  • Voice 3 (Right channel): ENVIRONMENT. Ambient sounds (whale vocalizations, microbubble crackle, predator presence). When active = living ocean. When silent = dead water (preparation before something happens).

Key Audio Events (Frequency + Timing):

EventVoiceFrequencyDurationMeaning
Sonar Ping2160Hz click + 200ms tail0.3sSonar active, contact detected
Depth Warning1100Hz rising to 180Hz0.5sPressure increasing, approach crush depth
Pressure Incident1200Hz double-pulse0.7sSystem damage; ascent too fast
Whale Vocalization320Hz subsonic (felt not heard) + 80Hz rumble2.0sAmbient life (non-threat)
Hunter Sonar1240Hz rapid pulse0.4s repeatingAnother submarine detected
Extraction Success2440Hz rising arpeggio (4 notes)1.2sCargo extracted cleanly
Emergency Ascent1300Hz fast trill0.6s repeatingFlee mode active, pressure extreme
Dock Clamp Engage2220Hz descending gliss0.8sRelay physical dock engaged
Silence (Stealth Mode)AllMute (except crackling ambient)N/AOperator in “listen only” mode
Navigation Commit2330Hz single pulse0.2sCDR/CAR confirmed

Advanced Technique: “Playing by Ear”

Expert DEPTHCHARGE operators can navigate with eyes closed. Sonar pings have distinct spatial signatures:

  • Single ping = object directly ahead
  • Multiple pings at different pitch = wreck (multiple resonance frequencies)
  • Sustained low hum = whale or large animal
  • Rapid pulse = hunter submarine

The pressure tone (Voice 1) is the “depth gauge.” Experienced operators feel the frequency and know their depth without looking. This is the auditory equivalent of feel-based gameplay.


Asymmetric Roles (Deck-to-Deck Play):

Two KN-86 units running DEPTHCHARGE engage in either:

  1. Competitive Evasion: One operator pilots a submarine; the other operates enemy hunter sonar. Real-time asymmetric chase.

  2. Cooperative Salvage: Both operators pilot separate drone teams to salvage a wreck (time-synchronized missions).

Data Flow:

OPERATOR A (Submarine Pilot)
↓ (UART 9600 baud, every 100ms)
Sends: current_depth, acoustic_signature, position_bearing, action_intent
OPERATOR B (Hunter Sonar Operator)
Receives: sonar contact update
Decides: hunter response (move, ping, spawn acoustic countermeasure)
↓ (Returns to A)
Sends: hunter_position, sonar_ping_intensity, threat_level_escalation
OPERATOR A
Hears: incoming hunter sonar (Voice 1 pulses), must react within 1 second

Worked Example: Competitive Evasion

SCENARIO: "Smuggler's Run"
Operator A: Pilot submarine carrying stolen cargo. Depth 0-500m.
Operator B: Hunter sonar operator. Must locate and intercept within 10 minutes.
Link cable: Connects both KN-86 units.
Payout: Winner gets 2000¤. Loser gets 500¤ (participation).
MINUTE 0:00 — START
A: Loads cargo at surface (0m depth). Acoustic sig = 0.
B: Sonar sweep range = 1km. Doesn't yet detect A.
MINUTE 1:00 — DESCENT
A: Descends to 200m. Acoustic sig +5 from descent noise.
B: Sonar sweeps detect acoustic anomaly. Broadcasts position estimate (50% accuracy).
A hears: incoming hunter sonar pulses (Voice 1 spikes). A's location is known.
MINUTE 3:00 — EVASION
A: Takes evasive course (sharp turn, fast descent to 400m). Acoustic sig +15 (noisy maneuver).
B: Sonar locks. Clear location confirmed. Broadcasts "CONTACT LOCKED."
A hears: relentless sonar pulses (Voice 1 steady high frequency). Threat imminent.
MINUTE 5:00 — CHASE TEMPO
A: Acceleration phase. Speed 3 units/turn (max). Pressure building.
B: Hunter submarine spawns (automated response to A's evasion). Now actively chasing.
A vs. B: Real-time tempo battle. A cycles decisions every 0.5s. B cycles every 1.0s.
A has tempo advantage. But B can make strategic calls B can't react to in time.
MINUTE 8:00 — FINAL PUSH
A: One choice: surface (safe, but slow) or dive deeper (risky, faster).
A chooses dive to 550m. Pressure critical.
B: Makes final intercept attempt.
MINUTE 9:30 — RESOLUTION
A: Reaches safety depth (750m, beyond hunter effective sonar range). Extraction successful.
**Operator A Wins: 2000¤ + rep +5**
**Operator B: 500¤ + rep +2** (good defense effort)
OPTIONAL: Linked multi-cartridge variant
Operator A: Runs DEPTHCHARGE submarine + ICE BREAKER hacking phases (relay access during chase).
Operator B: Runs automated hunter defense (new DEPTHCHARGE sub-mode for automated hunter).
Result: More complex, 4-phase evasion + hack + escape.

MODULE 2: SHELLFIRE — ELECTRONIC WARFARE

Section titled “MODULE 2: SHELLFIRE — ELECTRONIC WARFARE”

Designation: SHELLFIRE (Module Class 0x45 = Electronic)
Publisher: Zaibatsu Digital (Osaka, Japan)
Profile: Signals intelligence officer and electronic warfare operator
Operator Role: EW technician managing frequency spectrum, jamming operations, signal intercept, countermeasures
Deck State Signature: Cartridge History bit 8 (SHELLFIRE completion status)

Loading Screen:

[4.5-SECOND BOOT SEQUENCE]
Visual: Black screen. Horizontal frequency sweep bar appears (left to right).
Red noise fills the sweep path (visible spectrum visualization).
Text overlays:
ZAIBATSU DIGITAL
SHELLFIRE™ EW SUITE
[INITIALIZING SIGNAL ENVIRONMENT]
Sweep bar retraces (right to left) while frequency spike indicators
appear. Bar collapses to vertical line at center (locked frequency).
Waveform pattern stabilizes. Text fades to single pulsing icon.
Audio: Starts: White noise (heavy, oppressive, full spectrum).
Transition (1.5s): Noise filtered to three distinct frequencies
(Voice 1: 400Hz, Voice 2: 800Hz, Voice 3: 1200Hz).
Sustain (2.0s): Three-voice harmonic drone (unsettling, deliberate).
Climax (0.5s): Sudden harsh buzz (electronic distortion, brief spike).
Fade (0.5s): Noise collapses to single 440Hz tone (signal locked).
Timing: Total 4.5 seconds. Menacing, technical, organized.
Design Intent: "Spectrum is a battlefield. You own the frequency space."

TypeDescriptionThreatBase PayoutPhasesRep Unlock
FREQUENCY SCANMap enemy signal environment, identify sources1-2200-600¤1Rep 0+
COMMS INTERCEPTLock onto target transmission, extract encrypted data2-3500-1500¤2Rep 5+
JAMMING OPSuppress enemy transmission, create signal chaos2-4800-2400¤2-3Rep 10+
SIGNAL DUELReal-time EW countermeasure exchange with active opponent3-51500-4000¤2-4Rep 20+
SPECTRUM DENIALSeize enemy frequency band, establish signal dominance4-52500-5000¤3-4Rep 30+

FREQUENCY SCAN Contract:

typedef struct {
// Signal environment
uint16_t frequency_range_start; // 80Hz - 20kHz (audible spectrum)
uint16_t frequency_range_end;
uint8_t signal_density; // How many signals active (0-255)
uint8_t noise_floor; // Background noise level (0-100)
// Detection parameters
uint8_t target_frequency; // Which frequency to map/lock onto
uint8_t signal_strength_variation; // How much signal fluctuates
uint8_t jamming_resistance; // How hard to jam (0-100)
// Reward
uint16_t base_payout;
uint8_t intelligence_value; // Higher = more useful signal data
} FrequencyScanTemplate;
// Example: Corporate radio network survey
FrequencyScanTemplate corp_radio_survey = {
.frequency_start = 400, // UHF band
.frequency_end = 1200, // Broad sweep
.signal_density = 45, // Moderately busy
.noise_floor = 30, // Some atmospheric noise
.target_frequency = 850, // Specific corporate freq
.strength_var = 15, // Moderate variation (modulation type)
.jamming_resist = 40, // Moderate resistance (military hardening)
.payout = 400,
.intel_value = 60
};

COMMS INTERCEPT Contract:

typedef struct {
uint16_t target_frequency; // MHz equivalent
uint8_t modulation_type; // AM, FM, FSK, BPSK (affects decoding)
uint8_t encryption_complexity; // 0-4 (requires decryption tools)
uint16_t message_duration; // How long the transmission lasts
uint8_t signal_to_noise_ratio; // Higher = clearer signal
uint16_t payout_if_extracted;
uint8_t counter_jamming_active; // Does target broadcast counter-jam?
} CommsInterceptTemplate;
// Example: Corporate financial call (encrypted)
CommsInterceptTemplate finance_call = {
.target_frequency = 856,
.modulation_type = FSK, // Frequency shift keying
.encryption = 2, // Moderate encryption
.duration = 300, // 5-minute call window
.snr = 18, // Good signal, but some jamming present
.payout = 1200,
.counter_jamming = 1 // Active counter-measure broadcasts
};

Example 1: FREQUENCY SCAN — “Radio Landscape Survey” (Threat 1)

  • Setup: Map a 500-1500 MHz band to identify active signals. Operator scans, identifies strongest signals, reports back.

  • Gameplay:

    1. Scan Phase (8 turns): Sweep frequency band. Each turn, Operator presses CDR to move frequency +100MHz. Voice 2 changes pitch as operator moves through spectrum.
    2. Lock Phase (5 turns): Once strongest signal identified (400Hz pure tone = corporate radio), presses EVAL to lock sonar-style. Voice 1 locks onto frequency.
    3. Analysis Phase (4 turns): Hold lock. System analyzes signal characteristics (modulation, encryption, source). Voice 3 reveals intelligence: “Signal is military-grade hardened radio. Likely command and control. Encryption present.”
    4. Report (1 turn): Press LINK to transmit findings back to command. Mission complete.
  • Audio Design: Spectrum sweep sounds like descending pitch. When locked: pure frequency (440Hz or matching signal). Analysis phase adds harmonic artifacts (indicating signal complexity detected).

  • Outcome: 400¤ + rep +2. Maps signal environment for future operations.

Example 2: COMMS INTERCEPT — “Financial Heist Call” (Threat 3)

  • Setup: Corporate executives holding encrypted financial call. Operator must lock sonar-style onto frequency, filter out background noise, and extract encrypted data (which Black Ledger can decrypt).

  • Gameplay:

    1. Frequency Lock (10 turns): Search 800-900MHz band for active transmission. Threat: active counter-jamming (Voice 3 interference). Operator must balance: fast lock (loud, triggers counter-jam) vs. slow lock (quiet, but call ends before extraction).
    2. Signal Extraction (15 turns): Once locked, Voice 2 plays the modulated signal. Operator presses INFO to decode signal strength. Pressing CONS + EVAL applies decryption key (if available) or marks for later decryption.
    3. Evasion (5 turns): Enemy counter-jam activates (Voice 3 noise spike). Operator can apply jamming countermeasure (press APPLY + predefined jamming profile) to suppress counter-jam temporarily.
    4. Extraction (3 turns): Final window. Extract encrypted data payload before connection closes.
  • Outcome: 1200¤ + rep +5. Encrypted data can be decrypted with Black Ledger (Hot Swap). Full payload extracted = bonus +400¤.


SRAM Fields Modified by SHELLFIRE:

  • credit_balance — increased by signal intelligence, intercepts, jamming operations
  • reputation — cumulative across all modules
  • cartridge_history[8] — SHELLFIRE completion flags
  • jamming_resistance_known (NEW 16-bit field, indexed by frequency band) — tracks which enemy frequencies operator has learned defenses against

Reputation Thresholds (SHELLFIRE Context):

  • Rep 0-4: NOVICE. Frequency scan contracts only. Cipher voice is instructive. “Spectrum is vast. Learn to listen first.”
  • Rep 5-14: APPRENTICE. Intercept contracts available. Cipher becomes tactical. “Encryption hides secrets. Patience reveals them.”
  • Rep 15-24: SPECIALIST. Jamming ops unlock. Cipher observant. “You’re learning the language of signals. It speaks back.”
  • Rep 25-34: MASTER. Signal duel contracts unlock. Cipher cryptic. “When you jam, they counter-jam. This is the dance.”
  • Rep 35+: LEGEND. Spectrum denial contracts. Cipher mystical. “You have become the spectrum’s master. Use that power wisely.”

With ICE BREAKER:

  • Encrypted relay communications use SHELLFIRE to intercept, ICE BREAKER to decrypt
  • Hot Swap: SHELLFIRE intercepts signal → ICE BREAKER decrypts payload
  • Cross-module mission: “Corporate Communication Network” (signal interception + data intrusion)

With BLACK LEDGER:

  • Financial wire calls intercepted via SHELLFIRE
  • Encrypted transmissions decrypted, revealing account numbers/routing info
  • BLACK LEDGER audit phase traces money via intercepted communications
  • Bonus: If both cartridges used, financial trace is verified against signal intercepts (+250¤)

With NEONGRID:

  • Signal source mapping (SHELLFIRE identifies frequencies, NEONGRID maps transmitter locations spatially)
  • Operator can visualize “signal topology” instead of network topology
  • Trained in NEONGRID, operator reads frequency patterns faster (10% OBSERVE reduction)

Phase Architecture: SHELLFIRE missions are spectrum/time-based sequences. Each phase involves frequency management, signal detection, counter-jamming rhythm.

Example Multi-Phase: “Coordinated Signal Interception + ICE Breaker Hack” (4-phase, Threat 4)

MISSION BRIEFING:
Objective: Intercept encrypted corporate communications + extract financial data
Cartridges: SHELLFIRE (primary), ICE BREAKER (phase 2 swap optional), BLACK LEDGER (phase 3)
Phase sequence:
1. SHELLFIRE frequency scan (identify target signal)
2. SHELLFIRE signal lock + extraction (capture encrypted transmission)
3. ICE BREAKER decryption (Hot Swap) — unlock encryption
4. BLACK LEDGER financial trace (verify money trail)
Estimated: 40 turns (24 min)
Payout: 1500¤ (SHELLFIRE) + 1000¤ (BLACK LEDGER) = 2500¤
Rep gain: +6
PHASE 1 (SHELLFIRE SCAN): Identify target frequency (8 turns)
- Turns 1-5: Sweep band 800-1200 MHz. Voice 2 frequency changes per turn.
- Turn 6: Target signal detected (400Hz pure tone, modulating). Lock sonar approach.
- Turn 7: Confirm signal is financial call (voice analysis).
- Turn 8: Calculate counter-jam resistance. Operator learns: "Active counter-measure present."
PHASE 2 (SHELLFIRE INTERCEPT): Capture encrypted transmission (18 turns)
- Turn 1: Transmission starts. Signal window = 20 turns. Must extract within window.
- Turns 2-8: Lock on frequency. Voice 3 interference from counter-jamming. Operator applies countermeasure (press APPLY + counter-jam profile).
- Turns 9-15: Signal extraction. Voice 2 modulation pattern plays (encrypted data sound). Operator presses EVAL per 2 turns to confirm capture.
- Turn 16: Counter-jamming intensifies (Voice 3 loud spike). Operator can abort or push forward.
- Turns 17-18: Final extraction. Data copied to memory buffer.
- Outcome: Encrypted transmission captured. Cannot yet decrypt (requires ICE BREAKER or decryption tools).
PHASE 3 (ICE BREAKER DECRYPTION — Optional Hot Swap): Unlock encrypted message (6 turns)
- Cartridge swap occurs. ICE BREAKER loads. Scoped mode: decryption only.
- Turns 1-4: Apply CRACK or MIRROR tool to encrypted data.
- Turns 5-6: Message decrypts. Contents revealed: "Authorization for 5 million credit wire transfer to account 88834-SK."
- Outcome: Decrypted message contains account info. Ready for BLACK LEDGER audit.
PHASE 4 (BLACK LEDGER AUDIT): Trace money trail (8 turns)
- Swap to BLACK LEDGER. Source account identified.
- Turns 1-5: Audit source account. Ledger trace shows: funds originated from corporate subsidiary.
- Turns 6-8: Trace destination. Money trail leads to shell account (DEPTHCHARGE submarine account, if available).
- Outcome: Full financial trace confirmed. Bonus +250¤ for multi-module verification.
TOTAL PAYOUT: 2500¤ base + 250¤ cross-module bonus = 2750¤
REPUTATION GAIN: +6

Tier 1: NOVICE (Rep 0-4)

  • Available: FREQUENCY SCAN contracts only (Threat 1-2)
  • Capabilities: Frequency sweep (manual tuning), basic signal identification, noise floor visualization
  • Audio feedback: Simple tones (Voice 2 frequency varies with operator input), warning beeps
  • Cipher voice: Instructive, patient. “Listen before you act. The spectrum tells you everything.”
  • Unlock: Complete FREQUENCY SCAN Threat 1

Tier 2: APPRENTICE (Rep 5-14)

  • Available: COMMS INTERCEPT contracts (Threat 2-3)
  • Capabilities: Frequency locking (hold on signal), encryption detection, signal strength trending
  • Audio feedback: Locked frequency tone (steady), modulation artifacts (harmonics reveal encryption)
  • Cipher voice: Tactical. “Encryption is just noise. Learn to listen through it.”
  • Unlock: Complete COMMS INTERCEPT Threat 2

Tier 3: SPECIALIST (Rep 15-24)

  • Available: JAMMING OP contracts (Threat 3-4)
  • Capabilities: Active jamming (broadcast noise on target frequency), counter-jamming recognition, dual-band monitoring
  • Audio feedback: Jamming waveforms (Voice 1 broadband noise), counter-jam response (Voice 3 interference spike)
  • Cipher voice: Observant. “When you jam, they counter-jam. The dance begins.”
  • Unlock: Complete JAMMING OP Threat 3

Tier 4: MASTER (Rep 25-34)

  • Available: SIGNAL DUEL contracts (Threat 4-5)
  • Capabilities: Predict enemy counter-measures, frequency hopping defense, multi-band simultaneous operations
  • Audio feedback: Complex harmonic duel (three voices interweaving), real-time tactical feedback
  • Cipher voice: Equal partner. “You’ve become fluent in the language of war. Act accordingly.”
  • Unlock: Complete SIGNAL DUEL Threat 4

Tier 5: LEGEND (Rep 35+)

  • Available: SPECTRUM DENIAL contracts (Threat 5, ultimate)
  • Capabilities: Seize entire frequency bands, broadcast false signal networks, total spectrum dominance
  • Audio feedback: Orchestral complexity (all voices engaged in organized chaos), moments of eerie silence
  • Cipher voice: Mystical, powerful. “You own the spectrum now. Guard it against others like you.”
  • Unlock: Complete SIGNAL DUEL Threat 5 + achieve Rep 35+

Payout Formula:

base_payout = threat_level × 300¤ + signal_intelligence_value × 3¤
speed_bonus = max(0, (target_turns - actual_turns) × 12¤)
accuracy_bonus = (signal_lock_precision × 1.0) × 100¤
(how cleanly was signal locked; 0-100%)
countermeasure_bonus = (countermeasures_applied) × 50¤
(bonus for actively countering enemy jamming)
successful_extraction_multiplier = 1.0 (full extraction)
= 0.7 (partial extraction, some data lost)
= 0.0 (detected, mission failed)
total = (base_payout × successful_multiplier + speed_bonus + accuracy_bonus + countermeasure_bonus)

Worked Examples:

  1. FREQUENCY SCAN (Threat 1, estimated 8 turns)

    • Base: 1 × 300 + 60 × 3 = 480¤
    • Time: 7 turns (1 turn faster) = +12¤
    • Accuracy: 95% lock = +95¤
    • Countermeasures: none applied (passive contract) = +0¤
    • Clean extraction: 1.0×
    • Total: 587¤
  2. COMMS INTERCEPT (Threat 3, estimated 20 turns)

    • Base: 3 × 300 + 80 × 3 = 1140¤
    • Time: 22 turns (2 turns over target) = +0¤
    • Accuracy: 85% lock = +85¤
    • Countermeasures: 2 counter-jam profiles applied = +100¤
    • Full extraction: 1.0×
    • Total: 1325¤
  3. JAMMING OP (Threat 4, estimated 25 turns)

    • Base: 4 × 300 + 90 × 3 = 1470¤
    • Time: 23 turns (2 turns faster) = +24¤
    • Accuracy: 72% (jamming inherently noisy) = +72¤
    • Countermeasures: 3 active counter-jam counters = +150¤
    • Partial extraction (target detected partway through) = 0.7×
    • Total: (1470 + 24 + 72 + 150) × 0.7 = 1211¤

Single Session (35 min, Threat 3):

MINUTE 0:00 — Boot and contract selection
- SHELLFIRE cartridge loads. Zaibatsu loading screen (4.5s).
- Mission board shows 4 contracts (mix of SCAN and INTERCEPT, Threat 2-3).
- Operator selects Threat 3 "Financial Call Interception" (est. 20 min, 1200¤).
MINUTE 0:45 — Pre-op briefing
- Cipher voice: "Target frequency: 856 MHz. Transmission window: 5 minutes.
Counter-jamming active. Signal will be encrypted. Proceed carefully."
- Operator presses INFO to see frequency band visualization.
MINUTE 1:15 — PHASE 1: Frequency Scan (Turns 1-8)
- Operator navigates spectrum: CDR moves frequency ±100MHz per press.
- Voice 2 frequency shifts as operator tunes. Baseline is high-pitched (1200MHz), lowers as operator tunes down.
- Turn 3: Ambient noise spikes (Voice 3 interference, atmospheric noise).
- Turn 5: Weak signal detected (Voice 2 subtle tone at 856MHz).
- Turn 7: Signal strengthens (Voice 2 loudness increases). Operator presses EVAL to lock.
- Turn 8: Frequency locked. Voice 1 plays pure 440Hz tone (lock confirmation).
MINUTE 5:00 — PHASE 2: Signal Extraction (Turns 9-26)
- Transmission begins. Voice 2 carries the modulated data (sounds like warbling tones).
- Turn 12: Counter-jamming begins (Voice 3 broadband noise). Operator must decide: apply countermeasure or ride it out.
- Operator presses APPLY to deploy counter-jamming profile #3 (learned from previous mission).
- Turn 15-18: Clear signal window. Voice 2 modulation pattern clear. Operator presses EVAL to confirm capture.
- Turn 19: Counter-jamming intensifies (Voice 3 very loud). SNR (signal-to-noise ratio) dropping.
- Turn 22: Final data window. Operator presses EVAL to complete extraction.
- Turn 26: Transmission ends. Data captured. Encrypted, cannot yet decrypt.
MINUTE 13:00 — PHASE 3: Optional ICE BREAKER Swap (Turns 27-32)
- Operator decides to swap to ICE BREAKER (to decrypt captured data immediately).
- Cartridge swap. ICE BREAKER loads. 5 seconds physical boot.
- Decryption phase (5 turns). Apply CRACK tool to decrypt.
- Outcome: Message revealed: "Authorization for 5M credit wire."
- Swap back to SHELLFIRE (if planning another contract).
MINUTE 18:00 — Debrief
- Payout calculation:
- Base: 3 × 300 + 80 × 3 = 1140¤
- Speed: 26 turns actual, ~20 estimated = +0¤
- Accuracy: 88% (good lock despite jamming) = +88¤
- Countermeasures: 1 active counter = +50¤
- Full extraction: 1.0×
- **Total: 1278¤**
- Reputation: +5 (Threat 3)
- Cipher voice: "Well done. That signal was contested. You held your own."
MINUTE 20:00 — Next action
- Operator can queue another SHELLFIRE contract, or swap to BLACK LEDGER (to trace money from intercepted call).

Domain-specific vocabulary:

  • FREQUENCY_BAND, SIGNAL_LOCK, MODULATION_TYPE, ENCRYPTION_DEPTH
  • COUNTER_JAMMING, SIGNAL_STRENGTH, NOISE_FLOOR, SNR (signal-to-noise ratio)
  • TRANSMISSION_WINDOW, INTERCEPT_SUCCESS, SPECTRUM_DENIAL
  • HARMONIC_ARTIFACT, FREQUENCY_HOP, JAMMING_WAVEFORM

Cipher Voice Examples:

  1. On Load (Rep 5, APPRENTICE):

    “Shellfire systems online. Frequency spectrum active. Multiple signals detected. Choose your target frequency carefully. Jamming will not forgive impatience.”

  2. During Frequency Lock (Rep 10, APPRENTICE, encountering counter-jam):

    “Signal located at 856 MHz. Counter-jamming detected. Active defense protocol active. Your lock precision is degrading. Hold steady.”

  3. Under Jamming Pressure (Rep 20, SPECIALIST, counter-jamming intensifying):

    “They know you’re listening. Counter-measure broadcast incoming. You can suppress it, but the window is closing fast. Choose now.”

  4. Error/Failure (Rep 15, SPECIALIST, transmission ends prematurely):

    “Transmission ended. Extraction incomplete. You have 60% of the message. Decrypt what you can, or wait for the next broadcast. Patience is a tool.”

  5. Success Debrief (Rep 25, MASTER, clean interception + decryption):

    “Perfect lock. Clean extraction. Decryption successful. You’ve mastered the rhythm of signal war. Few reach this precision.”

  6. High-Rep Cryptic (Rep 35+, LEGEND, during spectrum denial operation):

    “You’re not just listening anymore. You’re orchestrating. Every frequency you seize denies an enemy a channel. This is power. Use it carefully.”

  7. Ambient Commentary (Rep 20, during scan, hearing whale sounds in background frequency):

    “Atmospheric interference. Or something else. The spectrum is alive. Learn to distinguish signal from noise, noise from meaning.”

  8. Warning (Rep 15, SPECIALIST, enemy frequency hopping detected):

    “They’re moving. Frequency hop detected. They’re learning your listening patterns. Adapt or lose the signal.”


C-style pseudocode:

/* ========== FREQUENCY SPECTRUM CELL ========== */
CELL_DEFINE(SpectrumCell) {
CellBase base;
uint16_t frequency_start; // 80-20000 Hz
uint16_t frequency_end;
uint16_t current_frequency; // Operator's tuning position
uint8_t noise_floor; // 0-100 background noise level
uint8_t jamming_intensity; // 0-255 (how hard enemy is jamming)
CellList* signals; // List of active signals in spectrum
ON_CDR {
/* Sweep frequency up/down */
uint16_t delta = (numpad_input & 0x0F) * 50; // 50MHz per input
current_frequency += delta;
sonar_rescan(); // Update signal detection at new frequency
voice_frequency_update(current_frequency); // Voice 2 pitch follows tuning
}
ON_EVAL {
/* Lock onto frequency; begin interception */
signal_lock_attempt();
if (is_signal_present(current_frequency)) {
drill_into(signal_at_frequency); // Move to signal cell
} else {
beep_error(); // No signal here; try elsewhere
}
}
ON_INFO {
/* Show spectrum visualization + noise floor + active signals */
display_spectrum_heatmap(self);
voice_output("Noise floor: %d. Signals detected: %d. Recommend scanning 400-900 MHz band.",
self->noise_floor, self->signals->length);
}
};
/* ========== SIGNAL LOCK CELL ========== */
CELL_DEFINE(SignalCell) {
CellBase base;
uint16_t frequency;
uint8_t modulation_type; // AM, FM, FSK, BPSK
uint8_t encryption_depth; // 0-4
uint16_t signal_strength; // Current SNR
uint16_t transmission_start_turn;
uint16_t transmission_duration; // How many turns until signal ends
uint16_t data_payload_size; // Bytes to extract
uint8_t counter_jamming_active; // Is enemy counter-jaming?
uint8_t extraction_progress; // 0-100% (how much captured)
ON_CAR {
/* Drill into lock detail screen */
drill_into(signal_lock_detail);
}
ON_EVAL {
/* Commit to extraction; begin capturing data */
signal_extraction_begin();
Voice2_activate(); // Begin playing modulated signal audio
extraction_phase_start();
}
ON_INFO {
/* Show signal parameters: modulation, encryption, window duration */
display_signal_telemetry(self);
voice_output("Frequency: %d MHz. Modulation: %s. Encryption: depth %d. Window: %d turns remaining.",
self->frequency, modulation_name(self->modulation_type),
self->encryption_depth, self->transmission_duration);
}
};
/* ========== EXTRACTION PHASE CELL ========== */
CELL_DEFINE(ExtractionCell) {
CellBase base;
SignalCell *target_signal;
uint8_t extraction_progress; // 0-100%
uint8_t countermeasure_active; // Is operator jamming back?
uint8_t counter_jamming_intensity; // Enemy counter-response level
ON_EVAL {
/* Advance extraction one turn; update progress */
uint16_t data_chunk = 10; // 10% per turn
extraction_progress += data_chunk;
if (target_signal->counter_jamming_active) {
counter_jamming_intensity += 5; // Escalates each turn
Voice3_intensity_increase(); // Enemy jamming grows
}
if (extraction_progress >= 100) {
extraction_complete();
} else if (counter_jamming_intensity > 200) {
alarm_trigger(); // Detection imminent
}
}
ON_APPLY {
/* Deploy counter-jamming profile to suppress enemy jam */
countermeasure_active = 1;
counter_jamming_intensity = 0; // Reset escalation
Voice1_broadband_noise(); // Operator's jamming broadcast
payout_bonus += 50; // Bonus for active countermeasure
}
ON_INFO {
/* Show extraction progress bar + signal quality + threat level */
display_extraction_progress(self);
voice_output("Extraction: %d percent. SNR: %d. Threat: %s.",
self->extraction_progress, current_snr(),
threat_level_string(self->counter_jamming_intensity));
}
};
/* ========== JAMMING OPERATION CELL ========== */
CELL_DEFINE(JammingCell) {
CellBase base;
uint16_t target_frequency;
uint8_t jamming_waveform; // Broadband, narrowband, frequency-hop
uint8_t jamming_intensity; // 0-255 (how hard operator jams)
uint8_t enemy_counter_response; // 0-255 (how they escalate)
uint16_t turns_until_target_silent; // Countdown to when target goes offline
ON_EVAL {
/* Increase jamming intensity; risk escalation */
jamming_intensity += 20;
enemy_counter_response += 15; // They adapt
turns_until_target_silent--;
if (jamming_intensity > 200) {
Voice1_reaches_crescendo(); // Peak jamming
if (enemy_counter_response > 200) {
full_spectrum_war(); // Both sides jamming heavily
}
}
}
ON_APPLY {
/* Switch jamming waveform (broadband → narrowband) to adapt */
jamming_waveform = (jamming_waveform + 1) % NUM_WAVEFORMS;
Voice1_waveform_changes(); // Audio signature shifts
payout_bonus += 75; // Bonus for tactical adaptation
}
ON_INFO {
/* Show jamming effectiveness and counter-response forecast */
display_jamming_analysis(self);
voice_output("Jamming intensity: %d/255. Enemy response: %d/255. Target silenced in: %d turns.",
self->jamming_intensity, self->enemy_counter_response,
self->turns_until_target_silent);
}
};
/* ========== COMPOSITION EXAMPLE ========== */
CellList *shellfire_create_mission(CommsInterceptTemplate *template) {
CellList *mission = list_create();
SpectrumCell *spectrum = cell_create(SpectrumCell);
spectrum->frequency_start = template->target_frequency - 200;
spectrum->frequency_end = template->target_frequency + 200;
spectrum->current_frequency = 400; // Start scanning from low frequency
spectrum->noise_floor = 40;
spectrum->jamming_intensity = 0; // No jamming yet
spectrum->signals = list_create();
list_push(mission, (CellBase *)spectrum);
SignalCell *target = cell_create(SignalCell);
target->frequency = template->target_frequency;
target->modulation_type = template->modulation_type;
target->encryption_depth = template->encryption_complexity;
target->transmission_duration = template->message_duration;
target->counter_jamming_active = template->counter_jamming_active;
list_push(spectrum->signals, (CellBase *)target);
ExtractionCell *extract = cell_create(ExtractionCell);
extract->target_signal = target;
extract->extraction_progress = 0;
extract->counter_jamming_intensity = 50; // Starts moderate
list_push(mission, (CellBase *)extract);
return mission;
}

YM2149 Voice Assignments:

  • Voice 1: THREAT & JAMMING. Broadband noise when enemy counter-jams. Pure tone when operator is locked. Frequency/intensity = threat level.

  • Voice 2: TARGET SIGNAL. The actual modulated transmission. Frequency = target frequency. Modulation artifacts reveal encryption. Silence = no signal present.

  • Voice 3: ENVIRONMENT & COUNTERMEASURES. Atmospheric interference, multi-target signals, operator’s counter-jamming broadcast. Busy = contested spectrum. Quiet = clear band.

Key Audio Events:

EventVoiceFrequencyDurationMeaning
Frequency Sweep2Glissando 80Hz→20kHz1.5sScanning full spectrum
Signal Lock2Match target freq0.4sLocked onto target
Modulation Artifact2Target + harmonicsContinuousEncryption detected (harmonic complexity)
Counter-Jamming Start1400Hz broadband0.5s repeatingEnemy broadcasting counter-measure
Operator Jam Deploy31000Hz broadband0.6s repeatingOperator’s jamming broadcast
Transmission Window2Target freqDurationActive signal present
SNR Degradation1+2Sustained with noiseContinuousSignal getting noisy (jamming effect)
Extraction Success2Descending gliss + tone1.0sData captured cleanly
Detection Alert1800Hz double-pulse0.7s repeatingEnemy detected intrusion
Spectrum WarAllHarmonic chaosDurationFull frequency battle active

Asymmetric Roles:

Two decks running SHELLFIRE engage in:

  1. Intercept vs. Counter-Jamming: One operator tries to intercept a transmission; other operates counter-jamming defense.

  2. Frequency Duel: Both operators broadcast signals/jamming on same band in real-time competition.

Worked Example:

SCENARIO: "Corporate Radio War"
Operator A: SHELLFIRE Intercept operator. Goal: lock onto target frequency and extract data.
Operator B: SHELLFIRE Counter-Jamming operator. Goal: jam Operator A's lock before extraction completes.
Link: UART connection, 100ms sync updates.
Payout: A wins (successful extraction) = 2000¤. B wins (detection) = 1500¤.
MINUTE 0:00 — START
A: Begins frequency scan (starts at 800 MHz).
B: Receives "intercept in progress" signal over link.
MINUTE 2:00 — LOCK ATTEMPT
A: Scans and finds signal at 856 MHz. Locks. Voice 2 locked tone plays.
B: Receives "lock acquired at 856 MHz" via link. Decision: where to jam?
B: Broadcasts jamming on 856 MHz to suppress A's lock.
MINUTE 3:00 — JAMMING ESCALATION
A: Lock degraded by B's jamming. SNR dropping. Presses APPLY to counter-jam B's counter-jam.
B: Feels A's counter-jam come online (Voice 3 spike). Escalates jamming waveform.
MINUTE 5:00 — FINAL PUSH
A: Extraction at 80%. Counter-jam holding B at bay. But transmission window closing (4 turns left).
B: One last attempt. Broadcasts full-spectrum jamming (all three voices in chaos).
A: Presses EVAL to complete extraction before transmission ends.
MINUTE 6:00 — RESOLUTION
A: Extraction complete at 87%. 1800¤ payout + rep +4.
B: Counter-jam effort detected intrusion attempt. 800¤ payout + rep +3 (defensive bonus).
OUTCOME: Both operators profited, but A won the duel.

Designation: TAKEZO (Module Class 0x54 = Tactical)
Named after: Miyamoto Musashi’s birth name, legendary swordmaster who mastered the Way through contemplation
Publisher: Kōji Interactive (Kyoto, Japan)
Profile: Strategic analyst and adversarial pattern recognition specialist
Operator Role: Study scenarios, recognize patterns, plan multi-turn strategies, analyze risk/reward
Deck State Signature: Cartridge History bit 9 (TAKEZO completion status)

Loading Screen:

[3.5-SECOND BOOT SEQUENCE]
Visual: Black screen. Single horizontal line appears (center, white/amber).
Line remains still for 1.0s (meditation).
Three more lines appear above/below (hierarchical structure).
All four lines move to form a pattern (abstract Go board or chessboard grid).
Grid stabilizes. Text appears:
KŌJI INTERACTIVE
TAKEZO™ STRATEGIC ANALYSIS
[INITIALIZING PATTERN ENGINE]
Grid pixelates and resolves into game state (abstract tactical scenario).
Text fades. Grid remains, interactive.
Audio: Starts: Silence (complete, unusual).
Transition (0.8s): Single note (D2, 73Hz, deep bell tone) appears.
Sustain (1.5s): Bell note overlaid with sparse koto pluck (Japanese string).
Climax (0.8s): Additional notes layer in (harmony, building structure).
Fade (0.4s): All notes sustain and fade to silence.
Timing: Total 3.5 seconds. Contemplative, patient, intellectual.
Design Intent: "Every scenario is a puzzle of strategy. Take your time. Mastery requires stillness."

TypeDescriptionThreatBase PayoutTurnsRep Unlock
PATTERN RECOGNITIONAnalyze scenario, identify winning pattern1-2150-400¤5-10Rep 0+
TACTICAL ANALYSISEvaluate positions, calculate risk/reward2-3300-900¤10-20Rep 5+
STRATEGIC PLANNINGMulti-turn scenario, prepare 3-5 move ahead3-4600-1800¤20-40Rep 15+
ADVERSARIAL WARGAMEPlay both sides; learn opponent strategy4-51500-4000¤30-60Rep 25+
MASTERY CHALLENGEHistorical military/corporate scenario, solve with zero errors53000-8000¤60+Rep 35+

PATTERN RECOGNITION Contract:

typedef struct {
// Scenario setup
uint8_t board_size; // 5x5, 7x7, 9x9 (like Go/Chess)
uint8_t num_entities; // Number of pieces/units on board (5-15)
uint8_t max_turns; // Scenario duration (5-10 turns)
// Complexity
uint8_t pattern_obscurity; // 0-100 (how hidden is winning pattern?)
uint8_t branching_factor; // 2-8 (how many valid moves per turn?)
// Scoring
uint16_t payout_if_solved;
uint8_t difficulty_multiplier; // Higher = more complex pattern recognition
} PatternRecognitionTemplate;
// Example: Corporate merger scenario
PatternRecognitionTemplate merger_scenario = {
.board_size = 7, // 7x7 board (49 positions)
.num_entities = 12, // 6 friendly units, 6 enemy units
.max_turns = 8,
.pattern_obscurity = 45, // Moderately hidden pattern
.branching_factor = 3, // 3 valid moves per turn on average
.payout = 300,
.difficulty_mult = 1.2
};

ADVERSARIAL WARGAME Contract:

typedef struct {
uint8_t scenario_type; // MILITARY, CORPORATE, POLITICAL
uint8_t player_side; // Which faction operator plays
uint8_t opponent_ai_level; // 1-5 (1=novice, 5=master)
uint8_t num_entities_player; // Units under operator's control
uint8_t num_entities_opponent; // AI opponent's units
uint16_t scenario_duration; // 20-60 turns
// Reward scaling
uint16_t payout_if_won;
uint8_t bonus_for_efficient_victory; // Extra bonus if won in fewer moves
} AdversarialWargameTemplate;
// Example: Corp takeover defense
AdversarialWargameTemplate corp_defense = {
.scenario_type = CORPORATE,
.player_side = DEFENDER,
.opponent_ai_level = 3, // Intermediate AI
.entities_player = 8,
.entities_opponent = 10,
.scenario_duration = 40,
.payout = 3000,
.bonus_efficient = 500
};

Example 1: PATTERN RECOGNITION — “Merger Triangle” (Threat 1)

  • Setup: Abstract 7x7 board. Six friendly units (circles), six enemy units (squares). Task: identify winning pattern in 8 turns.

  • Board State (Turn 0):

    1 2 3 4 5 6 7
    A ○ . . . . . □
    B . . . . . . .
    C . . ◆ . . . □
    D . . . ○ . . .
    E . . . . . . .
    F . . . . . ○ .
    G □ . . . . . ○
    Legend: ○ = friendly, □ = enemy, ◆ = control point (objective)
  • Gameplay:

    • Turns 1-5: Operator studies board. Each turn, presses INFO to “think” (no action taken). Cipher voice provides hints (“Three units in alignment control the center”).
    • Turn 6: Operator recognizes pattern: three friendly units can form triangle around central control point. Presses EVAL to execute move (C3 → C4).
    • Turns 7-8: Execute remaining moves to complete pattern.
  • Pattern Solved: Control point secured. Three units form defensive triangle. Enemy cannot break formation.

  • Outcome: 300¤ + rep +2. Learned: symmetry matters in tactical scenarios.

Example 2: ADVERSARIAL WARGAME — “Corporate Takeover Defense” (Threat 4)

  • Setup: Operator defends corporation against hostile takeover. 8 friendly units vs. 10 enemy units. 40 turns to execute defense strategy.

  • Scenario Architecture:

    • Phase 1 (Turns 1-10): Reconnaissance. Operator uses early turns to read enemy deployment, anticipate attack vectors.
    • Phase 2 (Turns 11-25): Tactical Positioning. Operator positions units to block acquisition routes, protect critical assets (finance, IP, comms).
    • Phase 3 (Turns 26-40): Counter-Offensive. Operator executes counter-takeover strategy, threatening enemy assets to force negotiation.
  • AI Opponent Behavior:

    • AI cycles through OODA-like loop: Observe (where are operator’s weaknesses?), Orient (which assets matter most?), Decide (where to attack?), Act (move units).
    • AI is slightly predictable at Threat 4 level. Expert operator can anticipate AI’s 2-3 move ahead.
  • Outcome: If operator wins: 3000¤ + rep +7. If operator loses: 0¤ + rep +2 (participation bonus, but loss stings). If operator wins before turn 30: +500¤ efficiency bonus.


SRAM Fields Modified by TAKEZO:

  • credit_balance — increased by pattern recognition and strategic victories
  • reputation — cumulative across all modules
  • cartridge_history[9] — TAKEZO completion flags
  • tactical_mastery (NEW 8-bit field) — cumulative victories. Unlocks advanced scenarios. Resets slowly (legacy stat).

Reputation Thresholds (TAKEZO Context):

  • Rep 0-4: NOVICE. PATTERN RECOGNITION contracts only. Cipher voice is patient instructor. “Patterns emerge when you slow down and observe.”
  • Rep 5-14: APPRENTICE. TACTICAL ANALYSIS available. Cipher becomes strategic guide. “Risk is measurable. Learn to quantify it.”
  • Rep 15-24: SPECIALIST. STRATEGIC PLANNING unlock. Cipher observant. “Deep play requires thinking several moves ahead. Few have the patience.”
  • Rep 25-34: MASTER. ADVERSARIAL WARGAME unlock. Cipher cryptic, equal. “You play like a strategist now. Meet others of your caliber.”
  • Rep 35+: LEGEND. MASTERY CHALLENGE. Cipher mystical, reverent. “You have become Takezo. You see the board as possibility, not pieces.”

With ICE BREAKER:

  • TACTICAL ANALYSIS of network intrusion scenarios. Player studies a “network board” and plans intrusion path. Then loads ICE BREAKER to execute.
  • Cross-module contract: “Plan & Execute” (analyze network structure in TAKEZO, then run ICE BREAKER mission).
  • Bonus: +200¤ if operator planned route perfectly matches execution path.

With DEPTHCHARGE:

  • Submarine tactical scenarios (opponent submarines maneuvering for depth advantage, sonar warfare, evasion patterns).
  • TAKEZO provides high-level strategy, DEPTHCHARGE provides real-time execution.
  • Bonus: Operator trained in TAKEZO reads DEPTHCHARGE sonar patterns 15% faster.

With SHELLFIRE:

  • Frequency spectrum wargames. Player and AI opponent broadcast on different frequencies, competing for spectrum dominance.
  • TAKEZO is turn-based thinking phase, SHELLFIRE is real-time execution phase.

With Black Ledger:

  • Financial scenario analysis. Operator studies hostile takeover scenarios (on TAKEZO), then audits financial data in BLACK LEDGER to verify intelligence.

Phase Architecture: TAKEZO missions are turn-based contemplative sequences. No real-time pressure. Player can take 30+ seconds per turn without penalty.

Example: “Cascading Defense + ICE BREAKER Execution” (3-phase, Threat 4)

MISSION BRIEFING:
Objective: Plan corporate takeover defense, then execute via network security
Cartridges: TAKEZO (planning), ICE BREAKER (execution, optional)
Phase sequence:
1. TAKEZO tactical analysis (20 turns, planning phase)
2. TAKEZO execution (15 turns, commitment phase)
3. ICE BREAKER live operation (validate plan, Hot Swap)
Estimated: 50 turns (1+ hour)
Payout: 2000¤ (TAKEZO) + 1500¤ (ICE BREAKER if swapped) = 3500¤
Rep gain: +8
PHASE 1 (TAKEZO PLANNING): Analyze enemy attack vectors (20 turns)
- Operator receives briefing: Hostile corporation preparing takeover. Must defend in 3-5 move sequences.
- Board setup: 7x7 grid. 8 friendly "assets" (IP, Finance, Comms, Executive Team, etc.). 10 enemy "acquisition" units.
- Turns 1-5: Reconnaissance phase. Operator presses INFO to read board state, anticipates enemy deployment.
- Turns 6-15: Planning phase. Operator commits units to positions. Each move = one EVAL press. No time pressure.
- Turns 16-20: Refinement phase. Operator reviews plan, makes final adjustments. Cipher voice evaluates robustness: "Your defense holds against 60% of predicted attack patterns. Strengthen the financial flank."
PHASE 2 (TAKEZO EXECUTION): Execute strategy under pressure (15 turns)
- AI opponent reveals full strategy. Now it's simultaneous move resolution (operator and AI alternate).
- Turns 1-7: Early exchanges. Operator's units hold lines. AI probes weaknesses.
- Turns 8-12: Major battle. Operator's plan either works (units repel acquisition) or cracks (AI breaks through).
- Turns 13-15: Resolution. If operator's plan is sound: takeover blocked. If not: partial success (some assets captured).
OUTCOME (Planning Phase):
If plan was sound (successfully defended): 2000¤ + rep +6.
If plan was partial (mixed results): 1200¤ + rep +3.
If plan failed: 400¤ + rep +1 (learning bonus).
PHASE 3 (ICE BREAKER HOT SWAP — Optional):
- Operator can now swap to ICE BREAKER to execute the network-level tactics.
- The tactical plan translates to network intrusion plan.
- ICE BREAKER contract mirrors TAKEZO board (same locations = same network nodes).
- If operator executes plan perfectly in ICE BREAKER: +500¤ bonus.

Tier 1: NOVICE (Rep 0-4)

  • Available: PATTERN RECOGNITION (Threat 1-2, small boards 5x5)
  • Capabilities: View full board state, think without time pressure, simple move validation
  • Audio feedback: Contemplative silence (with sparse koto notes on decision), success bell tone
  • Cipher voice: Patient instructor. “Take your time. Strategy rewards patience.”
  • Unlock: Complete PATTERN RECOGNITION Threat 1

Tier 2: APPRENTICE (Rep 5-14)

  • Available: TACTICAL ANALYSIS (Threat 2-3, 7x7 boards, adversarial scoring)
  • Capabilities: Risk/reward calculation (TAKEZO suggests move payoffs), multi-turn lookahead (see 2-3 moves ahead)
  • Audio feedback: Layered koto (more notes = more complex analysis), harmonics on commitment
  • Cipher voice: Tactical guide. “Every move has cost. Calculate before committing.”
  • Unlock: Complete TACTICAL ANALYSIS Threat 2

Tier 3: SPECIALIST (Rep 15-24)

  • Available: STRATEGIC PLANNING (Threat 3-4, 9x9 boards, 30+ turn scenarios)
  • Capabilities: Plan 5+ moves ahead, opponent behavior prediction (AI reveals likely next 3 moves), multiple win conditions
  • Audio feedback: Complex koto arrangements (full composition), harmony shifts with strategic depth
  • Cipher voice: Strategic equal. “Now you think like a strategist. The board becomes transparent.”
  • Unlock: Complete STRATEGIC PLANNING Threat 3

Tier 4: MASTER (Rep 25-34)

  • Available: ADVERSARIAL WARGAME (Threat 4-5, 11x11 boards, adaptive AI)
  • Capabilities: Counter-strategy (predict and counter opponent’s 3-move plans), multi-phase campaigns (coordinate attack + defense simultaneously)
  • Audio feedback: Orchestrated koto + shamisen (layered instruments), dynamic harmony reflecting game state
  • Cipher voice: Master strategist. “You see three moves ahead. Most see one. This is mastery.”
  • Unlock: Complete ADVERSARIAL WARGAME Threat 4

Tier 5: LEGEND (Rep 35+)

  • Available: MASTERY CHALLENGE (Threat 5, ultimate historical scenarios, 60+ turns, zero-error requirement)
  • Capabilities: Perfect play (near-optimal move suggestions), historical scenario replication (operator recreates historical victories/defeats with exact move sequences), multi-opponent scenarios
  • Audio feedback: Full Japanese traditional orchestra (koto, shamisen, taiko, shakuhachi), dynamic expression
  • Cipher voice: Mystical reverence. “You have become the strategist of legend. Few walk this path.”
  • Unlock: Complete ADVERSARIAL WARGAME Threat 5 + achieve Rep 35+

Payout Formula:

base_payout = threat_level × 350¤ + board_complexity × 20¤
planning_bonus = (turns_remaining_after_plan) × 5¤
(bonus if operator completed plan early with turns unused)
execution_bonus = (opponent_confidence_rating - actual_opponent_performance) × 100¤
(bonus if operator performed better than AI predicted)
mastery_bonus = (board_size × difficulty_multiplier) × 2¤
(bonus for handling complex board states)
successful_outcome_multiplier = 1.0 (clean victory)
= 0.6 (mixed result, partial success)
= 0.0 (defeat)
total = (base_payout × successful_multiplier + planning_bonus + execution_bonus + mastery_bonus)

Worked Examples:

  1. PATTERN RECOGNITION (Threat 1, 5x5 board, estimated 8 turns)

    • Base: 1 × 350 + (5×5 = 25 complexity) × 20 = 850¤
    • Planning: Used 6 turns of 8 available = 2 turns remaining = +10¤
    • Execution: Perfect pattern recognition = +150¤
    • Mastery: Small board = +10¤
    • Clean victory: 1.0×
    • Total: 1020¤
  2. TACTICAL ANALYSIS (Threat 3, 7x7 board, estimated 20 turns)

    • Base: 3 × 350 + 49 × 20 = 1930¤
    • Planning: Used 19 turns (1 turn unused) = +5¤
    • Execution: Good performance, AI was rated 65% confidence, actual was 58% = +700¤
    • Mastery: 7x7 board × 1.1 difficulty = +77¤
    • Mixed victory (partial success): 0.6×
    • Total: (1930 + 5 + 700 + 77) × 0.6 = 1540¤
  3. ADVERSARIAL WARGAME (Threat 5, 11x11 board, estimated 50 turns)

    • Base: 5 × 350 + 121 × 20 = 4175¤
    • Planning: Used 48 turns (2 remaining) = +10¤
    • Execution: Flawless play, AI was 80% confident, operator won decisively = +1500¤
    • Mastery: 11x11 board × 1.5 difficulty = +165¤
    • Clean victory: 1.0×
    • Total: 4175 + 10 + 1500 + 165 = 5850¤

Single Session (60+ min, Threat 4 ADVERSARIAL WARGAME):

MINUTE 0:00 — Boot and scenario selection
- TAKEZO cartridge loads. Kōji Interactive loading screen (3.5s).
- Mission board shows 3 wargame scenarios (Threat 3-4).
- Operator selects "Corporate Takeover Defense" (est. 50 turns, 3000¤).
MINUTE 1:00 — Scenario briefing
- Cipher voice: "Hostile acquisition in progress. Nine moves until they control majority shares.
You have seven defensive units. Deploy strategically. Think three moves ahead."
- Board displayed: 7x7 grid. Operator's assets positioned. Enemy acquisition units shown.
MINUTE 2:00 — PHASE 1: Planning (20 turns, estimated 30 minutes)
- Turns 1-5: Study phase. Operator presses INFO each turn to read board state.
- Turn 1: "Finance sector is vulnerable. Strengthen with legal team."
- Turn 2: "IP assets protected. Comms center is secondary objective."
- Turn 3: "Executive team cannot be moved; defend in place."
- Turns 6-10: First line of defense. Operator commits units to block key acquisition vectors. Presses EVAL to place units.
- Each placement: Cipher voice confirms placement and shows risk score ("Finance defense: 85% hold probability").
- Turns 11-15: Secondary strategy. Operator anticipates AI counter-moves (AI is transparent about likely next moves).
- Operator positions units to counter AI's anticipated attacks.
- Turns 16-20: Refinement. Operator reviews complete plan. Presses INFO to see Cipher's evaluation.
- Cipher voice: "Your defense is solid against 70% of attack patterns. The financial sector remains weak. Consider reinforcement."
- Operator adjusts Finance position (move unit from comms to finance).
- Cipher re-evaluates: "Revised defense: 78% overall hold probability."
MINUTE 32:00 — PHASE 2: Execution (15 turns, estimated 20 minutes)
- AI opponent reveals full strategy. Wargame begins.
- Turns 1-5: Opening moves. AI probes operator's defense, looking for weaknesses.
- Operator's units hold line. AI doesn't find easy breaches.
- Turns 6-10: Major attack on Finance (as Cipher predicted). Operator's reinforced Finance sector holds.
- But IP sector is now lightly defended. AI pivots.
- Turns 11-15: Final exchanges. Operator's strategy either works (blocks takeover) or fails (partial success).
- Outcome: Operator's plan was sound. AI takeover blocked. "ACQUISITION DEFENSE SUCCESSFUL."
MINUTE 52:00 — Debrief and analysis
- Payout calculation:
- Base: 4 × 350 + 49 × 20 = 2380¤
- Planning: 18 turns used of 20 = +10¤
- Execution: Perfect defense, AI rated 70% confidence = +1200¤
- Mastery: 7x7 × 1.3 difficulty = +91¤
- Clean victory: 1.0×
- **Total: 3681¤**
- Reputation: +7 (Threat 4)
- Cipher voice: "That was masterful. You anticipated their third-order moves and countered them. Few reach this level."
MINUTE 60:00 — Optional: Hot Swap to ICE BREAKER
- Operator decides to practice the "Plan & Execute" cross-module challenge.
- Loads ICE BREAKER. The takeover defense board translates to a network topology.
- Operator must now execute the same strategic plan in real-time ICE BREAKER intrusion.
- Execution: Navigates network nodes matching TAKEZO plan. If execution mirrors plan perfectly: +500¤ bonus.

Domain-specific vocabulary:

  • PATTERN, SYMMETRY, THREAT_VECTOR, RISK_ASSESSMENT
  • BOARD_STATE, UNIT_DEPLOYMENT, ACQUISITION_ROUTE
  • MULTI_MOVE_LOOKAHEAD, OPPONENT_PREDICTION, STRATEGIC_DEPTH
  • WARGAME, ADVERSARIAL_ANALYSIS, MASTERY_PLAY

Cipher Voice Examples:

  1. On Load (Rep 5, APPRENTICE):

    “Takezo strategic analysis systems active. A board awaits your study. Remember: take time to think. Strategy is the domain of patience, not speed.”

  2. During Planning (Rep 10, encountering complex position):

    “This board has seven possible winning patterns. Three require sacrifice of key assets. Which line do you pursue? The board is your mirror—study it.”

  3. Anticipating Opponent (Rep 20, SPECIALIST, analyzing AI opponent):

    “Your opponent will attack Finance in three moves. They don’t know you see them. Plan your counter now.”

  4. Error/Failure (Rep 15, SPECIALIST, plan fails):

    “Your strategy was sound, but execution faltered. The board teaches through defeat. Study this loss. Next time, you’ll see the error before it happens.”

  5. Success Debrief (Rep 25, MASTER, flawless victory):

    “Perfect play. You anticipated three moves ahead and positioned every unit exactly where it needed to be. This is what mastery looks like.”

  6. High-Rep Mystical (Rep 35+, LEGEND, during ultimate mastery challenge):

    “You don’t see the pieces anymore. You see the spaces between them. You’ve become Takezo. Few ever reach this understanding.”

  7. Ambient Commentary (Rep 20, studying board for 5 turns without acting):

    “Patience. You’re seeing the position clearly now. When you move, it will be with purpose.”

  8. Warning (Rep 25, MASTER, about to make strategic error):

    “That move weakens your secondary line. The opponent will exploit it. Are you certain? Or do you see something I don’t?“


/* ========== BOARD STATE CELL ========== */
CELL_DEFINE(BoardCell) {
CellBase base;
uint8_t board_size; // 5, 7, 9, 11 (board size)
uint8_t *board_state; // Flattened board (size²)
CellList* units_player; // Operator's units
CellList* units_opponent; // AI opponent units
uint16_t turn_number;
uint16_t max_turns;
uint8_t phase; // PLANNING, EXECUTION
ON_CAR {
/* Drill into unit or position detail */
CellBase *selected = list_get(units_player, current_selection);
drill_into(selected);
}
ON_CDR {
/* Navigate board: arrow keys move cursor (change selected position) */
uint16_t new_position = cursor_move(nav_input);
display_position_info(new_position);
}
ON_EVAL {
/* Commit unit move or pass turn */
if (phase == PLANNING) {
unit_placement_commit();
turn_advance();
} else if (phase == EXECUTION) {
execute_move();
opponent_response();
turn_advance();
}
}
ON_INFO {
/* Detailed board analysis: show risk assessment, win conditions */
display_risk_heatmap(self);
voice_output("Turn: %d/%d. Your units: %d. Opponent: %d. Overall hold probability: %d percent.",
self->turn_number, self->max_turns,
self->units_player->length, self->units_opponent->length,
calculate_hold_probability(self));
}
};
/* ========== UNIT CELL ========== */
CELL_DEFINE(UnitCell) {
CellBase base;
uint8_t unit_type; // FINANCE, IP, COMMS, EXECUTIVE, MILITARY, etc.
uint16_t position; // Board position (x, y flattened)
uint8_t health; // 0-100 (can be damaged)
uint8_t threat_level; // How much threatened by opponent
uint8_t strategic_value; // How important this unit is
ON_CAR {
/* Drill into unit detail screen (movement options, stats) */
drill_into(unit_detail);
}
ON_EVAL {
/* Move unit (during planning) or engage (during execution) */
if (planning_phase) {
show_movement_options(self);
} else {
engage_opponent(self);
}
}
ON_INFO {
/* Show unit stats: type, health, threat assessment */
display_unit_profile(self);
voice_output("Unit: %s. Health: %d/100. Strategic value: %d. Current threat: %d.",
unit_type_name(self->unit_type), self->health,
self->strategic_value, self->threat_level);
}
};
/* ========== MOVE SUGGESTION CELL ========== */
CELL_DEFINE(SuggestedMoveCell) {
CellBase base;
uint8_t suggested_unit; // Which unit to move
uint16_t suggested_position; // Where to move it
uint16_t expected_outcome; // Predicted success rate (0-100)
char* tactical_reasoning; // Why Cipher suggests this move
ON_CAR {
/* Examine suggestion details */
drill_into(move_analysis);
}
ON_EVAL {
/* Accept suggestion and commit move */
accept_suggestion(self);
unit_move_execute();
}
ON_INFO {
/* Show full tactical breakdown */
display_move_analysis(self);
voice_output("Recommended: %s. Expected outcome: %d percent hold probability. "
"Reasoning: %s",
move_description(self), self->expected_outcome,
self->tactical_reasoning);
}
};
/* ========== COMPOSITION EXAMPLE ========== */
CellList *takezo_create_mission(PatternRecognitionTemplate *template) {
CellList *mission = list_create();
BoardCell *board = cell_create(BoardCell);
board->board_size = template->board_size;
board->board_state = malloc(template->board_size * template->board_size);
board->units_player = list_create();
board->units_opponent = list_create();
board->turn_number = 0;
board->max_turns = template->max_turns;
board->phase = PLANNING;
/* Populate board with starting units */
for (int i = 0; i < template->num_entities / 2; i++) {
UnitCell *friendly = cell_create(UnitCell);
friendly->unit_type = FRIENDLY;
friendly->position = random_friendly_start_position();
list_push(board->units_player, (CellBase *)friendly);
UnitCell *enemy = cell_create(UnitCell);
enemy->unit_type = ENEMY;
enemy->position = random_enemy_start_position();
list_push(board->units_opponent, (CellBase *)enemy);
}
list_push(mission, (CellBase *)board);
return mission;
}

YM2149 Voice Assignments:

  • Voice 1: STRATEGIC DEPTH. Single koto note at base frequency (C3, 131Hz). Note sustains, pitch rises as operator’s strategic depth increases. At turn 20+: Voice 1 shifts to harmony (adding overtones).

  • Voice 2: TACTICAL COMMITMENT. Sparse koto plucks. Each EVAL press = koto note (different pitch per decision). Melodies emerge from operator’s decisions (signature of their strategy style).

  • Voice 3: OPPONENT PRESENCE. Shamisen (2-string Japanese lute). Subtle initially. Grows louder during execution phase as opponent makes moves. Conveys threat.

Key Audio Events:

EventVoiceFrequencyDurationMeaning
Move Commitment2Koto pluck (varying)0.4sUnit move accepted
Turn Advance1Fundamental rises 1 semitone0.6sOne turn passed
Planning Phase Complete1+2Chord resolution (harmonious)1.2sPlan finalized
Opponent Move3Shamisen pluck (threat pitch)0.5sAI opponent acts
VictoryAllTriumphant arpeggio (full composition)2.0sStrategic victory
DefeatAllDescending, minor key resolution2.0sStrategic loss
Strategic Insight1Sudden pitch jump (recognition)0.7sOperator sees key pattern
Silence (Deep Thought)MuteN/AN/APlayer in contemplative mode

Asymmetric Roles:

Two decks running TAKEZO engage in live wargames (real-time adversarial play):

  1. Simultaneous Strategy: Both operators plan for 10 turns (silent, no communication), then execute simultaneously. Both reveal strategies at same moment.

  2. Alternating Play: One operator plays as commander; other as opponent. Real-time strategic duel (each turn takes ~30s, back-and-forth).

Worked Example:

SCENARIO: "Corporate Wargame Duel"
Operator A: Defender (protecting corporation)
Operator B: Attacker (executing hostile takeover)
Link: UART, 100ms turn sync
Duration: 30 turns (1 hour)
Payouts: Winner = 3500¤. Loser = 1500¤.
MINUTE 0:00 — START
Both operators see same 9x9 board. A is "south" (defender), B is "north" (attacker).
A has 10 defensive units. B has 12 acquisition units.
MINUTE 0:00-10:00 — PLANNING (10 turns each)
A: Plans defense. Studies board. Positions units to block B's acquisition routes.
B: Plans attack. Simultaneously, B plans three assault vectors.
Link carries no information during planning (silent, asynchronous).
MINUTE 10:00 — EXECUTION BEGINS
Both operators commit to execution phase. Game becomes synchronous.
MINUTE 10:00-40:00 — REAL-TIME DUEL (20 turns, 30s per turn)
Turn 1: A makes first move (positions financial defense). Link sends A's move to B.
Turn 1: B sees A's move. B responds with first attack vector.
Turn 2: A sees B's attack. A adjusts defense or counter-attacks.
[... back-and-forth continues ...]
Turn 20: Final position reached.
MINUTE 40:00 — RESOLUTION
If A successfully blocked all B's acquisition vectors: A wins. 3500¤. B: 1500¤.
If B broke through and secured control: B wins. 3500¤. A: 1500¤.
If outcome is mixed: Both get 2200¤. Honorable draw.
OPTIONAL: Cross-cartridge wargame
A: Plays TAKEZO defense, then swaps to ICE BREAKER to defend network-level intrusions.
B: Plays TAKEZO attack, then swaps to ICE BREAKER to execute network hacking.
Result: Strategic layer + tactical layer integrated.

Three Operations modules designed to match ICE BREAKER’s depth:

  • DEPTHCHARGE: Contemplative, sonar-based, pressure-driven. OODA loop is slow (listening), tight feedback loops (pressure).
  • SHELLFIRE: Real-time, frequency-based, jamming-driven. OODA loop is fast (lock-extract-evade), multi-agent confusion.
  • TAKEZO: Turn-based, pattern-based, strategic. OODA loop is patient (plan-commit-execute), zero real-time pressure.

Each module:

  • Has 5 contract types spanning Threat 1-5
  • Features deep cross-module interactions with ICE BREAKER, BLACK LEDGER, NEONGRID, and each other
  • Includes full OODA-loop design, sound design as information, and emergent gameplay through system collision
  • Provides 100+ hours of gameplay per cartridge (single cartridge complete experience)
  • Uses unique YM2149 voice orchestration as primary information channel
  • Fits the 1988 cyberpunk fiction layer seamlessly

All three are ready for implementation in the C11 capability model framework.