KN-86 Deckline — Operations Modules Specification
DEPTHCHARGE, SHELLFIRE, TAKEZO
Section titled “DEPTHCHARGE, SHELLFIRE, TAKEZO”Document Version: 1.0
Date: 2026-04-11
Context: Three capability modules designed to match ICE BREAKER gameplay depth and philosophical approach to sound, OODA loops, and cross-module integration.
CIPHER-LINE revision note (2026-04-24): Every “Cipher voice” quotation in this spec renders on the CIPHER-LINE OLED above the keyboard, not the main 80×25 grid. Full-sentence Cipher examples are illustrative of beat intent; the actual CIPHER-LINE rendering is clipped fragments. For authoritative vocabulary/productions/biases per module, see the standalone gameplay specs (Depthcharge, Shellfire, Takezo) and
docs/software/runtime/cipher-voice.md.
MODULE 1: DEPTHCHARGE — MARITIME RECONNAISSANCE
Section titled “MODULE 1: DEPTHCHARGE — MARITIME RECONNAISSANCE”1.1 Module Identity
Section titled “1.1 Module Identity”Designation: DEPTHCHARGE (Module Class 0x4D = Maritime)
Publisher: Cascade Softworks (Seattle, WA)
Profile: Autonomous submersible pilot and deep-water reconnaissance specialist
Operator Role: Drone pilot commanding acoustic sensing operations, depth management, evasion, salvage recovery
Deck State Signature: Cartridge History bit 6 (DEPTHCHARGE completion status)
Loading Screen:
[5-SECOND BOOT SEQUENCE]
Visual: Black screen. A waveform oscillates left-to-right (green phosphor). Waveform grows more complex. Echoes appear below the primary wave. Text assembles line-by-line:
CASCADE SOFTWORKS DEPTHCHARGE™ SONAR SUITE [INITIALIZING DEPTH PROTOCOLS]
The waveform resolves into a sonar ping pattern. Three concentric circles bloom outward from center. Text fades.
Audio: Starts: 440Hz sine wave (clean calibration tone). Transition (1.5s): Overlaid with a single sonar ping (160Hz click, followed by 200ms decay tail). Ping repeats 3x. Sustain (2.5s): Underwater ambient sound — distant whale vocalization (very low frequency, barely audible), mixed with microbubble crackle. Professional, maritime, alien. Ending (0.5s): Ping rises to 480Hz (ready state). Clean fade to silence.
Timing: Total 5.0 seconds. Calm, deliberate. No urgency. Confidence in depth.
Design Intent: "You are going deeper. This will take time. The ocean listens."1.2 Mission Template Architecture
Section titled “1.2 Mission Template Architecture”Contract Classes
Section titled “Contract Classes”| Type | Description | Threat | Base Payout | Phases | Rep Unlock |
|---|---|---|---|---|---|
| SALVAGE DIVE | Recover lost equipment/data from wreck | 1-3 | 300-1200¤ | 2-3 | Rep 0+ |
| RELAY ACCESS | Navigate to underwater relay station, dock silently | 2-4 | 600-2200¤ | 2-3 | Rep 5+ |
| EVASION RUN | Flee pursuing hunter submarine, reach safe depth | 3-5 | 1500-3500¤ | 2-4 | Rep 15+ |
| ACOUSTIC INTELLIGENCE | Map enemy sonar signatures, record and extract | 2-4 | 800-2400¤ | 3 | Rep 10+ |
| DEEP SALVAGE | Access crashed corporate submersible, extract cargo | 4-5 | 3000-5000¤ | 3-4 | Rep 25+ |
Template Structures
Section titled “Template Structures”SALVAGE DIVE Contract:
typedef struct { // Wreck location uint16_t depth_target; // 200-800m (in game units) uint8_t wreck_integrity; // 0-100 (affects navigation difficulty) uint16_t cargo_mass; // Weight affects ascent speed (pressure mechanic) uint8_t acoustic_signature; // 0-255 (how visible this wreck is to hunter)
// Threat parameters uint8_t ambient_predators; // 0-3 (wildlife encounters) uint8_t hunter_presence; // 0-255 threshold for hunter spawn
// Reward uint16_t base_payout; uint8_t cargo_type; // TECH, DATA, PRECIOUS_METAL, BIOTECH} SalvageTemplate;
// Example: Corporate R&D Submersible lost in Mariana Trench (deep salvage scenario)SalvageTemplate mariana_rd = { .depth_target = 750, .wreck_integrity = 45, // Heavily damaged, unstable .cargo_mass = 150, // Heavy R&D equipment .acoustic_sig = 180, // Loud wreck (resonance/creaks) .predators = 2, // Some deep-sea creatures .hunter_spawn = 200, // Hunter will arrive if trace > 200 .payout = 4800, .cargo_type = BIOTECH};RELAY ACCESS Contract:
typedef struct { uint16_t relay_depth; // 100-600m uint16_t approach_distance; // How far from relay before docking (0-200m) uint8_t relay_defenses; // 0-255 (sonar countermeasures, acoustic mines) uint8_t silence_requirement; // Max acoustic signature allowed (0-50 for stealth) uint16_t data_payload_size; // Credits extraction potential uint8_t encryption_depth; // 0-4 (requires ICE BREAKER swap to decrypt)} RelayTemplate;
// Example: Corporate financial relay stationRelayTemplate finance_relay = { .relay_depth = 280, .approach_dist = 80, // 80m out; long silent approach needed .defenses = 120, // Hydrophone arrays, active countermeasures .silence_req = 25, // Acoustic signature must stay < 25 (pressure!) .payload_size = 2200, .encryption = 3};Worked Examples
Section titled “Worked Examples”Example 1: SALVAGE DIVE — “Cascade Failure” (Threat 2)
- Setup: Autonomous research submersible sank 6 months ago. Carrying sensor arrays worth credits. Wreck at 350m depth. Trace of old sonar scans still present (makes location easier to find, harder to access secretly).
- Phases:
- Navigate to wreck (15 turns): Descend to 350m. Acoustic signature accumulates (1 per turn). At turn 10, ambient whale sounds (not threat, just noise). Sonar map reveals wreck position.
- Extract cargo (10 turns): Approach wreck. Cargo is loose; extraction requires careful maneuvering. Each turn of extraction, pressure increases. At turn 8, a predator shark appears (ambient threat, not ICE). Choose to engage or evade.
- Ascend and egress (12 turns): Return to safe depth (0m, surface). Ascent rate is limited by pressure (can’t rise faster than 2 depth units/turn without decompression penalty). Trace may spike if moving too fast.
- Outcome: If successful: 750¤ + rep +3. If predator encounters: 550¤ + rep +2 (slower escape). If pressure incident: fail, lose cargo, return to surface damaged.
Example 2: RELAY ACCESS — “Zaibatsu Wire Transfer” (Threat 4)
- Setup: Enemy corporate relay at 250m depth. Heavily defended sonar nets. Need to dock silently, extract 3500¤ in financial data, escape without triggering security.
- Phases:
- Silent approach (20 turns): Must keep acoustic signature below 20 (extreme stealth). Each navigation choice: fast (loud, 4 sig/turn) or slow (quiet, 1 sig/turn). Pressure decision every 5 turns.
- Dock and access (8 turns): Physical docking procedure. Sonar ping from dock triggers relay alarm if acoustics are too hot. Each turn, pressure increases. At turn 6, hydrophones detect your position. Must decide: continue extraction or abort.
- Emergency egress (12 turns): Security lock closes. Submarine now at 250m with alarms blaring. Must ascend to surface while evading hunter submarine. Pressure limit makes fast ascent risky.
- Outcome: Success at silence: 3500¤ + rep +6. Partial extraction: 2000¤ + rep +3. Caught: 0¤ + rep -2 + acoustic signature lingers for next mission.
1.3 Deck State Integration
Section titled “1.3 Deck State Integration”SRAM Fields Modified by DEPTHCHARGE:
credit_balance— increased by salvage/relay payouts (400-3500¤ per contract)reputation— increased by successful dives (+3 to +8)cartridge_history[6]— DEPTHCHARGE completion flags (0=never, 1=loaded, 2=completed easy, 4=completed hard)acoustic_signature(NEW 8-bit field) — lingers after dives, affects hunter spawn rates in future DEPTHCHARGE missions
Reputation Thresholds (DEPTHCHARGE Context):
- Rep 0-4: NOVICE. Threat 1-2 contracts only. Cipher voice is instructive. “Watch your depth gauge. Pressure builds slowly.”
- Rep 5-14: APPRENTICE. Threat 2-3 available. Cipher tone shifts to tactical. “Approaching crush depth. Manage your ascent.”
- Rep 15-24: SPECIALIST. Threat 3-4 available. Cipher becomes cryptic. “The depths remember what you’ve done. Proceed carefully.”
- Rep 25-34: MASTER. Threat 4-5 available. High-value deep salvage ops unlock. Cipher speaks as equal. “You’ve learned to listen.”
- Rep 35+: LEGEND. Exclusive contracts (DEEP SALVAGE, HUNTER INTERCEPT). Cipher becomes poetic. “The abyss sends regards.”
New Hidden Stat: Acoustic Signature
- Persists across DEPTHCHARGE missions
- Starts at 0, increases by 1-3 per contract depending on stealth/noise
- When > 150, hunter submarines spawn 25% earlier in next mission
- When > 200, hunter spawns automatically at mission start
- Resets slowly: -5 per real-time day of non-DEPTHCHARGE play
- Operator can attempt “Silent Recon” contracts to intentionally flush signature (risky, no payout, but resets faster)
1.4 Cross-Module Interactions
Section titled “1.4 Cross-Module Interactions”With ICE BREAKER (Primary Integration):
- DEPTHCHARGE sonar reveals encrypted relay ICE class/depth before ICE BREAKER intrusion attempt
- RELAY ACCESS phase 2 can be ICE BREAKER hacking (unlock via Hot Swap)
- Encrypted underwater communication nodes become accessible with both cartridges
- Example: DEPTHCHARGE maps relay at 350m, sonar shows “ICE-defended relay.” Operator swaps to ICE BREAKER, uses CRACK on network intrusion phase. Payout shared: DEPTHCHARGE 600¤ (phase 1) + ICE BREAKER 900¤ (phase 2).
With BLACK LEDGER (Financial):
- Underwater “shell account” networks exist. BLACK LEDGER + DEPTHCHARGE unlock DEEP AUDIT contracts
- DEPTHCHARGE navigates to submarine account physical location; BLACK LEDGER audits the transaction trail
- Cross-module bonus: +200¤ if both cartridges used in same multi-phase contract
- Operator with both cartridges can trace money movements that physically move (offshore shell networks accessed via submersible drones)
With NEONGRID (Spatial):
- NEONGRID’s mapping interface visualizes DEPTHCHARGE sonar returns as spatial grids
- Operator trained in NEONGRID “reads” sonar patterns faster (reduces OBSERVE phase time by 10%)
- Shared contracts: underwater network mapping (NEONGRID provides grid, DEPTHCHARGE provides sonar truth)
Cartridge History Interactions:
- If ICE BREAKER in history: RELAY ACCESS contracts gain phase 2 (ICE-defended relays)
- If BLACK LEDGER in history: ACOUSTIC INTELLIGENCE contracts gain phase 3 (financial routing of intercepted data)
- If NEONGRID in history: wreck navigation is 10% faster (spatial intuition carries over)
- Each loaded cartridge in history adds context to Cipher voice (different tone, more specific tactical advice)
1.5 Multi-Phase Mission Design
Section titled “1.5 Multi-Phase Mission Design”Phase Architecture: DEPTHCHARGE missions are depth-dependent sequences. Each phase takes operator deeper, accumulating acoustic signature and pressure.
Phase 1: DESCENT & NAVIGATION — Locate target, manage depth, control acoustic signature
Phase 2: ENGAGEMENT — Dock, extract, or engage (may Hot Swap to ICE BREAKER)
Phase 3: ASCENT & EVASION — Return to surface, manage pressure limits, evade hunters
Example Multi-Phase: “Cascade Salvage + Financial Audit” (3-phase, Threat 4)
MISSION BRIEFING: Objective: Salvage R&D submersible (depth 500m) AND extract financial records Cartridges available: DEPTHCHARGE, BLACK LEDGER (optional: ICE BREAKER for relay) Phase sequence: DEPTHCHARGE phase 1 → DEPTHCHARGE phase 2 + BLACK LEDGER phase 2 → DEPTHCHARGE phase 3 Estimated duration: 18 turns Payout: 2400¤ (DEPTHCHARGE) + 1200¤ (BLACK LEDGER) = 3600¤ total Rep gain: +6 (both cartridges)
PHASE 1 (DEPTHCHARGE DESCENT): Navigate to 500m, locate wreck via sonar - Turns 1-6: Silent descent (acoustic sig + 1/turn). Navigation choices. - Turn 7: Whale vocalization (ambient). No threat, but masks sonar clarity. - Turn 8: Wreck detected. Acoustic signature now +2/turn (wreck resonance increases visibility). - Turns 9-14: Final approach. At turn 12, predator encountered (evade with cost, or ignore). - Outcome: Wreck located, acoustic signature +8, pressure gauge at 85%.
PHASE 2A (DEPTHCHARGE ENGAGEMENT): Dock and extract submersible data - Turns 1-4: Physical dock maneuver (pressure: +3/turn as submarine contacts wreck). - Turn 5: Cargo breached. Data extraction begins. - Turns 6-8: Extract financial ledgers from submersible server. - Turn 9: Decision point: attempt BLACK LEDGER swap for financial analysis (if cartridge available).
PHASE 2B (BLACK LEDGER — OPTIONAL HOT SWAP): - Turns 1-3: Financial routing. Trace the money's origin to corporate account. - Turn 4: Account access secured. Bonus payout +400¤. - Outcome: Now holding both salvaged hardware AND traced financial data.
PHASE 3 (DEPTHCHARGE ASCENT & EVASION): Return to surface, manage pressure, evade hunter - Turns 1-6: Ascent from 500m to 250m (pressure: -2/turn, safe ascent rate). - Turn 7: Hunter submarine detected (acoustic signature now visible to enemies). Escape tempo increases. - Turns 8-12: Fast ascent from 250m to 0m (pressure: -4/turn, risky but necessary). Acoustic signature peaks. - Turn 13: Surface reached. Safety. Hunter still 50m behind. - Outcome: Successful extraction. Acoustic signature +12 (lingers, affects future missions).
TOTAL PAYOUT: 3600¤ base + 200¤ cross-module bonus = 3800¤REPUTATION GAIN: +6ACOUSTIC SIGNATURE: +12 (operator is now "hot"; next DEPTHCHARGE mission has 30% hunter spawn risk)Example 2: “Evasion + Relay + ICE BREAKER Hack” (4-phase, Threat 5)
MISSION BRIEFING: Objective: Escape pursuing hunter submarine. During escape, access underwater relay for data extraction. Cartridges: DEPTHCHARGE (primary), ICE BREAKER (phase 2 swap) Phase sequence: 1. DEPTHCHARGE evasion (20 turns) 2. DEPTHCHARGE relay approach (12 turns) 3. ICE BREAKER relay hack (8 turns, Hot Swap) 4. DEPTHCHARGE final escape (15 turns) Estimated: 55 turns (33 min play) Payout: 2500¤ (evasion) + 1500¤ (relay) = 4000¤ Rep gain: +8 (Threat 5)
PHASE 1 (EVASION — 20 turns): Hunter submarine chasing at depth 200m - Turns 1-5: Deep dive to 400m (escape). Pressure mounting. Acoustic signature +2/turn (desperation). - Turn 6: Hunter loses sonar contact (you're deeper than their effective range). Threat level drops. - Turns 7-15: Navigate evasion course (3 choice points). Navigate around underwater mountains (natural cover). - Turn 16: Hunter re-acquires sonar (you were too loud). Chase resumes. - Turns 17-20: Final push to relay station (safe harbor). Acoustic signature maxed at +50.
PHASE 2 (RELAY APPROACH — 12 turns): Dock at relay station at 280m depth - Turns 1-8: Silent approach. Acoustic signature now MUST drop to <30 or relay defenses trigger. - Turn 9: Relay proximity. Decide: fast dock (loud, 4 turns) or stealth dock (quiet, 8 turns). - If stealth chosen: Turns 10-12 are tension-filled silence. Hunter now 100m away. Close. - Relay docking sequence triggers. Physical dock begins.
PHASE 3 (ICE BREAKER RELAY HACK — Hot Swap, 8 turns): - Cartridge swap. ICE BREAKER loads. Scoped capability: relay network access only. - Turns 1-3: Identify relay encryption (depth 2, moderate). - Turns 4-6: Apply CRACK tool to relay security. Alarms sound (but hunter doesn't detect network intrusion). - Turns 7-8: Extract encrypted data. Financial records aboard relay. - Swap back to DEPTHCHARGE. Hunter now at relay entrance, chasing tactically.
PHASE 4 (FINAL ESCAPE — 15 turns): Eject from relay, sprint to safe depth - Turns 1-5: Violent ascent (pressure: -5/turn, dangerous but necessary). Acoustic signature screaming. - Turn 6: Break surface. Hunter submarine cannot surface chase (water pressure limits). - Turns 7-15: Navigate to safe harbor. Hunter breaks off (too shallow now). - Mission complete. Extraction successful.
TOTAL PAYOUT: 4000¤REPUTATION GAIN: +8 (Threat 5 contract)ACOUSTIC SIGNATURE: +25 (extremely hot; next mission at 60% hunter spawn risk)NOTE: Operator learned multi-cartridge synchronization. Reputation now unlocks DEEP SALVAGE contracts.1.6 Capability Progression (5 Tiers)
Section titled “1.6 Capability Progression (5 Tiers)”Tier 1: NOVICE (Rep 0-4)
- Available contracts: SALVAGE DIVE (Threat 1-2)
- Capabilities unlocked: Basic sonar (ping-return distance only), depth gauge (visual indicator), basic ascent management
- Audio feedback: Simple beeps (sonar pings), warning tones (pressure approaching limit)
- Cipher voice: Instructive, warm. “Take your time. The ocean is patient.”
- Typical session: 15 min, single-phase 300¤ contract
- Unlock condition: Complete SALVAGE DIVE Threat 1 (guaranteed success path)
Tier 2: APPRENTICE (Rep 5-14)
- Available contracts: RELAY ACCESS (Threat 2), ACOUSTIC INTELLIGENCE (Threat 2)
- Capabilities unlocked: Sonar returns show ICE class, encryption depth; pressure management becomes critical (fast ascent risks system damage)
- Audio feedback: Layered tones (sonar + pressure warning), predator sounds (whale, shark)
- Cipher voice: Observant, cautionary. “Pressure is building. Manage your ascent carefully.”
- Typical session: 25 min, 2-phase 1200¤ contract
- Unlock condition: Complete RELAY ACCESS Threat 2
Tier 3: SPECIALIST (Rep 15-24)
- Available contracts: EVASION RUN (Threat 3), ACOUSTIC INTELLIGENCE (Threat 3-4)
- Capabilities unlocked: Hunter sonar signature recognition (can identify hunter sub type), silent running mode (reduce acoustic signature at cost of speed)
- Audio feedback: Complex sonar returns (harmonics reveal ICE variants), hunter sub engine sounds (distinct from environment)
- Cipher voice: Cryptic, tactical. “The depths remember what you’ve done. Other submarines are listening.”
- Typical session: 35 min, 3-phase 2200¤ contract with possible Hot Swap
- Unlock condition: Complete EVASION RUN Threat 3
Tier 4: MASTER (Rep 25-34)
- Available contracts: DEEP SALVAGE (Threat 4-5), HUNTER INTERCEPT (Threat 5, NEW)
- Capabilities unlocked: Predict hunter spawn locations using acoustic signature analysis, dual-sonar mode (listen to two frequencies simultaneously)
- Audio feedback: Advanced sonar reveals node topology (ICE BREAKER contracts now show underwater relay architecture to DEPTHCHARGE)
- Cipher voice: Equals, philosophical. “You’ve learned the language of the deep. Use it wisely.”
- Typical session: 45 min, 4-phase 3500¤ contract with multi-cartridge Hot Swaps
- Unlock condition: Complete DEEP SALVAGE Threat 4
Tier 5: LEGEND (Rep 35+)
- Available contracts: LEVIATHAN HUNT (Threat 5, ultimate), ACOUSTIC CAMOUFLAGE (Threat 5, experimental)
- Capabilities unlocked: Operator can broadcast false sonar signatures (create decoys), phase shift sonar (briefly go undetectable at cost of navigation blindness)
- Audio feedback: Experimental audio (unreliable sonar, haunting deep-sea sounds, feedback loops)
- Cipher voice: Mystical, sparse. “You have become the ocean. Guard that knowledge.”
- Typical session: 60+ min, 5-phase 5000¤+ contract, emergence-heavy
- Unlock condition: Complete HUNTER INTERCEPT Threat 5 + achieve Rep 35+
1.7 Contract Economics
Section titled “1.7 Contract Economics”Payout Formula:
base_payout = threat_level × 350¤ + cargo_mass × 2¤
speed_bonus = max(0, (target_turns - actual_turns) × 15¤) (bonus if completed faster than estimated time)
stealth_bonus = (100 - final_acoustic_signature) × 5¤ (bonus if acoustic signature stayed low)
successful_outcome_multiplier = 1.0 (clean extraction) = 0.6 (partial extraction) = 0.0 (mission failed)
total = (base_payout × successful_outcome_multiplier + speed_bonus + stealth_bonus)Worked Examples:
-
SALVAGE DIVE (Threat 2, 350m wreck, estimated 15 turns)
- Base: 2 × 350 + 120 × 2 = 1240¤
- Time: 12 turns (3 turns faster) = +45¤ bonus
- Acoustic: 45 signature (100-45) × 5 = +275¤
- Clean extraction: 1.0 multiplier
- Total: 1560¤
-
RELAY ACCESS (Threat 3, 250m relay, estimated 25 turns)
- Base: 3 × 350 + 80 × 2 = 1210¤
- Time: 28 turns (3 turns slower) = +0¤ (no bonus)
- Acoustic: 78 signature (100-78) × 5 = +110¤
- Partial extraction (alarm triggered): 0.6 multiplier
- Total: (1210 × 0.6) + 110 = 836¤
-
EVASION RUN (Threat 4, 500m depth, estimated 35 turns)
- Base: 4 × 350 = 1400¤
- Time: 32 turns (3 turns faster) = +45¤
- Acoustic: 120 signature (100-120 = capped at 0) = +0¤
- Clean extraction: 1.0 multiplier
- Total: 1445¤ (stealth penalty for loud escape)
-
DEEP SALVAGE (Threat 5, multi-phase, 750m, estimated 50 turns)
- Base: 5 × 350 + 200 × 2 = 2150¤
- Time: 48 turns (2 turns faster) = +30¤
- Acoustic: 165 signature (capped 100 max) = +0¤
- Cross-module bonus (BLACK LEDGER used): +250¤
- Clean extraction: 1.0 multiplier
- Total: 2430¤
Risk/Reward Curve:
| Threat | Base Range | Rep Unlock | Avg Session | High-Rep Payout | Failure Cost |
|---|---|---|---|---|---|
| 1 | 200-400¤ | 0+ | 15min | 450¤ | -50¤ acoustic sig |
| 2 | 400-800¤ | 0+ | 20min | 1100¤ | -100¤ acoustic sig |
| 3 | 800-1600¤ | 15+ | 30min | 2200¤ | -150¤ acoustic sig |
| 4 | 1600-3200¤ | 25+ | 40min | 4000¤ | -200¤ acoustic sig + rep -2 |
| 5 | 3200-6000¤ | 35+ | 60min | 6500¤ | rep -5, acoustic sig resets (hunted) |
1.8 Operator Workflow
Section titled “1.8 Operator Workflow”Single Session Example (30 min, Threat 2):
MINUTE 0:00 — Boot and contract selection - DEPTHCHARGE cartridge loads. Cascade loading screen (5s). - Mission board shows 4 SALVAGE DIVEs (Threat 1-2). - Operator selects Threat 2 "Wreck at 350m" (estimated 15 min, 1200¤).
MINUTE 0:30 — Pre-dive briefing - Cipher voice: "Autonomous drone ready. Depth limit today is 600m. Wreck target: 350m. Acoustic signature at baseline." - Operator presses INFO (double-tap) to see sonar calibration screen. - Operator reviews ascent limits (can rise max 3 units/turn without pressure penalty).
MINUTE 1:00 — Descent phase (Turns 1-10) - Operator navigates: CAR to drill into depth 100m, CDR to move laterally. - Every turn: YM2149 Voice 1 (pressure tone, subtle). Voice 3 (ambient underwater). - Turn 5: Whale sound (Voice 2, not threat). Operator learns "listen for ambient." - Turn 8: Wreck first appears on sonar (Voice 1 shifts to new frequency). - Turn 10: Wreck at 350m confirmed. Acoustic signature at +8.
MINUTE 12:00 — Engagement phase (Turns 11-18) - Operator approaches wreck. Presses CAR to dock. - Cargo extraction begins. Each turn requires EVAL press (commitment). - Turn 14: Predator shark on sonar (Voice 3 spike). Operator chooses: - Continue extraction (fast, loud +2 sig/turn, risk predator contact) - Evade predator (slow, quiet, delays extraction by 3 turns) - Operator chooses evasion. Predator moves away. - Turn 18: Cargo extraction complete. Acoustic signature +13.
MINUTE 22:00 — Ascent and egress (Turns 19-27) - Operator presses CDR to begin return. Ascent from 350m to 0m begins. - Pressure gauge: ascent rate must stay within limit (max -3 depth/turn). - Turns 19-24: Steady ascent. Pressure easing. Voice 1 descends in frequency (relief tone). - Turn 25: Surface reached. Silence (all voices stop). - Turn 26: Egress clear. No hunter detected. - MISSION COMPLETE.
MINUTE 25:00 — Debrief - Payout calculation: - Base: 2 × 350 + 100 × 2 = 900¤ - Speed: 19 turns actual, 15 estimated = +0¤ (slower) - Stealth: acoustic 56 signature = +220¤ - Outcome: clean extraction = 1.0× - **Total: 1120¤** - Reputation: +3 (Threat 2 contract) - Acoustic signature: +13 (lingers for next mission) - Cipher voice: "Well done. The ocean quiets when you listen. Return when you're ready."
MINUTE 30:00 — Next mission available - Operator can queue another contract immediately (fatigue mechanics TBD). - Or swap to different cartridge.Multi-Session Campaign Example (Rep progression):
SESSION 1 (NOVICE INTRO): Load DEPTHCHARGE alone - Run three Threat 1 SALVAGE DIVEs (45 min total) - Rep: 0 → 9 (NOVICE tier) - Learn: basic sonar, depth pressure, ascent management - Acoustic signature: ~40 (operator playing safe, learning)
SESSION 2-3 (APPRENTICE): Load DEPTHCHARGE, consider ICE BREAKER swap - Run two Threat 2 RELAY ACCESS contracts (50 min) - Rep: 9 → 15 (advancing to SPECIALIST) - Learn: silence as strategy, hunter detection mechanics, ICE BREAKER cross-module - Attempt one Hot Swap to ICE BREAKER (phase 2 relay hack) - Acoustic signature: ~80 (more aggressive play)
SESSION 4-6 (SPECIALIST): Multi-cartridge approach - Run THREAT 3 EVASION RUN (45 min) - Rep: 15 → 24 (deep SPECIALIST) - Load DEPTHCHARGE + BLACK LEDGER together - Attempt multi-phase contract: escape + relay + audit - Acoustic signature: ~150 (now "hot," hunter more frequent)
SESSION 7+ (MASTER): Deep specialization - Unlock DEEP SALVAGE contracts (Threat 4-5) - Operator now has 5+ cartridges available. Routine swaps. - Rep: 25+ (MASTER) - Run 60-min "Cascade Salvage + Financial Audit" contract (all three cartridges) - Acoustic signature managed carefully (resets via "Silent Recon" contracts)Multi-Cartridge Operator Routine:
An operator who owns ICE BREAKER + DEPTHCHARGE + BLACK LEDGER + NEONGRID might:
-
Monday evening (45 min): Run DEPTHCHARGE EVASION RUN (Threat 3). Pure submarine pilot practice. Builds acoustic intuition.
-
Tuesday evening (60 min): Run ICE BREAKER contract with DEPTHCHARGE swaps. Navigate encrypted relay (ICE BREAKER), then swap to DEPTHCHARGE for sonar analysis of ICE class. Back to ICE BREAKER for exploit. Multi-cartridge rhythm.
-
Wednesday (30 min): Black Ledger audit contracts (separate game mode, no direct DEPTHCHARGE use, but financial decisions informed by previous week’s DEPTHCHARGE salvage payouts).
-
Thursday (90 min): Campaign contract spanning all three cartridges. Deep salvage + relay hack + financial trace. Emergent sessions. Unique every time.
This workflow creates long-term player investment in DEPTHCHARGE while maintaining single-cartridge completeness.
1.9 Cipher Voice Integration
Section titled “1.9 Cipher Voice Integration”Domain-specific vocabulary for CIPHER_DOMAIN:
- DEPTH_THRESHOLD, PRESSURE_WARNING, ACOUSTIC_SIGNATURE, SONAR_CONTACT
- CARGO_MASS, ASCENT_RATE, WRECK_INTEGRITY, HUNTER_PROXIMITY
- RELAY_DEFENSES, ENCRYPTION_DEPTH, FINANCIAL_ROUTING
- CRUSH_DEPTH, EVASION_COURSE, SILENT_RUNNING, EMERGENCY_ASCENT
Cipher Voice Examples:
-
On Load (Rep 5, APPRENTICE tier):
“Depthcharge sonar systems active. I see your acoustic signature at baseline. The deep awaits your command. Remember: pressure builds with every sound you make. Proceed with caution.”
-
During Navigation (Rep 5, encountering wreck):
“Sonar return at bearing 240. Wreck signature matches database. Integrity compromised—likely unstable. Approach slowly. Anything loud disturbs the abyss.”
-
Under Pressure (Rep 15, SPECIALIST, acoustic signature > 100):
“You’re hot. Hunter submarines don’t forget sound. Consider running silent or aborting this approach. The choice is yours.”
-
Error/Failure (Rep 15, pressure incident during ascent):
“System damage detected. You rose too fast. Next dive, manage your ascent rate carefully. Pressure is patient. Haste is lethal.”
-
Success Debrief (Rep 25, MASTER, clean extraction):
“You’ve learned the language. The ocean doesn’t fight you anymore—you flow through it. That’s mastery.”
-
High-Rep Cryptic (Rep 35+, LEGEND, during multi-phase contract):
“Three cartridges singing. You’ve become something between intelligence operative and deep-sea creature. Few reach this depth.”
-
Ambient Commentary (Rep 25, during navigation, whale sound in environment):
“The leviathans acknowledge your presence. They’re listening too. Be respectful of the territory you enter.”
-
Warning (Rep 20, hunter submarine approaching):
“Acoustic contact. Another submarine has you in sonar. It’s deciding what you are. Don’t give it a reason to care.”
1.10 Cell Architecture
Section titled “1.10 Cell Architecture”C-style pseudocode for DEPTHCHARGE cell types:
/* ========== MISSION BOARD CELLS ========== */
CELL_DEFINE(MissionCell) { CellBase base; uint8_t threat_level; uint16_t payout; uint8_t contract_type; // SALVAGE_DIVE, RELAY_ACCESS, etc.
ON_CAR { /* Drill into contract details screen */ contract_detail_screen_show(self); }
ON_CDR { /* Next contract in board */ next_mission_cell(); }
ON_EVAL { /* Accept contract, initialize phases */ phase_chain_init(self->contract_type); game_state = DESCENDING; }
ON_INFO { /* Show contract brief + payout forecast */ display_payout_table(self); }};
/* ========== GAMEPLAY CELLS ========== */
CELL_DEFINE(DepthCell) { CellBase base; uint16_t current_depth; // 0-1000m uint16_t target_depth; uint8_t pressure_level; // 0-100 (danger > 80) uint8_t acoustic_signature; // 0-255 CellList* sonar_contacts; // List of WreckCell, RelayCell, HunterCell
ON_CAR { /* Drill into sonar contact or navigation choice */ if (sonar_contacts->length > 0) { CellBase *contact = list_get(sonar_contacts, current_selection); drill_into(contact); // Examine wreck, relay, or hunter } }
ON_CDR { /* Navigate laterally or adjust depth slightly */ uint16_t new_depth = current_depth + nav_input; // CAR/CDR for depth, numpad for bearing update_depth_and_signature(new_depth); sonar_rescan(); // Recompute sonar contacts at new depth }
ON_EVAL { /* Commit to navigation choice; advance turn; update pressure */ advance_turn(); pressure_update(); threat_check(); // Check for hunter spawn, predator encounter voice_update_environment(); // YM2149 ambient feedback }
ON_INFO { /* Double-tap: show detailed sonar scan + pressure gauge */ display_sonar_detailed(); display_pressure_forecast(); }};
CELL_DEFINE(WreckCell) { CellBase base; uint16_t depth; uint8_t integrity; // 0-100 (affects extraction difficulty) uint16_t cargo_mass; uint8_t cargo_type; uint8_t acoustic_signature; // How loud this wreck is
ON_CAR { /* Drill into extraction sequence */ drill_into(extraction_sequence); }
ON_EVAL { /* Begin cargo extraction; lock in commitment */ extraction_phase_start(); pressure_increase_per_turn = 2; // Extraction is noisy }
ON_INFO { /* Detailed wreck analysis: age, previous intrusions, fragility */ display_wreck_telemetry(self); voice_output("This wreck is %d turns old. Integrity: %d percent.", wreck_age, self->integrity); }};
CELL_DEFINE(RelayCell) { CellBase base; uint16_t depth; uint8_t encryption_depth; // 0-4 (requires ICE BREAKER if > 1) uint8_t defense_level; // Hydrophone countermeasures uint8_t silence_requirement; // Max acoustic signature allowed uint16_t data_payload;
ON_CAR { /* Drill into dock procedure */ drill_into(dock_sequence); }
ON_EVAL { /* Attempt docking; check silence requirement */ if (current_acoustic_signature > self->silence_requirement) { alarm_trigger(); // Relay detects intrusion hunter_spawn_risk += 50; } else { dock_successful(); data_access_phase_begin(); } }
ON_INFO { /* Show relay encryption, defenses, payload content */ display_relay_specs(self); voice_output("Encryption depth: %d. Defenses active. Silence required: %d.", self->encryption_depth, self->silence_requirement); }};
CELL_DEFINE(HunterCell) { CellBase base; uint16_t hunter_depth; uint16_t distance_to_operator; // In sonar units uint8_t hunter_type; // PATROL, AGGRESSIVE, LEVIATHAN uint8_t sonar_acuity;
ON_CAR { /* Examine hunter sub; what threat does it pose? */ drill_into(hunter_analysis); }
ON_EVAL { /* Engage in evasion; make evasion choice */ evasion_attempt = DECISION_POINT; // Operator chooses evasion direction }
ON_INFO { /* Detailed hunter profile: type, capability, hearing range */ display_hunter_threat_level(self); voice_output("Hunter detected. Type: %d. Your signature is visible at range %d.", self->hunter_type, self->distance_to_operator); }};
/* ========== ASCENT/PRESSURE MANAGEMENT ========== */
CELL_DEFINE(AscensionCell) { CellBase base; uint16_t current_depth; int8_t ascent_rate; // -1 to -5 depth/turn (negative = rising) uint8_t pressure_safety; // 0-100 (danger > 80)
ON_CDR { /* Adjust ascent rate: faster (riskier) or slower (safer) */ ascent_rate = new_rate; pressure_safety = compute_safety(ascent_rate, current_depth); }
ON_EVAL { /* Commit to ascent rate; advance turn */ if (ascent_rate > PRESSURE_LIMIT) { pressure_incident(); // System damage, mission fail } else { advance_turn(); current_depth += ascent_rate; // Ascend toward 0 } }
ON_INFO { /* Show decompression table and pressure forecast */ display_ascension_plan(self); }};
/* ========== COMPOSITION EXAMPLE ========== */
CellList *depthcharge_create_mission(SalvageTemplate *template) { CellList *mission = list_create();
/* Root: mission acceptance */ MissionCell *briefing = cell_create(MissionCell); briefing->threat_level = template->threat; briefing->payout = template->payout; list_push(mission, (CellBase *)briefing);
/* Phase 1: descent to wreck */ DepthCell *descent = cell_create(DepthCell); descent->current_depth = 0; descent->target_depth = template->depth_target; descent->sonar_contacts = list_create(); list_push(mission, (CellBase *)descent);
/* Add wreck to sonar contacts */ WreckCell *wreck = cell_create(WreckCell); wreck->depth = template->depth_target; wreck->cargo_mass = template->cargo_mass; list_push(descent->sonar_contacts, (CellBase *)wreck);
/* Phase 2: extraction sequence */ ExtractionCell *extract = cell_create(ExtractionCell); extract->target = wreck; list_push(mission, (CellBase *)extract);
/* Phase 3: ascent and egress */ AscensionCell *ascent = cell_create(AscensionCell); ascent->current_depth = template->depth_target; list_push(mission, (CellBase *)ascent);
return mission;}1.11 Sound Design as Interface
Section titled “1.11 Sound Design as Interface”YM2149 Voice Assignments:
-
Voice 1 (Left channel): PRESSURE & THREAT. Fundamental tone representing depth pressure (frequency proportional to depth). Spikes on ICE/hunter proximity. Silence = safety.
-
Voice 2 (Center): OPERATOR FEEDBACK. Sonar pings (clicks, harmonics), tool effects (CONS arpeggios if HOT SWAP to ICE BREAKER), cargo extraction tone (steady rising tone during engagement).
-
Voice 3 (Right channel): ENVIRONMENT. Ambient sounds (whale vocalizations, microbubble crackle, predator presence). When active = living ocean. When silent = dead water (preparation before something happens).
Key Audio Events (Frequency + Timing):
| Event | Voice | Frequency | Duration | Meaning |
|---|---|---|---|---|
| Sonar Ping | 2 | 160Hz click + 200ms tail | 0.3s | Sonar active, contact detected |
| Depth Warning | 1 | 100Hz rising to 180Hz | 0.5s | Pressure increasing, approach crush depth |
| Pressure Incident | 1 | 200Hz double-pulse | 0.7s | System damage; ascent too fast |
| Whale Vocalization | 3 | 20Hz subsonic (felt not heard) + 80Hz rumble | 2.0s | Ambient life (non-threat) |
| Hunter Sonar | 1 | 240Hz rapid pulse | 0.4s repeating | Another submarine detected |
| Extraction Success | 2 | 440Hz rising arpeggio (4 notes) | 1.2s | Cargo extracted cleanly |
| Emergency Ascent | 1 | 300Hz fast trill | 0.6s repeating | Flee mode active, pressure extreme |
| Dock Clamp Engage | 2 | 220Hz descending gliss | 0.8s | Relay physical dock engaged |
| Silence (Stealth Mode) | All | Mute (except crackling ambient) | N/A | Operator in “listen only” mode |
| Navigation Commit | 2 | 330Hz single pulse | 0.2s | CDR/CAR confirmed |
Advanced Technique: “Playing by Ear”
Expert DEPTHCHARGE operators can navigate with eyes closed. Sonar pings have distinct spatial signatures:
- Single ping = object directly ahead
- Multiple pings at different pitch = wreck (multiple resonance frequencies)
- Sustained low hum = whale or large animal
- Rapid pulse = hunter submarine
The pressure tone (Voice 1) is the “depth gauge.” Experienced operators feel the frequency and know their depth without looking. This is the auditory equivalent of feel-based gameplay.
1.12 Link Protocol
Section titled “1.12 Link Protocol”Asymmetric Roles (Deck-to-Deck Play):
Two KN-86 units running DEPTHCHARGE engage in either:
-
Competitive Evasion: One operator pilots a submarine; the other operates enemy hunter sonar. Real-time asymmetric chase.
-
Cooperative Salvage: Both operators pilot separate drone teams to salvage a wreck (time-synchronized missions).
Data Flow:
OPERATOR A (Submarine Pilot) ↓ (UART 9600 baud, every 100ms) Sends: current_depth, acoustic_signature, position_bearing, action_intent ↓OPERATOR B (Hunter Sonar Operator) Receives: sonar contact update Decides: hunter response (move, ping, spawn acoustic countermeasure) ↓ (Returns to A) Sends: hunter_position, sonar_ping_intensity, threat_level_escalation ↓OPERATOR A Hears: incoming hunter sonar (Voice 1 pulses), must react within 1 secondWorked Example: Competitive Evasion
SCENARIO: "Smuggler's Run" Operator A: Pilot submarine carrying stolen cargo. Depth 0-500m. Operator B: Hunter sonar operator. Must locate and intercept within 10 minutes. Link cable: Connects both KN-86 units. Payout: Winner gets 2000¤. Loser gets 500¤ (participation).
MINUTE 0:00 — START A: Loads cargo at surface (0m depth). Acoustic sig = 0. B: Sonar sweep range = 1km. Doesn't yet detect A.
MINUTE 1:00 — DESCENT A: Descends to 200m. Acoustic sig +5 from descent noise. B: Sonar sweeps detect acoustic anomaly. Broadcasts position estimate (50% accuracy). A hears: incoming hunter sonar pulses (Voice 1 spikes). A's location is known.
MINUTE 3:00 — EVASION A: Takes evasive course (sharp turn, fast descent to 400m). Acoustic sig +15 (noisy maneuver). B: Sonar locks. Clear location confirmed. Broadcasts "CONTACT LOCKED." A hears: relentless sonar pulses (Voice 1 steady high frequency). Threat imminent.
MINUTE 5:00 — CHASE TEMPO A: Acceleration phase. Speed 3 units/turn (max). Pressure building. B: Hunter submarine spawns (automated response to A's evasion). Now actively chasing. A vs. B: Real-time tempo battle. A cycles decisions every 0.5s. B cycles every 1.0s. A has tempo advantage. But B can make strategic calls B can't react to in time.
MINUTE 8:00 — FINAL PUSH A: One choice: surface (safe, but slow) or dive deeper (risky, faster). A chooses dive to 550m. Pressure critical. B: Makes final intercept attempt.
MINUTE 9:30 — RESOLUTION A: Reaches safety depth (750m, beyond hunter effective sonar range). Extraction successful. **Operator A Wins: 2000¤ + rep +5** **Operator B: 500¤ + rep +2** (good defense effort)
OPTIONAL: Linked multi-cartridge variant Operator A: Runs DEPTHCHARGE submarine + ICE BREAKER hacking phases (relay access during chase). Operator B: Runs automated hunter defense (new DEPTHCHARGE sub-mode for automated hunter). Result: More complex, 4-phase evasion + hack + escape.MODULE 2: SHELLFIRE — ELECTRONIC WARFARE
Section titled “MODULE 2: SHELLFIRE — ELECTRONIC WARFARE”2.1 Module Identity
Section titled “2.1 Module Identity”Designation: SHELLFIRE (Module Class 0x45 = Electronic)
Publisher: Zaibatsu Digital (Osaka, Japan)
Profile: Signals intelligence officer and electronic warfare operator
Operator Role: EW technician managing frequency spectrum, jamming operations, signal intercept, countermeasures
Deck State Signature: Cartridge History bit 8 (SHELLFIRE completion status)
Loading Screen:
[4.5-SECOND BOOT SEQUENCE]
Visual: Black screen. Horizontal frequency sweep bar appears (left to right). Red noise fills the sweep path (visible spectrum visualization). Text overlays:
ZAIBATSU DIGITAL SHELLFIRE™ EW SUITE [INITIALIZING SIGNAL ENVIRONMENT]
Sweep bar retraces (right to left) while frequency spike indicators appear. Bar collapses to vertical line at center (locked frequency). Waveform pattern stabilizes. Text fades to single pulsing icon.
Audio: Starts: White noise (heavy, oppressive, full spectrum). Transition (1.5s): Noise filtered to three distinct frequencies (Voice 1: 400Hz, Voice 2: 800Hz, Voice 3: 1200Hz). Sustain (2.0s): Three-voice harmonic drone (unsettling, deliberate). Climax (0.5s): Sudden harsh buzz (electronic distortion, brief spike). Fade (0.5s): Noise collapses to single 440Hz tone (signal locked).
Timing: Total 4.5 seconds. Menacing, technical, organized.
Design Intent: "Spectrum is a battlefield. You own the frequency space."2.2 Mission Template Architecture
Section titled “2.2 Mission Template Architecture”Contract Classes
Section titled “Contract Classes”| Type | Description | Threat | Base Payout | Phases | Rep Unlock |
|---|---|---|---|---|---|
| FREQUENCY SCAN | Map enemy signal environment, identify sources | 1-2 | 200-600¤ | 1 | Rep 0+ |
| COMMS INTERCEPT | Lock onto target transmission, extract encrypted data | 2-3 | 500-1500¤ | 2 | Rep 5+ |
| JAMMING OP | Suppress enemy transmission, create signal chaos | 2-4 | 800-2400¤ | 2-3 | Rep 10+ |
| SIGNAL DUEL | Real-time EW countermeasure exchange with active opponent | 3-5 | 1500-4000¤ | 2-4 | Rep 20+ |
| SPECTRUM DENIAL | Seize enemy frequency band, establish signal dominance | 4-5 | 2500-5000¤ | 3-4 | Rep 30+ |
Template Structures
Section titled “Template Structures”FREQUENCY SCAN Contract:
typedef struct { // Signal environment uint16_t frequency_range_start; // 80Hz - 20kHz (audible spectrum) uint16_t frequency_range_end; uint8_t signal_density; // How many signals active (0-255) uint8_t noise_floor; // Background noise level (0-100)
// Detection parameters uint8_t target_frequency; // Which frequency to map/lock onto uint8_t signal_strength_variation; // How much signal fluctuates uint8_t jamming_resistance; // How hard to jam (0-100)
// Reward uint16_t base_payout; uint8_t intelligence_value; // Higher = more useful signal data} FrequencyScanTemplate;
// Example: Corporate radio network surveyFrequencyScanTemplate corp_radio_survey = { .frequency_start = 400, // UHF band .frequency_end = 1200, // Broad sweep .signal_density = 45, // Moderately busy .noise_floor = 30, // Some atmospheric noise .target_frequency = 850, // Specific corporate freq .strength_var = 15, // Moderate variation (modulation type) .jamming_resist = 40, // Moderate resistance (military hardening) .payout = 400, .intel_value = 60};COMMS INTERCEPT Contract:
typedef struct { uint16_t target_frequency; // MHz equivalent uint8_t modulation_type; // AM, FM, FSK, BPSK (affects decoding) uint8_t encryption_complexity; // 0-4 (requires decryption tools) uint16_t message_duration; // How long the transmission lasts uint8_t signal_to_noise_ratio; // Higher = clearer signal uint16_t payout_if_extracted; uint8_t counter_jamming_active; // Does target broadcast counter-jam?} CommsInterceptTemplate;
// Example: Corporate financial call (encrypted)CommsInterceptTemplate finance_call = { .target_frequency = 856, .modulation_type = FSK, // Frequency shift keying .encryption = 2, // Moderate encryption .duration = 300, // 5-minute call window .snr = 18, // Good signal, but some jamming present .payout = 1200, .counter_jamming = 1 // Active counter-measure broadcasts};Worked Examples
Section titled “Worked Examples”Example 1: FREQUENCY SCAN — “Radio Landscape Survey” (Threat 1)
-
Setup: Map a 500-1500 MHz band to identify active signals. Operator scans, identifies strongest signals, reports back.
-
Gameplay:
- Scan Phase (8 turns): Sweep frequency band. Each turn, Operator presses CDR to move frequency +100MHz. Voice 2 changes pitch as operator moves through spectrum.
- Lock Phase (5 turns): Once strongest signal identified (400Hz pure tone = corporate radio), presses EVAL to lock sonar-style. Voice 1 locks onto frequency.
- Analysis Phase (4 turns): Hold lock. System analyzes signal characteristics (modulation, encryption, source). Voice 3 reveals intelligence: “Signal is military-grade hardened radio. Likely command and control. Encryption present.”
- Report (1 turn): Press LINK to transmit findings back to command. Mission complete.
-
Audio Design: Spectrum sweep sounds like descending pitch. When locked: pure frequency (440Hz or matching signal). Analysis phase adds harmonic artifacts (indicating signal complexity detected).
-
Outcome: 400¤ + rep +2. Maps signal environment for future operations.
Example 2: COMMS INTERCEPT — “Financial Heist Call” (Threat 3)
-
Setup: Corporate executives holding encrypted financial call. Operator must lock sonar-style onto frequency, filter out background noise, and extract encrypted data (which Black Ledger can decrypt).
-
Gameplay:
- Frequency Lock (10 turns): Search 800-900MHz band for active transmission. Threat: active counter-jamming (Voice 3 interference). Operator must balance: fast lock (loud, triggers counter-jam) vs. slow lock (quiet, but call ends before extraction).
- Signal Extraction (15 turns): Once locked, Voice 2 plays the modulated signal. Operator presses INFO to decode signal strength. Pressing CONS + EVAL applies decryption key (if available) or marks for later decryption.
- Evasion (5 turns): Enemy counter-jam activates (Voice 3 noise spike). Operator can apply jamming countermeasure (press APPLY + predefined jamming profile) to suppress counter-jam temporarily.
- Extraction (3 turns): Final window. Extract encrypted data payload before connection closes.
-
Outcome: 1200¤ + rep +5. Encrypted data can be decrypted with Black Ledger (Hot Swap). Full payload extracted = bonus +400¤.
2.3 Deck State Integration
Section titled “2.3 Deck State Integration”SRAM Fields Modified by SHELLFIRE:
credit_balance— increased by signal intelligence, intercepts, jamming operationsreputation— cumulative across all modulescartridge_history[8]— SHELLFIRE completion flagsjamming_resistance_known(NEW 16-bit field, indexed by frequency band) — tracks which enemy frequencies operator has learned defenses against
Reputation Thresholds (SHELLFIRE Context):
- Rep 0-4: NOVICE. Frequency scan contracts only. Cipher voice is instructive. “Spectrum is vast. Learn to listen first.”
- Rep 5-14: APPRENTICE. Intercept contracts available. Cipher becomes tactical. “Encryption hides secrets. Patience reveals them.”
- Rep 15-24: SPECIALIST. Jamming ops unlock. Cipher observant. “You’re learning the language of signals. It speaks back.”
- Rep 25-34: MASTER. Signal duel contracts unlock. Cipher cryptic. “When you jam, they counter-jam. This is the dance.”
- Rep 35+: LEGEND. Spectrum denial contracts. Cipher mystical. “You have become the spectrum’s master. Use that power wisely.”
2.4 Cross-Module Interactions
Section titled “2.4 Cross-Module Interactions”With ICE BREAKER:
- Encrypted relay communications use SHELLFIRE to intercept, ICE BREAKER to decrypt
- Hot Swap: SHELLFIRE intercepts signal → ICE BREAKER decrypts payload
- Cross-module mission: “Corporate Communication Network” (signal interception + data intrusion)
With BLACK LEDGER:
- Financial wire calls intercepted via SHELLFIRE
- Encrypted transmissions decrypted, revealing account numbers/routing info
- BLACK LEDGER audit phase traces money via intercepted communications
- Bonus: If both cartridges used, financial trace is verified against signal intercepts (+250¤)
With NEONGRID:
- Signal source mapping (SHELLFIRE identifies frequencies, NEONGRID maps transmitter locations spatially)
- Operator can visualize “signal topology” instead of network topology
- Trained in NEONGRID, operator reads frequency patterns faster (10% OBSERVE reduction)
2.5 Multi-Phase Mission Design
Section titled “2.5 Multi-Phase Mission Design”Phase Architecture: SHELLFIRE missions are spectrum/time-based sequences. Each phase involves frequency management, signal detection, counter-jamming rhythm.
Example Multi-Phase: “Coordinated Signal Interception + ICE Breaker Hack” (4-phase, Threat 4)
MISSION BRIEFING: Objective: Intercept encrypted corporate communications + extract financial data Cartridges: SHELLFIRE (primary), ICE BREAKER (phase 2 swap optional), BLACK LEDGER (phase 3) Phase sequence: 1. SHELLFIRE frequency scan (identify target signal) 2. SHELLFIRE signal lock + extraction (capture encrypted transmission) 3. ICE BREAKER decryption (Hot Swap) — unlock encryption 4. BLACK LEDGER financial trace (verify money trail) Estimated: 40 turns (24 min) Payout: 1500¤ (SHELLFIRE) + 1000¤ (BLACK LEDGER) = 2500¤ Rep gain: +6
PHASE 1 (SHELLFIRE SCAN): Identify target frequency (8 turns) - Turns 1-5: Sweep band 800-1200 MHz. Voice 2 frequency changes per turn. - Turn 6: Target signal detected (400Hz pure tone, modulating). Lock sonar approach. - Turn 7: Confirm signal is financial call (voice analysis). - Turn 8: Calculate counter-jam resistance. Operator learns: "Active counter-measure present."
PHASE 2 (SHELLFIRE INTERCEPT): Capture encrypted transmission (18 turns) - Turn 1: Transmission starts. Signal window = 20 turns. Must extract within window. - Turns 2-8: Lock on frequency. Voice 3 interference from counter-jamming. Operator applies countermeasure (press APPLY + counter-jam profile). - Turns 9-15: Signal extraction. Voice 2 modulation pattern plays (encrypted data sound). Operator presses EVAL per 2 turns to confirm capture. - Turn 16: Counter-jamming intensifies (Voice 3 loud spike). Operator can abort or push forward. - Turns 17-18: Final extraction. Data copied to memory buffer. - Outcome: Encrypted transmission captured. Cannot yet decrypt (requires ICE BREAKER or decryption tools).
PHASE 3 (ICE BREAKER DECRYPTION — Optional Hot Swap): Unlock encrypted message (6 turns) - Cartridge swap occurs. ICE BREAKER loads. Scoped mode: decryption only. - Turns 1-4: Apply CRACK or MIRROR tool to encrypted data. - Turns 5-6: Message decrypts. Contents revealed: "Authorization for 5 million credit wire transfer to account 88834-SK." - Outcome: Decrypted message contains account info. Ready for BLACK LEDGER audit.
PHASE 4 (BLACK LEDGER AUDIT): Trace money trail (8 turns) - Swap to BLACK LEDGER. Source account identified. - Turns 1-5: Audit source account. Ledger trace shows: funds originated from corporate subsidiary. - Turns 6-8: Trace destination. Money trail leads to shell account (DEPTHCHARGE submarine account, if available). - Outcome: Full financial trace confirmed. Bonus +250¤ for multi-module verification.
TOTAL PAYOUT: 2500¤ base + 250¤ cross-module bonus = 2750¤REPUTATION GAIN: +62.6 Capability Progression (5 Tiers)
Section titled “2.6 Capability Progression (5 Tiers)”Tier 1: NOVICE (Rep 0-4)
- Available: FREQUENCY SCAN contracts only (Threat 1-2)
- Capabilities: Frequency sweep (manual tuning), basic signal identification, noise floor visualization
- Audio feedback: Simple tones (Voice 2 frequency varies with operator input), warning beeps
- Cipher voice: Instructive, patient. “Listen before you act. The spectrum tells you everything.”
- Unlock: Complete FREQUENCY SCAN Threat 1
Tier 2: APPRENTICE (Rep 5-14)
- Available: COMMS INTERCEPT contracts (Threat 2-3)
- Capabilities: Frequency locking (hold on signal), encryption detection, signal strength trending
- Audio feedback: Locked frequency tone (steady), modulation artifacts (harmonics reveal encryption)
- Cipher voice: Tactical. “Encryption is just noise. Learn to listen through it.”
- Unlock: Complete COMMS INTERCEPT Threat 2
Tier 3: SPECIALIST (Rep 15-24)
- Available: JAMMING OP contracts (Threat 3-4)
- Capabilities: Active jamming (broadcast noise on target frequency), counter-jamming recognition, dual-band monitoring
- Audio feedback: Jamming waveforms (Voice 1 broadband noise), counter-jam response (Voice 3 interference spike)
- Cipher voice: Observant. “When you jam, they counter-jam. The dance begins.”
- Unlock: Complete JAMMING OP Threat 3
Tier 4: MASTER (Rep 25-34)
- Available: SIGNAL DUEL contracts (Threat 4-5)
- Capabilities: Predict enemy counter-measures, frequency hopping defense, multi-band simultaneous operations
- Audio feedback: Complex harmonic duel (three voices interweaving), real-time tactical feedback
- Cipher voice: Equal partner. “You’ve become fluent in the language of war. Act accordingly.”
- Unlock: Complete SIGNAL DUEL Threat 4
Tier 5: LEGEND (Rep 35+)
- Available: SPECTRUM DENIAL contracts (Threat 5, ultimate)
- Capabilities: Seize entire frequency bands, broadcast false signal networks, total spectrum dominance
- Audio feedback: Orchestral complexity (all voices engaged in organized chaos), moments of eerie silence
- Cipher voice: Mystical, powerful. “You own the spectrum now. Guard it against others like you.”
- Unlock: Complete SIGNAL DUEL Threat 5 + achieve Rep 35+
2.7 Contract Economics
Section titled “2.7 Contract Economics”Payout Formula:
base_payout = threat_level × 300¤ + signal_intelligence_value × 3¤
speed_bonus = max(0, (target_turns - actual_turns) × 12¤)
accuracy_bonus = (signal_lock_precision × 1.0) × 100¤ (how cleanly was signal locked; 0-100%)
countermeasure_bonus = (countermeasures_applied) × 50¤ (bonus for actively countering enemy jamming)
successful_extraction_multiplier = 1.0 (full extraction) = 0.7 (partial extraction, some data lost) = 0.0 (detected, mission failed)
total = (base_payout × successful_multiplier + speed_bonus + accuracy_bonus + countermeasure_bonus)Worked Examples:
-
FREQUENCY SCAN (Threat 1, estimated 8 turns)
- Base: 1 × 300 + 60 × 3 = 480¤
- Time: 7 turns (1 turn faster) = +12¤
- Accuracy: 95% lock = +95¤
- Countermeasures: none applied (passive contract) = +0¤
- Clean extraction: 1.0×
- Total: 587¤
-
COMMS INTERCEPT (Threat 3, estimated 20 turns)
- Base: 3 × 300 + 80 × 3 = 1140¤
- Time: 22 turns (2 turns over target) = +0¤
- Accuracy: 85% lock = +85¤
- Countermeasures: 2 counter-jam profiles applied = +100¤
- Full extraction: 1.0×
- Total: 1325¤
-
JAMMING OP (Threat 4, estimated 25 turns)
- Base: 4 × 300 + 90 × 3 = 1470¤
- Time: 23 turns (2 turns faster) = +24¤
- Accuracy: 72% (jamming inherently noisy) = +72¤
- Countermeasures: 3 active counter-jam counters = +150¤
- Partial extraction (target detected partway through) = 0.7×
- Total: (1470 + 24 + 72 + 150) × 0.7 = 1211¤
2.8 Operator Workflow
Section titled “2.8 Operator Workflow”Single Session (35 min, Threat 3):
MINUTE 0:00 — Boot and contract selection - SHELLFIRE cartridge loads. Zaibatsu loading screen (4.5s). - Mission board shows 4 contracts (mix of SCAN and INTERCEPT, Threat 2-3). - Operator selects Threat 3 "Financial Call Interception" (est. 20 min, 1200¤).
MINUTE 0:45 — Pre-op briefing - Cipher voice: "Target frequency: 856 MHz. Transmission window: 5 minutes. Counter-jamming active. Signal will be encrypted. Proceed carefully." - Operator presses INFO to see frequency band visualization.
MINUTE 1:15 — PHASE 1: Frequency Scan (Turns 1-8) - Operator navigates spectrum: CDR moves frequency ±100MHz per press. - Voice 2 frequency shifts as operator tunes. Baseline is high-pitched (1200MHz), lowers as operator tunes down. - Turn 3: Ambient noise spikes (Voice 3 interference, atmospheric noise). - Turn 5: Weak signal detected (Voice 2 subtle tone at 856MHz). - Turn 7: Signal strengthens (Voice 2 loudness increases). Operator presses EVAL to lock. - Turn 8: Frequency locked. Voice 1 plays pure 440Hz tone (lock confirmation).
MINUTE 5:00 — PHASE 2: Signal Extraction (Turns 9-26) - Transmission begins. Voice 2 carries the modulated data (sounds like warbling tones). - Turn 12: Counter-jamming begins (Voice 3 broadband noise). Operator must decide: apply countermeasure or ride it out. - Operator presses APPLY to deploy counter-jamming profile #3 (learned from previous mission). - Turn 15-18: Clear signal window. Voice 2 modulation pattern clear. Operator presses EVAL to confirm capture. - Turn 19: Counter-jamming intensifies (Voice 3 very loud). SNR (signal-to-noise ratio) dropping. - Turn 22: Final data window. Operator presses EVAL to complete extraction. - Turn 26: Transmission ends. Data captured. Encrypted, cannot yet decrypt.
MINUTE 13:00 — PHASE 3: Optional ICE BREAKER Swap (Turns 27-32) - Operator decides to swap to ICE BREAKER (to decrypt captured data immediately). - Cartridge swap. ICE BREAKER loads. 5 seconds physical boot. - Decryption phase (5 turns). Apply CRACK tool to decrypt. - Outcome: Message revealed: "Authorization for 5M credit wire." - Swap back to SHELLFIRE (if planning another contract).
MINUTE 18:00 — Debrief - Payout calculation: - Base: 3 × 300 + 80 × 3 = 1140¤ - Speed: 26 turns actual, ~20 estimated = +0¤ - Accuracy: 88% (good lock despite jamming) = +88¤ - Countermeasures: 1 active counter = +50¤ - Full extraction: 1.0× - **Total: 1278¤** - Reputation: +5 (Threat 3) - Cipher voice: "Well done. That signal was contested. You held your own."
MINUTE 20:00 — Next action - Operator can queue another SHELLFIRE contract, or swap to BLACK LEDGER (to trace money from intercepted call).2.9 Cipher Voice Integration
Section titled “2.9 Cipher Voice Integration”Domain-specific vocabulary:
- FREQUENCY_BAND, SIGNAL_LOCK, MODULATION_TYPE, ENCRYPTION_DEPTH
- COUNTER_JAMMING, SIGNAL_STRENGTH, NOISE_FLOOR, SNR (signal-to-noise ratio)
- TRANSMISSION_WINDOW, INTERCEPT_SUCCESS, SPECTRUM_DENIAL
- HARMONIC_ARTIFACT, FREQUENCY_HOP, JAMMING_WAVEFORM
Cipher Voice Examples:
-
On Load (Rep 5, APPRENTICE):
“Shellfire systems online. Frequency spectrum active. Multiple signals detected. Choose your target frequency carefully. Jamming will not forgive impatience.”
-
During Frequency Lock (Rep 10, APPRENTICE, encountering counter-jam):
“Signal located at 856 MHz. Counter-jamming detected. Active defense protocol active. Your lock precision is degrading. Hold steady.”
-
Under Jamming Pressure (Rep 20, SPECIALIST, counter-jamming intensifying):
“They know you’re listening. Counter-measure broadcast incoming. You can suppress it, but the window is closing fast. Choose now.”
-
Error/Failure (Rep 15, SPECIALIST, transmission ends prematurely):
“Transmission ended. Extraction incomplete. You have 60% of the message. Decrypt what you can, or wait for the next broadcast. Patience is a tool.”
-
Success Debrief (Rep 25, MASTER, clean interception + decryption):
“Perfect lock. Clean extraction. Decryption successful. You’ve mastered the rhythm of signal war. Few reach this precision.”
-
High-Rep Cryptic (Rep 35+, LEGEND, during spectrum denial operation):
“You’re not just listening anymore. You’re orchestrating. Every frequency you seize denies an enemy a channel. This is power. Use it carefully.”
-
Ambient Commentary (Rep 20, during scan, hearing whale sounds in background frequency):
“Atmospheric interference. Or something else. The spectrum is alive. Learn to distinguish signal from noise, noise from meaning.”
-
Warning (Rep 15, SPECIALIST, enemy frequency hopping detected):
“They’re moving. Frequency hop detected. They’re learning your listening patterns. Adapt or lose the signal.”
2.10 Cell Architecture
Section titled “2.10 Cell Architecture”C-style pseudocode:
/* ========== FREQUENCY SPECTRUM CELL ========== */
CELL_DEFINE(SpectrumCell) { CellBase base; uint16_t frequency_start; // 80-20000 Hz uint16_t frequency_end; uint16_t current_frequency; // Operator's tuning position uint8_t noise_floor; // 0-100 background noise level uint8_t jamming_intensity; // 0-255 (how hard enemy is jamming) CellList* signals; // List of active signals in spectrum
ON_CDR { /* Sweep frequency up/down */ uint16_t delta = (numpad_input & 0x0F) * 50; // 50MHz per input current_frequency += delta; sonar_rescan(); // Update signal detection at new frequency voice_frequency_update(current_frequency); // Voice 2 pitch follows tuning }
ON_EVAL { /* Lock onto frequency; begin interception */ signal_lock_attempt(); if (is_signal_present(current_frequency)) { drill_into(signal_at_frequency); // Move to signal cell } else { beep_error(); // No signal here; try elsewhere } }
ON_INFO { /* Show spectrum visualization + noise floor + active signals */ display_spectrum_heatmap(self); voice_output("Noise floor: %d. Signals detected: %d. Recommend scanning 400-900 MHz band.", self->noise_floor, self->signals->length); }};
/* ========== SIGNAL LOCK CELL ========== */
CELL_DEFINE(SignalCell) { CellBase base; uint16_t frequency; uint8_t modulation_type; // AM, FM, FSK, BPSK uint8_t encryption_depth; // 0-4 uint16_t signal_strength; // Current SNR uint16_t transmission_start_turn; uint16_t transmission_duration; // How many turns until signal ends uint16_t data_payload_size; // Bytes to extract uint8_t counter_jamming_active; // Is enemy counter-jaming? uint8_t extraction_progress; // 0-100% (how much captured)
ON_CAR { /* Drill into lock detail screen */ drill_into(signal_lock_detail); }
ON_EVAL { /* Commit to extraction; begin capturing data */ signal_extraction_begin(); Voice2_activate(); // Begin playing modulated signal audio extraction_phase_start(); }
ON_INFO { /* Show signal parameters: modulation, encryption, window duration */ display_signal_telemetry(self); voice_output("Frequency: %d MHz. Modulation: %s. Encryption: depth %d. Window: %d turns remaining.", self->frequency, modulation_name(self->modulation_type), self->encryption_depth, self->transmission_duration); }};
/* ========== EXTRACTION PHASE CELL ========== */
CELL_DEFINE(ExtractionCell) { CellBase base; SignalCell *target_signal; uint8_t extraction_progress; // 0-100% uint8_t countermeasure_active; // Is operator jamming back? uint8_t counter_jamming_intensity; // Enemy counter-response level
ON_EVAL { /* Advance extraction one turn; update progress */ uint16_t data_chunk = 10; // 10% per turn extraction_progress += data_chunk;
if (target_signal->counter_jamming_active) { counter_jamming_intensity += 5; // Escalates each turn Voice3_intensity_increase(); // Enemy jamming grows }
if (extraction_progress >= 100) { extraction_complete(); } else if (counter_jamming_intensity > 200) { alarm_trigger(); // Detection imminent } }
ON_APPLY { /* Deploy counter-jamming profile to suppress enemy jam */ countermeasure_active = 1; counter_jamming_intensity = 0; // Reset escalation Voice1_broadband_noise(); // Operator's jamming broadcast payout_bonus += 50; // Bonus for active countermeasure }
ON_INFO { /* Show extraction progress bar + signal quality + threat level */ display_extraction_progress(self); voice_output("Extraction: %d percent. SNR: %d. Threat: %s.", self->extraction_progress, current_snr(), threat_level_string(self->counter_jamming_intensity)); }};
/* ========== JAMMING OPERATION CELL ========== */
CELL_DEFINE(JammingCell) { CellBase base; uint16_t target_frequency; uint8_t jamming_waveform; // Broadband, narrowband, frequency-hop uint8_t jamming_intensity; // 0-255 (how hard operator jams) uint8_t enemy_counter_response; // 0-255 (how they escalate) uint16_t turns_until_target_silent; // Countdown to when target goes offline
ON_EVAL { /* Increase jamming intensity; risk escalation */ jamming_intensity += 20; enemy_counter_response += 15; // They adapt turns_until_target_silent--;
if (jamming_intensity > 200) { Voice1_reaches_crescendo(); // Peak jamming if (enemy_counter_response > 200) { full_spectrum_war(); // Both sides jamming heavily } } }
ON_APPLY { /* Switch jamming waveform (broadband → narrowband) to adapt */ jamming_waveform = (jamming_waveform + 1) % NUM_WAVEFORMS; Voice1_waveform_changes(); // Audio signature shifts payout_bonus += 75; // Bonus for tactical adaptation }
ON_INFO { /* Show jamming effectiveness and counter-response forecast */ display_jamming_analysis(self); voice_output("Jamming intensity: %d/255. Enemy response: %d/255. Target silenced in: %d turns.", self->jamming_intensity, self->enemy_counter_response, self->turns_until_target_silent); }};
/* ========== COMPOSITION EXAMPLE ========== */
CellList *shellfire_create_mission(CommsInterceptTemplate *template) { CellList *mission = list_create();
SpectrumCell *spectrum = cell_create(SpectrumCell); spectrum->frequency_start = template->target_frequency - 200; spectrum->frequency_end = template->target_frequency + 200; spectrum->current_frequency = 400; // Start scanning from low frequency spectrum->noise_floor = 40; spectrum->jamming_intensity = 0; // No jamming yet spectrum->signals = list_create();
list_push(mission, (CellBase *)spectrum);
SignalCell *target = cell_create(SignalCell); target->frequency = template->target_frequency; target->modulation_type = template->modulation_type; target->encryption_depth = template->encryption_complexity; target->transmission_duration = template->message_duration; target->counter_jamming_active = template->counter_jamming_active;
list_push(spectrum->signals, (CellBase *)target);
ExtractionCell *extract = cell_create(ExtractionCell); extract->target_signal = target; extract->extraction_progress = 0; extract->counter_jamming_intensity = 50; // Starts moderate
list_push(mission, (CellBase *)extract);
return mission;}2.11 Sound Design as Interface
Section titled “2.11 Sound Design as Interface”YM2149 Voice Assignments:
-
Voice 1: THREAT & JAMMING. Broadband noise when enemy counter-jams. Pure tone when operator is locked. Frequency/intensity = threat level.
-
Voice 2: TARGET SIGNAL. The actual modulated transmission. Frequency = target frequency. Modulation artifacts reveal encryption. Silence = no signal present.
-
Voice 3: ENVIRONMENT & COUNTERMEASURES. Atmospheric interference, multi-target signals, operator’s counter-jamming broadcast. Busy = contested spectrum. Quiet = clear band.
Key Audio Events:
| Event | Voice | Frequency | Duration | Meaning |
|---|---|---|---|---|
| Frequency Sweep | 2 | Glissando 80Hz→20kHz | 1.5s | Scanning full spectrum |
| Signal Lock | 2 | Match target freq | 0.4s | Locked onto target |
| Modulation Artifact | 2 | Target + harmonics | Continuous | Encryption detected (harmonic complexity) |
| Counter-Jamming Start | 1 | 400Hz broadband | 0.5s repeating | Enemy broadcasting counter-measure |
| Operator Jam Deploy | 3 | 1000Hz broadband | 0.6s repeating | Operator’s jamming broadcast |
| Transmission Window | 2 | Target freq | Duration | Active signal present |
| SNR Degradation | 1+2 | Sustained with noise | Continuous | Signal getting noisy (jamming effect) |
| Extraction Success | 2 | Descending gliss + tone | 1.0s | Data captured cleanly |
| Detection Alert | 1 | 800Hz double-pulse | 0.7s repeating | Enemy detected intrusion |
| Spectrum War | All | Harmonic chaos | Duration | Full frequency battle active |
2.12 Link Protocol
Section titled “2.12 Link Protocol”Asymmetric Roles:
Two decks running SHELLFIRE engage in:
-
Intercept vs. Counter-Jamming: One operator tries to intercept a transmission; other operates counter-jamming defense.
-
Frequency Duel: Both operators broadcast signals/jamming on same band in real-time competition.
Worked Example:
SCENARIO: "Corporate Radio War" Operator A: SHELLFIRE Intercept operator. Goal: lock onto target frequency and extract data. Operator B: SHELLFIRE Counter-Jamming operator. Goal: jam Operator A's lock before extraction completes. Link: UART connection, 100ms sync updates. Payout: A wins (successful extraction) = 2000¤. B wins (detection) = 1500¤.
MINUTE 0:00 — START A: Begins frequency scan (starts at 800 MHz). B: Receives "intercept in progress" signal over link.
MINUTE 2:00 — LOCK ATTEMPT A: Scans and finds signal at 856 MHz. Locks. Voice 2 locked tone plays. B: Receives "lock acquired at 856 MHz" via link. Decision: where to jam? B: Broadcasts jamming on 856 MHz to suppress A's lock.
MINUTE 3:00 — JAMMING ESCALATION A: Lock degraded by B's jamming. SNR dropping. Presses APPLY to counter-jam B's counter-jam. B: Feels A's counter-jam come online (Voice 3 spike). Escalates jamming waveform.
MINUTE 5:00 — FINAL PUSH A: Extraction at 80%. Counter-jam holding B at bay. But transmission window closing (4 turns left). B: One last attempt. Broadcasts full-spectrum jamming (all three voices in chaos). A: Presses EVAL to complete extraction before transmission ends.
MINUTE 6:00 — RESOLUTION A: Extraction complete at 87%. 1800¤ payout + rep +4. B: Counter-jam effort detected intrusion attempt. 800¤ payout + rep +3 (defensive bonus).
OUTCOME: Both operators profited, but A won the duel.MODULE 3: TAKEZO — TACTICAL ANALYSIS
Section titled “MODULE 3: TAKEZO — TACTICAL ANALYSIS”3.1 Module Identity
Section titled “3.1 Module Identity”Designation: TAKEZO (Module Class 0x54 = Tactical)
Named after: Miyamoto Musashi’s birth name, legendary swordmaster who mastered the Way through contemplation
Publisher: Kōji Interactive (Kyoto, Japan)
Profile: Strategic analyst and adversarial pattern recognition specialist
Operator Role: Study scenarios, recognize patterns, plan multi-turn strategies, analyze risk/reward
Deck State Signature: Cartridge History bit 9 (TAKEZO completion status)
Loading Screen:
[3.5-SECOND BOOT SEQUENCE]
Visual: Black screen. Single horizontal line appears (center, white/amber). Line remains still for 1.0s (meditation). Three more lines appear above/below (hierarchical structure). All four lines move to form a pattern (abstract Go board or chessboard grid). Grid stabilizes. Text appears:
KŌJI INTERACTIVE TAKEZO™ STRATEGIC ANALYSIS [INITIALIZING PATTERN ENGINE]
Grid pixelates and resolves into game state (abstract tactical scenario). Text fades. Grid remains, interactive.
Audio: Starts: Silence (complete, unusual). Transition (0.8s): Single note (D2, 73Hz, deep bell tone) appears. Sustain (1.5s): Bell note overlaid with sparse koto pluck (Japanese string). Climax (0.8s): Additional notes layer in (harmony, building structure). Fade (0.4s): All notes sustain and fade to silence.
Timing: Total 3.5 seconds. Contemplative, patient, intellectual.
Design Intent: "Every scenario is a puzzle of strategy. Take your time. Mastery requires stillness."3.2 Mission Template Architecture
Section titled “3.2 Mission Template Architecture”Contract Classes
Section titled “Contract Classes”| Type | Description | Threat | Base Payout | Turns | Rep Unlock |
|---|---|---|---|---|---|
| PATTERN RECOGNITION | Analyze scenario, identify winning pattern | 1-2 | 150-400¤ | 5-10 | Rep 0+ |
| TACTICAL ANALYSIS | Evaluate positions, calculate risk/reward | 2-3 | 300-900¤ | 10-20 | Rep 5+ |
| STRATEGIC PLANNING | Multi-turn scenario, prepare 3-5 move ahead | 3-4 | 600-1800¤ | 20-40 | Rep 15+ |
| ADVERSARIAL WARGAME | Play both sides; learn opponent strategy | 4-5 | 1500-4000¤ | 30-60 | Rep 25+ |
| MASTERY CHALLENGE | Historical military/corporate scenario, solve with zero errors | 5 | 3000-8000¤ | 60+ | Rep 35+ |
Template Structures
Section titled “Template Structures”PATTERN RECOGNITION Contract:
typedef struct { // Scenario setup uint8_t board_size; // 5x5, 7x7, 9x9 (like Go/Chess) uint8_t num_entities; // Number of pieces/units on board (5-15) uint8_t max_turns; // Scenario duration (5-10 turns)
// Complexity uint8_t pattern_obscurity; // 0-100 (how hidden is winning pattern?) uint8_t branching_factor; // 2-8 (how many valid moves per turn?)
// Scoring uint16_t payout_if_solved; uint8_t difficulty_multiplier; // Higher = more complex pattern recognition} PatternRecognitionTemplate;
// Example: Corporate merger scenarioPatternRecognitionTemplate merger_scenario = { .board_size = 7, // 7x7 board (49 positions) .num_entities = 12, // 6 friendly units, 6 enemy units .max_turns = 8, .pattern_obscurity = 45, // Moderately hidden pattern .branching_factor = 3, // 3 valid moves per turn on average .payout = 300, .difficulty_mult = 1.2};ADVERSARIAL WARGAME Contract:
typedef struct { uint8_t scenario_type; // MILITARY, CORPORATE, POLITICAL uint8_t player_side; // Which faction operator plays uint8_t opponent_ai_level; // 1-5 (1=novice, 5=master) uint8_t num_entities_player; // Units under operator's control uint8_t num_entities_opponent; // AI opponent's units uint16_t scenario_duration; // 20-60 turns
// Reward scaling uint16_t payout_if_won; uint8_t bonus_for_efficient_victory; // Extra bonus if won in fewer moves} AdversarialWargameTemplate;
// Example: Corp takeover defenseAdversarialWargameTemplate corp_defense = { .scenario_type = CORPORATE, .player_side = DEFENDER, .opponent_ai_level = 3, // Intermediate AI .entities_player = 8, .entities_opponent = 10, .scenario_duration = 40, .payout = 3000, .bonus_efficient = 500};Worked Examples
Section titled “Worked Examples”Example 1: PATTERN RECOGNITION — “Merger Triangle” (Threat 1)
-
Setup: Abstract 7x7 board. Six friendly units (circles), six enemy units (squares). Task: identify winning pattern in 8 turns.
-
Board State (Turn 0):
1 2 3 4 5 6 7A ○ . . . . . □B . . . . . . .C . . ◆ . . . □D . . . ○ . . .E . . . . . . .F . . . . . ○ .G □ . . . . . ○Legend: ○ = friendly, □ = enemy, ◆ = control point (objective) -
Gameplay:
- Turns 1-5: Operator studies board. Each turn, presses INFO to “think” (no action taken). Cipher voice provides hints (“Three units in alignment control the center”).
- Turn 6: Operator recognizes pattern: three friendly units can form triangle around central control point. Presses EVAL to execute move (C3 → C4).
- Turns 7-8: Execute remaining moves to complete pattern.
-
Pattern Solved: Control point secured. Three units form defensive triangle. Enemy cannot break formation.
-
Outcome: 300¤ + rep +2. Learned: symmetry matters in tactical scenarios.
Example 2: ADVERSARIAL WARGAME — “Corporate Takeover Defense” (Threat 4)
-
Setup: Operator defends corporation against hostile takeover. 8 friendly units vs. 10 enemy units. 40 turns to execute defense strategy.
-
Scenario Architecture:
- Phase 1 (Turns 1-10): Reconnaissance. Operator uses early turns to read enemy deployment, anticipate attack vectors.
- Phase 2 (Turns 11-25): Tactical Positioning. Operator positions units to block acquisition routes, protect critical assets (finance, IP, comms).
- Phase 3 (Turns 26-40): Counter-Offensive. Operator executes counter-takeover strategy, threatening enemy assets to force negotiation.
-
AI Opponent Behavior:
- AI cycles through OODA-like loop: Observe (where are operator’s weaknesses?), Orient (which assets matter most?), Decide (where to attack?), Act (move units).
- AI is slightly predictable at Threat 4 level. Expert operator can anticipate AI’s 2-3 move ahead.
-
Outcome: If operator wins: 3000¤ + rep +7. If operator loses: 0¤ + rep +2 (participation bonus, but loss stings). If operator wins before turn 30: +500¤ efficiency bonus.
3.3 Deck State Integration
Section titled “3.3 Deck State Integration”SRAM Fields Modified by TAKEZO:
credit_balance— increased by pattern recognition and strategic victoriesreputation— cumulative across all modulescartridge_history[9]— TAKEZO completion flagstactical_mastery(NEW 8-bit field) — cumulative victories. Unlocks advanced scenarios. Resets slowly (legacy stat).
Reputation Thresholds (TAKEZO Context):
- Rep 0-4: NOVICE. PATTERN RECOGNITION contracts only. Cipher voice is patient instructor. “Patterns emerge when you slow down and observe.”
- Rep 5-14: APPRENTICE. TACTICAL ANALYSIS available. Cipher becomes strategic guide. “Risk is measurable. Learn to quantify it.”
- Rep 15-24: SPECIALIST. STRATEGIC PLANNING unlock. Cipher observant. “Deep play requires thinking several moves ahead. Few have the patience.”
- Rep 25-34: MASTER. ADVERSARIAL WARGAME unlock. Cipher cryptic, equal. “You play like a strategist now. Meet others of your caliber.”
- Rep 35+: LEGEND. MASTERY CHALLENGE. Cipher mystical, reverent. “You have become Takezo. You see the board as possibility, not pieces.”
3.4 Cross-Module Interactions
Section titled “3.4 Cross-Module Interactions”With ICE BREAKER:
- TACTICAL ANALYSIS of network intrusion scenarios. Player studies a “network board” and plans intrusion path. Then loads ICE BREAKER to execute.
- Cross-module contract: “Plan & Execute” (analyze network structure in TAKEZO, then run ICE BREAKER mission).
- Bonus: +200¤ if operator planned route perfectly matches execution path.
With DEPTHCHARGE:
- Submarine tactical scenarios (opponent submarines maneuvering for depth advantage, sonar warfare, evasion patterns).
- TAKEZO provides high-level strategy, DEPTHCHARGE provides real-time execution.
- Bonus: Operator trained in TAKEZO reads DEPTHCHARGE sonar patterns 15% faster.
With SHELLFIRE:
- Frequency spectrum wargames. Player and AI opponent broadcast on different frequencies, competing for spectrum dominance.
- TAKEZO is turn-based thinking phase, SHELLFIRE is real-time execution phase.
With Black Ledger:
- Financial scenario analysis. Operator studies hostile takeover scenarios (on TAKEZO), then audits financial data in BLACK LEDGER to verify intelligence.
3.5 Multi-Phase Mission Design
Section titled “3.5 Multi-Phase Mission Design”Phase Architecture: TAKEZO missions are turn-based contemplative sequences. No real-time pressure. Player can take 30+ seconds per turn without penalty.
Example: “Cascading Defense + ICE BREAKER Execution” (3-phase, Threat 4)
MISSION BRIEFING: Objective: Plan corporate takeover defense, then execute via network security Cartridges: TAKEZO (planning), ICE BREAKER (execution, optional) Phase sequence: 1. TAKEZO tactical analysis (20 turns, planning phase) 2. TAKEZO execution (15 turns, commitment phase) 3. ICE BREAKER live operation (validate plan, Hot Swap) Estimated: 50 turns (1+ hour) Payout: 2000¤ (TAKEZO) + 1500¤ (ICE BREAKER if swapped) = 3500¤ Rep gain: +8
PHASE 1 (TAKEZO PLANNING): Analyze enemy attack vectors (20 turns) - Operator receives briefing: Hostile corporation preparing takeover. Must defend in 3-5 move sequences. - Board setup: 7x7 grid. 8 friendly "assets" (IP, Finance, Comms, Executive Team, etc.). 10 enemy "acquisition" units. - Turns 1-5: Reconnaissance phase. Operator presses INFO to read board state, anticipates enemy deployment. - Turns 6-15: Planning phase. Operator commits units to positions. Each move = one EVAL press. No time pressure. - Turns 16-20: Refinement phase. Operator reviews plan, makes final adjustments. Cipher voice evaluates robustness: "Your defense holds against 60% of predicted attack patterns. Strengthen the financial flank."
PHASE 2 (TAKEZO EXECUTION): Execute strategy under pressure (15 turns) - AI opponent reveals full strategy. Now it's simultaneous move resolution (operator and AI alternate). - Turns 1-7: Early exchanges. Operator's units hold lines. AI probes weaknesses. - Turns 8-12: Major battle. Operator's plan either works (units repel acquisition) or cracks (AI breaks through). - Turns 13-15: Resolution. If operator's plan is sound: takeover blocked. If not: partial success (some assets captured).
OUTCOME (Planning Phase): If plan was sound (successfully defended): 2000¤ + rep +6. If plan was partial (mixed results): 1200¤ + rep +3. If plan failed: 400¤ + rep +1 (learning bonus).
PHASE 3 (ICE BREAKER HOT SWAP — Optional): - Operator can now swap to ICE BREAKER to execute the network-level tactics. - The tactical plan translates to network intrusion plan. - ICE BREAKER contract mirrors TAKEZO board (same locations = same network nodes). - If operator executes plan perfectly in ICE BREAKER: +500¤ bonus.3.6 Capability Progression (5 Tiers)
Section titled “3.6 Capability Progression (5 Tiers)”Tier 1: NOVICE (Rep 0-4)
- Available: PATTERN RECOGNITION (Threat 1-2, small boards 5x5)
- Capabilities: View full board state, think without time pressure, simple move validation
- Audio feedback: Contemplative silence (with sparse koto notes on decision), success bell tone
- Cipher voice: Patient instructor. “Take your time. Strategy rewards patience.”
- Unlock: Complete PATTERN RECOGNITION Threat 1
Tier 2: APPRENTICE (Rep 5-14)
- Available: TACTICAL ANALYSIS (Threat 2-3, 7x7 boards, adversarial scoring)
- Capabilities: Risk/reward calculation (TAKEZO suggests move payoffs), multi-turn lookahead (see 2-3 moves ahead)
- Audio feedback: Layered koto (more notes = more complex analysis), harmonics on commitment
- Cipher voice: Tactical guide. “Every move has cost. Calculate before committing.”
- Unlock: Complete TACTICAL ANALYSIS Threat 2
Tier 3: SPECIALIST (Rep 15-24)
- Available: STRATEGIC PLANNING (Threat 3-4, 9x9 boards, 30+ turn scenarios)
- Capabilities: Plan 5+ moves ahead, opponent behavior prediction (AI reveals likely next 3 moves), multiple win conditions
- Audio feedback: Complex koto arrangements (full composition), harmony shifts with strategic depth
- Cipher voice: Strategic equal. “Now you think like a strategist. The board becomes transparent.”
- Unlock: Complete STRATEGIC PLANNING Threat 3
Tier 4: MASTER (Rep 25-34)
- Available: ADVERSARIAL WARGAME (Threat 4-5, 11x11 boards, adaptive AI)
- Capabilities: Counter-strategy (predict and counter opponent’s 3-move plans), multi-phase campaigns (coordinate attack + defense simultaneously)
- Audio feedback: Orchestrated koto + shamisen (layered instruments), dynamic harmony reflecting game state
- Cipher voice: Master strategist. “You see three moves ahead. Most see one. This is mastery.”
- Unlock: Complete ADVERSARIAL WARGAME Threat 4
Tier 5: LEGEND (Rep 35+)
- Available: MASTERY CHALLENGE (Threat 5, ultimate historical scenarios, 60+ turns, zero-error requirement)
- Capabilities: Perfect play (near-optimal move suggestions), historical scenario replication (operator recreates historical victories/defeats with exact move sequences), multi-opponent scenarios
- Audio feedback: Full Japanese traditional orchestra (koto, shamisen, taiko, shakuhachi), dynamic expression
- Cipher voice: Mystical reverence. “You have become the strategist of legend. Few walk this path.”
- Unlock: Complete ADVERSARIAL WARGAME Threat 5 + achieve Rep 35+
3.7 Contract Economics
Section titled “3.7 Contract Economics”Payout Formula:
base_payout = threat_level × 350¤ + board_complexity × 20¤
planning_bonus = (turns_remaining_after_plan) × 5¤ (bonus if operator completed plan early with turns unused)
execution_bonus = (opponent_confidence_rating - actual_opponent_performance) × 100¤ (bonus if operator performed better than AI predicted)
mastery_bonus = (board_size × difficulty_multiplier) × 2¤ (bonus for handling complex board states)
successful_outcome_multiplier = 1.0 (clean victory) = 0.6 (mixed result, partial success) = 0.0 (defeat)
total = (base_payout × successful_multiplier + planning_bonus + execution_bonus + mastery_bonus)Worked Examples:
-
PATTERN RECOGNITION (Threat 1, 5x5 board, estimated 8 turns)
- Base: 1 × 350 + (5×5 = 25 complexity) × 20 = 850¤
- Planning: Used 6 turns of 8 available = 2 turns remaining = +10¤
- Execution: Perfect pattern recognition = +150¤
- Mastery: Small board = +10¤
- Clean victory: 1.0×
- Total: 1020¤
-
TACTICAL ANALYSIS (Threat 3, 7x7 board, estimated 20 turns)
- Base: 3 × 350 + 49 × 20 = 1930¤
- Planning: Used 19 turns (1 turn unused) = +5¤
- Execution: Good performance, AI was rated 65% confidence, actual was 58% = +700¤
- Mastery: 7x7 board × 1.1 difficulty = +77¤
- Mixed victory (partial success): 0.6×
- Total: (1930 + 5 + 700 + 77) × 0.6 = 1540¤
-
ADVERSARIAL WARGAME (Threat 5, 11x11 board, estimated 50 turns)
- Base: 5 × 350 + 121 × 20 = 4175¤
- Planning: Used 48 turns (2 remaining) = +10¤
- Execution: Flawless play, AI was 80% confident, operator won decisively = +1500¤
- Mastery: 11x11 board × 1.5 difficulty = +165¤
- Clean victory: 1.0×
- Total: 4175 + 10 + 1500 + 165 = 5850¤
3.8 Operator Workflow
Section titled “3.8 Operator Workflow”Single Session (60+ min, Threat 4 ADVERSARIAL WARGAME):
MINUTE 0:00 — Boot and scenario selection - TAKEZO cartridge loads. Kōji Interactive loading screen (3.5s). - Mission board shows 3 wargame scenarios (Threat 3-4). - Operator selects "Corporate Takeover Defense" (est. 50 turns, 3000¤).
MINUTE 1:00 — Scenario briefing - Cipher voice: "Hostile acquisition in progress. Nine moves until they control majority shares. You have seven defensive units. Deploy strategically. Think three moves ahead." - Board displayed: 7x7 grid. Operator's assets positioned. Enemy acquisition units shown.
MINUTE 2:00 — PHASE 1: Planning (20 turns, estimated 30 minutes) - Turns 1-5: Study phase. Operator presses INFO each turn to read board state. - Turn 1: "Finance sector is vulnerable. Strengthen with legal team." - Turn 2: "IP assets protected. Comms center is secondary objective." - Turn 3: "Executive team cannot be moved; defend in place." - Turns 6-10: First line of defense. Operator commits units to block key acquisition vectors. Presses EVAL to place units. - Each placement: Cipher voice confirms placement and shows risk score ("Finance defense: 85% hold probability"). - Turns 11-15: Secondary strategy. Operator anticipates AI counter-moves (AI is transparent about likely next moves). - Operator positions units to counter AI's anticipated attacks. - Turns 16-20: Refinement. Operator reviews complete plan. Presses INFO to see Cipher's evaluation. - Cipher voice: "Your defense is solid against 70% of attack patterns. The financial sector remains weak. Consider reinforcement." - Operator adjusts Finance position (move unit from comms to finance). - Cipher re-evaluates: "Revised defense: 78% overall hold probability."
MINUTE 32:00 — PHASE 2: Execution (15 turns, estimated 20 minutes) - AI opponent reveals full strategy. Wargame begins. - Turns 1-5: Opening moves. AI probes operator's defense, looking for weaknesses. - Operator's units hold line. AI doesn't find easy breaches. - Turns 6-10: Major attack on Finance (as Cipher predicted). Operator's reinforced Finance sector holds. - But IP sector is now lightly defended. AI pivots. - Turns 11-15: Final exchanges. Operator's strategy either works (blocks takeover) or fails (partial success). - Outcome: Operator's plan was sound. AI takeover blocked. "ACQUISITION DEFENSE SUCCESSFUL."
MINUTE 52:00 — Debrief and analysis - Payout calculation: - Base: 4 × 350 + 49 × 20 = 2380¤ - Planning: 18 turns used of 20 = +10¤ - Execution: Perfect defense, AI rated 70% confidence = +1200¤ - Mastery: 7x7 × 1.3 difficulty = +91¤ - Clean victory: 1.0× - **Total: 3681¤** - Reputation: +7 (Threat 4) - Cipher voice: "That was masterful. You anticipated their third-order moves and countered them. Few reach this level."
MINUTE 60:00 — Optional: Hot Swap to ICE BREAKER - Operator decides to practice the "Plan & Execute" cross-module challenge. - Loads ICE BREAKER. The takeover defense board translates to a network topology. - Operator must now execute the same strategic plan in real-time ICE BREAKER intrusion. - Execution: Navigates network nodes matching TAKEZO plan. If execution mirrors plan perfectly: +500¤ bonus.3.9 Cipher Voice Integration
Section titled “3.9 Cipher Voice Integration”Domain-specific vocabulary:
- PATTERN, SYMMETRY, THREAT_VECTOR, RISK_ASSESSMENT
- BOARD_STATE, UNIT_DEPLOYMENT, ACQUISITION_ROUTE
- MULTI_MOVE_LOOKAHEAD, OPPONENT_PREDICTION, STRATEGIC_DEPTH
- WARGAME, ADVERSARIAL_ANALYSIS, MASTERY_PLAY
Cipher Voice Examples:
-
On Load (Rep 5, APPRENTICE):
“Takezo strategic analysis systems active. A board awaits your study. Remember: take time to think. Strategy is the domain of patience, not speed.”
-
During Planning (Rep 10, encountering complex position):
“This board has seven possible winning patterns. Three require sacrifice of key assets. Which line do you pursue? The board is your mirror—study it.”
-
Anticipating Opponent (Rep 20, SPECIALIST, analyzing AI opponent):
“Your opponent will attack Finance in three moves. They don’t know you see them. Plan your counter now.”
-
Error/Failure (Rep 15, SPECIALIST, plan fails):
“Your strategy was sound, but execution faltered. The board teaches through defeat. Study this loss. Next time, you’ll see the error before it happens.”
-
Success Debrief (Rep 25, MASTER, flawless victory):
“Perfect play. You anticipated three moves ahead and positioned every unit exactly where it needed to be. This is what mastery looks like.”
-
High-Rep Mystical (Rep 35+, LEGEND, during ultimate mastery challenge):
“You don’t see the pieces anymore. You see the spaces between them. You’ve become Takezo. Few ever reach this understanding.”
-
Ambient Commentary (Rep 20, studying board for 5 turns without acting):
“Patience. You’re seeing the position clearly now. When you move, it will be with purpose.”
-
Warning (Rep 25, MASTER, about to make strategic error):
“That move weakens your secondary line. The opponent will exploit it. Are you certain? Or do you see something I don’t?“
3.10 Cell Architecture
Section titled “3.10 Cell Architecture”/* ========== BOARD STATE CELL ========== */
CELL_DEFINE(BoardCell) { CellBase base; uint8_t board_size; // 5, 7, 9, 11 (board size) uint8_t *board_state; // Flattened board (size²) CellList* units_player; // Operator's units CellList* units_opponent; // AI opponent units uint16_t turn_number; uint16_t max_turns; uint8_t phase; // PLANNING, EXECUTION
ON_CAR { /* Drill into unit or position detail */ CellBase *selected = list_get(units_player, current_selection); drill_into(selected); }
ON_CDR { /* Navigate board: arrow keys move cursor (change selected position) */ uint16_t new_position = cursor_move(nav_input); display_position_info(new_position); }
ON_EVAL { /* Commit unit move or pass turn */ if (phase == PLANNING) { unit_placement_commit(); turn_advance(); } else if (phase == EXECUTION) { execute_move(); opponent_response(); turn_advance(); } }
ON_INFO { /* Detailed board analysis: show risk assessment, win conditions */ display_risk_heatmap(self); voice_output("Turn: %d/%d. Your units: %d. Opponent: %d. Overall hold probability: %d percent.", self->turn_number, self->max_turns, self->units_player->length, self->units_opponent->length, calculate_hold_probability(self)); }};
/* ========== UNIT CELL ========== */
CELL_DEFINE(UnitCell) { CellBase base; uint8_t unit_type; // FINANCE, IP, COMMS, EXECUTIVE, MILITARY, etc. uint16_t position; // Board position (x, y flattened) uint8_t health; // 0-100 (can be damaged) uint8_t threat_level; // How much threatened by opponent uint8_t strategic_value; // How important this unit is
ON_CAR { /* Drill into unit detail screen (movement options, stats) */ drill_into(unit_detail); }
ON_EVAL { /* Move unit (during planning) or engage (during execution) */ if (planning_phase) { show_movement_options(self); } else { engage_opponent(self); } }
ON_INFO { /* Show unit stats: type, health, threat assessment */ display_unit_profile(self); voice_output("Unit: %s. Health: %d/100. Strategic value: %d. Current threat: %d.", unit_type_name(self->unit_type), self->health, self->strategic_value, self->threat_level); }};
/* ========== MOVE SUGGESTION CELL ========== */
CELL_DEFINE(SuggestedMoveCell) { CellBase base; uint8_t suggested_unit; // Which unit to move uint16_t suggested_position; // Where to move it uint16_t expected_outcome; // Predicted success rate (0-100) char* tactical_reasoning; // Why Cipher suggests this move
ON_CAR { /* Examine suggestion details */ drill_into(move_analysis); }
ON_EVAL { /* Accept suggestion and commit move */ accept_suggestion(self); unit_move_execute(); }
ON_INFO { /* Show full tactical breakdown */ display_move_analysis(self); voice_output("Recommended: %s. Expected outcome: %d percent hold probability. " "Reasoning: %s", move_description(self), self->expected_outcome, self->tactical_reasoning); }};
/* ========== COMPOSITION EXAMPLE ========== */
CellList *takezo_create_mission(PatternRecognitionTemplate *template) { CellList *mission = list_create();
BoardCell *board = cell_create(BoardCell); board->board_size = template->board_size; board->board_state = malloc(template->board_size * template->board_size); board->units_player = list_create(); board->units_opponent = list_create(); board->turn_number = 0; board->max_turns = template->max_turns; board->phase = PLANNING;
/* Populate board with starting units */ for (int i = 0; i < template->num_entities / 2; i++) { UnitCell *friendly = cell_create(UnitCell); friendly->unit_type = FRIENDLY; friendly->position = random_friendly_start_position(); list_push(board->units_player, (CellBase *)friendly);
UnitCell *enemy = cell_create(UnitCell); enemy->unit_type = ENEMY; enemy->position = random_enemy_start_position(); list_push(board->units_opponent, (CellBase *)enemy); }
list_push(mission, (CellBase *)board);
return mission;}3.11 Sound Design as Interface
Section titled “3.11 Sound Design as Interface”YM2149 Voice Assignments:
-
Voice 1: STRATEGIC DEPTH. Single koto note at base frequency (C3, 131Hz). Note sustains, pitch rises as operator’s strategic depth increases. At turn 20+: Voice 1 shifts to harmony (adding overtones).
-
Voice 2: TACTICAL COMMITMENT. Sparse koto plucks. Each EVAL press = koto note (different pitch per decision). Melodies emerge from operator’s decisions (signature of their strategy style).
-
Voice 3: OPPONENT PRESENCE. Shamisen (2-string Japanese lute). Subtle initially. Grows louder during execution phase as opponent makes moves. Conveys threat.
Key Audio Events:
| Event | Voice | Frequency | Duration | Meaning |
|---|---|---|---|---|
| Move Commitment | 2 | Koto pluck (varying) | 0.4s | Unit move accepted |
| Turn Advance | 1 | Fundamental rises 1 semitone | 0.6s | One turn passed |
| Planning Phase Complete | 1+2 | Chord resolution (harmonious) | 1.2s | Plan finalized |
| Opponent Move | 3 | Shamisen pluck (threat pitch) | 0.5s | AI opponent acts |
| Victory | All | Triumphant arpeggio (full composition) | 2.0s | Strategic victory |
| Defeat | All | Descending, minor key resolution | 2.0s | Strategic loss |
| Strategic Insight | 1 | Sudden pitch jump (recognition) | 0.7s | Operator sees key pattern |
| Silence (Deep Thought) | Mute | N/A | N/A | Player in contemplative mode |
3.12 Link Protocol
Section titled “3.12 Link Protocol”Asymmetric Roles:
Two decks running TAKEZO engage in live wargames (real-time adversarial play):
-
Simultaneous Strategy: Both operators plan for 10 turns (silent, no communication), then execute simultaneously. Both reveal strategies at same moment.
-
Alternating Play: One operator plays as commander; other as opponent. Real-time strategic duel (each turn takes ~30s, back-and-forth).
Worked Example:
SCENARIO: "Corporate Wargame Duel" Operator A: Defender (protecting corporation) Operator B: Attacker (executing hostile takeover) Link: UART, 100ms turn sync Duration: 30 turns (1 hour) Payouts: Winner = 3500¤. Loser = 1500¤.
MINUTE 0:00 — START Both operators see same 9x9 board. A is "south" (defender), B is "north" (attacker). A has 10 defensive units. B has 12 acquisition units.
MINUTE 0:00-10:00 — PLANNING (10 turns each) A: Plans defense. Studies board. Positions units to block B's acquisition routes. B: Plans attack. Simultaneously, B plans three assault vectors. Link carries no information during planning (silent, asynchronous).
MINUTE 10:00 — EXECUTION BEGINS Both operators commit to execution phase. Game becomes synchronous.
MINUTE 10:00-40:00 — REAL-TIME DUEL (20 turns, 30s per turn) Turn 1: A makes first move (positions financial defense). Link sends A's move to B. Turn 1: B sees A's move. B responds with first attack vector. Turn 2: A sees B's attack. A adjusts defense or counter-attacks. [... back-and-forth continues ...] Turn 20: Final position reached.
MINUTE 40:00 — RESOLUTION If A successfully blocked all B's acquisition vectors: A wins. 3500¤. B: 1500¤. If B broke through and secured control: B wins. 3500¤. A: 1500¤. If outcome is mixed: Both get 2200¤. Honorable draw.
OPTIONAL: Cross-cartridge wargame A: Plays TAKEZO defense, then swaps to ICE BREAKER to defend network-level intrusions. B: Plays TAKEZO attack, then swaps to ICE BREAKER to execute network hacking. Result: Strategic layer + tactical layer integrated.SUMMARY
Section titled “SUMMARY”Three Operations modules designed to match ICE BREAKER’s depth:
- DEPTHCHARGE: Contemplative, sonar-based, pressure-driven. OODA loop is slow (listening), tight feedback loops (pressure).
- SHELLFIRE: Real-time, frequency-based, jamming-driven. OODA loop is fast (lock-extract-evade), multi-agent confusion.
- TAKEZO: Turn-based, pattern-based, strategic. OODA loop is patient (plan-commit-execute), zero real-time pressure.
Each module:
- Has 5 contract types spanning Threat 1-5
- Features deep cross-module interactions with ICE BREAKER, BLACK LEDGER, NEONGRID, and each other
- Includes full OODA-loop design, sound design as information, and emergent gameplay through system collision
- Provides 100+ hours of gameplay per cartridge (single cartridge complete experience)
- Uses unique YM2149 voice orchestration as primary information channel
- Fits the 1988 cyberpunk fiction layer seamlessly
All three are ready for implementation in the C11 capability model framework.