Sir, welcome to the Advanced Surveillance Program. According to the Foreign Domain Surveillance Act signed by the Prime Minister, you will obtain the surveillance authority of KINGSBURY City. You can discover and eliminate threats by creating and deploying surveillance systems throughout the city.
## About This Game
\————————————————————————————————————————————————————————–
Introduction: Advanced Intelligence Surveillance Agency(AISA) is a
surveillance system building game. You will control an intelligence
surveillance agency, you will need to achieve mission goals by establishing
the surveillance system in the city. A news system will be provided in the
game to provide players with the latest mission information. You can customize
your equipment according to your needs in the Research center, including
surveillance probes, surveillance drones, large reconnaissance drones, etc,
and you can choose the way to complete the task according to the current
intelligence. The location of the surveillance system you deploy, the
detection range of the surveillance system, the efficiency of eliminating
threats, and the casualties of civilians will all affect the success
probability of your mission. Every action you take may have different effects.
\————————————————————————————————————————————————————————–
> Initiating foreign territory surveillance program
> Protocol ‘AISAS-984XN’
> Get main objectives:
\– Establish surveillance network
\– Search and Eliminate threats
> Administrator detected
> Initiating ‘Briefing’ protocol
> Welcome to Advanced Intelligence Surveillance Agency (AISA)
\– AISA is an intelligence surveillance agency approved by the Foreign
Territory Land Monitoring Act, which is subordinate to the Ministry of
National Defense.
\– AISA is mainly responsible for the detection and elimination of terrorist
activities in overseas territories and cities.
\– The surveillance plan will allow administrators to place surveillance
equipment anywhere in the city.
\– Any individual entering the surveillance area will be scanned by the
surveillance equipment and obtain personal information.
\– If the surveillance device locates the threat, the administrator will be
asked to take action.
\– Administrators will be authorized to use equipment including military
detectors, drones, and electronic warfare weapons.
\– The administrator will be able to customize the equipment research plan
according to the needs.
> Authorizing the deployment of surveillance equipment
> Authorized. Monitoring equipment is now free to deploy in the city
> System diagnosing:
\– Command center ready
\– Research center ready
\– Operation center ready
\– Black Ops center offline
> Bypassing local reinforcement security network
> Succeed
> Requesting citizens information
> Completed
> Inquiry parallel projects status:
\– PRISM (Decoy)
\– Upstream Collection (Decoy)
\– ECHELON (Activated)
> Gathering Intelligence from base stations
…
…
…
…
> Access denied, additional equipment required
> Initiate program complete
> Waiting for commands